Merge pull request #58149 from CaoShuFeng/duplicated_import_2
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. remove duplicated import **Release note**: ```release-note NONE ``` Kubernetes-commit: 99fb21f61fc0e6c1fffc0d4b5138665806eadce6
This commit is contained in:
		
						commit
						3de2cd9dc7
					
				
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							|  | @ -25,7 +25,6 @@ import ( | |||
| 	"k8s.io/apimachinery/pkg/runtime" | ||||
| 	"k8s.io/apimachinery/pkg/util/json" | ||||
| 	"k8s.io/apiserver/pkg/apis/apiserver" | ||||
| 	apiserverapi "k8s.io/apiserver/pkg/apis/apiserver" | ||||
| 	apiserverapiv1alpha1 "k8s.io/apiserver/pkg/apis/apiserver/v1alpha1" | ||||
| ) | ||||
| 
 | ||||
|  | @ -138,7 +137,7 @@ func TestReadAdmissionConfiguration(t *testing.T) { | |||
| 	} | ||||
| 
 | ||||
| 	scheme := runtime.NewScheme() | ||||
| 	apiserverapi.AddToScheme(scheme) | ||||
| 	apiserver.AddToScheme(scheme) | ||||
| 	apiserverapiv1alpha1.AddToScheme(scheme) | ||||
| 
 | ||||
| 	for testName, testCase := range testCases { | ||||
|  | @ -210,7 +209,7 @@ func TestEmbeddedConfiguration(t *testing.T) { | |||
| 
 | ||||
| 	for desc, test := range testCases { | ||||
| 		scheme := runtime.NewScheme() | ||||
| 		apiserverapi.AddToScheme(scheme) | ||||
| 		apiserver.AddToScheme(scheme) | ||||
| 		apiserverapiv1alpha1.AddToScheme(scheme) | ||||
| 
 | ||||
| 		if err = ioutil.WriteFile(configFileName, []byte(test.ConfigBody), 0644); err != nil { | ||||
|  |  | |||
|  | @ -32,7 +32,6 @@ import ( | |||
| 	registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1" | ||||
| 	corev1 "k8s.io/api/core/v1" | ||||
| 	"k8s.io/apimachinery/pkg/api/errors" | ||||
| 	apierrors "k8s.io/apimachinery/pkg/api/errors" | ||||
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||||
| 	"k8s.io/apimachinery/pkg/labels" | ||||
| 	"k8s.io/apimachinery/pkg/runtime" | ||||
|  | @ -381,7 +380,7 @@ func TestAdmit(t *testing.T) { | |||
| 					t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err) | ||||
| 				} | ||||
| 			} | ||||
| 			if _, isStatusErr := err.(*apierrors.StatusError); err != nil && !isStatusErr { | ||||
| 			if _, isStatusErr := err.(*errors.StatusError); err != nil && !isStatusErr { | ||||
| 				t.Errorf("%s: expected a StatusError, got %T", name, err) | ||||
| 			} | ||||
| 		}) | ||||
|  |  | |||
|  | @ -32,7 +32,6 @@ import ( | |||
| 	registrationv1beta1 "k8s.io/api/admissionregistration/v1beta1" | ||||
| 	corev1 "k8s.io/api/core/v1" | ||||
| 	"k8s.io/apimachinery/pkg/api/errors" | ||||
| 	apierrors "k8s.io/apimachinery/pkg/api/errors" | ||||
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||||
| 	"k8s.io/apimachinery/pkg/labels" | ||||
| 	"k8s.io/apimachinery/pkg/runtime" | ||||
|  | @ -403,7 +402,7 @@ func TestValidate(t *testing.T) { | |||
| 					t.Errorf(" expected an error saying %q, but got %v", tt.errorContains, err) | ||||
| 				} | ||||
| 			} | ||||
| 			if _, isStatusErr := err.(*apierrors.StatusError); err != nil && !isStatusErr { | ||||
| 			if _, isStatusErr := err.(*errors.StatusError); err != nil && !isStatusErr { | ||||
| 				t.Errorf("%s: expected a StatusError, got %T", name, err) | ||||
| 			} | ||||
| 		}) | ||||
|  |  | |||
|  | @ -32,7 +32,6 @@ import ( | |||
| 	"k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	"k8s.io/apimachinery/pkg/types" | ||||
| 	utilnet "k8s.io/apimachinery/pkg/util/net" | ||||
| 	"k8s.io/apiserver/pkg/apis/audit" | ||||
| 	auditinternal "k8s.io/apiserver/pkg/apis/audit" | ||||
| 	"k8s.io/apiserver/pkg/authentication/user" | ||||
| 	"k8s.io/apiserver/pkg/authorization/authorizer" | ||||
|  | @ -88,7 +87,7 @@ func NewEventFromRequest(req *http.Request, level auditinternal.Level, attribs a | |||
| 
 | ||||
| // LogImpersonatedUser fills in the impersonated user attributes into an audit event.
