remove duplicated import
Kubernetes-commit: 4e7398b67b12390486012dd6f9d708dd64f961f3
This commit is contained in:
parent
7e24d2baad
commit
2a2505e824
|
|
@ -25,7 +25,6 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/util/json"
|
"k8s.io/apimachinery/pkg/util/json"
|
||||||
"k8s.io/apiserver/pkg/apis/apiserver"
|
"k8s.io/apiserver/pkg/apis/apiserver"
|
||||||
apiserverapi "k8s.io/apiserver/pkg/apis/apiserver"
|
|
||||||
apiserverapiv1alpha1 "k8s.io/apiserver/pkg/apis/apiserver/v1alpha1"
|
apiserverapiv1alpha1 "k8s.io/apiserver/pkg/apis/apiserver/v1alpha1"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
@ -138,7 +137,7 @@ func TestReadAdmissionConfiguration(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
scheme := runtime.NewScheme()
|
scheme := runtime.NewScheme()
|
||||||
apiserverapi.AddToScheme(scheme)
|
apiserver.AddToScheme(scheme)
|
||||||
apiserverapiv1alpha1.AddToScheme(scheme)
|
apiserverapiv1alpha1.AddToScheme(scheme)
|
||||||
|
|
||||||
for testName, testCase := range testCases {
|
for testName, testCase := range testCases {
|
||||||
|
|
@ -210,7 +209,7 @@ func TestEmbeddedConfiguration(t *testing.T) {
|
||||||
|
|
||||||
for desc, test := range testCases {
|
for desc, test := range testCases {
|
||||||
scheme := runtime.NewScheme()
|
scheme := runtime.NewScheme()
|
||||||
apiserverapi.AddToScheme(scheme)
|
apiserver.AddToScheme(scheme)
|
||||||
apiserverapiv1alpha1.AddToScheme(scheme)
|
apiserverapiv1alpha1.AddToScheme(scheme)
|
||||||
|
|
||||||
if err = ioutil.WriteFile(configFileName, []byte(test.ConfigBody), 0644); err != nil {
|
if err = ioutil.WriteFile(configFileName, []byte(test.ConfigBody), 0644); err != nil {
|
||||||
|
|
|
||||||
|
|
@ -32,7 +32,6 @@ import (
|
||||||
registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1"
|
registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1"
|
||||||
corev1 "k8s.io/api/core/v1"
|
corev1 "k8s.io/api/core/v1"
|
||||||
"k8s.io/apimachinery/pkg/api/errors"
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
|
@ -381,7 +380,7 @@ func TestAdmit(t *testing.T) {
|
||||||
t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err)
|
t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if _, isStatusErr := err.(*apierrors.StatusError); err != nil && !isStatusErr {
|
if _, isStatusErr := err.(*errors.StatusError); err != nil && !isStatusErr {
|
||||||
t.Errorf("%s: expected a StatusError, got %T", name, err)
|
t.Errorf("%s: expected a StatusError, got %T", name, err)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
|
||||||
|
|
@ -32,7 +32,6 @@ import (
|
||||||
registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1"
|
registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1"
|
||||||
corev1 "k8s.io/api/core/v1"
|
corev1 "k8s.io/api/core/v1"
|
||||||
"k8s.io/apimachinery/pkg/api/errors"
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
||||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
"k8s.io/apimachinery/pkg/labels"
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
|
@ -403,7 +402,7 @@ func TestValidate(t *testing.T) {
|
||||||
t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err)
|
t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if _, isStatusErr := err.(*apierrors.StatusError); err != nil && !isStatusErr {
|
if _, isStatusErr := err.(*errors.StatusError); err != nil && !isStatusErr {
|
||||||
t.Errorf("%s: expected a StatusError, got %T", name, err)
|
t.Errorf("%s: expected a StatusError, got %T", name, err)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
|
||||||
|
|
@ -32,7 +32,6 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apimachinery/pkg/types"
|
"k8s.io/apimachinery/pkg/types"
|
||||||
utilnet "k8s.io/apimachinery/pkg/util/net"
|
utilnet "k8s.io/apimachinery/pkg/util/net"
|
||||||
"k8s.io/apiserver/pkg/apis/audit"
|
|
||||||
auditinternal "k8s.io/apiserver/pkg/apis/audit"
|
auditinternal "k8s.io/apiserver/pkg/apis/audit"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/authorization/authorizer"
|
"k8s.io/apiserver/pkg/authorization/authorizer"
|
||||||
|
|
@ -88,7 +87,7 @@ func NewEventFromRequest(req *http.Request, level auditinternal.Level, attribs a
|
||||||
|
|
||||||
// LogImpersonatedUser fills in the impersonated user attributes into an audit event.
