Merge pull request #15596 from zhengguoyong/alias_util_errors_packagename
Auto commit by PR queue bot
This commit is contained in:
		| @@ -19,7 +19,7 @@ package admission | |||||||
| import ( | import ( | ||||||
| 	"k8s.io/kubernetes/pkg/api" | 	"k8s.io/kubernetes/pkg/api" | ||||||
| 	apierrors "k8s.io/kubernetes/pkg/api/errors" | 	apierrors "k8s.io/kubernetes/pkg/api/errors" | ||||||
| 	errs "k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| func extractKindName(a Attributes) (name, kind string, err error) { | func extractKindName(a Attributes) (name, kind string, err error) { | ||||||
| @@ -50,7 +50,7 @@ func NewForbidden(a Attributes, internalError error) error { | |||||||
| 	} | 	} | ||||||
| 	name, kind, err := extractKindName(a) | 	name, kind, err := extractKindName(a) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return apierrors.NewInternalError(errs.NewAggregate([]error{internalError, err})) | 		return apierrors.NewInternalError(utilerrors.NewAggregate([]error{internalError, err})) | ||||||
| 	} | 	} | ||||||
| 	return apierrors.NewForbidden(kind, name, internalError) | 	return apierrors.NewForbidden(kind, name, internalError) | ||||||
| } | } | ||||||
|   | |||||||
| @@ -24,7 +24,7 @@ import ( | |||||||
|  |  | ||||||
| 	"k8s.io/kubernetes/pkg/api/unversioned" | 	"k8s.io/kubernetes/pkg/api/unversioned" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/fielderrors" | 	"k8s.io/kubernetes/pkg/util/fielderrors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -179,7 +179,7 @@ func NewInvalid(kind, name string, errs fielderrors.ValidationErrorList) error { | |||||||
| 			Name:   name, | 			Name:   name, | ||||||
| 			Causes: causes, | 			Causes: causes, | ||||||
| 		}, | 		}, | ||||||
| 		Message: fmt.Sprintf("%s %q is invalid: %v", kind, name, errors.NewAggregate(errs)), | 		Message: fmt.Sprintf("%s %q is invalid: %v", kind, name, utilerrors.NewAggregate(errs)), | ||||||
| 	}} | 	}} | ||||||
| } | } | ||||||
|  |  | ||||||
|   | |||||||
| @@ -26,7 +26,7 @@ import ( | |||||||
| 	"github.com/emicklei/go-restful/swagger" | 	"github.com/emicklei/go-restful/swagger" | ||||||
| 	"github.com/golang/glog" | 	"github.com/golang/glog" | ||||||
| 	apiutil "k8s.io/kubernetes/pkg/api/util" | 	apiutil "k8s.io/kubernetes/pkg/api/util" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	errs "k8s.io/kubernetes/pkg/util/fielderrors" | 	errs "k8s.io/kubernetes/pkg/util/fielderrors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/yaml" | 	"k8s.io/kubernetes/pkg/util/yaml" | ||||||
| ) | ) | ||||||
| @@ -150,14 +150,14 @@ func (s *SwaggerSchema) ValidateBytes(data []byte) error { | |||||||
| 		return fmt.Errorf("kind isn't string type") | 		return fmt.Errorf("kind isn't string type") | ||||||
| 	} | 	} | ||||||
| 	if strings.HasSuffix(kind.(string), "List") { | 	if strings.HasSuffix(kind.(string), "List") { | ||||||
| 		return errors.NewAggregate(s.validateList(fields)) | 		return utilerrors.NewAggregate(s.validateList(fields)) | ||||||
| 	} | 	} | ||||||
| 	version := apiutil.GetVersion(groupVersion.(string)) | 	version := apiutil.GetVersion(groupVersion.(string)) | ||||||
| 	allErrs := s.ValidateObject(obj, "", version+"."+kind.(string)) | 	allErrs := s.ValidateObject(obj, "", version+"."+kind.(string)) | ||||||
| 	if len(allErrs) == 1 { | 	if len(allErrs) == 1 { | ||||||
| 		return allErrs[0] | 		return allErrs[0] | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(allErrs) | 	return utilerrors.NewAggregate(allErrs) | ||||||
| } | } | ||||||
|  |  | ||||||
| func (s *SwaggerSchema) ValidateObject(obj interface{}, fieldName, typeName string) errs.ValidationErrorList { | func (s *SwaggerSchema) ValidateObject(obj interface{}, fieldName, typeName string) errs.ValidationErrorList { | ||||||
|   | |||||||
| @@ -41,7 +41,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/healthz" | 	"k8s.io/kubernetes/pkg/healthz" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util" | 	"k8s.io/kubernetes/pkg/util" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/flushwriter" | 	"k8s.io/kubernetes/pkg/util/flushwriter" | ||||||
| 	"k8s.io/kubernetes/pkg/util/wsstream" | 	"k8s.io/kubernetes/pkg/util/wsstream" | ||||||
| 	"k8s.io/kubernetes/pkg/version" | 	"k8s.io/kubernetes/pkg/version" | ||||||
| @@ -129,7 +129,7 @@ func (g *APIGroupVersion) InstallREST(container *restful.Container) error { | |||||||
| 	// TODO: g.Version only contains "version" now, it will contain "group/version" in the near future. | 	// TODO: g.Version only contains "version" now, it will contain "group/version" in the near future. | ||||||
| 	AddSupportedResourcesWebService(ws, g.Version, apiResources) | 	AddSupportedResourcesWebService(ws, g.Version, apiResources) | ||||||
| 	container.Add(ws) | 	container.Add(ws) | ||||||
| 	return errors.NewAggregate(registrationErrors) | 	return utilerrors.NewAggregate(registrationErrors) | ||||||
| } | } | ||||||
|  |  | ||||||
| // UpdateREST registers the REST handlers for this APIGroupVersion to an existing web service | // UpdateREST registers the REST handlers for this APIGroupVersion to an existing web service | ||||||
