Skip to content
This repository was archived by the owner on Feb 8, 2021. It is now read-only.

Commit e664ef9

Browse files
author
Kris
committed
Move restclient to its own package
1 parent 1dd3cb5 commit e664ef9

File tree

157 files changed

+1331
-1178
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

157 files changed

+1331
-1178
lines changed

cluster/addons/dns/kube2sky/kube2sky.go

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ import (
3737
kapi "k8s.io/kubernetes/pkg/api"
3838
"k8s.io/kubernetes/pkg/api/unversioned"
3939
kcache "k8s.io/kubernetes/pkg/client/cache"
40+
"k8s.io/kubernetes/pkg/client/restclient"
4041
kclient "k8s.io/kubernetes/pkg/client/unversioned"
4142
kclientcmd "k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
4243
kframework "k8s.io/kubernetes/pkg/controller/framework"
@@ -466,7 +467,7 @@ func expandKubeMasterURL() (string, error) {
466467
// TODO: evaluate using pkg/client/clientcmd
467468
func newKubeClient() (*kclient.Client, error) {
468469
var (
469-
config *kclient.Config
470+
config *restclient.Config
470471
err error
471472
masterURL string
472473
)
@@ -480,9 +481,9 @@ func newKubeClient() (*kclient.Client, error) {
480481

481482
if masterURL != "" && *argKubecfgFile == "" {
482483
// Only --kube-master-url was provided.
483-
config = &kclient.Config{
484+
config = &restclient.Config{
484485
Host: masterURL,
485-
ContentConfig: kclient.ContentConfig{GroupVersion: &unversioned.GroupVersion{Version: "v1"}},
486+
ContentConfig: restclient.ContentConfig{GroupVersion: &unversioned.GroupVersion{Version: "v1"}},
486487
}
487488
} else {
488489
// We either have:

cmd/integration/integration.go

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ import (
4040
"k8s.io/kubernetes/pkg/api/v1"
4141
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
4242
"k8s.io/kubernetes/pkg/client/record"
43+
"k8s.io/kubernetes/pkg/client/restclient"
4344
client "k8s.io/kubernetes/pkg/client/unversioned"
4445
"k8s.io/kubernetes/pkg/controller"
4546
endpointcontroller "k8s.io/kubernetes/pkg/controller/endpoint"
@@ -135,12 +136,12 @@ func startComponents(firstManifestURL, secondManifestURL string) (string, string
135136
glog.Fatalf("Failed to connect to etcd")
136137
}
137138

138-
cl := client.NewOrDie(&client.Config{Host: apiServer.URL, ContentConfig: client.ContentConfig{GroupVersion: testapi.Default.GroupVersion()}})
139-
clientset := clientset.NewForConfigOrDie(&client.Config{Host: apiServer.URL, ContentConfig: client.ContentConfig{GroupVersion: testapi.Default.GroupVersion()}})
139+
cl := client.NewOrDie(&restclient.Config{Host: apiServer.URL, ContentConfig: restclient.ContentConfig{GroupVersion: testapi.Default.GroupVersion()}})
140+
clientset := clientset.NewForConfigOrDie(&restclient.Config{Host: apiServer.URL, ContentConfig: restclient.ContentConfig{GroupVersion: testapi.Default.GroupVersion()}})
140141

141142
// TODO: caesarxuchao: hacky way to specify version of Experimental client.
142143
// We will fix this by supporting multiple group versions in Config
143-
cl.ExtensionsClient = client.NewExtensionsOrDie(&client.Config{Host: apiServer.URL, ContentConfig: client.ContentConfig{GroupVersion: testapi.Extensions.GroupVersion()}})
144+
cl.ExtensionsClient = client.NewExtensionsOrDie(&restclient.Config{Host: apiServer.URL, ContentConfig: restclient.ContentConfig{GroupVersion: testapi.Extensions.GroupVersion()}})
144145

145146
// Master
146147
host, port, err := net.SplitHostPort(strings.TrimLeft(apiServer.URL, "http://"))
@@ -993,10 +994,10 @@ func main() {
993994
// Wait for the synchronization threads to come up.
994995
time.Sleep(time.Second * 10)
995996