 | ||||
| func LogImpersonatedUser(ae *auditinternal.Event, user user.Info) { | ||||
| 	if ae == nil || ae.Level.Less(audit.LevelMetadata) { | ||||
| 	if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) { | ||||
| 		return | ||||
| 	} | ||||
| 	ae.ImpersonatedUser = &auditinternal.UserInfo{ | ||||
|  | @ -104,14 +103,14 @@ func LogImpersonatedUser(ae *auditinternal.Event, user user.Info) { | |||
| 
 | ||||
| // LogRequestObject fills in the request object into an audit event. The passed runtime.Object
 | ||||
| // will be converted to the given gv.
 | ||||
| func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersionResource, subresource string, s runtime.NegotiatedSerializer) { | ||||
| 	if ae == nil || ae.Level.Less(audit.LevelMetadata) { | ||||
| func LogRequestObject(ae *auditinternal.Event, obj runtime.Object, gvr schema.GroupVersionResource, subresource string, s runtime.NegotiatedSerializer) { | ||||
| 	if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) { | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
| 	// complete ObjectRef
 | ||||
| 	if ae.ObjectRef == nil { | ||||
| 		ae.ObjectRef = &audit.ObjectReference{} | ||||
| 		ae.ObjectRef = &auditinternal.ObjectReference{} | ||||
| 	} | ||||
| 	if acc, ok := obj.(metav1.ObjectMetaAccessor); ok { | ||||
| 		meta := acc.GetObjectMeta() | ||||
|  | @ -140,7 +139,7 @@ func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersi | |||
| 		ae.ObjectRef.Subresource = subresource | ||||
| 	} | ||||
| 
 | ||||
| 	if ae.Level.Less(audit.LevelRequest) { | ||||
| 	if ae.Level.Less(auditinternal.LevelRequest) { | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
|  | @ -155,8 +154,8 @@ func LogRequestObject(ae *audit.Event, obj runtime.Object, gvr schema.GroupVersi | |||
| } | ||||
| 
 | ||||
| // LogRquestPatch fills in the given patch as the request object into an audit event.
 | ||||
| func LogRequestPatch(ae *audit.Event, patch []byte) { | ||||
| 	if ae == nil || ae.Level.Less(audit.LevelRequest) { | ||||
| func LogRequestPatch(ae *auditinternal.Event, patch []byte) { | ||||
| 	if ae == nil || ae.Level.Less(auditinternal.LevelRequest) { | ||||
| 		return | ||||
| 	} | ||||
| 
 | ||||
|  | @ -168,15 +167,15 @@ func LogRequestPatch(ae *audit.Event, patch []byte) { | |||
| 
 | ||||
| // LogResponseObject fills in the response object into an audit event. The passed runtime.Object
 | ||||
| // will be converted to the given gv.
