Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rebase kubernetes 1.8.1 #43

Merged
merged 68 commits into from
Nov 20, 2017
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
68 commits
Select commit Hold shift + click to select a range
39918a2
UPSTREAM: 53442: add nested encoder and decoder to admission config
deads2k Oct 4, 2017
3434d64
UPSTREAM: 53731: Use locks in fake dbus
smarterclayton Oct 11, 2017
53494a9
UPSTREAM: <carry>: reallow the ability to post across namespaces in api
Aug 11, 2015
4c19acf
UPSTREAM: <carry>: add kubelet timeouts
soltysh Dec 21, 2015
2ac3f32
UPSTREAM: <carry>: Tolerate node ExternalID changes with no cloud pro…
DirectXMan12 Jan 12, 2016
e80f69e
UPSTREAM: <carry>: Add our types to kubectl get error
Nov 18, 2016
329ae99
UPSTREAM: <carry>: Allow overriding default generators for run
liggitt Mar 16, 2016
d35e40e
UPSTREAM: <carry>: force import ordering for stable codegen
Nov 18, 2016
0c64419
UPSTREAM: <carry>: add service serving cert signer to token controller
deads2k May 26, 2016
8c4bae7
UPSTREAM: <carry>: fix fifo resync, remove after FIFO is dead
deads2k Jul 14, 2016
a2e91f9
UPSTREAM: <carry>: Disable file locking in clientcmd
smarterclayton Sep 13, 2016
a79ed91
UPSTREAM: <carry>: Disable e2e pre-check on scheduler predicates
Nov 28, 2016
a60737a
UPSTREAM: <drop>: merge multiple registrations for the same group
deads2k Feb 1, 2016
f08374e
UPSTREAM: <carry>: Double container probe timeout
smarterclayton Jan 16, 2017
447792c
UPSTREAM: <carry>: Increase service endpoint test timeout
smarterclayton Jan 16, 2017
a0eb7da
UPSTREAM: <carry>: Pod deletion can be contended, causing test failure
smarterclayton Jan 17, 2017
7b2fa48
UPSTREAM: docker/engine-api: 26718: Add Logs to ContainerAttachOptions
sttts Mar 9, 2017
29a0d99
UPSTREAM: carry: google.golang.org/grpc 231b4cfea0e79843053a33f5fe90b…
sttts Mar 15, 2017
f7c4465
UPSTREAM: 00000: make AsVersionedObjects default cleanly
deads2k Apr 25, 2017
bc337cc
UPSTREAM: 00000: disambiguate operation names for legacy discovery
deads2k Jun 7, 2017
b992ae7
UPSTREAM: 47347: actually check for a live discovery endpoint before …
deads2k Jun 12, 2017
db8808e
UPSTREAM: <carry>: commit generated openapi
deads2k Jul 24, 2017
af26db7
UPSTREAM: 49131: expose direct from config new scheduler method
deads2k Jul 6, 2017
168c81d
UPSTREAM: <carry>: make wiring in kubeproxy easy until we sort out co…
deads2k Jul 10, 2017
4e1b57b
UPSTREAM: <carry>: compensate for poor printer behavior
deads2k Jul 11, 2017
b68d613
UPSTREAM: <carry>: increase wait in kubecontrollers
deads2k Jul 10, 2017
3f63f0c
UPSTREAM: <carry>: add patch to allow shimming SCC
deads2k Jun 15, 2017
6dba7fc
UPSTREAM: 48884: Do not mutate pods on update
smarterclayton Jul 13, 2017
b0c09ff
UPSTREAM: 49312: allow the /version endpoint to pass through
deads2k Jul 20, 2017
80b7396
UPSTREAM: <carry>: increase timeout in TestCancelAndReadd even more
soltysh Sep 18, 2017
32e2e1d
UPSTREAM: google/cadvisor: 1741: add CRI-O handler
sjenning Sep 18, 2017
d0a8db3
UPSTREAM: <carry>: allow a filter function on admission registration
deads2k Oct 2, 2017
d1694e7
UPSTREAM: 53318: create separate transports for liveness and readines…
sjenning Oct 2, 2017
2c0fba8
UPSTREAM: 47806: kubelet: fix inconsistent display of terminated pod …
dcbw Jun 20, 2017
2eea9ee
UPSTREAM: <carry>: ignored namespace lifecycle resources
deads2k Jun 14, 2017
69aadde
UPSTREAM: <carry>: openapi generation for createNamespacedDeploymentC…
