diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2023-03-20 15:19:03 +0000 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2023-03-20 15:19:03 +0000 |
commit | 14bd84b61276ef29b97d23642d698de769bacfd2 (patch) | |
tree | f9eba90140c1bd874211dea17750a0d422c04080 /vendor/gems/kubeclient/test | |
parent | 891c388697b2db0d8ee0c8358a9bdbf6dc56d581 (diff) | |
download | gitlab-ce-14bd84b61276ef29b97d23642d698de769bacfd2.tar.gz |
Add latest changes from gitlab-org/gitlab@15-10-stable-eev15.10.0-rc42
Diffstat (limited to 'vendor/gems/kubeclient/test')
114 files changed, 0 insertions, 9287 deletions
diff --git a/vendor/gems/kubeclient/test/cassettes/kubernetes_guestbook.yml b/vendor/gems/kubeclient/test/cassettes/kubernetes_guestbook.yml deleted file mode 100644 index 3829add6d75..00000000000 --- a/vendor/gems/kubeclient/test/cassettes/kubernetes_guestbook.yml +++ /dev/null @@ -1,879 +0,0 @@ ---- -http_interactions: -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 404 - message: Not Found - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '253' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "namespaces \"kubeclient-ns\" not found", - "reason": "NotFound", - "details": { - "name": "kubeclient-ns", - "kind": "namespaces" - }, - "code": 404 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/guestbook - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 404 - message: Not Found - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '239' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "service \"guestbook\" not found", - "reason": "NotFound", - "details": { - "name": "guestbook", - "kind": "service" - }, - "code": 404 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/redis-master - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 404 - message: Not Found - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '245' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "service \"redis-master\" not found", - "reason": "NotFound", - "details": { - "name": "redis-master", - "kind": "service" - }, - "code": 404 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/redis-slave - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 404 - message: Not Found - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '243' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "service \"redis-slave\" not found", - "reason": "NotFound", - "details": { - "name": "redis-slave", - "kind": "service" - }, - "code": 404 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/guestbook - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 404 - message: Not Found - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '269' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "replicationControllers \"guestbook\" not found", - "reason": "NotFound", - "details": { - "name": "guestbook", - "kind": "replicationControllers" - }, - "code": 404 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-master - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 404 - message: Not Found - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '275' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "replicationControllers \"redis-master\" not found", - "reason": "NotFound", - "details": { - "name": "redis-master", - "kind": "replicationControllers" - }, - "code": 404 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-slave - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 404 - message: Not Found - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '273' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "replicationControllers \"redis-slave\" not found", - "reason": "NotFound", - "details": { - "name": "redis-slave", - "kind": "replicationControllers" - }, - "code": 404 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: post - uri: http://10.35.0.23:8080/api/v1/namespaces - body: - encoding: UTF-8 - string: '{"metadata":{"name":"kubeclient-ns"},"kind":"Namespace","apiVersion":"v1"}' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - Content-Length: - - '74' - User-Agent: - - Ruby - response: - status: - code: 201 - message: Created - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '297' - body: - encoding: UTF-8 - string: '{"kind":"Namespace","apiVersion":"v1","metadata":{"name":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns","uid":"f41e6b27-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"534","creationTimestamp":"2015-08-09T10:03:59Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: post - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services - body: - encoding: UTF-8 - string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"name":"guestbook"},"name":"guestbook"},"spec":{"selector":{"app":"guestbook"},"ports":[{"port":3000,"targetPort":"http-server"}]},"type":"LoadBalancer","kind":"Service","apiVersion":"v1"}' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - Content-Length: - - '239' - User-Agent: - - Ruby - response: - status: - code: 201 - message: Created - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '521' - body: - encoding: UTF-8 - string: '{"kind":"Service","apiVersion":"v1","metadata":{"name":"guestbook","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/guestbook","uid":"f42187e1-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"538","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"name":"guestbook"}},"spec":{"ports":[{"protocol":"TCP","port":3000,"targetPort":"http-server","nodePort":0}],"selector":{"app":"guestbook"},"clusterIP":"10.0.0.80","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: post - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services - body: - encoding: UTF-8 - string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"redis","role":"master"},"name":"redis-master"},"spec":{"selector":{"app":"redis","role":"master"},"ports":[{"port":6379,"targetPort":"redis-server"}]},"kind":"Service","apiVersion":"v1"}' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - Content-Length: - - '244' - User-Agent: - - Ruby - response: - status: - code: 201 - message: Created - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '552' - body: - encoding: UTF-8 - string: '{"kind":"Service","apiVersion":"v1","metadata":{"name":"redis-master","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/redis-master","uid":"f423bf8b-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"542","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"master"}},"spec":{"ports":[{"protocol":"TCP","port":6379,"targetPort":"redis-server","nodePort":0}],"selector":{"app":"redis","role":"master"},"clusterIP":"10.0.0.140","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: post - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services - body: - encoding: UTF-8 - string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"redis","role":"slave"},"name":"redis-slave"},"spec":{"selector":{"app":"redis","role":"slave"},"ports":[{"port":6379,"targetPort":"redis-server"}]},"kind":"Service","apiVersion":"v1"}' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - Content-Length: - - '241' - User-Agent: - - Ruby - response: - status: - code: 201 - message: Created - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '548' - body: - encoding: UTF-8 - string: '{"kind":"Service","apiVersion":"v1","metadata":{"name":"redis-slave","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/redis-slave","uid":"f4264678-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"545","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"slave"}},"spec":{"ports":[{"protocol":"TCP","port":6379,"targetPort":"redis-server","nodePort":0}],"selector":{"app":"redis","role":"slave"},"clusterIP":"10.0.0.154","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: post - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers - body: - encoding: UTF-8 - string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"guestbook","role":"slave"},"name":"guestbook"},"spec":{"selector":{"app":"guestbook"},"template":{"metadata":{"labels":{"app":"guestbook"}},"spec":{"containers":[{"name":"guestbook","image":"kubernetes/guestbook:v2","ports":[{"name":"http-server","containerPort":3000}]}]}},"replicas":3},"kind":"ReplicationController","apiVersion":"v1"}' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - Content-Length: - - '395' - User-Agent: - - Ruby - response: - status: - code: 201 - message: Created - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '815' - body: - encoding: UTF-8 - string: '{"kind":"ReplicationController","apiVersion":"v1","metadata":{"name":"guestbook","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/guestbook","uid":"f4287784-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"547","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"guestbook","role":"slave"}},"spec":{"replicas":3,"selector":{"app":"guestbook"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"guestbook"}},"spec":{"containers":[{"name":"guestbook","image":"kubernetes/guestbook:v2","ports":[{"name":"http-server","containerPort":3000,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0}}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: post - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers - body: - encoding: UTF-8 - string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"redis","role":"master"},"name":"redis-master"},"spec":{"selector":{"app":"redis","role":"master"},"template":{"metadata":{"labels":{"app":"redis","role":"master"}},"spec":{"containers":[{"name":"redis-master","image":"redis","ports":[{"name":"redis-server","containerPort":6379}]}]}},"replicas":1},"kind":"ReplicationController","apiVersion":"v1"}' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - Content-Length: - - '405' - User-Agent: - - Ruby - response: - status: - code: 201 - message: Created - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '828' - body: - encoding: UTF-8 - string: '{"kind":"ReplicationController","apiVersion":"v1","metadata":{"name":"redis-master","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-master","uid":"f42a9800-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"558","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"master"}},"spec":{"replicas":1,"selector":{"app":"redis","role":"master"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"redis","role":"master"}},"spec":{"containers":[{"name":"redis-master","image":"redis","ports":[{"name":"redis-server","containerPort":6379,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0}}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: post - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers - body: - encoding: UTF-8 - string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"redis","role":"slave"},"name":"redis-slave"},"spec":{"selector":{"app":"redis","role":"slave"},"template":{"metadata":{"labels":{"app":"redis","role":"slave"}},"spec":{"containers":[{"name":"redis-slave","image":"kubernetes/redis-slave:v2","ports":[{"name":"redis-server","containerPort":6379}]}]}},"replicas":2},"kind":"ReplicationController","apiVersion":"v1"}' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - Content-Length: - - '420' - User-Agent: - - Ruby - response: - status: - code: 201 - message: Created - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '842' - body: - encoding: UTF-8 - string: '{"kind":"ReplicationController","apiVersion":"v1","metadata":{"name":"redis-slave","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-slave","uid":"f42e1d09-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"567","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"slave"}},"spec":{"replicas":2,"selector":{"app":"redis","role":"slave"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"redis","role":"slave"}},"spec":{"containers":[{"name":"redis-slave","image":"kubernetes/redis-slave:v2","ports":[{"name":"redis-server","containerPort":6379,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0}}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: get - uri: http://10.35.0.23:8080/api/v1/namespaces - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '629' - body: - encoding: UTF-8 - string: '{"kind":"NamespaceList","apiVersion":"v1","metadata":{"selfLink":"/api/v1/namespaces","resourceVersion":"570"},"items":[{"metadata":{"name":"default","selfLink":"/api/v1/namespaces/default","uid":"37360c82-3e77-11e5-a75a-18037327aaeb","resourceVersion":"6","creationTimestamp":"2015-08-09T09:15:45Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}},{"metadata":{"name":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns","uid":"f41e6b27-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"534","creationTimestamp":"2015-08-09T10:03:59Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}}]}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: get - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '1661' - body: - encoding: UTF-8 - string: '{"kind":"ServiceList","apiVersion":"v1","metadata":{"selfLink":"/api/v1/namespaces/kubeclient-ns/services","resourceVersion":"571"},"items":[{"metadata":{"name":"guestbook","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/guestbook","uid":"f42187e1-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"538","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"name":"guestbook"}},"spec":{"ports":[{"protocol":"TCP","port":3000,"targetPort":"http-server","nodePort":0}],"selector":{"app":"guestbook"},"clusterIP":"10.0.0.80","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}},{"metadata":{"name":"redis-master","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/redis-master","uid":"f423bf8b-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"542","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"master"}},"spec":{"ports":[{"protocol":"TCP","port":6379,"targetPort":"redis-server","nodePort":0}],"selector":{"app":"redis","role":"master"},"clusterIP":"10.0.0.140","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}},{"metadata":{"name":"redis-slave","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/redis-slave","uid":"f4264678-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"545","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"slave"}},"spec":{"ports":[{"protocol":"TCP","port":6379,"targetPort":"redis-server","nodePort":0}],"selector":{"app":"redis","role":"slave"},"clusterIP":"10.0.0.154","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}}]}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: get - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Transfer-Encoding: - - chunked - body: - encoding: UTF-8 - string: '{"kind":"ReplicationControllerList","apiVersion":"v1","metadata":{"selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers","resourceVersion":"571"},"items":[{"metadata":{"name":"guestbook","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/guestbook","uid":"f4287784-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"557","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"guestbook","role":"slave"}},"spec":{"replicas":3,"selector":{"app":"guestbook"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"guestbook"}},"spec":{"containers":[{"name":"guestbook","image":"kubernetes/guestbook:v2","ports":[{"name":"http-server","containerPort":3000,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":3,"observedGeneration":1}},{"metadata":{"name":"redis-master","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-master","uid":"f42a9800-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"565","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"master"}},"spec":{"replicas":1,"selector":{"app":"redis","role":"master"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"redis","role":"master"}},"spec":{"containers":[{"name":"redis-master","image":"redis","ports":[{"name":"redis-server","containerPort":6379,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0,"observedGeneration":1}},{"metadata":{"name":"redis-slave","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-slave","uid":"f42e1d09-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"567","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"slave"}},"spec":{"replicas":2,"selector":{"app":"redis","role":"slave"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"redis","role":"slave"}},"spec":{"containers":[{"name":"redis-slave","image":"kubernetes/redis-slave:v2","ports":[{"name":"redis-server","containerPort":6379,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0}}]}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/guestbook - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '100' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Success", - "code": 200 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/redis-master - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '100' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Success", - "code": 200 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/redis-slave - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '100' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Success", - "code": 200 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/guestbook - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '100' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Success", - "code": 200 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-master - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '100' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Success", - "code": 200 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-slave - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '100' - body: - encoding: UTF-8 - string: |- - { - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Success", - "code": 200 - } - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: delete - uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - '*/*; q=0.5, application/xml' - Accept-Encoding: - - gzip, deflate - User-Agent: - - Ruby - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Sun, 09 Aug 2015 10:03:59 GMT - Content-Length: - - '345' - body: - encoding: UTF-8 - string: '{"kind":"Namespace","apiVersion":"v1","metadata":{"name":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns","uid":"f41e6b27-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"584","creationTimestamp":"2015-08-09T10:03:59Z","deletionTimestamp":"2015-08-09T10:03:59Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Terminating"}}' - http_version: - recorded_at: Sun, 09 Aug 2015 10:00:02 GMT -- request: - method: get - uri: http://10.35.0.23:8080/api/v1 - body: - encoding: US-ASCII - string: '' - headers: - Accept: - - "*/*" - Accept-Encoding: - - gzip, deflate - User-Agent: - - rest-client/2.0.0 (linux-gnu x86_64) ruby/2.3.0p0 - Host: - - localhost:8080 - response: - status: - code: 200 - message: OK - headers: - Content-Type: - - application/json - Date: - - Mon, 29 Aug 2016 15:51:30 GMT - Transfer-Encoding: - - chunked - body: - encoding: UTF-8 - string: '{"kind":"APIResourceList","groupVersion":"v1","resources":[{"name":"bindings","namespaced":true,"kind":"Binding"},{"name":"componentstatuses","namespaced":false,"kind":"ComponentStatus"},{"name":"configmaps","namespaced":true,"kind":"ConfigMap"},{"name":"endpoints","namespaced":true,"kind":"Endpoints"},{"name":"events","namespaced":true,"kind":"Event"},{"name":"limitranges","namespaced":true,"kind":"LimitRange"},{"name":"namespaces","namespaced":false,"kind":"Namespace"},{"name":"namespaces/finalize","namespaced":false,"kind":"Namespace"},{"name":"namespaces/status","namespaced":false,"kind":"Namespace"},{"name":"nodes","namespaced":false,"kind":"Node"},{"name":"nodes/proxy","namespaced":false,"kind":"Node"},{"name":"nodes/status","namespaced":false,"kind":"Node"},{"name":"persistentvolumeclaims","namespaced":true,"kind":"PersistentVolumeClaim"},{"name":"persistentvolumeclaims/status","namespaced":true,"kind":"PersistentVolumeClaim"},{"name":"persistentvolumes","namespaced":false,"kind":"PersistentVolume"},{"name":"persistentvolumes/status","namespaced":false,"kind":"PersistentVolume"},{"name":"pods","namespaced":true,"kind":"Pod"},{"name":"pods/attach","namespaced":true,"kind":"Pod"},{"name":"pods/binding","namespaced":true,"kind":"Binding"},{"name":"pods/exec","namespaced":true,"kind":"Pod"},{"name":"pods/log","namespaced":true,"kind":"Pod"},{"name":"pods/portforward","namespaced":true,"kind":"Pod"},{"name":"pods/proxy","namespaced":true,"kind":"Pod"},{"name":"pods/status","namespaced":true,"kind":"Pod"},{"name":"podtemplates","namespaced":true,"kind":"PodTemplate"},{"name":"replicationcontrollers","namespaced":true,"kind":"ReplicationController"},{"name":"replicationcontrollers/scale","namespaced":true,"kind":"Scale"},{"name":"replicationcontrollers/status","namespaced":true,"kind":"ReplicationController"},{"name":"resourcequotas","namespaced":true,"kind":"ResourceQuota"},{"name":"resourcequotas/status","namespaced":true,"kind":"ResourceQuota"},{"name":"secrets","namespaced":true,"kind":"Secret"},{"name":"serviceaccounts","namespaced":true,"kind":"ServiceAccount"},{"name":"services","namespaced":true,"kind":"Service"},{"name":"services/proxy","namespaced":true,"kind":"Service"},{"name":"services/status","namespaced":true,"kind":"Service"}]} - -' - http_version: - recorded_at: Mon, 29 Aug 2016 15:51:30 GMT -recorded_with: VCR 3.0.3 diff --git a/vendor/gems/kubeclient/test/config/allinone.kubeconfig b/vendor/gems/kubeclient/test/config/allinone.kubeconfig deleted file mode 100644 index f06db6af123..00000000000 --- a/vendor/gems/kubeclient/test/config/allinone.kubeconfig +++ /dev/null @@ -1,21 +0,0 @@ - -apiVersion: v1 -clusters: -- cluster: - server: https://localhost:6443 - certificate-authority-data: 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 - name: local -contexts: -- context: - cluster: local - namespace: default - user: user - name: Default -current-context: Default -kind: Config -preferences: {} -users: -- name: user - user: - client-certificate-data: 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 - client-key-data: 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 diff --git a/vendor/gems/kubeclient/test/config/another-ca1.pem b/vendor/gems/kubeclient/test/config/another-ca1.pem deleted file mode 100644 index 50825d47519..00000000000 --- a/vendor/gems/kubeclient/test/config/another-ca1.pem +++ /dev/null @@ -1,19 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIDADCCAeigAwIBAgIUQZjM/5qoAF78qIDyc+rKi4qBdOIwDQYJKoZIhvcNAQEL -BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAzMjIxNDQzMDBaFw0z -MjAzMTkxNDQzMDBaMBgxFjAUBgNVBAMTDWt1YmVybmV0ZXMtY2EwggEiMA0GCSqG -SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGkG7g+UjpDhZ7A4Pm7Hme+RWs5IHz4I2X -IclvtO3LuJ26yzz2S8VaXFFeUqzEPb2G1RxFGvoAVN7qrTw0n5MQJCFLAA4dI7oY -8XLRJ7KgTBBIw1jYpgKb2zyHPIJE6VmslliKUiX+QDovdRU/dsbdup2EucrnGw4+ -QNNAc3XMbXgm6lubA6znYZlSpcQ8BKer3tq75q4KUZicIjS6gKQyZjk9a6fcOuCS -ybtlAKp9lYzcwxZkNrx+V1PJMQ1qaJWPnMAVi7Oj5Dm3Jmf1WHBcNEh52Q/0vYlt -4WSaeM5t/Py/m/7c4Ve97f5m2X6EhYyUbzov4qeZOnIJI3MnU1FxAgMBAAGjQjBA -MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSl1qyt -jd96WstRE8h9x5qkCvZUvjANBgkqhkiG9w0BAQsFAAOCAQEAJt55qYvBaniAwvgO -tbO79g1FcQGrxpMX45TuoCE/K+MWDjrr6bp+FbLOqT8MwOsbGwwJIRTHGvkEkVso -5AWI5aSNs3hWnltOdz27ZSHeX77WB4daK1tLK6ggZrp3v9iIpbBwWBFdmAqsPvEs -H17K2BgAzdh6xRKPQd0BGTUpJBfk50R2gDMj7FKyIzBN69IOGytBfAXBhHzEGy4+ -MvtTEIMUjR//KgCrpNeyDuaWHttR5FdnuRxFO7O3BAfyNSaNmd/IEHQf7DIGgzOy -+xWLyH/HRHj5C70qAqjbnrgBODI99BsA9U7oXTuyPLdIboAcFt2zD5DIYgZET52X -53w4jA== ------END CERTIFICATE----- diff --git a/vendor/gems/kubeclient/test/config/another-ca2.pem b/vendor/gems/kubeclient/test/config/another-ca2.pem deleted file mode 100644 index 53be72e87d7..00000000000 --- a/vendor/gems/kubeclient/test/config/another-ca2.pem +++ /dev/null @@ -1,19 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIDADCCAeigAwIBAgIUHW3OPnmuTquJ0YgbGpmm/blsY2QwDQYJKoZIhvcNAQEL -BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAzMjIxNDQ0MDBaFw0z -MjAzMTkxNDQ0MDBaMBgxFjAUBgNVBAMTDWt1YmVybmV0ZXMtY2EwggEiMA0GCSqG -SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDLMEJs5agS0hNQBxPTtsI6dIhIi/pY8liI -sNukbi5KwKf80FYNyRXqE8ufDVyTFzOc+MG96jnHjDaBWjrVN9On0PgUBo4nPyd4 -DtyvYx2jMzwToSEIo/Z1aroMx1oGywCgdS4/3FWAbhlSbyXKJmhfh6gX0TxWz+dV -zqNuqQq9EWuRhOMg9vgzjfp3mjiPE10lW8pT0j5JT3PI/eGO+C2Z7z33LJXb6GM2 -nXvhGFMGY+7XG65pqJ3L8g1mk+LjPiwyIItw8wPtrnrZ2VXMklMd5Mn+jgCTNe1B -om0nPpPIiTblCr6gcNcVjy5WGN37OKlqrT0JTuSPHcxSUp05LFjDAgMBAAGjQjBA -MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBQvV/sB -wbR3UwjkLAMN+6P3fZ/3OjANBgkqhkiG9w0BAQsFAAOCAQEACAk4EQwCkw2EBsSR -2SKoa1SjYFkZzIr/0/TB2YcMUvHF+RpvlD5vQ8/RJjeAl1kc6/niZ9TWCemjBLqI -hPoFe49zr49DyQjC2ZfsXVJvFCr6g7o4q4DtQ6ltyBuTJbkn1hI+aB8zgvpofG44 -mKj18Y7tPvgXtRua4SaeBq777+22AOvKxPied9p4PTrMN4RKTP6+yIbLflej7dBD -zQDjfmmYsH0T2ZRtBpE1dYrUbU3tkizcMZRJBgreoxoff+r5coibMIm/7gh+YoSb -BCItCaeuGSKQ8CJb8DElcPUd6nKUjmeiQL68ztsG/+CXLiL/TZb914VaaCXvPInw -49jJ7w== ------END CERTIFICATE----- diff --git a/vendor/gems/kubeclient/test/config/concatenated-ca.kubeconfig b/vendor/gems/kubeclient/test/config/concatenated-ca.kubeconfig deleted file mode 100644 index ed20e4dde50..00000000000 --- a/vendor/gems/kubeclient/test/config/concatenated-ca.kubeconfig +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - certificate-authority: concatenated-ca.pem - server: https://localhost:6443 - name: local -contexts: -- context: - cluster: local - namespace: default - user: user - name: Default -current-context: Default -kind: Config -preferences: {} -users: -- name: user - user: - client-certificate: external-cert.pem - client-key: external-key.rsa diff --git a/vendor/gems/kubeclient/test/config/concatenated-ca.pem b/vendor/gems/kubeclient/test/config/concatenated-ca.pem deleted file mode 100644 index 1117298ff2d..00000000000 --- a/vendor/gems/kubeclient/test/config/concatenated-ca.pem +++ /dev/null @@ -1,57 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIDADCCAeigAwIBAgIUQZjM/5qoAF78qIDyc+rKi4qBdOIwDQYJKoZIhvcNAQEL -BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAzMjIxNDQzMDBaFw0z -MjAzMTkxNDQzMDBaMBgxFjAUBgNVBAMTDWt1YmVybmV0ZXMtY2EwggEiMA0GCSqG -SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGkG7g+UjpDhZ7A4Pm7Hme+RWs5IHz4I2X -IclvtO3LuJ26yzz2S8VaXFFeUqzEPb2G1RxFGvoAVN7qrTw0n5MQJCFLAA4dI7oY -8XLRJ7KgTBBIw1jYpgKb2zyHPIJE6VmslliKUiX+QDovdRU/dsbdup2EucrnGw4+ -QNNAc3XMbXgm6lubA6znYZlSpcQ8BKer3tq75q4KUZicIjS6gKQyZjk9a6fcOuCS -ybtlAKp9lYzcwxZkNrx+V1PJMQ1qaJWPnMAVi7Oj5Dm3Jmf1WHBcNEh52Q/0vYlt -4WSaeM5t/Py/m/7c4Ve97f5m2X6EhYyUbzov4qeZOnIJI3MnU1FxAgMBAAGjQjBA -MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSl1qyt -jd96WstRE8h9x5qkCvZUvjANBgkqhkiG9w0BAQsFAAOCAQEAJt55qYvBaniAwvgO -tbO79g1FcQGrxpMX45TuoCE/K+MWDjrr6bp+FbLOqT8MwOsbGwwJIRTHGvkEkVso -5AWI5aSNs3hWnltOdz27ZSHeX77WB4daK1tLK6ggZrp3v9iIpbBwWBFdmAqsPvEs -H17K2BgAzdh6xRKPQd0BGTUpJBfk50R2gDMj7FKyIzBN69IOGytBfAXBhHzEGy4+ -MvtTEIMUjR//KgCrpNeyDuaWHttR5FdnuRxFO7O3BAfyNSaNmd/IEHQf7DIGgzOy -+xWLyH/HRHj5C70qAqjbnrgBODI99BsA9U7oXTuyPLdIboAcFt2zD5DIYgZET52X -53w4jA== ------END CERTIFICATE----- ------BEGIN CERTIFICATE----- -MIIC/zCCAeegAwIBAgITPbfpy29aBG67ChRdB6lJegTkmDANBgkqhkiG9w0BAQsF -ADAYMRYwFAYDVQQDEw1rdWJlcm5ldGVzLWNhMB4XDTIyMDIyMTA5MDIwMFoXDTMy -MDIxOTA5MDIwMFowGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBAMLjZ2cFBalzoimaEcpT9Jz2JmdgsHMOagVd -It7OQpTwDZ3npIICVpguEh9xtovR8m8/HYM+/a4vMQHT+3p8HPjiDaRYGg7OZ9L+ -Fp/9zhBuiaIvg8Z+Bbys9Q9Uuj6VEwfFJBcNH6TmzdiDgQUs5/k+6/vtuJ4ys3sD -KkAOxqPXDaBoANnLpIxdIMQDcWSLFA0wmFhdZJq3KEAoJpEL0WYo1ZRBV3iH77yf -sDbN1OBu2vNnRZ+DrV0ZJ5ApmbFXPX8i4KJaW9lCB62FN0j5XsNDoyTeAVpesfNs -zYufVpBdqNZFkOKg9diMuTMika2aYfDuiVzdebDgcp9aMloKtbECAwEAAaNCMEAw -DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFBdOiygC -LcuJrq8rNa1xADr5Sp7CMA0GCSqGSIb3DQEBCwUAA4IBAQDCy4IlhASh6Br5XEcI -TpP5ThD1OyRzQnsPe6P1qgWP3kBXK/AcsSl+VGtaZp2oEhJoUnsz7kE8yW3gK+PA -51zY4aHTiF9xkyd5zOCAGB+cfp9Ys+szWzyu0QQ9IBjJ4+eDjg7W0/S+BM2Qn1iL -jTFIe2Bdf+Q/J24/q3ksTXK17UNun14vDRsJgsNcrFt/rumfHPx1ytwsiqKyEKV7 -kFxSwa3d8/AvhGgFpPmfRjU7gAJCFcHz501zhi2a6L5TYBTecVRbqZoeHiZ0YNWI -is5g4VmVB+BxMAM2WEd29v4l/3oI1Pey9rvt7NJqSe1im9uqZgVDeg/vP8zKs/dF -ZYw8 ------END CERTIFICATE----- ------BEGIN CERTIFICATE----- -MIIDADCCAeigAwIBAgIUHW3OPnmuTquJ0YgbGpmm/blsY2QwDQYJKoZIhvcNAQEL -BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAzMjIxNDQ0MDBaFw0z -MjAzMTkxNDQ0MDBaMBgxFjAUBgNVBAMTDWt1YmVybmV0ZXMtY2EwggEiMA0GCSqG -SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDLMEJs5agS0hNQBxPTtsI6dIhIi/pY8liI -sNukbi5KwKf80FYNyRXqE8ufDVyTFzOc+MG96jnHjDaBWjrVN9On0PgUBo4nPyd4 -DtyvYx2jMzwToSEIo/Z1aroMx1oGywCgdS4/3FWAbhlSbyXKJmhfh6gX0TxWz+dV -zqNuqQq9EWuRhOMg9vgzjfp3mjiPE10lW8pT0j5JT3PI/eGO+C2Z7z33LJXb6GM2 -nXvhGFMGY+7XG65pqJ3L8g1mk+LjPiwyIItw8wPtrnrZ2VXMklMd5Mn+jgCTNe1B -om0nPpPIiTblCr6gcNcVjy5WGN37OKlqrT0JTuSPHcxSUp05LFjDAgMBAAGjQjBA -MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBQvV/sB -wbR3UwjkLAMN+6P3fZ/3OjANBgkqhkiG9w0BAQsFAAOCAQEACAk4EQwCkw2EBsSR -2SKoa1SjYFkZzIr/0/TB2YcMUvHF+RpvlD5vQ8/RJjeAl1kc6/niZ9TWCemjBLqI -hPoFe49zr49DyQjC2ZfsXVJvFCr6g7o4q4DtQ6ltyBuTJbkn1hI+aB8zgvpofG44 -mKj18Y7tPvgXtRua4SaeBq777+22AOvKxPied9p4PTrMN4RKTP6+yIbLflej7dBD -zQDjfmmYsH0T2ZRtBpE1dYrUbU3tkizcMZRJBgreoxoff+r5coibMIm/7gh+YoSb -BCItCaeuGSKQ8CJb8DElcPUd6nKUjmeiQL68ztsG/+CXLiL/TZb914VaaCXvPInw -49jJ7w== ------END CERTIFICATE----- diff --git a/vendor/gems/kubeclient/test/config/execauth.kubeconfig b/vendor/gems/kubeclient/test/config/execauth.kubeconfig deleted file mode 100644 index c9a9773fe5e..00000000000 --- a/vendor/gems/kubeclient/test/config/execauth.kubeconfig +++ /dev/null @@ -1,61 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - server: https://localhost:6443 - name: localhost:6443 -contexts: -- context: - cluster: localhost:6443 - namespace: default - user: system:admin:exec-search-path - name: localhost/system:admin:exec-search-path -- context: - cluster: localhost:6443 - namespace: default - user: system:admin:exec-relative-path - name: localhost/system:admin:exec-relative-path -- context: - cluster: localhost:6443 - namespace: default - user: system:admin:exec-absolute-path - name: localhost/system:admin:exec-absolute-path -kind: Config -preferences: {} -users: -- name: system:admin:exec-search-path - user: - exec: - # Command to execute. Required. - command: "example-exec-plugin" - - # API version to use when decoding the ExecCredentials resource. Required. - # - # The API version returned by the plugin MUST match the version listed here. - # - # To integrate with tools that support multiple versions (such as client.authentication.k8s.io/v1alpha1), - # set an environment variable or pass an argument to the tool that indicates which version the exec plugin expects. - apiVersion: "client.authentication.k8s.io/v1beta1" - - # Environment variables to set when executing the plugin. Optional. - env: - - name: "FOO" - value: "bar" - - # Arguments to pass when executing the plugin. Optional. - args: - - "arg1" - - "arg2" - -- name: system:admin:exec-relative-path - user: - exec: - # Command to execute. Required. - command: "dir/example-exec-plugin" - apiVersion: "client.authentication.k8s.io/v1beta1" - -- name: system:admin:exec-absolute-path - user: - exec: - # Command to execute. Required. - command: "/abs/path/example-exec-plugin" - apiVersion: "client.authentication.k8s.io/v1beta1" diff --git a/vendor/gems/kubeclient/test/config/external-ca.pem b/vendor/gems/kubeclient/test/config/external-ca.pem deleted file mode 100644 index f1c8a8b615d..00000000000 --- a/vendor/gems/kubeclient/test/config/external-ca.pem +++ /dev/null @@ -1,19 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIC/zCCAeegAwIBAgITPbfpy29aBG67ChRdB6lJegTkmDANBgkqhkiG9w0BAQsF -ADAYMRYwFAYDVQQDEw1rdWJlcm5ldGVzLWNhMB4XDTIyMDIyMTA5MDIwMFoXDTMy -MDIxOTA5MDIwMFowGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTCCASIwDQYJKoZI -hvcNAQEBBQADggEPADCCAQoCggEBAMLjZ2cFBalzoimaEcpT9Jz2JmdgsHMOagVd -It7OQpTwDZ3npIICVpguEh9xtovR8m8/HYM+/a4vMQHT+3p8HPjiDaRYGg7OZ9L+ -Fp/9zhBuiaIvg8Z+Bbys9Q9Uuj6VEwfFJBcNH6TmzdiDgQUs5/k+6/vtuJ4ys3sD -KkAOxqPXDaBoANnLpIxdIMQDcWSLFA0wmFhdZJq3KEAoJpEL0WYo1ZRBV3iH77yf -sDbN1OBu2vNnRZ+DrV0ZJ5ApmbFXPX8i4KJaW9lCB62FN0j5XsNDoyTeAVpesfNs -zYufVpBdqNZFkOKg9diMuTMika2aYfDuiVzdebDgcp9aMloKtbECAwEAAaNCMEAw -DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFBdOiygC -LcuJrq8rNa1xADr5Sp7CMA0GCSqGSIb3DQEBCwUAA4IBAQDCy4IlhASh6Br5XEcI -TpP5ThD1OyRzQnsPe6P1qgWP3kBXK/AcsSl+VGtaZp2oEhJoUnsz7kE8yW3gK+PA -51zY4aHTiF9xkyd5zOCAGB+cfp9Ys+szWzyu0QQ9IBjJ4+eDjg7W0/S+BM2Qn1iL -jTFIe2Bdf+Q/J24/q3ksTXK17UNun14vDRsJgsNcrFt/rumfHPx1ytwsiqKyEKV7 -kFxSwa3d8/AvhGgFpPmfRjU7gAJCFcHz501zhi2a6L5TYBTecVRbqZoeHiZ0YNWI -is5g4VmVB+BxMAM2WEd29v4l/3oI1Pey9rvt7NJqSe1im9uqZgVDeg/vP8zKs/dF -ZYw8 ------END CERTIFICATE----- diff --git a/vendor/gems/kubeclient/test/config/external-cert.pem b/vendor/gems/kubeclient/test/config/external-cert.pem deleted file mode 100644 index 6c8b5232d7a..00000000000 --- a/vendor/gems/kubeclient/test/config/external-cert.pem +++ /dev/null @@ -1,20 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIDWTCCAkGgAwIBAgIUKO1eRmXmCc+vvM+LoByZE0IMGD8wDQYJKoZIhvcNAQEL -BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAyMjEwOTAyMDBaFw0y -MzAyMjEwOTAyMDBaMDQxFzAVBgNVBAoTDnN5c3RlbTptYXN0ZXJzMRkwFwYDVQQD -ExBrdWJlcm5ldGVzLWFkbWluMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC -AQEAwhw1zJaAYW0kIcn5mWyXNm7IYDa+QMzH3HVZrgwYycCZZP90bYJj4TF+++3n -PMZ2uMfZEXcmNpGXCIqzNYJQzvT+a1zCMuUT9+v1g343/VaYpxRzGueCVF+pvB/g -jI0U4l1YmJIEk5XcDM9xE+hoUkwqVahMmrvsq8hynYjzWEtl0mJ+TO89/1ZjwAuQ -t4ohNO1pQu3r4HCu3HGbFSTPJ6E4oxRgdMqHlqswpG0+ZLRXVkogUbtlIULtctoU -T67fhsThRCYu2AAin+L20gr3Tcp4UtMWtTcZ66vlL2Ep6TkWiutb04L/Bo46VfxO -sKBCdN1jysOeTPgTWKh088vM0wIDAQABo38wfTAOBgNVHQ8BAf8EBAMCBaAwHQYD -VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O -BBYEFJ675z7GCIuJcbGxJ7bLI3JAL3BeMB8GA1UdIwQYMBaAFBdOiygCLcuJrq8r -Na1xADr5Sp7CMA0GCSqGSIb3DQEBCwUAA4IBAQCXGCheo+VUxlFRPEXRSpw480lb -2mvdzB4O/rOIG2H9vzgjhxbdCJNVedkGzmHZ75eEHzv1EkInebSGLFz5/P3BQUXw -xyu84jNJer9Re2gemV0t2mwzHWCfQGLKG4AJi7M+cxZ49XhumZRVkw7iORF+qYOj -hSloB/4kfyq3UaprKCvhqjEsKJqDndwlOwKLVMic3lQDLLXoKa5Tiv6ihBiCVWAI -XUy5l2doDvZhzgEjLeQ0CGHb59vCvdotTc0b7HJ4Zw21ALz2CF7xkwXjP5uUIq56 -6PmQ+gpHXklbNJIODtkf/9I4rMlHUzeK5DVYY5kdxJTzh2nx4R0icFx1jnc0 ------END CERTIFICATE----- diff --git a/vendor/gems/kubeclient/test/config/external-key.rsa b/vendor/gems/kubeclient/test/config/external-key.rsa deleted file mode 100644 index c79c1f2c310..00000000000 --- a/vendor/gems/kubeclient/test/config/external-key.rsa +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIEpQIBAAKCAQEAwhw1zJaAYW0kIcn5mWyXNm7IYDa+QMzH3HVZrgwYycCZZP90 -bYJj4TF+++3nPMZ2uMfZEXcmNpGXCIqzNYJQzvT+a1zCMuUT9+v1g343/VaYpxRz -GueCVF+pvB/gjI0U4l1YmJIEk5XcDM9xE+hoUkwqVahMmrvsq8hynYjzWEtl0mJ+ -TO89/1ZjwAuQt4ohNO1pQu3r4HCu3HGbFSTPJ6E4oxRgdMqHlqswpG0+ZLRXVkog -UbtlIULtctoUT67fhsThRCYu2AAin+L20gr3Tcp4UtMWtTcZ66vlL2Ep6TkWiutb -04L/Bo46VfxOsKBCdN1jysOeTPgTWKh088vM0wIDAQABAoIBAQDBXGCrQHD6nEIV -9qDRGL841fp8/Ytf+Z5OGggPvLUkpNspJN/SBsWAGlIom8BxZjH1t/6fy1Uhnr4Z -IDGM6BefUaXvRSOel1vg6AhVyHH1x0GhjllrP5sweWsXn5mL6S4YoGwU77/nVK0z -haFa93SUJpM1aMWGjhUgujiSfU4LcLDRVKDERO48XP8FiCA6PB2IJXP0S9BaMVKQ -HARCWNGX5ziNao1roIvPQNEMDTtnWbb4z4SvRmpcF60E/f4Jp06SH00QNeTv7n57 -DzSXYdcqlfLR9QSTdVktSOxQ8cHalTcy5sU2xyFwc1S9aZZ8nzRpbFu1VYFCIVcf -E4QVv1UBAoGBAMWg4nZTHiGthf6KyzOGkh1r2kBSmVy9BcYjB8TbzQbrNUy7YAlT -i7eOnF+uTKcaVc5vnUrV0l7zD3WSWu1ARb9K6ZpVL5wjYNmm/zurR+mJc8LKl7d6 -54z1c111T5iivM1bYRnU0OujHDoX5ZD5WGsxMKaHtLaGWX/gK49hPbfzAoGBAPtx -TWQHiOq/uVsk0QnYkKZEwezfdC2daVJoAyDAV5gcU4NsN62UKfgTraD+ChmyJ5R7 -jOSL8bUX33QQEvmK9WYXMVBwz28HrZypuByQEEc8e9yy4YQ+RYZ1L2kmGdaeZ8Mz -iDffLrXby7NZp4xcfMZWYmLwdGESYo8jzuci1K+hAoGBAJDIzkBbom6P3uPdsQLd -qvxNAIcxPFP501oWXeG2Gh3ggZrmh3QtteVTYHKkklm17Hkhwj2KKuYO8htzjpPU -C4Uaj8vWbtvX+2NZehGv6S5J2foyTDZKn4rgY5VrlVXAm8tjD99Jz4liZRKWYUP1 -uPZHAlpuf1FdWgJaK++OERZLAoGAKJd9+uwMenlBHymuZXyEvZLUC713L/X9jsQj -3SGwAmpwQQMzad5FeDsVCKx6TPOp2BqqACtndejIth/yMD7ypuyPlYDgu/ftWyE7 -C8FmH1nwVQy7w3GaH77DTKJOAYvJDIZBM2PgUpONKwMKPWqg6hQABiDzaMhjCOCr -Aj1pQIECgYEAl6LvgpYzzyTU8mFaXk5+AuZTpuvVs5sNTE0BgrQbA7HZ/HcOxKid -bLOSWbW3ZgNZWLW8SauiTD+x/ifTdzQBGBvNhaIjIF6ymtYpO3ZX+60my/XTfbFQ -+uBwP7nqMIRsnB53FW4KuVqic05DlgoEby5c5y9OB9rYD3RrSOMDlas= ------END RSA PRIVATE KEY----- diff --git a/vendor/gems/kubeclient/test/config/external-without-ca.kubeconfig b/vendor/gems/kubeclient/test/config/external-without-ca.kubeconfig deleted file mode 100644 index 1f3d617a40d..00000000000 --- a/vendor/gems/kubeclient/test/config/external-without-ca.kubeconfig +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - # Not defining custom `certificate-authority`. - # Without it, the localhost cert should be rejected. - server: https://localhost:6443 - name: local -contexts: -- context: - cluster: local - namespace: default - user: user - name: Default -current-context: Default -kind: Config -preferences: {} -users: -- name: user - user: - client-certificate: external-cert.pem - client-key: external-key.rsa diff --git a/vendor/gems/kubeclient/test/config/external.kubeconfig b/vendor/gems/kubeclient/test/config/external.kubeconfig deleted file mode 100644 index ef2dca61348..00000000000 --- a/vendor/gems/kubeclient/test/config/external.kubeconfig +++ /dev/null @@ -1,20 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - certificate-authority: external-ca.pem - server: https://localhost:6443 - name: local -contexts: -- context: - cluster: local - namespace: default - user: user - name: Default -current-context: Default -kind: Config -preferences: {} -users: -- name: user - user: - client-certificate: external-cert.pem - client-key: external-key.rsa diff --git a/vendor/gems/kubeclient/test/config/gcpauth.kubeconfig b/vendor/gems/kubeclient/test/config/gcpauth.kubeconfig deleted file mode 100644 index 0ee387ebb16..00000000000 --- a/vendor/gems/kubeclient/test/config/gcpauth.kubeconfig +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - server: https://localhost:8443 - name: localhost:8443 -contexts: -- context: - cluster: localhost:8443 - namespace: default - user: application-default-credentials - name: localhost/application-default-credentials -kind: Config -preferences: {} -users: -- name: application-default-credentials - user: - auth-provider: - config: - access-token: <fake_token> - expiry: 2019-02-19T11:07:29.827352-05:00 - name: gcp diff --git a/vendor/gems/kubeclient/test/config/gcpcmdauth.kubeconfig b/vendor/gems/kubeclient/test/config/gcpcmdauth.kubeconfig deleted file mode 100644 index 2e2db395834..00000000000 --- a/vendor/gems/kubeclient/test/config/gcpcmdauth.kubeconfig +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - server: https://localhost:8443 - name: localhost:8443 -contexts: -- context: - cluster: localhost:8443 - namespace: default - user: application-default-credentials - name: localhost/application-default-credentials -kind: Config -preferences: {} -users: -- name: application-default-credentials - user: - auth-provider: - config: - access-token: <fake_token> - cmd-args: config config-helper --format=json - cmd-path: /path/to/gcloud - expiry: 2019-04-09T19:26:18Z - expiry-key: '{.credential.token_expiry}' - token-key: '{.credential.access_token}' - name: gcp diff --git a/vendor/gems/kubeclient/test/config/insecure-custom-ca.kubeconfig b/vendor/gems/kubeclient/test/config/insecure-custom-ca.kubeconfig deleted file mode 100644 index 06c803c16bf..00000000000 --- a/vendor/gems/kubeclient/test/config/insecure-custom-ca.kubeconfig +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - # This is a silly configuration, skip-tls-verify makes CA data useless, but testing for completeness. - certificate-authority: external-ca.pem - server: https://localhost:6443 - insecure-skip-tls-verify: true - name: local -contexts: -- context: - cluster: local - namespace: default - user: user - name: Default -current-context: Default -kind: Config -preferences: {} -users: -- name: user - user: - client-certificate: external-cert.pem - client-key: external-key.rsa diff --git a/vendor/gems/kubeclient/test/config/insecure.kubeconfig b/vendor/gems/kubeclient/test/config/insecure.kubeconfig deleted file mode 100644 index d7c28087a92..00000000000 --- a/vendor/gems/kubeclient/test/config/insecure.kubeconfig +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - server: https://localhost:6443 - insecure-skip-tls-verify: true - name: local -contexts: -- context: - cluster: local - namespace: default - user: user - name: Default -current-context: Default -kind: Config -preferences: {} -users: -- name: user - user: - # Providing ANY credentials in `insecure-skip-tls-verify` mode is unwise due to MITM risk. - # At least client certs are not as catastrophic as bearer tokens. - # - # This combination of insecure + client certs was once broken in kubernetes but - # is meaningful since 2015 (https://github.com/kubernetes/kubernetes/pull/15430). - client-certificate: external-cert.pem - client-key: external-key.rsa diff --git a/vendor/gems/kubeclient/test/config/nouser.kubeconfig b/vendor/gems/kubeclient/test/config/nouser.kubeconfig deleted file mode 100644 index 9289895cc81..00000000000 --- a/vendor/gems/kubeclient/test/config/nouser.kubeconfig +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - server: https://localhost:6443 - name: localhost:6443 -contexts: -- context: - cluster: localhost:6443 - namespace: default - user: "" - name: default/localhost:6443/nouser -current-context: default/localhost:6443/nouser -kind: Config -preferences: {} -users: [] diff --git a/vendor/gems/kubeclient/test/config/oidcauth.kubeconfig b/vendor/gems/kubeclient/test/config/oidcauth.kubeconfig deleted file mode 100644 index e1f389da46f..00000000000 --- a/vendor/gems/kubeclient/test/config/oidcauth.kubeconfig +++ /dev/null @@ -1,24 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - server: https://localhost:8443 - name: localhost:8443 -contexts: -- context: - cluster: localhost:8443 - namespace: default - user: oidc-auth-provider - name: localhost/oidc-auth-provider -kind: Config -preferences: {} -users: -- name: oidc-auth-provider - user: - auth-provider: - config: - client-id: fake-client-id - client-secret: fake-client-secret - id-token: fake-id-token - idp-issuer-url: https://accounts.google.com - refresh-token: fake-refresh-token - name: oidc diff --git a/vendor/gems/kubeclient/test/config/secure-without-ca.kubeconfig b/vendor/gems/kubeclient/test/config/secure-without-ca.kubeconfig deleted file mode 100644 index 1b1acefe905..00000000000 --- a/vendor/gems/kubeclient/test/config/secure-without-ca.kubeconfig +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - # Not defining custom `certificate-authority`. - # Without it, the localhost cert should be rejected. - server: https://localhost:6443 - insecure-skip-tls-verify: false # Same as external-without-ca.kubeconfig but with explicit false here. - name: local -contexts: -- context: - cluster: local - namespace: default - user: user - name: Default -current-context: Default -kind: Config -preferences: {} -users: -- name: user - user: - client-certificate: external-cert.pem - client-key: external-key.rsa diff --git a/vendor/gems/kubeclient/test/config/secure.kubeconfig b/vendor/gems/kubeclient/test/config/secure.kubeconfig deleted file mode 100644 index b0a00bb8d0d..00000000000 --- a/vendor/gems/kubeclient/test/config/secure.kubeconfig +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - certificate-authority: external-ca.pem - server: https://localhost:6443 - insecure-skip-tls-verify: false # Same as external.kubeconfig but with explicit false here. - name: local -contexts: -- context: - cluster: local - namespace: default - user: user - name: Default -current-context: Default -kind: Config -preferences: {} -users: -- name: user - user: - client-certificate: external-cert.pem - client-key: external-key.rsa diff --git a/vendor/gems/kubeclient/test/config/timestamps.kubeconfig b/vendor/gems/kubeclient/test/config/timestamps.kubeconfig deleted file mode 100644 index 7b718da21e9..00000000000 --- a/vendor/gems/kubeclient/test/config/timestamps.kubeconfig +++ /dev/null @@ -1,25 +0,0 @@ -apiVersion: v1 -users: -- name: gke_username - user: - auth-provider: - config: - access-token: REDACTED - cmd-args: config config-helper --format=json - cmd-path: /Users/tannerbruce/opt/google-cloud-sdk/bin/gcloud - expiry: 2018-07-07T18:25:36Z - expiry-key: '{.credential.token_expiry}' - token-key: '{.credential.access_token}' - name: gcp - -# More syntaxes from go-yaml tests, hopefully covering all types possible in kubeconfig -IPv4: 1.2.3.4 -Duration: 3s -date_only: 2015-01-01 -rfc3339: 2015-02-24T18:19:39Z -longer: 2015-02-24T18:19:39.123456789-03:00 -shorter: 2015-2-3T3:4:5Z -iso_lower_t: 2015-02-24t18:19:39Z -space_no_tz: 2015-02-24 18:19:39 -space_tz: 2001-12-14 21:59:43.10 -5 -timestamp_like_string: "2015-02-24T18:19:39Z" diff --git a/vendor/gems/kubeclient/test/config/update_certs_k0s.rb b/vendor/gems/kubeclient/test/config/update_certs_k0s.rb deleted file mode 100755 index 2632d72685c..00000000000 --- a/vendor/gems/kubeclient/test/config/update_certs_k0s.rb +++ /dev/null @@ -1,53 +0,0 @@ -#!/usr/bin/env ruby -# https://docs.k0sproject.io/latest/k0s-in-docker/ -# Runs in --prividged mode, only run this if you trust the k0s distribution. - -require 'English' - -# Like Kernel#system, returns true iff exit status == 0 -def sh?(*cmd) - puts("+ #{cmd.join(' ')}") - system(*cmd) -end - -# Raises if exit status != 0 -def sh!(*cmd) - sh?(*cmd) || raise("returned #{$CHILD_STATUS}") -end - -# allow DOCKER='sudo docker', DOCKER=podman etc. -DOCKER = ENV['DOCKER'] || 'docker' - -CONTAINER = 'k0s'.freeze - -sh! "#{DOCKER} container inspect #{CONTAINER} --format='exists' || - #{DOCKER} run -d --name #{CONTAINER} --hostname k0s --privileged -v /var/lib/k0s -p 6443:6443 \ - ghcr.io/k0sproject/k0s/k0s:v1.23.3-k0s.1" - -# sh! "#{DOCKER} exec #{CONTAINER} kubectl config view --raw" -# is another way to dump kubeconfig but succeeds with dummy output even before admin.conf exists; -# so accessing the file is better way as it lets us poll until ready: -sleep(1) until sh?("#{DOCKER} exec #{CONTAINER} ls -l /var/lib/k0s/pki/admin.conf") - -sh! "#{DOCKER} exec #{CONTAINER} cat /var/lib/k0s/pki/admin.conf > test/config/allinone.kubeconfig" -# The rest could easily be extracted from allinone.kubeconfig, but the test is more robust -# if we don't reuse YAML and/or Kubeclient::Config parsing to construct test data. -sh! "#{DOCKER} exec #{CONTAINER} cat /var/lib/k0s/pki/ca.crt > test/config/external-ca.pem" -sh! 'cat test/config/another-ca1.pem test/config/external-ca.pem '\ - ' test/config/another-ca2.pem > test/config/concatenated-ca.pem' -sh! "#{DOCKER} exec #{CONTAINER} cat /var/lib/k0s/pki/admin.crt > test/config/external-cert.pem" -sh! "#{DOCKER} exec #{CONTAINER} cat /var/lib/k0s/pki/admin.key > test/config/external-key.rsa" - -# Wait for apiserver to be up. To speed startup, this only retries connection errors; -# without `--fail-with-body` curl still returns 0 for well-formed 4xx or 5xx responses. -sleep(1) until sh?( - 'curl --cacert test/config/external-ca.pem ' \ - '--key test/config/external-key.rsa ' \ - '--cert test/config/external-cert.pem https://127.0.0.1:6443/healthz' -) - -sh! 'env KUBECLIENT_TEST_REAL_CLUSTER=true bundle exec rake test' - -sh! "#{DOCKER} rm -f #{CONTAINER}" - -puts 'If you run this only for tests, cleanup by running: git restore test/config/' diff --git a/vendor/gems/kubeclient/test/config/userauth.kubeconfig b/vendor/gems/kubeclient/test/config/userauth.kubeconfig deleted file mode 100644 index 604e3bda920..00000000000 --- a/vendor/gems/kubeclient/test/config/userauth.kubeconfig +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: v1 -clusters: -- cluster: - server: https://localhost:6443 - name: localhost:6443 -contexts: -- context: - cluster: localhost:6443 - namespace: default - user: system:admin:token - name: localhost/system:admin:token -- context: - cluster: localhost:6443 - namespace: default - user: system:admin:userpass - name: localhost/system:admin:userpass -current-context: localhost/system:admin:token -kind: Config -preferences: {} -users: -- name: system:admin:token - user: - token: 0123456789ABCDEF0123456789ABCDEF -- name: system:admin:userpass - user: - username: admin - password: pAssw0rd123 diff --git a/vendor/gems/kubeclient/test/json/bindings_list.json b/vendor/gems/kubeclient/test/json/bindings_list.json deleted file mode 100644 index 260748c3aa4..00000000000 --- a/vendor/gems/kubeclient/test/json/bindings_list.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "the server could not find the requested resource", - "reason": "NotFound", - "details": {}, - "code": 404 -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/component_status.json b/vendor/gems/kubeclient/test/json/component_status.json deleted file mode 100644 index 109936d3dac..00000000000 --- a/vendor/gems/kubeclient/test/json/component_status.json +++ /dev/null @@ -1,17 +0,0 @@ -{ - "kind": "ComponentStatus", - "apiVersion": "v1", - "metadata": { - "name": "etcd-0", - "selfLink": "/api/v1/namespaces/componentstatuses/etcd-0", - "creationTimestamp": null - }, - "conditions": [ - { - "type": "Healthy", - "status": "True", - "message": "{\"health\": \"true\"}", - "error": "nil" - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/component_status_list.json b/vendor/gems/kubeclient/test/json/component_status_list.json deleted file mode 100644 index 1849f489eb2..00000000000 --- a/vendor/gems/kubeclient/test/json/component_status_list.json +++ /dev/null @@ -1,52 +0,0 @@ -{ - "kind": "ComponentStatusList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/componentstatuses" - }, - "items": [ - { - "metadata": { - "name": "controller-manager", - "selfLink": "/api/v1/namespaces/componentstatuses/controller-manager", - "creationTimestamp": null - }, - "conditions": [ - { - "type": "Healthy", - "status": "Unknown", - "error": "Get http://127.0.0.1:10252/healthz: dial tcp 127.0.0.1:10252: connection refused" - } - ] - }, - { - "metadata": { - "name": "scheduler", - "selfLink": "/api/v1/namespaces/componentstatuses/scheduler", - "creationTimestamp": null - }, - "conditions": [ - { - "type": "Healthy", - "status": "Unknown", - "error": "Get http://127.0.0.1:10251/healthz: dial tcp 127.0.0.1:10251: connection refused" - } - ] - }, - { - "metadata": { - "name": "etcd-0", - "selfLink": "/api/v1/namespaces/componentstatuses/etcd-0", - "creationTimestamp": null - }, - "conditions": [ - { - "type": "Healthy", - "status": "True", - "message": "{\"health\": \"true\"}", - "error": "nil" - } - ] - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/config.istio.io_api_resource_list.json b/vendor/gems/kubeclient/test/json/config.istio.io_api_resource_list.json deleted file mode 100644 index 5317e865b63..00000000000 --- a/vendor/gems/kubeclient/test/json/config.istio.io_api_resource_list.json +++ /dev/null @@ -1,679 +0,0 @@ -{ - "kind": "APIResourceList", - "apiVersion": "v1", - "groupVersion": "config.istio.io/v1alpha2", - "resources": [ - { - "name": "metrics", - "singularName": "metric", - "namespaced": true, - "kind": "metric", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "servicecontrolreports", - "singularName": "servicecontrolreport", - "namespaced": true, - "kind": "servicecontrolreport", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "opas", - "singularName": "opa", - "namespaced": true, - "kind": "opa", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "redisquotas", - "singularName": "redisquota", - "namespaced": true, - "kind": "redisquota", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "authorizations", - "singularName": "authorization", - "namespaced": true, - "kind": "authorization", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "listentries", - "singularName": "listentry", - "namespaced": true, - "kind": "listentry", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "logentries", - "singularName": "logentry", - "namespaced": true, - "kind": "logentry", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "tracespans", - "singularName": "tracespan", - "namespaced": true, - "kind": "tracespan", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "quotaspecs", - "singularName": "quotaspec", - "namespaced": true, - "kind": "QuotaSpec", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "fluentds", - "singularName": "fluentd", - "namespaced": true, - "kind": "fluentd", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "rbacs", - "singularName": "rbac", - "namespaced": true, - "kind": "rbac", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "checknothings", - "singularName": "checknothing", - "namespaced": true, - "kind": "checknothing", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "edges", - "singularName": "edge", - "namespaced": true, - "kind": "edge", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "apikeys", - "singularName": "apikey", - "namespaced": true, - "kind": "apikey", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "kuberneteses", - "singularName": "kubernetes", - "namespaced": true, - "kind": "kubernetes", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "httpapispecs", - "singularName": "httpapispec", - "namespaced": true, - "kind": "HTTPAPISpec", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "attributemanifests", - "singularName": "attributemanifest", - "namespaced": true, - "kind": "attributemanifest", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "kubernetesenvs", - "singularName": "kubernetesenv", - "namespaced": true, - "kind": "kubernetesenv", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "listcheckers", - "singularName": "listchecker", - "namespaced": true, - "kind": "listchecker", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "quotas", - "singularName": "quota", - "namespaced": true, - "kind": "quota", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "instances", - "singularName": "instance", - "namespaced": true, - "kind": "instance", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "memquotas", - "singularName": "memquota", - "namespaced": true, - "kind": "memquota", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "noops", - "singularName": "noop", - "namespaced": true, - "kind": "noop", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "prometheuses", - "singularName": "prometheus", - "namespaced": true, - "kind": "prometheus", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "solarwindses", - "singularName": "solarwinds", - "namespaced": true, - "kind": "solarwinds", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "cloudwatches", - "singularName": "cloudwatch", - "namespaced": true, - "kind": "cloudwatch", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "reportnothings", - "singularName": "reportnothing", - "namespaced": true, - "kind": "reportnothing", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "stackdrivers", - "singularName": "stackdriver", - "namespaced": true, - "kind": "stackdriver", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "statsds", - "singularName": "statsd", - "namespaced": true, - "kind": "statsd", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "httpapispecbindings", - "singularName": "httpapispecbinding", - "namespaced": true, - "kind": "HTTPAPISpecBinding", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "quotaspecbindings", - "singularName": "quotaspecbinding", - "namespaced": true, - "kind": "QuotaSpecBinding", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "bypasses", - "singularName": "bypass", - "namespaced": true, - "kind": "bypass", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "circonuses", - "singularName": "circonus", - "namespaced": true, - "kind": "circonus", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "deniers", - "singularName": "denier", - "namespaced": true, - "kind": "denier", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "signalfxs", - "singularName": "signalfx", - "namespaced": true, - "kind": "signalfx", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "adapters", - "singularName": "adapter", - "namespaced": true, - "kind": "adapter", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "servicecontrols", - "singularName": "servicecontrol", - "namespaced": true, - "kind": "servicecontrol", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "templates", - "singularName": "template", - "namespaced": true, - "kind": "template", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "handlers", - "singularName": "handler", - "namespaced": true, - "kind": "handler", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "rules", - "singularName": "rule", - "namespaced": true, - "kind": "rule", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "dogstatsds", - "singularName": "dogstatsd", - "namespaced": true, - "kind": "dogstatsd", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - }, - { - "name": "stdios", - "singularName": "stdio", - "namespaced": true, - "kind": "stdio", - "verbs": [ - "delete", - "deletecollection", - "get", - "list", - "patch", - "create", - "update", - "watch" - ] - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/config_map_list.json b/vendor/gems/kubeclient/test/json/config_map_list.json deleted file mode 100644 index 85e0e30d7fe..00000000000 --- a/vendor/gems/kubeclient/test/json/config_map_list.