remove duplicated import

Kubernetes-commit: 4e7398b67b12390486012dd6f9d708dd64f961f3
This commit is contained in:
Cao Shufeng 2018-01-11 19:15:11 +08:00 committed by Kubernetes Publisher
parent 7e24d2baad
commit 2a2505e824
9 changed files with 21 additions and 30 deletions

View File

@ -25,7 +25,6 @@ import (
"k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/util/json" "k8s.io/apimachinery/pkg/util/json"
"k8s.io/apiserver/pkg/apis/apiserver" "k8s.io/apiserver/pkg/apis/apiserver"
apiserverapi "k8s.io/apiserver/pkg/apis/apiserver"
apiserverapiv1alpha1 "k8s.io/apiserver/pkg/apis/apiserver/v1alpha1" apiserverapiv1alpha1 "k8s.io/apiserver/pkg/apis/apiserver/v1alpha1"
) )
@ -138,7 +137,7 @@ func TestReadAdmissionConfiguration(t *testing.T) {
} }
scheme := runtime.NewScheme() scheme := runtime.NewScheme()
apiserverapi.AddToScheme(scheme) apiserver.AddToScheme(scheme)
apiserverapiv1alpha1.AddToScheme(scheme) apiserverapiv1alpha1.AddToScheme(scheme)
for testName, testCase := range testCases { for testName, testCase := range testCases {
@ -210,7 +209,7 @@ func TestEmbeddedConfiguration(t *testing.T) {
for desc, test := range testCases { for desc, test := range testCases {
scheme := runtime.NewScheme() scheme := runtime.NewScheme()
apiserverapi.AddToScheme(scheme) apiserver.AddToScheme(scheme)
apiserverapiv1alpha1.AddToScheme(scheme) apiserverapiv1alpha1.AddToScheme(scheme)
if err = ioutil.WriteFile(configFileName, []byte(test.ConfigBody), 0644); err != nil { if err = ioutil.WriteFile(configFileName, []byte(test.ConfigBody), 0644); err != nil {

View File

@ -32,7 +32,6 @@ import (
registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1" registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1"
corev1 "k8s.io/api/core/v1" corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/api/errors"
apierrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels" "k8s.io/apimachinery/pkg/labels"
"k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/runtime"
@ -381,7 +380,7 @@ func TestAdmit(t *testing.T) {
t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err) t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err)
} }
} }
if _, isStatusErr := err.(*apierrors.StatusError); err != nil && !isStatusErr { if _, isStatusErr := err.(*errors.StatusError); err != nil && !isStatusErr {
t.Errorf("%s: expected a StatusError, got %T", name, err) t.Errorf("%s: expected a StatusError, got %T", name, err)
} }
}) })

View File

@ -32,7 +32,6 @@ import (
registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1" registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1"
corev1 "k8s.io/api/core/v1" corev1 "k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/errors" "k8s.io/apimachinery/pkg/api/errors"
apierrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels" "k8s.io/apimachinery/pkg/labels"
"k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/runtime"
@ -403,7 +402,7 @@ func TestValidate(t *testing.T) {
t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err) t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err)
} }
} }
if _, isStatusErr := err.(*apierrors.StatusError); err != nil && !isStatusErr { if _, isStatusErr := err.(*errors.StatusError); err != nil && !isStatusErr {
t.Errorf("%s: expected a StatusError, got %T", name, err) t.Errorf("%s: expected a StatusError, got %T", name, err)
} }
}) })