| @@ -153,7 +153,7 @@ func (g *APIGroupVersion) UpdateREST(container *restful.Container) error { | |||||||
| 	apiResources, registrationErrors := installer.Install(ws) | 	apiResources, registrationErrors := installer.Install(ws) | ||||||
| 	// TODO: g.Version only contains "version" now, it will contain "group/version" in the near future. | 	// TODO: g.Version only contains "version" now, it will contain "group/version" in the near future. | ||||||
| 	AddSupportedResourcesWebService(ws, g.Version, apiResources) | 	AddSupportedResourcesWebService(ws, g.Version, apiResources) | ||||||
| 	return errors.NewAggregate(registrationErrors) | 	return utilerrors.NewAggregate(registrationErrors) | ||||||
| } | } | ||||||
|  |  | ||||||
| // newInstaller is a helper to create the installer.  Used by InstallREST and UpdateREST. | // newInstaller is a helper to create the installer.  Used by InstallREST and UpdateREST. | ||||||
|   | |||||||
| @@ -18,7 +18,7 @@ package union | |||||||
|  |  | ||||||
| import ( | import ( | ||||||
| 	"k8s.io/kubernetes/pkg/auth/authorizer" | 	"k8s.io/kubernetes/pkg/auth/authorizer" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // unionAuthzHandler authorizer against a chain of authorizer.Authorizer | // unionAuthzHandler authorizer against a chain of authorizer.Authorizer | ||||||
| @@ -41,5 +41,5 @@ func (authzHandler unionAuthzHandler) Authorize(a authorizer.Attributes) error { | |||||||
| 		return nil | 		return nil | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return errors.NewAggregate(errlist) | 	return utilerrors.NewAggregate(errlist) | ||||||
| } | } | ||||||
|   | |||||||
| @@ -30,7 +30,7 @@ import ( | |||||||
|  |  | ||||||
| 	clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api" | 	clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api" | ||||||
| 	clientcmdlatest "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api/latest" | 	clientcmdlatest "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api/latest" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| const ( | const ( | ||||||
| @@ -146,7 +146,7 @@ func (rules *ClientConfigLoadingRules) Load() (*clientcmdapi.Config, error) { | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return config, errors.NewAggregate(errlist) | 	return config, utilerrors.NewAggregate(errlist) | ||||||
| } | } | ||||||
|  |  | ||||||
| // Migrate uses the MigrationRules map.  If a destination file is not present, then the source file is checked. | // Migrate uses the MigrationRules map.  If a destination file is not present, then the source file is checked. | ||||||
|   | |||||||
| @@ -23,7 +23,7 @@ import ( | |||||||
| 	"testing" | 	"testing" | ||||||
|  |  | ||||||
| 	clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api" | 	clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| func TestConfirmUsableBadInfoButOkConfig(t *testing.T) { | func TestConfirmUsableBadInfoButOkConfig(t *testing.T) { | ||||||
| @@ -326,14 +326,14 @@ func (c configValidationTest) testContext(contextName string, t *testing.T) { | |||||||
| 			t.Errorf("Expected error containing: %v", c.expectedErrorSubstring) | 			t.Errorf("Expected error containing: %v", c.expectedErrorSubstring) | ||||||
| 		} | 		} | ||||||
| 		for _, curr := range c.expectedErrorSubstring { | 		for _, curr := range c.expectedErrorSubstring { | ||||||
| 			if len(errs) != 0 && !strings.Contains(errors.NewAggregate(errs).Error(), curr) { | 			if len(errs) != 0 && !strings.Contains(utilerrors.NewAggregate(errs).Error(), curr) { | ||||||
| 				t.Errorf("Expected error containing: %v, but got %v", c.expectedErrorSubstring, errors.NewAggregate(errs)) | 				t.Errorf("Expected error containing: %v, but got %v", c.expectedErrorSubstring, utilerrors.NewAggregate(errs)) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 	} else { | 	} else { | ||||||
| 		if len(errs) != 0 { | 		if len(errs) != 0 { | ||||||
| 			t.Errorf("Unexpected error: %v", errors.NewAggregate(errs)) | 			t.Errorf("Unexpected error: %v", utilerrors.NewAggregate(errs)) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
| @@ -386,14 +386,14 @@ func (c configValidationTest) testCluster(clusterName string, t *testing.T) { | |||||||
| 			t.Errorf("Expected error containing: %v", c.expectedErrorSubstring) | 			t.Errorf("Expected error containing: %v", c.expectedErrorSubstring) | ||||||
| 		} | 		} | ||||||
| 		for _, curr := range c.expectedErrorSubstring { | 		for _, curr := range c.expectedErrorSubstring { | ||||||
| 			if len(errs) != 0 && !strings.Contains(errors.NewAggregate(errs).Error(), curr) { | 			if len(errs) != 0 && !strings.Contains(utilerrors.NewAggregate(errs).Error(), curr) { | ||||||
| 				t.Errorf("Expected error containing: %v, but got %v", c.expectedErrorSubstring, errors.NewAggregate(errs)) | 				t.Errorf("Expected error containing: %v, but got %v", c.expectedErrorSubstring, utilerrors.NewAggregate(errs)) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 	} else { | 	} else { | ||||||
| 		if len(errs) != 0 { | 		if len(errs) != 0 { | ||||||