996-
kubeClient := client.NewOrDie(&client.Config{Host: apiServerURL, ContentConfig: client.ContentConfig{GroupVersion: testapi.Default.GroupVersion()}})
997+
kubeClient := client.NewOrDie(&restclient.Config{Host: apiServerURL, ContentConfig: restclient.ContentConfig{GroupVersion: testapi.Default.GroupVersion()}})
997998
// TODO: caesarxuchao: hacky way to specify version of Experimental client.
998999
// We will fix this by supporting multiple group versions in Config
999-
kubeClient.ExtensionsClient = client.NewExtensionsOrDie(&client.Config{Host: apiServerURL, ContentConfig: client.ContentConfig{GroupVersion: testapi.Extensions.GroupVersion()}})
1000+
kubeClient.ExtensionsClient = client.NewExtensionsOrDie(&restclient.Config{Host: apiServerURL, ContentConfig: restclient.ContentConfig{GroupVersion: testapi.Extensions.GroupVersion()}})
10001001

10011002
// Run tests in parallel
10021003
testFuncs := []testFunc{

cmd/kube-apiserver/app/server.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ import (
4444
"k8s.io/kubernetes/pkg/apiserver/authenticator"
4545
"k8s.io/kubernetes/pkg/capabilities"
4646
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
47-
client "k8s.io/kubernetes/pkg/client/unversioned"
47+
"k8s.io/kubernetes/pkg/client/restclient"
4848
"k8s.io/kubernetes/pkg/cloudprovider"
4949
serviceaccountcontroller "k8s.io/kubernetes/pkg/controller/serviceaccount"
5050
"k8s.io/kubernetes/pkg/genericapiserver"
@@ -254,7 +254,7 @@ func Run(s *options.APIServer) error {
254254
glog.Fatalf("error in parsing runtime-config: %s", err)
255255
}
256256

257-
clientConfig := &client.Config{
257+
clientConfig := &restclient.Config{
258258
Host: net.JoinHostPort(s.InsecureBindAddress.String(), strconv.Itoa(s.InsecurePort)),
259259
}
260260
if len(s.DeprecatedStorageVersion) != 0 {

cmd/kube-controller-manager/app/controllermanager.go

Lines changed: 21 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ import (
3939
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
4040
"k8s.io/kubernetes/pkg/client/leaderelection"
4141
"k8s.io/kubernetes/pkg/client/record"
42+
"k8s.io/kubernetes/pkg/client/restclient"
4243
client "k8s.io/kubernetes/pkg/client/unversioned"
4344
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
4445
"k8s.io/kubernetes/pkg/cloudprovider"
@@ -180,19 +181,19 @@ func Run(s *options.CMServer) error {
180181
panic("unreachable")
181182
}
182183

183-
func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig *client.Config, stop <-chan struct{}) error {
184-
go endpointcontroller.NewEndpointController(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "endpoint-controller")), ResyncPeriod(s)).
184+
func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig *restclient.Config, stop <-chan struct{}) error {
185+
go endpointcontroller.NewEndpointController(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "endpoint-controller")), ResyncPeriod(s)).
185186
Run(s.ConcurrentEndpointSyncs, wait.NeverStop)
186187

187188
go replicationcontroller.NewReplicationManager(
188-
clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "replication-controller")),
189+
clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "replication-controller")),
189190
ResyncPeriod(s),
190191
replicationcontroller.BurstReplicas,
191192
s.LookupCacheSizeForRC,
192193
).Run(s.ConcurrentRCSyncs, wait.NeverStop)
193194

194195
if s.TerminatedPodGCThreshold > 0 {
195-
go gc.New(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "garbage-collector")), ResyncPeriod(s), s.TerminatedPodGCThreshold).
196+
go gc.New(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "garbage-collector")), ResyncPeriod(s), s.TerminatedPodGCThreshold).
196197
Run(wait.NeverStop)
197198
}
198199