soltysh Oct 2, 2017
dcfcc59
UPSTREAM: <drop>: generated updates
mfojtik Oct 12, 2017
cf93c46
UPSTREAM: <carry>: allow controller context injection to share informers
deads2k Sep 7, 2017
82dc400
UPSTREAM: <carry>: Fix to avoid REST API calls at log level 2
mfojtik Oct 16, 2017
c35d305
UPSTREAM: <carry>: Do not error out on pods in kube-system
smarterclayton Jul 27, 2017
abb6024
UPSTREAM: 53037: Verify client cert before reusing existing bootstrap
jcbsmpsn Aug 16, 2017
c2214fb
UPSTREAM: <carry>: update clientset generator for openshift groups
mfojtik Oct 23, 2017
3a7da86
UPSTREAM: 53857: kubelet sync pod throws more detailed events
joelsmith Oct 13, 2017
199b3f2
UPSTREAM: 52673: default service resolver for webhook admission
deads2k Oct 12, 2017
e600f1c
UPSTREAM: 53823: allow fail close webhook admission
deads2k Oct 12, 2017
4e23503
UPSTREAM: 53896: decode admission responses into a fresh object
deads2k Oct 13, 2017
fc75a98
UPSTREAM: <drop>: drop in 1.9 rebase. Shims enough admission webhook …
deads2k Oct 13, 2017
735c248
UPSTREAM: 53464: output empty creationTimestamps as null
juanvallejo Oct 4, 2017
ed32dc4
UPSTREAM: 53167: Do not GC exited containers in running pods
sjenning Oct 16, 2017
fab08f0
UPSTREAM: 51750: output `<none>` for colums not found
juanvallejo Oct 24, 2017
4f52607
UPSTREAM: 54593: Removed containers are not always waiting
joelsmith Oct 26, 2017
e609be4
UPSTREAM: <drop>: add origin resource shortcuts to kube shortcut rest…
Dec 19, 2016
9d59240
UPSTREAM: 54763: make iptables wait flag generic; increase the max wa…
Oct 29, 2017
3102892
UPSTREAM: 54812: Allow override of cluster level (default, whitelist)…
Oct 30, 2017
2495f6a
UPSTREAM: 54828: trigger endpoint update on pod deletion
freehan Oct 31, 2017
9318a8b
UPSTREAM: 54921: rename metric reflector_xx_last_resource_version to …
Nov 1, 2017
5b8f4aa
UPSTREAM: 55028: kubelet: dockershim: remove orphaned checkpoint files
sjenning Nov 2, 2017
339287f
UPSTREAM: 54979: When cert dir is relative, cert rotation builds inco…
smarterclayton Nov 2, 2017
0b7ce15
UPSTREAM: 54257: Use GetByKey() in typeLister_NonNamespacedGet
tiran Oct 19, 2017
3052f36
UPSTREAM: 52503: Get fallback termination msg from docker when using …
joelsmith Sep 14, 2017
d84ed50
UPSTREAM: 53793: User separate client for leader election in scheduler
wojtek-t Oct 12, 2017
e0dd265
UPSTREAM: 55223: Fix protobuf generator for aliases to repeated types
mfojtik Nov 7, 2017
24f53e1
UPSTREAM: 53401: Fix spam of multiattach errors in event logs
gnufied Oct 3, 2017
4020059
UPSTREAM: 53682: Make sure we use rwlocks not just RLock
gnufied Oct 10, 2017
2734462
UPSTREAM: 53831: Fix volume reconciler test flake
gnufied Oct 13, 2017
c1d431d
UPSTREAM: 53606: implement ApproximatePodTemplateObject upstream
juanvallejo Sep 18, 2017
140fa32
regenerate listers
mfojtik Nov 8, 2017
0d5291c
UPSTREAM: <drop>: get.go doesn't handle metav1.Status returned by res…
mfojtik Nov 9, 2017
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 0 additions & 3 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -110,12 +110,9 @@ kubernetes.tar.gz
# generated files in any directory
# TODO(thockin): uncomment this when we stop committing the generated files.
#zz_generated.*
zz_generated.openapi.go
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the actual openapi file missing?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@sttts @soltysh said I should add it in a commit to the end of this rebase.


