mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 02:08:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			410 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			410 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2014 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| // Package testapi provides a helper for retrieving the KUBE_TEST_API environment variable.
 | |
| //
 | |
| // TODO(lavalamp): this package is a huge disaster at the moment. I intend to
 | |
| // refactor. All code currently using this package should change:
 | |
| // 1. Declare your own api.Registry.APIGroupRegistrationManager in your own test code.
 | |
| // 2. Import the relevant install packages.
 | |
| // 3. Register the types you need, from the announced.APIGroupAnnouncementManager.
 | |
| package testapi
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"mime"
 | |
| 	"os"
 | |
| 	"reflect"
 | |
| 	"strings"
 | |
| 
 | |
| 	"k8s.io/apimachinery/pkg/runtime"
 | |
| 	"k8s.io/apimachinery/pkg/runtime/schema"
 | |
| 	"k8s.io/apimachinery/pkg/runtime/serializer/recognizer"
 | |
| 	"k8s.io/kubernetes/pkg/api/legacyscheme"
 | |
| 	"k8s.io/kubernetes/pkg/apis/admission"
 | |
| 	"k8s.io/kubernetes/pkg/apis/admissionregistration"
 | |
| 	"k8s.io/kubernetes/pkg/apis/apps"
 | |
| 	"k8s.io/kubernetes/pkg/apis/auditregistration"
 | |
| 	"k8s.io/kubernetes/pkg/apis/authorization"
 | |
| 	"k8s.io/kubernetes/pkg/apis/autoscaling"
 | |
| 	"k8s.io/kubernetes/pkg/apis/batch"
 | |
| 	"k8s.io/kubernetes/pkg/apis/certificates"
 | |
| 	"k8s.io/kubernetes/pkg/apis/coordination"
 | |
| 	api "k8s.io/kubernetes/pkg/apis/core"
 | |
| 	"k8s.io/kubernetes/pkg/apis/discovery"
 | |
| 	"k8s.io/kubernetes/pkg/apis/events"
 | |
| 	"k8s.io/kubernetes/pkg/apis/extensions"
 | |
| 	"k8s.io/kubernetes/pkg/apis/imagepolicy"
 | |
| 	"k8s.io/kubernetes/pkg/apis/networking"
 | |
| 	"k8s.io/kubernetes/pkg/apis/node"
 | |
| 	"k8s.io/kubernetes/pkg/apis/policy"
 | |
| 	"k8s.io/kubernetes/pkg/apis/rbac"
 | |
| 	"k8s.io/kubernetes/pkg/apis/scheduling"
 | |
| 	"k8s.io/kubernetes/pkg/apis/settings"
 | |
| 	"k8s.io/kubernetes/pkg/apis/storage"
 | |
| 
 | |
| 	// Initialize install packages
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/admission/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/admissionregistration/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/apps/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/auditregistration/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/authentication/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/authorization/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/autoscaling/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/batch/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/certificates/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/coordination/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/core/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/discovery/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/events/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/extensions/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/imagepolicy/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/networking/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/node/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/policy/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/rbac/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/scheduling/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/settings/install"
 | |
| 	_ "k8s.io/kubernetes/pkg/apis/storage/install"
 | |
| )
 | |
| 
 | |
| // Variables to store GroupName
 | |
| var (
 | |
| 	Groups      = make(map[string]TestGroup)
 | |
| 	Default     TestGroup
 | |
| 	Autoscaling TestGroup
 | |
| 	Batch       TestGroup
 | |
| 	Extensions  TestGroup
 | |
| 	Apps        TestGroup
 | |
| 	Policy      TestGroup
 | |
| 	Rbac        TestGroup
 | |
| 	Storage     TestGroup
 | |
| 	Admission   TestGroup
 | |
| 
 | |
| 	serializer        runtime.SerializerInfo
 | |
| 	storageSerializer runtime.SerializerInfo
 | |
| )
 | |
| 
 | |
| // TestGroup contains GroupVersion to uniquely identify the API
 | |
| type TestGroup struct {
 | |
| 	externalGroupVersion schema.GroupVersion
 | |
| }
 | |
| 
 | |
| func init() {
 | |
| 	if apiMediaType := os.Getenv("KUBE_TEST_API_TYPE"); len(apiMediaType) > 0 {
 | |
| 		var ok bool
 | |
| 		mediaType, _, err := mime.ParseMediaType(apiMediaType)
 | |
| 		if err != nil {
