2018-01-09 18:57:14 +00:00
|
|
|
/*
|
|
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
// Package testapi provides a helper for retrieving the KUBE_TEST_API environment variable.
|
|
|
|
//
|
|
|
|
// TODO(lavalamp): this package is a huge disaster at the moment. I intend to
|
|
|
|
// refactor. All code currently using this package should change:
|
|
|
|
// 1. Declare your own api.Registry.APIGroupRegistrationManager in your own test code.
|
|
|
|
// 2. Import the relevant install packages.
|
|
|
|
// 3. Register the types you need, from the announced.APIGroupAnnouncementManager.
|
|
|
|
package testapi
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"mime"
|
|
|
|
"os"
|
|
|
|
"reflect"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
|
|
"k8s.io/apimachinery/pkg/runtime/serializer/recognizer"
|
|
|
|
"k8s.io/kubernetes/pkg/api/legacyscheme"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/admission"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/admissionregistration"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/apps"
|
2018-11-26 18:23:56 +00:00
|
|
|
"k8s.io/kubernetes/pkg/apis/auditregistration"
|
2018-01-09 18:57:14 +00:00
|
|
|
"k8s.io/kubernetes/pkg/apis/authorization"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/autoscaling"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/batch"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/certificates"
|
2018-11-26 18:23:56 +00:00
|
|
|
"k8s.io/kubernetes/pkg/apis/coordination"
|
2018-01-09 18:57:14 +00:00
|
|
|
api "k8s.io/kubernetes/pkg/apis/core"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/events"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/imagepolicy"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/networking"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/policy"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/rbac"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/scheduling"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/settings"
|
|
|
|
"k8s.io/kubernetes/pkg/apis/storage"
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
// Initialize install packages
|
2018-01-09 18:57:14 +00:00
|
|
|
_ "k8s.io/kubernetes/pkg/apis/admission/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/admissionregistration/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/apps/install"
|
2018-11-26 18:23:56 +00:00
|
|
|
_ "k8s.io/kubernetes/pkg/apis/auditregistration/install"
|
2018-01-09 18:57:14 +00:00
|
|
|
_ "k8s.io/kubernetes/pkg/apis/authentication/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/authorization/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/autoscaling/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/batch/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/certificates/install"
|
2018-11-26 18:23:56 +00:00
|
|
|
_ "k8s.io/kubernetes/pkg/apis/coordination/install"
|
2018-01-09 18:57:14 +00:00
|
|
|
_ "k8s.io/kubernetes/pkg/apis/core/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/events/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/extensions/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/imagepolicy/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/networking/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/policy/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/rbac/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/scheduling/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/settings/install"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/storage/install"
|
|
|
|
)
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
// Variables to store GroupName
|
2018-01-09 18:57:14 +00:00
|
|
|
var (
|
2018-07-18 14:47:22 +00:00
|
|
|
Groups = make(map[string]TestGroup)
|
|
|
|
Default TestGroup
|
|
|
|
Autoscaling TestGroup
|
|
|
|
Batch TestGroup
|
|
|
|
Extensions TestGroup
|
|
|
|
Apps TestGroup
|
|
|
|
Policy TestGroup
|
|
|
|
Rbac TestGroup
|
|
|
|
Storage TestGroup
|
|
|
|
Admission TestGroup
|
2018-01-09 18:57:14 +00:00
|
|
|
|
|
|
|
serializer runtime.SerializerInfo
|
|
|
|
storageSerializer runtime.SerializerInfo
|
|
|
|
)
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
// TestGroup contains GroupVersion to uniquely identify the API
|
2018-01-09 18:57:14 +00:00
|
|
|
type TestGroup struct {
|
|
|
|
externalGroupVersion schema.GroupVersion
|
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
if apiMediaType := os.Getenv("KUBE_TEST_API_TYPE"); len(apiMediaType) > 0 {
|
|
|
|
var ok bool
|
|
|
|
mediaType, _, err := mime.ParseMediaType(apiMediaType)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
serializer, ok = runtime.SerializerInfoForMediaType(legacyscheme.Codecs.SupportedMediaTypes(), mediaType)
|
|
|
|
if !ok {
|
|
|
|
panic(fmt.Sprintf("no serializer for %s", apiMediaType))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if storageMediaType := StorageMediaType(); len(storageMediaType) > 0 {
|
|
|
|
var ok bool
|
|
|
|
mediaType, _, err := mime.ParseMediaType(storageMediaType)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
storageSerializer, ok = runtime.SerializerInfoForMediaType(legacyscheme.Codecs.SupportedMediaTypes(), mediaType)
|
|
|
|
if !ok {
|
|
|
|
panic(fmt.Sprintf("no serializer for %s", storageMediaType))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
kubeTestAPI := os.Getenv("KUBE_TEST_API")
|
|
|
|
if len(kubeTestAPI) != 0 {
|
|
|
|
// priority is "first in list preferred", so this has to run in reverse order
|
|
|
|
testGroupVersions := strings.Split(kubeTestAPI, ",")
|
|
|
|
for i := len(testGroupVersions) - 1; i >= 0; i-- {
|
|
|
|
gvString := testGroupVersions[i]
|
|
|
|
groupVersion, err := schema.ParseGroupVersion(gvString)
|
|
|
|
if err != nil {
|
|
|
|
panic(fmt.Sprintf("Error parsing groupversion %v: %v", gvString, err))
|
|
|
|
}
|
|
|
|
|
|
|
|
Groups[groupVersion.Group] = TestGroup{
|
|
|
|
externalGroupVersion: groupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, ok := Groups[api.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: api.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(api.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[api.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[extensions.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: extensions.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(extensions.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[extensions.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[autoscaling.GroupName]; !ok {
|
|
|
|
internalTypes := make(map[string]reflect.Type)
|
|
|
|
for k, t := range legacyscheme.Scheme.KnownTypes(extensions.SchemeGroupVersion) {
|
|
|
|
if k == "Scale" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
internalTypes[k] = t
|
|
|
|
}
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: autoscaling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(autoscaling.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[autoscaling.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[autoscaling.GroupName+"IntraGroup"]; !ok {
|
|
|
|
internalTypes := make(map[string]reflect.Type)
|
|
|
|
for k, t := range legacyscheme.Scheme.KnownTypes(extensions.SchemeGroupVersion) {
|
|
|
|
if k == "Scale" {
|
|
|
|
internalTypes[k] = t
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: autoscaling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(autoscaling.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[autoscaling.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[batch.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: batch.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(batch.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[batch.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[apps.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: apps.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(apps.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[apps.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[policy.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: policy.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(policy.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[policy.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[rbac.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: rbac.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(rbac.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[rbac.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[scheduling.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: scheduling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(scheduling.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[scheduling.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[settings.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: settings.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(settings.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[settings.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[storage.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: storage.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(storage.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[storage.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[certificates.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: certificates.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(certificates.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[certificates.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[imagepolicy.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: imagepolicy.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(imagepolicy.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[imagepolicy.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[authorization.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: authorization.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(authorization.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[authorization.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[admissionregistration.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: admissionregistration.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(admissionregistration.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[admissionregistration.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[admission.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: admission.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(admission.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[admission.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[networking.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: networking.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(networking.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[networking.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[events.GroupName]; !ok {
|
2018-07-18 14:47:22 +00:00
|
|
|
externalGroupVersion := schema.GroupVersion{Group: events.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(events.GroupName)[0].Version}
|
2018-01-09 18:57:14 +00:00
|
|
|
Groups[events.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
2018-11-26 18:23:56 +00:00
|
|
|
if _, ok := Groups[coordination.GroupName]; !ok {
|
|
|
|
externalGroupVersion := schema.GroupVersion{Group: coordination.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(coordination.GroupName)[0].Version}
|
|
|
|
Groups[coordination.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := Groups[auditregistration.GroupName]; !ok {
|
|
|
|
externalGroupVersion := schema.GroupVersion{Group: auditregistration.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(auditregistration.GroupName)[0].Version}
|
|
|
|
Groups[auditregistration.GroupName] = TestGroup{
|
|
|
|
externalGroupVersion: externalGroupVersion,
|
|
|
|
}
|
|
|
|
}
|
2018-01-09 18:57:14 +00:00
|
|
|
|
|
|
|
Default = Groups[api.GroupName]
|
|
|
|
Autoscaling = Groups[autoscaling.GroupName]
|
|
|
|
Batch = Groups[batch.GroupName]
|
|
|
|
Apps = Groups[apps.GroupName]
|
|
|
|
Policy = Groups[policy.GroupName]
|
|
|
|
Extensions = Groups[extensions.GroupName]
|
|
|
|
Rbac = Groups[rbac.GroupName]
|
|
|
|
Storage = Groups[storage.GroupName]
|
|
|
|
Admission = Groups[admission.GroupName]
|
|
|
|
}
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
// GroupVersion makes copy of schema.GroupVersion
|
2018-01-09 18:57:14 +00:00
|
|
|
func (g TestGroup) GroupVersion() *schema.GroupVersion {
|
|
|
|
copyOfGroupVersion := g.externalGroupVersion
|
|
|
|
return ©OfGroupVersion
|
|
|
|
}
|
|
|
|
|
|
|
|
// Codec returns the codec for the API version to test against, as set by the
|
|
|
|
// KUBE_TEST_API_TYPE env var.
|
|
|
|
func (g TestGroup) Codec() runtime.Codec {
|
|
|
|
if serializer.Serializer == nil {
|
|
|
|
return legacyscheme.Codecs.LegacyCodec(g.externalGroupVersion)
|
|
|
|
}
|
|
|
|
return legacyscheme.Codecs.CodecForVersions(serializer.Serializer, legacyscheme.Codecs.UniversalDeserializer(), schema.GroupVersions{g.externalGroupVersion}, nil)
|
|
|
|
}
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
// StorageMediaType finds media type set by KUBE_TEST_API_STORAGE_TYPE env var used to store objects in storage
|
2018-01-09 18:57:14 +00:00
|
|
|
func StorageMediaType() string {
|
|
|
|
return os.Getenv("KUBE_TEST_API_STORAGE_TYPE")
|
|
|
|
}
|
|
|
|
|
|
|
|
// StorageCodec returns the codec for the API version to store in etcd, as set by the
|
|
|
|
// KUBE_TEST_API_STORAGE_TYPE env var.
|
|
|
|
func (g TestGroup) StorageCodec() runtime.Codec {
|
|
|
|
s := storageSerializer.Serializer
|
|
|
|
|
|
|
|
if s == nil {
|
|
|
|
return legacyscheme.Codecs.LegacyCodec(g.externalGroupVersion)
|
|
|
|
}
|
|
|
|
|
|
|
|
// etcd2 only supports string data - we must wrap any result before returning
|
|
|
|
// TODO: remove for etcd3 / make parameterizable
|
|
|
|
if !storageSerializer.EncodesAsText {
|
|
|
|
s = runtime.NewBase64Serializer(s, s)
|
|
|
|
}
|
|
|
|
ds := recognizer.NewDecoder(s, legacyscheme.Codecs.UniversalDeserializer())
|
|
|
|
|
|
|
|
return legacyscheme.Codecs.CodecForVersions(s, ds, schema.GroupVersions{g.externalGroupVersion}, nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SelfLink returns a self link that will appear to be for the version Version().
|
|
|
|
// 'resource' should be the resource path, e.g. "pods" for the Pod type. 'name' should be
|
|
|
|
// empty for lists.
|
|
|
|
func (g TestGroup) SelfLink(resource, name string) string {
|
|
|
|
if g.externalGroupVersion.Group == api.GroupName {
|
|
|
|
if name == "" {
|
|
|
|
return fmt.Sprintf("/api/%s/%s", g.externalGroupVersion.Version, resource)
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("/api/%s/%s/%s", g.externalGroupVersion.Version, resource, name)
|
|
|
|
}
|
2018-11-26 18:23:56 +00:00
|
|
|
// TODO: will need a /apis prefix once we have proper multi-group
|
|
|
|
// support
|
|
|
|
if name == "" {
|
|
|
|
return fmt.Sprintf("/apis/%s/%s/%s", g.externalGroupVersion.Group, g.externalGroupVersion.Version, resource)
|
|
|
|
}
|
|
|
|
return fmt.Sprintf("/apis/%s/%s/%s/%s", g.externalGroupVersion.Group, g.externalGroupVersion.Version, resource, name)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ResourcePathWithPrefix returns the appropriate path for the given prefix (watch, proxy, redirect, etc), resource, namespace and name.
|
|
|
|
// For ex, this is of the form:
|
|
|
|
// /api/v1/watch/namespaces/foo/pods/pod0 for v1.
|
|
|
|
func (g TestGroup) ResourcePathWithPrefix(prefix, resource, namespace, name string) string {
|
|
|
|
var path string
|
|
|
|
if g.externalGroupVersion.Group == api.GroupName {
|
|
|
|
path = "/api/" + g.externalGroupVersion.Version
|
|
|
|
} else {
|
|
|
|
// TODO: switch back once we have proper multiple group support
|
|
|
|
// path = "/apis/" + g.Group + "/" + Version(group...)
|
|
|
|
path = "/apis/" + g.externalGroupVersion.Group + "/" + g.externalGroupVersion.Version
|
|
|
|
}
|
|
|
|
|
|
|
|
if prefix != "" {
|
|
|
|
path = path + "/" + prefix
|
|
|
|
}
|
|
|
|
if namespace != "" {
|
|
|
|
path = path + "/namespaces/" + namespace
|
|
|
|
}
|
|
|
|
// Resource names are lower case.
|
|
|
|
resource = strings.ToLower(resource)
|
|
|
|
if resource != "" {
|
|
|
|
path = path + "/" + resource
|
|
|
|
}
|
|
|
|
if name != "" {
|
|
|
|
path = path + "/" + name
|
|
|
|
}
|
|
|
|
return path
|
|
|
|
}
|
|
|
|
|
|
|
|
// ResourcePath returns the appropriate path for the given resource, namespace and name.
|
|
|
|
// For example, this is of the form:
|
|
|
|
// /api/v1/namespaces/foo/pods/pod0 for v1.
|
|
|
|
func (g TestGroup) ResourcePath(resource, namespace, name string) string {
|
|
|
|
return g.ResourcePathWithPrefix("", resource, namespace, name)
|
|
|
|
}
|
|
|
|
|
|
|
|
// SubResourcePath returns the appropriate path for the given resource, namespace,
|
|
|
|
// name and subresource.
|
|
|
|
func (g TestGroup) SubResourcePath(resource, namespace, name, sub string) string {
|
|
|
|
path := g.ResourcePathWithPrefix("", resource, namespace, name)
|
|
|
|
if sub != "" {
|
|
|
|
path = path + "/" + sub
|
|
|
|
}
|
|
|
|
|
|
|
|
return path
|
|
|
|
}
|