 | ||||
| func LogResponseObject(ae *audit.Event, obj runtime.Object, gv schema.GroupVersion, s runtime.NegotiatedSerializer) { | ||||
| 	if ae == nil || ae.Level.Less(audit.LevelMetadata) { | ||||
| func LogResponseObject(ae *auditinternal.Event, obj runtime.Object, gv schema.GroupVersion, s runtime.NegotiatedSerializer) { | ||||
| 	if ae == nil || ae.Level.Less(auditinternal.LevelMetadata) { | ||||
| 		return | ||||
| 	} | ||||
| 	if status, ok := obj.(*metav1.Status); ok { | ||||
| 		ae.ResponseStatus = status | ||||
| 	} | ||||
| 
 | ||||
| 	if ae.Level.Less(audit.LevelRequestResponse) { | ||||
| 	if ae.Level.Less(auditinternal.LevelRequestResponse) { | ||||
| 		return | ||||
| 	} | ||||
| 	// TODO(audit): hook into the serializer to avoid double conversion
 | ||||
|  |  | |||
|  | @ -29,7 +29,6 @@ import ( | |||
| 	"k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	"k8s.io/apiserver/pkg/authentication/authenticator" | ||||
| 	"k8s.io/apiserver/pkg/endpoints/handlers/responsewriters" | ||||
| 	"k8s.io/apiserver/pkg/endpoints/request" | ||||
| 	genericapirequest "k8s.io/apiserver/pkg/endpoints/request" | ||||
| ) | ||||
| 
 | ||||
|  | @ -82,7 +81,7 @@ func WithAuthentication(handler http.Handler, mapper genericapirequest.RequestCo | |||
| 	) | ||||
| } | ||||
| 
 | ||||
| func Unauthorized(requestContextMapper request.RequestContextMapper, s runtime.NegotiatedSerializer, supportsBasicAuth bool) http.Handler { | ||||
| func Unauthorized(requestContextMapper genericapirequest.RequestContextMapper, s runtime.NegotiatedSerializer, supportsBasicAuth bool) http.Handler { | ||||
| 	return http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) { | ||||
| 		if supportsBasicAuth { | ||||
| 			w.Header().Set("WWW-Authenticate", `Basic realm="kubernetes-master"`) | ||||
|  | @ -92,7 +91,7 @@ func Unauthorized(requestContextMapper request.RequestContextMapper, s runtime.N | |||
| 			responsewriters.InternalError(w, req, errors.New("no context found for request")) | ||||
| 			return | ||||
| 		} | ||||
| 		requestInfo, found := request.RequestInfoFrom(ctx) | ||||
| 		requestInfo, found := genericapirequest.RequestInfoFrom(ctx) | ||||
| 		if !found { | ||||
| 			responsewriters.InternalError(w, req, errors.New("no RequestInfo found in the context")) | ||||
| 			return | ||||
|  |  | |||
|  | @ -37,7 +37,6 @@ import ( | |||
| 	"k8s.io/apimachinery/pkg/util/sets" | ||||
| 	"k8s.io/apimachinery/pkg/util/validation/field" | ||||
| 	"k8s.io/apimachinery/pkg/watch" | ||||
| 	"k8s.io/apiserver/pkg/endpoints/request" | ||||
| 	genericapirequest "k8s.io/apiserver/pkg/endpoints/request" | ||||
| 	"k8s.io/apiserver/pkg/registry/generic" | ||||
| 	"k8s.io/apiserver/pkg/registry/rest" | ||||
|  | @ -681,7 +680,7 @@ func (e *Store) Get(ctx genericapirequest.Context, name string, options *metav1. | |||
| // qualifiedResourceFromContext attempts to retrieve a GroupResource from the context's request info.
 | ||||
| // If the context has no request info, DefaultQualifiedResource is used.