View File

@ -32,7 +32,6 @@ import (
"k8s.io/apimachinery/pkg/runtime/schema" "k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/apimachinery/pkg/types" "k8s.io/apimachinery/pkg/types"
utilnet "k8s.io/apimachinery/pkg/util/net" utilnet "k8s.io/apimachinery/pkg/util/net"
"k8s.io/apiserver/pkg/apis/audit"
auditinternal "k8s.io/apiserver/pkg/apis/audit" auditinternal "k8s.io/apiserver/pkg/apis/audit"
"k8s.io/apiserver/pkg/authentication/user" "k8s.io/apiserver/pkg/authentication/user"
"k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/apiserver/pkg/authorization/authorizer"
@ -88,7 +87,7 @@ func NewEventFromRequest(req *http.Request, level auditinternal.Level, attribs a
// LogImpersonatedUser fills in the impersonated user attributes into an audit event. // LogImpersonatedUser fills in the impersonated user attributes into an audit event.
func LogImpersonatedUser(ae *auditinternal.Event, user user.Info) { func LogImpersonatedUser(ae *auditinternal.Event, user user.Info) {
if ae == nil || ae.Level.Less(audit.LevelMetadata) { if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) {
return return
} }
ae.ImpersonatedUser = &auditinternal.UserInfo{ ae.ImpersonatedUser = &auditinternal.UserInfo{
@ -104,14 +103,14 @@ func LogImpersonatedUser(ae *auditinternal.Event, user user.Info) {
// LogRequestObject fills in the request object into an audit event. The passed runtime.Object // LogRequestObject fills in the request object into an audit event. The passed runtime.Object
// will be converted to the given gv. // will be converted to the given gv.
func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersionResource, subresource string, s runtime.NegotiatedSerializer) { func LogRequestObject(ae *auditinternal.Event, obj runtime.Object, gvr schema.GroupVersionResource, subresource string, s runtime.NegotiatedSerializer) {
if ae == nil || ae.Level.Less(audit.LevelMetadata) { if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) {
return return
} }
// complete ObjectRef // complete ObjectRef
if ae.ObjectRef == nil { if ae.ObjectRef == nil {
ae.ObjectRef = &audit.ObjectReference{} ae.ObjectRef = &auditinternal.ObjectReference{}
} }
if acc, ok := obj.(metav1.ObjectMetaAccessor); ok { if acc, ok := obj.(metav1.ObjectMetaAccessor); ok {
meta := acc.GetObjectMeta() meta := acc.GetObjectMeta()
@ -140,7 +139,7 @@ func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersi
ae.ObjectRef.Subresource = subresource ae.ObjectRef.Subresource = subresource
} }
if ae.Level.Less(audit.LevelRequest) { if ae.Level.Less(auditinternal.LevelRequest) {
return return
} }
@ -155,8 +154,8 @@ func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersi
} }
// LogRquestPatch fills in the given patch as the request object into an audit event. // LogRquestPatch fills in the given patch as the request object into an audit event.
func LogRequestPatch(ae *audit.Event, patch []byte) { func LogRequestPatch(ae *auditinternal.Event, patch []byte) {
if ae == nil || ae.Level.Less(audit.LevelRequest) { if ae == nil || ae.Level.Less(auditinternal.LevelRequest) {
return return
} }
@ -168,15 +167,15 @@ func LogRequestPatch(ae *audit.Event, patch []byte) {
// LogResponseObject fills in the response object into an audit event. The passed runtime.Object // LogResponseObject fills in the response object into an audit event. The passed runtime.Object
// will be converted to the given gv. // will be converted to the given gv.
func LogResponseObject(ae *audit.Event, obj runtime.Object, gv schema.GroupVersion, s runtime.NegotiatedSerializer) { func LogResponseObject(ae *auditinternal.Event, obj runtime.Object, gv schema.GroupVersion, s runtime.NegotiatedSerializer) {
if ae == nil || ae.Level.Less(audit.LevelMetadata) { if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) {
return return
} }
if status, ok := obj.(*metav1.Status); ok { if status, ok := obj.(*metav1.Status); ok {
ae.ResponseStatus = status ae.ResponseStatus = status
} }
if ae.Level.Less(audit.LevelRequestResponse) { if ae.Level.Less(auditinternal.LevelRequestResponse) {
return return
} }
// TODO(audit): hook into the serializer to avoid double conversion // TODO(audit): hook into the serializer to avoid double conversion