| 			t.Errorf("Unexpected error: %v", errors.NewAggregate(errs)) | 			t.Errorf("Unexpected error: %v", utilerrors.NewAggregate(errs)) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
| @@ -406,14 +406,14 @@ func (c configValidationTest) testAuthInfo(authInfoName string, t *testing.T) { | |||||||
| 			t.Errorf("Expected error containing: %v", c.expectedErrorSubstring) | 			t.Errorf("Expected error containing: %v", c.expectedErrorSubstring) | ||||||
| 		} | 		} | ||||||
| 		for _, curr := range c.expectedErrorSubstring { | 		for _, curr := range c.expectedErrorSubstring { | ||||||
| 			if len(errs) != 0 && !strings.Contains(errors.NewAggregate(errs).Error(), curr) { | 			if len(errs) != 0 && !strings.Contains(utilerrors.NewAggregate(errs).Error(), curr) { | ||||||
| 				t.Errorf("Expected error containing: %v, but got %v", c.expectedErrorSubstring, errors.NewAggregate(errs)) | 				t.Errorf("Expected error containing: %v, but got %v", c.expectedErrorSubstring, utilerrors.NewAggregate(errs)) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
|  |  | ||||||
| 	} else { | 	} else { | ||||||
| 		if len(errs) != 0 { | 		if len(errs) != 0 { | ||||||
| 			t.Errorf("Unexpected error: %v", errors.NewAggregate(errs)) | 			t.Errorf("Unexpected error: %v", utilerrors.NewAggregate(errs)) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| } | } | ||||||
|   | |||||||
| @@ -29,7 +29,7 @@ import ( | |||||||
|  |  | ||||||
| 	"k8s.io/kubernetes/pkg/api" | 	"k8s.io/kubernetes/pkg/api" | ||||||
| 	"k8s.io/kubernetes/pkg/cloudprovider" | 	"k8s.io/kubernetes/pkg/cloudprovider" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/sets" | 	"k8s.io/kubernetes/pkg/util/sets" | ||||||
| 	"k8s.io/kubernetes/pkg/util/wait" | 	"k8s.io/kubernetes/pkg/util/wait" | ||||||
|  |  | ||||||
| @@ -805,7 +805,7 @@ func (gce *GCECloud) UpdateTCPLoadBalancer(name, region string, hosts []string) | |||||||
|  |  | ||||||
| // EnsureTCPLoadBalancerDeleted is an implementation of TCPLoadBalancer.EnsureTCPLoadBalancerDeleted. | // EnsureTCPLoadBalancerDeleted is an implementation of TCPLoadBalancer.EnsureTCPLoadBalancerDeleted. | ||||||
| func (gce *GCECloud) EnsureTCPLoadBalancerDeleted(name, region string) error { | func (gce *GCECloud) EnsureTCPLoadBalancerDeleted(name, region string) error { | ||||||
| 	err := errors.AggregateGoroutines( | 	err := utilerrors.AggregateGoroutines( | ||||||
| 		func() error { return gce.deleteFirewall(name, region) }, | 		func() error { return gce.deleteFirewall(name, region) }, | ||||||
| 		// Even though we don't hold on to static IPs for load balancers, it's | 		// Even though we don't hold on to static IPs for load balancers, it's | ||||||
| 		// possible that EnsureTCPLoadBalancer left one around in a failed | 		// possible that EnsureTCPLoadBalancer left one around in a failed | ||||||
| @@ -824,7 +824,7 @@ func (gce *GCECloud) EnsureTCPLoadBalancerDeleted(name, region string) error { | |||||||
| 		}, | 		}, | ||||||
| 	) | 	) | ||||||
| 	if err != nil { | 	if err != nil { | ||||||
| 		return errors.Flatten(err) | 		return utilerrors.Flatten(err) | ||||||
| 	} | 	} | ||||||
| 	return nil | 	return nil | ||||||
| } | } | ||||||
|   | |||||||
| @@ -29,7 +29,7 @@ import ( | |||||||
| 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util" | 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util" | ||||||
| 	"k8s.io/kubernetes/pkg/kubectl/resource" | 	"k8s.io/kubernetes/pkg/kubectl/resource" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // DescribeOptions is the start of the data required to perform the operation.  As new fields are added, add them here instead of | // DescribeOptions is the start of the data required to perform the operation.  As new fields are added, add them here instead of | ||||||
| @@ -142,7 +142,7 @@ func RunDescribe(f *cmdutil.Factory, out io.Writer, cmd *cobra.Command, args []s | |||||||
| 		fmt.Fprintf(out, "%s\n\n", s) | 		fmt.Fprintf(out, "%s\n\n", s) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return errors.NewAggregate(allErrs) | 	return utilerrors.NewAggregate(allErrs) | ||||||
| } | } | ||||||
|  |  | ||||||
| func DescribeMatchingResources(mapper meta.RESTMapper, typer runtime.ObjectTyper, f *cmdutil.Factory, namespace, rsrc, prefix string, out io.Writer, originalError error) error { | func DescribeMatchingResources(mapper meta.RESTMapper, typer runtime.ObjectTyper, f *cmdutil.Factory, namespace, rsrc, prefix string, out io.Writer, originalError error) error { | ||||||
|   | |||||||
| @@ -28,7 +28,7 @@ import ( | |||||||
| 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util" | 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util" | ||||||
| 	"k8s.io/kubernetes/pkg/kubectl/resource" | 	"k8s.io/kubernetes/pkg/kubectl/resource" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/strategicpatch" | 	"k8s.io/kubernetes/pkg/util/strategicpatch" | ||||||
| 	"k8s.io/kubernetes/pkg/util/validation" | 	"k8s.io/kubernetes/pkg/util/validation" | ||||||
| ) | ) | ||||||
| @@ -106,7 +106,7 @@ func validateNoOverwrites(meta *api.ObjectMeta, labels map[string]string) error | |||||||
