6
6
"strings"
7
7
8
8
log "github.com/sirupsen/logrus"
9
- k8serrors "k8s.io/apimachinery/pkg/api/errors"
9
+ apierrors "k8s.io/apimachinery/pkg/api/errors"
10
10
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
11
11
apiregistrationv1 "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1"
12
12
@@ -26,7 +26,7 @@ func (i *StrategyDeploymentInstaller) createOrUpdateAPIService(caPEM []byte, des
26
26
exists := true
27
27
apiService , err := i .strategyClient .GetOpLister ().APIRegistrationV1 ().APIServiceLister ().Get (apiServiceName )
28
28
if err != nil {
29
- if ! k8serrors .IsNotFound (err ) {
29
+ if ! apierrors .IsNotFound (err ) {
30
30
return err
31
31
}
32
32
@@ -120,14 +120,14 @@ func IsAPIServiceAdoptable(opLister operatorlister.OperatorLister, target *v1alp
120
120
121
121
// Get the CSV that target replaces
122
122
replacing , replaceGetErr := opLister .OperatorsV1alpha1 ().ClusterServiceVersionLister ().ClusterServiceVersions (target .GetNamespace ()).Get (target .Spec .Replaces )
123
- if replaceGetErr != nil && ! k8serrors .IsNotFound (replaceGetErr ) && ! k8serrors .IsGone (replaceGetErr ) {
123
+ if replaceGetErr != nil && ! apierrors .IsNotFound (replaceGetErr ) && ! apierrors .IsGone (replaceGetErr ) {
124
124
err = replaceGetErr
125
125
return
126
126
}
127
127
128
128
// Get the current owner CSV of the APIService
129
129
currentOwnerCSV , ownerGetErr := opLister .OperatorsV1alpha1 ().ClusterServiceVersionLister ().ClusterServiceVersions (ownerNamespace ).Get (ownerName )
130
- if ownerGetErr != nil && ! k8serrors .IsNotFound (ownerGetErr ) && ! k8serrors .IsGone (ownerGetErr ) {
130
+ if ownerGetErr != nil && ! apierrors .IsNotFound (ownerGetErr ) && ! apierrors .IsGone (ownerGetErr ) {
131
131
err = ownerGetErr
132
132
return
133
133
}
@@ -179,13 +179,13 @@ func (i *StrategyDeploymentInstaller) deleteLegacyAPIServiceResources(desc apiSe
179
179
// Attempt to delete the legacy Service.
180
180
existingService , err := i .strategyClient .GetOpClient ().GetService (namespace , legacyServiceName )
181
181
if err != nil {
182
- if ! k8serrors .IsNotFound (err ) {
182
+ if ! apierrors .IsNotFound (err ) {
183
183
return err
184
184
}
185
185
} else if ownerutil .AdoptableLabels (existingService .GetLabels (), true , i .owner ) {
186
186
logger .Infof ("Deleting Service with legacy APIService name %s" , existingService .Name )
187
187
err = i .strategyClient .GetOpClient ().DeleteService (namespace , legacyServiceName , & metav1.DeleteOptions {})
188
- if err != nil && ! k8serrors .IsNotFound (err ) {
188
+ if err != nil && ! apierrors .IsNotFound (err ) {
189
189
return err
190
190
}
191
191
} else {
@@ -198,13 +198,13 @@ func (i *StrategyDeploymentInstaller) deleteLegacyAPIServiceResources(desc apiSe
198
198
// Attempt to delete the legacy Secret.
199
199
existingSecret , err := i .strategyClient .GetOpClient ().GetSecret (namespace , SecretName (apiServiceName ))
200
200
if err != nil {
201
- if ! k8serrors .IsNotFound (err ) {
201
+ if ! apierrors .IsNotFound (err ) {
202
202
return err
203
203
}
204
204
} else if ownerutil .AdoptableLabels (existingSecret .GetLabels (), true , i .owner ) {
205
205
logger .Infof ("Deleting Secret with legacy APIService name %s" , existingSecret .Name )
206
206
err = i .strategyClient .GetOpClient ().DeleteSecret (namespace , SecretName (apiServiceName ), & metav1.DeleteOptions {})
207
- if err != nil && ! k8serrors .IsNotFound (err ) {
207
+ if err != nil && ! apierrors .IsNotFound (err ) {
208
208
return err
209
209
}
210
210
} else {
@@ -214,13 +214,13 @@ func (i *StrategyDeploymentInstaller) deleteLegacyAPIServiceResources(desc apiSe
214
214
// Attempt to delete the legacy Role.