|
// LogImpersonatedUser fills in the impersonated user attributes into an audit event.
|
||||||
func LogImpersonatedUser(ae *auditinternal.Event, user user.Info) {
|
func LogImpersonatedUser(ae *auditinternal.Event, user user.Info) {
|
||||||
if ae == nil || ae.Level.Less(audit.LevelMetadata) {
|
if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
ae.ImpersonatedUser = &auditinternal.UserInfo{
|
ae.ImpersonatedUser = &auditinternal.UserInfo{
|
||||||
|
|
@ -104,14 +103,14 @@ func LogImpersonatedUser(ae *auditinternal.Event, user user.Info) {
|
||||||
|
|
||||||
// LogRequestObject fills in the request object into an audit event. The passed runtime.Object
|
// LogRequestObject fills in the request object into an audit event. The passed runtime.Object
|
||||||
// will be converted to the given gv.
|
// will be converted to the given gv.
|
||||||
func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersionResource, subresource string, s runtime.NegotiatedSerializer) {
|
func LogRequestObject(ae *auditinternal.Event, obj runtime.Object, gvr schema.GroupVersionResource, subresource string, s runtime.NegotiatedSerializer) {
|
||||||
if ae == nil || ae.Level.Less(audit.LevelMetadata) {
|
if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// complete ObjectRef
|
// complete ObjectRef
|
||||||
if ae.ObjectRef == nil {
|
if ae.ObjectRef == nil {
|
||||||
ae.ObjectRef = &audit.ObjectReference{}
|
ae.ObjectRef = &auditinternal.ObjectReference{}
|
||||||
}
|
}
|
||||||
if acc, ok := obj.(metav1.ObjectMetaAccessor); ok {
|
if acc, ok := obj.(metav1.ObjectMetaAccessor); ok {
|
||||||
meta := acc.GetObjectMeta()
|
meta := acc.GetObjectMeta()
|
||||||
|
|
@ -140,7 +139,7 @@ func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersi
|
||||||
ae.ObjectRef.Subresource = subresource
|
ae.ObjectRef.Subresource = subresource
|
||||||
}
|
}
|
||||||
|
|
||||||
if ae.Level.Less(audit.LevelRequest) {
|
if ae.Level.Less(auditinternal.LevelRequest) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -155,8 +154,8 @@ func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersi
|
||||||
}
|
}
|
||||||
|
|
||||||
// LogRquestPatch fills in the given patch as the request object into an audit event.
|
// LogRquestPatch fills in the given patch as the request object into an audit event.
|
||||||
func LogRequestPatch(ae *audit.Event, patch []byte) {
|
func LogRequestPatch(ae *auditinternal.Event, patch []byte) {
|
||||||
if ae == nil || ae.Level.Less(audit.LevelRequest) {
|
if ae == nil || ae.Level.Less(auditinternal.LevelRequest) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -168,15 +167,15 @@ func LogRequestPatch(ae *audit.Event, patch []byte) {
|
||||||
|
|
||||||
// LogResponseObject fills in the response object into an audit event. The passed runtime.Object
|
// LogResponseObject fills in the response object into an audit event. The passed runtime.Object
|
||||||
// will be converted to the given gv.
|
// will be converted to the given gv.
