mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	add missing alias of api errors under test
This commit is contained in:
		@@ -933,7 +933,7 @@ func (e *Store) Delete(ctx context.Context, name string, deleteValidation rest.V
 | 
				
			|||||||
		if err == nil && deleteImmediately && preconditions.ResourceVersion != nil {
 | 
							if err == nil && deleteImmediately && preconditions.ResourceVersion != nil {
 | 
				
			||||||
			accessor, err = meta.Accessor(out)
 | 
								accessor, err = meta.Accessor(out)
 | 
				
			||||||
			if err != nil {
 | 
								if err != nil {
 | 
				
			||||||
				return out, false, kubeerr.NewInternalError(err)
 | 
									return out, false, apierrors.NewInternalError(err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			resourceVersion := accessor.GetResourceVersion()
 | 
								resourceVersion := accessor.GetResourceVersion()
 | 
				
			||||||
			preconditions.ResourceVersion = &resourceVersion
 | 
								preconditions.ResourceVersion = &resourceVersion
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -27,7 +27,7 @@ import (
 | 
				
			|||||||
	"github.com/onsi/gomega"
 | 
						"github.com/onsi/gomega"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	"k8s.io/apiserver/pkg/features"
 | 
						"k8s.io/apiserver/pkg/features"
 | 
				
			||||||
@@ -153,11 +153,11 @@ var _ = SIGDescribe("Servers with support for API chunking", func() {
 | 
				
			|||||||
				framework.Logf("Token %s has not expired yet", firstToken)
 | 
									framework.Logf("Token %s has not expired yet", firstToken)
 | 
				
			||||||
				return false, nil
 | 
									return false, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			if err != nil && !errors.IsResourceExpired(err) {
 | 
								if err != nil && !apierrors.IsResourceExpired(err) {
 | 
				
			||||||
				return false, err
 | 
									return false, err
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			framework.Logf("got error %s", err)
 | 
								framework.Logf("got error %s", err)
 | 
				
			||||||
			status, ok := err.(errors.APIStatus)
 | 
								status, ok := err.(apierrors.APIStatus)
 | 
				
			||||||
			if !ok {
 | 
								if !ok {
 | 
				
			||||||
				return false, fmt.Errorf("expect error to implement the APIStatus interface, got %v", reflect.TypeOf(err))
 | 
									return false, fmt.Errorf("expect error to implement the APIStatus interface, got %v", reflect.TypeOf(err))
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -26,7 +26,7 @@ import (
 | 
				
			|||||||
	appsv1 "k8s.io/api/apps/v1"
 | 
						appsv1 "k8s.io/api/apps/v1"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	rbacv1 "k8s.io/api/rbac/v1"
 | 
						rbacv1 "k8s.io/api/rbac/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						"k8s.io/apimachinery/pkg/util/intstr"
 | 
				
			||||||
@@ -236,7 +236,7 @@ func createAuthReaderRoleBindingForCRDConversion(f *framework.Framework, namespa
 | 
				
			|||||||
			},
 | 
								},
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
	if err != nil && errors.IsAlreadyExists(err) {
 | 
						if err != nil && apierrors.IsAlreadyExists(err) {
 | 
				
			||||||
		framework.Logf("role binding %s already exists", roleBindingCRDName)
 | 
							framework.Logf("role binding %s already exists", roleBindingCRDName)
 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		framework.ExpectNoError(err, "creating role binding %s:webhook to access configMap", namespace)
 | 
							framework.ExpectNoError(err, "creating role binding %s:webhook to access configMap", namespace)
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -28,7 +28,7 @@ import (
 | 
				
			|||||||
	apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
 | 
						apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
 | 
				
			||||||
	apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
						apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
				
			||||||
	apiextensionstestserver "k8s.io/apiextensions-apiserver/test/integration/fixtures"
 | 
						apiextensionstestserver "k8s.io/apiextensions-apiserver/test/integration/fixtures"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						"k8s.io/apimachinery/pkg/runtime/schema"
 | 
				
			||||||
@@ -667,7 +667,7 @@ var _ = SIGDescribe("Garbage collector", func() {
 | 
				
			|||||||
				framework.Logf("")
 | 
									framework.Logf("")
 | 
				
			||||||
				return false, nil
 | 
									return false, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			if errors.IsNotFound(err) {
 | 
								if apierrors.IsNotFound(err) {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
@@ -769,7 +769,7 @@ var _ = SIGDescribe("Garbage collector", func() {
 | 
				
			|||||||
				framework.Logf("")
 | 
									framework.Logf("")
 | 
				
			||||||
				return false, nil
 | 
									return false, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			if errors.IsNotFound(err) {
 | 
								if apierrors.IsNotFound(err) {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
@@ -882,7 +882,7 @@ var _ = SIGDescribe("Garbage collector", func() {
 | 
				
			|||||||
		definition := apiextensionstestserver.NewRandomNameV1CustomResourceDefinition(apiextensionsv1.ClusterScoped)
 | 
							definition := apiextensionstestserver.NewRandomNameV1CustomResourceDefinition(apiextensionsv1.ClusterScoped)
 | 
				
			||||||
		defer func() {
 | 
							defer func() {
 | 
				
			||||||
			err = apiextensionstestserver.DeleteV1CustomResourceDefinition(definition, apiExtensionClient)
 | 
								err = apiextensionstestserver.DeleteV1CustomResourceDefinition(definition, apiExtensionClient)
 | 
				
			||||||
			if err != nil && !errors.IsNotFound(err) {
 | 
								if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
				framework.Failf("failed to delete CustomResourceDefinition: %v", err)
 | 
									framework.Failf("failed to delete CustomResourceDefinition: %v", err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}()
 | 
							}()
 | 
				
			||||||
@@ -951,7 +951,7 @@ var _ = SIGDescribe("Garbage collector", func() {
 | 
				
			|||||||
		// Ensure the dependent is deleted.
 | 
							// Ensure the dependent is deleted.
 | 
				
			||||||
		if err := wait.Poll(5*time.Second, 60*time.Second, func() (bool, error) {
 | 
							if err := wait.Poll(5*time.Second, 60*time.Second, func() (bool, error) {
 | 
				
			||||||
			_, err := resourceClient.Get(dependentName, metav1.GetOptions{})
 | 
								_, err := resourceClient.Get(dependentName, metav1.GetOptions{})
 | 
				
			||||||
			return errors.IsNotFound(err), nil
 | 
								return apierrors.IsNotFound(err), nil
 | 
				
			||||||
		}); err != nil {
 | 
							}); err != nil {
 | 
				
			||||||
			framework.Logf("owner: %#v", persistedOwner)
 | 
								framework.Logf("owner: %#v", persistedOwner)
 | 
				
			||||||
			framework.Logf("dependent: %#v", persistedDependent)
 | 
								framework.Logf("dependent: %#v", persistedDependent)
 | 
				
			||||||
@@ -963,7 +963,7 @@ var _ = SIGDescribe("Garbage collector", func() {
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			framework.Failf("expected owner resource %q to be deleted", ownerName)
 | 
								framework.Failf("expected owner resource %q to be deleted", ownerName)
 | 
				
			||||||
		} else {
 | 
							} else {
 | 
				
			||||||
			if !errors.IsNotFound(err) {
 | 
								if !apierrors.IsNotFound(err) {
 | 
				
			||||||
				framework.Failf("unexpected error getting owner resource %q: %v", ownerName, err)
 | 
									framework.Failf("unexpected error getting owner resource %q: %v", ownerName, err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -985,7 +985,7 @@ var _ = SIGDescribe("Garbage collector", func() {
 | 
				
			|||||||
		definition := apiextensionstestserver.NewRandomNameV1CustomResourceDefinition(apiextensionsv1.ClusterScoped)
 | 
							definition := apiextensionstestserver.NewRandomNameV1CustomResourceDefinition(apiextensionsv1.ClusterScoped)
 | 
				
			||||||
		defer func() {
 | 
							defer func() {
 | 
				
			||||||
			err = apiextensionstestserver.DeleteV1CustomResourceDefinition(definition, apiExtensionClient)
 | 
								err = apiextensionstestserver.DeleteV1CustomResourceDefinition(definition, apiExtensionClient)
 | 
				
			||||||
			if err != nil && !errors.IsNotFound(err) {
 | 
								if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
				framework.Failf("failed to delete CustomResourceDefinition: %v", err)
 | 
									framework.Failf("failed to delete CustomResourceDefinition: %v", err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}()
 | 
							}()
 | 
				
			||||||
@@ -1056,7 +1056,7 @@ var _ = SIGDescribe("Garbage collector", func() {
 | 
				
			|||||||
			if err == nil {
 | 
								if err == nil {
 | 
				
			||||||
				return false, nil
 | 
									return false, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			if err != nil && !errors.IsNotFound(err) {
 | 
								if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
				return false, fmt.Errorf("failed to get owner: %v", err)
 | 
									return false, fmt.Errorf("failed to get owner: %v", err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						"k8s.io/apimachinery/pkg/util/intstr"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
@@ -121,7 +121,7 @@ func ensurePodsAreRemovedWhenNamespaceIsDeleted(f *framework.Framework) {
 | 
				
			|||||||
	framework.ExpectNoError(wait.Poll(1*time.Second, time.Duration(maxWaitSeconds)*time.Second,
 | 
						framework.ExpectNoError(wait.Poll(1*time.Second, time.Duration(maxWaitSeconds)*time.Second,
 | 
				
			||||||
		func() (bool, error) {
 | 
							func() (bool, error) {
 | 
				
			||||||
			_, err = f.ClientSet.CoreV1().Namespaces().Get(namespace.Name, metav1.GetOptions{})
 | 
								_, err = f.ClientSet.CoreV1().Namespaces().Get(namespace.Name, metav1.GetOptions{})
 | 
				
			||||||
			if err != nil && errors.IsNotFound(err) {
 | 
								if err != nil && apierrors.IsNotFound(err) {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
@@ -178,7 +178,7 @@ func ensureServicesAreRemovedWhenNamespaceIsDeleted(f *framework.Framework) {
 | 
				
			|||||||
	framework.ExpectNoError(wait.Poll(1*time.Second, time.Duration(maxWaitSeconds)*time.Second,
 | 
						framework.ExpectNoError(wait.Poll(1*time.Second, time.Duration(maxWaitSeconds)*time.Second,
 | 
				
			||||||
		func() (bool, error) {
 | 
							func() (bool, error) {
 | 
				
			||||||
			_, err = f.ClientSet.CoreV1().Namespaces().Get(namespace.Name, metav1.GetOptions{})
 | 
								_, err = f.ClientSet.CoreV1().Namespaces().Get(namespace.Name, metav1.GetOptions{})
 | 
				
			||||||
			if err != nil && errors.IsNotFound(err) {
 | 
								if err != nil && apierrors.IsNotFound(err) {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
	g "github.com/onsi/ginkgo"
 | 
						g "github.com/onsi/ginkgo"
 | 
				
			||||||
	o "github.com/onsi/gomega"
 | 
						o "github.com/onsi/gomega"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/watch"
 | 
						"k8s.io/apimachinery/pkg/watch"
 | 
				
			||||||
	"k8s.io/client-go/kubernetes"
 | 
						"k8s.io/client-go/kubernetes"
 | 
				
			||||||
@@ -63,16 +63,16 @@ var _ = SIGDescribe("client-go should negotiate", func() {
 | 
				
			|||||||
			case watch.Added, watch.Modified:
 | 
								case watch.Added, watch.Modified:
 | 
				
			||||||
				// this is allowed
 | 
									// this is allowed
 | 
				
			||||||
			case watch.Error:
 | 
								case watch.Error:
 | 
				
			||||||
				err := errors.FromObject(evt.Object)
 | 
									err := apierrors.FromObject(evt.Object)
 | 
				
			||||||
				// In Kubernetes 1.17 and earlier, the api server returns both apierrs.StatusReasonExpired and
 | 
									// In Kubernetes 1.17 and earlier, the api server returns both apierrors.StatusReasonExpired and
 | 
				
			||||||
				// apierrs.StatusReasonGone for HTTP 410 (Gone) status code responses. In 1.18 the kube server is more consistent
 | 
									// apierrors.StatusReasonGone for HTTP 410 (Gone) status code responses. In 1.18 the kube server is more consistent
 | 
				
			||||||
				// and always returns apierrs.StatusReasonExpired. For backward compatibility we can only remove the apierrs.IsGone
 | 
									// and always returns apierrors.StatusReasonExpired. For backward compatibility we can only remove the apierrs.IsGone
 | 
				
			||||||
				// check when we fully drop support for Kubernetes 1.17 servers from reflectors.
 | 
									// check when we fully drop support for Kubernetes 1.17 servers from reflectors.
 | 
				
			||||||
				if errors.IsGone(err) || errors.IsResourceExpired(err) {
 | 
									if apierrors.IsGone(err) || apierrors.IsResourceExpired(err) {
 | 
				
			||||||
					// this is allowed, since the kubernetes object could be very old
 | 
										// this is allowed, since the kubernetes object could be very old
 | 
				
			||||||
					break
 | 
										break
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				if errors.IsUnexpectedObjectError(err) {
 | 
									if apierrors.IsUnexpectedObjectError(err) {
 | 
				
			||||||
					g.Fail(fmt.Sprintf("unexpected object, wanted v1.Status: %#v", evt.Object))
 | 
										g.Fail(fmt.Sprintf("unexpected object, wanted v1.Status: %#v", evt.Object))
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				g.Fail(fmt.Sprintf("unexpected error: %#v", evt.Object))
 | 
									g.Fail(fmt.Sprintf("unexpected error: %#v", evt.Object))
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -24,7 +24,7 @@ import (
 | 
				
			|||||||
	appsv1 "k8s.io/api/apps/v1"
 | 
						appsv1 "k8s.io/api/apps/v1"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	schedulingv1 "k8s.io/api/scheduling/v1"
 | 
						schedulingv1 "k8s.io/api/scheduling/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
@@ -886,7 +886,7 @@ var _ = SIGDescribe("ResourceQuota", func() {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		ginkgo.By("Verifying the deleted ResourceQuota")
 | 
							ginkgo.By("Verifying the deleted ResourceQuota")
 | 
				
			||||||
		_, err = client.CoreV1().ResourceQuotas(ns).Get(quotaName, metav1.GetOptions{})
 | 
							_, err = client.CoreV1().ResourceQuotas(ns).Get(quotaName, metav1.GetOptions{})
 | 
				
			||||||
		framework.ExpectEqual(errors.IsNotFound(err), true)
 | 
							framework.ExpectEqual(apierrors.IsNotFound(err), true)
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
})
 | 
					})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1076,7 +1076,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
 | 
				
			|||||||
	ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.", func() {
 | 
						ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.", func() {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass1"}, Value: int32(1000)})
 | 
							_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass1"}, Value: int32(1000)})
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		hard := v1.ResourceList{}
 | 
							hard := v1.ResourceList{}
 | 
				
			||||||
		hard[v1.ResourcePods] = resource.MustParse("1")
 | 
							hard[v1.ResourcePods] = resource.MustParse("1")
 | 
				
			||||||
@@ -1115,7 +1115,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
 | 
				
			|||||||
	ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class.", func() {
 | 
						ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class.", func() {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass2"}, Value: int32(1000)})
 | 
							_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass2"}, Value: int32(1000)})
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		hard := v1.ResourceList{}
 | 
							hard := v1.ResourceList{}
 | 
				
			||||||
		hard[v1.ResourcePods] = resource.MustParse("1")
 | 
							hard[v1.ResourcePods] = resource.MustParse("1")
 | 
				
			||||||
@@ -1160,7 +1160,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
 | 
				
			|||||||
	ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class.", func() {
 | 
						ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class.", func() {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass3"}, Value: int32(1000)})
 | 
							_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass3"}, Value: int32(1000)})
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		hard := v1.ResourceList{}
 | 
							hard := v1.ResourceList{}
 | 
				
			||||||
		hard[v1.ResourcePods] = resource.MustParse("1")
 | 
							hard[v1.ResourcePods] = resource.MustParse("1")
 | 
				
			||||||
@@ -1206,10 +1206,10 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	ginkgo.It("should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes.", func() {
 | 
						ginkgo.It("should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes.", func() {
 | 
				
			||||||
		_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass5"}, Value: int32(1000)})
 | 
							_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass5"}, Value: int32(1000)})
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err = f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass6"}, Value: int32(1000)})
 | 
							_, err = f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass6"}, Value: int32(1000)})
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		hard := v1.ResourceList{}
 | 
							hard := v1.ResourceList{}
 | 
				
			||||||
		hard[v1.ResourcePods] = resource.MustParse("2")
 | 
							hard[v1.ResourcePods] = resource.MustParse("2")
 | 
				
			||||||
@@ -1261,7 +1261,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
 | 
				
			|||||||
	ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn).", func() {
 | 
						ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn).", func() {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass7"}, Value: int32(1000)})
 | 
							_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass7"}, Value: int32(1000)})
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		hard := v1.ResourceList{}
 | 
							hard := v1.ResourceList{}
 | 
				
			||||||
		hard[v1.ResourcePods] = resource.MustParse("1")
 | 
							hard[v1.ResourcePods] = resource.MustParse("1")
 | 
				
			||||||
@@ -1295,7 +1295,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
 | 
				
			|||||||
	ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists).", func() {
 | 
						ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists).", func() {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass8"}, Value: int32(1000)})
 | 
							_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass8"}, Value: int32(1000)})
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		hard := v1.ResourceList{}
 | 
							hard := v1.ResourceList{}
 | 
				
			||||||
		hard[v1.ResourcePods] = resource.MustParse("1")
 | 
							hard[v1.ResourcePods] = resource.MustParse("1")
 | 
				
			||||||
@@ -1334,7 +1334,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
 | 
				
			|||||||
	ginkgo.It("should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class.", func() {
 | 
						ginkgo.It("should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class.", func() {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass9"}, Value: int32(1000)})
 | 
							_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: "pclass9"}, Value: int32(1000)})
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		hard := v1.ResourceList{}
 | 
							hard := v1.ResourceList{}
 | 
				
			||||||
		hard[v1.ResourcePods] = resource.MustParse("1")
 | 
							hard[v1.ResourcePods] = resource.MustParse("1")
 | 
				
			||||||
@@ -1714,7 +1714,7 @@ func updateResourceQuotaUntilUsageAppears(c clientset.Interface, ns, quotaName s
 | 
				
			|||||||
		resourceQuota.Spec.Hard[resourceName] = current
 | 
							resourceQuota.Spec.Hard[resourceName] = current
 | 
				
			||||||
		_, err = c.CoreV1().ResourceQuotas(ns).Update(resourceQuota)
 | 
							_, err = c.CoreV1().ResourceQuotas(ns).Update(resourceQuota)
 | 
				
			||||||
		// ignoring conflicts since someone else may already updated it.
 | 
							// ignoring conflicts since someone else may already updated it.
 | 
				
			||||||
		if errors.IsConflict(err) {
 | 
							if apierrors.IsConflict(err) {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		return false, err
 | 
							return false, err
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -27,7 +27,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	authorizationv1 "k8s.io/api/authorization/v1"
 | 
						authorizationv1 "k8s.io/api/authorization/v1"
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	metav1beta1 "k8s.io/apimachinery/pkg/apis/meta/v1beta1"
 | 
						metav1beta1 "k8s.io/apimachinery/pkg/apis/meta/v1beta1"
 | 
				
			||||||
	"k8s.io/client-go/util/workqueue"
 | 
						"k8s.io/client-go/util/workqueue"
 | 
				
			||||||
@@ -164,7 +164,7 @@ var _ = SIGDescribe("Servers with support for Table transformation", func() {
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
		err := c.AuthorizationV1().RESTClient().Post().Resource("selfsubjectaccessreviews").SetHeader("Accept", "application/json;as=Table;v=v1;g=meta.k8s.io").Body(sar).Do().Into(table)
 | 
							err := c.AuthorizationV1().RESTClient().Post().Resource("selfsubjectaccessreviews").SetHeader("Accept", "application/json;as=Table;v=v1;g=meta.k8s.io").Body(sar).Do().Into(table)
 | 
				
			||||||
		framework.ExpectError(err, "failed to return error when posting self subject access review: %+v, to a backend that does not implement metadata", sar)
 | 
							framework.ExpectError(err, "failed to return error when posting self subject access review: %+v, to a backend that does not implement metadata", sar)
 | 
				
			||||||
		framework.ExpectEqual(err.(errors.APIStatus).Status().Code, int32(406))
 | 
							framework.ExpectEqual(err.(apierrors.APIStatus).Status().Code, int32(406))
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
})
 | 
					})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -30,7 +30,7 @@ import (
 | 
				
			|||||||
	rbacv1 "k8s.io/api/rbac/v1"
 | 
						rbacv1 "k8s.io/api/rbac/v1"
 | 
				
			||||||
	apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
 | 
						apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
 | 
				
			||||||
	crdclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
						crdclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
@@ -739,7 +739,7 @@ func createAuthReaderRoleBinding(f *framework.Framework, namespace string) {
 | 
				
			|||||||
			},
 | 
								},
 | 
				
			||||||
		},
 | 
							},
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
	if err != nil && errors.IsAlreadyExists(err) {
 | 
						if err != nil && apierrors.IsAlreadyExists(err) {
 | 
				
			||||||
		framework.Logf("role binding %s already exists", roleBindingName)
 | 
							framework.Logf("role binding %s already exists", roleBindingName)
 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		framework.ExpectNoError(err, "creating role binding %s:webhook to access configMap", namespace)
 | 
							framework.ExpectNoError(err, "creating role binding %s:webhook to access configMap", namespace)
 | 
				
			||||||
@@ -1120,7 +1120,7 @@ func testWebhook(f *framework.Framework) {
 | 
				
			|||||||
		framework.Failf("expect error %q, got %q", "deadline", err.Error())
 | 
							framework.Failf("expect error %q, got %q", "deadline", err.Error())
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	// ensure the pod was not actually created
 | 
						// ensure the pod was not actually created
 | 
				
			||||||
	if _, err := client.CoreV1().Pods(f.Namespace.Name).Get(pod.Name, metav1.GetOptions{}); !errors.IsNotFound(err) {
 | 
						if _, err := client.CoreV1().Pods(f.Namespace.Name).Get(pod.Name, metav1.GetOptions{}); !apierrors.IsNotFound(err) {
 | 
				
			||||||
		framework.Failf("expect notfound error looking for rejected pod, got %v", err)
 | 
							framework.Failf("expect notfound error looking for rejected pod, got %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1296,7 +1296,7 @@ func testFailClosedWebhook(f *framework.Framework) {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
	_, err = client.CoreV1().ConfigMaps(failNamespaceName).Create(configmap)
 | 
						_, err = client.CoreV1().ConfigMaps(failNamespaceName).Create(configmap)
 | 
				
			||||||
	framework.ExpectError(err, "create configmap in namespace: %s should be unconditionally rejected by the webhook", failNamespaceName)
 | 
						framework.ExpectError(err, "create configmap in namespace: %s should be unconditionally rejected by the webhook", failNamespaceName)
 | 
				
			||||||
	if !errors.IsInternalError(err) {
 | 
						if !apierrors.IsInternalError(err) {
 | 
				
			||||||
		framework.Failf("expect an internal error, got %#v", err)
 | 
							framework.Failf("expect an internal error, got %#v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
@@ -1661,7 +1661,7 @@ func updateConfigMap(c clientset.Interface, ns, name string, update updateConfig
 | 
				
			|||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		// Only retry update on conflict
 | 
							// Only retry update on conflict
 | 
				
			||||||
		if !errors.IsConflict(err) {
 | 
							if !apierrors.IsConflict(err) {
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		return false, nil
 | 
							return false, nil
 | 
				
			||||||
@@ -1683,7 +1683,7 @@ func updateCustomResource(c dynamic.ResourceInterface, ns, name string, update u
 | 
				
			|||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		// Only retry update on conflict
 | 
							// Only retry update on conflict
 | 
				
			||||||
		if !errors.IsConflict(err) {
 | 
							if !apierrors.IsConflict(err) {
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		return false, nil
 | 
							return false, nil
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -26,7 +26,7 @@ import (
 | 
				
			|||||||
	batchv1 "k8s.io/api/batch/v1"
 | 
						batchv1 "k8s.io/api/batch/v1"
 | 
				
			||||||
	batchv1beta1 "k8s.io/api/batch/v1beta1"
 | 
						batchv1beta1 "k8s.io/api/batch/v1beta1"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	clientset "k8s.io/client-go/kubernetes"
 | 
						clientset "k8s.io/client-go/kubernetes"
 | 
				
			||||||
@@ -214,7 +214,7 @@ var _ = SIGDescribe("CronJob", func() {
 | 
				
			|||||||
		ginkgo.By("Ensuring job was deleted")
 | 
							ginkgo.By("Ensuring job was deleted")
 | 
				
			||||||
		_, err = jobutil.GetJob(f.ClientSet, f.Namespace.Name, job.Name)
 | 
							_, err = jobutil.GetJob(f.ClientSet, f.Namespace.Name, job.Name)
 | 
				
			||||||
		framework.ExpectError(err)
 | 
							framework.ExpectError(err)
 | 
				
			||||||
		framework.ExpectEqual(errors.IsNotFound(err), true)
 | 
							framework.ExpectEqual(apierrors.IsNotFound(err), true)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		ginkgo.By("Ensuring the job is not in the cronjob active list")
 | 
							ginkgo.By("Ensuring the job is not in the cronjob active list")
 | 
				
			||||||
		err = waitForJobNotActive(f.ClientSet, f.Namespace.Name, cronJob.Name, job.Name)
 | 
							err = waitForJobNotActive(f.ClientSet, f.Namespace.Name, cronJob.Name, job.Name)
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -29,7 +29,7 @@ import (
 | 
				
			|||||||
	appsv1 "k8s.io/api/apps/v1"
 | 
						appsv1 "k8s.io/api/apps/v1"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	extensionsv1beta1 "k8s.io/api/extensions/v1beta1"
 | 
						extensionsv1beta1 "k8s.io/api/extensions/v1beta1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
@@ -206,7 +206,7 @@ func stopDeployment(c clientset.Interface, ns, deploymentName string) {
 | 
				
			|||||||
	framework.Logf("Ensuring deployment %s was deleted", deploymentName)
 | 
						framework.Logf("Ensuring deployment %s was deleted", deploymentName)
 | 
				
			||||||
	_, err = c.AppsV1().Deployments(ns).Get(deployment.Name, metav1.GetOptions{})
 | 
						_, err = c.AppsV1().Deployments(ns).Get(deployment.Name, metav1.GetOptions{})
 | 
				
			||||||
	framework.ExpectError(err)
 | 
						framework.ExpectError(err)
 | 
				
			||||||
	framework.ExpectEqual(errors.IsNotFound(err), true)
 | 
						framework.ExpectEqual(apierrors.IsNotFound(err), true)
 | 
				
			||||||
	framework.Logf("Ensuring deployment %s's RSes were deleted", deploymentName)
 | 
						framework.Logf("Ensuring deployment %s's RSes were deleted", deploymentName)
 | 
				
			||||||
	selector, err := metav1.LabelSelectorAsSelector(deployment.Spec.Selector)
 | 
						selector, err := metav1.LabelSelectorAsSelector(deployment.Spec.Selector)
 | 
				
			||||||
	framework.ExpectNoError(err)
 | 
						framework.ExpectNoError(err)
 | 
				
			||||||
@@ -615,7 +615,7 @@ func testIterativeDeployments(f *framework.Framework) {
 | 
				
			|||||||
				name := podList.Items[p].Name
 | 
									name := podList.Items[p].Name
 | 
				
			||||||
				framework.Logf("%02d: deleting deployment pod %q", i, name)
 | 
									framework.Logf("%02d: deleting deployment pod %q", i, name)
 | 
				
			||||||
				err := c.CoreV1().Pods(ns).Delete(name, nil)
 | 
									err := c.CoreV1().Pods(ns).Delete(name, nil)
 | 
				
			||||||
				if err != nil && !errors.IsNotFound(err) {
 | 
									if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
					framework.ExpectNoError(err)
 | 
										framework.ExpectNoError(err)
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -21,7 +21,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	batchinternal "k8s.io/kubernetes/pkg/apis/batch"
 | 
						batchinternal "k8s.io/kubernetes/pkg/apis/batch"
 | 
				
			||||||
	"k8s.io/kubernetes/test/e2e/framework"
 | 
						"k8s.io/kubernetes/test/e2e/framework"
 | 
				
			||||||
@@ -162,7 +162,7 @@ var _ = SIGDescribe("Job", func() {
 | 
				
			|||||||
		ginkgo.By("Ensuring job was deleted")
 | 
							ginkgo.By("Ensuring job was deleted")
 | 
				
			||||||
		_, err = jobutil.GetJob(f.ClientSet, f.Namespace.Name, job.Name)
 | 
							_, err = jobutil.GetJob(f.ClientSet, f.Namespace.Name, job.Name)
 | 
				
			||||||
		framework.ExpectError(err, "failed to ensure job %s was deleted in namespace: %s", job.Name, f.Namespace.Name)
 | 
							framework.ExpectError(err, "failed to ensure job %s was deleted in namespace: %s", job.Name, f.Namespace.Name)
 | 
				
			||||||
		framework.ExpectEqual(errors.IsNotFound(err), true)
 | 
							framework.ExpectEqual(apierrors.IsNotFound(err), true)
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/*
 | 
						/*
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -21,7 +21,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
@@ -287,7 +287,7 @@ func testRCAdoptMatchingOrphans(f *framework.Framework) {
 | 
				
			|||||||
	err = wait.PollImmediate(1*time.Second, 1*time.Minute, func() (bool, error) {
 | 
						err = wait.PollImmediate(1*time.Second, 1*time.Minute, func() (bool, error) {
 | 
				
			||||||
		p2, err := f.ClientSet.CoreV1().Pods(f.Namespace.Name).Get(p.Name, metav1.GetOptions{})
 | 
							p2, err := f.ClientSet.CoreV1().Pods(f.Namespace.Name).Get(p.Name, metav1.GetOptions{})
 | 
				
			||||||
		// The Pod p should either be adopted or deleted by the RC
 | 
							// The Pod p should either be adopted or deleted by the RC
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		framework.ExpectNoError(err)
 | 
							framework.ExpectNoError(err)
 | 
				
			||||||
@@ -323,7 +323,7 @@ func testRCReleaseControlledNotMatching(f *framework.Framework) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		pod.Labels = map[string]string{"name": "not-matching-name"}
 | 
							pod.Labels = map[string]string{"name": "not-matching-name"}
 | 
				
			||||||
		_, err = f.ClientSet.CoreV1().Pods(f.Namespace.Name).Update(pod)
 | 
							_, err = f.ClientSet.CoreV1().Pods(f.Namespace.Name).Update(pod)
 | 
				
			||||||
		if err != nil && errors.IsConflict(err) {
 | 
							if err != nil && apierrors.IsConflict(err) {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -22,7 +22,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	appsv1 "k8s.io/api/apps/v1"
 | 
						appsv1 "k8s.io/api/apps/v1"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
@@ -289,7 +289,7 @@ func testRSAdoptMatchingAndReleaseNotMatching(f *framework.Framework) {
 | 
				
			|||||||
	err = wait.PollImmediate(1*time.Second, 1*time.Minute, func() (bool, error) {
 | 
						err = wait.PollImmediate(1*time.Second, 1*time.Minute, func() (bool, error) {
 | 
				
			||||||
		p2, err := f.ClientSet.CoreV1().Pods(f.Namespace.Name).Get(p.Name, metav1.GetOptions{})
 | 
							p2, err := f.ClientSet.CoreV1().Pods(f.Namespace.Name).Get(p.Name, metav1.GetOptions{})
 | 
				
			||||||
		// The Pod p should either be adopted or deleted by the ReplicaSet
 | 
							// The Pod p should either be adopted or deleted by the ReplicaSet
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		framework.ExpectNoError(err)
 | 
							framework.ExpectNoError(err)
 | 
				
			||||||
@@ -315,7 +315,7 @@ func testRSAdoptMatchingAndReleaseNotMatching(f *framework.Framework) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		pod.Labels = map[string]string{"name": "not-matching-name"}
 | 
							pod.Labels = map[string]string{"name": "not-matching-name"}
 | 
				
			||||||
		_, err = f.ClientSet.CoreV1().Pods(f.Namespace.Name).Update(pod)
 | 
							_, err = f.ClientSet.CoreV1().Pods(f.Namespace.Name).Update(pod)
 | 
				
			||||||
		if err != nil && errors.IsConflict(err) {
 | 
							if err != nil && apierrors.IsConflict(err) {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	auditregistrationv1alpha1 "k8s.io/api/auditregistration/v1alpha1"
 | 
						auditregistrationv1alpha1 "k8s.io/api/auditregistration/v1alpha1"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						"k8s.io/apimachinery/pkg/util/intstr"
 | 
				
			||||||
@@ -111,7 +111,7 @@ var _ = SIGDescribe("[Feature:DynamicAudit]", func() {
 | 
				
			|||||||
		// get pod ip
 | 
							// get pod ip
 | 
				
			||||||
		err = wait.Poll(100*time.Millisecond, 10*time.Second, func() (done bool, err error) {
 | 
							err = wait.Poll(100*time.Millisecond, 10*time.Second, func() (done bool, err error) {
 | 
				
			||||||
			p, err := f.ClientSet.CoreV1().Pods(namespace).Get("audit-proxy", metav1.GetOptions{})
 | 
								p, err := f.ClientSet.CoreV1().Pods(namespace).Get("audit-proxy", metav1.GetOptions{})
 | 
				
			||||||
			if errors.IsNotFound(err) {
 | 
								if apierrors.IsNotFound(err) {
 | 
				
			||||||
				framework.Logf("waiting for audit-proxy pod to be present")
 | 
									framework.Logf("waiting for audit-proxy pod to be present")
 | 
				
			||||||
				return false, nil
 | 
									return false, nil
 | 
				
			||||||
			} else if err != nil {
 | 
								} else if err != nil {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -31,7 +31,7 @@ import (
 | 
				
			|||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	policyv1beta1 "k8s.io/api/policy/v1beta1"
 | 
						policyv1beta1 "k8s.io/api/policy/v1beta1"
 | 
				
			||||||
	schedulingv1 "k8s.io/api/scheduling/v1"
 | 
						schedulingv1 "k8s.io/api/scheduling/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/fields"
 | 
						"k8s.io/apimachinery/pkg/fields"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
@@ -1476,7 +1476,7 @@ func makeNodeUnschedulable(c clientset.Interface, node *v1.Node) error {
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			return nil
 | 
								return nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if !errors.IsConflict(err) {
 | 
							if !apierrors.IsConflict(err) {
 | 
				
			||||||
			return err
 | 
								return err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		klog.Warningf("Got 409 conflict when trying to taint node, retries left: %v", 3-j)
 | 
							klog.Warningf("Got 409 conflict when trying to taint node, retries left: %v", 3-j)
 | 
				
			||||||
@@ -1517,7 +1517,7 @@ func makeNodeSchedulable(c clientset.Interface, node *v1.Node, failOnCriticalAdd
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			return nil
 | 
								return nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if !errors.IsConflict(err) {
 | 
							if !apierrors.IsConflict(err) {
 | 
				
			||||||
			return err
 | 
								return err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		klog.Warningf("Got 409 conflict when trying to taint node, retries left: %v", 3-j)
 | 
							klog.Warningf("Got 409 conflict when trying to taint node, retries left: %v", 3-j)
 | 
				
			||||||
@@ -1692,7 +1692,7 @@ func runReplicatedPodOnEachNode(f *framework.Framework, nodes []v1.Node, namespa
 | 
				
			|||||||
			if err == nil {
 | 
								if err == nil {
 | 
				
			||||||
				break
 | 
									break
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			if !errors.IsConflict(err) {
 | 
								if !apierrors.IsConflict(err) {
 | 
				
			||||||
				return err
 | 
									return err
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			klog.Warningf("Got 409 conflict when trying to scale RC, retries left: %v", 3-j)
 | 
								klog.Warningf("Got 409 conflict when trying to scale RC, retries left: %v", 3-j)
 | 
				
			||||||
@@ -1936,7 +1936,7 @@ func createPriorityClasses(f *framework.Framework) func() {
 | 
				
			|||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			klog.Errorf("Error creating priority class: %v", err)
 | 
								klog.Errorf("Error creating priority class: %v", err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
							framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return func() {
 | 
						return func() {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -21,7 +21,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/uuid"
 | 
						"k8s.io/apimachinery/pkg/util/uuid"
 | 
				
			||||||
	podutil "k8s.io/kubernetes/pkg/api/v1/pod"
 | 
						podutil "k8s.io/kubernetes/pkg/api/v1/pod"
 | 
				
			||||||
@@ -105,7 +105,7 @@ func (cc *ConformanceContainer) Present() (bool, error) {
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		return true, nil
 | 
							return true, nil
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if errors.IsNotFound(err) {
 | 
						if apierrors.IsNotFound(err) {
 | 
				
			||||||
		return false, nil
 | 
							return false, nil
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	return false, err
 | 
						return false, err
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	coordinationv1 "k8s.io/api/coordination/v1"
 | 
						coordinationv1 "k8s.io/api/coordination/v1"
 | 
				
			||||||
	apiequality "k8s.io/apimachinery/pkg/api/equality"
 | 
						apiequality "k8s.io/apimachinery/pkg/api/equality"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
@@ -154,6 +154,6 @@ var _ = framework.KubeDescribe("Lease", func() {
 | 
				
			|||||||
		framework.ExpectNoError(err, "deleting Lease failed")
 | 
							framework.ExpectNoError(err, "deleting Lease failed")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err = leaseClient.Get(name, metav1.GetOptions{})
 | 
							_, err = leaseClient.Get(name, metav1.GetOptions{})
 | 
				
			||||||
		framework.ExpectEqual(errors.IsNotFound(err), true)
 | 
							framework.ExpectEqual(apierrors.IsNotFound(err), true)
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
})
 | 
					})
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -21,7 +21,6 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
					 | 
				
			||||||
	apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/fields"
 | 
						"k8s.io/apimachinery/pkg/fields"
 | 
				
			||||||
@@ -72,7 +71,7 @@ var _ = ginkgo.Describe("[sig-node] RuntimeClass", func() {
 | 
				
			|||||||
			ginkgo.By("Waiting for the RuntimeClass to disappear")
 | 
								ginkgo.By("Waiting for the RuntimeClass to disappear")
 | 
				
			||||||
			framework.ExpectNoError(wait.PollImmediate(framework.Poll, time.Minute, func() (bool, error) {
 | 
								framework.ExpectNoError(wait.PollImmediate(framework.Poll, time.Minute, func() (bool, error) {
 | 
				
			||||||
				_, err := rcClient.Get(rcName, metav1.GetOptions{})
 | 
									_, err := rcClient.Get(rcName, metav1.GetOptions{})
 | 
				
			||||||
				if errors.IsNotFound(err) {
 | 
									if apierrors.IsNotFound(err) {
 | 
				
			||||||
					return true, nil // done
 | 
										return true, nil // done
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				if err != nil {
 | 
									if err != nil {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -21,7 +21,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	batchv1 "k8s.io/api/batch/v1"
 | 
						batchv1 "k8s.io/api/batch/v1"
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	clientset "k8s.io/client-go/kubernetes"
 | 
						clientset "k8s.io/client-go/kubernetes"
 | 
				
			||||||
@@ -91,7 +91,7 @@ func WaitForJobFailure(c clientset.Interface, ns, jobName string, timeout time.D
 | 
				
			|||||||
func WaitForJobGone(c clientset.Interface, ns, jobName string, timeout time.Duration) error {
 | 
					func WaitForJobGone(c clientset.Interface, ns, jobName string, timeout time.Duration) error {
 | 
				
			||||||
	return wait.Poll(framework.Poll, timeout, func() (bool, error) {
 | 
						return wait.Poll(framework.Poll, timeout, func() (bool, error) {
 | 
				
			||||||
		_, err := c.BatchV1().Jobs(ns).Get(jobName, metav1.GetOptions{})
 | 
							_, err := c.BatchV1().Jobs(ns).Get(jobName, metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		return false, err
 | 
							return false, err
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/sets"
 | 
						"k8s.io/apimachinery/pkg/util/sets"
 | 
				
			||||||
@@ -115,7 +115,7 @@ func (c *PodClient) CreateBatch(pods []*v1.Pod) []*v1.Pod {
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
// Update updates the pod object. It retries if there is a conflict, throw out error if
 | 
					// Update updates the pod object. It retries if there is a conflict, throw out error if
 | 
				
			||||||
// there is any other errors. name is the pod name, updateFn is the function updating the
 | 
					// there is any other apierrors. name is the pod name, updateFn is the function updating the
 | 
				
			||||||
// pod object.
 | 
					// pod object.
 | 
				
			||||||
func (c *PodClient) Update(name string, updateFn func(pod *v1.Pod)) {
 | 
					func (c *PodClient) Update(name string, updateFn func(pod *v1.Pod)) {
 | 
				
			||||||
	ExpectNoError(wait.Poll(time.Millisecond*500, time.Second*30, func() (bool, error) {
 | 
						ExpectNoError(wait.Poll(time.Millisecond*500, time.Second*30, func() (bool, error) {
 | 
				
			||||||
@@ -129,7 +129,7 @@ func (c *PodClient) Update(name string, updateFn func(pod *v1.Pod)) {
 | 
				
			|||||||
			Logf("Successfully updated pod %q", name)
 | 
								Logf("Successfully updated pod %q", name)
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if errors.IsConflict(err) {
 | 
							if apierrors.IsConflict(err) {
 | 
				
			||||||
			Logf("Conflicting update to pod %q, re-get and re-update: %v", name, err)
 | 
								Logf("Conflicting update to pod %q, re-get and re-update: %v", name, err)
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -147,7 +147,7 @@ func (c *PodClient) DeleteSync(name string, options *metav1.DeleteOptions, timeo
 | 
				
			|||||||
// disappear before the timeout, it will fail the test.
 | 
					// disappear before the timeout, it will fail the test.
 | 
				
			||||||
func (c *PodClient) DeleteSyncInNamespace(name string, namespace string, options *metav1.DeleteOptions, timeout time.Duration) {
 | 
					func (c *PodClient) DeleteSyncInNamespace(name string, namespace string, options *metav1.DeleteOptions, timeout time.Duration) {
 | 
				
			||||||
	err := c.Delete(name, options)
 | 
						err := c.Delete(name, options)
 | 
				
			||||||
	if err != nil && !errors.IsNotFound(err) {
 | 
						if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
		Failf("Failed to delete pod %q: %v", name, err)
 | 
							Failf("Failed to delete pod %q: %v", name, err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	gomega.Expect(e2epod.WaitForPodToDisappear(c.f.ClientSet, namespace, name, labels.Everything(),
 | 
						gomega.Expect(e2epod.WaitForPodToDisappear(c.f.ClientSet, namespace, name, labels.Everything(),
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -27,7 +27,7 @@ import (
 | 
				
			|||||||
	"github.com/onsi/ginkgo"
 | 
						"github.com/onsi/ginkgo"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	policyv1beta1 "k8s.io/api/policy/v1beta1"
 | 
						policyv1beta1 "k8s.io/api/policy/v1beta1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/fields"
 | 
						"k8s.io/apimachinery/pkg/fields"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
@@ -446,7 +446,7 @@ func (j *TestJig) UpdateService(update func(*v1.Service)) (*v1.Service, error) {
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			return j.sanityCheckService(result, service.Spec.Type)
 | 
								return j.sanityCheckService(result, service.Spec.Type)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if !errors.IsConflict(err) && !errors.IsServerTimeout(err) {
 | 
							if !apierrors.IsConflict(err) && !apierrors.IsServerTimeout(err) {
 | 
				
			||||||
			return nil, fmt.Errorf("failed to update Service %q: %v", j.Name, err)
 | 
								return nil, fmt.Errorf("failed to update Service %q: %v", j.Name, err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -20,7 +20,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	clientset "k8s.io/client-go/kubernetes"
 | 
						clientset "k8s.io/client-go/kubernetes"
 | 
				
			||||||
	restclient "k8s.io/client-go/rest"
 | 
						restclient "k8s.io/client-go/rest"
 | 
				
			||||||
@@ -73,7 +73,7 @@ func UpdateService(c clientset.Interface, namespace, serviceName string, update
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		service, err = c.CoreV1().Services(namespace).Update(service)
 | 
							service, err = c.CoreV1().Services(namespace).Update(service)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if !errors.IsConflict(err) && !errors.IsServerTimeout(err) {
 | 
							if !apierrors.IsConflict(err) && !apierrors.IsServerTimeout(err) {
 | 
				
			||||||
			return service, err
 | 
								return service, err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -2660,7 +2660,7 @@ func waitForRCToStabilize(c clientset.Interface, ns, name string, timeout time.D
 | 
				
			|||||||
	_, err = watchtools.UntilWithoutRetry(ctx, w, func(event watch.Event) (bool, error) {
 | 
						_, err = watchtools.UntilWithoutRetry(ctx, w, func(event watch.Event) (bool, error) {
 | 
				
			||||||
		switch event.Type {
 | 
							switch event.Type {
 | 
				
			||||||
		case watch.Deleted:
 | 
							case watch.Deleted:
 | 
				
			||||||
			return false, apierrs.NewNotFound(schema.GroupResource{Resource: "replicationcontrollers"}, "")
 | 
								return false, apierrors.NewNotFound(schema.GroupResource{Resource: "replicationcontrollers"}, "")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		switch rc := event.Object.(type) {
 | 
							switch rc := event.Object.(type) {
 | 
				
			||||||
		case *v1.ReplicationController:
 | 
							case *v1.ReplicationController:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -18,7 +18,7 @@ package network
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
import (
 | 
					import (
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						"k8s.io/apimachinery/pkg/util/intstr"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/uuid"
 | 
						"k8s.io/apimachinery/pkg/util/uuid"
 | 
				
			||||||
@@ -118,7 +118,7 @@ func (t *TestFixture) Cleanup() []error {
 | 
				
			|||||||
			// First, resize the RC to 0.
 | 
								// First, resize the RC to 0.
 | 
				
			||||||
			old, err := t.Client.CoreV1().ReplicationControllers(t.Namespace).Get(rcName, metav1.GetOptions{})
 | 
								old, err := t.Client.CoreV1().ReplicationControllers(t.Namespace).Get(rcName, metav1.GetOptions{})
 | 
				
			||||||
			if err != nil {
 | 
								if err != nil {
 | 
				
			||||||
				if errors.IsNotFound(err) {
 | 
									if apierrors.IsNotFound(err) {
 | 
				
			||||||
					return nil
 | 
										return nil
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				return err
 | 
									return err
 | 
				
			||||||
@@ -126,7 +126,7 @@ func (t *TestFixture) Cleanup() []error {
 | 
				
			|||||||
			x := int32(0)
 | 
								x := int32(0)
 | 
				
			||||||
			old.Spec.Replicas = &x
 | 
								old.Spec.Replicas = &x
 | 
				
			||||||
			if _, err := t.Client.CoreV1().ReplicationControllers(t.Namespace).Update(old); err != nil {
 | 
								if _, err := t.Client.CoreV1().ReplicationControllers(t.Namespace).Update(old); err != nil {
 | 
				
			||||||
				if errors.IsNotFound(err) {
 | 
									if apierrors.IsNotFound(err) {
 | 
				
			||||||
					return nil
 | 
										return nil
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				return err
 | 
									return err
 | 
				
			||||||
@@ -139,7 +139,7 @@ func (t *TestFixture) Cleanup() []error {
 | 
				
			|||||||
		// TODO(mikedanese): Wait.
 | 
							// TODO(mikedanese): Wait.
 | 
				
			||||||
		// Then, delete the RC altogether.
 | 
							// Then, delete the RC altogether.
 | 
				
			||||||
		if err := t.Client.CoreV1().ReplicationControllers(t.Namespace).Delete(rcName, nil); err != nil {
 | 
							if err := t.Client.CoreV1().ReplicationControllers(t.Namespace).Delete(rcName, nil); err != nil {
 | 
				
			||||||
			if !errors.IsNotFound(err) {
 | 
								if !apierrors.IsNotFound(err) {
 | 
				
			||||||
				errs = append(errs, err)
 | 
									errs = append(errs, err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -149,7 +149,7 @@ func (t *TestFixture) Cleanup() []error {
 | 
				
			|||||||
		ginkgo.By("deleting service " + serviceName + " in namespace " + t.Namespace)
 | 
							ginkgo.By("deleting service " + serviceName + " in namespace " + t.Namespace)
 | 
				
			||||||
		err := t.Client.CoreV1().Services(t.Namespace).Delete(serviceName, nil)
 | 
							err := t.Client.CoreV1().Services(t.Namespace).Delete(serviceName, nil)
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			if !errors.IsNotFound(err) {
 | 
								if !apierrors.IsNotFound(err) {
 | 
				
			||||||
				errs = append(errs, err)
 | 
									errs = append(errs, err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -28,7 +28,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	rbacv1 "k8s.io/api/rbac/v1"
 | 
						rbacv1 "k8s.io/api/rbac/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						"k8s.io/apimachinery/pkg/runtime/schema"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/uuid"
 | 
						"k8s.io/apimachinery/pkg/util/uuid"
 | 
				
			||||||
@@ -792,7 +792,7 @@ func executePresharedCertTest(f *framework.Framework, jig *ingress.TestJig, stat
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
		ginkgo.By(fmt.Sprintf("Deleting ssl certificate %q on GCE", preSharedCertName))
 | 
							ginkgo.By(fmt.Sprintf("Deleting ssl certificate %q on GCE", preSharedCertName))
 | 
				
			||||||
		err := wait.Poll(e2eservice.LoadBalancerPollInterval, e2eservice.LoadBalancerCleanupTimeout, func() (bool, error) {
 | 
							err := wait.Poll(e2eservice.LoadBalancerPollInterval, e2eservice.LoadBalancerCleanupTimeout, func() (bool, error) {
 | 
				
			||||||
			if err := gceCloud.DeleteSslCertificate(preSharedCertName); err != nil && !errors.IsNotFound(err) {
 | 
								if err := gceCloud.DeleteSslCertificate(preSharedCertName); err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
				framework.Logf("ginkgo.Failed to delete ssl certificate %q: %v. Retrying...", preSharedCertName, err)
 | 
									framework.Logf("ginkgo.Failed to delete ssl certificate %q: %v. Retrying...", preSharedCertName, err)
 | 
				
			||||||
				return false, nil
 | 
									return false, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -27,7 +27,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						"k8s.io/apimachinery/pkg/util/intstr"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/net"
 | 
						"k8s.io/apimachinery/pkg/util/net"
 | 
				
			||||||
@@ -226,7 +226,7 @@ var _ = SIGDescribe("Proxy", func() {
 | 
				
			|||||||
						body, status, d, err := doProxy(f, path, i)
 | 
											body, status, d, err := doProxy(f, path, i)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
						if err != nil {
 | 
											if err != nil {
 | 
				
			||||||
							if serr, ok := err.(*errors.StatusError); ok {
 | 
												if serr, ok := err.(*apierrors.StatusError); ok {
 | 
				
			||||||
								recordError(fmt.Sprintf("%v (%v; %v): path %v gave status error: %+v",
 | 
													recordError(fmt.Sprintf("%v (%v; %v): path %v gave status error: %+v",
 | 
				
			||||||
									i, status, d, path, serr.Status()))
 | 
														i, status, d, path, serr.Status()))
 | 
				
			||||||
							} else {
 | 
												} else {
 | 
				
			||||||
@@ -322,7 +322,7 @@ func waitForEndpoint(c clientset.Interface, ns, name string) error {
 | 
				
			|||||||
	registerTimeout := time.Minute
 | 
						registerTimeout := time.Minute
 | 
				
			||||||
	for t := time.Now(); time.Since(t) < registerTimeout; time.Sleep(framework.Poll) {
 | 
						for t := time.Now(); time.Since(t) < registerTimeout; time.Sleep(framework.Poll) {
 | 
				
			||||||
		endpoint, err := c.CoreV1().Endpoints(ns).Get(name, metav1.GetOptions{})
 | 
							endpoint, err := c.CoreV1().Endpoints(ns).Get(name, metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			framework.Logf("Endpoint %s/%s is not ready yet", ns, name)
 | 
								framework.Logf("Endpoint %s/%s is not ready yet", ns, name)
 | 
				
			||||||
			continue
 | 
								continue
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -26,7 +26,7 @@ import (
 | 
				
			|||||||
	appsv1 "k8s.io/api/apps/v1"
 | 
						appsv1 "k8s.io/api/apps/v1"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	schedulingv1 "k8s.io/api/scheduling/v1"
 | 
						schedulingv1 "k8s.io/api/scheduling/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime"
 | 
						"k8s.io/apimachinery/pkg/runtime"
 | 
				
			||||||
@@ -79,7 +79,7 @@ var _ = SIGDescribe("SchedulerPreemption [Serial]", func() {
 | 
				
			|||||||
		var err error
 | 
							var err error
 | 
				
			||||||
		for _, pair := range priorityPairs {
 | 
							for _, pair := range priorityPairs {
 | 
				
			||||||
			_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: pair.name}, Value: pair.value})
 | 
								_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: pair.name}, Value: pair.value})
 | 
				
			||||||
			framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
								framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		e2enode.WaitForTotalHealthy(cs, time.Minute)
 | 
							e2enode.WaitForTotalHealthy(cs, time.Minute)
 | 
				
			||||||
@@ -143,7 +143,7 @@ var _ = SIGDescribe("SchedulerPreemption [Serial]", func() {
 | 
				
			|||||||
		})
 | 
							})
 | 
				
			||||||
		// Make sure that the lowest priority pod is deleted.
 | 
							// Make sure that the lowest priority pod is deleted.
 | 
				
			||||||
		preemptedPod, err := cs.CoreV1().Pods(pods[0].Namespace).Get(pods[0].Name, metav1.GetOptions{})
 | 
							preemptedPod, err := cs.CoreV1().Pods(pods[0].Namespace).Get(pods[0].Name, metav1.GetOptions{})
 | 
				
			||||||
		podDeleted := (err != nil && errors.IsNotFound(err)) ||
 | 
							podDeleted := (err != nil && apierrors.IsNotFound(err)) ||
 | 
				
			||||||
			(err == nil && preemptedPod.DeletionTimestamp != nil)
 | 
								(err == nil && preemptedPod.DeletionTimestamp != nil)
 | 
				
			||||||
		framework.ExpectEqual(podDeleted, true)
 | 
							framework.ExpectEqual(podDeleted, true)
 | 
				
			||||||
		// Other pods (mid priority ones) should be present.
 | 
							// Other pods (mid priority ones) should be present.
 | 
				
			||||||
@@ -198,7 +198,7 @@ var _ = SIGDescribe("SchedulerPreemption [Serial]", func() {
 | 
				
			|||||||
			// Clean-up the critical pod
 | 
								// Clean-up the critical pod
 | 
				
			||||||
			// Always run cleanup to make sure the pod is properly cleaned up.
 | 
								// Always run cleanup to make sure the pod is properly cleaned up.
 | 
				
			||||||
			err := f.ClientSet.CoreV1().Pods(metav1.NamespaceSystem).Delete("critical-pod", metav1.NewDeleteOptions(0))
 | 
								err := f.ClientSet.CoreV1().Pods(metav1.NamespaceSystem).Delete("critical-pod", metav1.NewDeleteOptions(0))
 | 
				
			||||||
			if err != nil && !errors.IsNotFound(err) {
 | 
								if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
				framework.Failf("Error cleanup pod `%s/%s`: %v", metav1.NamespaceSystem, "critical-pod", err)
 | 
									framework.Failf("Error cleanup pod `%s/%s`: %v", metav1.NamespaceSystem, "critical-pod", err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}()
 | 
							}()
 | 
				
			||||||
@@ -212,7 +212,7 @@ var _ = SIGDescribe("SchedulerPreemption [Serial]", func() {
 | 
				
			|||||||
		})
 | 
							})
 | 
				
			||||||
		// Make sure that the lowest priority pod is deleted.
 | 
							// Make sure that the lowest priority pod is deleted.
 | 
				
			||||||
		preemptedPod, err := cs.CoreV1().Pods(pods[0].Namespace).Get(pods[0].Name, metav1.GetOptions{})
 | 
							preemptedPod, err := cs.CoreV1().Pods(pods[0].Namespace).Get(pods[0].Name, metav1.GetOptions{})
 | 
				
			||||||
		podDeleted := (err != nil && errors.IsNotFound(err)) ||
 | 
							podDeleted := (err != nil && apierrors.IsNotFound(err)) ||
 | 
				
			||||||
			(err == nil && preemptedPod.DeletionTimestamp != nil)
 | 
								(err == nil && preemptedPod.DeletionTimestamp != nil)
 | 
				
			||||||
		framework.ExpectEqual(podDeleted, true)
 | 
							framework.ExpectEqual(podDeleted, true)
 | 
				
			||||||
		// Other pods (mid priority ones) should be present.
 | 
							// Other pods (mid priority ones) should be present.
 | 
				
			||||||
@@ -301,9 +301,9 @@ var _ = SIGDescribe("PreemptionExecutionPath", func() {
 | 
				
			|||||||
			_, err := cs.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: priorityName}, Value: priorityVal})
 | 
								_, err := cs.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: priorityName}, Value: priorityVal})
 | 
				
			||||||
			if err != nil {
 | 
								if err != nil {
 | 
				
			||||||
				framework.Logf("Failed to create priority '%v/%v': %v", priorityName, priorityVal, err)
 | 
									framework.Logf("Failed to create priority '%v/%v': %v", priorityName, priorityVal, err)
 | 
				
			||||||
				framework.Logf("Reason: %v. Msg: %v", errors.ReasonForError(err), err)
 | 
									framework.Logf("Reason: %v. Msg: %v", apierrors.ReasonForError(err), err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
								framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -23,7 +23,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	settingsv1alpha1 "k8s.io/api/settings/v1alpha1"
 | 
						settingsv1alpha1 "k8s.io/api/settings/v1alpha1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/watch"
 | 
						"k8s.io/apimachinery/pkg/watch"
 | 
				
			||||||
@@ -73,7 +73,7 @@ var _ = SIGDescribe("[Feature:PodPreset] PodPreset", func() {
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err := createPodPreset(f.ClientSet, f.Namespace.Name, pip)
 | 
							_, err := createPodPreset(f.ClientSet, f.Namespace.Name, pip)
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			framework.Skipf("podpresets requires k8s.io/api/settings/v1alpha1 to be enabled")
 | 
								framework.Skipf("podpresets requires k8s.io/api/settings/v1alpha1 to be enabled")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		framework.ExpectNoError(err)
 | 
							framework.ExpectNoError(err)
 | 
				
			||||||
@@ -191,7 +191,7 @@ var _ = SIGDescribe("[Feature:PodPreset] PodPreset", func() {
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		_, err := createPodPreset(f.ClientSet, f.Namespace.Name, pip)
 | 
							_, err := createPodPreset(f.ClientSet, f.Namespace.Name, pip)
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			framework.Skipf("podpresets requires k8s.io/api/settings/v1alpha1 to be enabled")
 | 
								framework.Skipf("podpresets requires k8s.io/api/settings/v1alpha1 to be enabled")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		framework.ExpectNoError(err)
 | 
							framework.ExpectNoError(err)
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -27,7 +27,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	storagev1 "k8s.io/api/storage/v1"
 | 
						storagev1 "k8s.io/api/storage/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	utilerrors "k8s.io/apimachinery/pkg/util/errors"
 | 
						utilerrors "k8s.io/apimachinery/pkg/util/errors"
 | 
				
			||||||
@@ -277,7 +277,7 @@ var _ = utils.SIGDescribe("CSI mock volume", func() {
 | 
				
			|||||||
				attachmentName := fmt.Sprintf("csi-%x", attachmentHash)
 | 
									attachmentName := fmt.Sprintf("csi-%x", attachmentHash)
 | 
				
			||||||
				_, err = m.cs.StorageV1().VolumeAttachments().Get(attachmentName, metav1.GetOptions{})
 | 
									_, err = m.cs.StorageV1().VolumeAttachments().Get(attachmentName, metav1.GetOptions{})
 | 
				
			||||||
				if err != nil {
 | 
									if err != nil {
 | 
				
			||||||
					if errors.IsNotFound(err) {
 | 
										if apierrors.IsNotFound(err) {
 | 
				
			||||||
						if !test.disableAttach {
 | 
											if !test.disableAttach {
 | 
				
			||||||
							framework.ExpectNoError(err, "Expected VolumeAttachment but none was found")
 | 
												framework.ExpectNoError(err, "Expected VolumeAttachment but none was found")
 | 
				
			||||||
						}
 | 
											}
 | 
				
			||||||
@@ -618,7 +618,7 @@ func checkCSINodeForLimits(nodeName string, driverName string, cs clientset.Inte
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	waitErr := wait.PollImmediate(10*time.Second, csiNodeLimitUpdateTimeout, func() (bool, error) {
 | 
						waitErr := wait.PollImmediate(10*time.Second, csiNodeLimitUpdateTimeout, func() (bool, error) {
 | 
				
			||||||
		csiNode, err := cs.StorageV1().CSINodes().Get(nodeName, metav1.GetOptions{})
 | 
							csiNode, err := cs.StorageV1().CSINodes().Get(nodeName, metav1.GetOptions{})
 | 
				
			||||||
		if err != nil && !errors.IsNotFound(err) {
 | 
							if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		attachLimit = getVolumeLimitFromCSINode(csiNode, driverName)
 | 
							attachLimit = getVolumeLimitFromCSINode(csiNode, driverName)
 | 
				
			||||||
@@ -809,7 +809,7 @@ func waitForCSIDriver(cs clientset.Interface, driverName string) error {
 | 
				
			|||||||
	framework.Logf("waiting up to %v for CSIDriver %q", timeout, driverName)
 | 
						framework.Logf("waiting up to %v for CSIDriver %q", timeout, driverName)
 | 
				
			||||||
	for start := time.Now(); time.Since(start) < timeout; time.Sleep(framework.Poll) {
 | 
						for start := time.Now(); time.Since(start) < timeout; time.Sleep(framework.Poll) {
 | 
				
			||||||
		_, err := cs.StorageV1beta1().CSIDrivers().Get(driverName, metav1.GetOptions{})
 | 
							_, err := cs.StorageV1beta1().CSIDrivers().Get(driverName, metav1.GetOptions{})
 | 
				
			||||||
		if !errors.IsNotFound(err) {
 | 
							if !apierrors.IsNotFound(err) {
 | 
				
			||||||
			return err
 | 
								return err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -44,7 +44,7 @@ import (
 | 
				
			|||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	storagev1 "k8s.io/api/storage/v1"
 | 
						storagev1 "k8s.io/api/storage/v1"
 | 
				
			||||||
	storagev1beta1 "k8s.io/api/storage/v1beta1"
 | 
						storagev1beta1 "k8s.io/api/storage/v1beta1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/sets"
 | 
						"k8s.io/apimachinery/pkg/util/sets"
 | 
				
			||||||
@@ -492,7 +492,7 @@ func waitForCSIDriverRegistrationOnNode(nodeName string, driverName string, cs c
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	return wait.PollImmediate(10*time.Second, csiNodeRegisterTimeout, func() (bool, error) {
 | 
						return wait.PollImmediate(10*time.Second, csiNodeRegisterTimeout, func() (bool, error) {
 | 
				
			||||||
		csiNode, err := cs.StorageV1().CSINodes().Get(nodeName, metav1.GetOptions{})
 | 
							csiNode, err := cs.StorageV1().CSINodes().Get(nodeName, metav1.GetOptions{})
 | 
				
			||||||
		if err != nil && !errors.IsNotFound(err) {
 | 
							if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		for _, driver := range csiNode.Spec.Drivers {
 | 
							for _, driver := range csiNode.Spec.Drivers {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -46,7 +46,7 @@ import (
 | 
				
			|||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	rbacv1 "k8s.io/api/rbac/v1"
 | 
						rbacv1 "k8s.io/api/rbac/v1"
 | 
				
			||||||
	storagev1 "k8s.io/api/storage/v1"
 | 
						storagev1 "k8s.io/api/storage/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						"k8s.io/apimachinery/pkg/runtime/schema"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/sets"
 | 
						"k8s.io/apimachinery/pkg/util/sets"
 | 
				
			||||||
@@ -319,7 +319,7 @@ func (v *glusterVolume) DeleteVolume() {
 | 
				
			|||||||
	framework.Logf("Deleting Gluster endpoints %q...", name)
 | 
						framework.Logf("Deleting Gluster endpoints %q...", name)
 | 
				
			||||||
	err := cs.CoreV1().Endpoints(ns.Name).Delete(name, nil)
 | 
						err := cs.CoreV1().Endpoints(ns.Name).Delete(name, nil)
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
		if !errors.IsNotFound(err) {
 | 
							if !apierrors.IsNotFound(err) {
 | 
				
			||||||
			framework.Failf("Gluster delete endpoints failed: %v", err)
 | 
								framework.Failf("Gluster delete endpoints failed: %v", err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		framework.Logf("Gluster endpoints %q not found, assuming deleted", name)
 | 
							framework.Logf("Gluster endpoints %q not found, assuming deleted", name)
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
	"github.com/onsi/gomega"
 | 
						"github.com/onsi/gomega"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	clientset "k8s.io/client-go/kubernetes"
 | 
						clientset "k8s.io/client-go/kubernetes"
 | 
				
			||||||
	"k8s.io/kubernetes/test/e2e/framework"
 | 
						"k8s.io/kubernetes/test/e2e/framework"
 | 
				
			||||||
@@ -370,7 +370,7 @@ func CSIInlineVolumesEnabled(c clientset.Interface, ns string) (bool, error) {
 | 
				
			|||||||
		// Pod was created, feature supported.
 | 
							// Pod was created, feature supported.
 | 
				
			||||||
		StopPod(c, pod)
 | 
							StopPod(c, pod)
 | 
				
			||||||
		return true, nil
 | 
							return true, nil
 | 
				
			||||||
	case errors.IsInvalid(err):
 | 
						case apierrors.IsInvalid(err):
 | 
				
			||||||
		// "Invalid" because it uses a feature that isn't supported.
 | 
							// "Invalid" because it uses a feature that isn't supported.
 | 
				
			||||||
		return false, nil
 | 
							return false, nil
 | 
				
			||||||
	default:
 | 
						default:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -26,7 +26,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	storagev1 "k8s.io/api/storage/v1"
 | 
						storagev1 "k8s.io/api/storage/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/sets"
 | 
						"k8s.io/apimachinery/pkg/util/sets"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
@@ -246,7 +246,7 @@ func cleanupTest(cs clientset.Interface, ns string, runningPodName, unschedulabl
 | 
				
			|||||||
			if err == nil {
 | 
								if err == nil {
 | 
				
			||||||
				existing++
 | 
									existing++
 | 
				
			||||||
			} else {
 | 
								} else {
 | 
				
			||||||
				if errors.IsNotFound(err) {
 | 
									if apierrors.IsNotFound(err) {
 | 
				
			||||||
					pvNames.Delete(pvName)
 | 
										pvNames.Delete(pvName)
 | 
				
			||||||
				} else {
 | 
									} else {
 | 
				
			||||||
					framework.Logf("Failed to get PV %s: %s", pvName, err)
 | 
										framework.Logf("Failed to get PV %s: %s", pvName, err)
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -22,7 +22,7 @@ import (
 | 
				
			|||||||
	"github.com/onsi/ginkgo"
 | 
						"github.com/onsi/ginkgo"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/uuid"
 | 
						"k8s.io/apimachinery/pkg/util/uuid"
 | 
				
			||||||
	"k8s.io/kubernetes/pkg/kubelet/sysctl"
 | 
						"k8s.io/kubernetes/pkg/kubelet/sysctl"
 | 
				
			||||||
@@ -60,7 +60,7 @@ func (t *SysctlUpgradeTest) Test(f *framework.Framework, done <-chan struct{}, u
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	ginkgo.By("Checking the old unsafe sysctl pod was not suddenly started during an upgrade")
 | 
						ginkgo.By("Checking the old unsafe sysctl pod was not suddenly started during an upgrade")
 | 
				
			||||||
	pod, err := f.ClientSet.CoreV1().Pods(t.invalidPod.Namespace).Get(t.invalidPod.Name, metav1.GetOptions{})
 | 
						pod, err := f.ClientSet.CoreV1().Pods(t.invalidPod.Namespace).Get(t.invalidPod.Name, metav1.GetOptions{})
 | 
				
			||||||
	if err != nil && !errors.IsNotFound(err) {
 | 
						if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
		framework.ExpectNoError(err)
 | 
							framework.ExpectNoError(err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -28,7 +28,7 @@ import (
 | 
				
			|||||||
	"strings"
 | 
						"strings"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						"k8s.io/apimachinery/pkg/runtime/schema"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/watch"
 | 
						"k8s.io/apimachinery/pkg/watch"
 | 
				
			||||||
@@ -159,7 +159,7 @@ func runAppArmorTest(f *framework.Framework, shouldRun bool, profile string) v1.
 | 
				
			|||||||
		_, err = watchtools.UntilWithoutRetry(ctx, w, func(e watch.Event) (bool, error) {
 | 
							_, err = watchtools.UntilWithoutRetry(ctx, w, func(e watch.Event) (bool, error) {
 | 
				
			||||||
			switch e.Type {
 | 
								switch e.Type {
 | 
				
			||||||
			case watch.Deleted:
 | 
								case watch.Deleted:
 | 
				
			||||||
				return false, errors.NewNotFound(schema.GroupResource{Resource: "pods"}, pod.Name)
 | 
									return false, apierrors.NewNotFound(schema.GroupResource{Resource: "pods"}, pod.Name)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			switch t := e.Object.(type) {
 | 
								switch t := e.Object.(type) {
 | 
				
			||||||
			case *v1.Pod:
 | 
								case *v1.Pod:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -21,7 +21,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	schedulingv1 "k8s.io/api/scheduling/v1"
 | 
						schedulingv1 "k8s.io/api/scheduling/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	kubeapi "k8s.io/kubernetes/pkg/apis/core"
 | 
						kubeapi "k8s.io/kubernetes/pkg/apis/core"
 | 
				
			||||||
@@ -85,7 +85,7 @@ var _ = framework.KubeDescribe("CriticalPod [Serial] [Disruptive] [NodeFeature:C
 | 
				
			|||||||
			})
 | 
								})
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			_, err = f.ClientSet.SchedulingV1().PriorityClasses().Create(systemCriticalPriority)
 | 
								_, err = f.ClientSet.SchedulingV1().PriorityClasses().Create(systemCriticalPriority)
 | 
				
			||||||
			framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true, "failed to create PriorityClasses with an error: %v", err)
 | 
								framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true, "failed to create PriorityClasses with an error: %v", err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			// Create pods, starting with non-critical so that the critical preempts the other pods.
 | 
								// Create pods, starting with non-critical so that the critical preempts the other pods.
 | 
				
			||||||
			f.PodClient().CreateBatch([]*v1.Pod{nonCriticalBestEffort, nonCriticalBurstable, nonCriticalGuaranteed})
 | 
								f.PodClient().CreateBatch([]*v1.Pod{nonCriticalBestEffort, nonCriticalBurstable, nonCriticalGuaranteed})
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	schedulingv1 "k8s.io/api/scheduling/v1"
 | 
						schedulingv1 "k8s.io/api/scheduling/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/fields"
 | 
						"k8s.io/apimachinery/pkg/fields"
 | 
				
			||||||
@@ -302,7 +302,7 @@ var _ = framework.KubeDescribe("PriorityMemoryEvictionOrdering [Slow] [Serial] [
 | 
				
			|||||||
		})
 | 
							})
 | 
				
			||||||
		ginkgo.BeforeEach(func() {
 | 
							ginkgo.BeforeEach(func() {
 | 
				
			||||||
			_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: highPriorityClassName}, Value: highPriority})
 | 
								_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: highPriorityClassName}, Value: highPriority})
 | 
				
			||||||
			framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
								framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		ginkgo.AfterEach(func() {
 | 
							ginkgo.AfterEach(func() {
 | 
				
			||||||
			err := f.ClientSet.SchedulingV1().PriorityClasses().Delete(highPriorityClassName, &metav1.DeleteOptions{})
 | 
								err := f.ClientSet.SchedulingV1().PriorityClasses().Delete(highPriorityClassName, &metav1.DeleteOptions{})
 | 
				
			||||||
@@ -359,7 +359,7 @@ var _ = framework.KubeDescribe("PriorityLocalStorageEvictionOrdering [Slow] [Ser
 | 
				
			|||||||
		})
 | 
							})
 | 
				
			||||||
		ginkgo.BeforeEach(func() {
 | 
							ginkgo.BeforeEach(func() {
 | 
				
			||||||
			_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: highPriorityClassName}, Value: highPriority})
 | 
								_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: highPriorityClassName}, Value: highPriority})
 | 
				
			||||||
			framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
								framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		ginkgo.AfterEach(func() {
 | 
							ginkgo.AfterEach(func() {
 | 
				
			||||||
			err := f.ClientSet.SchedulingV1().PriorityClasses().Delete(highPriorityClassName, &metav1.DeleteOptions{})
 | 
								err := f.ClientSet.SchedulingV1().PriorityClasses().Delete(highPriorityClassName, &metav1.DeleteOptions{})
 | 
				
			||||||
@@ -412,7 +412,7 @@ var _ = framework.KubeDescribe("PriorityPidEvictionOrdering [Slow] [Serial] [Dis
 | 
				
			|||||||
		})
 | 
							})
 | 
				
			||||||
		ginkgo.BeforeEach(func() {
 | 
							ginkgo.BeforeEach(func() {
 | 
				
			||||||
			_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: highPriorityClassName}, Value: highPriority})
 | 
								_, err := f.ClientSet.SchedulingV1().PriorityClasses().Create(&schedulingv1.PriorityClass{ObjectMeta: metav1.ObjectMeta{Name: highPriorityClassName}, Value: highPriority})
 | 
				
			||||||
			framework.ExpectEqual(err == nil || errors.IsAlreadyExists(err), true)
 | 
								framework.ExpectEqual(err == nil || apierrors.IsAlreadyExists(err), true)
 | 
				
			||||||
		})
 | 
							})
 | 
				
			||||||
		ginkgo.AfterEach(func() {
 | 
							ginkgo.AfterEach(func() {
 | 
				
			||||||
			err := f.ClientSet.SchedulingV1().PriorityClasses().Delete(highPriorityClassName, &metav1.DeleteOptions{})
 | 
								err := f.ClientSet.SchedulingV1().PriorityClasses().Delete(highPriorityClassName, &metav1.DeleteOptions{})
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	apiequality "k8s.io/apimachinery/pkg/api/equality"
 | 
						apiequality "k8s.io/apimachinery/pkg/api/equality"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/uuid"
 | 
						"k8s.io/apimachinery/pkg/util/uuid"
 | 
				
			||||||
@@ -177,7 +177,7 @@ func deleteStaticPod(dir, name, namespace string) error {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func checkMirrorPodDisappear(cl clientset.Interface, name, namespace string) error {
 | 
					func checkMirrorPodDisappear(cl clientset.Interface, name, namespace string) error {
 | 
				
			||||||
	_, err := cl.CoreV1().Pods(namespace).Get(name, metav1.GetOptions{})
 | 
						_, err := cl.CoreV1().Pods(namespace).Get(name, metav1.GetOptions{})
 | 
				
			||||||
	if errors.IsNotFound(err) {
 | 
						if apierrors.IsNotFound(err) {
 | 
				
			||||||
		return nil
 | 
							return nil
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	return goerrors.New("pod not disappear")
 | 
						return goerrors.New("pod not disappear")
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -40,7 +40,7 @@ import (
 | 
				
			|||||||
	extensionsv1beta1 "k8s.io/api/extensions/v1beta1"
 | 
						extensionsv1beta1 "k8s.io/api/extensions/v1beta1"
 | 
				
			||||||
	policyv1beta1 "k8s.io/api/policy/v1beta1"
 | 
						policyv1beta1 "k8s.io/api/policy/v1beta1"
 | 
				
			||||||
	apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
						apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime"
 | 
						"k8s.io/apimachinery/pkg/runtime"
 | 
				
			||||||
@@ -678,7 +678,7 @@ func testResourceDelete(c *testContext) {
 | 
				
			|||||||
	// wait for the item to be gone
 | 
						// wait for the item to be gone
 | 
				
			||||||
	err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (bool, error) {
 | 
						err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (bool, error) {
 | 
				
			||||||
		obj, err := c.client.Resource(c.gvr).Namespace(obj.GetNamespace()).Get(obj.GetName(), metav1.GetOptions{})
 | 
							obj, err := c.client.Resource(c.gvr).Namespace(obj.GetNamespace()).Get(obj.GetName(), metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
@@ -753,7 +753,7 @@ func testResourceDelete(c *testContext) {
 | 
				
			|||||||
	// wait for the item to be gone
 | 
						// wait for the item to be gone
 | 
				
			||||||
	err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (bool, error) {
 | 
						err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (bool, error) {
 | 
				
			||||||
		obj, err := c.client.Resource(c.gvr).Namespace(obj.GetNamespace()).Get(obj.GetName(), metav1.GetOptions{})
 | 
							obj, err := c.client.Resource(c.gvr).Namespace(obj.GetNamespace()).Get(obj.GetName(), metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
@@ -801,7 +801,7 @@ func testResourceDeletecollection(c *testContext) {
 | 
				
			|||||||
	// wait for the item to be gone
 | 
						// wait for the item to be gone
 | 
				
			||||||
	err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (bool, error) {
 | 
						err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (bool, error) {
 | 
				
			||||||
		obj, err := c.client.Resource(c.gvr).Namespace(obj.GetNamespace()).Get(obj.GetName(), metav1.GetOptions{})
 | 
							obj, err := c.client.Resource(c.gvr).Namespace(obj.GetNamespace()).Get(obj.GetName(), metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
@@ -943,7 +943,7 @@ func testNamespaceDelete(c *testContext) {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
	// verify namespace is gone
 | 
						// verify namespace is gone
 | 
				
			||||||
	obj, err = c.client.Resource(c.gvr).Namespace(obj.GetNamespace()).Get(obj.GetName(), metav1.GetOptions{})
 | 
						obj, err = c.client.Resource(c.gvr).Namespace(obj.GetNamespace()).Get(obj.GetName(), metav1.GetOptions{})
 | 
				
			||||||
	if err == nil || !errors.IsNotFound(err) {
 | 
						if err == nil || !apierrors.IsNotFound(err) {
 | 
				
			||||||
		c.t.Errorf("expected namespace to be gone, got %#v, %v", obj, err)
 | 
							c.t.Errorf("expected namespace to be gone, got %#v, %v", obj, err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
@@ -1048,7 +1048,7 @@ func testPodBindingEviction(c *testContext) {
 | 
				
			|||||||
	forceDelete := &metav1.DeleteOptions{GracePeriodSeconds: &zero, PropagationPolicy: &background}
 | 
						forceDelete := &metav1.DeleteOptions{GracePeriodSeconds: &zero, PropagationPolicy: &background}
 | 
				
			||||||
	defer func() {
 | 
						defer func() {
 | 
				
			||||||
		err := c.clientset.CoreV1().Pods(pod.GetNamespace()).Delete(pod.GetName(), forceDelete)
 | 
							err := c.clientset.CoreV1().Pods(pod.GetNamespace()).Delete(pod.GetName(), forceDelete)
 | 
				
			||||||
		if err != nil && !errors.IsNotFound(err) {
 | 
							if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
			c.t.Error(err)
 | 
								c.t.Error(err)
 | 
				
			||||||
			return
 | 
								return
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -1414,7 +1414,7 @@ func createOrGetResource(client dynamic.Interface, gvr schema.GroupVersionResour
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		return obj, nil
 | 
							return obj, nil
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if !errors.IsNotFound(err) {
 | 
						if !apierrors.IsNotFound(err) {
 | 
				
			||||||
		return nil, err
 | 
							return nil, err
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	return client.Resource(gvr).Namespace(ns).Create(stubObj, metav1.CreateOptions{})
 | 
						return client.Resource(gvr).Namespace(ns).Create(stubObj, metav1.CreateOptions{})
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
	apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
 | 
						apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
 | 
				
			||||||
	"k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
						"k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
				
			||||||
	"k8s.io/apiextensions-apiserver/test/integration/fixtures"
 | 
						"k8s.io/apiextensions-apiserver/test/integration/fixtures"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
	genericfeatures "k8s.io/apiserver/pkg/features"
 | 
						genericfeatures "k8s.io/apiserver/pkg/features"
 | 
				
			||||||
@@ -108,7 +108,7 @@ spec:
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts when applying object after updating replicas, got no error: %s", result)
 | 
							t.Fatalf("Expecting to get conflicts when applying object after updating replicas, got no error: %s", result)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	status, ok := err.(*errors.StatusError)
 | 
						status, ok := err.(*apierrors.StatusError)
 | 
				
			||||||
	if !ok {
 | 
						if !ok {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts as API error")
 | 
							t.Fatalf("Expecting to get conflicts as API error")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -299,7 +299,7 @@ spec:
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts when applying object after updating replicas, got no error: %s", result)
 | 
							t.Fatalf("Expecting to get conflicts when applying object after updating replicas, got no error: %s", result)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	status, ok := err.(*errors.StatusError)
 | 
						status, ok := err.(*apierrors.StatusError)
 | 
				
			||||||
	if !ok {
 | 
						if !ok {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts as API error")
 | 
							t.Fatalf("Expecting to get conflicts as API error")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -339,7 +339,7 @@ spec:
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts when a different applier updates existing list item, got no error: %s", result)
 | 
							t.Fatalf("Expecting to get conflicts when a different applier updates existing list item, got no error: %s", result)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	status, ok = err.(*errors.StatusError)
 | 
						status, ok = err.(*apierrors.StatusError)
 | 
				
			||||||
	if !ok {
 | 
						if !ok {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts as API error")
 | 
							t.Fatalf("Expecting to get conflicts as API error")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -504,7 +504,7 @@ spec:
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts when applying object after updating replicas, got no error: %s", result)
 | 
							t.Fatalf("Expecting to get conflicts when applying object after updating replicas, got no error: %s", result)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	status, ok := err.(*errors.StatusError)
 | 
						status, ok := err.(*apierrors.StatusError)
 | 
				
			||||||
	if !ok {
 | 
						if !ok {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts as API error")
 | 
							t.Fatalf("Expecting to get conflicts as API error")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -698,7 +698,7 @@ spec:
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts when applying object after updating replicas, got no error: %s", result)
 | 
							t.Fatalf("Expecting to get conflicts when applying object after updating replicas, got no error: %s", result)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	status, ok := err.(*errors.StatusError)
 | 
						status, ok := err.(*apierrors.StatusError)
 | 
				
			||||||
	if !ok {
 | 
						if !ok {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts as API error")
 | 
							t.Fatalf("Expecting to get conflicts as API error")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -28,7 +28,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/meta"
 | 
						"k8s.io/apimachinery/pkg/api/meta"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						"k8s.io/apimachinery/pkg/runtime/schema"
 | 
				
			||||||
@@ -276,7 +276,7 @@ func TestCreateOnApplyFailsWithUID(t *testing.T) {
 | 
				
			|||||||
		}`)).
 | 
							}`)).
 | 
				
			||||||
		Do().
 | 
							Do().
 | 
				
			||||||
		Get()
 | 
							Get()
 | 
				
			||||||
	if !errors.IsConflict(err) {
 | 
						if !apierrors.IsConflict(err) {
 | 
				
			||||||
		t.Fatalf("Expected conflict error but got: %v", err)
 | 
							t.Fatalf("Expected conflict error but got: %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
@@ -348,7 +348,7 @@ func TestApplyUpdateApplyConflictForced(t *testing.T) {
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts when applying object")
 | 
							t.Fatalf("Expecting to get conflicts when applying object")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	status, ok := err.(*errors.StatusError)
 | 
						status, ok := err.(*apierrors.StatusError)
 | 
				
			||||||
	if !ok {
 | 
						if !ok {
 | 
				
			||||||
		t.Fatalf("Expecting to get conflicts as API error")
 | 
							t.Fatalf("Expecting to get conflicts as API error")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -849,7 +849,7 @@ func TestApplyFailsWithVersionMismatch(t *testing.T) {
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("Expecting to get version mismatch when applying object")
 | 
							t.Fatalf("Expecting to get version mismatch when applying object")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	status, ok := err.(*errors.StatusError)
 | 
						status, ok := err.(*apierrors.StatusError)
 | 
				
			||||||
	if !ok {
 | 
						if !ok {
 | 
				
			||||||
		t.Fatalf("Expecting to get version mismatch as API error")
 | 
							t.Fatalf("Expecting to get version mismatch as API error")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
	"testing"
 | 
						"testing"
 | 
				
			||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	"k8s.io/apiserver/pkg/server/dynamiccertificates"
 | 
						"k8s.io/apiserver/pkg/server/dynamiccertificates"
 | 
				
			||||||
@@ -146,7 +146,7 @@ MnVCuBwfwDXCAiEAw/1TA+CjPq9JC5ek1ifR0FybTURjeQqYkKpve1dveps=
 | 
				
			|||||||
func waitForConfigMapCAContent(t *testing.T, kubeClient kubernetes.Interface, key, content string, count int) func() (bool, error) {
 | 
					func waitForConfigMapCAContent(t *testing.T, kubeClient kubernetes.Interface, key, content string, count int) func() (bool, error) {
 | 
				
			||||||
	return func() (bool, error) {
 | 
						return func() (bool, error) {
 | 
				
			||||||
		clusterAuthInfo, err := kubeClient.CoreV1().ConfigMaps("kube-system").Get("extension-apiserver-authentication", metav1.GetOptions{})
 | 
							clusterAuthInfo, err := kubeClient.CoreV1().ConfigMaps("kube-system").Get("extension-apiserver-authentication", metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -22,7 +22,7 @@ import (
 | 
				
			|||||||
	"testing"
 | 
						"testing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
	"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
 | 
						"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
 | 
				
			||||||
@@ -60,7 +60,7 @@ func TestMaxJSONPatchOperations(t *testing.T) {
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("unexpected no error")
 | 
							t.Fatalf("unexpected no error")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if !errors.IsRequestEntityTooLargeError(err) {
 | 
						if !apierrors.IsRequestEntityTooLargeError(err) {
 | 
				
			||||||
		t.Errorf("expected requested entity too large err, got %v", err)
 | 
							t.Errorf("expected requested entity too large err, got %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if !strings.Contains(err.Error(), "The allowed maximum operations in a JSON patch is") {
 | 
						if !strings.Contains(err.Error(), "The allowed maximum operations in a JSON patch is") {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -22,7 +22,6 @@ import (
 | 
				
			|||||||
	"testing"
 | 
						"testing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
					 | 
				
			||||||
	apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
@@ -46,7 +45,7 @@ func TestMaxResourceSize(t *testing.T) {
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			t.Fatalf("unexpected no error")
 | 
								t.Fatalf("unexpected no error")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if !errors.IsRequestEntityTooLargeError(err) {
 | 
							if !apierrors.IsRequestEntityTooLargeError(err) {
 | 
				
			||||||
			t.Errorf("expected requested entity too large err, got %v", err)
 | 
								t.Errorf("expected requested entity too large err, got %v", err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -69,7 +68,7 @@ func TestMaxResourceSize(t *testing.T) {
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			t.Fatalf("unexpected no error")
 | 
								t.Fatalf("unexpected no error")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if !errors.IsRequestEntityTooLargeError(err) {
 | 
							if !apierrors.IsRequestEntityTooLargeError(err) {
 | 
				
			||||||
			t.Errorf("expected requested entity too large err, got %v", err)
 | 
								t.Errorf("expected requested entity too large err, got %v", err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -80,7 +79,7 @@ func TestMaxResourceSize(t *testing.T) {
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			t.Fatalf("unexpected no error")
 | 
								t.Fatalf("unexpected no error")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if !errors.IsRequestEntityTooLargeError(err) {
 | 
							if !apierrors.IsRequestEntityTooLargeError(err) {
 | 
				
			||||||
			t.Errorf("expected requested entity too large err, got %v", err)
 | 
								t.Errorf("expected requested entity too large err, got %v", err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -89,7 +88,7 @@ func TestMaxResourceSize(t *testing.T) {
 | 
				
			|||||||
		patchBody := []byte(`[{"op":"add","path":"/foo","value":` + strings.Repeat("[", 3*1024*1024/2-100) + strings.Repeat("]", 3*1024*1024/2-100) + `}]`)
 | 
							patchBody := []byte(`[{"op":"add","path":"/foo","value":` + strings.Repeat("[", 3*1024*1024/2-100) + strings.Repeat("]", 3*1024*1024/2-100) + `}]`)
 | 
				
			||||||
		err = rest.Patch(types.JSONPatchType).AbsPath(fmt.Sprintf("/api/v1/namespaces/default/secrets/test")).
 | 
							err = rest.Patch(types.JSONPatchType).AbsPath(fmt.Sprintf("/api/v1/namespaces/default/secrets/test")).
 | 
				
			||||||
			Body(patchBody).Do().Error()
 | 
								Body(patchBody).Do().Error()
 | 
				
			||||||
		if err != nil && !errors.IsBadRequest(err) {
 | 
							if err != nil && !apierrors.IsBadRequest(err) {
 | 
				
			||||||
			t.Errorf("expected success or bad request err, got %v", err)
 | 
								t.Errorf("expected success or bad request err, got %v", err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
@@ -105,7 +104,7 @@ func TestMaxResourceSize(t *testing.T) {
 | 
				
			|||||||
		patchBody := []byte(`{"value":` + strings.Repeat("[", 3*1024*1024/2-100) + strings.Repeat("]", 3*1024*1024/2-100) + `}`)
 | 
							patchBody := []byte(`{"value":` + strings.Repeat("[", 3*1024*1024/2-100) + strings.Repeat("]", 3*1024*1024/2-100) + `}`)
 | 
				
			||||||
		err = rest.Patch(types.MergePatchType).AbsPath(fmt.Sprintf("/api/v1/namespaces/default/secrets/test")).
 | 
							err = rest.Patch(types.MergePatchType).AbsPath(fmt.Sprintf("/api/v1/namespaces/default/secrets/test")).
 | 
				
			||||||
			Body(patchBody).Do().Error()
 | 
								Body(patchBody).Do().Error()
 | 
				
			||||||
		if err != nil && !errors.IsBadRequest(err) {
 | 
							if err != nil && !apierrors.IsBadRequest(err) {
 | 
				
			||||||
			t.Errorf("expected success or bad request err, got %v", err)
 | 
								t.Errorf("expected success or bad request err, got %v", err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
@@ -121,7 +120,7 @@ func TestMaxResourceSize(t *testing.T) {
 | 
				
			|||||||
		patchBody := []byte(`{"value":` + strings.Repeat("[", 3*1024*1024/2-100) + strings.Repeat("]", 3*1024*1024/2-100) + `}`)
 | 
							patchBody := []byte(`{"value":` + strings.Repeat("[", 3*1024*1024/2-100) + strings.Repeat("]", 3*1024*1024/2-100) + `}`)
 | 
				
			||||||
		err = rest.Patch(types.StrategicMergePatchType).AbsPath(fmt.Sprintf("/api/v1/namespaces/default/secrets/test")).
 | 
							err = rest.Patch(types.StrategicMergePatchType).AbsPath(fmt.Sprintf("/api/v1/namespaces/default/secrets/test")).
 | 
				
			||||||
			Body(patchBody).Do().Error()
 | 
								Body(patchBody).Do().Error()
 | 
				
			||||||
		if err != nil && !errors.IsBadRequest(err) {
 | 
							if err != nil && !apierrors.IsBadRequest(err) {
 | 
				
			||||||
			t.Errorf("expected success or bad request err, got %v", err)
 | 
								t.Errorf("expected success or bad request err, got %v", err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
@@ -137,7 +136,7 @@ func TestMaxResourceSize(t *testing.T) {
 | 
				
			|||||||
		patchBody := []byte(`{"value":` + strings.Repeat("[", 3*1024*1024/2-100) + strings.Repeat("]", 3*1024*1024/2-100) + `}`)
 | 
							patchBody := []byte(`{"value":` + strings.Repeat("[", 3*1024*1024/2-100) + strings.Repeat("]", 3*1024*1024/2-100) + `}`)
 | 
				
			||||||
		err = rest.Patch(types.ApplyPatchType).Param("fieldManager", "test").AbsPath(fmt.Sprintf("/api/v1/namespaces/default/secrets/test")).
 | 
							err = rest.Patch(types.ApplyPatchType).Param("fieldManager", "test").AbsPath(fmt.Sprintf("/api/v1/namespaces/default/secrets/test")).
 | 
				
			||||||
			Body(patchBody).Do().Error()
 | 
								Body(patchBody).Do().Error()
 | 
				
			||||||
		if err != nil && !errors.IsBadRequest(err) {
 | 
							if err != nil && !apierrors.IsBadRequest(err) {
 | 
				
			||||||
			t.Errorf("expected success or bad request err, got %#v", err)
 | 
								t.Errorf("expected success or bad request err, got %#v", err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	})
 | 
						})
 | 
				
			||||||
@@ -155,7 +154,7 @@ func TestMaxResourceSize(t *testing.T) {
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			t.Fatalf("unexpected no error")
 | 
								t.Fatalf("unexpected no error")
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if !errors.IsRequestEntityTooLargeError(err) {
 | 
							if !apierrors.IsRequestEntityTooLargeError(err) {
 | 
				
			||||||
			t.Errorf("expected requested entity too large err, got %v", err)
 | 
								t.Errorf("expected requested entity too large err, got %v", err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
	"github.com/google/uuid"
 | 
						"github.com/google/uuid"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/meta"
 | 
						"k8s.io/apimachinery/pkg/api/meta"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
@@ -86,7 +86,7 @@ func TestPatchConflicts(t *testing.T) {
 | 
				
			|||||||
				Do().
 | 
									Do().
 | 
				
			||||||
				Get()
 | 
									Get()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if errors.IsConflict(err) {
 | 
								if apierrors.IsConflict(err) {
 | 
				
			||||||
				t.Logf("tolerated conflict error patching %s: %v", "secrets", err)
 | 
									t.Logf("tolerated conflict error patching %s: %v", "secrets", err)
 | 
				
			||||||
				return
 | 
									return
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -28,7 +28,7 @@ import (
 | 
				
			|||||||
	policy "k8s.io/api/policy/v1beta1"
 | 
						policy "k8s.io/api/policy/v1beta1"
 | 
				
			||||||
	storagev1 "k8s.io/api/storage/v1"
 | 
						storagev1 "k8s.io/api/storage/v1"
 | 
				
			||||||
	apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
 | 
						apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime"
 | 
						"k8s.io/apimachinery/pkg/runtime"
 | 
				
			||||||
@@ -638,14 +638,14 @@ func expect(t *testing.T, f func() error, wantErr func(error) bool) (timeout boo
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func expectForbidden(t *testing.T, f func() error) {
 | 
					func expectForbidden(t *testing.T, f func() error) {
 | 
				
			||||||
	t.Helper()
 | 
						t.Helper()
 | 
				
			||||||
	if ok, err := expect(t, f, errors.IsForbidden); !ok {
 | 
						if ok, err := expect(t, f, apierrors.IsForbidden); !ok {
 | 
				
			||||||
		t.Errorf("Expected forbidden error, got %v", err)
 | 
							t.Errorf("Expected forbidden error, got %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
func expectNotFound(t *testing.T, f func() error) {
 | 
					func expectNotFound(t *testing.T, f func() error) {
 | 
				
			||||||
	t.Helper()
 | 
						t.Helper()
 | 
				
			||||||
	if ok, err := expect(t, f, errors.IsNotFound); !ok {
 | 
						if ok, err := expect(t, f, apierrors.IsNotFound); !ok {
 | 
				
			||||||
		t.Errorf("Expected notfound error, got %v", err)
 | 
							t.Errorf("Expected notfound error, got %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	apps "k8s.io/api/apps/v1"
 | 
						apps "k8s.io/api/apps/v1"
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						"k8s.io/apimachinery/pkg/util/intstr"
 | 
				
			||||||
@@ -310,7 +310,7 @@ func validateDaemonSetPodsAndMarkReady(
 | 
				
			|||||||
func podUnschedulable(c clientset.Interface, podNamespace, podName string) wait.ConditionFunc {
 | 
					func podUnschedulable(c clientset.Interface, podNamespace, podName string) wait.ConditionFunc {
 | 
				
			||||||
	return func() (bool, error) {
 | 
						return func() (bool, error) {
 | 
				
			||||||
		pod, err := c.CoreV1().Pods(podNamespace).Get(podName, metav1.GetOptions{})
 | 
							pod, err := c.CoreV1().Pods(podNamespace).Get(podName, metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -21,7 +21,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
						apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						"k8s.io/apimachinery/pkg/runtime/schema"
 | 
				
			||||||
@@ -55,7 +55,7 @@ func DryRunCreateTest(t *testing.T, rsc dynamic.ResourceInterface, obj *unstruct
 | 
				
			|||||||
			obj.GroupVersionKind())
 | 
								obj.GroupVersionKind())
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if _, err := rsc.Get(obj.GetName(), metav1.GetOptions{}); !errors.IsNotFound(err) {
 | 
						if _, err := rsc.Get(obj.GetName(), metav1.GetOptions{}); !apierrors.IsNotFound(err) {
 | 
				
			||||||
		t.Fatalf("object shouldn't exist: %v", err)
 | 
							t.Fatalf("object shouldn't exist: %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
@@ -92,7 +92,7 @@ func getReplicasOrFail(t *testing.T, obj *unstructured.Unstructured) int64 {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func DryRunScalePatchTest(t *testing.T, rsc dynamic.ResourceInterface, name string) {
 | 
					func DryRunScalePatchTest(t *testing.T, rsc dynamic.ResourceInterface, name string) {
 | 
				
			||||||
	obj, err := rsc.Get(name, metav1.GetOptions{}, "scale")
 | 
						obj, err := rsc.Get(name, metav1.GetOptions{}, "scale")
 | 
				
			||||||
	if errors.IsNotFound(err) {
 | 
						if apierrors.IsNotFound(err) {
 | 
				
			||||||
		return
 | 
							return
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
@@ -119,7 +119,7 @@ func DryRunScalePatchTest(t *testing.T, rsc dynamic.ResourceInterface, name stri
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
func DryRunScaleUpdateTest(t *testing.T, rsc dynamic.ResourceInterface, name string) {
 | 
					func DryRunScaleUpdateTest(t *testing.T, rsc dynamic.ResourceInterface, name string) {
 | 
				
			||||||
	obj, err := rsc.Get(name, metav1.GetOptions{}, "scale")
 | 
						obj, err := rsc.Get(name, metav1.GetOptions{}, "scale")
 | 
				
			||||||
	if errors.IsNotFound(err) {
 | 
						if apierrors.IsNotFound(err) {
 | 
				
			||||||
		return
 | 
							return
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if err != nil {
 | 
						if err != nil {
 | 
				
			||||||
@@ -156,7 +156,7 @@ func DryRunUpdateTest(t *testing.T, rsc dynamic.ResourceInterface, name string)
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
		obj.SetAnnotations(map[string]string{"update": "true"})
 | 
							obj.SetAnnotations(map[string]string{"update": "true"})
 | 
				
			||||||
		obj, err = rsc.Update(obj, metav1.UpdateOptions{DryRun: []string{metav1.DryRunAll}})
 | 
							obj, err = rsc.Update(obj, metav1.UpdateOptions{DryRun: []string{metav1.DryRunAll}})
 | 
				
			||||||
		if err == nil || !errors.IsConflict(err) {
 | 
							if err == nil || !apierrors.IsConflict(err) {
 | 
				
			||||||
			break
 | 
								break
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -28,7 +28,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/api/policy/v1beta1"
 | 
						"k8s.io/api/policy/v1beta1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	utilerrors "k8s.io/apimachinery/pkg/util/errors"
 | 
						utilerrors "k8s.io/apimachinery/pkg/util/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						"k8s.io/apimachinery/pkg/util/intstr"
 | 
				
			||||||
@@ -114,9 +114,9 @@ func TestConcurrentEvictionRequests(t *testing.T) {
 | 
				
			|||||||
			err := wait.PollImmediate(5*time.Second, 60*time.Second, func() (bool, error) {
 | 
								err := wait.PollImmediate(5*time.Second, 60*time.Second, func() (bool, error) {
 | 
				
			||||||
				e := clientSet.PolicyV1beta1().Evictions(ns.Name).Evict(eviction)
 | 
									e := clientSet.PolicyV1beta1().Evictions(ns.Name).Evict(eviction)
 | 
				
			||||||
				switch {
 | 
									switch {
 | 
				
			||||||
				case errors.IsTooManyRequests(e):
 | 
									case apierrors.IsTooManyRequests(e):
 | 
				
			||||||
					return false, nil
 | 
										return false, nil
 | 
				
			||||||
				case errors.IsConflict(e):
 | 
									case apierrors.IsConflict(e):
 | 
				
			||||||
					return false, fmt.Errorf("Unexpected Conflict (409) error caused by failing to handle concurrent PDB updates: %v", e)
 | 
										return false, fmt.Errorf("Unexpected Conflict (409) error caused by failing to handle concurrent PDB updates: %v", e)
 | 
				
			||||||
				case e == nil:
 | 
									case e == nil:
 | 
				
			||||||
					return true, nil
 | 
										return true, nil
 | 
				
			||||||
@@ -132,7 +132,7 @@ func TestConcurrentEvictionRequests(t *testing.T) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
			_, err = clientSet.CoreV1().Pods(ns.Name).Get(podName, metav1.GetOptions{})
 | 
								_, err = clientSet.CoreV1().Pods(ns.Name).Get(podName, metav1.GetOptions{})
 | 
				
			||||||
			switch {
 | 
								switch {
 | 
				
			||||||
			case errors.IsNotFound(err):
 | 
								case apierrors.IsNotFound(err):
 | 
				
			||||||
				atomic.AddUint32(&numberPodsEvicted, 1)
 | 
									atomic.AddUint32(&numberPodsEvicted, 1)
 | 
				
			||||||
				// pod was evicted and deleted so return from goroutine immediately
 | 
									// pod was evicted and deleted so return from goroutine immediately
 | 
				
			||||||
				return
 | 
									return
 | 
				
			||||||
@@ -222,9 +222,9 @@ func TestTerminalPodEviction(t *testing.T) {
 | 
				
			|||||||
	err = wait.PollImmediate(5*time.Second, 60*time.Second, func() (bool, error) {
 | 
						err = wait.PollImmediate(5*time.Second, 60*time.Second, func() (bool, error) {
 | 
				
			||||||
		e := clientSet.PolicyV1beta1().Evictions(ns.Name).Evict(eviction)
 | 
							e := clientSet.PolicyV1beta1().Evictions(ns.Name).Evict(eviction)
 | 
				
			||||||
		switch {
 | 
							switch {
 | 
				
			||||||
		case errors.IsTooManyRequests(e):
 | 
							case apierrors.IsTooManyRequests(e):
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		case errors.IsConflict(e):
 | 
							case apierrors.IsConflict(e):
 | 
				
			||||||
			return false, fmt.Errorf("Unexpected Conflict (409) error caused by failing to handle concurrent PDB updates: %v", e)
 | 
								return false, fmt.Errorf("Unexpected Conflict (409) error caused by failing to handle concurrent PDB updates: %v", e)
 | 
				
			||||||
		case e == nil:
 | 
							case e == nil:
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -24,7 +24,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/types"
 | 
						"k8s.io/apimachinery/pkg/types"
 | 
				
			||||||
@@ -119,7 +119,7 @@ func TestClusterScopedOwners(t *testing.T) {
 | 
				
			|||||||
	if err := wait.Poll(5*time.Second, 300*time.Second, func() (bool, error) {
 | 
						if err := wait.Poll(5*time.Second, 300*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := clientSet.CoreV1().ConfigMaps(ns.Name).Get("cm-missing", metav1.GetOptions{})
 | 
							_, err := clientSet.CoreV1().ConfigMaps(ns.Name).Get("cm-missing", metav1.GetOptions{})
 | 
				
			||||||
		switch {
 | 
							switch {
 | 
				
			||||||
		case errors.IsNotFound(err):
 | 
							case apierrors.IsNotFound(err):
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		case err != nil:
 | 
							case err != nil:
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -28,7 +28,7 @@ import (
 | 
				
			|||||||
	apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
 | 
						apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
 | 
				
			||||||
	apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
						apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
				
			||||||
	apiextensionstestserver "k8s.io/apiextensions-apiserver/test/integration/fixtures"
 | 
						apiextensionstestserver "k8s.io/apiextensions-apiserver/test/integration/fixtures"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/meta"
 | 
						"k8s.io/apimachinery/pkg/api/meta"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
						"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
 | 
				
			||||||
@@ -698,7 +698,7 @@ func TestSolidOwnerDoesNotBlockWaitingOwner(t *testing.T) {
 | 
				
			|||||||
	if err := wait.PollImmediate(1*time.Second, 30*time.Second, func() (bool, error) {
 | 
						if err := wait.PollImmediate(1*time.Second, 30*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := rcClient.Get(toBeDeletedRC.Name, metav1.GetOptions{})
 | 
							_, err := rcClient.Get(toBeDeletedRC.Name, metav1.GetOptions{})
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			if errors.IsNotFound(err) {
 | 
								if apierrors.IsNotFound(err) {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
@@ -766,7 +766,7 @@ func TestNonBlockingOwnerRefDoesNotBlock(t *testing.T) {
 | 
				
			|||||||
	if err := wait.PollImmediate(1*time.Second, 30*time.Second, func() (bool, error) {
 | 
						if err := wait.PollImmediate(1*time.Second, 30*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := rcClient.Get(toBeDeletedRC.Name, metav1.GetOptions{})
 | 
							_, err := rcClient.Get(toBeDeletedRC.Name, metav1.GetOptions{})
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			if errors.IsNotFound(err) {
 | 
								if apierrors.IsNotFound(err) {
 | 
				
			||||||
				return true, nil
 | 
									return true, nil
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
@@ -843,7 +843,7 @@ func TestDoubleDeletionWithFinalizer(t *testing.T) {
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
	if err := wait.Poll(1*time.Second, 10*time.Second, func() (bool, error) {
 | 
						if err := wait.Poll(1*time.Second, 10*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := podClient.Get(pod.Name, metav1.GetOptions{})
 | 
							_, err := podClient.Get(pod.Name, metav1.GetOptions{})
 | 
				
			||||||
		return errors.IsNotFound(err), nil
 | 
							return apierrors.IsNotFound(err), nil
 | 
				
			||||||
	}); err != nil {
 | 
						}); err != nil {
 | 
				
			||||||
		t.Fatalf("Failed waiting for pod %q to be deleted", pod.Name)
 | 
							t.Fatalf("Failed waiting for pod %q to be deleted", pod.Name)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -950,7 +950,7 @@ func TestCustomResourceCascadingDeletion(t *testing.T) {
 | 
				
			|||||||
	// Ensure the owner is deleted.
 | 
						// Ensure the owner is deleted.
 | 
				
			||||||
	if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
						if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := resourceClient.Get(owner.GetName(), metav1.GetOptions{})
 | 
							_, err := resourceClient.Get(owner.GetName(), metav1.GetOptions{})
 | 
				
			||||||
		return errors.IsNotFound(err), nil
 | 
							return apierrors.IsNotFound(err), nil
 | 
				
			||||||
	}); err != nil {
 | 
						}); err != nil {
 | 
				
			||||||
		t.Fatalf("failed waiting for owner resource %q to be deleted", owner.GetName())
 | 
							t.Fatalf("failed waiting for owner resource %q to be deleted", owner.GetName())
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -960,7 +960,7 @@ func TestCustomResourceCascadingDeletion(t *testing.T) {
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("expected dependent %q to be deleted", dependent.GetName())
 | 
							t.Fatalf("expected dependent %q to be deleted", dependent.GetName())
 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		if !errors.IsNotFound(err) {
 | 
							if !apierrors.IsNotFound(err) {
 | 
				
			||||||
			t.Fatalf("unexpected error getting dependent %q: %v", dependent.GetName(), err)
 | 
								t.Fatalf("unexpected error getting dependent %q: %v", dependent.GetName(), err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -1028,7 +1028,7 @@ func TestMixedRelationships(t *testing.T) {
 | 
				
			|||||||
	// Ensure the owner is deleted.
 | 
						// Ensure the owner is deleted.
 | 
				
			||||||
	if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
						if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := resourceClient.Get(customOwner.GetName(), metav1.GetOptions{})
 | 
							_, err := resourceClient.Get(customOwner.GetName(), metav1.GetOptions{})
 | 
				
			||||||
		return errors.IsNotFound(err), nil
 | 
							return apierrors.IsNotFound(err), nil
 | 
				
			||||||
	}); err != nil {
 | 
						}); err != nil {
 | 
				
			||||||
		t.Fatalf("failed waiting for owner resource %q to be deleted", customOwner.GetName())
 | 
							t.Fatalf("failed waiting for owner resource %q to be deleted", customOwner.GetName())
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -1038,7 +1038,7 @@ func TestMixedRelationships(t *testing.T) {
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("expected dependent %q to be deleted", coreDependent.GetName())
 | 
							t.Fatalf("expected dependent %q to be deleted", coreDependent.GetName())
 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		if !errors.IsNotFound(err) {
 | 
							if !apierrors.IsNotFound(err) {
 | 
				
			||||||
			t.Fatalf("unexpected error getting dependent %q: %v", coreDependent.GetName(), err)
 | 
								t.Fatalf("unexpected error getting dependent %q: %v", coreDependent.GetName(), err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -1052,7 +1052,7 @@ func TestMixedRelationships(t *testing.T) {
 | 
				
			|||||||
	// Ensure the owner is deleted.
 | 
						// Ensure the owner is deleted.
 | 
				
			||||||
	if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
						if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := configMapClient.Get(coreOwner.GetName(), metav1.GetOptions{})
 | 
							_, err := configMapClient.Get(coreOwner.GetName(), metav1.GetOptions{})
 | 
				
			||||||
		return errors.IsNotFound(err), nil
 | 
							return apierrors.IsNotFound(err), nil
 | 
				
			||||||
	}); err != nil {
 | 
						}); err != nil {
 | 
				
			||||||
		t.Fatalf("failed waiting for owner resource %q to be deleted", coreOwner.GetName())
 | 
							t.Fatalf("failed waiting for owner resource %q to be deleted", coreOwner.GetName())
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -1062,7 +1062,7 @@ func TestMixedRelationships(t *testing.T) {
 | 
				
			|||||||
	if err == nil {
 | 
						if err == nil {
 | 
				
			||||||
		t.Fatalf("expected dependent %q to be deleted", customDependent.GetName())
 | 
							t.Fatalf("expected dependent %q to be deleted", customDependent.GetName())
 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		if !errors.IsNotFound(err) {
 | 
							if !apierrors.IsNotFound(err) {
 | 
				
			||||||
			t.Fatalf("unexpected error getting dependent %q: %v", customDependent.GetName(), err)
 | 
								t.Fatalf("unexpected error getting dependent %q: %v", customDependent.GetName(), err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -1123,7 +1123,7 @@ func testCRDDeletion(t *testing.T, ctx *testContext, ns *v1.Namespace, definitio
 | 
				
			|||||||
	// Ensure the owner is deleted.
 | 
						// Ensure the owner is deleted.
 | 
				
			||||||
	if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
						if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := resourceClient.Get(owner.GetName(), metav1.GetOptions{})
 | 
							_, err := resourceClient.Get(owner.GetName(), metav1.GetOptions{})
 | 
				
			||||||
		return errors.IsNotFound(err), nil
 | 
							return apierrors.IsNotFound(err), nil
 | 
				
			||||||
	}); err != nil {
 | 
						}); err != nil {
 | 
				
			||||||
		t.Fatalf("failed waiting for owner %q to be deleted", owner.GetName())
 | 
							t.Fatalf("failed waiting for owner %q to be deleted", owner.GetName())
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -1131,7 +1131,7 @@ func testCRDDeletion(t *testing.T, ctx *testContext, ns *v1.Namespace, definitio
 | 
				
			|||||||
	// Ensure the dependent is deleted.
 | 
						// Ensure the dependent is deleted.
 | 
				
			||||||
	if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
						if err := wait.Poll(1*time.Second, 60*time.Second, func() (bool, error) {
 | 
				
			||||||
		_, err := configMapClient.Get(dependent.GetName(), metav1.GetOptions{})
 | 
							_, err := configMapClient.Get(dependent.GetName(), metav1.GetOptions{})
 | 
				
			||||||
		return errors.IsNotFound(err), nil
 | 
							return apierrors.IsNotFound(err), nil
 | 
				
			||||||
	}); err != nil {
 | 
						}); err != nil {
 | 
				
			||||||
		t.Fatalf("failed waiting for dependent %q (owned by %q) to be deleted", dependent.GetName(), owner.GetName())
 | 
							t.Fatalf("failed waiting for dependent %q (owned by %q) to be deleted", dependent.GetName(), owner.GetName())
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -20,7 +20,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						"k8s.io/apimachinery/pkg/runtime/schema"
 | 
				
			||||||
@@ -78,7 +78,7 @@ func createNodes(apiURL string, config *Config) error {
 | 
				
			|||||||
	for i := 0; i < config.NumNodes; i++ {
 | 
						for i := 0; i < config.NumNodes; i++ {
 | 
				
			||||||
		var err error
 | 
							var err error
 | 
				
			||||||
		for j := 0; j < maxCreateRetries; j++ {
 | 
							for j := 0; j < maxCreateRetries; j++ {
 | 
				
			||||||
			if _, err = clientSet.CoreV1().Nodes().Create(baseNodeTemplate); err != nil && errors.IsServerTimeout(err) {
 | 
								if _, err = clientSet.CoreV1().Nodes().Create(baseNodeTemplate); err != nil && apierrors.IsServerTimeout(err) {
 | 
				
			||||||
				klog.Infof("Server timeout creating nodes, retrying after %v", retryDelay)
 | 
									klog.Infof("Server timeout creating nodes, retrying after %v", retryDelay)
 | 
				
			||||||
				time.Sleep(retryDelay)
 | 
									time.Sleep(retryDelay)
 | 
				
			||||||
				continue
 | 
									continue
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -25,7 +25,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	"github.com/stretchr/testify/require"
 | 
						"github.com/stretchr/testify/require"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	auditinternal "k8s.io/apiserver/pkg/apis/audit"
 | 
						auditinternal "k8s.io/apiserver/pkg/apis/audit"
 | 
				
			||||||
@@ -231,7 +231,7 @@ func sinkHealth(t *testing.T, kubeclient kubernetes.Interface, servers ...*utils
 | 
				
			|||||||
// corresponding expected audit event
 | 
					// corresponding expected audit event
 | 
				
			||||||
func simpleOp(name string, kubeclient kubernetes.Interface) ([]utils.AuditEvent, error) {
 | 
					func simpleOp(name string, kubeclient kubernetes.Interface) ([]utils.AuditEvent, error) {
 | 
				
			||||||
	_, err := kubeclient.CoreV1().ConfigMaps(namespace).Get(name, metav1.GetOptions{})
 | 
						_, err := kubeclient.CoreV1().ConfigMaps(namespace).Get(name, metav1.GetOptions{})
 | 
				
			||||||
	if err != nil && !errors.IsNotFound(err) {
 | 
						if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
		return nil, err
 | 
							return nil, err
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -36,7 +36,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	appsv1 "k8s.io/api/apps/v1"
 | 
						appsv1 "k8s.io/api/apps/v1"
 | 
				
			||||||
	corev1 "k8s.io/api/core/v1"
 | 
						corev1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	"k8s.io/apiserver/pkg/authentication/group"
 | 
						"k8s.io/apiserver/pkg/authentication/group"
 | 
				
			||||||
@@ -102,7 +102,7 @@ func TestKubernetesService(t *testing.T) {
 | 
				
			|||||||
	defer closeFn()
 | 
						defer closeFn()
 | 
				
			||||||
	coreClient := clientset.NewForConfigOrDie(config.GenericConfig.LoopbackClientConfig)
 | 
						coreClient := clientset.NewForConfigOrDie(config.GenericConfig.LoopbackClientConfig)
 | 
				
			||||||
	err := wait.PollImmediate(time.Millisecond*100, wait.ForeverTestTimeout, func() (bool, error) {
 | 
						err := wait.PollImmediate(time.Millisecond*100, wait.ForeverTestTimeout, func() (bool, error) {
 | 
				
			||||||
		if _, err := coreClient.CoreV1().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{}); err != nil && errors.IsNotFound(err) {
 | 
							if _, err := coreClient.CoreV1().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{}); err != nil && apierrors.IsNotFound(err) {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		} else if err != nil {
 | 
							} else if err != nil {
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
@@ -682,10 +682,10 @@ func TestServiceAlloc(t *testing.T) {
 | 
				
			|||||||
	// Wait until the default "kubernetes" service is created.
 | 
						// Wait until the default "kubernetes" service is created.
 | 
				
			||||||
	if err = wait.Poll(250*time.Millisecond, time.Minute, func() (bool, error) {
 | 
						if err = wait.Poll(250*time.Millisecond, time.Minute, func() (bool, error) {
 | 
				
			||||||
		_, err := client.CoreV1().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{})
 | 
							_, err := client.CoreV1().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{})
 | 
				
			||||||
		if err != nil && !errors.IsNotFound(err) {
 | 
							if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
			return false, err
 | 
								return false, err
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		return !errors.IsNotFound(err), nil
 | 
							return !apierrors.IsNotFound(err), nil
 | 
				
			||||||
	}); err != nil {
 | 
						}); err != nil {
 | 
				
			||||||
		t.Fatalf("creating kubernetes service timed out")
 | 
							t.Fatalf("creating kubernetes service timed out")
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -864,7 +864,7 @@ func TestUpdateNodeObjects(t *testing.T) {
 | 
				
			|||||||
					n.Status.Conditions = nil
 | 
										n.Status.Conditions = nil
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
				if _, err := c.Nodes().UpdateStatus(n); err != nil {
 | 
									if _, err := c.Nodes().UpdateStatus(n); err != nil {
 | 
				
			||||||
					if !errors.IsConflict(err) {
 | 
										if !apierrors.IsConflict(err) {
 | 
				
			||||||
						fmt.Printf("[%d] error after %d: %v\n", node, i, err)
 | 
											fmt.Printf("[%d] error after %d: %v\n", node, i, err)
 | 
				
			||||||
						break
 | 
											break
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -26,7 +26,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	apps "k8s.io/api/apps/v1"
 | 
						apps "k8s.io/api/apps/v1"
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/uuid"
 | 
						"k8s.io/apimachinery/pkg/util/uuid"
 | 
				
			||||||
@@ -681,7 +681,7 @@ func TestPodOrphaningAndAdoptionWhenLabelsChange(t *testing.T) {
 | 
				
			|||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			// If the pod is not found, it means the RS picks the pod for deletion (it is extra)
 | 
								// If the pod is not found, it means the RS picks the pod for deletion (it is extra)
 | 
				
			||||||
			// Verify there is only one pod in namespace and it has ControllerRef to the RS
 | 
								// Verify there is only one pod in namespace and it has ControllerRef to the RS
 | 
				
			||||||
			if errors.IsNotFound(err) {
 | 
								if apierrors.IsNotFound(err) {
 | 
				
			||||||
				pods := getPods(t, podClient, labelMap())
 | 
									pods := getPods(t, podClient, labelMap())
 | 
				
			||||||
				if len(pods.Items) != 1 {
 | 
									if len(pods.Items) != 1 {
 | 
				
			||||||
					return false, fmt.Errorf("Expected 1 pod in current namespace, got %d", len(pods.Items))
 | 
										return false, fmt.Errorf("Expected 1 pod in current namespace, got %d", len(pods.Items))
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -24,7 +24,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/uuid"
 | 
						"k8s.io/apimachinery/pkg/util/uuid"
 | 
				
			||||||
@@ -654,7 +654,7 @@ func TestPodOrphaningAndAdoptionWhenLabelsChange(t *testing.T) {
 | 
				
			|||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			// If the pod is not found, it means the RC picks the pod for deletion (it is extra)
 | 
								// If the pod is not found, it means the RC picks the pod for deletion (it is extra)
 | 
				
			||||||
			// Verify there is only one pod in namespace and it has ControllerRef to the RC
 | 
								// Verify there is only one pod in namespace and it has ControllerRef to the RC
 | 
				
			||||||
			if errors.IsNotFound(err) {
 | 
								if apierrors.IsNotFound(err) {
 | 
				
			||||||
				pods := getPods(t, podClient, labelMap())
 | 
									pods := getPods(t, podClient, labelMap())
 | 
				
			||||||
				if len(pods.Items) != 1 {
 | 
									if len(pods.Items) != 1 {
 | 
				
			||||||
					return false, fmt.Errorf("Expected 1 pod in current namespace, got %d", len(pods.Items))
 | 
										return false, fmt.Errorf("Expected 1 pod in current namespace, got %d", len(pods.Items))
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -22,7 +22,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	utilfeature "k8s.io/apiserver/pkg/util/feature"
 | 
						utilfeature "k8s.io/apiserver/pkg/util/feature"
 | 
				
			||||||
@@ -835,7 +835,7 @@ func TestInterPodAffinity(t *testing.T) {
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
		testPod, err := cs.CoreV1().Pods(context.ns.Name).Create(test.pod)
 | 
							testPod, err := cs.CoreV1().Pods(context.ns.Name).Create(test.pod)
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
			if !(test.errorType == "invalidPod" && errors.IsInvalid(err)) {
 | 
								if !(test.errorType == "invalidPod" && apierrors.IsInvalid(err)) {
 | 
				
			||||||
				t.Fatalf("Test Failed: error, %v, while creating pod during test: %v", err, test.test)
 | 
									t.Fatalf("Test Failed: error, %v, while creating pod during test: %v", err, test.test)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -1017,7 +1017,7 @@ func TestEvenPodsSpreadPredicate(t *testing.T) {
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			testPod, err := cs.CoreV1().Pods(tt.incomingPod.Namespace).Create(tt.incomingPod)
 | 
								testPod, err := cs.CoreV1().Pods(tt.incomingPod.Namespace).Create(tt.incomingPod)
 | 
				
			||||||
			if err != nil && !errors.IsInvalid(err) {
 | 
								if err != nil && !apierrors.IsInvalid(err) {
 | 
				
			||||||
				t.Fatalf("Test Failed: error while creating pod during test: %v", err)
 | 
									t.Fatalf("Test Failed: error while creating pod during test: %v", err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -22,7 +22,7 @@ import (
 | 
				
			|||||||
	"testing"
 | 
						"testing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"k8s.io/api/core/v1"
 | 
						"k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	utilfeature "k8s.io/apiserver/pkg/util/feature"
 | 
						utilfeature "k8s.io/apiserver/pkg/util/feature"
 | 
				
			||||||
@@ -346,7 +346,7 @@ func TestEvenPodsSpreadPriority(t *testing.T) {
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			testPod, err := cs.CoreV1().Pods(tt.incomingPod.Namespace).Create(tt.incomingPod)
 | 
								testPod, err := cs.CoreV1().Pods(tt.incomingPod.Namespace).Create(tt.incomingPod)
 | 
				
			||||||
			if err != nil && !errors.IsInvalid(err) {
 | 
								if err != nil && !apierrors.IsInvalid(err) {
 | 
				
			||||||
				t.Fatalf("Test Failed: error while creating pod during test: %v", err)
 | 
									t.Fatalf("Test Failed: error while creating pod during test: %v", err)
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -26,7 +26,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	policy "k8s.io/api/policy/v1beta1"
 | 
						policy "k8s.io/api/policy/v1beta1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/resource"
 | 
						"k8s.io/apimachinery/pkg/api/resource"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/labels"
 | 
						"k8s.io/apimachinery/pkg/labels"
 | 
				
			||||||
@@ -283,7 +283,7 @@ func waitForReflection(t *testing.T, nodeLister corelisters.NodeLister, key stri
 | 
				
			|||||||
		switch {
 | 
							switch {
 | 
				
			||||||
		case err == nil && passFunc(n):
 | 
							case err == nil && passFunc(n):
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		case errors.IsNotFound(err):
 | 
							case apierrors.IsNotFound(err):
 | 
				
			||||||
			nodes = append(nodes, nil)
 | 
								nodes = append(nodes, nil)
 | 
				
			||||||
		case err != nil:
 | 
							case err != nil:
 | 
				
			||||||
			t.Errorf("Unexpected error: %v", err)
 | 
								t.Errorf("Unexpected error: %v", err)
 | 
				
			||||||
@@ -557,7 +557,7 @@ func runPodWithContainers(cs clientset.Interface, pod *v1.Pod) (*v1.Pod, error)
 | 
				
			|||||||
func podDeleted(c clientset.Interface, podNamespace, podName string) wait.ConditionFunc {
 | 
					func podDeleted(c clientset.Interface, podNamespace, podName string) wait.ConditionFunc {
 | 
				
			||||||
	return func() (bool, error) {
 | 
						return func() (bool, error) {
 | 
				
			||||||
		pod, err := c.CoreV1().Pods(podNamespace).Get(podName, metav1.GetOptions{})
 | 
							pod, err := c.CoreV1().Pods(podNamespace).Get(podName, metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if pod.DeletionTimestamp != nil {
 | 
							if pod.DeletionTimestamp != nil {
 | 
				
			||||||
@@ -737,7 +737,7 @@ func getPod(cs clientset.Interface, podName string, podNamespace string) (*v1.Po
 | 
				
			|||||||
func cleanupPods(cs clientset.Interface, t *testing.T, pods []*v1.Pod) {
 | 
					func cleanupPods(cs clientset.Interface, t *testing.T, pods []*v1.Pod) {
 | 
				
			||||||
	for _, p := range pods {
 | 
						for _, p := range pods {
 | 
				
			||||||
		err := cs.CoreV1().Pods(p.Namespace).Delete(p.Name, metav1.NewDeleteOptions(0))
 | 
							err := cs.CoreV1().Pods(p.Namespace).Delete(p.Name, metav1.NewDeleteOptions(0))
 | 
				
			||||||
		if err != nil && !errors.IsNotFound(err) {
 | 
							if err != nil && !apierrors.IsNotFound(err) {
 | 
				
			||||||
			t.Errorf("error while deleting pod %v/%v: %v", p.Namespace, p.Name, err)
 | 
								t.Errorf("error while deleting pod %v/%v: %v", p.Namespace, p.Name, err)
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -32,7 +32,7 @@ import (
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	apiequality "k8s.io/apimachinery/pkg/api/equality"
 | 
						apiequality "k8s.io/apimachinery/pkg/api/equality"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						"k8s.io/apimachinery/pkg/runtime/schema"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/sets"
 | 
						"k8s.io/apimachinery/pkg/util/sets"
 | 
				
			||||||
@@ -207,7 +207,7 @@ func TestServiceAccountTokenAutoMount(t *testing.T) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	// Create "my" namespace
 | 
						// Create "my" namespace
 | 
				
			||||||
	_, err = c.CoreV1().Namespaces().Create(&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: ns}})
 | 
						_, err = c.CoreV1().Namespaces().Create(&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: ns}})
 | 
				
			||||||
	if err != nil && !errors.IsAlreadyExists(err) {
 | 
						if err != nil && !apierrors.IsAlreadyExists(err) {
 | 
				
			||||||
		t.Fatalf("could not create namespace: %v", err)
 | 
							t.Fatalf("could not create namespace: %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -290,13 +290,13 @@ func TestServiceAccountTokenAuthentication(t *testing.T) {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	// Create "my" namespace
 | 
						// Create "my" namespace
 | 
				
			||||||
	_, err = c.CoreV1().Namespaces().Create(&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: myns}})
 | 
						_, err = c.CoreV1().Namespaces().Create(&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: myns}})
 | 
				
			||||||
	if err != nil && !errors.IsAlreadyExists(err) {
 | 
						if err != nil && !apierrors.IsAlreadyExists(err) {
 | 
				
			||||||
		t.Fatalf("could not create namespace: %v", err)
 | 
							t.Fatalf("could not create namespace: %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	// Create "other" namespace
 | 
						// Create "other" namespace
 | 
				
			||||||
	_, err = c.CoreV1().Namespaces().Create(&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: otherns}})
 | 
						_, err = c.CoreV1().Namespaces().Create(&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: otherns}})
 | 
				
			||||||
	if err != nil && !errors.IsAlreadyExists(err) {
 | 
						if err != nil && !apierrors.IsAlreadyExists(err) {
 | 
				
			||||||
		t.Fatalf("could not create namespace: %v", err)
 | 
							t.Fatalf("could not create namespace: %v", err)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -496,7 +496,7 @@ func getServiceAccount(c *clientset.Clientset, ns string, name string, shouldWai
 | 
				
			|||||||
	var err error
 | 
						var err error
 | 
				
			||||||
	err = wait.Poll(time.Second, 10*time.Second, func() (bool, error) {
 | 
						err = wait.Poll(time.Second, 10*time.Second, func() (bool, error) {
 | 
				
			||||||
		user, err = c.CoreV1().ServiceAccounts(ns).Get(name, metav1.GetOptions{})
 | 
							user, err = c.CoreV1().ServiceAccounts(ns).Get(name, metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
@@ -513,7 +513,7 @@ func getReferencedServiceAccountToken(c *clientset.Clientset, ns string, name st
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	findToken := func() (bool, error) {
 | 
						findToken := func() (bool, error) {
 | 
				
			||||||
		user, err := c.CoreV1().ServiceAccounts(ns).Get(name, metav1.GetOptions{})
 | 
							user, err := c.CoreV1().ServiceAccounts(ns).Get(name, metav1.GetOptions{})
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if err != nil {
 | 
							if err != nil {
 | 
				
			||||||
@@ -522,7 +522,7 @@ func getReferencedServiceAccountToken(c *clientset.Clientset, ns string, name st
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		for _, ref := range user.Secrets {
 | 
							for _, ref := range user.Secrets {
 | 
				
			||||||
			secret, err := c.CoreV1().Secrets(ns).Get(ref.Name, metav1.GetOptions{})
 | 
								secret, err := c.CoreV1().Secrets(ns).Get(ref.Name, metav1.GetOptions{})
 | 
				
			||||||
			if errors.IsNotFound(err) {
 | 
								if apierrors.IsNotFound(err) {
 | 
				
			||||||
				continue
 | 
									continue
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
			if err != nil {
 | 
								if err != nil {
 | 
				
			||||||
@@ -586,8 +586,8 @@ func doServiceAccountAPIRequests(t *testing.T, c *clientset.Clientset, ns string
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	for _, op := range readOps {
 | 
						for _, op := range readOps {
 | 
				
			||||||
		err := op()
 | 
							err := op()
 | 
				
			||||||
		unauthorizedError := errors.IsUnauthorized(err)
 | 
							unauthorizedError := apierrors.IsUnauthorized(err)
 | 
				
			||||||
		forbiddenError := errors.IsForbidden(err)
 | 
							forbiddenError := apierrors.IsForbidden(err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		switch {
 | 
							switch {
 | 
				
			||||||
		case !authenticated && !unauthorizedError:
 | 
							case !authenticated && !unauthorizedError:
 | 
				
			||||||
@@ -603,8 +603,8 @@ func doServiceAccountAPIRequests(t *testing.T, c *clientset.Clientset, ns string
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	for _, op := range writeOps {
 | 
						for _, op := range writeOps {
 | 
				
			||||||
		err := op()
 | 
							err := op()
 | 
				
			||||||
		unauthorizedError := errors.IsUnauthorized(err)
 | 
							unauthorizedError := apierrors.IsUnauthorized(err)
 | 
				
			||||||
		forbiddenError := errors.IsForbidden(err)
 | 
							forbiddenError := apierrors.IsForbidden(err)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		switch {
 | 
							switch {
 | 
				
			||||||
		case !authenticated && !unauthorizedError:
 | 
							case !authenticated && !unauthorizedError:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -21,7 +21,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	"google.golang.org/grpc"
 | 
						"google.golang.org/grpc"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						"k8s.io/apimachinery/pkg/util/wait"
 | 
				
			||||||
	"k8s.io/apiserver/pkg/storage/storagebackend"
 | 
						"k8s.io/apiserver/pkg/storage/storagebackend"
 | 
				
			||||||
@@ -62,7 +62,7 @@ func WaitForPodToDisappear(podClient coreclient.PodInterface, podName string, in
 | 
				
			|||||||
		if err == nil {
 | 
							if err == nil {
 | 
				
			||||||
			return false, nil
 | 
								return false, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if errors.IsNotFound(err) {
 | 
							if apierrors.IsNotFound(err) {
 | 
				
			||||||
			return true, nil
 | 
								return true, nil
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		return false, err
 | 
							return false, err
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -30,7 +30,7 @@ import (
 | 
				
			|||||||
	"time"
 | 
						"time"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	v1 "k8s.io/api/core/v1"
 | 
						v1 "k8s.io/api/core/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/api/errors"
 | 
						apierrors "k8s.io/apimachinery/pkg/api/errors"
 | 
				
			||||||
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/runtime"
 | 
						"k8s.io/apimachinery/pkg/runtime"
 | 
				
			||||||
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						"k8s.io/apimachinery/pkg/util/intstr"
 | 
				
			||||||
@@ -127,7 +127,7 @@ func main() {
 | 
				
			|||||||
			// wait until the namespace disappears
 | 
								// wait until the namespace disappears
 | 
				
			||||||
			for i := 0; i < int(namespaceDeleteTimeout/time.Second); i++ {
 | 
								for i := 0; i < int(namespaceDeleteTimeout/time.Second); i++ {
 | 
				
			||||||
				if _, err := client.CoreV1().Namespaces().Get(ns, metav1.GetOptions{}); err != nil {
 | 
									if _, err := client.CoreV1().Namespaces().Get(ns, metav1.GetOptions{}); err != nil {
 | 
				
			||||||
					if errors.IsNotFound(err) {
 | 
										if apierrors.IsNotFound(err) {
 | 
				
			||||||
						return
 | 
											return
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user