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "kind": "ConfigMapList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/configmaps", - "resourceVersion": "665" - }, - "items": [] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/core_api_resource_list.json b/vendor/gems/kubeclient/test/json/core_api_resource_list.json deleted file mode 100644 index 395acb249df..00000000000 --- a/vendor/gems/kubeclient/test/json/core_api_resource_list.json +++ /dev/null @@ -1,181 +0,0 @@ -{ - "kind": "APIResourceList", - "groupVersion": "v1", - "resources": [ - { - "name": "bindings", - "namespaced": true, - "kind": "Binding" - }, - { - "name": "componentstatuses", - "namespaced": false, - "kind": "ComponentStatus" - }, - { - "name": "configmaps", - "namespaced": true, - "kind": "ConfigMap" - }, - { - "name": "endpoints", - "namespaced": true, - "kind": "Endpoints" - }, - { - "name": "events", - "namespaced": true, - "kind": "Event" - }, - { - "name": "limitranges", - "namespaced": true, - "kind": "LimitRange" - }, - { - "name": "namespaces", - "namespaced": false, - "kind": "Namespace" - }, - { - "name": "namespaces/finalize", - "namespaced": false, - "kind": "Namespace" - }, - { - "name": "namespaces/status", - "namespaced": false, - "kind": "Namespace" - }, - { - "name": "nodes", - "namespaced": false, - "kind": "Node" - }, - { - "name": "nodes/proxy", - "namespaced": false, - "kind": "Node" - }, - { - "name": "nodes/status", - "namespaced": false, - "kind": "Node" - }, - { - "name": "persistentvolumeclaims", - "namespaced": true, - "kind": "PersistentVolumeClaim" - }, - { - "name": "persistentvolumeclaims/status", - "namespaced": true, - "kind": "PersistentVolumeClaim" - }, - { - "name": "persistentvolumes", - "namespaced": false, - "kind": "PersistentVolume" - }, - { - "name": "persistentvolumes/status", - "namespaced": false, - "kind": "PersistentVolume" - }, - { - "name": "pods", - "namespaced": true, - "kind": "Pod" - }, - { - "name": "pods/attach", - "namespaced": true, - "kind": "Pod" - }, - { - "name": "pods/binding", - "namespaced": true, - "kind": "Binding" - }, - { - "name": "pods/exec", - "namespaced": true, - "kind": "Pod" - }, - { - "name": "pods/log", - "namespaced": true, - "kind": "Pod" - }, - { - "name": "pods/portforward", - "namespaced": true, - "kind": "Pod" - }, - { - "name": "pods/proxy", - "namespaced": true, - "kind": "Pod" - }, - { - "name": "pods/status", - "namespaced": true, - "kind": "Pod" - }, - { - "name": "podtemplates", - "namespaced": true, - "kind": "PodTemplate" - }, - { - "name": "replicationcontrollers", - "namespaced": true, - "kind": "ReplicationController" - }, - { - "name": "replicationcontrollers/scale", - "namespaced": true, - "kind": "Scale" - }, - { - "name": "replicationcontrollers/status", - "namespaced": true, - "kind": "ReplicationController" - }, - { - "name": "resourcequotas", - "namespaced": true, - "kind": "ResourceQuota" - }, - { - "name": "resourcequotas/status", - "namespaced": true, - "kind": "ResourceQuota" - }, - { - "name": "secrets", - "namespaced": true, - "kind": "Secret" - }, - { - "name": "serviceaccounts", - "namespaced": true, - "kind": "ServiceAccount" - }, - { - "name": "services", - "namespaced": true, - "kind": "Service" - }, - { - "name": "services/proxy", - "namespaced": true, - "kind": "Service" - }, - { - "name": "services/status", - "namespaced": true, - "kind": "Service" - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/core_api_resource_list_without_kind.json b/vendor/gems/kubeclient/test/json/core_api_resource_list_without_kind.json deleted file mode 100644 index f60e113d6e5..00000000000 --- a/vendor/gems/kubeclient/test/json/core_api_resource_list_without_kind.json +++ /dev/null @@ -1,129 +0,0 @@ -{ - "groupVersion": "v1", - "resources": [ - { - "name": "bindings", - "namespaced": true - }, - { - "name": "componentstatuses", - "namespaced": true - }, - { - "name": "endpoints", - "namespaced": true - }, - { - "name": "events", - "namespaced": true - }, - { - "name": "limitranges", - "namespaced": true - }, - { - "name": "namespaces", - "namespaced": false - }, - { - "name": "namespaces/finalize", - "namespaced": false - }, - { - "name": "namespaces/status", - "namespaced": false - }, - { - "name": "nodes", - "namespaced": false - }, - { - "name": "nodes/status", - "namespaced": false - }, - { - "name": "persistentvolumeclaims", - "namespaced": true - }, - { - "name": "persistentvolumeclaims/status", - "namespaced": true - }, - { - "name": "persistentvolumes", - "namespaced": false - }, - { - "name": "persistentvolumes/status", - "namespaced": false - }, - { - "name": "pods", - "namespaced": true - }, - { - "name": "pods/attach", - "namespaced": true - }, - { - "name": "pods/binding", - "namespaced": true - }, - { - "name": "pods/exec", - "namespaced": true - }, - { - "name": "pods/log", - "namespaced": true - }, - { - "name": "pods/portforward", - "namespaced": true - }, - { - "name": "pods/proxy", - "namespaced": true - }, - { - "name": "pods/status", - "namespaced": true - }, - { - "name": "podtemplates", - "namespaced": true - }, - { - "name": "replicationcontrollers", - "namespaced": true - }, - { - "name": "replicationcontrollers/status", - "namespaced": true - }, - { - "name": "resourcequotas", - "namespaced": true - }, - { - "name": "resourcequotas/status", - "namespaced": true - }, - { - "name": "secrets", - "namespaced": true - }, - { - "name": "securitycontextconstraints", - "namespaced": false - }, - { - "name": "serviceaccounts", - "namespaced": true - }, - { - "name": "services", - "namespaced": true - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/core_oapi_resource_list_without_kind.json b/vendor/gems/kubeclient/test/json/core_oapi_resource_list_without_kind.json deleted file mode 100644 index a902a6a7fd1..00000000000 --- a/vendor/gems/kubeclient/test/json/core_oapi_resource_list_without_kind.json +++ /dev/null @@ -1,197 +0,0 @@ -{ - "groupVersion": "v1", - "resources": [ - { - "name": "buildconfigs", - "namespaced": true - }, - { - "name": "buildconfigs/instantiate", - "namespaced": true - }, - { - "name": "buildconfigs/instantiatebinary", - "namespaced": true - }, - { - "name": "buildconfigs/webhooks", - "namespaced": true - }, - { - "name": "builds", - "namespaced": true - }, - { - "name": "builds/clone", - "namespaced": true - }, - { - "name": "builds/details", - "namespaced": true - }, - { - "name": "builds/log", - "namespaced": true - }, - { - "name": "clusternetworks", - "namespaced": false - }, - { - "name": "clusterpolicies", - "namespaced": false - }, - { - "name": "clusterpolicybindings", - "namespaced": false - }, - { - "name": "clusterrolebindings", - "namespaced": false - }, - { - "name": "clusterroles", - "namespaced": false - }, - { - "name": "deploymentconfigrollbacks", - "namespaced": true - }, - { - "name": "deploymentconfigs", - "namespaced": true - }, - { - "name": "deploymentconfigs/log", - "namespaced": true - }, - { - "name": "deploymentconfigs/scale", - "namespaced": true - }, - { - "name": "generatedeploymentconfigs", - "namespaced": true - }, - { - "name": "groups", - "namespaced": false - }, - { - "name": "hostsubnets", - "namespaced": false - }, - { - "name": "identities", - "namespaced": false - }, - { - "name": "images", - "namespaced": false - }, - { - "name": "imagestreamimages", - "namespaced": true - }, - { - "name": "imagestreammappings", - "namespaced": true - }, - { - "name": "imagestreams", - "namespaced": true - }, - { - "name": "imagestreams/status", - "namespaced": true - }, - { - "name": "imagestreamtags", - "namespaced": true - }, - { - "name": "localresourceaccessreviews", - "namespaced": true - }, - { - "name": "localsubjectaccessreviews", - "namespaced": true - }, - { - "name": "netnamespaces", - "namespaced": false - }, - { - "name": "oauthaccesstokens", - "namespaced": false - }, - { - "name": "oauthauthorizetokens", - "namespaced": false - }, - { - "name": "oauthclientauthorizations", - "namespaced": false - }, - { - "name": "oauthclients", - "namespaced": false - }, - { - "name": "policies", - "namespaced": true - }, - { - "name": "policybindings", - "namespaced": true - }, - { - "name": "processedtemplates", - "namespaced": true - }, - { - "name": "projectrequests", - "namespaced": false - }, - { - "name": "projects", - "namespaced": false - }, - { - "name": "resourceaccessreviews", - "namespaced": true - }, - { - "name": "rolebindings", - "namespaced": true - }, - { - "name": "roles", - "namespaced": true - }, - { - "name": "routes", - "namespaced": true - }, - { - "name": "routes/status", - "namespaced": true - }, - { - "name": "subjectaccessreviews", - "namespaced": true - }, - { - "name": "templates", - "namespaced": true - }, - { - "name": "useridentitymappings", - "namespaced": false - }, - { - "name": "users", - "namespaced": false - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/created_endpoint.json b/vendor/gems/kubeclient/test/json/created_endpoint.json deleted file mode 100644 index 1e0fd7dc41d..00000000000 --- a/vendor/gems/kubeclient/test/json/created_endpoint.json +++ /dev/null @@ -1,28 +0,0 @@ -{ - "kind": "Endpoints", - "apiVersion": "v1", - "metadata": { - "name": "myendpoint", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/endpoints/myendpoint", - "uid": "59d05b48-dadb-11e5-937e-18037327aaeb", - "resourceVersion": "393", - "creationTimestamp": "2016-02-24T09:45:34Z" - }, - "subsets": [ - { - "addresses": [ - { - "ip": "172.17.0.25" - } - ], - "ports": [ - { - "name": "https", - "port": 6443, - "protocol": "TCP" - } - ] - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/created_namespace.json b/vendor/gems/kubeclient/test/json/created_namespace.json deleted file mode 100644 index 218bc000aa8..00000000000 --- a/vendor/gems/kubeclient/test/json/created_namespace.json +++ /dev/null @@ -1,20 +0,0 @@ -{ -"kind": "Namespace", -"apiVersion": "v1", -"metadata": { -"name": "development", -"selfLink": "/api/v1/namespaces/development", -"uid": "13d820d6-df5b-11e4-bd42-f8b156af4ae1", -"resourceVersion": "2533", -"creationTimestamp": "2015-04-10T08:24:59Z" -}, -"spec": { -"finalizers": [ -"kubernetes" -] -}, -"status": { -"phase": "Active" -} -} - diff --git a/vendor/gems/kubeclient/test/json/created_secret.json b/vendor/gems/kubeclient/test/json/created_secret.json deleted file mode 100644 index bcea8848335..00000000000 --- a/vendor/gems/kubeclient/test/json/created_secret.json +++ /dev/null @@ -1,16 +0,0 @@ -{ - "kind": "Secret", - "apiVersion": "v1", - "metadata": { - "name": "test-secret", - "namespace": "dev", - "selfLink": "/api/v1/namespaces/dev/secrets/test-secret", - "uid": "4e38a198-2bcb-11e5-a483-0e840567604d", - "resourceVersion": "245569", - "creationTimestamp": "2015-07-16T14:59:49Z" - }, - "data": { - "super-secret": "Y2F0J3MgYXJlIGF3ZXNvbWUK" - }, - "type": "Opaque" -} diff --git a/vendor/gems/kubeclient/test/json/created_security_context_constraint.json b/vendor/gems/kubeclient/test/json/created_security_context_constraint.json deleted file mode 100644 index c2981712cb5..00000000000 --- a/vendor/gems/kubeclient/test/json/created_security_context_constraint.json +++ /dev/null @@ -1,65 +0,0 @@ -{ - "allowHostDirVolumePlugin": false, - "allowHostIPC": false, - "allowHostNetwork": false, - "allowHostPID": false, - "allowHostPorts": false, - "allowPrivilegedContainer": false, - "allowedCapabilities": null, - "allowedFlexVolumes": null, - "apiVersion": "security.openshift.io/v1", - "defaultAddCapabilities": null, - "fsGroup": { - "type": "RunAsAny" - }, - "groups": [], - "kind": "SecurityContextConstraints", - "metadata": { - "creationTimestamp": "2018-11-23T10:01:42Z", - "name": "teleportation", - "resourceVersion": "5274", - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/teleportation", - "uid": "c6e8e2ec-ef06-11e8-b4c0-68f728fac3ab" - }, - "priority": null, - "readOnlyRootFilesystem": false, - "requiredDropCapabilities": null, - "runAsUser": { - "type": "MustRunAs" - }, - "seLinuxContext": { - "type": "MustRunAs" - }, - "supplementalGroups": { - "type": "RunAsAny" - }, - "users": [], - "volumes": [ - "awsElasticBlockStore", - "azureDisk", - "azureFile", - "cephFS", - "cinder", - "configMap", - "downwardAPI", - "emptyDir", - "fc", - "flexVolume", - "flocker", - "gcePersistentDisk", - "gitRepo", - "glusterfs", - "iscsi", - "nfs", - "persistentVolumeClaim", - "photonPersistentDisk", - "portworxVolume", - "projected", - "quobyte", - "rbd", - "scaleIO", - "secret", - "storageOS", - "vsphere" - ] -} diff --git a/vendor/gems/kubeclient/test/json/created_service.json b/vendor/gems/kubeclient/test/json/created_service.json deleted file mode 100644 index 4c2bc7d7196..00000000000 --- a/vendor/gems/kubeclient/test/json/created_service.json +++ /dev/null @@ -1,31 +0,0 @@ -{ - "kind": "Service", - "apiVersion": "v1", - "metadata": { - "name": "guestbook", - "namespace": "staging", - "selfLink": "/api/v1/namespaces/staging/services/guestbook", - "uid": "29885239-df58-11e4-bd42-f8b156af4ae1", - "resourceVersion": "1908", - "creationTimestamp": "2015-04-10T08:04:07Z", - "labels": { - "name": "guestbook" - } - }, - "spec": { - "ports": [ - { - "name": "", - "protocol": "TCP", - "port": 3000, - "targetPort": "http-server" - } - ], - "selector": { - "name": "guestbook" - }, - "clusterIP": "10.0.0.99", - "sessionAffinity": "None" - }, - "status": {} -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/empty_pod_list.json b/vendor/gems/kubeclient/test/json/empty_pod_list.json deleted file mode 100644 index a82cba1148f..00000000000 --- a/vendor/gems/kubeclient/test/json/empty_pod_list.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "kind": "PodList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/pods", - "resourceVersion": "565" - }, - "items": [] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/endpoint_list.json b/vendor/gems/kubeclient/test/json/endpoint_list.json deleted file mode 100644 index bd6c00ab678..00000000000 --- a/vendor/gems/kubeclient/test/json/endpoint_list.json +++ /dev/null @@ -1,48 +0,0 @@ -{ - "kind": "EndpointsList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/namespaces/endpoints", - "resourceVersion": "39" - }, - "items": [ - { - "metadata": { - "name": "example", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/endpoints/example", - "uid": "db467530-b6aa-11e4-974a-525400c903c1", - "resourceVersion": "38", - "creationTimestamp": "2015-02-17T08:42:46-05:00" - }, - "endpoints": [ - "172.17.0.63:80", - "172.17.0.64:80" - ] - }, - { - "metadata": { - "name": "kubernetes", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/endpoints/kubernetes", - "resourceVersion": "8", - "creationTimestamp": null - }, - "endpoints": [ - "192.168.122.4:6443" - ] - }, - { - "metadata": { - "name": "kubernetes-ro", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/endpoints/kubernetes-ro", - "resourceVersion": "7", - "creationTimestamp": null - }, - "endpoints": [ - "192.168.122.4:7080" - ] - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/entity_list.json b/vendor/gems/kubeclient/test/json/entity_list.json deleted file mode 100644 index 3dd140d38c8..00000000000 --- a/vendor/gems/kubeclient/test/json/entity_list.json +++ /dev/null @@ -1,56 +0,0 @@ -{ - "kind": "ServiceList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/services", - "resourceVersion": "59" - }, - "items": [ - { - "metadata": { - "name": "kubernetes", - "namespace": "default", - "selfLink": "/api/v1/services/kubernetes?namespace=default", - "uid": "016e9dcd-ce39-11e4-ac24-3c970e4a436a", - "resourceVersion": "6", - "creationTimestamp": "2015-03-19T15:08:16+02:00", - "labels": { - "component": "apiserver", - "provider": "kubernetes" - } - }, - "spec": { - "port": 443, - "protocol": "TCP", - "selector": null, - "clusterIP": "10.0.0.2", - "containerPort": 0, - "sessionAffinity": "None" - }, - "status": {} - }, - { - "metadata": { - "name": "kubernetes-ro", - "namespace": "default", - "selfLink": "/api/v1/services/kubernetes-ro?namespace=default", - "uid": "015b78bf-ce39-11e4-ac24-3c970e4a436a", - "resourceVersion": "5", - "creationTimestamp": "2015-03-19T15:08:15+02:00", - "labels": { - "component": "apiserver", - "provider": "kubernetes" - } - }, - "spec": { - "port": 80, - "protocol": "TCP", - "selector": null, - "clusterIP": "10.0.0.1", - "containerPort": 0, - "sessionAffinity": "None" - }, - "status": {} - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/event_list.json b/vendor/gems/kubeclient/test/json/event_list.json deleted file mode 100644 index 45abfccc278..00000000000 --- a/vendor/gems/kubeclient/test/json/event_list.