Skip to content

Commit 15e0e3e

Browse files
committed
rename
1 parent 1f0305f commit 15e0e3e

File tree

21 files changed

+68
-68
lines changed

21 files changed

+68
-68
lines changed

cmd/kube-apiserver/app/aggregator.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ import (
5050
informers "k8s.io/kube-aggregator/pkg/client/informers/externalversions/apiregistration/v1"
5151
"k8s.io/kube-aggregator/pkg/controllers/autoregister"
5252
"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
53-
"k8s.io/kubernetes/pkg/master/controller/crdregistration"
53+
"k8s.io/kubernetes/pkg/controlplane/controller/crdregistration"
5454
)
5555

5656
func createAggregatorConfig(

cmd/kube-apiserver/app/options/options.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ import (
3333
kubeoptions "k8s.io/kubernetes/pkg/kubeapiserver/options"
3434
kubeletclient "k8s.io/kubernetes/pkg/kubelet/client"
3535
"k8s.io/kubernetes/pkg/cluster/ports"
36-
"k8s.io/kubernetes/pkg/master/reconcilers"
36+
"k8s.io/kubernetes/pkg/controlplane/reconcilers"
3737
"k8s.io/kubernetes/pkg/serviceaccount"
3838
)
3939

cmd/kube-apiserver/app/options/options_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ import (
3838
kapi "k8s.io/kubernetes/pkg/apis/core"
3939
kubeoptions "k8s.io/kubernetes/pkg/kubeapiserver/options"
4040
kubeletclient "k8s.io/kubernetes/pkg/kubelet/client"
41-
"k8s.io/kubernetes/pkg/master/reconcilers"
41+
"k8s.io/kubernetes/pkg/controlplane/reconcilers"
4242
)
4343

4444
func TestAddFlags(t *testing.T) {

cmd/kube-apiserver/app/server.go

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -76,9 +76,9 @@ import (
7676
"k8s.io/kubernetes/pkg/kubeapiserver/authorizer/modes"
7777
kubeoptions "k8s.io/kubernetes/pkg/kubeapiserver/options"
7878
kubeserver "k8s.io/kubernetes/pkg/kubeapiserver/server"
79-
"k8s.io/kubernetes/pkg/master"
80-
"k8s.io/kubernetes/pkg/master/reconcilers"
81-
"k8s.io/kubernetes/pkg/master/tunneler"
79+
"k8s.io/kubernetes/pkg/controlplane"
80+
"k8s.io/kubernetes/pkg/controlplane/reconcilers"
81+
"k8s.io/kubernetes/pkg/controlplane/tunneler"
8282
rbacrest "k8s.io/kubernetes/pkg/registry/rbac/rest"
8383
"k8s.io/kubernetes/pkg/serviceaccount"
8484
)
@@ -225,7 +225,7 @@ func CreateServerChain(completedOptions completedServerRunOptions, stopCh <-chan
225225
}
226226

227227
// CreateKubeAPIServer creates and wires a workable kube-apiserver
228-
func CreateKubeAPIServer(kubeAPIServerConfig *master.Config, delegateAPIServer genericapiserver.DelegationTarget) (*master.Master, error) {
228+
func CreateKubeAPIServer(kubeAPIServerConfig *controlplane.Config, delegateAPIServer genericapiserver.DelegationTarget) (*controlplane.Master, error) {
229229
kubeAPIServer, err := kubeAPIServerConfig.Complete().New(delegateAPIServer)
230230
if err != nil {
231231
return nil, err
@@ -287,7 +287,7 @@ func CreateKubeAPIServerConfig(
287287
nodeTunneler tunneler.Tunneler,
288288
proxyTransport *http.Transport,
289289
) (
290-
*master.Config,
290+
*controlplane.Config,
291291
*genericapiserver.DeprecatedInsecureServingInfo,
292292
aggregatorapiserver.ServiceResolver,
293293
[]admission.PluginInitializer,
@@ -320,7 +320,7 @@ func CreateKubeAPIServerConfig(
320320