| 			allErrs = append(allErrs, fmt.Errorf("'%s' already has a value (%s), and --overwrite is false", key, value)) | 			allErrs = append(allErrs, fmt.Errorf("'%s' already has a value (%s), and --overwrite is false", key, value)) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(allErrs) | 	return utilerrors.NewAggregate(allErrs) | ||||||
| } | } | ||||||
|  |  | ||||||
| func parseLabels(spec []string) (map[string]string, []string, error) { | func parseLabels(spec []string) (map[string]string, []string, error) { | ||||||
|   | |||||||
| @@ -26,7 +26,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/kubectl" | 	"k8s.io/kubernetes/pkg/kubectl" | ||||||
| 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util" | 	cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util" | ||||||
| 	"k8s.io/kubernetes/pkg/kubectl/resource" | 	"k8s.io/kubernetes/pkg/kubectl/resource" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // ScaleOptions is the start of the data required to perform the operation.  As new fields are added, add them here instead of | // ScaleOptions is the start of the data required to perform the operation.  As new fields are added, add them here instead of | ||||||
| @@ -149,5 +149,5 @@ func RunScale(f *cmdutil.Factory, out io.Writer, cmd *cobra.Command, args []stri | |||||||
| 		cmdutil.PrintSuccess(mapper, shortOutput, out, info.Mapping.Resource, info.Name, "scaled") | 		cmdutil.PrintSuccess(mapper, shortOutput, out, info.Mapping.Resource, info.Name, "scaled") | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return errors.NewAggregate(errs) | 	return utilerrors.NewAggregate(errs) | ||||||
| } | } | ||||||
|   | |||||||
| @@ -24,7 +24,7 @@ import ( | |||||||
|  |  | ||||||
| 	"github.com/spf13/cobra" | 	"github.com/spf13/cobra" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // GeneratorParam is a parameter for a generator | // GeneratorParam is a parameter for a generator | ||||||
| @@ -60,7 +60,7 @@ func ValidateParams(paramSpec []GeneratorParam, params map[string]interface{}) e | |||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(allErrs) | 	return utilerrors.NewAggregate(allErrs) | ||||||
| } | } | ||||||
|  |  | ||||||
| // MakeParams is a utility that creates generator parameters from a command line | // MakeParams is a utility that creates generator parameters from a command line | ||||||
|   | |||||||
| @@ -28,7 +28,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/api/validation" | 	"k8s.io/kubernetes/pkg/api/validation" | ||||||
| 	"k8s.io/kubernetes/pkg/labels" | 	"k8s.io/kubernetes/pkg/labels" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/sets" | 	"k8s.io/kubernetes/pkg/util/sets" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -520,7 +520,7 @@ func (b *Builder) resourceTupleMappings() (map[string]*meta.RESTMapping, error) | |||||||
|  |  | ||||||
| func (b *Builder) visitorResult() *Result { | func (b *Builder) visitorResult() *Result { | ||||||
| 	if len(b.errs) > 0 { | 	if len(b.errs) > 0 { | ||||||
| 		return &Result{err: errors.NewAggregate(b.errs)} | 		return &Result{err: utilerrors.NewAggregate(b.errs)} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	if b.selectAll { | 	if b.selectAll { | ||||||
|   | |||||||
| @@ -36,7 +36,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/api/unversioned" | 	"k8s.io/kubernetes/pkg/api/unversioned" | ||||||
| 	"k8s.io/kubernetes/pkg/client/unversioned/fake" | 	"k8s.io/kubernetes/pkg/client/unversioned/fake" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/watch" | 	"k8s.io/kubernetes/pkg/watch" | ||||||
| 	watchjson "k8s.io/kubernetes/pkg/watch/json" | 	watchjson "k8s.io/kubernetes/pkg/watch/json" | ||||||
| ) | ) | ||||||
| @@ -829,7 +829,7 @@ func TestContinueOnErrorVisitor(t *testing.T) { | |||||||
| 	if count != 3 { | 	if count != 3 { | ||||||
| 		t.Fatalf("did not visit all infos: %d", count) | 		t.Fatalf("did not visit all infos: %d", count) | ||||||
| 	} | 	} | ||||||
| 	agg, ok := err.(errors.Aggregate) | 	agg, ok := err.(utilerrors.Aggregate) | ||||||
| 	if !ok { | 	if !ok { | ||||||
| 		t.Fatalf("unexpected error: %v", err) | 		t.Fatalf("unexpected error: %v", err) | ||||||
| 	} | 	} | ||||||
| @@ -1068,7 +1068,7 @@ func TestReceiveMultipleErrors(t *testing.T) { | |||||||
| 		t.Fatalf("unexpected response: %v %t %#v", err, singular, test.Infos) | 		t.Fatalf("unexpected response: %v %t %#v", err, singular, test.Infos) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	errs, ok := err.(errors.Aggregate) | 	errs, ok := err.(utilerrors.Aggregate) | ||||||
| 	if !ok { | 	if !ok { | ||||||
| 		t.Fatalf("unexpected error: %v", reflect.TypeOf(err)) | 		t.Fatalf("unexpected error: %v", reflect.TypeOf(err)) | ||||||
| 	} | 	} | ||||||
|   | |||||||
| @@ -25,7 +25,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/api/meta" | 	"k8s.io/kubernetes/pkg/api/meta" | ||||||
| 	"k8s.io/kubernetes/pkg/api/unversioned" | 	"k8s.io/kubernetes/pkg/api/unversioned" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/sets" | 	"k8s.io/kubernetes/pkg/util/sets" | ||||||
| 	"k8s.io/kubernetes/pkg/watch" | 	"k8s.io/kubernetes/pkg/watch" | ||||||
| ) | ) | ||||||
| @@ -41,7 +41,7 @@ type Result struct { | |||||||
