func createEventOrFail(clientset *federation_release_1_4.Clientset, namespace string) *v1.Event { if clientset == nil || len(namespace) == 0 { Fail(fmt.Sprintf("Internal error: invalid parameters passed to createEventOrFail: clientset: %v, namespace: %v", clientset, namespace)) } By(fmt.Sprintf("Creating federated event %q in namespace %q", FederationEventName, namespace)) event := &v1.Event{ ObjectMeta: v1.ObjectMeta{ Name: FederationEventName, Namespace: namespace, }, InvolvedObject: v1.ObjectReference{ Kind: "Pod", Name: "pod-name", Namespace: namespace, UID: "C934D34AFB20242", APIVersion: "version", }, Source: v1.EventSource{ Component: "kubelet", Host: "kublet.node1", }, Count: 1, Type: v1.EventTypeNormal, } _, err := clientset.Core().Events(namespace).Create(event) framework.ExpectNoError(err, "Creating event %q in namespace %q", event.Name, namespace) By(fmt.Sprintf("Successfully created federated event %q in namespace %q", FederationEventName, namespace)) return event }
func updateSecretOrFail(clientset *federation_release_1_4.Clientset, namespace string) *v1.Secret { if clientset == nil || len(namespace) == 0 { Fail(fmt.Sprintf("Internal error: invalid parameters passed to updateSecretOrFail: clientset: %v, namespace: %v", clientset, namespace)) } var newSecret *v1.Secret for retryCount := 0; retryCount < MaxRetries; retryCount++ { secret, err := clientset.Core().Secrets(namespace).Get(FederatedSecretName) if err != nil { framework.Failf("failed to get secret %q: %v", FederatedSecretName, err) } // Update one of the data in the secret. secret.Data = map[string][]byte{ "key": []byte("value"), } newSecret, err = clientset.Core().Secrets(namespace).Update(secret) if err == nil { return newSecret } if !errors.IsConflict(err) && !errors.IsServerTimeout(err) { framework.Failf("failed to update secret %q: %v", FederatedSecretName, err) } } framework.Failf("too many retries updating secret %q", FederatedSecretName) return newSecret }
func updateSecretOrFail(clientset *federation_release_1_4.Clientset, namespace string) *v1.Secret { if clientset == nil || len(namespace) == 0 { Fail(fmt.Sprintf("Internal error: invalid parameters passed to updateSecretOrFail: clientset: %v, namespace: %v", clientset, namespace)) } var err error var newSecret *v1.Secret secret := &v1.Secret{ ObjectMeta: v1.ObjectMeta{ Name: UpdatedFederatedSecretName, }, } for retryCount := 0; retryCount < MaxRetries; retryCount++ { _, err = clientset.Core().Secrets(namespace).Get(FederatedSecretName) if err != nil { framework.Failf("failed to get secret %q: %v", FederatedSecretName, err) } newSecret, err = clientset.Core().Secrets(namespace).Update(secret) if err == nil { return newSecret } if !errors.IsConflict(err) && !errors.IsServerTimeout(err) { framework.Failf("failed to update secret %q: %v", FederatedSecretName, err) } } framework.Failf("too many retries updating secret %q", FederatedSecretName) return newSecret }
func deleteAllTestNamespaces(clientset *federation_release_1_4.Clientset) { list, err := clientset.Core().Namespaces().List(api.ListOptions{}) if err != nil { framework.Failf("Failed to get all namespaes: %v", err) return } for _, namespace := range list.Items { if strings.HasPrefix(namespace.Name, namespacePrefix) { err := clientset.Core().Namespaces().Delete(namespace.Name, &api.DeleteOptions{}) if err != nil { framework.Failf("Failed to delete %s: %v", namespace.Name, err) } } } }
func createSecretOrFail(clientset *federation_release_1_4.Clientset, namespace string) *v1.Secret { if clientset == nil || len(namespace) == 0 { Fail(fmt.Sprintf("Internal error: invalid parameters passed to createSecretOrFail: clientset: %v, namespace: %v", clientset, namespace)) } secret := &v1.Secret{ ObjectMeta: v1.ObjectMeta{ Name: FederatedSecretName, }, } By(fmt.Sprintf("Creating secret %q in namespace %q", secret.Name, namespace)) _, err := clientset.Core().Secrets(namespace).Create(secret) framework.ExpectNoError(err, "Failed to create secret %s", secret.Name) By(fmt.Sprintf("Successfully created federated secret %q in namespace %q", FederatedSecretName, namespace)) return secret }