mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			444 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			444 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package apiserver
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/x509"
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"io/ioutil"
 | 
						|
	"net"
 | 
						|
	"os"
 | 
						|
	"path"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						|
	client "k8s.io/client-go/kubernetes"
 | 
						|
	"k8s.io/client-go/rest"
 | 
						|
	"k8s.io/client-go/tools/clientcmd"
 | 
						|
	clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
 | 
						|
	"k8s.io/client-go/util/cert"
 | 
						|
	apiregistrationv1alpha1 "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1alpha1"
 | 
						|
	aggregatorclient "k8s.io/kube-aggregator/pkg/client/clientset_generated/clientset"
 | 
						|
	kubeaggregatorserver "k8s.io/kube-aggregator/pkg/cmd/server"
 | 
						|
	"k8s.io/kubernetes/cmd/kube-apiserver/app"
 | 
						|
	"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
 | 
						|
	"k8s.io/kubernetes/test/integration/framework"
 | 
						|
	"k8s.io/sample-apiserver/pkg/apis/wardle/v1alpha1"
 | 
						|
	sampleserver "k8s.io/sample-apiserver/pkg/cmd/server"
 | 
						|
)
 | 
						|
 | 
						|
var groupVersion = v1alpha1.SchemeGroupVersion
 | 
						|
 | 
						|
var groupVersionForDiscovery = metav1.GroupVersionForDiscovery{
 | 
						|
	GroupVersion: groupVersion.String(),
 | 
						|
	Version:      groupVersion.Version,
 | 
						|
}
 | 
						|
 | 
						|
func localPort() (int, error) {
 | 
						|
	l, err := net.Listen("tcp", ":0")
 | 
						|
	if err != nil {
 | 
						|
		return 0, err
 | 
						|
	}
 | 
						|
	defer l.Close()
 | 
						|
	addr := strings.Split(l.Addr().String(), ":")
 | 
						|
	port, err := strconv.Atoi(addr[len(addr)-1])
 | 
						|
	if err != nil {
 | 
						|
		return 0, err
 | 
						|
	}
 | 
						|
	return port, nil
 | 
						|
}
 | 
						|
 | 
						|
func TestAggregatedAPIServer(t *testing.T) {
 | 
						|
	stopCh := make(chan struct{})
 | 
						|
	defer close(stopCh)
 | 
						|
 | 
						|
	kubePort, err := localPort()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	certDir, _ := ioutil.TempDir("", "test-integration-apiserver")
 | 
						|
	defer os.RemoveAll(certDir)
 | 
						|
	_, defaultServiceClusterIPRange, _ := net.ParseCIDR("10.0.0.0/24")
 | 
						|
	proxySigningKey, err := cert.NewPrivateKey()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	proxySigningCert, err := cert.NewSelfSignedCACert(cert.Config{CommonName: "front-proxy-ca"}, proxySigningKey)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	proxyCACertFile, _ := ioutil.TempFile(certDir, "proxy-ca.crt")
 | 
						|
	if err := ioutil.WriteFile(proxyCACertFile.Name(), cert.EncodeCertPEM(proxySigningCert), 0644); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	clientSigningKey, err := cert.NewPrivateKey()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	clientSigningCert, err := cert.NewSelfSignedCACert(cert.Config{CommonName: "client-ca"}, clientSigningKey)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	clientCACertFile, _ := ioutil.TempFile(certDir, "client-ca.crt")
 | 
						|
	if err := ioutil.WriteFile(clientCACertFile.Name(), cert.EncodeCertPEM(clientSigningCert), 0644); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	kubeAPIServerOptions := options.NewServerRunOptions()
 | 
						|
	kubeAPIServerOptions.SecureServing.ServingOptions.BindAddress = net.ParseIP("127.0.0.1")
 | 
						|
	kubeAPIServerOptions.SecureServing.ServingOptions.BindPort = kubePort
 | 
						|
	kubeAPIServerOptions.SecureServing.ServerCert.CertDirectory = certDir
 | 
						|
	kubeAPIServerOptions.InsecureServing.BindPort = 0
 | 
						|
	kubeAPIServerOptions.Etcd.StorageConfig.ServerList = []string{framework.GetEtcdURLFromEnv()}