 | ||||
| func (e *Store) qualifiedResourceFromContext(ctx genericapirequest.Context) schema.GroupResource { | ||||
| 	if info, ok := request.RequestInfoFrom(ctx); ok { | ||||
| 	if info, ok := genericapirequest.RequestInfoFrom(ctx); ok { | ||||
| 		return schema.GroupResource{Group: info.APIGroup, Resource: info.Resource} | ||||
| 	} | ||||
| 	// some implementations access storage directly and thus the context has no RequestInfo
 | ||||
|  |  | |||
|  | @ -43,7 +43,6 @@ import ( | |||
| 	"k8s.io/apimachinery/pkg/watch" | ||||
| 	"k8s.io/apiserver/pkg/apis/example" | ||||
| 	examplev1 "k8s.io/apiserver/pkg/apis/example/v1" | ||||
| 	"k8s.io/apiserver/pkg/endpoints/request" | ||||
| 	genericapirequest "k8s.io/apiserver/pkg/endpoints/request" | ||||
| 	"k8s.io/apiserver/pkg/features" | ||||
| 	"k8s.io/apiserver/pkg/registry/generic" | ||||
|  | @ -1920,8 +1919,8 @@ func TestFinalizeDelete(t *testing.T) { | |||
| 	} | ||||
| } | ||||
| 
 | ||||
| func fakeRequestInfo(resource, apiGroup string) *request.RequestInfo { | ||||
| 	return &request.RequestInfo{ | ||||
| func fakeRequestInfo(resource, apiGroup string) *genericapirequest.RequestInfo { | ||||
| 	return &genericapirequest.RequestInfo{ | ||||
| 		IsResourceRequest: true, | ||||
| 		Path:              "/api/v1/test", | ||||
| 		Verb:              "test", | ||||
|  |  | |||
|  | @ -34,7 +34,6 @@ import ( | |||
| 	"k8s.io/apiserver/pkg/endpoints/handlers/responsewriters" | ||||
| 	"k8s.io/apiserver/pkg/endpoints/request" | ||||
| 	"k8s.io/apiserver/pkg/server/mux" | ||||
| 	genericmux "k8s.io/apiserver/pkg/server/mux" | ||||
| ) | ||||
| 
 | ||||
| // APIServerHandlers holds the different http.Handlers used by the API server.
 | ||||
|  | @ -74,7 +73,7 @@ type APIServerHandler struct { | |||
| type HandlerChainBuilderFn func(apiHandler http.Handler) http.Handler | ||||
| 
 | ||||
| func NewAPIServerHandler(name string, contextMapper request.RequestContextMapper, s runtime.NegotiatedSerializer, handlerChainBuilder HandlerChainBuilderFn, notFoundHandler http.Handler) *APIServerHandler { | ||||
| 	nonGoRestfulMux := genericmux.NewPathRecorderMux(name) | ||||
| 	nonGoRestfulMux := mux.NewPathRecorderMux(name) | ||||
| 	if notFoundHandler != nil { | ||||
| 		nonGoRestfulMux.NotFoundHandler(notFoundHandler) | ||||
| 	} | ||||
|  |  | |||
|  | @ -26,7 +26,6 @@ import ( | |||
| 	"k8s.io/apimachinery/pkg/runtime" | ||||
| 	"k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	"k8s.io/apimachinery/pkg/runtime/serializer" | ||||
| 	runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer" | ||||
| 	"k8s.io/apimachinery/pkg/util/net" | ||||
| 	"k8s.io/apimachinery/pkg/util/wait" | ||||
| 	"k8s.io/client-go/rest" | ||||
|  | @ -71,7 +70,7 @@ func newGenericWebhook(registry *registered.APIRegistrationManager, codecFactory | |||
| 	clientConfig.Timeout = requestTimeout | ||||
| 
 | ||||
| 	codec := codecFactory.LegacyCodec(groupVersions...) | ||||
| 	clientConfig.ContentConfig.NegotiatedSerializer = runtimeserializer.NegotiatedSerializerWrapper(runtime.SerializerInfo{Serializer: codec}) | ||||
| 	clientConfig.ContentConfig.NegotiatedSerializer = serializer.NegotiatedSerializerWrapper(runtime.SerializerInfo{Serializer: codec}) | ||||
| 
 | ||||
| 	restClient, err := rest.UnversionedRESTClientFor(clientConfig) | ||||
| 	if err != nil { | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue