diff --git a/pkg/client/tests/fake_client_test.go b/pkg/client/tests/fake_client_test.go index 27afc90cc6..66dea29605 100644 --- a/pkg/client/tests/fake_client_test.go +++ b/pkg/client/tests/fake_client_test.go @@ -37,7 +37,7 @@ func TestFakeClientSetFiltering(t *testing.T) { testSA("nsB", "sa-3"), ) - saList1, err := tc.Core().ServiceAccounts("nsA").List(metav1.ListOptions{}) + saList1, err := tc.CoreV1().ServiceAccounts("nsA").List(metav1.ListOptions{}) if err != nil { t.Fatalf("ServiceAccounts.List: %s", err) } @@ -50,7 +50,7 @@ func TestFakeClientSetFiltering(t *testing.T) { } } - saList2, err := tc.Core().ServiceAccounts("nsB").List(metav1.ListOptions{}) + saList2, err := tc.CoreV1().ServiceAccounts("nsB").List(metav1.ListOptions{}) if err != nil { t.Fatalf("ServiceAccounts.List: %s", err) } @@ -63,7 +63,7 @@ func TestFakeClientSetFiltering(t *testing.T) { } } - pod1, err := tc.Core().Pods("nsA").Get("pod-1", metav1.GetOptions{}) + pod1, err := tc.CoreV1().Pods("nsA").Get("pod-1", metav1.GetOptions{}) if err != nil { t.Fatalf("Pods.Get: %s", err) } @@ -74,12 +74,12 @@ func TestFakeClientSetFiltering(t *testing.T) { t.Fatalf("Expected to find pod nsA/pod-1t, got %s/%s", pod1.Namespace, pod1.Name) } - wrongPod, err := tc.Core().Pods("nsB").Get("pod-1", metav1.GetOptions{}) + wrongPod, err := tc.CoreV1().Pods("nsB").Get("pod-1", metav1.GetOptions{}) if err == nil { t.Fatalf("Pods.Get: expected nsB/pod-1 not to match, but it matched %s/%s", wrongPod.Namespace, wrongPod.Name) } - allPods, err := tc.Core().Pods(metav1.NamespaceAll).List(metav1.ListOptions{}) + allPods, err := tc.CoreV1().Pods(metav1.NamespaceAll).List(metav1.ListOptions{}) if err != nil { t.Fatalf("Pods.List: %s", err) } @@ -87,7 +87,7 @@ func TestFakeClientSetFiltering(t *testing.T) { t.Fatalf("Expected %d pods to match, got %d", expected, actual) } - allSAs, err := tc.Core().ServiceAccounts(metav1.NamespaceAll).List(metav1.ListOptions{}) + allSAs, err := tc.CoreV1().ServiceAccounts(metav1.NamespaceAll).List(metav1.ListOptions{}) if err != nil { t.Fatalf("ServiceAccounts.List: %s", err) } @@ -102,12 +102,12 @@ func TestFakeClientsetInheritsNamespace(t *testing.T) { testPod("nsA", "pod-1"), ) - _, err := tc.Core().Namespaces().Create(testNamespace("nsB")) + _, err := tc.CoreV1().Namespaces().Create(testNamespace("nsB")) if err != nil { t.Fatalf("Namespaces.Create: %s", err) } - allNS, err := tc.Core().Namespaces().List(metav1.ListOptions{}) + allNS, err := tc.CoreV1().Namespaces().List(metav1.ListOptions{}) if err != nil { t.Fatalf("Namespaces.List: %s", err) } @@ -115,12 +115,12 @@ func TestFakeClientsetInheritsNamespace(t *testing.T) { t.Fatalf("Expected %d namespaces to match, got %d", expected, actual) } - _, err = tc.Core().Pods("nsB").Create(testPod("", "pod-1")) + _, err = tc.CoreV1().Pods("nsB").Create(testPod("", "pod-1")) if err != nil { t.Fatalf("Pods.Create nsB/pod-1: %s", err) } - podB1, err := tc.Core().Pods("nsB").Get("pod-1", metav1.GetOptions{}) + podB1, err := tc.CoreV1().Pods("nsB").Get("pod-1", metav1.GetOptions{}) if err != nil { t.Fatalf("Pods.Get nsB/pod-1: %s", err) } @@ -131,17 +131,17 @@ func TestFakeClientsetInheritsNamespace(t *testing.T) { t.Fatalf("Expected to find pod nsB/pod-1t, got %s/%s", podB1.Namespace, podB1.Name) } - _, err = tc.Core().Pods("nsA").Create(testPod("", "pod-1")) + _, err = tc.CoreV1().Pods("nsA").Create(testPod("", "pod-1")) if err == nil { t.Fatalf("Expected Pods.Create to fail with already exists error") } - _, err = tc.Core().Pods("nsA").Update(testPod("", "pod-1")) + _, err = tc.CoreV1().Pods("nsA").Update(testPod("", "pod-1")) if err != nil { t.Fatalf("Pods.Update nsA/pod-1: %s", err) } - _, err = tc.Core().Pods("nsA").Create(testPod("nsB", "pod-2")) + _, err = tc.CoreV1().Pods("nsA").Create(testPod("nsB", "pod-2")) if err == nil { t.Fatalf("Expected Pods.Create to fail with bad request from namespace mismtach") } @@ -149,7 +149,7 @@ func TestFakeClientsetInheritsNamespace(t *testing.T) { t.Fatalf("Expected Pods.Create error to provide object and request namespaces, got %q", err) } - _, err = tc.Core().Pods("nsA").Update(testPod("", "pod-3")) + _, err = tc.CoreV1().Pods("nsA").Update(testPod("", "pod-3")) if err == nil { t.Fatalf("Expected Pods.Update nsA/pod-3 to fail with not found error") } diff --git a/pkg/client/tests/listwatch_test.go b/pkg/client/tests/listwatch_test.go index 6f0ec2c235..e1b1ba39f9 100644 --- a/pkg/client/tests/listwatch_test.go +++ b/pkg/client/tests/listwatch_test.go @@ -105,7 +105,7 @@ func TestListWatchesCanList(t *testing.T) { server := httptest.NewServer(&handler) defer server.Close() client := clientset.NewForConfigOrDie(&restclient.Config{Host: server.URL, ContentConfig: restclient.ContentConfig{GroupVersion: &schema.GroupVersion{Group: "", Version: "v1"}}}) - lw := NewListWatchFromClient(client.Core().RESTClient(), item.resource, item.namespace, item.fieldSelector) + lw := NewListWatchFromClient(client.CoreV1().RESTClient(), item.resource, item.namespace, item.fieldSelector) lw.DisableChunking = true // This test merely tests that the correct request is made. lw.List(metav1.ListOptions{}) @@ -172,7 +172,7 @@ func TestListWatchesCanWatch(t *testing.T) { server := httptest.NewServer(&handler) defer server.Close() client := clientset.NewForConfigOrDie(&restclient.Config{Host: server.URL, ContentConfig: restclient.ContentConfig{GroupVersion: &schema.GroupVersion{Group: "", Version: "v1"}}}) - lw := NewListWatchFromClient(client.Core().RESTClient(), item.resource, item.namespace, item.fieldSelector) + lw := NewListWatchFromClient(client.CoreV1().RESTClient(), item.resource, item.namespace, item.fieldSelector) // This test merely tests that the correct request is made. lw.Watch(metav1.ListOptions{ResourceVersion: item.rv}) handler.ValidateRequest(t, item.location, "GET", nil) diff --git a/test/images/nettest/BUILD b/test/images/nettest/BUILD index 39a51b0030..1182e4d3de 100644 --- a/test/images/nettest/BUILD +++ b/test/images/nettest/BUILD @@ -11,9 +11,9 @@ go_library( srcs = ["nettest.go"], importpath = "k8s.io/kubernetes/test/images/nettest", deps = [ - "//pkg/client/clientset_generated/internalclientset:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/util/sets:go_default_library", + "//staging/src/k8s.io/client-go/kubernetes:go_default_library", "//staging/src/k8s.io/client-go/rest:go_default_library", ], ) diff --git a/test/images/nettest/nettest.go b/test/images/nettest/nettest.go index 8336d7cfeb..e2f33f5565 100644 --- a/test/images/nettest/nettest.go +++ b/test/images/nettest/nettest.go @@ -46,8 +46,8 @@ import ( v1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/util/sets" + clientset "k8s.io/client-go/kubernetes" restclient "k8s.io/client-go/rest" - clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset" ) var ( @@ -270,7 +270,7 @@ func contactOthers(state *State) { //getWebserverEndpoints returns the webserver endpoints as a set of String, each in the format like "http://{ip}:{port}" func getWebserverEndpoints(client clientset.Interface) sets.String { - endpoints, err := client.Core().Endpoints(*namespace).Get(*service, v1.GetOptions{}) + endpoints, err := client.CoreV1().Endpoints(*namespace).Get(*service, v1.GetOptions{}) eps := sets.String{} if err != nil { state.Logf("Unable to read the endpoints for %v/%v: %v.", *namespace, *service, err) diff --git a/test/integration/auth/BUILD b/test/integration/auth/BUILD index 9d604cea96..82c8771d7d 100644 --- a/test/integration/auth/BUILD +++ b/test/integration/auth/BUILD @@ -24,15 +24,11 @@ go_test( "//cmd/kube-apiserver/app/testing:go_default_library", "//pkg/api/legacyscheme:go_default_library", "//pkg/api/testapi:go_default_library", - "//pkg/apis/authorization:go_default_library", "//pkg/apis/autoscaling:go_default_library", - "//pkg/apis/coordination:go_default_library", "//pkg/apis/core:go_default_library", "//pkg/apis/extensions:go_default_library", - "//pkg/apis/policy:go_default_library", - "//pkg/apis/rbac:go_default_library", + "//pkg/apis/rbac/v1:go_default_library", "//pkg/auth/authorizer/abac:go_default_library", - "//pkg/client/clientset_generated/internalclientset:go_default_library", "//pkg/controller:go_default_library", "//pkg/controller/serviceaccount:go_default_library", "//pkg/features:go_default_library", @@ -51,7 +47,11 @@ go_test( "//plugin/pkg/auth/authorizer/rbac:go_default_library", "//staging/src/k8s.io/api/authentication/v1:go_default_library", "//staging/src/k8s.io/api/authentication/v1beta1:go_default_library", + "//staging/src/k8s.io/api/authorization/v1:go_default_library", + "//staging/src/k8s.io/api/coordination/v1:go_default_library", "//staging/src/k8s.io/api/core/v1:go_default_library", + "//staging/src/k8s.io/api/policy/v1beta1:go_default_library", + "//staging/src/k8s.io/api/rbac/v1:go_default_library", "//staging/src/k8s.io/api/storage/v1:go_default_library", "//staging/src/k8s.io/api/storage/v1beta1:go_default_library", "//staging/src/k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1:go_default_library", @@ -81,6 +81,7 @@ go_test( "//staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/tokentest:go_default_library", "//staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/webhook:go_default_library", "//staging/src/k8s.io/client-go/kubernetes:go_default_library", + "//staging/src/k8s.io/client-go/kubernetes/scheme:go_default_library", "//staging/src/k8s.io/client-go/listers/core/v1:go_default_library", "//staging/src/k8s.io/client-go/rest:go_default_library", "//staging/src/k8s.io/client-go/tools/cache:go_default_library", diff --git a/test/integration/auth/accessreview_test.go b/test/integration/auth/accessreview_test.go index df7d1c96f9..2353ffaaeb 100644 --- a/test/integration/auth/accessreview_test.go +++ b/test/integration/auth/accessreview_test.go @@ -22,15 +22,15 @@ import ( "strings" "testing" + authorizationapi "k8s.io/api/authorization/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apiserver/pkg/authentication/authenticator" "k8s.io/apiserver/pkg/authentication/user" "k8s.io/apiserver/pkg/authorization/authorizer" + clientset "k8s.io/client-go/kubernetes" restclient "k8s.io/client-go/rest" "k8s.io/kubernetes/pkg/api/testapi" - authorizationapi "k8s.io/kubernetes/pkg/apis/authorization" api "k8s.io/kubernetes/pkg/apis/core" - clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset" "k8s.io/kubernetes/test/integration/framework" ) @@ -123,7 +123,7 @@ func TestSubjectAccessReview(t *testing.T) { } for _, test := range tests { - response, err := clientset.Authorization().SubjectAccessReviews().Create(test.sar) + response, err := clientset.AuthorizationV1().SubjectAccessReviews().Create(test.sar) switch { case err == nil && len(test.expectedError) == 0: @@ -207,7 +207,7 @@ func TestSelfSubjectAccessReview(t *testing.T) { for _, test := range tests { username = test.username - response, err := clientset.Authorization().SelfSubjectAccessReviews().Create(test.sar) + response, err := clientset.AuthorizationV1().SelfSubjectAccessReviews().Create(test.sar) switch { case err == nil && len(test.expectedError) == 0: @@ -325,7 +325,7 @@ func TestLocalSubjectAccessReview(t *testing.T) { } for _, test := range tests { - response, err := clientset.Authorization().LocalSubjectAccessReviews(test.namespace).Create(test.sar) + response, err := clientset.AuthorizationV1().LocalSubjectAccessReviews(test.namespace).Create(test.sar) switch { case err == nil && len(test.expectedError) == 0: diff --git a/test/integration/auth/node_test.go b/test/integration/auth/node_test.go index f9fba397a3..aa786f49fe 100644 --- a/test/integration/auth/node_test.go +++ b/test/integration/auth/node_test.go @@ -23,6 +23,9 @@ import ( "testing" "time" + coordination "k8s.io/api/coordination/v1" + corev1 "k8s.io/api/core/v1" + policy "k8s.io/api/policy/v1beta1" storagev1 "k8s.io/api/storage/v1" storagev1beta1 "k8s.io/api/storage/v1beta1" apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1" @@ -34,14 +37,10 @@ import ( "k8s.io/apimachinery/pkg/util/wait" utilfeature "k8s.io/apiserver/pkg/util/feature" utilfeaturetesting "k8s.io/apiserver/pkg/util/feature/testing" + clientset "k8s.io/client-go/kubernetes" externalclientset "k8s.io/client-go/kubernetes" + "k8s.io/client-go/kubernetes/scheme" kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing" - "k8s.io/kubernetes/pkg/api/legacyscheme" - "k8s.io/kubernetes/pkg/apis/coordination" - "k8s.io/kubernetes/pkg/apis/core" - api "k8s.io/kubernetes/pkg/apis/core" - "k8s.io/kubernetes/pkg/apis/policy" - clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset" "k8s.io/kubernetes/pkg/features" "k8s.io/kubernetes/test/integration/framework" "k8s.io/utils/pointer" @@ -93,7 +92,7 @@ func TestNodeAuthorizer(t *testing.T) { // Wait for a healthy server for { - result := superuserClient.Core().RESTClient().Get().AbsPath("/healthz").Do() + result := superuserClient.CoreV1().RESTClient().Get().AbsPath("/healthz").Do() _, err := result.Raw() if err == nil { break @@ -103,20 +102,20 @@ func TestNodeAuthorizer(t *testing.T) { } // Create objects - if _, err := superuserClient.Core().Namespaces().Create(&core.Namespace{ObjectMeta: metav1.ObjectMeta{Name: "ns"}}); err != nil { + if _, err := superuserClient.CoreV1().Namespaces().Create(&corev1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: "ns"}}); err != nil { t.Fatal(err) } - if _, err := superuserClient.Core().Secrets("ns").Create(&api.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mysecret"}}); err != nil { + if _, err := superuserClient.CoreV1().Secrets("ns").Create(&corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mysecret"}}); err != nil { t.Fatal(err) } - if _, err := superuserClient.Core().Secrets("ns").Create(&api.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mypvsecret"}}); err != nil { + if _, err := superuserClient.CoreV1().Secrets("ns").Create(&corev1.Secret{ObjectMeta: metav1.ObjectMeta{Name: "mypvsecret"}}); err != nil { t.Fatal(err) } - if _, err := superuserClient.Core().ConfigMaps("ns").Create(&api.ConfigMap{ObjectMeta: metav1.ObjectMeta{Name: "myconfigmap"}}); err != nil { + if _, err := superuserClient.CoreV1().ConfigMaps("ns").Create(&corev1.ConfigMap{ObjectMeta: metav1.ObjectMeta{Name: "myconfigmap"}}); err != nil { t.Fatal(err) } - if _, err := superuserClient.Core().ConfigMaps("ns").Create(&api.ConfigMap{ObjectMeta: metav1.ObjectMeta{Name: "myconfigmapconfigsource"}}); err != nil { + if _, err := superuserClient.CoreV1().ConfigMaps("ns").Create(&corev1.ConfigMap{ObjectMeta: metav1.ObjectMeta{Name: "myconfigmapconfigsource"}}); err != nil { t.Fatal(err) } pvName := "mypv" @@ -130,23 +129,23 @@ func TestNodeAuthorizer(t *testing.T) { }); err != nil { t.Fatal(err) } - if _, err := superuserClient.Core().PersistentVolumeClaims("ns").Create(&api.PersistentVolumeClaim{ + if _, err := superuserClient.CoreV1().PersistentVolumeClaims("ns").Create(&corev1.PersistentVolumeClaim{ ObjectMeta: metav1.ObjectMeta{Name: "mypvc"}, - Spec: api.PersistentVolumeClaimSpec{ - AccessModes: []api.PersistentVolumeAccessMode{api.ReadOnlyMany}, - Resources: api.ResourceRequirements{Requests: api.ResourceList{api.ResourceStorage: resource.MustParse("1")}}, + Spec: corev1.PersistentVolumeClaimSpec{ + AccessModes: []corev1.PersistentVolumeAccessMode{corev1.ReadOnlyMany}, + Resources: corev1.ResourceRequirements{Requests: corev1.ResourceList{corev1.ResourceStorage: resource.MustParse("1")}}, }, }); err != nil { t.Fatal(err) } - if _, err := superuserClient.Core().PersistentVolumes().Create(&api.PersistentVolume{ + if _, err := superuserClient.CoreV1().PersistentVolumes().Create(&corev1.PersistentVolume{ ObjectMeta: metav1.ObjectMeta{Name: "mypv"}, - Spec: api.PersistentVolumeSpec{ - AccessModes: []api.PersistentVolumeAccessMode{api.ReadOnlyMany}, - Capacity: api.ResourceList{api.ResourceStorage: resource.MustParse("1")}, - ClaimRef: &api.ObjectReference{Namespace: "ns", Name: "mypvc"}, - PersistentVolumeSource: api.PersistentVolumeSource{AzureFile: &api.AzureFilePersistentVolumeSource{ShareName: "default", SecretName: "mypvsecret"}}, + Spec: corev1.PersistentVolumeSpec{ + AccessModes: []corev1.PersistentVolumeAccessMode{corev1.ReadOnlyMany}, + Capacity: corev1.ResourceList{corev1.ResourceStorage: resource.MustParse("1")}, + ClaimRef: &corev1.ObjectReference{Namespace: "ns", Name: "mypvc"}, + PersistentVolumeSource: corev1.PersistentVolumeSource{AzureFile: &corev1.AzureFilePersistentVolumeSource{ShareName: "default", SecretName: "mypvsecret"}}, }, }); err != nil { t.Fatal(err) @@ -154,37 +153,37 @@ func TestNodeAuthorizer(t *testing.T) { getSecret := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().Secrets("ns").Get("mysecret", metav1.GetOptions{}) + _, err := client.CoreV1().Secrets("ns").Get("mysecret", metav1.GetOptions{}) return err } } getPVSecret := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().Secrets("ns").Get("mypvsecret", metav1.GetOptions{}) + _, err := client.CoreV1().Secrets("ns").Get("mypvsecret", metav1.GetOptions{}) return err } } getConfigMap := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().ConfigMaps("ns").Get("myconfigmap", metav1.GetOptions{}) + _, err := client.CoreV1().ConfigMaps("ns").Get("myconfigmap", metav1.GetOptions{}) return err } } getConfigMapConfigSource := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().ConfigMaps("ns").Get("myconfigmapconfigsource", metav1.GetOptions{}) + _, err := client.CoreV1().ConfigMaps("ns").Get("myconfigmapconfigsource", metav1.GetOptions{}) return err } } getPVC := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().PersistentVolumeClaims("ns").Get("mypvc", metav1.GetOptions{}) + _, err := client.CoreV1().PersistentVolumeClaims("ns").Get("mypvc", metav1.GetOptions{}) return err } } getPV := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().PersistentVolumes().Get("mypv", metav1.GetOptions{}) + _, err := client.CoreV1().PersistentVolumes().Get("mypv", metav1.GetOptions{}) return err } } @@ -197,15 +196,15 @@ func TestNodeAuthorizer(t *testing.T) { createNode2NormalPod := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().Pods("ns").Create(&api.Pod{ + _, err := client.CoreV1().Pods("ns").Create(&corev1.Pod{ ObjectMeta: metav1.ObjectMeta{Name: "node2normalpod"}, - Spec: api.PodSpec{ + Spec: corev1.PodSpec{ NodeName: "node2", - Containers: []api.Container{{Name: "image", Image: "busybox"}}, - Volumes: []api.Volume{ - {Name: "secret", VolumeSource: api.VolumeSource{Secret: &api.SecretVolumeSource{SecretName: "mysecret"}}}, - {Name: "cm", VolumeSource: api.VolumeSource{ConfigMap: &api.ConfigMapVolumeSource{LocalObjectReference: api.LocalObjectReference{Name: "myconfigmap"}}}}, - {Name: "pvc", VolumeSource: api.VolumeSource{PersistentVolumeClaim: &api.PersistentVolumeClaimVolumeSource{ClaimName: "mypvc"}}}, + Containers: []corev1.Container{{Name: "image", Image: "busybox"}}, + Volumes: []corev1.Volume{ + {Name: "secret", VolumeSource: corev1.VolumeSource{Secret: &corev1.SecretVolumeSource{SecretName: "mysecret"}}}, + {Name: "cm", VolumeSource: corev1.VolumeSource{ConfigMap: &corev1.ConfigMapVolumeSource{LocalObjectReference: corev1.LocalObjectReference{Name: "myconfigmap"}}}}, + {Name: "pvc", VolumeSource: corev1.VolumeSource{PersistentVolumeClaim: &corev1.PersistentVolumeClaimVolumeSource{ClaimName: "mypvc"}}}, }, }, }) @@ -215,9 +214,9 @@ func TestNodeAuthorizer(t *testing.T) { updateNode2NormalPodStatus := func(client clientset.Interface) func() error { return func() error { startTime := metav1.NewTime(time.Now()) - _, err := client.Core().Pods("ns").UpdateStatus(&api.Pod{ + _, err := client.CoreV1().Pods("ns").UpdateStatus(&corev1.Pod{ ObjectMeta: metav1.ObjectMeta{Name: "node2normalpod"}, - Status: api.PodStatus{StartTime: &startTime}, + Status: corev1.PodStatus{StartTime: &startTime}, }) return err } @@ -225,20 +224,20 @@ func TestNodeAuthorizer(t *testing.T) { deleteNode2NormalPod := func(client clientset.Interface) func() error { return func() error { zero := int64(0) - return client.Core().Pods("ns").Delete("node2normalpod", &metav1.DeleteOptions{GracePeriodSeconds: &zero}) + return client.CoreV1().Pods("ns").Delete("node2normalpod", &metav1.DeleteOptions{GracePeriodSeconds: &zero}) } } createNode2MirrorPod := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().Pods("ns").Create(&api.Pod{ + _, err := client.CoreV1().Pods("ns").Create(&corev1.Pod{ ObjectMeta: metav1.ObjectMeta{ Name: "node2mirrorpod", - Annotations: map[string]string{api.MirrorPodAnnotationKey: "true"}, + Annotations: map[string]string{corev1.MirrorPodAnnotationKey: "true"}, }, - Spec: api.PodSpec{ + Spec: corev1.PodSpec{ NodeName: "node2", - Containers: []api.Container{{Name: "image", Image: "busybox"}}, + Containers: []corev1.Container{{Name: "image", Image: "busybox"}}, }, }) return err @@ -247,62 +246,62 @@ func TestNodeAuthorizer(t *testing.T) { deleteNode2MirrorPod := func(client clientset.Interface) func() error { return func() error { zero := int64(0) - return client.Core().Pods("ns").Delete("node2mirrorpod", &metav1.DeleteOptions{GracePeriodSeconds: &zero}) + return client.CoreV1().Pods("ns").Delete("node2mirrorpod", &metav1.DeleteOptions{GracePeriodSeconds: &zero}) } } createNode2 := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().Nodes().Create(&api.Node{ObjectMeta: metav1.ObjectMeta{Name: "node2"}}) + _, err := client.CoreV1().Nodes().Create(&corev1.Node{ObjectMeta: metav1.ObjectMeta{Name: "node2"}}) return err } } setNode2ConfigSource := func(client clientset.Interface) func() error { return func() error { - node2, err := client.Core().Nodes().Get("node2", metav1.GetOptions{}) + node2, err := client.CoreV1().Nodes().Get("node2", metav1.GetOptions{}) if err != nil { return err } - node2.Spec.ConfigSource = &api.NodeConfigSource{ - ConfigMap: &api.ConfigMapNodeConfigSource{ + node2.Spec.ConfigSource = &corev1.NodeConfigSource{ + ConfigMap: &corev1.ConfigMapNodeConfigSource{ Namespace: "ns", Name: "myconfigmapconfigsource", KubeletConfigKey: "kubelet", }, } - _, err = client.Core().Nodes().Update(node2) + _, err = client.CoreV1().Nodes().Update(node2) return err } } unsetNode2ConfigSource := func(client clientset.Interface) func() error { return func() error { - node2, err := client.Core().Nodes().Get("node2", metav1.GetOptions{}) + node2, err := client.CoreV1().Nodes().Get("node2", metav1.GetOptions{}) if err != nil { return err } node2.Spec.ConfigSource = nil - _, err = client.Core().Nodes().Update(node2) + _, err = client.CoreV1().Nodes().Update(node2) return err } } updateNode2Status := func(client clientset.Interface) func() error { return func() error { - _, err := client.Core().Nodes().UpdateStatus(&api.Node{ + _, err := client.CoreV1().Nodes().UpdateStatus(&corev1.Node{ ObjectMeta: metav1.ObjectMeta{Name: "node2"}, - Status: api.NodeStatus{}, + Status: corev1.NodeStatus{}, }) return err } } deleteNode2 := func(client clientset.Interface) func() error { return func() error { - return client.Core().Nodes().Delete("node2", nil) + return client.CoreV1().Nodes().Delete("node2", nil) } } createNode2NormalPodEviction := func(client clientset.Interface) func() error { return func() error { zero := int64(0) - return client.Policy().Evictions("ns").Evict(&policy.Eviction{ + return client.PolicyV1beta1().Evictions("ns").Evict(&policy.Eviction{ TypeMeta: metav1.TypeMeta{ APIVersion: "policy/v1beta1", Kind: "Eviction", @@ -318,7 +317,7 @@ func TestNodeAuthorizer(t *testing.T) { createNode2MirrorPodEviction := func(client clientset.Interface) func() error { return func() error { zero := int64(0) - return client.Policy().Evictions("ns").Evict(&policy.Eviction{ + return client.PolicyV1beta1().Evictions("ns").Evict(&policy.Eviction{ TypeMeta: metav1.TypeMeta{ APIVersion: "policy/v1beta1", Kind: "Eviction", @@ -338,7 +337,7 @@ func TestNodeAuthorizer(t *testing.T) { capacity++ statusString := fmt.Sprintf("{\"status\": {\"capacity\": {\"storage\": \"%dG\"}}}", capacity) patchBytes := []byte(statusString) - _, err := client.Core().PersistentVolumeClaims("ns").Patch("mypvc", types.StrategicMergePatchType, patchBytes, "status") + _, err := client.CoreV1().PersistentVolumeClaims("ns").Patch("mypvc", types.StrategicMergePatchType, patchBytes, "status") return err } } @@ -346,14 +345,14 @@ func TestNodeAuthorizer(t *testing.T) { updatePVCPhase := func(client clientset.Interface) func() error { return func() error { patchBytes := []byte(`{"status":{"phase": "Bound"}}`) - _, err := client.Core().PersistentVolumeClaims("ns").Patch("mypvc", types.StrategicMergePatchType, patchBytes, "status") + _, err := client.CoreV1().PersistentVolumeClaims("ns").Patch("mypvc", types.StrategicMergePatchType, patchBytes, "status") return err } } getNode1Lease := func(client clientset.Interface) func() error { return func() error { - _, err := client.Coordination().Leases(api.NamespaceNodeLease).Get("node1", metav1.GetOptions{}) + _, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Get("node1", metav1.GetOptions{}) return err } } @@ -370,18 +369,18 @@ func TestNodeAuthorizer(t *testing.T) { RenewTime: &metav1.MicroTime{Time: time.Now()}, }, } - _, err := client.Coordination().Leases(api.NamespaceNodeLease).Create(lease) + _, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Create(lease) return err } } updateNode1Lease := func(client clientset.Interface) func() error { return func() error { - lease, err := client.Coordination().Leases(api.NamespaceNodeLease).Get("node1", metav1.GetOptions{}) + lease, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Get("node1", metav1.GetOptions{}) if err != nil { return err } lease.Spec.RenewTime = &metav1.MicroTime{Time: time.Now()} - _, err = client.Coordination().Leases(api.NamespaceNodeLease).Update(lease) + _, err = client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Update(lease) return err } } @@ -389,13 +388,13 @@ func TestNodeAuthorizer(t *testing.T) { return func() error { node1LeaseDurationSeconds++ bs := []byte(fmt.Sprintf(`{"spec": {"leaseDurationSeconds": %d}}`, node1LeaseDurationSeconds)) - _, err := client.Coordination().Leases(api.NamespaceNodeLease).Patch("node1", types.StrategicMergePatchType, bs) + _, err := client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Patch("node1", types.StrategicMergePatchType, bs) return err } } deleteNode1Lease := func(client clientset.Interface) func() error { return func() error { - return client.Coordination().Leases(api.NamespaceNodeLease).Delete("node1", &metav1.DeleteOptions{}) + return client.CoordinationV1().Leases(corev1.NamespaceNodeLease).Delete("node1", &metav1.DeleteOptions{}) } } @@ -671,7 +670,7 @@ func crdFromManifest(filename string) (*apiextensionsv1beta1.CustomResourceDefin return nil, err } - if err := runtime.DecodeInto(legacyscheme.Codecs.UniversalDecoder(), data, &crd); err != nil { + if err := runtime.DecodeInto(scheme.Codecs.UniversalDecoder(), data, &crd); err != nil { return nil, err } return &crd, nil diff --git a/test/integration/auth/rbac_test.go b/test/integration/auth/rbac_test.go index 93374f9bfa..a1d4f21edd 100644 --- a/test/integration/auth/rbac_test.go +++ b/test/integration/auth/rbac_test.go @@ -28,6 +28,8 @@ import ( "testing" "time" + api "k8s.io/api/core/v1" + rbacapi "k8s.io/api/rbac/v1" apiextensionsclient "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/runtime/schema" @@ -41,6 +43,7 @@ import ( "k8s.io/apiserver/pkg/registry/generic" utilfeature "k8s.io/apiserver/pkg/util/feature" utilfeaturetesting "k8s.io/apiserver/pkg/util/feature/testing" + clientset "k8s.io/client-go/kubernetes" externalclientset "k8s.io/client-go/kubernetes" restclient "k8s.io/client-go/rest" watchtools "k8s.io/client-go/tools/watch" @@ -48,9 +51,7 @@ import ( "k8s.io/klog" "k8s.io/kubernetes/pkg/api/legacyscheme" "k8s.io/kubernetes/pkg/api/testapi" - api "k8s.io/kubernetes/pkg/apis/core" - rbacapi "k8s.io/kubernetes/pkg/apis/rbac" - clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset" + rbachelper "k8s.io/kubernetes/pkg/apis/rbac/v1" "k8s.io/kubernetes/pkg/master" "k8s.io/kubernetes/pkg/registry/rbac/clusterrole" clusterrolestore "k8s.io/kubernetes/pkg/registry/rbac/clusterrole/storage" @@ -119,25 +120,25 @@ type bootstrapRoles struct { // client should be authenticated as the RBAC super user. func (b bootstrapRoles) bootstrap(client clientset.Interface) error { for _, r := range b.clusterRoles { - _, err := client.Rbac().ClusterRoles().Create(&r) + _, err := client.RbacV1().ClusterRoles().Create(&r) if err != nil { return fmt.Errorf("failed to make request: %v", err) } } for _, r := range b.roles { - _, err := client.Rbac().Roles(r.Namespace).Create(&r) + _, err := client.RbacV1().Roles(r.Namespace).Create(&r) if err != nil { return fmt.Errorf("failed to make request: %v", err) } } for _, r := range b.clusterRoleBindings { - _, err := client.Rbac().ClusterRoleBindings().Create(&r) + _, err := client.RbacV1().ClusterRoleBindings().Create(&r) if err != nil { return fmt.Errorf("failed to make request: %v", err) } } for _, r := range b.roleBindings { - _, err := client.Rbac().RoleBindings(r.Namespace).Create(&r) + _, err := client.RbacV1().RoleBindings(r.Namespace).Create(&r) if err != nil { return fmt.Errorf("failed to make request: %v", err) } @@ -282,9 +283,9 @@ var ( // Declare some PolicyRules beforehand. var ( - ruleAllowAll = rbacapi.NewRule("*").Groups("*").Resources("*").RuleOrDie() - ruleReadPods = rbacapi.NewRule("list", "get", "watch").Groups("").Resources("pods").RuleOrDie() - ruleWriteJobs = rbacapi.NewRule("*").Groups("batch").Resources("*").RuleOrDie() + ruleAllowAll = rbachelper.NewRule("*").Groups("*").Resources("*").RuleOrDie() + ruleReadPods = rbachelper.NewRule("list", "get", "watch").Groups("").Resources("pods").RuleOrDie() + ruleWriteJobs = rbachelper.NewRule("*").Groups("batch").Resources("*").RuleOrDie() ) func TestRBAC(t *testing.T) { @@ -345,13 +346,13 @@ func TestRBAC(t *testing.T) { { ObjectMeta: metav1.ObjectMeta{Name: "create-rolebindings"}, Rules: []rbacapi.PolicyRule{ - rbacapi.NewRule("create").Groups("rbac.authorization.k8s.io").Resources("rolebindings").RuleOrDie(), + rbachelper.NewRule("create").Groups("rbac.authorization.k8s.io").Resources("rolebindings").RuleOrDie(), }, }, { ObjectMeta: metav1.ObjectMeta{Name: "bind-any-clusterrole"}, Rules: []rbacapi.PolicyRule{ - rbacapi.NewRule("bind").Groups("rbac.authorization.k8s.io").Resources("clusterroles").RuleOrDie(), + rbachelper.NewRule("bind").Groups("rbac.authorization.k8s.io").Resources("clusterroles").RuleOrDie(), }, }, }, @@ -452,7 +453,7 @@ func TestRBAC(t *testing.T) { { ObjectMeta: metav1.ObjectMeta{Name: "update-limitranges"}, Rules: []rbacapi.PolicyRule{ - rbacapi.NewRule("update").Groups("").Resources("limitranges").RuleOrDie(), + rbachelper.NewRule("update").Groups("").Resources("limitranges").RuleOrDie(), }, }, }, @@ -486,7 +487,7 @@ func TestRBAC(t *testing.T) { { ObjectMeta: metav1.ObjectMeta{Name: "patch-limitranges"}, Rules: []rbacapi.PolicyRule{ - rbacapi.NewRule("patch").Groups("").Resources("limitranges").RuleOrDie(), + rbachelper.NewRule("patch").Groups("").Resources("limitranges").RuleOrDie(), }, }, }, @@ -638,7 +639,7 @@ func TestBootstrapping(t *testing.T) { clientset := clientset.NewForConfigOrDie(&restclient.Config{BearerToken: superUser, Host: s.URL, ContentConfig: restclient.ContentConfig{GroupVersion: testapi.Groups[api.GroupName].GroupVersion()}}) - watcher, err := clientset.Rbac().ClusterRoles().Watch(metav1.ListOptions{ResourceVersion: "0"}) + watcher, err := clientset.RbacV1().ClusterRoles().Watch(metav1.ListOptions{ResourceVersion: "0"}) if err != nil { t.Fatalf("unexpected error: %v", err) } @@ -654,7 +655,7 @@ func TestBootstrapping(t *testing.T) { t.Fatalf("unexpected error: %v", err) } - clusterRoles, err := clientset.Rbac().ClusterRoles().List(metav1.ListOptions{}) + clusterRoles, err := clientset.RbacV1().ClusterRoles().List(metav1.ListOptions{}) if err != nil { t.Fatalf("unexpected error: %v", err) } @@ -701,7 +702,7 @@ func TestDiscoveryUpgradeBootstrapping(t *testing.T) { // Modify the default RBAC discovery ClusterRoleBidnings to look more like the defaults that // existed prior to v1.14, but with user modifications. t.Logf("Modifying default `system:discovery` ClusterRoleBinding") - discRoleBinding, err := client.Rbac().ClusterRoleBindings().Get("system:discovery", metav1.GetOptions{}) + discRoleBinding, err := client.RbacV1().ClusterRoleBindings().Get("system:discovery", metav1.GetOptions{}) discRoleBinding.Annotations["rbac.authorization.kubernetes.io/autoupdate"] = "false" discRoleBinding.Annotations["rbac-discovery-upgrade-test"] = "pass" discRoleBinding.Subjects = []rbacapi.Subject{ @@ -711,18 +712,18 @@ func TestDiscoveryUpgradeBootstrapping(t *testing.T) { APIGroup: "rbac.authorization.k8s.io", }, } - if discRoleBinding, err = client.Rbac().ClusterRoleBindings().Update(discRoleBinding); err != nil { + if discRoleBinding, err = client.RbacV1().ClusterRoleBindings().Update(discRoleBinding); err != nil { t.Fatalf("Failed to update `system:discovery` ClusterRoleBinding: %v", err) } t.Logf("Modifying default `system:basic-user` ClusterRoleBinding") - basicUserRoleBinding, err := client.Rbac().ClusterRoleBindings().Get("system:basic-user", metav1.GetOptions{}) + basicUserRoleBinding, err := client.RbacV1().ClusterRoleBindings().Get("system:basic-user", metav1.GetOptions{}) basicUserRoleBinding.Annotations["rbac.authorization.kubernetes.io/autoupdate"] = "false" basicUserRoleBinding.Annotations["rbac-discovery-upgrade-test"] = "pass" - if basicUserRoleBinding, err = client.Rbac().ClusterRoleBindings().Update(basicUserRoleBinding); err != nil { + if basicUserRoleBinding, err = client.RbacV1().ClusterRoleBindings().Update(basicUserRoleBinding); err != nil { t.Fatalf("Failed to update `system:basic-user` ClusterRoleBinding: %v", err) } t.Logf("Deleting default `system:public-info-viewer` ClusterRoleBinding") - if err = client.Rbac().ClusterRoleBindings().Delete("system:public-info-viewer", &metav1.DeleteOptions{}); err != nil { + if err = client.RbacV1().ClusterRoleBindings().Delete("system:public-info-viewer", &metav1.DeleteOptions{}); err != nil { t.Fatalf("Failed to delete `system:public-info-viewer` ClusterRoleBinding: %v", err) } @@ -736,21 +737,21 @@ func TestDiscoveryUpgradeBootstrapping(t *testing.T) { client = clientset.NewForConfigOrDie(&restclient.Config{BearerToken: superUser, Host: s.URL, ContentConfig: restclient.ContentConfig{GroupVersion: testapi.Groups[api.GroupName].GroupVersion()}}) - newDiscRoleBinding, err := client.Rbac().ClusterRoleBindings().Get("system:discovery", metav1.GetOptions{}) + newDiscRoleBinding, err := client.RbacV1().ClusterRoleBindings().Get("system:discovery", metav1.GetOptions{}) if err != nil { t.Fatalf("Failed to get `system:discovery` ClusterRoleBinding: %v", err) } if !reflect.DeepEqual(newDiscRoleBinding, discRoleBinding) { t.Errorf("`system:discovery` should have been unmodified. Wanted: %v, got %v", discRoleBinding, newDiscRoleBinding) } - newBasicUserRoleBinding, err := client.Rbac().ClusterRoleBindings().Get("system:basic-user", metav1.GetOptions{}) + newBasicUserRoleBinding, err := client.RbacV1().ClusterRoleBindings().Get("system:basic-user", metav1.GetOptions{}) if err != nil { t.Fatalf("Failed to get `system:basic-user` ClusterRoleBinding: %v", err) } if !reflect.DeepEqual(newBasicUserRoleBinding, basicUserRoleBinding) { t.Errorf("`system:basic-user` should have been unmodified. Wanted: %v, got %v", basicUserRoleBinding, newBasicUserRoleBinding) } - publicInfoViewerRoleBinding, err := client.Rbac().ClusterRoleBindings().Get("system:public-info-viewer", metav1.GetOptions{}) + publicInfoViewerRoleBinding, err := client.RbacV1().ClusterRoleBindings().Get("system:public-info-viewer", metav1.GetOptions{}) if err != nil { t.Fatalf("Failed to get `system:public-info-viewer` ClusterRoleBinding: %v", err) } diff --git a/test/integration/master/BUILD b/test/integration/master/BUILD index cad6f6810b..bcbcb517a6 100644 --- a/test/integration/master/BUILD +++ b/test/integration/master/BUILD @@ -25,8 +25,6 @@ go_test( deps = [ "//cmd/kube-apiserver/app/options:go_default_library", "//cmd/kube-apiserver/app/testing:go_default_library", - "//pkg/apis/core:go_default_library", - "//pkg/client/clientset_generated/internalclientset:go_default_library", "//pkg/master:go_default_library", "//staging/src/k8s.io/api/apps/v1:go_default_library", "//staging/src/k8s.io/api/core/v1:go_default_library", diff --git a/test/integration/master/synthetic_master_test.go b/test/integration/master/synthetic_master_test.go index 6cab439f5f..1fb4098980 100644 --- a/test/integration/master/synthetic_master_test.go +++ b/test/integration/master/synthetic_master_test.go @@ -35,6 +35,7 @@ import ( appsv1 "k8s.io/api/apps/v1" "k8s.io/api/core/v1" + api "k8s.io/api/core/v1" corev1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -45,11 +46,9 @@ import ( "k8s.io/apiserver/pkg/authorization/authorizer" "k8s.io/apiserver/pkg/authorization/authorizerfactory" "k8s.io/apiserver/plugin/pkg/authenticator/token/tokentest" - clientsetv1 "k8s.io/client-go/kubernetes" + clientset "k8s.io/client-go/kubernetes" clienttypedv1 "k8s.io/client-go/kubernetes/typed/core/v1" restclient "k8s.io/client-go/rest" - api "k8s.io/kubernetes/pkg/apis/core" - clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset" "k8s.io/kubernetes/pkg/master" "k8s.io/kubernetes/test/integration" "k8s.io/kubernetes/test/integration/framework" @@ -104,7 +103,7 @@ func TestKubernetesService(t *testing.T) { defer closeFn() coreClient := clientset.NewForConfigOrDie(config.GenericConfig.LoopbackClientConfig) err := wait.PollImmediate(time.Millisecond*100, wait.ForeverTestTimeout, func() (bool, error) { - if _, err := coreClient.Core().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{}); err != nil && errors.IsNotFound(err) { + if _, err := coreClient.CoreV1().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{}); err != nil && errors.IsNotFound(err) { return false, nil } else if err != nil { return false, err @@ -306,7 +305,7 @@ func TestObjectSizeResponses(t *testing.T) { _, s, closeFn := framework.RunAMaster(nil) defer closeFn() - client := clientsetv1.NewForConfigOrDie(&restclient.Config{Host: s.URL}) + client := clientset.NewForConfigOrDie(&restclient.Config{Host: s.URL}) const DeploymentMegabyteSize = 100000 const DeploymentTwoMegabyteSize = 1000000 @@ -653,7 +652,7 @@ func TestMasterService(t *testing.T) { client := clientset.NewForConfigOrDie(&restclient.Config{Host: s.URL}) err := wait.Poll(time.Second, time.Minute, func() (bool, error) { - svcList, err := client.Core().Services(metav1.NamespaceDefault).List(metav1.ListOptions{}) + svcList, err := client.CoreV1().Services(metav1.NamespaceDefault).List(metav1.ListOptions{}) if err != nil { t.Errorf("unexpected error: %v", err) return false, nil @@ -666,7 +665,7 @@ func TestMasterService(t *testing.T) { } } if found { - ep, err := client.Core().Endpoints(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{}) + ep, err := client.CoreV1().Endpoints(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{}) if err != nil { return false, nil } @@ -710,7 +709,7 @@ func TestServiceAlloc(t *testing.T) { // Wait until the default "kubernetes" service is created. if err = wait.Poll(250*time.Millisecond, time.Minute, func() (bool, error) { - _, err := client.Core().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{}) + _, err := client.CoreV1().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{}) if err != nil && !errors.IsNotFound(err) { return false, err } @@ -721,18 +720,18 @@ func TestServiceAlloc(t *testing.T) { // make 5 more services to take up all IPs for i := 0; i < 5; i++ { - if _, err := client.Core().Services(metav1.NamespaceDefault).Create(svc(i)); err != nil { + if _, err := client.CoreV1().Services(metav1.NamespaceDefault).Create(svc(i)); err != nil { t.Error(err) } } // Make another service. It will fail because we're out of cluster IPs - if _, err := client.Core().Services(metav1.NamespaceDefault).Create(svc(8)); err != nil { + if _, err := client.CoreV1().Services(metav1.NamespaceDefault).Create(svc(8)); err != nil { if !strings.Contains(err.Error(), "range is full") { t.Errorf("unexpected error text: %v", err) } } else { - svcs, err := client.Core().Services(metav1.NamespaceAll).List(metav1.ListOptions{}) + svcs, err := client.CoreV1().Services(metav1.NamespaceAll).List(metav1.ListOptions{}) if err != nil { t.Fatalf("unexpected success, and error getting the services: %v", err) } @@ -744,12 +743,12 @@ func TestServiceAlloc(t *testing.T) { } // Delete the first service. - if err := client.Core().Services(metav1.NamespaceDefault).Delete(svc(1).ObjectMeta.Name, nil); err != nil { + if err := client.CoreV1().Services(metav1.NamespaceDefault).Delete(svc(1).ObjectMeta.Name, nil); err != nil { t.Fatalf("got unexpected error: %v", err) } // This time creating the second service should work. - if _, err := client.Core().Services(metav1.NamespaceDefault).Create(svc(8)); err != nil { + if _, err := client.CoreV1().Services(metav1.NamespaceDefault).Create(svc(8)); err != nil { t.Fatalf("got unexpected error: %v", err) } } diff --git a/test/soak/cauldron/BUILD b/test/soak/cauldron/BUILD index dbf02e64b4..6382c15db0 100644 --- a/test/soak/cauldron/BUILD +++ b/test/soak/cauldron/BUILD @@ -16,11 +16,11 @@ go_library( srcs = ["cauldron.go"], importpath = "k8s.io/kubernetes/test/soak/cauldron", deps = [ - "//pkg/apis/core:go_default_library", - "//pkg/client/clientset_generated/internalclientset:go_default_library", + "//staging/src/k8s.io/api/core/v1:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/api/errors:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/util/intstr:go_default_library", + "//staging/src/k8s.io/client-go/kubernetes:go_default_library", "//staging/src/k8s.io/client-go/rest:go_default_library", "//test/e2e/framework:go_default_library", "//vendor/k8s.io/klog:go_default_library", diff --git a/test/soak/cauldron/cauldron.go b/test/soak/cauldron/cauldron.go index 6317366784..3a920d2054 100644 --- a/test/soak/cauldron/cauldron.go +++ b/test/soak/cauldron/cauldron.go @@ -29,13 +29,13 @@ import ( "net/http" "time" + corev1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/util/intstr" + clientset "k8s.io/client-go/kubernetes" restclient "k8s.io/client-go/rest" "k8s.io/klog" - api "k8s.io/kubernetes/pkg/apis/core" - clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset" "k8s.io/kubernetes/test/e2e/framework" ) @@ -72,9 +72,9 @@ func main() { klog.Fatalf("Failed to make client: %v", err) } - var nodes *api.NodeList + var nodes *corev1.NodeList for start := time.Now(); time.Since(start) < nodeListTimeout; time.Sleep(2 * time.Second) { - nodes, err = client.Core().Nodes().List(metav1.ListOptions{}) + nodes, err = client.CoreV1().Nodes().List(metav1.ListOptions{}) if err == nil { break } @@ -96,18 +96,18 @@ func main() { queries := *queriesAverage * len(nodes.Items) * *podsPerNode // Create a uniquely named namespace. - got, err := client.Core().Namespaces().Create(&api.Namespace{ObjectMeta: metav1.ObjectMeta{GenerateName: "serve-hostnames-"}}) + got, err := client.CoreV1().Namespaces().Create(&corev1.Namespace{ObjectMeta: metav1.ObjectMeta{GenerateName: "serve-hostnames-"}}) if err != nil { klog.Fatalf("Failed to create namespace: %v", err) } ns := got.Name defer func(ns string) { - if err := client.Core().Namespaces().Delete(ns, nil); err != nil { + if err := client.CoreV1().Namespaces().Delete(ns, nil); err != nil { klog.Warningf("Failed to delete namespace %s: %v", ns, err) } else { // wait until the namespace disappears for i := 0; i < int(namespaceDeleteTimeout/time.Second); i++ { - if _, err := client.Core().Namespaces().Get(ns, metav1.GetOptions{}); err != nil { + if _, err := client.CoreV1().Namespaces().Get(ns, metav1.GetOptions{}); err != nil { if errors.IsNotFound(err) { return } @@ -121,18 +121,18 @@ func main() { // Create a service for these pods. klog.Infof("Creating service %s/serve-hostnames", ns) // Make several attempts to create a service. - var svc *api.Service + var svc *corev1.Service for start := time.Now(); time.Since(start) < serviceCreateTimeout; time.Sleep(2 * time.Second) { t := time.Now() - svc, err = client.Core().Services(ns).Create(&api.Service{ + svc, err = client.CoreV1().Services(ns).Create(&corev1.Service{ ObjectMeta: metav1.ObjectMeta{ Name: "serve-hostnames", Labels: map[string]string{ "name": "serve-hostname", }, }, - Spec: api.ServiceSpec{ - Ports: []api.ServicePort{{ + Spec: corev1.ServiceSpec{ + Ports: []corev1.ServicePort{{ Protocol: "TCP", Port: 9376, TargetPort: intstr.FromInt(9376), @@ -157,7 +157,7 @@ func main() { klog.Infof("Cleaning up service %s/serve-hostnames", ns) // Make several attempts to delete the service. for start := time.Now(); time.Since(start) < deleteTimeout; time.Sleep(1 * time.Second) { - if err := client.Core().Services(ns).Delete(svc.Name, nil); err == nil { + if err := client.CoreV1().Services(ns).Delete(svc.Name, nil); err == nil { return } klog.Warningf("After %v unable to delete service %s/%s: %v", time.Since(start), ns, svc.Name, err) @@ -174,19 +174,19 @@ func main() { for start := time.Now(); time.Since(start) < podCreateTimeout; time.Sleep(2 * time.Second) { klog.Infof("Creating pod %s/%s on node %s", ns, podName, node.Name) t := time.Now() - _, err = client.Core().Pods(ns).Create(&api.Pod{ + _, err = client.CoreV1().Pods(ns).Create(&corev1.Pod{ ObjectMeta: metav1.ObjectMeta{ Name: podName, Labels: map[string]string{ "name": "serve-hostname", }, }, - Spec: api.PodSpec{ - Containers: []api.Container{ + Spec: corev1.PodSpec{ + Containers: []corev1.Container{ { Name: "serve-hostname", Image: framework.ServeHostnameImage, - Ports: []api.ContainerPort{{ContainerPort: 9376}}, + Ports: []corev1.ContainerPort{{ContainerPort: 9376}}, }, }, NodeName: node.Name, @@ -210,7 +210,7 @@ func main() { // Make several attempts to delete the pods. for _, podName := range podNames { for start := time.Now(); time.Since(start) < deleteTimeout; time.Sleep(1 * time.Second) { - if err = client.Core().Pods(ns).Delete(podName, nil); err == nil { + if err = client.CoreV1().Pods(ns).Delete(podName, nil); err == nil { break } klog.Warningf("After %v failed to delete pod %s/%s: %v", time.Since(start), ns, podName, err) @@ -220,18 +220,18 @@ func main() { klog.Info("Waiting for the serve-hostname pods to be ready") for _, podName := range podNames { - var pod *api.Pod + var pod *corev1.Pod for start := time.Now(); time.Since(start) < podStartTimeout; time.Sleep(5 * time.Second) { - pod, err = client.Core().Pods(ns).Get(podName, metav1.GetOptions{}) + pod, err = client.CoreV1().Pods(ns).Get(podName, metav1.GetOptions{}) if err != nil { klog.Warningf("Get pod %s/%s failed, ignoring for %v: %v", ns, podName, err, podStartTimeout) continue } - if pod.Status.Phase == api.PodRunning { + if pod.Status.Phase == corev1.PodRunning { break } } - if pod.Status.Phase != api.PodRunning { + if pod.Status.Phase != corev1.PodRunning { klog.Warningf("Gave up waiting on pod %s/%s to be running (saw %v)", ns, podName, pod.Status.Phase) } else { klog.Infof("%s/%s is running", ns, podName)