Skip to content

Commit 5268f69

Browse files
danielqsjk8s-ci-robot
authored andcommitted
fix duplicated imports of k8s code (kubernetes#77484)
* fix duplicated imports of api/core/v1 * fix duplicated imports of client-go/kubernetes * fix duplicated imports of rest code * change import name to more reasonable
1 parent f7d92fb commit 5268f69

File tree

35 files changed

+116
-156
lines changed

35 files changed

+116
-156
lines changed

cmd/kubeadm/app/phases/addons/dns/dns_test.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@ import (
2525
apierrors "k8s.io/apimachinery/pkg/api/errors"
2626
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
2727
"k8s.io/apimachinery/pkg/runtime"
28-
kuberuntime "k8s.io/apimachinery/pkg/runtime"
2928
clientsetfake "k8s.io/client-go/kubernetes/fake"
3029
clientsetscheme "k8s.io/client-go/kubernetes/scheme"
3130
core "k8s.io/client-go/testing"
@@ -580,7 +579,7 @@ func TestDeploymentsHaveSystemClusterCriticalPriorityClassName(t *testing.T) {
580579
t.Run(testCase.name, func(t *testing.T) {
581580
deploymentBytes, _ := kubeadmutil.ParseTemplate(testCase.manifest, testCase.data)
582581
deployment := &apps.Deployment{}
583-
if err := kuberuntime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), deploymentBytes, deployment); err != nil {
582+
if err := runtime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), deploymentBytes, deployment); err != nil {
584583
t.Errorf("unexpected error: %v", err)
585584
}
586585
if deployment.Spec.Template.Spec.PriorityClassName != "system-cluster-critical" {

cmd/kubeadm/app/phases/addons/proxy/proxy_test.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@ import (
2525
apierrors "k8s.io/apimachinery/pkg/api/errors"
2626
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
2727
"k8s.io/apimachinery/pkg/runtime"
28-
kuberuntime "k8s.io/apimachinery/pkg/runtime"
2928
clientsetfake "k8s.io/client-go/kubernetes/fake"
3029
clientsetscheme "k8s.io/client-go/kubernetes/scheme"
3130
core "k8s.io/client-go/testing"
@@ -278,7 +277,7 @@ func TestDaemonSetsHaveSystemNodeCriticalPriorityClassName(t *testing.T) {
278277
t.Run(testCase.name, func(t *testing.T) {
279278
daemonSetBytes, _ := kubeadmutil.ParseTemplate(testCase.manifest, testCase.data)
280279
daemonSet := &apps.DaemonSet{}
281-
if err := kuberuntime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), daemonSetBytes, daemonSet); err != nil {
280+
if err := runtime.DecodeInto(clientsetscheme.Codecs.UniversalDecoder(), daemonSetBytes, daemonSet); err != nil {
282281
t.Errorf("unexpected error: %v", err)
283282
}
284283
if daemonSet.Spec.Template.Spec.PriorityClassName != "system-node-critical" {

cmd/kubeadm/app/phases/upgrade/compute_test.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,6 @@ import (
2727
apps "k8s.io/api/apps/v1"
2828
v1 "k8s.io/api/core/v1"
2929
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
30-
"k8s.io/apimachinery/pkg/util/version"
3130
versionutil "k8s.io/apimachinery/pkg/util/version"
3231
clientsetfake "k8s.io/client-go/kubernetes/fake"
3332
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
@@ -122,7 +121,7 @@ func (f fakeEtcdClient) RemoveMember(id uint64) ([]etcdutil.Member, error) {
122121
return []etcdutil.Member{}, nil
123122
}
124123

125-
func getEtcdVersion(v *version.Version) string {
124+
func getEtcdVersion(v *versionutil.Version) string {
126125
return constants.SupportedEtcdVersion[uint8(v.Minor())]
127126
}
128127

cmd/kubeadm/app/util/apiclient/wait.go

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@ import (
3030
netutil "k8s.io/apimachinery/pkg/util/net"
3131
"k8s.io/apimachinery/pkg/util/wait"
3232
clientset "k8s.io/client-go/kubernetes"
33-
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
3433
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
3534
kubetypes "k8s.io/kubernetes/pkg/kubelet/types"
3635
)
@@ -77,7 +76,7 @@ func NewKubeWaiter(client clientset.Interface, timeout time.Duration, writer io.
7776
// WaitForAPI waits for the API Server's /healthz endpoint to report "ok"
7877
func (w *KubeWaiter) WaitForAPI() error {
7978
start := time.Now()
80-
return wait.PollImmediate(constants.APICallRetryInterval, w.timeout, func() (bool, error) {
79+
return wait.PollImmediate(kubeadmconstants.APICallRetryInterval, w.timeout, func() (bool, error) {
8180
healthStatus := 0
8281
w.client.Discovery().RESTClient().Get().AbsPath("/healthz").Do().StatusCode(&healthStatus)
8382
if healthStatus != http.StatusOK {
@@ -94,7 +93,7 @@ func (w *KubeWaiter) WaitForAPI() error {
9493
func (w *KubeWaiter) WaitForPodsWithLabel(kvLabel string) error {
9594