# make-related metadata
/.make/
# Just in time generated data in the source, should never be commited
/test/e2e/generated/bindata.go

# This file used by some vendor repos (e.g. github.com/go-openapi/...) to store secret variables and should not be ignored
!\.drone\.sec
Expand Down
18 changes: 12 additions & 6 deletions cmd/kube-controller-manager/app/controllermanager.go
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,9 @@ func Run(s *options.CMServer) error {
return err
}

go startHTTP(s)
if s.Port >= 0 {
go startHTTP(s)
}

recorder := createRecorder(kubeClient)

Expand Down Expand Up @@ -156,8 +158,12 @@ func Run(s *options.CMServer) error {
glog.Fatalf("error starting controllers: %v", err)
}

ctx.InformerFactory.Start(ctx.Stop)
close(ctx.InformersStarted)
if StartInformers == nil {
ctx.InformerFactory.Start(ctx.Stop)
close(ctx.InformersStarted)
} else {
StartInformers(ctx.Stop)
}

select {}
}
Expand Down Expand Up @@ -371,7 +377,7 @@ func GetAvailableResources(clientBuilder controller.ControllerClientBuilder) (ma
var healthzContent string
// If apiserver is not running we should wait for some time and fail only then. This is particularly
// important when we start apiserver and controller manager at the same time.
err := wait.PollImmediate(time.Second, 10*time.Second, func() (bool, error) {
err := wait.PollImmediate(time.Second, 5*time.Minute, func() (bool, error) {
client, err := clientBuilder.Client("controller-discovery")
if err != nil {
glog.Errorf("Failed to get api versions from server: %v", err)
Expand Down Expand Up @@ -416,10 +422,10 @@ func GetAvailableResources(clientBuilder controller.ControllerClientBuilder) (ma
return allResources, nil
}

// CreateControllerContext creates a context struct containing references to resources needed by the
// createControllerContext creates a context struct containing references to resources needed by the
// controllers such as the cloud provider and clientBuilder. rootClientBuilder is only used for
// the shared-informers client and token controller.
func CreateControllerContext(s *options.CMServer, rootClientBuilder, clientBuilder controller.ControllerClientBuilder, stop <-chan struct{}) (ControllerContext, error) {
func createControllerContext(s *options.CMServer, rootClientBuilder, clientBuilder controller.ControllerClientBuilder, stop <-chan struct{}) (ControllerContext, error) {
versionedClient := rootClientBuilder.ClientOrDie("shared-informers")
sharedInformers := informers.NewSharedInformerFactory(versionedClient, ResyncPeriod(s)())

Expand Down
12 changes: 12 additions & 0 deletions cmd/kube-controller-manager/app/patch.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
package app

import (
"k8s.io/kubernetes/cmd/kube-controller-manager/app/options"
"k8s.io/kubernetes/pkg/controller"
)

// This allows overriding from inside the same process. It's not pretty, but its fairly easy to maintain because conflicts are small.
var CreateControllerContext func(s *options.CMServer, rootClientBuilder, clientBuilder controller.ControllerClientBuilder, stop <-chan struct{}) (ControllerContext, error) = createControllerContext

// StartInformers allows overriding inside of the same process.
var StartInformers func(stop <-chan struct{}) = nil
15 changes: 15 additions & 0 deletions cmd/kube-proxy/app/server_patch.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
package app

import (
"github.com/spf13/pflag"