|
||||||
func LogResponseObject(ae *audit.Event, obj runtime.Object, gv schema.GroupVersion, s runtime.NegotiatedSerializer) {
|
func LogResponseObject(ae *auditinternal.Event, obj runtime.Object, gv schema.GroupVersion, s runtime.NegotiatedSerializer) {
|
||||||
if ae == nil || ae.Level.Less(audit.LevelMetadata) {
|
if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if status, ok := obj.(*metav1.Status); ok {
|
if status, ok := obj.(*metav1.Status); ok {
|
||||||
ae.ResponseStatus = status
|
ae.ResponseStatus = status
|
||||||
}
|
}
|
||||||
|
|
||||||
if ae.Level.Less(audit.LevelRequestResponse) {
|
if ae.Level.Less(auditinternal.LevelRequestResponse) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
// TODO(audit): hook into the serializer to avoid double conversion
|
// TODO(audit): hook into the serializer to avoid double conversion
|
||||||
|
|
|
||||||
|
|
@ -29,7 +29,6 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
"k8s.io/apiserver/pkg/endpoints/handlers/responsewriters"
|
"k8s.io/apiserver/pkg/endpoints/handlers/responsewriters"
|
||||||
"k8s.io/apiserver/pkg/endpoints/request"
|
|
||||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
@ -82,7 +81,7 @@ func WithAuthentication(handler http.Handler, mapper genericapirequest.RequestCo
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
func Unauthorized(requestContextMapper request.RequestContextMapper, s runtime.NegotiatedSerializer, supportsBasicAuth bool) http.Handler {
|
func Unauthorized(requestContextMapper genericapirequest.RequestContextMapper, s runtime.NegotiatedSerializer, supportsBasicAuth bool) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
|
||||||
if supportsBasicAuth {
|
if supportsBasicAuth {
|
||||||
w.Header().Set("WWW-Authenticate", `Basic realm="kubernetes-master"`)
|
w.Header().Set("WWW-Authenticate", `Basic realm="kubernetes-master"`)
|
||||||
|
|
@ -92,7 +91,7 @@ func Unauthorized(requestContextMapper request.RequestContextMapper, s runtime.N
|
||||||
responsewriters.InternalError(w, req, errors.New("no context found for request"))
|
responsewriters.InternalError(w, req, errors.New("no context found for request"))
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
requestInfo, found := request.RequestInfoFrom(ctx)
|
requestInfo, found := genericapirequest.RequestInfoFrom(ctx)
|
||||||
if !found {
|
if !found {
|
||||||
responsewriters.InternalError(w, req, errors.New("no RequestInfo found in the context"))
|
responsewriters.InternalError(w, req, errors.New("no RequestInfo found in the context"))
|
||||||
return
|
return
|
||||||
|
|
|
||||||
|
|
@ -37,7 +37,6 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/util/sets"
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
"k8s.io/apimachinery/pkg/util/validation/field"
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
||||||
"k8s.io/apimachinery/pkg/watch"
|
"k8s.io/apimachinery/pkg/watch"
|
||||||
"k8s.io/apiserver/pkg/endpoints/request"
|
|
||||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||||
"k8s.io/apiserver/pkg/registry/generic"
|
"k8s.io/apiserver/pkg/registry/generic"
|
||||||
"k8s.io/apiserver/pkg/registry/rest"
|
"k8s.io/apiserver/pkg/registry/rest"
|
||||||
|
|
@ -681,7 +680,7 @@ func (e *Store) Get(ctx genericapirequest.Context, name string, options *metav1.
|
||||||
// qualifiedResourceFromContext attempts to retrieve a GroupResource from the context's request info.
|
// qualifiedResourceFromContext attempts to retrieve a GroupResource from the context's request info.
|
||||||
// If the context has no request info, DefaultQualifiedResource is used.
|
// If the context has no request info, DefaultQualifiedResource is used.
|
||||||
func (e *Store) qualifiedResourceFromContext(ctx genericapirequest.Context) schema.GroupResource {
|
func (e *Store) qualifiedResourceFromContext(ctx genericapirequest.Context) schema.GroupResource {
|
||||||
if info, ok := request.RequestInfoFrom(ctx); ok {
|
if info, ok := genericapirequest.RequestInfoFrom(ctx); ok {
|
||||||
return schema.GroupResource{Group: info.APIGroup, Resource: info.Resource}
|
return schema.GroupResource{Group: info.APIGroup, Resource: info.Resource}
|
||||||
}
|
}
|
||||||