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "kind": "EventList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/events", - "resourceVersion": "152" - }, - "items": [ - { - "metadata": { - "name": "php.13c130f78da4641e", - "namespace": "default", - "selfLink": "/api/v1/events/php.13c130f78da4641e?namespace=default", - "uid": "f3a454d2-b03a-11e4-89e4-525400c903c1", - "resourceVersion": "178", - "creationTimestamp": "2015-02-09T04:06:37-05:00" - }, - "involvedObject": { - "kind": "BoundPod", - "namespace": "default", - "name": "php", - "uid": "64273d20-b03a-11e4-89e4-525400c903c1", - "apiVersion": "v1beta1", - "fieldPath": "spec.containers{nginx}" - }, - "reason": "created", - "message": "Created with docker id 9ba2a714411d2d0dd1e826b2fe5c3222b5cbfd9dd9133c841585cbb96b8c2c0f", - "source": { - "component": "kubelet", - "host": "127.0.0.1" - }, - "timestamp": "2015-02-09T04:06:37-05:00" - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/extensions_v1beta1_api_resource_list.json b/vendor/gems/kubeclient/test/json/extensions_v1beta1_api_resource_list.json deleted file mode 100644 index 16fc80cf4d7..00000000000 --- a/vendor/gems/kubeclient/test/json/extensions_v1beta1_api_resource_list.json +++ /dev/null @@ -1,217 +0,0 @@ -{ - "kind": "APIResourceList", - "groupVersion": "extensions/v1beta1", - "resources": [ - { - "name": "daemonsets", - "singularName": "", - "namespaced": true, - "kind": "DaemonSet", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ], - "shortNames": [ - "ds" - ] - }, - { - "name": "daemonsets/status", - "singularName": "", - "namespaced": true, - "kind": "DaemonSet", - "verbs": [ - "get", - "patch", - "update" - ] - }, - { - "name": "deployments", - "singularName": "", - "namespaced": true, - "kind": "Deployment", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ], - "shortNames": [ - "deploy" - ] - }, - { - "name": "deployments/rollback", - "singularName": "", - "namespaced": true, - "kind": "DeploymentRollback", - "verbs": [ - "create" - ] - }, - { - "name": "deployments/scale", - "singularName": "", - "namespaced": true, - "group": "extensions", - "version": "v1beta1", - "kind": "Scale", - "verbs": [ - "get", - "patch", - "update" - ] - }, - { - "name": "deployments/status", - "singularName": "", - "namespaced": true, - "kind": "Deployment", - "verbs": [ - "get", - "patch", - "update" - ] - }, - { - "name": "ingresses", - "singularName": "", - "namespaced": true, - "kind": "Ingress", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ], - "shortNames": [ - "ing" - ] - }, - { - "name": "ingresses/status", - "singularName": "", - "namespaced": true, - "kind": "Ingress", - "verbs": [ - "get", - "patch", - "update" - ] - }, - { - "name": "networkpolicies", - "singularName": "", - "namespaced": true, - "kind": "NetworkPolicy", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ], - "shortNames": [ - "netpol" - ] - }, - { - "name": "podsecuritypolicies", - "singularName": "", - "namespaced": false, - "kind": "PodSecurityPolicy", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ], - "shortNames": [ - "psp" - ] - }, - { - "name": "replicasets", - "singularName": "", - "namespaced": true, - "kind": "ReplicaSet", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ], - "shortNames": [ - "rs" - ] - }, - { - "name": "replicasets/scale", - "singularName": "", - "namespaced": true, - "group": "extensions", - "version": "v1beta1", - "kind": "Scale", - "verbs": [ - "get", - "patch", - "update" - ] - }, - { - "name": "replicasets/status", - "singularName": "", - "namespaced": true, - "kind": "ReplicaSet", - "verbs": [ - "get", - "patch", - "update" - ] - }, - { - "name": "replicationcontrollers", - "singularName": "", - "namespaced": true, - "kind": "ReplicationControllerDummy", - "verbs": [] - }, - { - "name": "replicationcontrollers/scale", - "singularName": "", - "namespaced": true, - "kind": "Scale", - "verbs": [ - "get", - "patch", - "update" - ] - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/limit_range.json b/vendor/gems/kubeclient/test/json/limit_range.json deleted file mode 100644 index ac2e21aa744..00000000000 --- a/vendor/gems/kubeclient/test/json/limit_range.json +++ /dev/null @@ -1,23 +0,0 @@ -{ - "kind": "LimitRange", - "apiVersion": "v1", - "metadata": { - "name": "limits", - "namespace": "quota-example", - "selfLink": "/api/v1/namespaces/quota-example/limitranges/limits", - "uid": "7a76a44c-3e9d-11e5-8214-0aaeec44370e", - "resourceVersion": "103384", - "creationTimestamp": "2015-08-09T13:49:39Z" - }, - "spec": { - "limits": [ - { - "type": "Container", - "default": { - "cpu": "100m", - "memory": "512Mi" - } - } - ] - } -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/limit_range_list.json b/vendor/gems/kubeclient/test/json/limit_range_list.json deleted file mode 100644 index 7986ec861d8..00000000000 --- a/vendor/gems/kubeclient/test/json/limit_range_list.json +++ /dev/null @@ -1,31 +0,0 @@ -{ - "kind": "LimitRangeList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/namespaces/quota-example/limitranges/", - "resourceVersion": "103421" - }, - "items": [ - { - "metadata": { - "name": "limits", - "namespace": "quota-example", - "selfLink": "/api/v1/namespaces/quota-example/limitranges/limits", - "uid": "7a76a44c-3e9d-11e5-8214-0aaeec44370e", - "resourceVersion": "103384", - "creationTimestamp": "2015-08-09T13:49:39Z" - }, - "spec": { - "limits": [ - { - "type": "Container", - "default": { - "cpu": "100m", - "memory": "512Mi" - } - } - ] - } - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/namespace.json b/vendor/gems/kubeclient/test/json/namespace.json deleted file mode 100644 index 5a856730188..00000000000 --- a/vendor/gems/kubeclient/test/json/namespace.json +++ /dev/null @@ -1,13 +0,0 @@ -{ - "kind": "Namespace", - "apiVersion": "v1", - "metadata": { - "name": "staging", - "selfLink": "/api/v1/namespaces/staging", - "uid": "e388bc10-c021-11e4-a514-3c970e4a436a", - "resourceVersion": "1168", - "creationTimestamp": "2015-03-01T16:47:31+02:00" - }, - "spec": {}, - "status": {} -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/namespace_exception.json b/vendor/gems/kubeclient/test/json/namespace_exception.json deleted file mode 100644 index 555ef24cabb..00000000000 --- a/vendor/gems/kubeclient/test/json/namespace_exception.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "kind": "Status", - "apiVersion": "v1", - "metadata": {}, - "status": "Failure", - "message": "converting to : type names don't match (Pod, Namespace)", - "code": 500 -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/namespace_list.json b/vendor/gems/kubeclient/test/json/namespace_list.json deleted file mode 100644 index af6feb7485c..00000000000 --- a/vendor/gems/kubeclient/test/json/namespace_list.json +++ /dev/null @@ -1,32 +0,0 @@ -{ - "kind": "NamespaceList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/namespaces", - "resourceVersion": "1707" - }, - "items": [ - { - "metadata": { - "name": "default", - "selfLink": "/api/v1/namespaces/default", - "uid": "56c3eb7c-c009-11e4-a514-3c970e4a436a", - "resourceVersion": "4", - "creationTimestamp": "2015-03-01T13:51:47+02:00" - }, - "spec": {}, - "status": {} - }, - { - "metadata": { - "name": "staging", - "selfLink": "/api/v1/namespaces/staging", - "uid": "e388bc10-c021-11e4-a514-3c970e4a436a", - "resourceVersion": "1168", - "creationTimestamp": "2015-03-01T16:47:31+02:00" - }, - "spec": {}, - "status": {} - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/node.json b/vendor/gems/kubeclient/test/json/node.json deleted file mode 100644 index bb4772c3f20..00000000000 --- a/vendor/gems/kubeclient/test/json/node.json +++ /dev/null @@ -1,29 +0,0 @@ -{ - "kind": "Node", - "apiVersion": "v1", - "metadata": { - "name": "127.0.0.1", - "selfLink": "/api/v1/nodes/127.0.0.1", - "uid": "041143c5-ce39-11e4-ac24-3c970e4a436a", - "resourceVersion": "1724", - "creationTimestamp": "2015-03-19T15:08:20+02:00" - }, - "spec": { - "capacity": { - "cpu": "1", - "memory": "3Gi" - } - }, - "status": { - "hostIP": "127.0.0.1", - "conditions": [ - { - "kind": "Ready", - "status": "None", - "lastProbeTime": "2015-03-20T14:16:52+02:00", - "lastTransitionTime": "2015-03-19T15:08:20+02:00", - "reason": "Node health check failed: kubelet /healthz endpoint returns not ok" - } - ] - } -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/node_list.json b/vendor/gems/kubeclient/test/json/node_list.json deleted file mode 100644 index a5c7cbb77a3..00000000000 --- a/vendor/gems/kubeclient/test/json/node_list.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "kind": "NodeList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/nodes", - "resourceVersion": "137" - }, - "items": [ - { - "metadata": { - "name": "127.0.0.1", - "selfLink": "/api/v1/nodes/127.0.0.1", - "uid": "041143c5-ce39-11e4-ac24-3c970e4a436a", - "resourceVersion": "137", - "creationTimestamp": "2015-03-19T15:08:20+02:00" - }, - "spec": { - "capacity": { - "cpu": "1", - "memory": "3Gi" - } - }, - "status": { - "hostIP": "127.0.0.1", - "conditions": [ - { - "kind": "Ready", - "status": "None", - "lastProbeTime": "2015-03-19T15:29:33+02:00", - "lastTransitionTime": "2015-03-19T15:08:20+02:00", - "reason": "Node health check failed: kubelet /healthz endpoint returns not ok" - } - ] - } - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/node_notice.json b/vendor/gems/kubeclient/test/json/node_notice.json deleted file mode 100644 index 69ee438ecc2..00000000000 --- a/vendor/gems/kubeclient/test/json/node_notice.json +++ /dev/null @@ -1,160 +0,0 @@ -{ - "type": "ADDED", - "object": { - "apiVersion": "v1", - "kind": "Node", - "metadata": { - "annotations": { - "volumes.kubernetes.io/controller-managed-attach-detach": "true" - }, - "creationTimestamp": "2017-12-11T12:00:13Z", - "labels": { - "beta.kubernetes.io/arch": "amd64", - "beta.kubernetes.io/os": "linux", - "kubernetes.io/hostname": "openshift.local", - "openshift-infra": "apiserver" - }, - "name": "openshift.local", - "resourceVersion": "367410", - "selfLink": "/api/v1/nodes/openshift.local", - "uid": "d88c7af6-de6a-11e7-8725-52540080f1d2" - }, - "spec": { - "externalID": "openshift.local" - }, - "status": { - "addresses": [ - { - "address": "192.168.122.40", - "type": "InternalIP" - }, - { - "address": "openshift.local", - "type": "Hostname" - } - ], - "allocatable": { - "cpu": "2", - "memory": "8072896Ki", - "pods": "20" - }, - "capacity": { - "cpu": "2", - "memory": "8175296Ki", - "pods": "20" - }, - "conditions": [ - { - "lastHeartbeatTime": "2017-12-15T00:36:13Z", - "lastTransitionTime": "2017-12-11T12:00:13Z", - "message": "kubelet has sufficient disk space available", - "reason": "KubeletHasSufficientDisk", - "status": "False", - "type": "OutOfDisk" - }, - { - "lastHeartbeatTime": "2017-12-15T00:36:13Z", - "lastTransitionTime": "2017-12-11T12:00:13Z", - "message": "kubelet has sufficient memory available", - "reason": "KubeletHasSufficientMemory", - "status": "False", - "type": "MemoryPressure" - }, - { - "lastHeartbeatTime": "2017-12-15T00:36:13Z", - "lastTransitionTime": "2017-12-11T12:00:13Z", - "message": "kubelet has no disk pressure", - "reason": "KubeletHasNoDiskPressure", - "status": "False", - "type": "DiskPressure" - }, - { - "lastHeartbeatTime": "2017-12-15T00:36:13Z", - "lastTransitionTime": "2017-12-14T15:43:39Z", - "message": "kubelet is posting ready status", - "reason": "KubeletReady", - "status": "True", - "type": "Ready" - } - ], - "daemonEndpoints": { - "kubeletEndpoint": { - "Port": 10250 - } - }, - "images": [ - { - "names": [ - "docker.io/openshift/origin@sha256:908c6c9ccf0e0feefe2658899656c6e73d2854777fa340738fb903f0a40c328d", - "docker.io/openshift/origin:latest" - ], - "sizeBytes": 1222636603 - }, - { - "names": [ - "docker.io/openshift/origin-deployer@sha256:3d324bce1870047edc418041cefdec88e0a5bbb5b3b9f6fd35b43f14919a656c", - "docker.io/openshift/origin-deployer:v3.7.0" - ], - "sizeBytes": 1098951248 - }, - { - "names": [ - "docker.io/cockpit/kubernetes@sha256:a8e58cd5e6f5a4d12d1e2dfd339686b74f3c22586952ca7aa184dc254ab49714", - "docker.io/cockpit/kubernetes:latest" - ], - "sizeBytes": 375926556 - }, - { - "names": [ - "docker.io/cockpit/kubernetes@sha256:0745b3823efc57e03a5ef378614dfcb6c2b1e3964220bbf908fb3046a91cef70" - ], - "sizeBytes": 350062743 - }, - { - "names": [ - "docker.io/openshift/origin-service-catalog@sha256:ef851e06276af96838a93320d0e4be51cc8de6e5afb2fb0efd4e56cec114b937" - ], - "sizeBytes": 284732029 - }, - { - "names": [ - "docker.io/openshift/origin-service-catalog@sha256:8addfd742d92d8da819b091d6bda40edc45e88d1446ffd1ad658b6d21b3c36fd" - ], - "sizeBytes": 284731998 - }, - { - "names": [ - "docker.io/openshift/origin-service-catalog@sha256:b3a737cc346b3cae85ef2f5d020b607781a1cac38fe70678cb78fee2c2a3bf8a" - ], - "sizeBytes": 284731943 - }, - { - "names": [ - "docker.io/openshift/origin-service-catalog@sha256:957934537721da33362693d4f1590dc79dc5da7438799bf14d645165768e53ef", - "docker.io/openshift/origin-service-catalog:latest" - ], - "sizeBytes": 283929631 - }, - { - "names": [ - "docker.io/openshift/origin-pod@sha256:2c257d83a01607b229ef5e3dca09f52c3a2a2788c09dc33f0444ec4e572a9e1d", - "docker.io/openshift/origin-pod:v3.7.0" - ], - "sizeBytes": 218423400 - } - ], - "nodeInfo": { - "architecture": "amd64", - "bootID": "75be791d-88a2-4f56-a588-c071a80bf7cf", - "containerRuntimeVersion": "docker://1.12.6", - "kernelVersion": "3.10.0-693.11.1.el7.x86_64", - "kubeProxyVersion": "v1.7.6+a08f5eeb62", - "kubeletVersion": "v1.7.6+a08f5eeb62", - "machineID": "adf09ffc2de2624aa5ed335727c7400d", - "operatingSystem": "linux", - "osImage": "CentOS Linux 7 (Core)", - "systemUUID": "FC9FF0AD-E22D-4A62-A5ED-335727C7400D" - } - } - } -} diff --git a/vendor/gems/kubeclient/test/json/persistent_volume.json b/vendor/gems/kubeclient/test/json/persistent_volume.json deleted file mode 100644 index 612d9df1564..00000000000 --- a/vendor/gems/kubeclient/test/json/persistent_volume.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "kind": "PersistentVolume", - "apiVersion": "v1", - "metadata": { - "name": "pv0001", - "selfLink": "/api/v1/persistentvolumes/pv0001", - "uid": "c83eece1-4b38-11e5-8d27-28d2447dcefe", - "resourceVersion": "1585", - "creationTimestamp": "2015-08-25T14:51:35Z", - "labels": { - "type": "local" - } - }, - "spec": { - "capacity": { - "storage": "10Gi" - }, - "hostPath": { - "path": "/tmp/data01" - }, - "accessModes": [ - "ReadWriteOnce" - ], - "claimRef": { - "kind": "PersistentVolumeClaim", - "namespace": "default", - "name": "myclaim-1", - "uid": "d47384a3-4b38-11e5-8d27-28d2447dcefe", - "apiVersion": "v1", - "resourceVersion": "1582" - }, - "persistentVolumeReclaimPolicy": "Retain" - }, - "status": { - "phase": "Bound" - } -} diff --git a/vendor/gems/kubeclient/test/json/persistent_volume_claim.json b/vendor/gems/kubeclient/test/json/persistent_volume_claim.json deleted file mode 100644 index 65154685348..00000000000 --- a/vendor/gems/kubeclient/test/json/persistent_volume_claim.json +++ /dev/null @@ -1,32 +0,0 @@ -{ - "kind": "PersistentVolumeClaim", - "apiVersion": "v1", - "metadata": { - "name": "myclaim-1", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/persistentvolumeclaims/myclaim-1", - "uid": "d47384a3-4b38-11e5-8d27-28d2447dcefe", - "resourceVersion": "1584", - "creationTimestamp": "2015-08-25T14:51:55Z" - }, - "spec": { - "accessModes": [ - "ReadWriteOnce" - ], - "resources": { - "requests": { - "storage": "3Gi" - } - }, - "volumeName": "pv0001" - }, - "status": { - "phase": "Bound", - "accessModes": [ - "ReadWriteOnce" - ], - "capacity": { - "storage": "10Gi" - } - } -} diff --git a/vendor/gems/kubeclient/test/json/persistent_volume_claim_list.json b/vendor/gems/kubeclient/test/json/persistent_volume_claim_list.json deleted file mode 100644 index 9533d75603b..00000000000 --- a/vendor/gems/kubeclient/test/json/persistent_volume_claim_list.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "kind": "PersistentVolumeClaimList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/persistentvolumeclaims", - "resourceVersion": "3188" - }, - "items": [ - { - "metadata": { - "name": "myclaim-1", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/persistentvolumeclaims/myclaim-1", - "uid": "d47384a3-4b38-11e5-8d27-28d2447dcefe", - "resourceVersion": "1584", - "creationTimestamp": "2015-08-25T14:51:55Z" - }, - "spec": { - "accessModes": [ - "ReadWriteOnce" - ], - "resources": { - "requests": { - "storage": "3Gi" - } - }, - "volumeName": "pv0001" - }, - "status": { - "phase": "Bound", - "accessModes": [ - "ReadWriteOnce" - ], - "capacity": { - "storage": "10Gi" - } - } - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/persistent_volume_claims_nil_items.json b/vendor/gems/kubeclient/test/json/persistent_volume_claims_nil_items.json deleted file mode 100644 index b23ff4dcffd..00000000000 --- a/vendor/gems/kubeclient/test/json/persistent_volume_claims_nil_items.