9695
lastKnownPodNumber := -1
97-
return wait.PollImmediate(constants.APICallRetryInterval, w.timeout, func() (bool, error) {
96+
return wait.PollImmediate(kubeadmconstants.APICallRetryInterval, w.timeout, func() (bool, error) {
9897
listOpts := metav1.ListOptions{LabelSelector: kvLabel}
9998
pods, err := w.client.CoreV1().Pods(metav1.NamespaceSystem).List(listOpts)
10099
if err != nil {
@@ -123,7 +122,7 @@ func (w *KubeWaiter) WaitForPodsWithLabel(kvLabel string) error {
123122

124123
// WaitForPodToDisappear blocks until it timeouts or gets a "NotFound" response from the API Server when getting the Static Pod in question
125124
func (w *KubeWaiter) WaitForPodToDisappear(podName string) error {
126-
return wait.PollImmediate(constants.APICallRetryInterval, w.timeout, func() (bool, error) {
125+
return wait.PollImmediate(kubeadmconstants.APICallRetryInterval, w.timeout, func() (bool, error) {
127126
_, err := w.client.CoreV1().Pods(metav1.NamespaceSystem).Get(podName, metav1.GetOptions{})
128127
if apierrors.IsNotFound(err) {
129128
fmt.Printf("[apiclient] The old Pod %q is now removed (which is desired)\n", podName)
@@ -187,8 +186,8 @@ func (w *KubeWaiter) WaitForStaticPodControlPlaneHashes(nodeName string) (map[st
187186
componentHash := ""
188187
var err error
189188
mirrorPodHashes := map[string]string{}
190-
for _, component := range constants.ControlPlaneComponents {
191-
err = wait.PollImmediate(constants.APICallRetryInterval, w.timeout, func() (bool, error) {
189+
for _, component := range kubeadmconstants.ControlPlaneComponents {
190+
err = wait.PollImmediate(kubeadmconstants.APICallRetryInterval, w.timeout, func() (bool, error) {
192191
componentHash, err = getStaticPodSingleHash(w.client, nodeName, component)
193192
if err != nil {
194193
return false, nil
@@ -209,7 +208,7 @@ func (w *KubeWaiter) WaitForStaticPodSingleHash(nodeName string, component strin
209208

210209
componentPodHash := ""
211210
var err error
212-
err = wait.PollImmediate(constants.APICallRetryInterval, w.timeout, func() (bool, error) {
211+
err = wait.PollImmediate(kubeadmconstants.APICallRetryInterval, w.timeout, func() (bool, error) {
213212
componentPodHash, err = getStaticPodSingleHash(w.client, nodeName, component)
214213
if err != nil {
215214
return false, nil
@@ -223,7 +222,7 @@ func (w *KubeWaiter) WaitForStaticPodSingleHash(nodeName string, component strin
223222
// WaitForStaticPodHashChange blocks until it timeouts or notices that the Mirror Pod (for the Static Pod, respectively) has changed
224223
// This implicitly means this function blocks until the kubelet has restarted the Static Pod in question
225224
func (w *KubeWaiter) WaitForStaticPodHashChange(nodeName, component, previousHash string) error {
226-
return wait.PollImmediate(constants.APICallRetryInterval, w.timeout, func() (bool, error) {
225+
return wait.PollImmediate(kubeadmconstants.APICallRetryInterval, w.timeout, func() (bool, error) {
227226

228227
hash, err := getStaticPodSingleHash(w.client, nodeName, component)
229228
if err != nil {

cmd/kubeadm/app/util/pkiutil/pki_helpers.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ package pkiutil
1919
import (
2020
"crypto"
2121
"crypto/ecdsa"
22-
"crypto/rand"
2322
cryptorand "crypto/rand"
2423
"crypto/rsa"
2524
"crypto/x509"
@@ -553,7 +552,7 @@ func NewPrivateKey() (crypto.Signer, error) {
553552

554553
// NewSignedCert creates a signed certificate using the given CA certificate and key
555554
func NewSignedCert(cfg *certutil.Config, key crypto.Signer, caCert *x509.Certificate, caKey crypto.Signer) (*x509.Certificate, error) {
556-
serial, err := rand.Int(rand.Reader, new(big.Int).SetInt64(math.MaxInt64))
555+
serial, err := cryptorand.Int(cryptorand.Reader, new(big.Int).SetInt64(math.MaxInt64))
557556
if err != nil {
558557
return nil, err
559558
}

pkg/api/testing/fuzzer.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@ import (
2525
v1 "k8s.io/api/core/v1"
2626
apitesting "k8s.io/apimachinery/pkg/api/apitesting"
2727
"k8s.io/apimachinery/pkg/api/apitesting/fuzzer"
28-
genericfuzzer "k8s.io/apimachinery/pkg/apis/meta/fuzzer"
2928
metafuzzer "k8s.io/apimachinery/pkg/apis/meta/fuzzer"
3029
"k8s.io/apimachinery/pkg/runtime"
3130
runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer"
@@ -92,7 +91,6 @@ func overrideGenericFuncs(codecs runtimeserializer.CodecFactory) []interface{} {
9291

9392
// FuzzerFuncs is a list of fuzzer functions
9493
var FuzzerFuncs = fuzzer.MergeFuzzerFuncs(
95-
genericfuzzer.Funcs,
9694
overrideGenericFuncs,
9795
corefuzzer.Funcs,
9896
extensionsfuzzer.Funcs,

pkg/apis/admissionregistration/validation/validation.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ import (
2323
genericvalidation "k8s.io/apimachinery/pkg/api/validation"
2424
metav1validation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
2525
"k8s.io/apimachinery/pkg/util/sets"
26-
"k8s.io/apimachinery/pkg/util/validation"
2726
utilvalidation "k8s.io/apimachinery/pkg/util/validation"
2827
"k8s.io/apimachinery/pkg/util/validation/field"
2928
"k8s.io/apiserver/pkg/util/webhook"
@@ -224,7 +223,7 @@ func validateMutatingWebhookConfiguration(e *admissionregistration.MutatingWebho
224223
func validateWebhook(hook *admissionregistration.Webhook, fldPath *field.Path) field.ErrorList {
225224
var allErrors field.ErrorList
226225
// hook.Name must be fully qualified
227-
allErrors = append(allErrors, validation.IsFullyQualifiedName(fldPath.Child("name"), hook.Name)...)
226+
allErrors = append(allErrors, utilvalidation.IsFullyQualifiedName(fldPath.Child("name"), hook.Name)...)
228227

229228
for i, rule := range hook.Rules {
230229
allErrors = append(allErrors, validateRuleWithOperations(&rule, fldPath.Child("rules").Index(i))...)

pkg/kubeapiserver/admission/config.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ import (
2626
utilwait "k8s.io/apimachinery/pkg/util/wait"
2727
"k8s.io/apiserver/pkg/admission"
2828
webhookinit "k8s.io/apiserver/pkg/admission/plugin/webhook/initializer"
29-
"k8s.io/apiserver/pkg/server"
3029
genericapiserver "k8s.io/apiserver/pkg/server"
3130
"k8s.io/apiserver/pkg/util/webhook"
3231
cacheddiscovery "k8s.io/client-go/discovery/cached/memory"
@@ -45,7 +44,7 @@ type Config struct {
4544
}
4645

4746
// New sets up the plugins and admission start hooks needed for admission
48-
func (c *Config) New(proxyTransport *http.Transport, serviceResolver webhook.ServiceResolver) ([]admission.PluginInitializer, server.PostStartHookFunc, error) {
47+
func (c *Config) New(proxyTransport *http.Transport, serviceResolver webhook.ServiceResolver) ([]admission.PluginInitializer, genericapiserver.PostStartHookFunc, error) {
4948
webhookAuthResolverWrapper := webhook.NewDefaultAuthenticationInfoResolverWrapper(proxyTransport, c.LoopbackClientConfig)
5049
webhookPluginInitializer := webhookinit.NewPluginInitializer(webhookAuthResolverWrapper, serviceResolver)
5150