215
215
existingRole , err := i .strategyClient .GetOpClient ().GetRole (namespace , SecretName (apiServiceName ))
216
216
if err != nil {
217
- if ! k8serrors .IsNotFound (err ) {
217
+ if ! apierrors .IsNotFound (err ) {
218
218
return err
219
219
}
220
220
} else if ownerutil .AdoptableLabels (existingRole .GetLabels (), true , i .owner ) {
221
221
logger .Infof ("Deleting Role with legacy APIService name %s" , existingRole .Name )
222
222
err = i .strategyClient .GetOpClient ().DeleteRole (namespace , SecretName (apiServiceName ), & metav1.DeleteOptions {})
223
- if err != nil && ! k8serrors .IsNotFound (err ) {
223
+ if err != nil && ! apierrors .IsNotFound (err ) {
224
224
return err
225
225
}
226
226
} else {
@@ -230,13 +230,13 @@ func (i *StrategyDeploymentInstaller) deleteLegacyAPIServiceResources(desc apiSe
230
230
// Attempt to delete the legacy secret RoleBinding.
231
231
existingRoleBinding , err := i .strategyClient .GetOpClient ().GetRoleBinding (namespace , SecretName (apiServiceName ))
232
232
if err != nil {
233
- if ! k8serrors .IsNotFound (err ) {
233
+ if ! apierrors .IsNotFound (err ) {
234
234
return err
235
235
}
236
236
} else if ownerutil .AdoptableLabels (existingRoleBinding .GetLabels (), true , i .owner ) {
237
237
logger .Infof ("Deleting RoleBinding with legacy APIService name %s" , existingRoleBinding .Name )
238
238
err = i .strategyClient .GetOpClient ().DeleteRoleBinding (namespace , SecretName (apiServiceName ), & metav1.DeleteOptions {})
239
- if err != nil && ! k8serrors .IsNotFound (err ) {
239
+ if err != nil && ! apierrors .IsNotFound (err ) {
240
240
return err
241
241
}
242
242
} else {
@@ -246,13 +246,13 @@ func (i *StrategyDeploymentInstaller) deleteLegacyAPIServiceResources(desc apiSe
246
246
// Attempt to delete the legacy ClusterRoleBinding.
247
247
existingClusterRoleBinding , err := i .strategyClient .GetOpClient ().GetClusterRoleBinding (apiServiceName + "-system:auth-delegator" )
248
248
if err != nil {
249
- if ! k8serrors .IsNotFound (err ) {
249
+ if ! apierrors .IsNotFound (err ) {
250
250
return err
251
251
}
252
252
} else if ownerutil .AdoptableLabels (existingClusterRoleBinding .GetLabels (), true , i .owner ) {
253
253
logger .Infof ("Deleting ClusterRoleBinding with legacy APIService name %s" , existingClusterRoleBinding .Name )
254
254
err = i .strategyClient .GetOpClient ().DeleteClusterRoleBinding (apiServiceName + "-system:auth-delegator" , & metav1.DeleteOptions {})
255
- if err != nil && ! k8serrors .IsNotFound (err ) {
255
+ if err != nil && ! apierrors .IsNotFound (err ) {
256
256
return err
257
257
}
258
258
} else {
@@ -262,13 +262,13 @@ func (i *StrategyDeploymentInstaller) deleteLegacyAPIServiceResources(desc apiSe
262
262
// Attempt to delete the legacy AuthReadingRoleBinding.
263
263
existingRoleBinding , err = i .strategyClient .GetOpClient ().GetRoleBinding (KubeSystem , apiServiceName + "-auth-reader" )
264
264
if err != nil {
265
- if ! k8serrors .IsNotFound (err ) {
265
+ if ! apierrors .IsNotFound (err ) {
266
266
return err
267
267
}
268
268
} else if ownerutil .AdoptableLabels (existingRoleBinding .GetLabels (), true , i .owner ) {
269
269
logger .Infof ("Deleting RoleBinding with legacy APIService name %s" , existingRoleBinding .Name )
270
270
err = i .strategyClient .GetOpClient ().DeleteRoleBinding (KubeSystem , apiServiceName + "-auth-reader" , & metav1.DeleteOptions {})
271
- if err != nil && ! k8serrors .IsNotFound (err ) {
271
+ if err != nil && ! apierrors .IsNotFound (err ) {
272
272
return err
273
273
}
274
274
} else {
0 commit comments