| 	sources  []Visitor | 	sources  []Visitor | ||||||
| 	singular bool | 	singular bool | ||||||
|  |  | ||||||
| 	ignoreErrors []errors.Matcher | 	ignoreErrors []utilerrors.Matcher | ||||||
|  |  | ||||||
| 	// populated by a call to Infos | 	// populated by a call to Infos | ||||||
| 	info []*Info | 	info []*Info | ||||||
| @@ -56,7 +56,7 @@ type Result struct { | |||||||
| // err. | // err. | ||||||
| func (r *Result) IgnoreErrors(fns ...ErrMatchFunc) *Result { | func (r *Result) IgnoreErrors(fns ...ErrMatchFunc) *Result { | ||||||
| 	for _, fn := range fns { | 	for _, fn := range fns { | ||||||
| 		r.ignoreErrors = append(r.ignoreErrors, errors.Matcher(fn)) | 		r.ignoreErrors = append(r.ignoreErrors, utilerrors.Matcher(fn)) | ||||||
| 	} | 	} | ||||||
| 	return r | 	return r | ||||||
| } | } | ||||||
| @@ -77,7 +77,7 @@ func (r *Result) Visit(fn VisitorFunc) error { | |||||||
| 		return r.err | 		return r.err | ||||||
| 	} | 	} | ||||||
| 	err := r.visitor.Visit(fn) | 	err := r.visitor.Visit(fn) | ||||||
| 	return errors.FilterOut(err, r.ignoreErrors...) | 	return utilerrors.FilterOut(err, r.ignoreErrors...) | ||||||
| } | } | ||||||
|  |  | ||||||
| // IntoSingular sets the provided boolean pointer to true if the Builder input | // IntoSingular sets the provided boolean pointer to true if the Builder input | ||||||
| @@ -106,7 +106,7 @@ func (r *Result) Infos() ([]*Info, error) { | |||||||
| 		infos = append(infos, info) | 		infos = append(infos, info) | ||||||
| 		return nil | 		return nil | ||||||
| 	}) | 	}) | ||||||
| 	err = errors.FilterOut(err, r.ignoreErrors...) | 	err = utilerrors.FilterOut(err, r.ignoreErrors...) | ||||||
|  |  | ||||||
| 	r.info, r.err = infos, err | 	r.info, r.err = infos, err | ||||||
| 	return infos, err | 	return infos, err | ||||||
|   | |||||||
| @@ -29,7 +29,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/api/meta" | 	"k8s.io/kubernetes/pkg/api/meta" | ||||||
| 	"k8s.io/kubernetes/pkg/api/validation" | 	"k8s.io/kubernetes/pkg/api/validation" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/yaml" | 	"k8s.io/kubernetes/pkg/util/yaml" | ||||||
| 	"k8s.io/kubernetes/pkg/watch" | 	"k8s.io/kubernetes/pkg/watch" | ||||||
| ) | ) | ||||||
| @@ -196,7 +196,7 @@ func (l EagerVisitorList) Visit(fn VisitorFunc) error { | |||||||
| 			errs = append(errs, err) | 			errs = append(errs, err) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(errs) | 	return utilerrors.NewAggregate(errs) | ||||||
| } | } | ||||||
|  |  | ||||||
| func ValidateSchema(data []byte, schema validation.Schema) error { | func ValidateSchema(data []byte, schema validation.Schema) error { | ||||||
| @@ -307,7 +307,7 @@ func (v ContinueOnErrorVisitor) Visit(fn VisitorFunc) error { | |||||||
| 	if len(errs) == 1 { | 	if len(errs) == 1 { | ||||||
| 		return errs[0] | 		return errs[0] | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(errs) | 	return utilerrors.NewAggregate(errs) | ||||||
| } | } | ||||||
|  |  | ||||||
| // FlattenListVisitor flattens any objects that runtime.ExtractList recognizes as a list | // FlattenListVisitor flattens any objects that runtime.ExtractList recognizes as a list | ||||||
| @@ -343,7 +343,7 @@ func (v FlattenListVisitor) Visit(fn VisitorFunc) error { | |||||||
| 			runtime.ObjectTyper | 			runtime.ObjectTyper | ||||||
| 			runtime.Decoder | 			runtime.Decoder | ||||||
| 		}{v.Mapper, info.Mapping.Codec}); len(errs) > 0 { | 		}{v.Mapper, info.Mapping.Codec}); len(errs) > 0 { | ||||||
| 			return errors.NewAggregate(errs) | 			return utilerrors.NewAggregate(errs) | ||||||
| 		} | 		} | ||||||
| 		for i := range items { | 		for i := range items { | ||||||
| 			item, err := v.InfoForObject(items[i]) | 			item, err := v.InfoForObject(items[i]) | ||||||
|   | |||||||
| @@ -30,7 +30,7 @@ import ( | |||||||
| 	kubetypes "k8s.io/kubernetes/pkg/kubelet/types" | 	kubetypes "k8s.io/kubernetes/pkg/kubelet/types" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util" | 	"k8s.io/kubernetes/pkg/util" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| func TestURLErrorNotExistNoUpdate(t *testing.T) { | func TestURLErrorNotExistNoUpdate(t *testing.T) { | ||||||
| @@ -286,7 +286,7 @@ func TestExtractPodsFromHTTP(t *testing.T) { | |||||||
| 		} | 		} | ||||||
| 		for _, pod := range update.Pods { | 		for _, pod := range update.Pods { | ||||||
| 			if errs := validation.ValidatePod(pod); len(errs) != 0 { | 			if errs := validation.ValidatePod(pod); len(errs) != 0 { | ||||||
| 				t.Errorf("%s: Expected no validation errors on %#v, Got %v", testCase.desc, pod, errors.NewAggregate(errs)) | 				t.Errorf("%s: Expected no validation errors on %#v, Got %v", testCase.desc, pod, utilerrors.NewAggregate(errs)) | ||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|   | |||||||
| @@ -34,7 +34,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/api/resource" | 	"k8s.io/kubernetes/pkg/api/resource" | ||||||
| 	"k8s.io/kubernetes/pkg/kubelet/cadvisor" | 	"k8s.io/kubernetes/pkg/kubelet/cadvisor" | ||||||
| 	"k8s.io/kubernetes/pkg/util" | 	"k8s.io/kubernetes/pkg/util" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/mount" | 	"k8s.io/kubernetes/pkg/util/mount" | ||||||
| 	"k8s.io/kubernetes/pkg/util/oom" | 	"k8s.io/kubernetes/pkg/util/oom" | ||||||
| 	"k8s.io/kubernetes/pkg/util/sets" | 	"k8s.io/kubernetes/pkg/util/sets" | ||||||
| @@ -183,7 +183,7 @@ func setupKernelTunables(option KernelTunableBehavior) error { | |||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(errList) | 	return utilerrors.NewAggregate(errList) | ||||||
| } | } | ||||||
|  |  | ||||||
| func (cm *containerManagerImpl) setupNode() error { | func (cm *containerManagerImpl) setupNode() error { | ||||||
| @@ -340,7 +340,7 @@ func ensureDockerInContainer(cadvisor cadvisor.Interface, oomScoreAdj int, manag | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return errors.NewAggregate(errs) | 	return utilerrors.NewAggregate(errs) | ||||||
| } | } | ||||||
|  |  | ||||||
| // Gets the (CPU) container the specified pid is in. | // Gets the (CPU) container the specified pid is in. | ||||||
| @@ -414,7 +414,7 @@ func ensureSystemContainer(rootContainer *fs.Manager, manager *fs.Manager) error | |||||||
| 		errs = append(errs, fmt.Errorf("ran out of attempts to create system containers %q", manager.Cgroups.Name)) | 		errs = append(errs, fmt.Errorf("ran out of attempts to create system containers %q", manager.Cgroups.Name)) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return errors.NewAggregate(errs) | 	return utilerrors.NewAggregate(errs) | ||||||
| } | } | ||||||
|  |  | ||||||
| // Determines whether the specified PID is a kernel PID. | // Determines whether the specified PID is a kernel PID. | ||||||
|   | |||||||
| @@ -64,7 +64,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/types" | 	"k8s.io/kubernetes/pkg/types" | ||||||
| 	"k8s.io/kubernetes/pkg/util" | 	"k8s.io/kubernetes/pkg/util" | ||||||
| 	"k8s.io/kubernetes/pkg/util/bandwidth" | 	"k8s.io/kubernetes/pkg/util/bandwidth" | ||||||
| 	utilErrors "k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	kubeio "k8s.io/kubernetes/pkg/util/io" | 	kubeio "k8s.io/kubernetes/pkg/util/io" | ||||||
| 	"k8s.io/kubernetes/pkg/util/mount" | 	"k8s.io/kubernetes/pkg/util/mount" | ||||||
| 	nodeutil "k8s.io/kubernetes/pkg/util/node" | 	nodeutil "k8s.io/kubernetes/pkg/util/node" | ||||||
| @@ -1483,7 +1483,7 @@ func (kl *Kubelet) cleanupOrphanedPodDirs(pods []*api.Pod, runningPods []*kubeco | |||||||
| 			errlist = append(errlist, err) | 			errlist = append(errlist, err) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return utilErrors.NewAggregate(errlist) | 	return utilerrors.NewAggregate(errlist) | ||||||
| } | } | ||||||
|  |  | ||||||
| func (kl *Kubelet) cleanupBandwidthLimits(allPods []*api.Pod) error { | func (kl *Kubelet) cleanupBandwidthLimits(allPods []*api.Pod) error { | ||||||
|   | |||||||
| @@ -27,7 +27,7 @@ import ( | |||||||
| 	client "k8s.io/kubernetes/pkg/client/unversioned" | 	client "k8s.io/kubernetes/pkg/client/unversioned" | ||||||
| 	kubecontainer "k8s.io/kubernetes/pkg/kubelet/container" | 	kubecontainer "k8s.io/kubernetes/pkg/kubelet/container" | ||||||
| 	kubetypes "k8s.io/kubernetes/pkg/kubelet/types" | 	kubetypes "k8s.io/kubernetes/pkg/kubelet/types" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/validation" | 	"k8s.io/kubernetes/pkg/util/validation" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -116,7 +116,7 @@ func InitNetworkPlugin(plugins []NetworkPlugin, networkPluginName string, host H | |||||||
| 		allErrs = append(allErrs, fmt.Errorf("Network plugin %q not found.", networkPluginName)) | 		allErrs = append(allErrs, fmt.Errorf("Network plugin %q not found.", networkPluginName)) | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return chosenPlugin, errors.NewAggregate(allErrs) | 	return chosenPlugin, utilerrors.NewAggregate(allErrs) | ||||||
| } | } | ||||||
|  |  | ||||||
| func UnescapePluginName(in string) string { | func UnescapePluginName(in string) string { | ||||||
|   | |||||||
| @@ -30,7 +30,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/proxy" | 	"k8s.io/kubernetes/pkg/proxy" | ||||||
| 	"k8s.io/kubernetes/pkg/types" | 	"k8s.io/kubernetes/pkg/types" | ||||||
| 	"k8s.io/kubernetes/pkg/util" | 	"k8s.io/kubernetes/pkg/util" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/iptables" | 	"k8s.io/kubernetes/pkg/util/iptables" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -647,7 +647,7 @@ func (proxier *Proxier) closePortal(service proxy.ServicePortName, info *service | |||||||
| 	} else { | 	} else { | ||||||
| 		glog.Errorf("Some errors closing iptables portals for service %q", service) | 		glog.Errorf("Some errors closing iptables portals for service %q", service) | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(el) | 	return utilerrors.NewAggregate(el) | ||||||
| } | } | ||||||
|  |  | ||||||
| func (proxier *Proxier) closeOnePortal(portal portal, protocol api.Protocol, proxyIP net.IP, proxyPort int, name proxy.ServicePortName) []error { | func (proxier *Proxier) closeOnePortal(portal portal, protocol api.Protocol, proxyIP net.IP, proxyPort int, name proxy.ServicePortName) []error { | ||||||
| @@ -819,7 +819,7 @@ func iptablesFlush(ipt iptables.Interface) error { | |||||||
| 	if len(el) != 0 { | 	if len(el) != 0 { | ||||||
| 		glog.Errorf("Some errors flushing old iptables portals: %v", el) | 		glog.Errorf("Some errors flushing old iptables portals: %v", el) | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(el) | 	return utilerrors.NewAggregate(el) | ||||||
| } | } | ||||||
|  |  | ||||||
| // Used below. | // Used below. | ||||||
|   | |||||||
| @@ -20,7 +20,7 @@ import ( | |||||||
| 	"fmt" | 	"fmt" | ||||||
| 	"strings" | 	"strings" | ||||||
|  |  | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
|  |  | ||||||
| 	"github.com/davecgh/go-spew/spew" | 	"github.com/davecgh/go-spew/spew" | ||||||
| ) | ) | ||||||
| @@ -174,7 +174,7 @@ func (list ValidationErrorList) PrefixIndex(index int) ValidationErrorList { | |||||||
|  |  | ||||||
| // NewValidationErrorFieldPrefixMatcher returns an errors.Matcher that returns true | // NewValidationErrorFieldPrefixMatcher returns an errors.Matcher that returns true | ||||||
| // if the provided error is a ValidationError and has the provided ValidationErrorType. | // if the provided error is a ValidationError and has the provided ValidationErrorType. | ||||||
| func NewValidationErrorTypeMatcher(t ValidationErrorType) errors.Matcher { | func NewValidationErrorTypeMatcher(t ValidationErrorType) utilerrors.Matcher { | ||||||
| 	return func(err error) bool { | 	return func(err error) bool { | ||||||
| 		if e, ok := err.(*ValidationError); ok { | 		if e, ok := err.(*ValidationError); ok { | ||||||
| 			return e.Type == t | 			return e.Type == t | ||||||
| @@ -186,7 +186,7 @@ func NewValidationErrorTypeMatcher(t ValidationErrorType) errors.Matcher { | |||||||
| // NewValidationErrorFieldPrefixMatcher returns an errors.Matcher that returns true | // NewValidationErrorFieldPrefixMatcher returns an errors.Matcher that returns true | ||||||
| // if the provided error is a ValidationError and has a field with the provided | // if the provided error is a ValidationError and has a field with the provided | ||||||
| // prefix. | // prefix. | ||||||
| func NewValidationErrorFieldPrefixMatcher(prefix string) errors.Matcher { | func NewValidationErrorFieldPrefixMatcher(prefix string) utilerrors.Matcher { | ||||||
| 	return func(err error) bool { | 	return func(err error) bool { | ||||||
| 		if e, ok := err.(*ValidationError); ok { | 		if e, ok := err.(*ValidationError); ok { | ||||||
| 			return strings.HasPrefix(e.Field, prefix) | 			return strings.HasPrefix(e.Field, prefix) | ||||||
| @@ -196,12 +196,12 @@ func NewValidationErrorFieldPrefixMatcher(prefix string) errors.Matcher { | |||||||
| } | } | ||||||
|  |  | ||||||
| // Filter removes items from the ValidationErrorList that match the provided fns. | // Filter removes items from the ValidationErrorList that match the provided fns. | ||||||
| func (list ValidationErrorList) Filter(fns ...errors.Matcher) ValidationErrorList { | func (list ValidationErrorList) Filter(fns ...utilerrors.Matcher) ValidationErrorList { | ||||||
| 	err := errors.FilterOut(errors.NewAggregate(list), fns...) | 	err := utilerrors.FilterOut(utilerrors.NewAggregate(list), fns...) | ||||||
| 	if err == nil { | 	if err == nil { | ||||||
| 		return nil | 		return nil | ||||||
| 	} | 	} | ||||||
| 	// FilterOut that takes an Aggregate returns an Aggregate | 	// FilterOut that takes an Aggregate returns an Aggregate | ||||||
| 	agg := err.(errors.Aggregate) | 	agg := err.(utilerrors.Aggregate) | ||||||
| 	return ValidationErrorList(agg.Errors()) | 	return ValidationErrorList(agg.Errors()) | ||||||
| } | } | ||||||
|   | |||||||
| @@ -29,7 +29,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/fieldpath" | 	"k8s.io/kubernetes/pkg/fieldpath" | ||||||
| 	"k8s.io/kubernetes/pkg/types" | 	"k8s.io/kubernetes/pkg/types" | ||||||
| 	"k8s.io/kubernetes/pkg/util" | 	"k8s.io/kubernetes/pkg/util" | ||||||
| 	utilErrors "k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/volume" | 	"k8s.io/kubernetes/pkg/volume" | ||||||
|  |  | ||||||
| 	"github.com/golang/glog" | 	"github.com/golang/glog" | ||||||
| @@ -167,7 +167,7 @@ func (d *downwardAPIVolume) collectData() (map[string]string, error) { | |||||||
| 			data[fileName] = sortLines(values) | 			data[fileName] = sortLines(values) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return data, utilErrors.NewAggregate(errlist) | 	return data, utilerrors.NewAggregate(errlist) | ||||||
| } | } | ||||||
|  |  | ||||||
| // isDataChanged iterate over all the entries to check whether at least one | // isDataChanged iterate over all the entries to check whether at least one | ||||||
| @@ -283,7 +283,7 @@ func (d *downwardAPIVolume) writeDataInTimestampDir(data map[string]string) (str | |||||||
| 			errlist = append(errlist, err) | 			errlist = append(errlist, err) | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return timestampDir, utilErrors.NewAggregate(errlist) | 	return timestampDir, utilerrors.NewAggregate(errlist) | ||||||
| } | } | ||||||
|  |  | ||||||
| // updateSymlinksToCurrentDir creates the relative symlinks for all the files configured in this volume. | // updateSymlinksToCurrentDir creates the relative symlinks for all the files configured in this volume. | ||||||
|   | |||||||
| @@ -26,7 +26,7 @@ import ( | |||||||
| 	client "k8s.io/kubernetes/pkg/client/unversioned" | 	client "k8s.io/kubernetes/pkg/client/unversioned" | ||||||
| 	"k8s.io/kubernetes/pkg/cloudprovider" | 	"k8s.io/kubernetes/pkg/cloudprovider" | ||||||
| 	"k8s.io/kubernetes/pkg/types" | 	"k8s.io/kubernetes/pkg/types" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/util/io" | 	"k8s.io/kubernetes/pkg/util/io" | ||||||
| 	"k8s.io/kubernetes/pkg/util/mount" | 	"k8s.io/kubernetes/pkg/util/mount" | ||||||
| 	"k8s.io/kubernetes/pkg/util/validation" | 	"k8s.io/kubernetes/pkg/util/validation" | ||||||
| @@ -261,7 +261,7 @@ func (pm *VolumePluginMgr) InitPlugins(plugins []VolumePlugin, host VolumeHost) | |||||||
| 		pm.plugins[name] = plugin | 		pm.plugins[name] = plugin | ||||||
| 		glog.V(1).Infof("Loaded volume plugin %q", name) | 		glog.V(1).Infof("Loaded volume plugin %q", name) | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(allErrs) | 	return utilerrors.NewAggregate(allErrs) | ||||||
| } | } | ||||||
|  |  | ||||||
| // FindPluginBySpec looks for a plugin that can support a given volume | // FindPluginBySpec looks for a plugin that can support a given volume | ||||||
|   | |||||||
| @@ -31,7 +31,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/fields" | 	"k8s.io/kubernetes/pkg/fields" | ||||||
| 	"k8s.io/kubernetes/pkg/labels" | 	"k8s.io/kubernetes/pkg/labels" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/watch" | 	"k8s.io/kubernetes/pkg/watch" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -395,5 +395,5 @@ func PodLimitFunc(limitRange *api.LimitRange, pod *api.Pod) error { | |||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return errors.NewAggregate(errs) | 	return utilerrors.NewAggregate(errs) | ||||||
| } | } | ||||||
|   | |||||||
| @@ -31,7 +31,7 @@ import ( | |||||||
| 	"k8s.io/kubernetes/pkg/fields" | 	"k8s.io/kubernetes/pkg/fields" | ||||||
| 	"k8s.io/kubernetes/pkg/labels" | 	"k8s.io/kubernetes/pkg/labels" | ||||||
| 	"k8s.io/kubernetes/pkg/runtime" | 	"k8s.io/kubernetes/pkg/runtime" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	"k8s.io/kubernetes/pkg/watch" | 	"k8s.io/kubernetes/pkg/watch" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -261,5 +261,5 @@ func IncrementUsage(a admission.Attributes, status *api.ResourceQuotaStatus, cli | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return dirty, errors.NewAggregate(errs) | 	return dirty, utilerrors.NewAggregate(errs) | ||||||
| } | } | ||||||
|   | |||||||
| @@ -21,7 +21,7 @@ import ( | |||||||
|  |  | ||||||
| 	"k8s.io/kubernetes/pkg/auth/authenticator" | 	"k8s.io/kubernetes/pkg/auth/authenticator" | ||||||
| 	"k8s.io/kubernetes/pkg/auth/user" | 	"k8s.io/kubernetes/pkg/auth/user" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // unionAuthRequestHandler authenticates requests using a chain of authenticator.Requests | // unionAuthRequestHandler authenticates requests using a chain of authenticator.Requests | ||||||
| @@ -48,5 +48,5 @@ func (authHandler unionAuthRequestHandler) AuthenticateRequest(req *http.Request | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return nil, false, errors.NewAggregate(errlist) | 	return nil, false, utilerrors.NewAggregate(errlist) | ||||||
| } | } | ||||||
|   | |||||||
| @@ -21,7 +21,7 @@ import ( | |||||||
| 	"net/http" | 	"net/http" | ||||||
|  |  | ||||||
| 	"k8s.io/kubernetes/pkg/auth/user" | 	"k8s.io/kubernetes/pkg/auth/user" | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| // UserConversion defines an interface for extracting user info from a client certificate chain | // UserConversion defines an interface for extracting user info from a client certificate chain | ||||||
| @@ -75,7 +75,7 @@ func (a *Authenticator) AuthenticateRequest(req *http.Request) (user.Info, bool, | |||||||
| 			} | 			} | ||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
| 	return nil, false, errors.NewAggregate(errlist) | 	return nil, false, utilerrors.NewAggregate(errlist) | ||||||
| } | } | ||||||
|  |  | ||||||
| // DefaultVerifyOptions returns VerifyOptions that use the system root certificates, current time, | // DefaultVerifyOptions returns VerifyOptions that use the system root certificates, current time, | ||||||
|   | |||||||
| @@ -19,7 +19,7 @@ package validation | |||||||
| import ( | import ( | ||||||
| 	"fmt" | 	"fmt" | ||||||
|  |  | ||||||
| 	"k8s.io/kubernetes/pkg/util/errors" | 	utilerrors "k8s.io/kubernetes/pkg/util/errors" | ||||||
| 	schedulerapi "k8s.io/kubernetes/plugin/pkg/scheduler/api" | 	schedulerapi "k8s.io/kubernetes/plugin/pkg/scheduler/api" | ||||||
| ) | ) | ||||||
|  |  | ||||||
| @@ -34,5 +34,5 @@ func ValidatePolicy(policy schedulerapi.Policy) error { | |||||||
| 		} | 		} | ||||||
| 	} | 	} | ||||||
|  |  | ||||||
| 	return errors.NewAggregate(validationErrors) | 	return utilerrors.NewAggregate(validationErrors) | ||||||
| } | } | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 k8s-merge-robot
					k8s-merge-robot