 | 
						|
	kubeAPIServerOptions.ServiceClusterIPRange = *defaultServiceClusterIPRange
 | 
						|
	kubeAPIServerOptions.Authentication.RequestHeader.UsernameHeaders = []string{"X-Remote-User"}
 | 
						|
	kubeAPIServerOptions.Authentication.RequestHeader.GroupHeaders = []string{"X-Remote-Group"}
 | 
						|
	kubeAPIServerOptions.Authentication.RequestHeader.ExtraHeaderPrefixes = []string{"X-Remote-Extra-"}
 | 
						|
	kubeAPIServerOptions.Authentication.RequestHeader.AllowedNames = []string{"kube-aggregator"}
 | 
						|
	kubeAPIServerOptions.Authentication.RequestHeader.ClientCAFile = proxyCACertFile.Name()
 | 
						|
	kubeAPIServerOptions.Authentication.ClientCert.ClientCA = clientCACertFile.Name()
 | 
						|
	kubeAPIServerOptions.Authorization.Mode = "RBAC"
 | 
						|
 | 
						|
	config, sharedInformers, err := app.BuildMasterConfig(kubeAPIServerOptions)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	go func() {
 | 
						|
		for {
 | 
						|
			if err := app.RunServer(config, sharedInformers, stopCh); err != nil {
 | 
						|
				t.Log(err)
 | 
						|
			}
 | 
						|
			time.Sleep(100 * time.Millisecond)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	// just use json because everyone speaks it
 | 
						|
	config.GenericConfig.LoopbackClientConfig.ContentType = ""
 | 
						|
	config.GenericConfig.LoopbackClientConfig.AcceptContentTypes = ""
 | 
						|
	kubeClient := client.NewForConfigOrDie(config.GenericConfig.LoopbackClientConfig)
 | 
						|
	err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (done bool, err error) {
 | 
						|
		if _, err := kubeClient.Discovery().ServerVersion(); err != nil {
 | 
						|
			return false, nil
 | 
						|
		}
 | 
						|
		return true, nil
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// write a kubeconfig out for starting other API servers with delegated auth.  remember, no in-cluster config
 | 
						|
	adminKubeConfig := createKubeConfig(config.GenericConfig.LoopbackClientConfig)
 | 
						|
	kubeconfigFile, _ := ioutil.TempFile("", "")
 | 
						|
	defer os.Remove(kubeconfigFile.Name())
 | 
						|
	clientcmd.WriteToFile(*adminKubeConfig, kubeconfigFile.Name())
 | 
						|
 | 
						|
	// start the wardle server to prove we can aggregate it
 | 
						|
	wardlePort, err := localPort()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	wardleCertDir, _ := ioutil.TempDir("", "test-integration-wardle-server")
 | 
						|
	defer os.RemoveAll(wardleCertDir)
 | 
						|
	wardleCmd := sampleserver.NewCommandStartWardleServer(os.Stdout, os.Stderr, stopCh)
 | 
						|
	wardleCmd.SetArgs([]string{
 | 
						|
		"--bind-address", "127.0.0.1",
 | 
						|
		"--secure-port", strconv.Itoa(wardlePort),
 | 
						|
		"--requestheader-username-headers=X-Remote-User",
 | 
						|
		"--requestheader-group-headers=X-Remote-Group",
 | 
						|
		"--requestheader-extra-headers-prefix=X-Remote-Extra-",
 | 
						|
		"--requestheader-client-ca-file=" + proxyCACertFile.Name(),
 | 
						|
		"--requestheader-allowed-names=kube-aggregator",
 | 
						|
		"--authentication-kubeconfig", kubeconfigFile.Name(),
 | 
						|
		"--authorization-kubeconfig", kubeconfigFile.Name(),
 | 
						|
		"--etcd-servers", framework.GetEtcdURLFromEnv(),
 | 
						|
		"--cert-dir", wardleCertDir,
 | 
						|
	})
 | 
						|
	go func() {
 | 
						|
		for {
 | 
						|
			if err := wardleCmd.Execute(); err != nil {
 | 
						|
				t.Log(err)
 | 
						|
			}
 | 
						|
			time.Sleep(100 * time.Millisecond)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	wardleClientConfig := rest.AnonymousClientConfig(config.GenericConfig.LoopbackClientConfig)
 | 
						|
	wardleClientConfig.Host = fmt.Sprintf("https://127.0.0.1:%d", wardlePort)
 | 
						|
	wardleClientConfig.CAFile = path.Join(wardleCertDir, "apiserver.crt")