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "kind": "PersistentVolumeClaimList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/persistentvolumeclaims", - "resourceVersion": "1089012" - } -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/persistent_volume_list.json b/vendor/gems/kubeclient/test/json/persistent_volume_list.json deleted file mode 100644 index fa7e53cb914..00000000000 --- a/vendor/gems/kubeclient/test/json/persistent_volume_list.json +++ /dev/null @@ -1,45 +0,0 @@ -{ - "kind": "PersistentVolumeList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/persistentvolumes", - "resourceVersion": "2999" - }, - "items": [ - { - "metadata": { - "name": "pv0001", - "selfLink": "/api/v1/persistentvolumes/pv0001", - "uid": "c83eece1-4b38-11e5-8d27-28d2447dcefe", - "resourceVersion": "1585", - "creationTimestamp": "2015-08-25T14:51:35Z", - "labels": { - "type": "local" - } - }, - "spec": { - "capacity": { - "storage": "10Gi" - }, - "hostPath": { - "path": "/tmp/data01" - }, - "accessModes": [ - "ReadWriteOnce" - ], - "claimRef": { - "kind": "PersistentVolumeClaim", - "namespace": "default", - "name": "myclaim-1", - "uid": "d47384a3-4b38-11e5-8d27-28d2447dcefe", - "apiVersion": "v1", - "resourceVersion": "1582" - }, - "persistentVolumeReclaimPolicy": "Retain" - }, - "status": { - "phase": "Bound" - } - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/pod.json b/vendor/gems/kubeclient/test/json/pod.json deleted file mode 100644 index 913c2146f6a..00000000000 --- a/vendor/gems/kubeclient/test/json/pod.json +++ /dev/null @@ -1,92 +0,0 @@ -{ - "kind": "Pod", - "apiVersion": "v1", - "metadata": { - "name": "redis-master3", - "namespace": "default", - "selfLink": "/api/v1/pods/redis-master3?namespace=default", - "uid": "a344023f-a23c-11e4-a36b-3c970e4a436a", - "resourceVersion": "9", - "creationTimestamp": "2015-01-22T15:43:24+02:00", - "labels": { - "name": "redis-master" - } - }, - "spec": { - "volumes": null, - "containers": [ - { - "name": "master", - "image": "dockerfile/redis", - "ports": [ - { - "hostPort": 6379, - "containerPort": 6379, - "protocol": "TCP" - } - ], - "memory": "0", - "cpu": "100m", - "imagePullPolicy": "" - }, - { - "name": "php-redis", - "image": "kubernetes/example-guestbook-php-redis", - "ports": [ - { - "hostPort": 8000, - "containerPort": 80, - "protocol": "TCP" - } - ], - "memory": "50000000", - "cpu": "100m", - "imagePullPolicy": "" - } - ], - "restartPolicy": { - "always": { - - } - }, - "dnsPolicy": "ClusterFirst" - }, - "status": { - "phase": "Running", - "host": "127.0.0.1", - "podIP": "172.17.0.2", - "info": { - "master": { - "state": { - "running": { - "startedAt": "2015-01-22T13:43:29Z" - } - }, - "restartCount": 0, - "containerID": "docker://87458d9a12f9dc9a01b52c1eee5f09cf48939380271c0eaf31af298ce67b125e", - "image": "dockerfile/redis" - }, - "net": { - "state": { - "running": { - "startedAt": "2015-01-22T13:43:27Z" - } - }, - "restartCount": 0, - "containerID": "docker://3bb5ced1f831322d370f70b58137e1dd41216c2960b7a99394542b5230cbd259", - "podIP": "172.17.0.2", - "image": "kubernetes/pause:latest" - }, - "php-redis": { - "state": { - "running": { - "startedAt": "2015-01-22T13:43:31Z" - } - }, - "restartCount": 0, - "containerID": "docker://5f08685c0a7a5c974d438a52c6560d72bb0aae7e805d2a34302b9b460f1297c7", - "image": "kubernetes/example-guestbook-php-redis" - } - } - } -} diff --git a/vendor/gems/kubeclient/test/json/pod_list.json b/vendor/gems/kubeclient/test/json/pod_list.json deleted file mode 100644 index d08bbdce0c0..00000000000 --- a/vendor/gems/kubeclient/test/json/pod_list.json +++ /dev/null @@ -1,79 +0,0 @@ -{ - "kind": "PodList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/pods", - "resourceVersion": "1315" - }, - "items": [ - { - "metadata": { - "name": "redis-master3", - "namespace": "default", - "selfLink": "/api/v1/pods/redis-master3?namespace=default", - "uid": "1da148b4-cef5-11e4-ac24-3c970e4a436a", - "resourceVersion": "1301", - "creationTimestamp": "2015-03-20T13:34:48+02:00", - "labels": { - "mylabel": "mylabelvalue", - "role": "pod" - } - }, - "spec": { - "volumes": null, - "containers": [ - { - "name": "master", - "image": "dockerfile/redis", - "ports": [ - { - "hostPort": 6379, - "containerPort": 6379, - "protocol": "TCP" - } - ], - "resources": { - "limits": { - "cpu": "100m" - } - }, - "terminationMessagePath": "/dev/termination-log", - "imagePullPolicy": "IfNotPresent", - "securityContext": { - "capabilities": {} - } - }, - { - "name": "php-redis", - "image": "kubernetes/example-guestbook-php-redis", - "ports": [ - { - "hostPort": 8000, - "containerPort": 80, - "protocol": "TCP" - } - ], - "resources": { - "limits": { - "cpu": "100m", - "memory": "50000000" - } - }, - "terminationMessagePath": "/dev/termination-log", - "imagePullPolicy": "IfNotPresent", - "securityContext": { - "capabilities": {} - } - } - ], - "restartPolicy": { - "always": {} - }, - "dnsPolicy": "ClusterFirst" - }, - "status": { - "phase": "Pending" - } - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/pod_template_list.json b/vendor/gems/kubeclient/test/json/pod_template_list.json deleted file mode 100644 index 5acb2c2f83a..00000000000 --- a/vendor/gems/kubeclient/test/json/pod_template_list.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "kind": "PodTemplateList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/podtemplates", - "resourceVersion": "672" - }, - "items": [] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/pods_1.json b/vendor/gems/kubeclient/test/json/pods_1.json deleted file mode 100644 index ec00bd3b5cc..00000000000 --- a/vendor/gems/kubeclient/test/json/pods_1.json +++ /dev/null @@ -1,265 +0,0 @@ -{ - "kind":"PodList", - "apiVersion":"v1", - "metadata":{ - "selfLink":"/api/v1/pods", - "resourceVersion":"53225946", - "continue":"eyJ2IjoibWV0YS5rOHMua" - }, - "items":[ - { - "metadata":{ - "name":"my-ruby-project-2-build", - "namespace":"my-project", - "selfLink":"/api/v1/namespaces/my-project/pods/my-ruby-project-2-build", - "uid":"0c478b50-babb-11e8-ba7e-d094660d31fb", - "resourceVersion":"42398462", - "creationTimestamp":"2018-09-17T20:48:36Z", - "deletionTimestamp":"2018-09-19T13:22:50Z", - "deletionGracePeriodSeconds":0, - "labels":{ - "openshift.io/build.name":"my-ruby-project-2" - }, - "annotations":{ - "openshift.io/build.name":"my-ruby-project-2", - "openshift.io/scc":"privileged" - }, - "ownerReferences":[ - { - "apiVersion":"build.openshift.io/v1", - "kind":"Build", - "name":"my-ruby-project-2", - "uid":"0c450e6d-babb-11e8-ba7e-d094660d31fb", - "controller":true - } - ], - "finalizers":[ - "foregroundDeletion" - ] - }, - "spec":{ - "volumes":[ - { - "name":"buildworkdir", - "emptyDir":{ - - } - }, - { - "name":"docker-socket", - "hostPath":{ - "path":"/var/run/docker.sock", - "type":"" - } - }, - { - "name":"crio-socket", - "hostPath":{ - "path":"/var/run/crio/crio.sock", - "type":"" - } - }, - { - "name":"builder-dockercfg-rjgnm-push", - "secret":{ - "secretName":"builder-dockercfg-rjgnm", - "defaultMode":384 - } - }, - { - "name":"builder-token-zkpb6", - "secret":{ - "secretName":"builder-token-zkpb6", - "defaultMode":420 - } - } - ], - "containers":[ - { - "name":"sti-build", - "image":"openshift3/ose-sti-builder:v3.9.25", - "command":[ - "openshift-sti-build" - ] - } - ], - "restartPolicy":"Never", - "terminationGracePeriodSeconds":30, - "dnsPolicy":"ClusterFirst", - "nodeSelector":{ - "node-role.kubernetes.io/compute":"true" - }, - "serviceAccountName":"builder", - "serviceAccount":"builder", - "nodeName":"dell-r430-20.example.com", - "securityContext":{ - - }, - "imagePullSecrets":[ - { - "name":"builder-dockercfg-rjgnm" - } - ], - "schedulerName":"default-scheduler" - }, - "status":{ - "phase":"Failed", - "conditions":[ - { - "type":"Initialized", - "status":"True", - "lastProbeTime":null, - "lastTransitionTime":"2018-09-17T20:48:49Z" - }, - { - "type":"Ready", - "status":"False", - "lastProbeTime":null, - "lastTransitionTime":"2018-09-17T20:49:08Z", - "reason":"ContainersNotReady", - "message":"containers with unready status: [sti-build]" - }, - { - "type":"PodScheduled", - "status":"True", - "lastProbeTime":null, - "lastTransitionTime":"2018-09-17T20:48:36Z" - } - ], - "hostIP":"10.8.96.55", - "podIP":"10.129.0.207", - "startTime":"2018-09-17T20:48:36Z", - "qosClass":"BestEffort" - } - }, - { - "metadata":{ - "name":"redis-1-94zxb", - "generateName":"redis-1-", - "namespace":"customer-logging", - "selfLink":"/api/v1/namespaces/customer-logging/pods/redis-1-94zxb", - "uid":"a8aea5f4-5f91-11e8-ba7e-d094660d31fb", - "resourceVersion":"47622190", - "creationTimestamp":"2018-05-24T20:33:03Z", - "labels":{ - "app":"elastic-log-ripper", - "deployment":"redis-1", - "deploymentconfig":"redis", - "name":"redis" - }, - "annotations":{ - "openshift.io/deployment-config.latest-version":"1", - "openshift.io/deployment-config.name":"redis", - "openshift.io/deployment.name":"redis-1", - "openshift.io/generated-by":"OpenShiftNewApp", - "openshift.io/scc":"restricted" - }, - "ownerReferences":[ - { - "apiVersion":"v1", - "kind":"ReplicationController", - "name":"redis-1", - "uid":"9e2e46b3-5f91-11e8-ba7e-d094660d31fb", - "controller":true, - "blockOwnerDeletion":true - } - ] - }, - "spec":{ - "volumes":[ - { - "name":"default-token-n2wzs", - "secret":{ - "secretName":"default-token-n2wzs", - "defaultMode":420 - } - } - ], - "containers":[ - { - "name":"redis", - "image":"manageiq/redis:latest", - "ports":[ - { - "containerPort":6379, - "protocol":"TCP" - } - ], - "resources":{ - - }, - "volumeMounts":[ - { - "name":"default-token-n2wzs", - "readOnly":true, - "mountPath":"/var/run/secrets/kubernetes.io/serviceaccount" - } - ], - "terminationMessagePath":"/dev/termination-log", - "terminationMessagePolicy":"File", - "imagePullPolicy":"Always", - "securityContext":{ - "capabilities":{ - "drop":[ - "KILL", - "MKNOD", - "SETGID", - "SETUID" - ] - }, - "runAsUser":1000260000 - } - } - ], - "restartPolicy":"Always", - "terminationGracePeriodSeconds":30, - "dnsPolicy":"ClusterFirst", - "nodeSelector":{ - "node-role.kubernetes.io/compute":"true" - }, - "serviceAccountName":"default", - "serviceAccount":"default", - "nodeName":"dell-r430-20.example.com", - "securityContext":{ - "seLinuxOptions":{ - "level":"s0:c16,c10" - }, - "fsGroup":1000260000 - }, - "imagePullSecrets":[ - { - "name":"default-dockercfg-ck286" - } - ], - "schedulerName":"default-scheduler" - }, - "status":{ - "phase":"Running", - "conditions":[ - { - "type":"Initialized", - "status":"True", - "lastProbeTime":null, - "lastTransitionTime":"2018-05-24T20:33:04Z" - }, - { - "type":"Ready", - "status":"True", - "lastProbeTime":null, - "lastTransitionTime":"2018-09-18T12:06:18Z" - }, - { - "type":"PodScheduled", - "status":"True", - "lastProbeTime":null, - "lastTransitionTime":"2018-05-24T20:33:03Z" - } - ], - "hostIP":"10.8.96.55", - "podIP":"10.129.0.222", - "startTime":"2018-05-24T20:33:04Z", - "qosClass":"BestEffort" - } - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/pods_2.json b/vendor/gems/kubeclient/test/json/pods_2.json deleted file mode 100644 index fd6085bc5de..00000000000 --- a/vendor/gems/kubeclient/test/json/pods_2.json +++ /dev/null @@ -1,102 +0,0 @@ -{ - "kind":"PodList", - "apiVersion":"v1", - "metadata":{ - "selfLink":"/api/v1/pods", - "resourceVersion":"53226147" - }, - "items":[ - { - "metadata":{ - "name":"topological-inventory-persister-9-hznds", - "generateName":"topological-inventory-persister-9-", - "namespace":"topological-inventory-ci", - "selfLink":"/api/v1/namespaces/topological-inventory-ci/pods/topological-inventory-persister-9-hznds", - "uid":"0c114dde-d865-11e8-ba7e-d094660d31fb", - "resourceVersion":"51987342", - "creationTimestamp":"2018-10-25T14:48:34Z", - "labels":{ - "name":"topological-inventory-persister" - } - }, - "spec":{ - "volumes":[ - { - "name":"default-token-5pdjl", - "secret":{ - "secretName":"default-token-5pdjl", - "defaultMode":420 - } - } - ], - "containers":[ - { - "name":"topological-inventory-persister", - "image":"docker-registry.default.svc:5000/topological-inventory-ci/topological-inventory-persister@sha256:0f654ea09e749019cf3bcc4b8ee43b8dd813fcbf487843b917cf190213741927", - "resources":{ - } - } - ], - "restartPolicy":"Always", - "terminationGracePeriodSeconds":30, - "dnsPolicy":"ClusterFirst", - "nodeSelector":{ - "node-role.kubernetes.io/compute":"true" - }, - "serviceAccountName":"default", - "serviceAccount":"default", - "nodeName":"dell-r430-20.example.com", - "schedulerName":"default-scheduler" - }, - "status":{ - "phase":"Running", - "hostIP":"10.8.96.55", - "podIP":"10.129.1.108", - "startTime":"2018-10-25T14:48:34Z", - "qosClass":"BestEffort" - } - }, - { - "metadata":{ - "name":"topological-inventory-persister-9-vzr6h", - "generateName":"topological-inventory-persister-9-", - "namespace":"topological-inventory-ci", - "selfLink":"/api/v1/namespaces/topological-inventory-ci/pods/topological-inventory-persister-9-vzr6h", - "uid":"3065d8ce-d86a-11e8-ba7e-d094660d31fb", - "resourceVersion":"51996115", - "creationTimestamp":"2018-10-25T15:25:22Z", - "labels":{ - "name":"topological-inventory-persister" - } - }, - "spec":{ - "volumes":null, - "containers":[ - { - "name":"topological-inventory-persister", - "image":"docker-registry.default.svc:5000/topological-inventory-ci/topological-inventory-persister@sha256:0f654ea09e749019cf3bcc4b8ee43b8dd813fcbf487843b917cf190213741927", - "resources":{ - } - } - ], - "restartPolicy":"Always", - "terminationGracePeriodSeconds":30, - "dnsPolicy":"ClusterFirst", - "nodeSelector":{ - "node-role.kubernetes.io/compute":"true" - }, - "serviceAccountName":"default", - "serviceAccount":"default", - "nodeName":"dell-r430-20.example.com", - "schedulerName":"default-scheduler" - }, - "status":{ - "phase":"Running", - "hostIP":"10.8.96.55", - "podIP":"10.129.1.168", - "startTime":"2018-10-25T15:25:22Z", - "qosClass":"BestEffort" - } - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/pods_410.json b/vendor/gems/kubeclient/test/json/pods_410.json deleted file mode 100644 index eb1a31937b7..00000000000 --- a/vendor/gems/kubeclient/test/json/pods_410.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "kind":"Status", - "apiVersion":"v1", - "metadata":{}, - "status":"Failure", - "message":"The provided from parameter is too old to display a consistent list result. You must start a new list without the from.", - "reason":"Expired", - "code":410 -} diff --git a/vendor/gems/kubeclient/test/json/processed_template.json b/vendor/gems/kubeclient/test/json/processed_template.json deleted file mode 100644 index 66c6e32ea70..00000000000 --- a/vendor/gems/kubeclient/test/json/processed_template.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "kind": "Template", - "apiVersion": "v1", - "metadata": { - "name": "my-templtae", - "namespace": "default", - "selfLink": "/oapi/v1/namespaces/default/processedtemplates/my-templtae", - "uid": "2240c61c-8f70-11e5-a806-001a4a231290", - "resourceVersion": "1399", - "creationTimestamp": "2015-11-20T10:19:07Z" - }, - "objects": [ - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "test/my-service" - } - } - ], - "parameters": [ - { - "name": "NAME_PREFIX", - "value": "test/" - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/replication_controller.json b/vendor/gems/kubeclient/test/json/replication_controller.json deleted file mode 100644 index 26ac7a9a39e..00000000000 --- a/vendor/gems/kubeclient/test/json/replication_controller.json +++ /dev/null @@ -1,57 +0,0 @@ -{ - "kind": "ReplicationController", - "apiVersion": "v1", - "metadata": { - "name": "guestbook-controller", - "namespace": "default", - "selfLink": "/api/v1/replicationcontrollers/guestbook-controller?namespace=default", - "uid": "c71aa4c0-a240-11e4-a265-3c970e4a436a", - "resourceVersion": "8", - "creationTimestamp": "2015-01-22T16:13:02+02:00", - "labels": { - "name": "guestbook" - } - }, - "spec": { - "replicas": 3, - "selector": { - "name": "guestbook" - }, - "template": { - "metadata": { - "creationTimestamp": null, - "labels": { - "name": "guestbook" - } - }, - "spec": { - "volumes": null, - "containers": [ - { - "name": "guestbook", - "image": "kubernetes/guestbook", - "ports": [ - { - "name": "http-server", - "containerPort": 3000, - "protocol": "TCP" - } - ], - "memory": "0", - "cpu": "0m", - "imagePullPolicy": "" - } - ], - "restartPolicy": { - "always": { - - } - }, - "dnsPolicy": "ClusterFirst" - } - } - }, - "status": { - "replicas": 3 - } -} diff --git a/vendor/gems/kubeclient/test/json/replication_controller_list.json b/vendor/gems/kubeclient/test/json/replication_controller_list.json deleted file mode 100644 index b7f2f7bd521..00000000000 --- a/vendor/gems/kubeclient/test/json/replication_controller_list.json +++ /dev/null @@ -1,66 +0,0 @@ -{ - "kind": "ReplicationControllerList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/namespaces/default/replicationcontrollers", - "resourceVersion": "1636" - }, - "items": [ - { - "metadata": { - "name": "redis-master-controller", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/replicationcontrollers/redis-master-controller?namespace=default", - "uid": "108eb547-cefa-11e4-ac24-3c970e4a436a", - "resourceVersion": "1631", - "creationTimestamp": "2015-03-20T14:10:14+02:00", - "labels": { - "name": "redis-master" - } - }, - "spec": { - "replicas": 1, - "selector": { - "name": "redis-master" - }, - "template": { - "metadata": { - "creationTimestamp": null, - "labels": { - "app": "redis", - "name": "redis-master" - } - }, - "spec": { - "volumes": null, - "containers": [ - { - "name": "redis-master", - "image": "dockerfile/redis", - "ports": [ - { - "containerPort": 6379, - "protocol": "TCP" - } - ], - "resources": {}, - "terminationMessagePath": "/dev/termination-log", - "imagePullPolicy": "IfNotPresent", - "securityContext": { - "capabilities": {} - } - } - ], - "restartPolicy": { - "always": {} - }, - "dnsPolicy": "ClusterFirst" - } - } - }, - "status": { - "replicas": 1 - } - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/resource_quota.json b/vendor/gems/kubeclient/test/json/resource_quota.json deleted file mode 100644 index 75b40391d68..00000000000 --- a/vendor/gems/kubeclient/test/json/resource_quota.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "kind": "ResourceQuota", - "apiVersion": "v1", - "metadata": { - "name": "quota", - "namespace": "quota-example", - "selfLink": "/api/v1/namespaces/quota-example/resourcequotas/quota", - "uid": "ab9f24a4-3c43-11e5-8214-0aaeec44370e", - "resourceVersion": "12919", - "creationTimestamp": "2015-08-06T14:01:44Z" - }, - "spec": { - "hard": { - "cpu": "20", - "memory": "1Gi", - "persistentvolumeclaims": "10", - "pods": "10", - "replicationcontrollers": "20", - "resourcequotas": "1", - "secrets": "10", - "services": "5" - } - }, - "status": { - "hard": { - "cpu": "20", - "memory": "1Gi", - "persistentvolumeclaims": "10", - "pods": "10", - "replicationcontrollers": "20", - "resourcequotas": "1", - "secrets": "10", - "services": "5" - }, - "used": { - "cpu": "0", - "memory": "0", - "persistentvolumeclaims": "0", - "pods": "0", - "replicationcontrollers": "1", - "resourcequotas": "1", - "secrets": "9", - "services": "0" - } - } -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/resource_quota_list.json b/vendor/gems/kubeclient/test/json/resource_quota_list.json deleted file mode 100644 index 371f3feb649..00000000000 --- a/vendor/gems/kubeclient/test/json/resource_quota_list.json +++ /dev/null @@ -1,54 +0,0 @@ -{ - "kind": "ResourceQuotaList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/namespaces/quota-example/resourcequotas/", - "resourceVersion": "102452" - }, - "items": [ - { - "metadata": { - "name": "quota", - "namespace": "quota-example", - "selfLink": "/api/v1/namespaces/quota-example/resourcequotas/quota", - "uid": "ab9f24a4-3c43-11e5-8214-0aaeec44370e", - "resourceVersion": "12919", - "creationTimestamp": "2015-08-06T14:01:44Z" - }, - "spec": { - "hard": { - "cpu": "20", - "memory": "1Gi", - "persistentvolumeclaims": "10", - "pods": "10", - "replicationcontrollers": "20", - "resourcequotas": "1", - "secrets": "10", - "services": "5" - } - }, - "status": { - "hard": { - "cpu": "20", - "memory": "1Gi", - "persistentvolumeclaims": "10", - "pods": "10", - "replicationcontrollers": "20", - "resourcequotas": "1", - "secrets": "10", - "services": "5" - }, - "used": { - "cpu": "0", - "memory": "0", - "persistentvolumeclaims": "0", - "pods": "0", - "replicationcontrollers": "1", - "resourcequotas": "1", - "secrets": "9", - "services": "0" - } - } - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/secret_list.json b/vendor/gems/kubeclient/test/json/secret_list.json deleted file mode 100644 index bfd7661b390..00000000000 --- a/vendor/gems/kubeclient/test/json/secret_list.json +++ /dev/null @@ -1,44 +0,0 @@ -{ - "kind": "SecretList", - "apiVersion":"v1", - "metadata":{ - "selfLink":"/api/v1/secrets", - "resourceVersion":"256788" - }, - "items": [ - { - "metadata": { - "name":"default-token-my2pi", - "namespace":"default", - "selfLink":"/api/v1/namespaces/default/secrets/default-token-my2pi", - "uid":"07b60654-2a65-11e5-a483-0e840567604d", - "resourceVersion":"11", - "creationTimestamp":"2015-07-14T20:15:11Z", - "annotations": { - "kubernetes.io/service-account.name":"default", - "kubernetes.io/service-account.uid":"07b350a0-2a65-11e5-a483-0e840567604d" - } - }, - "data":{ - "ca.crt":"Y2F0J3MgYXJlIGF3ZXNvbWUK", - "token":"Y2F0J3MgYXJlIGF3ZXNvbWUK" - }, - "type":"kubernetes.io/service-account-token" - }, - { - "metadata": { - "name": "test-secret", - "namespace": "dev", - "selfLink": "/api/v1/namespaces/dev/secrets/test-secret", - "uid": "4e38a198-2bcb-11e5-a483-0e840567604d", - "resourceVersion": "245569", - "creationTimestamp": "2015-07-16T14:59:49Z" - }, - "data": { - "super-secret": "Y2F0J3MgYXJlIGF3ZXNvbWUK" - }, - "type": "Opaque" - } - ] -} - diff --git a/vendor/gems/kubeclient/test/json/security.openshift.io_api_resource_list.json b/vendor/gems/kubeclient/test/json/security.openshift.io_api_resource_list.json deleted file mode 100644 index 18e2021cff5..00000000000 --- a/vendor/gems/kubeclient/test/json/security.openshift.io_api_resource_list.json +++ /dev/null @@ -1,69 +0,0 @@ -{ - "kind": "APIResourceList", - "apiVersion": "v1", - "groupVersion": "security.openshift.io/v1", - "resources": [ - { - "name": "podsecuritypolicyreviews", - "singularName": "", - "namespaced": true, - "kind": "PodSecurityPolicyReview", - "verbs": [ - "create" - ] - }, - { - "name": "podsecuritypolicyselfsubjectreviews", - "singularName": "", - "namespaced": true, - "kind": "PodSecurityPolicySelfSubjectReview", - "verbs": [ - "create" - ] - }, - { - "name": "podsecuritypolicysubjectreviews", - "singularName": "", - "namespaced": true, - "kind": "PodSecurityPolicySubjectReview", - "verbs": [ - "create" - ] - }, - { - "name": "rangeallocations", - "singularName": "", - "namespaced": false, - "kind": "RangeAllocation", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ] - }, - { - "name": "securitycontextconstraints", - "singularName": "", - "namespaced": false, - "kind": "SecurityContextConstraints", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ], - "shortNames": [ - "scc" - ] - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/security_context_constraint_list.json b/vendor/gems/kubeclient/test/json/security_context_constraint_list.json deleted file mode 100644 index 1e9d4c474a7..00000000000 --- a/vendor/gems/kubeclient/test/json/security_context_constraint_list.json +++ /dev/null @@ -1,375 +0,0 @@ -{ - "kind": "SecurityContextConstraintsList", - "apiVersion": "security.openshift.io/v1", - "metadata": { - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints", - "resourceVersion": "5751" - }, - "items": [ - { - "metadata": { - "name": "anyuid", - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/anyuid", - "uid": "12ba8540-ef00-11e8-b4c0-68f728fac3ab", - "resourceVersion": "71", - "creationTimestamp": "2018-11-23T09:13:42Z", - "annotations": { - "kubernetes.io/description": "anyuid provides all features of the restricted SCC but allows users to run with any UID and any GID." - } - }, - "priority": 10, - "allowPrivilegedContainer": false, - "defaultAddCapabilities": null, - "requiredDropCapabilities": [ - "MKNOD" - ], - "allowedCapabilities": null, - "allowHostDirVolumePlugin": false, - "volumes": [ - "configMap", - "downwardAPI", - "emptyDir", - "persistentVolumeClaim", - "projected", - "secret" - ], - "allowedFlexVolumes": null, - "allowHostNetwork": false, - "allowHostPorts": false, - "allowHostPID": false, - "allowHostIPC": false, - "seLinuxContext": { - "type": "MustRunAs" - }, - "runAsUser": { - "type": "RunAsAny" - }, - "supplementalGroups": { - "type": "RunAsAny" - }, - "fsGroup": { - "type": "RunAsAny" - }, - "readOnlyRootFilesystem": false, - "users": [], - "groups": [ - "system:cluster-admins" - ] - }, - { - "metadata": { - "name": "hostaccess", - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostaccess", - "uid": "12b5b3a2-ef00-11e8-b4c0-68f728fac3ab", - "resourceVersion": "69", - "creationTimestamp": "2018-11-23T09:13:42Z", - "annotations": { - "kubernetes.io/description": "hostaccess allows access to all host namespaces but still requires pods to be run with a UID and SELinux context that are allocated to the namespace. WARNING: this SCC allows host access to namespaces, file systems, and PIDS. It should only be used by trusted pods. Grant with caution." - } - }, - "priority": null, - "allowPrivilegedContainer": false, - "defaultAddCapabilities": null, - "requiredDropCapabilities": [ - "KILL", - "MKNOD", - "SETUID", - "SETGID" - ], - "allowedCapabilities": null, - "allowHostDirVolumePlugin": true, - "volumes": [ - "configMap", - "downwardAPI", - "emptyDir", - "hostPath", - "persistentVolumeClaim", - "projected", - "secret" - ], - "allowedFlexVolumes": null, - "allowHostNetwork": true, - "allowHostPorts": true, - "allowHostPID": true, - "allowHostIPC": true, - "seLinuxContext": { - "type": "MustRunAs" - }, - "runAsUser": { - "type": "MustRunAsRange" - }, - "supplementalGroups": { - "type": "RunAsAny" - }, - "fsGroup": { - "type": "MustRunAs" - }, - "readOnlyRootFilesystem": false, - "users": [], - "groups": [] - }, - { - "metadata": { - "name": "hostmount-anyuid", - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostmount-anyuid", - "uid": "12b512c0-ef00-11e8-b4c0-68f728fac3ab", - "resourceVersion": "68", - "creationTimestamp": "2018-11-23T09:13:42Z", - "annotations": { - "kubernetes.io/description": "hostmount-anyuid provides all the features of the restricted SCC but allows host mounts and any UID by a pod. This is primarily used by the persistent volume recycler. WARNING: this SCC allows host file system access as any UID, including UID 0. Grant with caution." - } - }, - "priority": null, - "allowPrivilegedContainer": false, - "defaultAddCapabilities": null, - "requiredDropCapabilities": [ - "MKNOD" - ], - "allowedCapabilities": null, - "allowHostDirVolumePlugin": true, - "volumes": [ - "configMap", - "downwardAPI", - "emptyDir", - "hostPath", - "nfs", - "persistentVolumeClaim", - "projected", - "secret" - ], - "allowedFlexVolumes": null, - "allowHostNetwork": false, - "allowHostPorts": false, - "allowHostPID": false, - "allowHostIPC": false, - "seLinuxContext": { - "type": "MustRunAs" - }, - "runAsUser": { - "type": "RunAsAny" - }, - "supplementalGroups": { - "type": "RunAsAny" - }, - "fsGroup": { - "type": "RunAsAny" - }, - "readOnlyRootFilesystem": false, - "users": [ - "system:serviceaccount:openshift-infra:pv-recycler-controller" - ], - "groups": [] - }, - { - "metadata": { - "name": "hostnetwork", - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostnetwork", - "uid": "12bb0984-ef00-11e8-b4c0-68f728fac3ab", - "resourceVersion": "72", - "creationTimestamp": "2018-11-23T09:13:42Z", - "annotations": { - "kubernetes.io/description": "hostnetwork allows using host networking and host ports but still requires pods to be run with a UID and SELinux context that are allocated to the namespace." - } - }, - "priority": null, - "allowPrivilegedContainer": false, - "defaultAddCapabilities": null, - "requiredDropCapabilities": [ - "KILL", - "MKNOD", - "SETUID", - "SETGID" - ], - "allowedCapabilities": null, - "allowHostDirVolumePlugin": false, - "volumes": [ - "configMap", - "downwardAPI", - "emptyDir", - "persistentVolumeClaim", - "projected", - "secret" - ], - "allowedFlexVolumes": null, - "allowHostNetwork": true, - "allowHostPorts": true, - "allowHostPID": false, - "allowHostIPC": false, - "seLinuxContext": { - "type": "MustRunAs" - }, - "runAsUser": { - "type": "MustRunAsRange" - }, - "supplementalGroups": { - "type": "MustRunAs" - }, - "fsGroup": { - "type": "MustRunAs" - }, - "readOnlyRootFilesystem": false, - "users": [], - "groups": [] - }, - { - "metadata": { - "name": "nonroot", - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/nonroot", - "uid": "12b37c59-ef00-11e8-b4c0-68f728fac3ab", - "resourceVersion": "67", - "creationTimestamp": "2018-11-23T09:13:42Z", - "annotations": { - "kubernetes.io/description": "nonroot provides all features of the restricted SCC but allows users to run with any non-root UID. The user must specify the UID or it must be specified on the by the manifest of the container runtime." - } - }, - "priority": null, - "allowPrivilegedContainer": false, - "defaultAddCapabilities": null, - "requiredDropCapabilities": [ - "KILL", - "MKNOD", - "SETUID", - "SETGID" - ], - "allowedCapabilities": null, - "allowHostDirVolumePlugin": false, - "volumes": [ - "configMap", - "downwardAPI", - "emptyDir", - "persistentVolumeClaim", - "projected", - "secret" - ], - "allowedFlexVolumes": null, - "allowHostNetwork": false, - "allowHostPorts": false, - "allowHostPID": false, - "allowHostIPC": false, - "seLinuxContext": { - "type": "MustRunAs" - }, - "runAsUser": { - "type": "MustRunAsNonRoot" - }, - "supplementalGroups": { - "type": "RunAsAny" - }, - "fsGroup": { - "type": "RunAsAny" - }, - "readOnlyRootFilesystem": false, - "users": [], - "groups": [] - }, - { - "metadata": { - "name": "privileged", - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/privileged", - "uid": "12b18f4a-ef00-11e8-b4c0-68f728fac3ab", - "resourceVersion": "300", - "creationTimestamp": "2018-11-23T09:13:42Z", - "annotations": { - "kubernetes.io/description": "privileged allows access to all privileged and host features and the ability to run as any user, any group, any fsGroup, and with any SELinux context. WARNING: this is the most relaxed SCC and should be used only for cluster administration. Grant with caution." - } - }, - "priority": null, - "allowPrivilegedContainer": true, - "defaultAddCapabilities": null, - "requiredDropCapabilities": null, - "allowedCapabilities": [ - "*" - ], - "allowHostDirVolumePlugin": true, - "volumes": [ - "*" - ], - "allowedFlexVolumes": null, - "allowHostNetwork": true, - "allowHostPorts": true, - "allowHostPID": true, - "allowHostIPC": true, - "seLinuxContext": { - "type": "RunAsAny" - }, - "runAsUser": { - "type": "RunAsAny" - }, - "supplementalGroups": { - "type": "RunAsAny" - }, - "fsGroup": { - "type": "RunAsAny" - }, - "readOnlyRootFilesystem": false, - "users": [ - "system:admin", - "system:serviceaccount:openshift-infra:build-controller", - "system:serviceaccount:default:pvinstaller", - "system:serviceaccount:default:registry", - "system:serviceaccount:default:router" - ], - "groups": [ - "system:cluster-admins", - "system:nodes", - "system:masters" - ], - "seccompProfiles": [ - "*" - ] - }, - { - "metadata": { - "name": "restricted", - "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/restricted", - "uid": "12b9a842-ef00-11e8-b4c0-68f728fac3ab", - "resourceVersion": "70", - "creationTimestamp": "2018-11-23T09:13:42Z", - "annotations": { - "kubernetes.io/description": "restricted denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace. This is the most restrictive SCC and it is used by default for authenticated users." - } - }, - "priority": null, - "allowPrivilegedContainer": false, - "defaultAddCapabilities": null, - "requiredDropCapabilities": [ - "KILL", - "MKNOD", - "SETUID", - "SETGID" - ], - "allowedCapabilities": null, - "allowHostDirVolumePlugin": false, - "volumes": [ - "configMap", - "downwardAPI", - "emptyDir", - "persistentVolumeClaim", - "projected", - "secret" - ], - "allowedFlexVolumes": null, - "allowHostNetwork": false, - "allowHostPorts": false, - "allowHostPID": false, - "allowHostIPC": false, - "seLinuxContext": { - "type": "MustRunAs" - }, - "runAsUser": { - "type": "MustRunAsRange" - }, - "supplementalGroups": { - "type": "RunAsAny" - }, - "fsGroup": { - "type": "MustRunAs" - }, - "readOnlyRootFilesystem": false, - "users": [], - "groups": [ - "system:authenticated" - ] - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/service.json b/vendor/gems/kubeclient/test/json/service.json deleted file mode 100644 index 6e2e5c79ce1..00000000000 --- a/vendor/gems/kubeclient/test/json/service.json +++ /dev/null @@ -1,33 +0,0 @@ -{ - "kind": "Service", - "apiVersion": "v1", - "metadata": { - "name": "redis-slave", - "namespace": "development", - "selfLink": "/api/v1/namespaces/development/services/redis-slave", - "uid": "bdb80a8f-db93-11e4-b293-f8b156af4ae1", - "resourceVersion": "2815", - "creationTimestamp": "2015-04-05T13:00:31Z", - "labels": { - "name": "redis", - "role": "slave" - } - }, - "spec": { - "ports": [ - { - "name": "", - "protocol": "TCP", - "port": 6379, - "targetPort": "redis-server" - } - ], - "selector": { - "name": "redis", - "role": "slave" - }, - "clusterIP": "10.0.0.140", - "sessionAffinity": "None" - }, - "status": {} -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/service_account.json b/vendor/gems/kubeclient/test/json/service_account.json deleted file mode 100644 index 632d429260d..00000000000 --- a/vendor/gems/kubeclient/test/json/service_account.json +++ /dev/null @@ -1,25 +0,0 @@ -{ - "kind": "ServiceAccount", - "apiVersion": "v1", - "metadata": { - "name": "default", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/serviceaccounts/default", - "uid": "d3d773f4-6bf0-11e5-843a-525400f8b93e", - "resourceVersion": "94", - "creationTimestamp": "2015-10-06T06:09:39Z" - }, - "secrets": [ - { - "name": "default-token-6s23q" - }, - { - "name": "default-dockercfg-62tf3" - } - ], - "imagePullSecrets": [ - { - "name": "default-dockercfg-62tf3" - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/service_account_list.json b/vendor/gems/kubeclient/test/json/service_account_list.json deleted file mode 100644 index 934e729ed08..00000000000 --- a/vendor/gems/kubeclient/test/json/service_account_list.json +++ /dev/null @@ -1,82 +0,0 @@ -{ - "kind": "List", - "apiVersion": "v1", - "metadata": {}, - "items": [ - { - "kind": "ServiceAccount", - "apiVersion": "v1", - "metadata": { - "name": "builder", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/serviceaccounts/builder", - "uid": "d40655f6-6bf0-11e5-843a-525400f8b93e", - "resourceVersion": "133", - "creationTimestamp": "2015-10-06T06:09:39Z" - }, - "secrets": [ - { - "name": "builder-token-5v6z2" - }, - { - "name": "builder-dockercfg-qe2re" - } - ], - "imagePullSecrets": [ - { - "name": "builder-dockercfg-qe2re" - } - ] - }, - { - "kind": "ServiceAccount", - "apiVersion": "v1", - "metadata": { - "name": "default", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/serviceaccounts/default", - "uid": "d3d773f4-6bf0-11e5-843a-525400f8b93e", - "resourceVersion": "94", - "creationTimestamp": "2015-10-06T06:09:39Z" - }, - "secrets": [ - { - "name": "default-token-6s23q" - }, - { - "name": "default-dockercfg-62tf3" - } - ], - "imagePullSecrets": [ - { - "name": "default-dockercfg-62tf3" - } - ] - }, - { - "kind": "ServiceAccount", - "apiVersion": "v1", - "metadata": { - "name": "deployer", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/serviceaccounts/deployer", - "uid": "d41d385e-6bf0-11e5-843a-525400f8b93e", - "resourceVersion": "137", - "creationTimestamp": "2015-10-06T06:09:39Z" - }, - "secrets": [ - { - "name": "deployer-token-h3i57" - }, - { - "name": "deployer-dockercfg-qgjjj" - } - ], - "imagePullSecrets": [ - { - "name": "deployer-dockercfg-qgjjj" - } - ] - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/service_illegal_json_404.json b/vendor/gems/kubeclient/test/json/service_illegal_json_404.json deleted file mode 100644 index faa82b3aa87..00000000000 --- a/vendor/gems/kubeclient/test/json/service_illegal_json_404.json +++ /dev/null @@ -1 +0,0 @@ -404: Page Not Found