@@ -203,13 +204,13 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
203204

204205
// this cidr has been validated already
205206
_, clusterCIDR, _ := net.ParseCIDR(s.ClusterCIDR)
206-
nodeController := nodecontroller.NewNodeController(cloud, clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "node-controller")),
207+
nodeController := nodecontroller.NewNodeController(cloud, clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "node-controller")),
207208
s.PodEvictionTimeout.Duration, util.NewTokenBucketRateLimiter(s.DeletingPodsQps, s.DeletingPodsBurst),
208209
util.NewTokenBucketRateLimiter(s.DeletingPodsQps, s.DeletingPodsBurst),
209210
s.NodeMonitorGracePeriod.Duration, s.NodeStartupGracePeriod.Duration, s.NodeMonitorPeriod.Duration, clusterCIDR, s.AllocateNodeCIDRs)
210211
nodeController.Run(s.NodeSyncPeriod.Duration)
211212

212-
serviceController := servicecontroller.New(cloud, clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "service-controller")), s.ClusterName)
213+
serviceController := servicecontroller.New(cloud, clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "service-controller")), s.ClusterName)
213214
if err := serviceController.Run(s.ServiceSyncPeriod.Duration, s.NodeSyncPeriod.Duration); err != nil {
214215
glog.Errorf("Failed to start service controller: %v", err)
215216
}
@@ -220,14 +221,14 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
220221
} else if routes, ok := cloud.Routes(); !ok {
221222
glog.Warning("allocate-node-cidrs is set, but cloud provider does not support routes. Will not manage routes.")
222223
} else {
223-
routeController := routecontroller.New(routes, clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "route-controller")), s.ClusterName, clusterCIDR)
224+
routeController := routecontroller.New(routes, clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "route-controller")), s.ClusterName, clusterCIDR)
224225
routeController.Run(s.NodeSyncPeriod.Duration)
225226
}
226227
} else {
227228
glog.Infof("allocate-node-cidrs set to %v, node controller not creating routes", s.AllocateNodeCIDRs)
228229
}
229230

230-
resourceQuotaControllerClient := clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "resourcequota-controller"))
231+
resourceQuotaControllerClient := clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "resourcequota-controller"))
231232
resourceQuotaRegistry := quotainstall.NewRegistry(resourceQuotaControllerClient)
232233
groupKindsToReplenish := []unversioned.GroupKind{
233234
api.Kind("Pod"),
@@ -249,7 +250,7 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
249250
// important when we start apiserver and controller manager at the same time.
250251
var versionStrings []string
251252
err = wait.PollImmediate(time.Second, 10*time.Second, func() (bool, error) {
252-
if versionStrings, err = client.ServerAPIVersions(kubeconfig); err == nil {
253+
if versionStrings, err = restclient.ServerAPIVersions(kubeconfig); err == nil {
253254
return true, nil
254255
}
255256
glog.Errorf("Failed to get api versions from server: %v", err)
@@ -265,7 +266,7 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
265266
glog.Fatalf("Failed to get supported resources from server: %v", err)
266267
}
267268

268-
namespaceController := namespacecontroller.NewNamespaceController(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "namespace-controller")), versions, s.NamespaceSyncPeriod.Duration)
269+
namespaceController := namespacecontroller.NewNamespaceController(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "namespace-controller")), versions, s.NamespaceSyncPeriod.Duration)
269270
go namespaceController.Run(s.ConcurrentNamespaceSyncs, wait.NeverStop)
270271

271272
groupVersion := "extensions/v1beta1"
@@ -275,7 +276,7 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
275276
glog.Infof("Starting %s apis", groupVersion)
276277
if containsResource(resources, "horizontalpodautoscalers") {
277278
glog.Infof("Starting horizontal pod controller.")
278-
hpaClient := clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "horizontal-pod-autoscaler"))
279+
hpaClient := clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "horizontal-pod-autoscaler"))
279280
metricsClient := metrics.NewHeapsterMetricsClient(
280281
hpaClient,
281282
metrics.DefaultHeapsterNamespace,
@@ -289,25 +290,25 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
289290

290291
if containsResource(resources, "daemonsets") {
291292
glog.Infof("Starting daemon set controller")
292-
go daemon.NewDaemonSetsController(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "daemon-set-controller")), ResyncPeriod(s)).
293+
go daemon.NewDaemonSetsController(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "daemon-set-controller")), ResyncPeriod(s)).
293294
Run(s.ConcurrentDaemonSetSyncs, wait.NeverStop)
294295
}
295296