 | 
						|
	wardleClientConfig.CAData = nil
 | 
						|
	wardleClientConfig.ServerName = ""
 | 
						|
	wardleClientConfig.BearerToken = config.GenericConfig.LoopbackClientConfig.BearerToken
 | 
						|
	var wardleClient client.Interface
 | 
						|
	err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (done bool, err error) {
 | 
						|
		wardleClient, err = client.NewForConfig(wardleClientConfig)
 | 
						|
		if err != nil {
 | 
						|
			// this happens if we race the API server for writing the cert
 | 
						|
			t.Log(err)
 | 
						|
			return false, nil
 | 
						|
		}
 | 
						|
		if _, err := wardleClient.Discovery().ServerVersion(); err != nil {
 | 
						|
			t.Log(err)
 | 
						|
			return false, nil
 | 
						|
		}
 | 
						|
		return true, nil
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// start the aggregator
 | 
						|
	aggregatorPort, err := localPort()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	aggregatorCertDir, _ := ioutil.TempDir("", "test-integration-aggregator")
 | 
						|
	defer os.RemoveAll(aggregatorCertDir)
 | 
						|
	proxyClientKey, err := cert.NewPrivateKey()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	proxyClientCert, err := cert.NewSignedCert(
 | 
						|
		cert.Config{
 | 
						|
			CommonName: "kube-aggregator",
 | 
						|
			Usages:     []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
 | 
						|
		},
 | 
						|
		proxyClientKey, proxySigningCert, proxySigningKey,
 | 
						|
	)
 | 
						|
	proxyClientCertFile, _ := ioutil.TempFile(aggregatorCertDir, "proxy-client.crt")
 | 
						|
	proxyClientKeyFile, _ := ioutil.TempFile(aggregatorCertDir, "proxy-client.key")
 | 
						|
	if err := ioutil.WriteFile(proxyClientCertFile.Name(), cert.EncodeCertPEM(proxyClientCert), 0600); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	if err := ioutil.WriteFile(proxyClientKeyFile.Name(), cert.EncodePrivateKeyPEM(proxyClientKey), 0644); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	aggregatorCmd := kubeaggregatorserver.NewCommandStartAggregator(os.Stdout, os.Stderr, stopCh)
 | 
						|
	aggregatorCmd.SetArgs([]string{
 | 
						|
		"--bind-address", "127.0.0.1",
 | 
						|
		"--secure-port", strconv.Itoa(aggregatorPort),
 | 
						|
		"--requestheader-username-headers", "",
 | 
						|
		"--proxy-client-cert-file", proxyClientCertFile.Name(),
 | 
						|
		"--proxy-client-key-file", proxyClientKeyFile.Name(),
 | 
						|
		"--core-kubeconfig", kubeconfigFile.Name(),
 | 
						|
		"--authentication-kubeconfig", kubeconfigFile.Name(),
 | 
						|
		"--authorization-kubeconfig", kubeconfigFile.Name(),
 | 
						|
		"--etcd-servers", framework.GetEtcdURLFromEnv(),
 | 
						|
		"--cert-dir", aggregatorCertDir,
 | 
						|
	})
 | 
						|
	go func() {
 | 
						|
		for {
 | 
						|
			if err := aggregatorCmd.Execute(); err != nil {
 | 
						|
				t.Log(err)
 | 
						|
			}
 | 
						|
			time.Sleep(100 * time.Millisecond)
 | 
						|
		}
 | 
						|
	}()
 | 
						|
 | 
						|
	aggregatorClientConfig := rest.AnonymousClientConfig(config.GenericConfig.LoopbackClientConfig)
 | 
						|
	aggregatorClientConfig.Host = fmt.Sprintf("https://127.0.0.1:%d", aggregatorPort)
 | 
						|
	aggregatorClientConfig.CAFile = path.Join(aggregatorCertDir, "apiserver.crt")
 | 
						|
	aggregatorClientConfig.CAData = nil
 | 
						|
	aggregatorClientConfig.ServerName = ""
 | 
						|
	aggregatorClientConfig.BearerToken = config.GenericConfig.LoopbackClientConfig.BearerToken
 | 
						|
	var aggregatorDiscoveryClient client.Interface
 | 
						|
	err = wait.PollImmediate(100*time.Millisecond, 10*time.Second, func() (done bool, err error) {
 | 
						|
		aggregatorDiscoveryClient, err = client.NewForConfig(aggregatorClientConfig)
 | 
						|
		if err != nil {
 | 
						|
			// this happens if we race the API server for writing the cert