// some implementations access storage directly and thus the context has no RequestInfo
|
// some implementations access storage directly and thus the context has no RequestInfo
|
||||||
|
|
|
||||||
|
|
@ -43,7 +43,6 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/watch"
|
"k8s.io/apimachinery/pkg/watch"
|
||||||
"k8s.io/apiserver/pkg/apis/example"
|
"k8s.io/apiserver/pkg/apis/example"
|
||||||
examplev1 "k8s.io/apiserver/pkg/apis/example/v1"
|
examplev1 "k8s.io/apiserver/pkg/apis/example/v1"
|
||||||
"k8s.io/apiserver/pkg/endpoints/request"
|
|
||||||
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
genericapirequest "k8s.io/apiserver/pkg/endpoints/request"
|
||||||
"k8s.io/apiserver/pkg/features"
|
"k8s.io/apiserver/pkg/features"
|
||||||
"k8s.io/apiserver/pkg/registry/generic"
|
"k8s.io/apiserver/pkg/registry/generic"
|
||||||
|
|
@ -1920,8 +1919,8 @@ func TestFinalizeDelete(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func fakeRequestInfo(resource, apiGroup string) *request.RequestInfo {
|
func fakeRequestInfo(resource, apiGroup string) *genericapirequest.RequestInfo {
|
||||||
return &request.RequestInfo{
|
return &genericapirequest.RequestInfo{
|
||||||
IsResourceRequest: true,
|
IsResourceRequest: true,
|
||||||
Path: "/api/v1/test",
|
Path: "/api/v1/test",
|
||||||
Verb: "test",
|
Verb: "test",
|
||||||
|
|
|
||||||
|
|
@ -34,7 +34,6 @@ import (
|
||||||
"k8s.io/apiserver/pkg/endpoints/handlers/responsewriters"
|
"k8s.io/apiserver/pkg/endpoints/handlers/responsewriters"
|
||||||
"k8s.io/apiserver/pkg/endpoints/request"
|
"k8s.io/apiserver/pkg/endpoints/request"
|
||||||
"k8s.io/apiserver/pkg/server/mux"
|
"k8s.io/apiserver/pkg/server/mux"
|
||||||
genericmux "k8s.io/apiserver/pkg/server/mux"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// APIServerHandlers holds the different http.Handlers used by the API server.
|
// APIServerHandlers holds the different http.Handlers used by the API server.
|
||||||
|
|
@ -74,7 +73,7 @@ type APIServerHandler struct {
|
||||||
type HandlerChainBuilderFn func(apiHandler http.Handler) http.Handler
|
type HandlerChainBuilderFn func(apiHandler http.Handler) http.Handler
|
||||||
|
|
||||||
func NewAPIServerHandler(name string, contextMapper request.RequestContextMapper, s runtime.NegotiatedSerializer, handlerChainBuilder HandlerChainBuilderFn, notFoundHandler http.Handler) *APIServerHandler {
|
func NewAPIServerHandler(name string, contextMapper request.RequestContextMapper, s runtime.NegotiatedSerializer, handlerChainBuilder HandlerChainBuilderFn, notFoundHandler http.Handler) *APIServerHandler {
|
||||||
nonGoRestfulMux := genericmux.NewPathRecorderMux(name)
|
nonGoRestfulMux := mux.NewPathRecorderMux(name)
|
||||||
if notFoundHandler != nil {
|
if notFoundHandler != nil {
|
||||||
nonGoRestfulMux.NotFoundHandler(notFoundHandler)
|
nonGoRestfulMux.NotFoundHandler(notFoundHandler)
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -26,7 +26,6 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apimachinery/pkg/runtime/serializer"
|
"k8s.io/apimachinery/pkg/runtime/serializer"
|
||||||
runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer"
|
|
||||||
"k8s.io/apimachinery/pkg/util/net"
|
"k8s.io/apimachinery/pkg/util/net"
|
||||||
"k8s.io/apimachinery/pkg/util/wait"
|
"k8s.io/apimachinery/pkg/util/wait"
|
||||||
"k8s.io/client-go/rest"
|
"k8s.io/client-go/rest"
|
||||||
|
|
@ -71,7 +70,7 @@ func newGenericWebhook(registry *registered.APIRegistrationManager, codecFactory
|
||||||
clientConfig.Timeout = requestTimeout
|
clientConfig.Timeout = requestTimeout
|
||||||
|
|
||||||
codec := codecFactory.LegacyCodec(groupVersions...)
|
codec := codecFactory.LegacyCodec(groupVersions...)
|
||||||
clientConfig.ContentConfig.NegotiatedSerializer = runtimeserializer.NegotiatedSerializerWrapper(runtime.SerializerInfo{Serializer: codec})
|
clientConfig.ContentConfig.NegotiatedSerializer = serializer.NegotiatedSerializerWrapper(runtime.SerializerInfo{Serializer: codec})
|
||||||
|
|
||||||
restClient, err := rest.UnversionedRESTClientFor(clientConfig)
|
restClient, err := rest.UnversionedRESTClientFor(clientConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue