123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402 |
- /*
- Copyright 2014 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- // Package testapi provides a helper for retrieving the KUBE_TEST_API environment variable.
- //
- // TODO(lavalamp): this package is a huge disaster at the moment. I intend to
- // refactor. All code currently using this package should change:
- // 1. Declare your own api.Registry.APIGroupRegistrationManager in your own test code.
- // 2. Import the relevant install packages.
- // 3. Register the types you need, from the announced.APIGroupAnnouncementManager.
- package testapi
- import (
- "fmt"
- "mime"
- "os"
- "reflect"
- "strings"
- "k8s.io/apimachinery/pkg/runtime"
- "k8s.io/apimachinery/pkg/runtime/schema"
- "k8s.io/apimachinery/pkg/runtime/serializer/recognizer"
- "k8s.io/kubernetes/pkg/api/legacyscheme"
- "k8s.io/kubernetes/pkg/apis/admission"
- "k8s.io/kubernetes/pkg/apis/admissionregistration"
- "k8s.io/kubernetes/pkg/apis/apps"
- "k8s.io/kubernetes/pkg/apis/auditregistration"
- "k8s.io/kubernetes/pkg/apis/authorization"
- "k8s.io/kubernetes/pkg/apis/autoscaling"
- "k8s.io/kubernetes/pkg/apis/batch"
- "k8s.io/kubernetes/pkg/apis/certificates"
- "k8s.io/kubernetes/pkg/apis/coordination"
- api "k8s.io/kubernetes/pkg/apis/core"
- "k8s.io/kubernetes/pkg/apis/events"
- "k8s.io/kubernetes/pkg/apis/extensions"
- "k8s.io/kubernetes/pkg/apis/imagepolicy"
- "k8s.io/kubernetes/pkg/apis/networking"
- "k8s.io/kubernetes/pkg/apis/node"
- "k8s.io/kubernetes/pkg/apis/policy"
- "k8s.io/kubernetes/pkg/apis/rbac"
- "k8s.io/kubernetes/pkg/apis/scheduling"
- "k8s.io/kubernetes/pkg/apis/settings"
- "k8s.io/kubernetes/pkg/apis/storage"
- // Initialize install packages
- _ "k8s.io/kubernetes/pkg/apis/admission/install"
- _ "k8s.io/kubernetes/pkg/apis/admissionregistration/install"
- _ "k8s.io/kubernetes/pkg/apis/apps/install"
- _ "k8s.io/kubernetes/pkg/apis/auditregistration/install"
- _ "k8s.io/kubernetes/pkg/apis/authentication/install"
- _ "k8s.io/kubernetes/pkg/apis/authorization/install"
- _ "k8s.io/kubernetes/pkg/apis/autoscaling/install"
- _ "k8s.io/kubernetes/pkg/apis/batch/install"
- _ "k8s.io/kubernetes/pkg/apis/certificates/install"
- _ "k8s.io/kubernetes/pkg/apis/coordination/install"
- _ "k8s.io/kubernetes/pkg/apis/core/install"
- _ "k8s.io/kubernetes/pkg/apis/events/install"
- _ "k8s.io/kubernetes/pkg/apis/extensions/install"
- _ "k8s.io/kubernetes/pkg/apis/imagepolicy/install"
- _ "k8s.io/kubernetes/pkg/apis/networking/install"
- _ "k8s.io/kubernetes/pkg/apis/node/install"
- _ "k8s.io/kubernetes/pkg/apis/policy/install"
- _ "k8s.io/kubernetes/pkg/apis/rbac/install"
- _ "k8s.io/kubernetes/pkg/apis/scheduling/install"
- _ "k8s.io/kubernetes/pkg/apis/settings/install"
- _ "k8s.io/kubernetes/pkg/apis/storage/install"
- )
- // Variables to store GroupName
- var (
- Groups = make(map[string]TestGroup)
- Default TestGroup
- Autoscaling TestGroup
- Batch TestGroup
- Extensions TestGroup
- Apps TestGroup
- Policy TestGroup
- Rbac TestGroup
- Storage TestGroup
- Admission TestGroup
- serializer runtime.SerializerInfo
- storageSerializer runtime.SerializerInfo
- )
- // TestGroup contains GroupVersion to uniquely identify the API
- type TestGroup struct {
- externalGroupVersion schema.GroupVersion
- }
- func init() {
- if apiMediaType := os.Getenv("KUBE_TEST_API_TYPE"); len(apiMediaType) > 0 {
- var ok bool
- mediaType, _, err := mime.ParseMediaType(apiMediaType)
- if err != nil {
- panic(err)
- }
- serializer, ok = runtime.SerializerInfoForMediaType(legacyscheme.Codecs.SupportedMediaTypes(), mediaType)
- if !ok {
- panic(fmt.Sprintf("no serializer for %s", apiMediaType))
- }
- }
- if storageMediaType := StorageMediaType(); len(storageMediaType) > 0 {
- var ok bool
- mediaType, _, err := mime.ParseMediaType(storageMediaType)
- if err != nil {
- panic(err)
- }
- storageSerializer, ok = runtime.SerializerInfoForMediaType(legacyscheme.Codecs.SupportedMediaTypes(), mediaType)
- if !ok {
- panic(fmt.Sprintf("no serializer for %s", storageMediaType))
- }
- }
- kubeTestAPI := os.Getenv("KUBE_TEST_API")
- if len(kubeTestAPI) != 0 {
- // priority is "first in list preferred", so this has to run in reverse order
- testGroupVersions := strings.Split(kubeTestAPI, ",")
- for i := len(testGroupVersions) - 1; i >= 0; i-- {
- gvString := testGroupVersions[i]
- groupVersion, err := schema.ParseGroupVersion(gvString)
- if err != nil {
- panic(fmt.Sprintf("Error parsing groupversion %v: %v", gvString, err))
- }
- Groups[groupVersion.Group] = TestGroup{
- externalGroupVersion: groupVersion,
- }
- }
- }
- if _, ok := Groups[api.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: api.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(api.GroupName)[0].Version}
- Groups[api.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[extensions.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: extensions.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(extensions.GroupName)[0].Version}
- Groups[extensions.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[autoscaling.GroupName]; !ok {
- internalTypes := make(map[string]reflect.Type)
- for k, t := range legacyscheme.Scheme.KnownTypes(extensions.SchemeGroupVersion) {
- if k == "Scale" {
- continue
- }
- internalTypes[k] = t
- }
- externalGroupVersion := schema.GroupVersion{Group: autoscaling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(autoscaling.GroupName)[0].Version}
- Groups[autoscaling.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[autoscaling.GroupName+"IntraGroup"]; !ok {
- internalTypes := make(map[string]reflect.Type)
- for k, t := range legacyscheme.Scheme.KnownTypes(extensions.SchemeGroupVersion) {
- if k == "Scale" {
- internalTypes[k] = t
- break
- }
- }
- externalGroupVersion := schema.GroupVersion{Group: autoscaling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(autoscaling.GroupName)[0].Version}
- Groups[autoscaling.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[batch.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: batch.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(batch.GroupName)[0].Version}
- Groups[batch.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[apps.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: apps.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(apps.GroupName)[0].Version}
- Groups[apps.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[policy.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: policy.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(policy.GroupName)[0].Version}
- Groups[policy.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[rbac.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: rbac.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(rbac.GroupName)[0].Version}
- Groups[rbac.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[scheduling.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: scheduling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(scheduling.GroupName)[0].Version}
- Groups[scheduling.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[settings.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: settings.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(settings.GroupName)[0].Version}
- Groups[settings.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[storage.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: storage.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(storage.GroupName)[0].Version}
- Groups[storage.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[certificates.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: certificates.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(certificates.GroupName)[0].Version}
- Groups[certificates.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[imagepolicy.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: imagepolicy.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(imagepolicy.GroupName)[0].Version}
- Groups[imagepolicy.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[authorization.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: authorization.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(authorization.GroupName)[0].Version}
- Groups[authorization.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[admissionregistration.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: admissionregistration.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(admissionregistration.GroupName)[0].Version}
- Groups[admissionregistration.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[admission.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: admission.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(admission.GroupName)[0].Version}
- Groups[admission.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[networking.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: networking.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(networking.GroupName)[0].Version}
- Groups[networking.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[node.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: node.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(node.GroupName)[0].Version}
- Groups[node.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[events.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: events.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(events.GroupName)[0].Version}
- Groups[events.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[coordination.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: coordination.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(coordination.GroupName)[0].Version}
- Groups[coordination.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- if _, ok := Groups[auditregistration.GroupName]; !ok {
- externalGroupVersion := schema.GroupVersion{Group: auditregistration.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(auditregistration.GroupName)[0].Version}
- Groups[auditregistration.GroupName] = TestGroup{
- externalGroupVersion: externalGroupVersion,
- }
- }
- Default = Groups[api.GroupName]
- Autoscaling = Groups[autoscaling.GroupName]
- Batch = Groups[batch.GroupName]
- Apps = Groups[apps.GroupName]
- Policy = Groups[policy.GroupName]
- Extensions = Groups[extensions.GroupName]
- Rbac = Groups[rbac.GroupName]
- Storage = Groups[storage.GroupName]
- Admission = Groups[admission.GroupName]
- }
- // GroupVersion makes copy of schema.GroupVersion
- func (g TestGroup) GroupVersion() *schema.GroupVersion {
- copyOfGroupVersion := g.externalGroupVersion
- return ©OfGroupVersion
- }
- // Codec returns the codec for the API version to test against, as set by the
- // KUBE_TEST_API_TYPE env var.
- func (g TestGroup) Codec() runtime.Codec {
- if serializer.Serializer == nil {
- return legacyscheme.Codecs.LegacyCodec(g.externalGroupVersion)
- }
- return legacyscheme.Codecs.CodecForVersions(serializer.Serializer, legacyscheme.Codecs.UniversalDeserializer(), schema.GroupVersions{g.externalGroupVersion}, nil)
- }
- // StorageMediaType finds media type set by KUBE_TEST_API_STORAGE_TYPE env var used to store objects in storage
- func StorageMediaType() string {
- return os.Getenv("KUBE_TEST_API_STORAGE_TYPE")
- }
- // StorageCodec returns the codec for the API version to store in etcd, as set by the
- // KUBE_TEST_API_STORAGE_TYPE env var.
- func (g TestGroup) StorageCodec() runtime.Codec {
- s := storageSerializer.Serializer
- if s == nil {
- return legacyscheme.Codecs.LegacyCodec(g.externalGroupVersion)
- }
- // etcd2 only supports string data - we must wrap any result before returning
- // TODO: remove for etcd3 / make parameterizable
- if !storageSerializer.EncodesAsText {
- s = runtime.NewBase64Serializer(s, s)
- }
- ds := recognizer.NewDecoder(s, legacyscheme.Codecs.UniversalDeserializer())
- return legacyscheme.Codecs.CodecForVersions(s, ds, schema.GroupVersions{g.externalGroupVersion}, nil)
- }
- // SelfLink returns a self link that will appear to be for the version Version().
- // 'resource' should be the resource path, e.g. "pods" for the Pod type. 'name' should be
- // empty for lists.
- func (g TestGroup) SelfLink(resource, name string) string {
- if g.externalGroupVersion.Group == api.GroupName {
- if name == "" {
- return fmt.Sprintf("/api/%s/%s", g.externalGroupVersion.Version, resource)
- }
- return fmt.Sprintf("/api/%s/%s/%s", g.externalGroupVersion.Version, resource, name)
- }
- // TODO: will need a /apis prefix once we have proper multi-group
- // support
- if name == "" {
- return fmt.Sprintf("/apis/%s/%s/%s", g.externalGroupVersion.Group, g.externalGroupVersion.Version, resource)
- }
- return fmt.Sprintf("/apis/%s/%s/%s/%s", g.externalGroupVersion.Group, g.externalGroupVersion.Version, resource, name)
- }
- // ResourcePathWithPrefix returns the appropriate path for the given prefix (watch, proxy, redirect, etc), resource, namespace and name.
- // For ex, this is of the form:
- // /api/v1/watch/namespaces/foo/pods/pod0 for v1.
- func (g TestGroup) ResourcePathWithPrefix(prefix, resource, namespace, name string) string {
- var path string
- if g.externalGroupVersion.Group == api.GroupName {
- path = "/api/" + g.externalGroupVersion.Version
- } else {
- // TODO: switch back once we have proper multiple group support
- // path = "/apis/" + g.Group + "/" + Version(group...)
- path = "/apis/" + g.externalGroupVersion.Group + "/" + g.externalGroupVersion.Version
- }
- if prefix != "" {
- path = path + "/" + prefix
- }
- if namespace != "" {
- path = path + "/namespaces/" + namespace
- }
- // Resource names are lower case.
- resource = strings.ToLower(resource)
- if resource != "" {
- path = path + "/" + resource
- }
- if name != "" {
- path = path + "/" + name
- }
- return path
- }
- // ResourcePath returns the appropriate path for the given resource, namespace and name.
- // For example, this is of the form:
- // /api/v1/namespaces/foo/pods/pod0 for v1.
- func (g TestGroup) ResourcePath(resource, namespace, name string) string {
- return g.ResourcePathWithPrefix("", resource, namespace, name)
- }
- // SubResourcePath returns the appropriate path for the given resource, namespace,
- // name and subresource.
- func (g TestGroup) SubResourcePath(resource, namespace, name, sub string) string {
- path := g.ResourcePathWithPrefix("", resource, namespace, name)
- if sub != "" {
- path = path + "/" + sub
- }
- return path
- }
|