"k8s.io/kubernetes/pkg/apis/componentconfig"
)

func (o *Options) GetConfig() *componentconfig.KubeProxyConfiguration {
return o.config
}

func (o *Options) AddFlags(fs *pflag.FlagSet) {
AddFlags(o, fs)
}
2 changes: 1 addition & 1 deletion cmd/kubeadm/app/node/csr.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,8 @@ import (
"k8s.io/apimachinery/pkg/types"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
certutil "k8s.io/client-go/util/cert"
"k8s.io/client-go/util/certificate/csr"
kubeconfigutil "k8s.io/kubernetes/cmd/kubeadm/app/util/kubeconfig"
"k8s.io/kubernetes/pkg/kubelet/util/csr"
)

// CSRContextAndUser defines the context to use for the client certs in the kubelet kubeconfig file
Expand Down
1 change: 1 addition & 0 deletions cmd/kubelet/app/BUILD
Original file line number Diff line number Diff line change
Expand Up @@ -121,6 +121,7 @@ go_library(
"//vendor/k8s.io/client-go/tools/clientcmd:go_default_library",
"//vendor/k8s.io/client-go/tools/record:go_default_library",
"//vendor/k8s.io/client-go/util/cert:go_default_library",
"//vendor/k8s.io/client-go/util/certificate:go_default_library",
] + select({
"@io_bazel_rules_go//go/platform:linux_amd64": [
"//vendor/golang.org/x/exp/inotify:go_default_library",
Expand Down
9 changes: 6 additions & 3 deletions cmd/kubelet/app/server.go
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,7 @@ import (
"k8s.io/client-go/tools/clientcmd"
"k8s.io/client-go/tools/record"
certutil "k8s.io/client-go/util/cert"
"k8s.io/client-go/util/certificate"
"k8s.io/kubernetes/cmd/kubelet/app/options"
"k8s.io/kubernetes/pkg/api"
"k8s.io/kubernetes/pkg/capabilities"
Expand All @@ -64,7 +65,7 @@ import (
kubeletscheme "k8s.io/kubernetes/pkg/kubelet/apis/kubeletconfig/scheme"
kubeletconfigv1alpha1 "k8s.io/kubernetes/pkg/kubelet/apis/kubeletconfig/v1alpha1"
"k8s.io/kubernetes/pkg/kubelet/cadvisor"
"k8s.io/kubernetes/pkg/kubelet/certificate"
kubeletcertificate "k8s.io/kubernetes/pkg/kubelet/certificate"
"k8s.io/kubernetes/pkg/kubelet/certificate/bootstrap"
"k8s.io/kubernetes/pkg/kubelet/cm"
"k8s.io/kubernetes/pkg/kubelet/config"
Expand Down Expand Up @@ -334,11 +335,13 @@ func run(s *options.KubeletServer, kubeDeps *kubelet.Dependencies) (err error) {
var clientCertificateManager certificate.Manager
if err == nil {
if s.RotateCertificates && utilfeature.DefaultFeatureGate.Enabled(features.RotateKubeletClientCertificate) {
clientCertificateManager, err = certificate.NewKubeletClientCertificateManager(s.CertDirectory, nodeName, clientConfig.CertData, clientConfig.KeyData, clientConfig.CertFile, clientConfig.KeyFile)
clientCertificateManager, err = kubeletcertificate.NewKubeletClientCertificateManager(s.CertDirectory, nodeName, clientConfig.CertData, clientConfig.KeyData, clientConfig.CertFile, clientConfig.KeyFile)
if err != nil {
return err
}
if err := certificate.UpdateTransport(wait.NeverStop, clientConfig, clientCertificateManager); err != nil {
// we set exitIfExpired to true because we use this client configuration to request new certs - if we are unable
// to request new certs, we will be unable to continue normal operation
if err := kubeletcertificate.UpdateTransport(wait.NeverStop, clientConfig, clientCertificateManager, true); err != nil {
return err
}
}
Expand Down
1 change: 0 additions & 1 deletion hack/.golint_failures
Original file line number Diff line number Diff line change
Expand Up @@ -231,7 +231,6 @@ pkg/kubelet/apis/kubeletconfig
pkg/kubelet/apis/kubeletconfig/v1alpha1
pkg/kubelet/cadvisor
pkg/kubelet/cadvisor/testing
pkg/kubelet/certificate
pkg/kubelet/client
pkg/kubelet/cm
pkg/kubelet/cm/util
Expand Down
11 changes: 7 additions & 4 deletions pkg/apis/admissionregistration/validation/validation.go
Original file line number Diff line number Diff line change
Expand Up @@ -175,17 +175,20 @@ func validateExternalAdmissionHook(hook *admissionregistration.ExternalAdmission
var allErrors field.ErrorList
// hook.Name must be fully qualified
allErrors = append(allErrors, validation.IsFullyQualifiedName(fldPath.Child("name"), hook.Name)...)