View File

@ -29,7 +29,6 @@ import (
"k8s.io/apimachinery/pkg/runtime/schema" "k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/apiserver/pkg/authentication/authenticator" "k8s.io/apiserver/pkg/authentication/authenticator"
"k8s.io/apiserver/pkg/endpoints/handlers/responsewriters" "k8s.io/apiserver/pkg/endpoints/handlers/responsewriters"
"k8s.io/apiserver/pkg/endpoints/request"
genericapirequest "k8s.io/apiserver/pkg/endpoints/request" genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
) )
@ -82,7 +81,7 @@ func WithAuthentication(handler http.Handler, mapper genericapirequest.RequestCo
) )
} }
func Unauthorized(requestContextMapper request.RequestContextMapper, s runtime.NegotiatedSerializer, supportsBasicAuth bool) http.Handler { func Unauthorized(requestContextMapper genericapirequest.RequestContextMapper, s runtime.NegotiatedSerializer, supportsBasicAuth bool) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
if supportsBasicAuth { if supportsBasicAuth {
w.Header().Set("WWW-Authenticate", `Basic realm="kubernetes-master"`) w.Header().Set("WWW-Authenticate", `Basic realm="kubernetes-master"`)
@ -92,7 +91,7 @@ func Unauthorized(requestContextMapper request.RequestContextMapper, s runtime.N
responsewriters.InternalError(w, req, errors.New("no context found for request")) responsewriters.InternalError(w, req, errors.New("no context found for request"))
return return
} }
requestInfo, found := request.RequestInfoFrom(ctx) requestInfo, found := genericapirequest.RequestInfoFrom(ctx)
if !found { if !found {
responsewriters.InternalError(w, req, errors.New("no RequestInfo found in the context")) responsewriters.InternalError(w, req, errors.New("no RequestInfo found in the context"))
return return

View File

@ -37,7 +37,6 @@ import (
"k8s.io/apimachinery/pkg/util/sets" "k8s.io/apimachinery/pkg/util/sets"
"k8s.io/apimachinery/pkg/util/validation/field" "k8s.io/apimachinery/pkg/util/validation/field"
"k8s.io/apimachinery/pkg/watch" "k8s.io/apimachinery/pkg/watch"
"k8s.io/apiserver/pkg/endpoints/request"
genericapirequest "k8s.io/apiserver/pkg/endpoints/request" genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
"k8s.io/apiserver/pkg/registry/generic" "k8s.io/apiserver/pkg/registry/generic"
"k8s.io/apiserver/pkg/registry/rest" "k8s.io/apiserver/pkg/registry/rest"
@ -681,7 +680,7 @@ func (e *Store) Get(ctx genericapirequest.Context, name string, options *metav1.
// qualifiedResourceFromContext attempts to retrieve a GroupResource from the context's request info. // qualifiedResourceFromContext attempts to retrieve a GroupResource from the context's request info.
// If the context has no request info, DefaultQualifiedResource is used. // If the context has no request info, DefaultQualifiedResource is used.
func (e *Store) qualifiedResourceFromContext(ctx genericapirequest.Context) schema.GroupResource { func (e *Store) qualifiedResourceFromContext(ctx genericapirequest.Context) schema.GroupResource {
if info, ok := request.RequestInfoFrom(ctx); ok { if info, ok := genericapirequest.RequestInfoFrom(ctx); ok {
return schema.GroupResource{Group: info.APIGroup, Resource: info.Resource} return schema.GroupResource{Group: info.APIGroup, Resource: info.Resource}
} }
// some implementations access storage directly and thus the context has no RequestInfo // some implementations access storage directly and thus the context has no RequestInfo