321321
s.Logs.Apply()
322322

323-
serviceIPRange, apiServerServiceIP, err := master.ServiceIPRange(s.PrimaryServiceClusterIPRange)
323+
serviceIPRange, apiServerServiceIP, err := controlplane.ServiceIPRange(s.PrimaryServiceClusterIPRange)
324324
if err != nil {
325325
return nil, nil, nil, nil, err
326326
}
@@ -329,15 +329,15 @@ func CreateKubeAPIServerConfig(
329329
var secondaryServiceIPRange net.IPNet
330330
// process secondary range only if provided by user
331331
if s.SecondaryServiceClusterIPRange.IP != nil {
332-
secondaryServiceIPRange, _, err = master.ServiceIPRange(s.SecondaryServiceClusterIPRange)
332+
secondaryServiceIPRange, _, err = controlplane.ServiceIPRange(s.SecondaryServiceClusterIPRange)
333333
if err != nil {
334334
return nil, nil, nil, nil, err
335335
}
336336
}
337337

338-
config := &master.Config{
338+
config := &controlplane.Config{
339339
GenericConfig: genericConfig,
340-
ExtraConfig: master.ExtraConfig{
340+
ExtraConfig: controlplane.ExtraConfig{
341341
APIResourceConfigSource: storageFactory.APIResourceConfigSource,
342342
StorageFactory: storageFactory,
343343
EventTTL: s.EventTTL,
@@ -442,7 +442,7 @@ func buildGenericConfig(
442442
lastErr error,
443443
) {
444444
genericConfig = genericapiserver.NewConfig(legacyscheme.Codecs)
445-
genericConfig.MergedResourceConfig = master.DefaultAPIResourceConfigSource()
445+
genericConfig.MergedResourceConfig = controlplane.DefaultAPIResourceConfigSource()
446446

447447
if lastErr = s.GenericServerRunOptions.ApplyTo(genericConfig); lastErr != nil {
448448
return
@@ -457,7 +457,7 @@ func buildGenericConfig(
457457
if lastErr = s.Features.ApplyTo(genericConfig); lastErr != nil {
458458
return
459459
}
460-
if lastErr = s.APIEnablement.ApplyTo(genericConfig, master.DefaultAPIResourceConfigSource(), legacyscheme.Scheme); lastErr != nil {
460+
if lastErr = s.APIEnablement.ApplyTo(genericConfig, controlplane.DefaultAPIResourceConfigSource(), legacyscheme.Scheme); lastErr != nil {
461461
return
462462
}
463463
if lastErr = s.EgressSelector.ApplyTo(genericConfig); lastErr != nil {
@@ -727,7 +727,7 @@ func getServiceIPAndRanges(serviceClusterIPRanges string) (net.IP, net.IPNet, ne
727727
// nothing provided by user, use default range (only applies to the Primary)
728728
if len(serviceClusterIPRangeList) == 0 {
729729
var primaryServiceClusterCIDR net.IPNet
730-
primaryServiceIPRange, apiServerServiceIP, err = master.ServiceIPRange(primaryServiceClusterCIDR)
730+
primaryServiceIPRange, apiServerServiceIP, err = controlplane.ServiceIPRange(primaryServiceClusterCIDR)
731731
if err != nil {
732732
return net.IP{}, net.IPNet{}, net.IPNet{}, fmt.Errorf("error determining service IP ranges: %v", err)
733733
}
@@ -740,7 +740,7 @@ func getServiceIPAndRanges(serviceClusterIPRanges string) (net.IP, net.IPNet, ne
740740
return net.IP{}, net.IPNet{}, net.IPNet{}, fmt.Errorf("service-cluster-ip-range[0] is not a valid cidr")
741741
}
742742

743-
primaryServiceIPRange, apiServerServiceIP, err = master.ServiceIPRange(*(primaryServiceClusterCIDR))
743+
primaryServiceIPRange, apiServerServiceIP, err = controlplane.ServiceIPRange(*(primaryServiceClusterCIDR))
744744
if err != nil {
745745
return net.IP{}, net.IPNet{}, net.IPNet{}, fmt.Errorf("error determining service IP ranges for primary service cidr: %v", err)
746746
}

pkg/controlplane/controller.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ import (
3434
corev1client "k8s.io/client-go/kubernetes/typed/core/v1"
3535
"k8s.io/client-go/rest"
3636
"k8s.io/klog/v2"
37-
"k8s.io/kubernetes/pkg/master/reconcilers"
37+
"k8s.io/kubernetes/pkg/controlplane/reconcilers"
3838
"k8s.io/kubernetes/pkg/registry/core/rangeallocation"
3939
corerest "k8s.io/kubernetes/pkg/registry/core/rest"
4040
servicecontroller "k8s.io/kubernetes/pkg/registry/core/service/ipallocator/controller"