 | |
| 			panic(err)
 | |
| 		}
 | |
| 		serializer, ok = runtime.SerializerInfoForMediaType(legacyscheme.Codecs.SupportedMediaTypes(), mediaType)
 | |
| 		if !ok {
 | |
| 			panic(fmt.Sprintf("no serializer for %s", apiMediaType))
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if storageMediaType := StorageMediaType(); len(storageMediaType) > 0 {
 | |
| 		var ok bool
 | |
| 		mediaType, _, err := mime.ParseMediaType(storageMediaType)
 | |
| 		if err != nil {
 | |
| 			panic(err)
 | |
| 		}
 | |
| 		storageSerializer, ok = runtime.SerializerInfoForMediaType(legacyscheme.Codecs.SupportedMediaTypes(), mediaType)
 | |
| 		if !ok {
 | |
| 			panic(fmt.Sprintf("no serializer for %s", storageMediaType))
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	kubeTestAPI := os.Getenv("KUBE_TEST_API")
 | |
| 	if len(kubeTestAPI) != 0 {
 | |
| 		// priority is "first in list preferred", so this has to run in reverse order
 | |
| 		testGroupVersions := strings.Split(kubeTestAPI, ",")
 | |
| 		for i := len(testGroupVersions) - 1; i >= 0; i-- {
 | |
| 			gvString := testGroupVersions[i]
 | |
| 			groupVersion, err := schema.ParseGroupVersion(gvString)
 | |
| 			if err != nil {
 | |
| 				panic(fmt.Sprintf("Error parsing groupversion %v: %v", gvString, err))
 | |
| 			}
 | |
| 
 | |
| 			Groups[groupVersion.Group] = TestGroup{
 | |
| 				externalGroupVersion: groupVersion,
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if _, ok := Groups[api.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: api.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(api.GroupName)[0].Version}
 | |
| 		Groups[api.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[extensions.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: extensions.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(extensions.GroupName)[0].Version}
 | |
| 		Groups[extensions.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[autoscaling.GroupName]; !ok {
 | |
| 		internalTypes := make(map[string]reflect.Type)
 | |
| 		for k, t := range legacyscheme.Scheme.KnownTypes(extensions.SchemeGroupVersion) {
 | |
| 			if k == "Scale" {
 | |
| 				continue
 | |
| 			}
 | |
| 			internalTypes[k] = t
 | |
| 		}
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: autoscaling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(autoscaling.GroupName)[0].Version}
 | |
| 		Groups[autoscaling.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[autoscaling.GroupName+"IntraGroup"]; !ok {
 | |
| 		internalTypes := make(map[string]reflect.Type)
 | |
| 		for k, t := range legacyscheme.Scheme.KnownTypes(extensions.SchemeGroupVersion) {
 | |
| 			if k == "Scale" {
 | |
| 				internalTypes[k] = t
 | |
| 				break
 | |
| 			}
 | |
| 		}
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: autoscaling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(autoscaling.GroupName)[0].Version}
 | |
| 		Groups[autoscaling.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[batch.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: batch.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(batch.GroupName)[0].Version}
 | |
| 		Groups[batch.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[apps.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: apps.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(apps.GroupName)[0].Version}
 | |
| 		Groups[apps.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[policy.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: policy.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(policy.GroupName)[0].Version}
 | |
| 		Groups[policy.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[rbac.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: rbac.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(rbac.GroupName)[0].Version}
 | |
| 		Groups[rbac.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[scheduling.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: scheduling.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(scheduling.GroupName)[0].Version}
 | |
| 		Groups[scheduling.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[settings.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: settings.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(settings.GroupName)[0].Version}
 | |
| 		Groups[settings.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[storage.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: storage.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(storage.GroupName)[0].Version}
 | |
| 		Groups[storage.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[certificates.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: certificates.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(certificates.GroupName)[0].Version}
 | |
| 		Groups[certificates.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[imagepolicy.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: imagepolicy.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(imagepolicy.GroupName)[0].Version}
 | |
| 		Groups[imagepolicy.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[authorization.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: authorization.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(authorization.GroupName)[0].Version}
 | |
| 		Groups[authorization.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[admissionregistration.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: admissionregistration.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(admissionregistration.GroupName)[0].Version}
 | |
| 		Groups[admissionregistration.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[admission.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: admission.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(admission.GroupName)[0].Version}
 | |
| 		Groups[admission.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[networking.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: networking.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(networking.GroupName)[0].Version}
 | |
| 		Groups[networking.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[node.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: node.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(node.GroupName)[0].Version}
 | |
| 		Groups[node.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[events.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: events.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(events.GroupName)[0].Version}
 | |
| 		Groups[events.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[coordination.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: coordination.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(coordination.GroupName)[0].Version}
 | |
| 		Groups[coordination.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[auditregistration.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: auditregistration.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(auditregistration.GroupName)[0].Version}
 | |
| 		Groups[auditregistration.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 	if _, ok := Groups[discovery.GroupName]; !ok {
 | |
| 		externalGroupVersion := schema.GroupVersion{Group: discovery.GroupName, Version: legacyscheme.Scheme.PrioritizedVersionsForGroup(discovery.GroupName)[0].Version}
 | |
| 		Groups[discovery.GroupName] = TestGroup{
 | |
| 			externalGroupVersion: externalGroupVersion,
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	Default = Groups[api.GroupName]
 | |
| 	Autoscaling = Groups[autoscaling.GroupName]
 | |
| 	Batch = Groups[batch.GroupName]
 | |
| 	Apps = Groups[apps.GroupName]
 | |
| 	Policy = Groups[policy.GroupName]
 | |
| 	Extensions = Groups[extensions.GroupName]
 | |
| 	Rbac = Groups[rbac.GroupName]
 | |
| 	Storage = Groups[storage.GroupName]
 | |
| 	Admission = Groups[admission.GroupName]
 | |
| }
 | |
| 
 | |
| // GroupVersion makes copy of schema.GroupVersion
 | |
| func (g TestGroup) GroupVersion() *schema.GroupVersion {
 | |
| 	copyOfGroupVersion := g.externalGroupVersion
 | |
| 	return ©OfGroupVersion
 | |
| }
 | |
| 
 | |
| // Codec returns the codec for the API version to test against, as set by the
 | |
| // KUBE_TEST_API_TYPE env var.
 | |
| func (g TestGroup) Codec() runtime.Codec {
 | |
| 	if serializer.Serializer == nil {
 | |
| 		return legacyscheme.Codecs.LegacyCodec(g.externalGroupVersion)
 | |
| 	}
 | |
| 	return legacyscheme.Codecs.CodecForVersions(serializer.Serializer, legacyscheme.Codecs.UniversalDeserializer(), schema.GroupVersions{g.externalGroupVersion}, nil)
 | |
| }
 | |
| 
 | |
| // StorageMediaType finds media type set by KUBE_TEST_API_STORAGE_TYPE env var used to store objects in storage
 | |
| func StorageMediaType() string {
 | |
| 	return os.Getenv("KUBE_TEST_API_STORAGE_TYPE")
 | |
| }
 | |
| 
 | |
| // StorageCodec returns the codec for the API version to store in etcd, as set by the
 | |
| // KUBE_TEST_API_STORAGE_TYPE env var.
 | |
| func (g TestGroup) StorageCodec() runtime.Codec {
 | |
| 	s := storageSerializer.Serializer
 | |
| 
 | |
| 	if s == nil {
 | |
| 		return legacyscheme.Codecs.LegacyCodec(g.externalGroupVersion)
 | |
| 	}
 | |
| 
 | |
| 	// etcd2 only supports string data - we must wrap any result before returning
 | |
| 	// TODO: remove for etcd3 / make parameterizable
 | |
| 	if !storageSerializer.EncodesAsText {
 | |
| 		s = runtime.NewBase64Serializer(s, s)
 | |
| 	}
 | |
| 	ds := recognizer.NewDecoder(s, legacyscheme.Codecs.UniversalDeserializer())
 | |
| 
 | |
| 	return legacyscheme.Codecs.CodecForVersions(s, ds, schema.GroupVersions{g.externalGroupVersion}, nil)
 | |
| }
 | |
| 
 | |
| // SelfLink returns a self link that will appear to be for the version Version().
 | |
| // 'resource' should be the resource path, e.g. "pods" for the Pod type. 'name' should be
 | |
| // empty for lists.
 | |
| func (g TestGroup) SelfLink(resource, name string) string {
 | |
| 	if g.externalGroupVersion.Group == api.GroupName {
 | |
| 		if name == "" {
 | |
| 			return fmt.Sprintf("/api/%s/%s", g.externalGroupVersion.Version, resource)
 | |
| 		}
 | |
| 		return fmt.Sprintf("/api/%s/%s/%s", g.externalGroupVersion.Version, resource, name)
 | |
| 	}
 | |
| 	// TODO: will need a /apis prefix once we have proper multi-group
 | |
| 	// support
 | |
| 	if name == "" {
 | |
| 		return fmt.Sprintf("/apis/%s/%s/%s", g.externalGroupVersion.Group, g.externalGroupVersion.Version, resource)
 | |
| 	}
 | |
| 	return fmt.Sprintf("/apis/%s/%s/%s/%s", g.externalGroupVersion.Group, g.externalGroupVersion.Version, resource, name)
 | |
| }
 | |
| 
 | |
| // ResourcePathWithPrefix returns the appropriate path for the given prefix (watch, proxy, redirect, etc), resource, namespace and name.
 | |
| // For ex, this is of the form:
 | |
| // /api/v1/watch/namespaces/foo/pods/pod0 for v1.
 | |
| func (g TestGroup) ResourcePathWithPrefix(prefix, resource, namespace, name string) string {
 | |
| 	var path string
 | |
| 	if g.externalGroupVersion.Group == api.GroupName {
 | |
| 		path = "/api/" + g.externalGroupVersion.Version
 | |
| 	} else {
 | |
| 		// TODO: switch back once we have proper multiple group support
 | |
| 		// path = "/apis/" + g.Group + "/" + Version(group...)
 | |
| 		path = "/apis/" + g.externalGroupVersion.Group + "/" + g.externalGroupVersion.Version
 | |
| 	}
 | |
| 
 | |
| 	if prefix != "" {
 | |
| 		path = path + "/" + prefix
 | |
| 	}
 | |
| 	if namespace != "" {
 | |
| 		path = path + "/namespaces/" + namespace
 | |
| 	}
 | |
| 	// Resource names are lower case.
 | |
| 	resource = strings.ToLower(resource)
 | |
| 	if resource != "" {
 | |
| 		path = path + "/" + resource
 | |
| 	}
 | |
| 	if name != "" {
 | |
| 		path = path + "/" + name
 | |
| 	}
 | |
| 	return path
 | |
| }
 | |
| 
 | |
| // ResourcePath returns the appropriate path for the given resource, namespace and name.
 | |
| // For example, this is of the form:
 | |
| // /api/v1/namespaces/foo/pods/pod0 for v1.
 | |
| func (g TestGroup) ResourcePath(resource, namespace, name string) string {
 | |
| 	return g.ResourcePathWithPrefix("", resource, namespace, name)
 | |
| }
 | |
| 
 | |
| // SubResourcePath returns the appropriate path for the given resource, namespace,
 | |
| // name and subresource.
 | |
| func (g TestGroup) SubResourcePath(resource, namespace, name, sub string) string {
 | |
| 	path := g.ResourcePathWithPrefix("", resource, namespace, name)
 | |
| 	if sub != "" {
 | |
| 		path = path + "/" + sub
 | |
| 	}
 | |
| 
 | |
| 	return path
 | |
| }
 | 