for i, rule := range hook.Rules {
allErrors = append(allErrors, validateRuleWithOperations(&rule, fldPath.Child("rules").Index(i))...)
}
// TODO: relax the validation rule when admissionregistration is beta.
if hook.FailurePolicy != nil && *hook.FailurePolicy != admissionregistration.Ignore {
allErrors = append(allErrors, field.NotSupported(fldPath.Child("failurePolicy"), *hook.FailurePolicy, []string{string(admissionregistration.Ignore)}))
if hook.FailurePolicy != nil && !supportedFailurePolicies.Has(string(*hook.FailurePolicy)) {
allErrors = append(allErrors, field.NotSupported(fldPath.Child("failurePolicy"), *hook.FailurePolicy, supportedFailurePolicies.List()))
}
return allErrors
}

var supportedFailurePolicies = sets.NewString(
string(admissionregistration.Ignore),
string(admissionregistration.Fail),
)

var supportedOperations = sets.NewString(
string(admissionregistration.OperationAll),
string(admissionregistration.Create),
Expand Down
6 changes: 3 additions & 3 deletions pkg/apis/admissionregistration/validation/validation_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -469,18 +469,18 @@ func TestValidateExternalAdmissionHookConfiguration(t *testing.T) {
expectedError: `externalAdmissionHooks[0].rules[0].resources: Invalid value: []string{"*/*", "a"}: if '*/*' is present, must not specify other resources`,
},
{
name: "FailurePolicy can only be \"Ignore\"",
name: "FailurePolicy can only be \"Ignore\" or \"Fail\"",
config: getExternalAdmissionHookConfiguration(
[]admissionregistration.ExternalAdmissionHook{
{
Name: "webhook.k8s.io",
FailurePolicy: func() *admissionregistration.FailurePolicyType {
r := admissionregistration.Fail
r := admissionregistration.FailurePolicyType("other")
return &r
}(),
},
}),
expectedError: `failurePolicy: Unsupported value: "Fail": supported values: Ignore`,
expectedError: `failurePolicy: Unsupported value: "other": supported values: Fail, Ignore`,
},
}
for _, test := range tests {
Expand Down
3 changes: 3 additions & 0 deletions pkg/apis/batch/install/install.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,9 @@ import (
"k8s.io/kubernetes/pkg/apis/batch/v1"
"k8s.io/kubernetes/pkg/apis/batch/v1beta1"
"k8s.io/kubernetes/pkg/apis/batch/v2alpha1"

// force determinstic ordering when loading these packages
_ "k8s.io/kubernetes/pkg/apis/extensions/install"
)

func init() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
admissionregistration "k8s.io/kubernetes/pkg/apis/admissionregistration"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *externalAdmissionHookConfigurationLister) List(selector labels.Selector