 | 
						|
			return false, nil
 | 
						|
		}
 | 
						|
		if _, err := aggregatorDiscoveryClient.Discovery().ServerVersion(); err != nil {
 | 
						|
			return false, nil
 | 
						|
		}
 | 
						|
		return true, nil
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// now we're finally ready to test. These are what's run by defautl now
 | 
						|
	testAPIGroupList(t, wardleClient.Discovery().RESTClient())
 | 
						|
	testAPIGroup(t, wardleClient.Discovery().RESTClient())
 | 
						|
	testAPIResourceList(t, wardleClient.Discovery().RESTClient())
 | 
						|
 | 
						|
	wardleCA, err := ioutil.ReadFile(wardleClientConfig.CAFile)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	aggregatorClient := aggregatorclient.NewForConfigOrDie(aggregatorClientConfig)
 | 
						|
	_, err = aggregatorClient.ApiregistrationV1alpha1().APIServices().Create(&apiregistrationv1alpha1.APIService{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{Name: "v1alpha1.wardle.k8s.io"},
 | 
						|
		Spec: apiregistrationv1alpha1.APIServiceSpec{
 | 
						|
			Service: apiregistrationv1alpha1.ServiceReference{
 | 
						|
				Namespace: "kube-wardle",
 | 
						|
				Name:      "api",
 | 
						|
			},
 | 
						|
			Group:    "wardle.k8s.io",
 | 
						|
			Version:  "v1alpha1",
 | 
						|
			CABundle: wardleCA,
 | 
						|
			Priority: 200,
 | 
						|
		},
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// this is ugly, but sleep just a little bit so that the watch is probably observed.  Since nothing will actually be added to discovery
 | 
						|
	// (the service is missing), we don't have an external signal.
 | 
						|
	time.Sleep(100 * time.Millisecond)
 | 
						|
	if _, err := aggregatorDiscoveryClient.Discovery().ServerResources(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	_, err = aggregatorClient.ApiregistrationV1alpha1().APIServices().Create(&apiregistrationv1alpha1.APIService{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{Name: "v1."},
 | 
						|
		Spec: apiregistrationv1alpha1.APIServiceSpec{
 | 
						|
			Service: apiregistrationv1alpha1.ServiceReference{
 | 
						|
				Namespace: "default",
 | 
						|
				Name:      "kubernetes",
 | 
						|
			},
 | 
						|
			Group:    "",
 | 
						|
			Version:  "v1",
 | 
						|
			CABundle: config.GenericConfig.LoopbackClientConfig.CAData,
 | 
						|
			Priority: 100,
 | 
						|
		},
 | 
						|
	})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// this is ugly, but sleep just a little bit so that the watch is probably observed.  Since nothing will actually be added to discovery
 | 
						|
	// (the service is missing), we don't have an external signal.
 | 
						|
	time.Sleep(100 * time.Millisecond)
 | 
						|
	_, err = aggregatorDiscoveryClient.Discovery().ServerResources()
 | 
						|
	if err != nil && !strings.Contains(err.Error(), "lookup kubernetes.default.svc") {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// TODO figure out how to turn on enough of services and dns to run more
 | 
						|
}
 | 
						|
 | 
						|
func createKubeConfig(clientCfg *rest.Config) *clientcmdapi.Config {
 | 
						|
	clusterNick := "cluster"
 | 
						|
	userNick := "user"
 | 
						|
	contextNick := "context"
 | 
						|
 | 
						|
	config := clientcmdapi.NewConfig()
 | 
						|
 | 
						|
	credentials := clientcmdapi.NewAuthInfo()
 | 
						|
	credentials.Token = clientCfg.BearerToken
 | 
						|
	credentials.ClientCertificate = clientCfg.TLSClientConfig.CertFile
 | 
						|
	if len(credentials.ClientCertificate) == 0 {
 | 
						|
		credentials.ClientCertificateData = clientCfg.TLSClientConfig.CertData
 | 
						|
	}
 | 
						|
	credentials.ClientKey = clientCfg.TLSClientConfig.KeyFile
 | 
						|
	if len(credentials.ClientKey) == 0 {
 | 
						|
		credentials.ClientKeyData = clientCfg.TLSClientConfig.KeyData