pkg/controlplane/controller_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ import (
2727
"k8s.io/apimachinery/pkg/util/intstr"
2828
"k8s.io/client-go/kubernetes/fake"
2929
core "k8s.io/client-go/testing"
30-
"k8s.io/kubernetes/pkg/master/reconcilers"
30+
"k8s.io/kubernetes/pkg/controlplane/reconcilers"
3131
)
3232

3333
func TestReconcileEndpoints(t *testing.T) {

pkg/controlplane/doc.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ limitations under the License.
1616

1717
// Package master contains code for setting up and running a Kubernetes
1818
// cluster master.
19-
package controlplane // import "k8s.io/kubernetes/pkg/master"
19+
package controlplane // import "k8s.io/kubernetes/pkg/controlplane"

pkg/controlplane/master.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,9 +82,9 @@ import (
8282
"k8s.io/kubernetes/pkg/features"
8383
kubeoptions "k8s.io/kubernetes/pkg/kubeapiserver/options"
8484
kubeletclient "k8s.io/kubernetes/pkg/kubelet/client"
85-
"k8s.io/kubernetes/pkg/master/controller/clusterauthenticationtrust"
86-
"k8s.io/kubernetes/pkg/master/reconcilers"
87-
"k8s.io/kubernetes/pkg/master/tunneler"
85+
"k8s.io/kubernetes/pkg/controlplane/controller/clusterauthenticationtrust"
86+
"k8s.io/kubernetes/pkg/controlplane/reconcilers"
87+
"k8s.io/kubernetes/pkg/controlplane/tunneler"
8888
"k8s.io/kubernetes/pkg/routes"
8989
"k8s.io/kubernetes/pkg/serviceaccount"
9090
nodeutil "k8s.io/kubernetes/pkg/util/node"

pkg/controlplane/master_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ import (
5252
"k8s.io/kubernetes/pkg/apis/networking"
5353
apisstorage "k8s.io/kubernetes/pkg/apis/storage"
5454
kubeletclient "k8s.io/kubernetes/pkg/kubelet/client"
55-
"k8s.io/kubernetes/pkg/master/reconcilers"
56-
"k8s.io/kubernetes/pkg/master/storageversionhashdata"
55+
"k8s.io/kubernetes/pkg/controlplane/reconcilers"
56+
"k8s.io/kubernetes/pkg/controlplane/storageversionhashdata"
5757
certificatesrest "k8s.io/kubernetes/pkg/registry/certificates/rest"
5858
corerest "k8s.io/kubernetes/pkg/registry/core/rest"
5959
"k8s.io/kubernetes/pkg/registry/registrytest"

test/integration/apiserver/apiserver_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ import (
6262
featuregatetesting "k8s.io/component-base/featuregate/testing"
6363
"k8s.io/klog/v2"
6464

65-
"k8s.io/kubernetes/pkg/master"
65+
"k8s.io/kubernetes/pkg/controlplane"
6666
"k8s.io/kubernetes/test/integration"
6767
"k8s.io/kubernetes/test/integration/framework"
6868
)
@@ -82,7 +82,7 @@ func setupWithResources(t *testing.T, groupVersions []schema.GroupVersion, resou
8282
func setupWithResourcesWithOptions(t *testing.T, opts *framework.MasterConfigOptions, groupVersions []schema.GroupVersion, resources []schema.GroupVersionResource) (*httptest.Server, clientset.Interface, framework.CloseFunc) {
8383
masterConfig := framework.NewIntegrationTestMasterConfigWithOptions(opts)
8484
if len(groupVersions) > 0 || len(resources) > 0 {
85-
resourceConfig := master.DefaultAPIResourceConfigSource()
85+
resourceConfig := controlplane.DefaultAPIResourceConfigSource()
8686
resourceConfig.EnableVersions(groupVersions...)
8787
resourceConfig.EnableResources(resources...)
8888
masterConfig.ExtraConfig.APIResourceConfigSource = resourceConfig

0 commit comments

Comments
 (0)