@@ -11,8 +11,8 @@ import (
11
11
"k8s.io/apimachinery/pkg/types"
12
12
kutilerrors "k8s.io/apimachinery/pkg/util/errors"
13
13
"k8s.io/client-go/tools/record"
14
- kapi "k8s.io/kubernetes/pkg/api"
15
- kclientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset "
14
+ "k8s.io/kubernetes/pkg/api/v1 "
15
+ kclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset "
16
16
kcontroller "k8s.io/kubernetes/pkg/controller"
17
17
)
18
18
@@ -86,15 +86,15 @@ func NewRCControllerRefManager(
86
86
// If the error is nil, either the reconciliation succeeded, or no
87
87
// reconciliation was necessary. The returned boolean indicates whether you now
88
88
// own the object.
89
- func (m * RCControllerRefManager ) ClaimReplicationController (rc * kapi .ReplicationController ) (bool , error ) {
89
+ func (m * RCControllerRefManager ) ClaimReplicationController (rc * v1 .ReplicationController ) (bool , error ) {
90
90
match := func (obj kmetav1.Object ) bool {
91
91
return m .Selector .Matches (klabels .Set (obj .GetLabels ()))
92
92
}
93
93
adopt := func (obj kmetav1.Object ) error {
94
- return m .AdoptReplicationController (obj .(* kapi .ReplicationController ))
94
+ return m .AdoptReplicationController (obj .(* v1 .ReplicationController ))
95
95
}
96
96
release := func (obj kmetav1.Object ) error {
97
- return m .ReleaseReplicationController (obj .(* kapi .ReplicationController ))
97
+ return m .ReleaseReplicationController (obj .(* v1 .ReplicationController ))
98
98
}
99
99
100
100
return m .ClaimObject (rc , match , adopt , release )
@@ -113,8 +113,8 @@ func (m *RCControllerRefManager) ClaimReplicationController(rc *kapi.Replication
113
113
// If the error is nil, either the reconciliation succeeded, or no
114
114
// reconciliation was necessary. The list of ReplicationControllers that you now own is
115
115
// returned.
116
- func (m * RCControllerRefManager ) ClaimReplicationControllers (rcs []* kapi .ReplicationController ) ([]* kapi .ReplicationController , error ) {
117
- var claimed []* kapi .ReplicationController
116
+ func (m * RCControllerRefManager ) ClaimReplicationControllers (rcs []* v1 .ReplicationController ) ([]* v1 .ReplicationController , error ) {
117
+ var claimed []* v1 .ReplicationController
118
118
var errlist []error
119
119
120
120
for _ , rc := range rcs {
@@ -132,7 +132,7 @@ func (m *RCControllerRefManager) ClaimReplicationControllers(rcs []*kapi.Replica
132
132
133
133
// AdoptReplicationController sends a patch to take control of the ReplicationController. It returns the error if
134
134
// the patching fails.
135
- func (m * RCControllerRefManager ) AdoptReplicationController (rs * kapi .ReplicationController ) error {
135
+ func (m * RCControllerRefManager ) AdoptReplicationController (rs * v1 .ReplicationController ) error {
136
136
if err := m .CanAdopt (); err != nil {
137
137
return fmt .Errorf ("can't adopt ReplicationController %s/%s (%s): %v" , rs .Namespace , rs .Name , rs .UID , err )
138
138
}
@@ -153,7 +153,7 @@ func (m *RCControllerRefManager) AdoptReplicationController(rs *kapi.Replication
153
153
154
154
// ReleaseReplicationController sends a patch to free the ReplicationController from the control of the Deployment controller.
155
155
// It returns the error if the patching fails. 404 and 422 errors are ignored.
156
- func (m * RCControllerRefManager ) ReleaseReplicationController (rc * kapi .ReplicationController ) error {
156
+ func (m * RCControllerRefManager ) ReleaseReplicationController (rc * v1 .ReplicationController ) error {
157
157
glog .V (4 ).Infof ("patching ReplicationController %s/%s to remove its controllerRef to %s/%s:%s" ,
158
158
rc .Namespace , rc .Name , m .controllerKind .GroupVersion (), m .controllerKind .Kind , m .Controller .GetName ())
159
159
deleteOwnerRefPatch := fmt .Sprintf (`{"metadata":{"ownerReferences":[{"$patch":"delete","uid":"%s"}],"uid":"%s"}}` , m .Controller .GetUID (), rc .UID )
0 commit comments