 | 
						|
	}
 | 
						|
	config.AuthInfos[userNick] = credentials
 | 
						|
 | 
						|
	cluster := clientcmdapi.NewCluster()
 | 
						|
	cluster.Server = clientCfg.Host
 | 
						|
	cluster.CertificateAuthority = clientCfg.CAFile
 | 
						|
	if len(cluster.CertificateAuthority) == 0 {
 | 
						|
		cluster.CertificateAuthorityData = clientCfg.CAData
 | 
						|
	}
 | 
						|
	cluster.InsecureSkipTLSVerify = clientCfg.Insecure
 | 
						|
	if clientCfg.GroupVersion != nil {
 | 
						|
		cluster.APIVersion = clientCfg.GroupVersion.String()
 | 
						|
	}
 | 
						|
	config.Clusters[clusterNick] = cluster
 | 
						|
 | 
						|
	context := clientcmdapi.NewContext()
 | 
						|
	context.Cluster = clusterNick
 | 
						|
	context.AuthInfo = userNick
 | 
						|
	config.Contexts[contextNick] = context
 | 
						|
	config.CurrentContext = contextNick
 | 
						|
 | 
						|
	return config
 | 
						|
}
 | 
						|
 | 
						|
func readResponse(client rest.Interface, location string) ([]byte, error) {
 | 
						|
	return client.Get().AbsPath(location).DoRaw()
 | 
						|
}
 | 
						|
 | 
						|
func testAPIGroupList(t *testing.T, client rest.Interface) {
 | 
						|
	contents, err := readResponse(client, "/apis")
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("%v", err)
 | 
						|
	}
 | 
						|
	t.Log(string(contents))
 | 
						|
	var apiGroupList metav1.APIGroupList
 | 
						|
	err = json.Unmarshal(contents, &apiGroupList)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis", err)
 | 
						|
	}
 | 
						|
	assert.Equal(t, 1, len(apiGroupList.Groups))
 | 
						|
	assert.Equal(t, groupVersion.Group, apiGroupList.Groups[0].Name)
 | 
						|
	assert.Equal(t, 1, len(apiGroupList.Groups[0].Versions))
 | 
						|
	assert.Equal(t, groupVersionForDiscovery, apiGroupList.Groups[0].Versions[0])
 | 
						|
	assert.Equal(t, groupVersionForDiscovery, apiGroupList.Groups[0].PreferredVersion)
 | 
						|
}
 | 
						|
 | 
						|
func testAPIGroup(t *testing.T, client rest.Interface) {
 | 
						|
	contents, err := readResponse(client, "/apis/wardle.k8s.io")
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("%v", err)
 | 
						|
	}
 | 
						|
	t.Log(string(contents))
 | 
						|
	var apiGroup metav1.APIGroup
 | 
						|
	err = json.Unmarshal(contents, &apiGroup)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis/wardle.k8s.io", err)
 | 
						|
	}
 | 
						|
	assert.Equal(t, groupVersion.Group, apiGroup.Name)
 | 
						|
	assert.Equal(t, 1, len(apiGroup.Versions))
 | 
						|
	assert.Equal(t, groupVersion.String(), apiGroup.Versions[0].GroupVersion)
 | 
						|
	assert.Equal(t, groupVersion.Version, apiGroup.Versions[0].Version)
 | 
						|
	assert.Equal(t, apiGroup.PreferredVersion, apiGroup.Versions[0])
 | 
						|
}
 | 
						|
 | 
						|
func testAPIResourceList(t *testing.T, client rest.Interface) {
 | 
						|
	contents, err := readResponse(client, "/apis/wardle.k8s.io/v1alpha1")
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("%v", err)
 | 
						|
	}
 | 
						|
	t.Log(string(contents))
 | 
						|
	var apiResourceList metav1.APIResourceList
 | 
						|
	err = json.Unmarshal(contents, &apiResourceList)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Error in unmarshalling response from server %s: %v", "/apis/wardle.k8s.io/v1alpha1", err)
 | 
						|
	}
 | 
						|
	assert.Equal(t, groupVersion.String(), apiResourceList.GroupVersion)
 | 
						|
	assert.Equal(t, 1, len(apiResourceList.APIResources))
 | 
						|
	assert.Equal(t, "flunders", apiResourceList.APIResources[0].Name)
 | 
						|
	assert.True(t, apiResourceList.APIResources[0].Namespaced)
 | 
						|
}
 | 
						|
 | 
						|
const (
 | 
						|
	policyCachePollInterval = 100 * time.Millisecond
 | 
						|
	policyCachePollTimeout  = 5 * time.Second
 | 
						|
)
 |