296297
if containsResource(resources, "jobs") {
297298
glog.Infof("Starting job controller")
298-
go job.NewJobController(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "job-controller")), ResyncPeriod(s)).
299+
go job.NewJobController(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "job-controller")), ResyncPeriod(s)).
299300
Run(s.ConcurrentJobSyncs, wait.NeverStop)
300301
}
301302

302303
if containsResource(resources, "deployments") {
303304
glog.Infof("Starting deployment controller")
304-
go deployment.NewDeploymentController(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "deployment-controller")), ResyncPeriod(s)).
305+
go deployment.NewDeploymentController(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "deployment-controller")), ResyncPeriod(s)).
305306
Run(s.ConcurrentDeploymentSyncs, wait.NeverStop)
306307
}
307308

308309
if containsResource(resources, "replicasets") {
309310
glog.Infof("Starting ReplicaSet controller")
310-
go replicaset.NewReplicaSetController(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "replicaset-controller")), ResyncPeriod(s), replicaset.BurstReplicas, s.LookupCacheSizeForRS).
311+
go replicaset.NewReplicaSetController(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "replicaset-controller")), ResyncPeriod(s), replicaset.BurstReplicas, s.LookupCacheSizeForRS).
311312
Run(s.ConcurrentRSSyncs, wait.NeverStop)
312313
}
313314
}
@@ -318,11 +319,11 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
318319
glog.Fatal("A Provisioner could not be created, but one was expected. Provisioning will not work. This functionality is considered an early Alpha version.")
319320
}
320321

321-
pvclaimBinder := persistentvolumecontroller.NewPersistentVolumeClaimBinder(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "persistent-volume-binder")), s.PVClaimBinderSyncPeriod.Duration)
322+
pvclaimBinder := persistentvolumecontroller.NewPersistentVolumeClaimBinder(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "persistent-volume-binder")), s.PVClaimBinderSyncPeriod.Duration)
322323
pvclaimBinder.Run()
323324

324325
pvRecycler, err := persistentvolumecontroller.NewPersistentVolumeRecycler(
325-
clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "persistent-volume-recycler")),
326+
clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "persistent-volume-recycler")),
326327
s.PVClaimBinderSyncPeriod.Duration,
327328
s.VolumeConfiguration.PersistentVolumeRecyclerConfiguration.MaximumRetry,
328329
ProbeRecyclableVolumePlugins(s.VolumeConfiguration),
@@ -334,7 +335,7 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
334335
pvRecycler.Run()
335336

336337
if provisioner != nil {
337-
pvController, err := persistentvolumecontroller.NewPersistentVolumeProvisionerController(persistentvolumecontroller.NewControllerClient(clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "persistent-volume-provisioner"))), s.PVClaimBinderSyncPeriod.Duration, s.ClusterName, volumePlugins, provisioner, cloud)
338+
pvController, err := persistentvolumecontroller.NewPersistentVolumeProvisionerController(persistentvolumecontroller.NewControllerClient(clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "persistent-volume-provisioner"))), s.PVClaimBinderSyncPeriod.Duration, s.ClusterName, volumePlugins, provisioner, cloud)
338339
if err != nil {
339340
glog.Fatalf("Failed to start persistent volume provisioner controller: %+v", err)
340341
}
@@ -361,7 +362,7 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
361362
glog.Errorf("Error reading key for service account token controller: %v", err)
362363
} else {
363364
serviceaccountcontroller.NewTokensController(
364-
clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "tokens-controller")),
365+
clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "tokens-controller")),
365366
serviceaccountcontroller.TokensControllerOptions{
366367
TokenGenerator: serviceaccount.JWTTokenGenerator(privateKey),
367368
RootCA: rootCA,
@@ -371,7 +372,7 @@ func StartControllers(s *options.CMServer, kubeClient *client.Client, kubeconfig
371372
}
372373

373374
serviceaccountcontroller.NewServiceAccountsController(
374-
clientset.NewForConfigOrDie(client.AddUserAgent(kubeconfig, "service-account-controller")),
375+
clientset.NewForConfigOrDie(restclient.AddUserAgent(kubeconfig, "service-account-controller")),
375376
serviceaccountcontroller.DefaultServiceAccountsControllerOptions(),
376377
).Run()
377378

cmd/kubelet/app/server.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ import (
4040
"k8s.io/kubernetes/pkg/client/chaosclient"
4141
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
4242
"k8s.io/kubernetes/pkg/client/record"
43+
"k8s.io/kubernetes/pkg/client/restclient"
4344
unversionedcore "k8s.io/kubernetes/pkg/client/typed/generated/core/unversioned"
44-
client "k8s.io/kubernetes/pkg/client/unversioned"
4545
clientauth "k8s.io/kubernetes/pkg/client/unversioned/auth"
4646
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
4747
clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api"
@@ -394,7 +394,7 @@ func InitializeTLS(s *options.KubeletServer) (*server.TLSOptions, error) {
394394
return tlsOptions, nil
395395
}
396396

397-
func authPathClientConfig(s *options.KubeletServer, useDefaults bool) (*client.Config, error) {
397+
func authPathClientConfig(s *options.KubeletServer, useDefaults bool) (*restclient.Config, error) {
398398
authInfo, err := clientauth.LoadFromFile(s.AuthPath.Value())
399399
if err != nil && !useDefaults {
400400
return nil, err
@@ -408,15 +408,15 @@ func authPathClientConfig(s *options.KubeletServer, useDefaults bool) (*client.C
408408
// authInfo didn't load correctly - continue with defaults.
409409
authInfo = &clientauth.Info{}
410410
}
411-
authConfig, err := authInfo.MergeWithConfig(client.Config{})
411+
authConfig, err := authInfo.MergeWithConfig(restclient.Config{})
412412
if err != nil {
413413
return nil, err
414414
}
415415
authConfig.Host = s.APIServerList[0]
416416
return &authConfig, nil
417417
}
418418

419-
func kubeconfigClientConfig(s *options.KubeletServer) (*client.Config, error) {
419+
func kubeconfigClientConfig(s *options.KubeletServer) (*restclient.Config, error) {
420420
return clientcmd.NewNonInteractiveDeferredLoadingClientConfig(
421421
&clientcmd.ClientConfigLoadingRules{ExplicitPath: s.KubeConfig.Value()},
422422
&clientcmd.ConfigOverrides{ClusterInfo: clientcmdapi.Cluster{Server: s.APIServerList[0]}}).ClientConfig()
@@ -428,7 +428,7 @@ func kubeconfigClientConfig(s *options.KubeletServer) (*client.Config, error) {
428428
// to load the default kubeconfig file, then the default auth path file, and
429429
// fall back to the default auth (none) without an error.
430430
// TODO(roberthbailey): Remove support for --auth-path
431-
func createClientConfig(s *options.KubeletServer) (*client.Config, error) {
431+
func createClientConfig(s *options.KubeletServer) (*restclient.Config, error) {
432432
if s.KubeConfig.Provided() && s.AuthPath.Provided() {
433433
return nil, fmt.Errorf("cannot specify both --kubeconfig and --auth-path")
434434
}
@@ -451,7 +451,7 @@ func createClientConfig(s *options.KubeletServer) (*client.Config, error) {
451451
// including api-server-list, via createClientConfig and then injects chaos into
452452
// the configuration via addChaosToClientConfig. This func is exported to support
453453
// integration with third party kubelet extensions (e.g. kubernetes-mesos).
454-
func CreateAPIServerClientConfig(s *options.KubeletServer) (*client.Config, error) {
454+
func CreateAPIServerClientConfig(s *options.KubeletServer) (*restclient.Config, error) {
455455
if len(s.APIServerList) < 1 {
456456
return nil, fmt.Errorf("no api servers specified")
457457
}
@@ -474,7 +474,7 @@ func CreateAPIServerClientConfig(s *options.KubeletServer) (*client.Config, erro
474474
}
475475

476476
// addChaosToClientConfig injects random errors into client connections if configured.
477-
func addChaosToClientConfig(s *options.KubeletServer, config *client.Config) {
477+
func addChaosToClientConfig(s *options.KubeletServer, config *restclient.Config) {
478478
if s.ChaosChance != 0.0 {
479479
config.WrapTransport = func(rt http.RoundTripper) http.RoundTripper {
480480
seed := chaosclient.NewSeed(1)

0 commit comments

Comments
 (0)