pkg/kubectl/cmd/create/create_clusterrole_test.go

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@ import (
2121

2222
rbac "k8s.io/api/rbac/v1"
2323
"k8s.io/apimachinery/pkg/api/equality"
24-
"k8s.io/apimachinery/pkg/apis/meta/v1"
2524
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
2625
"k8s.io/apimachinery/pkg/runtime"
2726
"k8s.io/cli-runtime/pkg/genericclioptions"
@@ -51,8 +50,8 @@ func TestCreateClusterRole(t *testing.T) {
5150
verbs: "get,watch,list",
5251
resources: "pods,pods",
5352
expectedClusterRole: &rbac.ClusterRole{
54-
TypeMeta: v1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
55-
ObjectMeta: v1.ObjectMeta{
53+
TypeMeta: metav1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
54+
ObjectMeta: metav1.ObjectMeta{
5655
Name: clusterRoleName,
5756
},
5857
Rules: []rbac.PolicyRule{
@@ -69,8 +68,8 @@ func TestCreateClusterRole(t *testing.T) {
6968
verbs: "get,watch,list",
7069
resources: "pods,deployments.extensions",
7170
expectedClusterRole: &rbac.ClusterRole{
72-
TypeMeta: v1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
73-
ObjectMeta: v1.ObjectMeta{
71+
TypeMeta: metav1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
72+
ObjectMeta: metav1.ObjectMeta{
7473
Name: clusterRoleName,
7574
},
7675
Rules: []rbac.PolicyRule{
@@ -93,8 +92,8 @@ func TestCreateClusterRole(t *testing.T) {
9392
verbs: "get",
9493
nonResourceURL: "/logs/,/healthz",
9594
expectedClusterRole: &rbac.ClusterRole{
96-
TypeMeta: v1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
97-
ObjectMeta: v1.ObjectMeta{
95+
TypeMeta: metav1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
96+
ObjectMeta: metav1.ObjectMeta{
9897
Name: clusterRoleName,
9998
},
10099
Rules: []rbac.PolicyRule{
@@ -110,8 +109,8 @@ func TestCreateClusterRole(t *testing.T) {
110109
nonResourceURL: "/logs/,/healthz",
111110
resources: "pods",
112111
expectedClusterRole: &rbac.ClusterRole{
113-
TypeMeta: v1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
114-
ObjectMeta: v1.ObjectMeta{
112+
TypeMeta: metav1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
113+
ObjectMeta: metav1.ObjectMeta{
115114
Name: clusterRoleName,
116115
},
117116
Rules: []rbac.PolicyRule{
@@ -131,8 +130,8 @@ func TestCreateClusterRole(t *testing.T) {
131130
"test-aggregation-rules": {
132131
aggregationRule: "foo1=foo2,foo3=foo4",
133132
expectedClusterRole: &rbac.ClusterRole{
134-
TypeMeta: v1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
135-
ObjectMeta: v1.ObjectMeta{
133+
TypeMeta: metav1.TypeMeta{APIVersion: "rbac.authorization.k8s.io/v1", Kind: "ClusterRole"},
134+
ObjectMeta: metav1.ObjectMeta{
136135
Name: clusterRoleName,
137136
},
138137
AggregationRule: &rbac.AggregationRule{

pkg/kubectl/cmd/rollingupdate/rollingupdate.go

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ import (
2424
"github.com/spf13/cobra"
2525
"k8s.io/klog"
2626

27-
"k8s.io/api/core/v1"
2827
corev1 "k8s.io/api/core/v1"
2928
"k8s.io/apimachinery/pkg/api/errors"
3029
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -296,7 +295,7 @@ func (o *RollingUpdateOptions) Run() error {
296295
return fmt.Errorf("%s contains a %v not a ReplicationController", filename, infos[0].Object.GetObjectKind().GroupVersionKind())
297296
}
298297
switch t := uncastVersionedObj.(type) {
299-
case *v1.ReplicationController:
298+
case *corev1.ReplicationController:
300299
replicasDefaulted = t.Spec.Replicas == nil
301300
newRc = t
302301
}
@@ -310,7 +309,7 @@ func (o *RollingUpdateOptions) Run() error {
310309
// than the old rc. This selector is the hash of the rc, with a suffix to provide uniqueness for
311310
// same-image updates.
312311
if len(o.Image) != 0 {
313-
codec := scheme.Codecs.LegacyCodec(v1.SchemeGroupVersion)
312+
codec := scheme.Codecs.LegacyCodec(corev1.SchemeGroupVersion)
314313
newName := o.FindNewName(oldRc)
315314
if newRc, err = kubectl.LoadExistingNextReplicationController(coreClient, o.Namespace, newName); err != nil {
316315
return err

0 commit comments

Comments
 (0)