View File

@ -43,7 +43,6 @@ import (
"k8s.io/apimachinery/pkg/watch" "k8s.io/apimachinery/pkg/watch"
"k8s.io/apiserver/pkg/apis/example" "k8s.io/apiserver/pkg/apis/example"
examplev1 "k8s.io/apiserver/pkg/apis/example/v1" examplev1 "k8s.io/apiserver/pkg/apis/example/v1"
"k8s.io/apiserver/pkg/endpoints/request"
genericapirequest "k8s.io/apiserver/pkg/endpoints/request" genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
"k8s.io/apiserver/pkg/features" "k8s.io/apiserver/pkg/features"
"k8s.io/apiserver/pkg/registry/generic" "k8s.io/apiserver/pkg/registry/generic"
@ -1920,8 +1919,8 @@ func TestFinalizeDelete(t *testing.T) {
} }
} }
func fakeRequestInfo(resource, apiGroup string) *request.RequestInfo { func fakeRequestInfo(resource, apiGroup string) *genericapirequest.RequestInfo {
return &request.RequestInfo{ return &genericapirequest.RequestInfo{
IsResourceRequest: true, IsResourceRequest: true,
Path: "/api/v1/test", Path: "/api/v1/test",
Verb: "test", Verb: "test",

View File

@ -34,7 +34,6 @@ import (
"k8s.io/apiserver/pkg/endpoints/handlers/responsewriters" "k8s.io/apiserver/pkg/endpoints/handlers/responsewriters"
"k8s.io/apiserver/pkg/endpoints/request" "k8s.io/apiserver/pkg/endpoints/request"
"k8s.io/apiserver/pkg/server/mux" "k8s.io/apiserver/pkg/server/mux"
genericmux "k8s.io/apiserver/pkg/server/mux"
) )
// APIServerHandlers holds the different http.Handlers used by the API server. // APIServerHandlers holds the different http.Handlers used by the API server.
@ -74,7 +73,7 @@ type APIServerHandler struct {
type HandlerChainBuilderFn func(apiHandler http.Handler) http.Handler type HandlerChainBuilderFn func(apiHandler http.Handler) http.Handler
func NewAPIServerHandler(name string, contextMapper request.RequestContextMapper, s runtime.NegotiatedSerializer, handlerChainBuilder HandlerChainBuilderFn, notFoundHandler http.Handler) *APIServerHandler { func NewAPIServerHandler(name string, contextMapper request.RequestContextMapper, s runtime.NegotiatedSerializer, handlerChainBuilder HandlerChainBuilderFn, notFoundHandler http.Handler) *APIServerHandler {
nonGoRestfulMux := genericmux.NewPathRecorderMux(name) nonGoRestfulMux := mux.NewPathRecorderMux(name)
if notFoundHandler != nil { if notFoundHandler != nil {
nonGoRestfulMux.NotFoundHandler(notFoundHandler) nonGoRestfulMux.NotFoundHandler(notFoundHandler)
} }

View File

@ -26,7 +26,6 @@ import (
"k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema" "k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/apimachinery/pkg/runtime/serializer" "k8s.io/apimachinery/pkg/runtime/serializer"
runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer"
"k8s.io/apimachinery/pkg/util/net" "k8s.io/apimachinery/pkg/util/net"
"k8s.io/apimachinery/pkg/util/wait" "k8s.io/apimachinery/pkg/util/wait"
"k8s.io/client-go/rest" "k8s.io/client-go/rest"
@ -71,7 +70,7 @@ func newGenericWebhook(registry *registered.APIRegistrationManager, codecFactory
clientConfig.Timeout = requestTimeout clientConfig.Timeout = requestTimeout
codec := codecFactory.LegacyCodec(groupVersions...) codec := codecFactory.LegacyCodec(groupVersions...)
clientConfig.ContentConfig.NegotiatedSerializer = runtimeserializer.NegotiatedSerializerWrapper(runtime.SerializerInfo{Serializer: codec}) clientConfig.ContentConfig.NegotiatedSerializer = serializer.NegotiatedSerializerWrapper(runtime.SerializerInfo{Serializer: codec})
restClient, err := rest.UnversionedRESTClientFor(clientConfig) restClient, err := rest.UnversionedRESTClientFor(clientConfig)
if err != nil { if err != nil {