// Get retrieves the ExternalAdmissionHookConfiguration from the index for a given name.
func (s *externalAdmissionHookConfigurationLister) Get(name string) (*admissionregistration.ExternalAdmissionHookConfiguration, error) {
key := &admissionregistration.ExternalAdmissionHookConfiguration{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
admissionregistration "k8s.io/kubernetes/pkg/apis/admissionregistration"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *initializerConfigurationLister) List(selector labels.Selector) (ret []*

// Get retrieves the InitializerConfiguration from the index for a given name.
func (s *initializerConfigurationLister) Get(name string) (*admissionregistration.InitializerConfiguration, error) {
key := &admissionregistration.InitializerConfiguration{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
authentication "k8s.io/kubernetes/pkg/apis/authentication"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *tokenReviewLister) List(selector labels.Selector) (ret []*authenticatio

// Get retrieves the TokenReview from the index for a given name.
func (s *tokenReviewLister) Get(name string) (*authentication.TokenReview, error) {
key := &authentication.TokenReview{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
authorization "k8s.io/kubernetes/pkg/apis/authorization"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *selfSubjectAccessReviewLister) List(selector labels.Selector) (ret []*a

// Get retrieves the SelfSubjectAccessReview from the index for a given name.
func (s *selfSubjectAccessReviewLister) Get(name string) (*authorization.SelfSubjectAccessReview, error) {
key := &authorization.SelfSubjectAccessReview{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
authorization "k8s.io/kubernetes/pkg/apis/authorization"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *selfSubjectRulesReviewLister) List(selector labels.Selector) (ret []*au

// Get retrieves the SelfSubjectRulesReview from the index for a given name.
func (s *selfSubjectRulesReviewLister) Get(name string) (*authorization.SelfSubjectRulesReview, error) {
key := &authorization.SelfSubjectRulesReview{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
authorization "k8s.io/kubernetes/pkg/apis/authorization"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *subjectAccessReviewLister) List(selector labels.Selector) (ret []*autho

// Get retrieves the SubjectAccessReview from the index for a given name.
func (s *subjectAccessReviewLister) Get(name string) (*authorization.SubjectAccessReview, error) {
key := &authorization.SubjectAccessReview{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
certificates "k8s.io/kubernetes/pkg/apis/certificates"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *certificateSigningRequestLister) List(selector labels.Selector) (ret []

// Get retrieves the CertificateSigningRequest from the index for a given name.
func (s *certificateSigningRequestLister) Get(name string) (*certificates.CertificateSigningRequest, error) {
key := &certificates.CertificateSigningRequest{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
4 changes: 1 addition & 3 deletions pkg/client/listers/core/internalversion/componentstatus.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
api "k8s.io/kubernetes/pkg/api"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *componentStatusLister) List(selector labels.Selector) (ret []*api.Compo

// Get retrieves the ComponentStatus from the index for a given name.
func (s *componentStatusLister) Get(name string) (*api.ComponentStatus, error) {
key := &api.ComponentStatus{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
4 changes: 1 addition & 3 deletions pkg/client/listers/core/internalversion/namespace.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
api "k8s.io/kubernetes/pkg/api"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *namespaceLister) List(selector labels.Selector) (ret []*api.Namespace,

// Get retrieves the Namespace from the index for a given name.
func (s *namespaceLister) Get(name string) (*api.Namespace, error) {
key := &api.Namespace{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
4 changes: 1 addition & 3 deletions pkg/client/listers/core/internalversion/node.go
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ package internalversion

import (
"k8s.io/apimachinery/pkg/api/errors"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/labels"
"k8s.io/client-go/tools/cache"
api "k8s.io/kubernetes/pkg/api"
Expand Down Expand Up @@ -55,8 +54,7 @@ func (s *nodeLister) List(selector labels.Selector) (ret []*api.Node, err error)

// Get retrieves the Node from the index for a given name.
func (s *nodeLister) Get(name string) (*api.Node, error) {
key := &api.Node{ObjectMeta: v1.ObjectMeta{Name: name}}
obj, exists, err := s.indexer.Get(key)
obj, exists, err := s.indexer.GetByKey(name)
if err != nil {
return nil, err
}
Expand Down
Loading