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/service_json_patch.json b/vendor/gems/kubeclient/test/json/service_json_patch.json deleted file mode 100644 index f960242ba4d..00000000000 --- a/vendor/gems/kubeclient/test/json/service_json_patch.json +++ /dev/null @@ -1,26 +0,0 @@ -{ - "status" : {}, - "kind" : "Service", - "apiVersion" : "v1", - "spec" : { - "ports" : [ - { - "targetPort" : 80, - "nodePort" : 0, - "port" : 80, - "protocol" : "TCP" - } - ], - "clusterIP" : "1.2.3.4", - "type": "LoadBalancer" - }, - "metadata" : { - "name" : "my-service", - "creationTimestamp" : null, - "namespace" : "development", - "resourceVersion" : "2", - "annotations" : { - "key" : "value" - } - } -} diff --git a/vendor/gems/kubeclient/test/json/service_list.json b/vendor/gems/kubeclient/test/json/service_list.json deleted file mode 100644 index f0f97a12c4e..00000000000 --- a/vendor/gems/kubeclient/test/json/service_list.json +++ /dev/null @@ -1,97 +0,0 @@ -{ - "kind": "ServiceList", - "apiVersion": "v1", - "metadata": { - "selfLink": "/api/v1/services", - "resourceVersion": "36727" - }, - "items": [ - { - "metadata": { - "name": "kubernetes", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/services/kubernetes", - "uid": "b6606490-db86-11e4-b293-f8b156af4ae1", - "resourceVersion": "6", - "creationTimestamp": "2015-04-05T11:27:15Z", - "labels": { - "component": "apiserver", - "provider": "kubernetes" - } - }, - "spec": { - "ports": [ - { - "name": "", - "protocol": "TCP", - "port": 443, - "targetPort": 443 - } - ], - "selector": null, - "clusterIP": "10.0.0.2", - "sessionAffinity": "None" - }, - "status": {} - }, - { - "metadata": { - "name": "kubernetes-ro", - "namespace": "default", - "selfLink": "/api/v1/namespaces/default/services/kubernetes-ro", - "uid": "b6606694-db86-11e4-b293-f8b156af4ae1", - "resourceVersion": "5", - "creationTimestamp": "2015-04-05T11:27:15Z", - "labels": { - "component": "apiserver", - "provider": "kubernetes" - } - }, - "spec": { - "ports": [ - { - "name": "", - "protocol": "TCP", - "port": 80, - "targetPort": 80 - } - ], - "selector": null, - "clusterIP": "10.0.0.1", - "sessionAffinity": "None" - }, - "status": {} - }, - { - "metadata": { - "name": "redis-slave", - "namespace": "development", - "selfLink": "/api/v1/namespaces/development/services/redis-slave", - "uid": "bdb80a8f-db93-11e4-b293-f8b156af4ae1", - "resourceVersion": "2815", - "creationTimestamp": "2015-04-05T13:00:31Z", - "labels": { - "name": "redis", - "role": "slave" - } - }, - "spec": { - "ports": [ - { - "name": "", - "protocol": "TCP", - "port": 6379, - "targetPort": "redis-server" - } - ], - "selector": { - "name": "redis", - "role": "slave" - }, - "clusterIP": "10.0.0.140", - "sessionAffinity": "None" - }, - "status": {} - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/service_merge_patch.json b/vendor/gems/kubeclient/test/json/service_merge_patch.json deleted file mode 100644 index 5a9cf7dd384..00000000000 --- a/vendor/gems/kubeclient/test/json/service_merge_patch.json +++ /dev/null @@ -1,26 +0,0 @@ -{ - "status" : {}, - "kind" : "Service", - "apiVersion" : "v1", - "spec" : { - "ports" : [ - { - "targetPort" : 80, - "nodePort" : 0, - "port" : 80, - "protocol" : "TCP" - } - ], - "clusterIP" : "1.2.3.4", - "type": "NodePort" - }, - "metadata" : { - "name" : "my-service", - "creationTimestamp" : null, - "namespace" : "development", - "resourceVersion" : "2", - "annotations" : { - "key" : "value" - } - } -} diff --git a/vendor/gems/kubeclient/test/json/service_patch.json b/vendor/gems/kubeclient/test/json/service_patch.json deleted file mode 100644 index d6c9c29e691..00000000000 --- a/vendor/gems/kubeclient/test/json/service_patch.json +++ /dev/null @@ -1,25 +0,0 @@ -{ - "status" : {}, - "kind" : "Service", - "apiVersion" : "v1", - "spec" : { - "ports" : [ - { - "targetPort" : 80, - "nodePort" : 0, - "port" : 80, - "protocol" : "TCP" - } - ], - "clusterIP" : "1.2.3.4" - }, - "metadata" : { - "name" : "my_service", - "creationTimestamp" : null, - "namespace" : "development", - "resourceVersion" : "2", - "annotations" : { - "key" : "value" - } - } -} diff --git a/vendor/gems/kubeclient/test/json/service_update.json b/vendor/gems/kubeclient/test/json/service_update.json deleted file mode 100644 index 1053d750e60..00000000000 --- a/vendor/gems/kubeclient/test/json/service_update.json +++ /dev/null @@ -1,22 +0,0 @@ -{ - "status" : {}, - "kind" : "Service", - "apiVersion" : "v1", - "spec" : { - "ports" : [ - { - "targetPort" : 80, - "nodePort" : 0, - "port" : 80, - "protocol" : "TCP" - } - ], - "clusterIP" : "1.2.3.4" - }, - "metadata" : { - "name" : "my_service", - "creationTimestamp" : null, - "namespace" : "default", - "resourceVersion" : "2" - } -} diff --git a/vendor/gems/kubeclient/test/json/template.json b/vendor/gems/kubeclient/test/json/template.json deleted file mode 100644 index 85d8bad748e..00000000000 --- a/vendor/gems/kubeclient/test/json/template.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "apiVersion": "template.openshift.io/v1", - "kind": "Template", - "metadata": { - "creationTimestamp": "2018-12-17T16:11:36Z", - "name": "my-template", - "namespace": "default", - "resourceVersion": "21954", - "selfLink": "/apis/template.openshift.io/v1/namespaces/default/templates/my-template", - "uid": "6e03e3e6-0216-11e9-b1e0-68f728fac3ab" - }, - "objects": [ - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "${NAME_PREFIX}my-service" - } - } - ], - "parameters": [ - { - "description": "Prefix for names", - "name": "NAME_PREFIX" - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/template.openshift.io_api_resource_list.json b/vendor/gems/kubeclient/test/json/template.openshift.io_api_resource_list.json deleted file mode 100644 index 1ba147f795d..00000000000 --- a/vendor/gems/kubeclient/test/json/template.openshift.io_api_resource_list.json +++ /dev/null @@ -1,75 +0,0 @@ -{ - "kind": "APIResourceList", - "apiVersion": "v1", - "groupVersion": "template.openshift.io/v1", - "resources": [ - { - "name": "brokertemplateinstances", - "singularName": "", - "namespaced": false, - "kind": "BrokerTemplateInstance", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ] - }, - { - "name": "processedtemplates", - "singularName": "", - "namespaced": true, - "kind": "Template", - "verbs": [ - "create" - ] - }, - { - "name": "templateinstances", - "singularName": "", - "namespaced": true, - "kind": "TemplateInstance", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ] - }, - { - "name": "templateinstances/status", - "singularName": "", - "namespaced": true, - "kind": "TemplateInstance", - "verbs": [ - "get", - "patch", - "update" - ] - }, - { - "name": "templates", - "singularName": "", - "namespaced": true, - "kind": "Template", - "verbs": [ - "create", - "delete", - "deletecollection", - "get", - "list", - "patch", - "update", - "watch" - ] - } - ] -}
\ No newline at end of file diff --git a/vendor/gems/kubeclient/test/json/template_list.json b/vendor/gems/kubeclient/test/json/template_list.json deleted file mode 100644 index a0f84ad3e01..00000000000 --- a/vendor/gems/kubeclient/test/json/template_list.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "kind": "TemplateList", - "apiVersion": "template.openshift.io/v1", - "metadata": { - "selfLink": "/apis/template.openshift.io/v1/namespaces/default/templates", - "resourceVersion": "22758" - }, - "items": [ - { - "metadata": { - "name": "my-template", - "namespace": "default", - "selfLink": "/apis/template.openshift.io/v1/namespaces/default/templates/my-template", - "uid": "6e03e3e6-0216-11e9-b1e0-68f728fac3ab", - "resourceVersion": "21954", - "creationTimestamp": "2018-12-17T16:11:36Z" - }, - "objects": [ - { - "apiVersion": "v1", - "kind": "Service", - "metadata": { - "name": "${NAME_PREFIX}my-service" - } - } - ], - "parameters": [ - { - "name": "NAME_PREFIX", - "description": "Prefix for names" - } - ] - } - ] -} diff --git a/vendor/gems/kubeclient/test/json/versions_list.json b/vendor/gems/kubeclient/test/json/versions_list.json deleted file mode 100644 index 372e101b6ab..00000000000 --- a/vendor/gems/kubeclient/test/json/versions_list.json +++ /dev/null @@ -1,6 +0,0 @@ -{ - "versions": [ - "v1beta3", - "v1" - ] -} diff --git a/vendor/gems/kubeclient/test/json/watch_stream.json b/vendor/gems/kubeclient/test/json/watch_stream.json deleted file mode 100644 index aa8f03dd078..00000000000 --- a/vendor/gems/kubeclient/test/json/watch_stream.json +++ /dev/null @@ -1,3 +0,0 @@ -{"type":"ADDED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"php","namespace":"default","selfLink":"/api/v1/pods/php","uid":"e75f2c07-b047-11e4-89e4-525400c903c1","resourceVersion":"1389","creationTimestamp":"2015-02-09T05:39:19-05:00","labels":{"name":"foo"}},"spec":{"volumes":null,"containers":[{"name":"nginx","image":"dockerfile/nginx","ports":[{"hostPort":9090,"containerPort":80,"protocol":"TCP"}],"resources":{},"livenessProbe":{"httpGet":{"path":"/index.html","port":"9090"},"initialDelaySeconds":30},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{}}}],"restartPolicy":{"always":{}},"dnsPolicy":"ClusterFirst"},"status":{"phase":"Pending"}}} -{"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"php","namespace":"default","selfLink":"/api/v1/pods/php","uid":"e75f2c07-b047-11e4-89e4-525400c903c1","resourceVersion":"1390","creationTimestamp":"2015-02-09T05:39:19-05:00","labels":{"name":"foo"}},"spec":{"volumes":null,"containers":[{"name":"nginx","image":"dockerfile/nginx","ports":[{"hostPort":9090,"containerPort":80,"protocol":"TCP"}],"resources":{},"livenessProbe":{"httpGet":{"path":"/index.html","port":"9090"},"initialDelaySeconds":30},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{}}}],"restartPolicy":{"always":{}},"dnsPolicy":"ClusterFirst"},"status":{"phase":"Pending","host":"127.0.0.1"}}} -{"type":"DELETED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"php","namespace":"default","selfLink":"/api/v1/pods/php","uid":"e75f2c07-b047-11e4-89e4-525400c903c1","resourceVersion":"1398","creationTimestamp":"2015-02-09T05:39:19-05:00","labels":{"name":"foo"}},"spec":{"volumes":null,"containers":[{"name":"nginx","image":"dockerfile/nginx","ports":[{"hostPort":9090,"containerPort":80,"protocol":"TCP"}],"resources":{},"livenessProbe":{"httpGet":{"path":"/index.html","port":"9090"},"initialDelaySeconds":30},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{}}}],"restartPolicy":{"always":{}},"dnsPolicy":"ClusterFirst"},"status":{"phase":"Pending","host":"127.0.0.1"}}} diff --git a/vendor/gems/kubeclient/test/test_common.rb b/vendor/gems/kubeclient/test/test_common.rb deleted file mode 100644 index 32bf826085d..00000000000 --- a/vendor/gems/kubeclient/test/test_common.rb +++ /dev/null @@ -1,95 +0,0 @@ - -require_relative 'test_helper' - -# Unit tests for the common module -class CommonTest < MiniTest::Test - class ClientStub - include Kubeclient::ClientMixin - end - - def client - @client ||= ClientStub.new - end - - def test_underscore_entity - %w[ - Pod pod - Service service - ReplicationController replication_controller - Node node - Event event - Endpoint endpoint - Namespace namespace - Secret secret - ResourceQuota resource_quota - LimitRange limit_range - PersistentVolume persistent_volume - PersistentVolumeClaim persistent_volume_claim - ComponentStatus component_status - ServiceAccount service_account - Project project - Route route - ClusterRoleBinding cluster_role_binding - Build build - BuildConfig build_config - Image image - ImageStream image_stream - dogstatsd dogstatsd - lowerCamelUPPERCase lower_camel_uppercase - HTTPAPISpecBinding httpapispec_binding - APIGroup apigroup - APIGroupList apigroup_list - APIResourceList apiresource_list - APIService apiservice - APIServiceList apiservice_list - APIVersions apiversions - OAuthAccessToken oauth_access_token - OAuthAccessTokenList oauth_access_token_list - OAuthAuthorizeToken oauth_authorize_token - OAuthAuthorizeTokenList oauth_authorize_token_list - OAuthClient oauth_client - OAuthClientAuthorization oauth_client_authorization - OAuthClientAuthorizationList oauth_client_authorization_list - OAuthClientList oauth_client_list - ].each_slice(2) do |kind, expected_underscore| - underscore = Kubeclient::ClientMixin.underscore_entity(kind) - assert_equal(underscore, expected_underscore) - end - end - - def test_format_datetime_with_string - value = '2018-04-27T18:30:17.480321984Z' - formatted = client.send(:format_datetime, value) - assert_equal(formatted, value) - end - - def test_format_datetime_with_datetime - value = DateTime.new(2018, 4, 30, 19, 20, 33) - formatted = client.send(:format_datetime, value) - assert_equal(formatted, '2018-04-30T19:20:33.000000000+00:00') - end - - def test_format_datetime_with_time - value = Time.new(2018, 4, 30, 19, 20, 33, 0) - formatted = client.send(:format_datetime, value) - assert_equal(formatted, '2018-04-30T19:20:33.000000000+00:00') - end - - def test_parse_definition_with_unconventional_names - %w[ - PluralPolicy pluralpolicies plural_policy plural_policies - LatinDatum latindata latin_datum latin_data - Noseparator noseparators noseparator noseparators - lowercase lowercases lowercase lowercases - TestWithDash test-with-dashes test_with_dash test_with_dashes - TestUnderscore test_underscores test_underscore test_underscores - TestMismatch other-odd-name testmismatch otheroddname - MixedDashMinus mixed-dash_minuses mixed_dash_minus mixed_dash_minuses - SameUptoWordboundary sameup-toword-boundarys sameuptowordboundary sameuptowordboundarys - ].each_slice(4) do |kind, plural, expected_single, expected_plural| - method_names = Kubeclient::ClientMixin.parse_definition(kind, plural).method_names - assert_equal(method_names[0], expected_single) - assert_equal(method_names[1], expected_plural) - end - end -end diff --git a/vendor/gems/kubeclient/test/test_common_url_handling.rb b/vendor/gems/kubeclient/test/test_common_url_handling.rb deleted file mode 100644 index e7798c2f489..00000000000 --- a/vendor/gems/kubeclient/test/test_common_url_handling.rb +++ /dev/null @@ -1,160 +0,0 @@ -require_relative 'test_helper' - -# URLHandling tests -class TestCommonUrlHandling < MiniTest::Test - def test_no_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s) - end - - def test_with_api_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080/api', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s) - end - - def test_with_api_path_in_uri_other_version - client = Kubeclient::Client.new('http://localhost:8080/api', 'v2') - rest_client = client.rest_client - assert_equal('v2', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/api/v2', rest_client.url.to_s) - end - - def test_with_api_group_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080/apis/this_is_the_group', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('this_is_the_group/', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/apis/this_is_the_group/v1', rest_client.url.to_s) - end - - def test_with_api_group_path_in_uri_other_version - client = Kubeclient::Client.new('http://localhost:8080/apis/this_is_the_group', 'v2') - rest_client = client.rest_client - assert_equal('v2', client.instance_variable_get(:@api_version)) - assert_equal('this_is_the_group/', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/apis/this_is_the_group/v2', rest_client.url.to_s) - end - - def test_with_api_path_in_uri_trailing_slash - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s) - end - - def test_with_api_path_in_api - client = Kubeclient::Client.new('http://localhost:8080/api/but/I/want/a/hidden/k8s/api', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/api/but/I/want/a/hidden/k8s/api/v1', rest_client.url.to_s) - end - - def test_with_api_group_path_in_api - client = Kubeclient::Client.new( - 'http://localhost:8080/api/but/I/want/a/hidden/k8s/apis/this_is_the_group', - 'v1' - ) - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('this_is_the_group/', client.instance_variable_get(:@api_group)) - assert_equal( - 'http://localhost:8080/api/but/I/want/a/hidden/k8s/apis/this_is_the_group/v1', - rest_client.url.to_s - ) - end - - def test_rancher_with_api_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080/k8s/clusters/c-somerancherID/api', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/k8s/clusters/c-somerancherID/api/v1', rest_client.url.to_s) - end - - def test_rancher_no_api_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080/k8s/clusters/c-somerancherID', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/k8s/clusters/c-somerancherID/api/v1', rest_client.url.to_s) - end - - def test_rancher_no_api_path_in_uri_trailing_slash - client = Kubeclient::Client.new('http://localhost:8080/k8s/clusters/c-somerancherID/', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/k8s/clusters/c-somerancherID/api/v1', rest_client.url.to_s) - end - - def test_rancher_with_api_path_in_uri_trailing_slash - client = Kubeclient::Client.new('http://localhost:8080/k8s/clusters/c-somerancherID/api/', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/k8s/clusters/c-somerancherID/api/v1', rest_client.url.to_s) - end - - def test_rancher_with_api_group_in_uri_trailing_slash - client = Kubeclient::Client.new( - 'http://localhost:8080/k8s/clusters/c-somerancherID/apis/this_is_the_group', - 'v1' - ) - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('this_is_the_group/', client.instance_variable_get(:@api_group)) - assert_equal( - 'http://localhost:8080/k8s/clusters/c-somerancherID/apis/this_is_the_group/v1', - rest_client.url.to_s - ) - end - - def test_with_openshift_api_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080/oapi', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/oapi/v1', rest_client.url.to_s) - end - - def test_arbitrary_path_with_openshift_api_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080/foobarbaz/oapi', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/foobarbaz/oapi/v1', rest_client.url.to_s) - end - - def test_with_openshift_api_path_in_uri_trailing_slash - client = Kubeclient::Client.new('http://localhost:8080/oapi/', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/oapi/v1', rest_client.url.to_s) - end - - def test_with_arbitrary_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080/foobarbaz', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/foobarbaz/api/v1', rest_client.url.to_s) - end - - def test_with_arbitrary_and_api_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080/foobarbaz/api', 'v1') - rest_client = client.rest_client - assert_equal('v1', client.instance_variable_get(:@api_version)) - assert_equal('', client.instance_variable_get(:@api_group)) - assert_equal('http://localhost:8080/foobarbaz/api/v1', rest_client.url.to_s) - end -end diff --git a/vendor/gems/kubeclient/test/test_component_status.rb b/vendor/gems/kubeclient/test/test_component_status.rb deleted file mode 100644 index 7bb4ca1ad51..00000000000 --- a/vendor/gems/kubeclient/test/test_component_status.rb +++ /dev/null @@ -1,29 +0,0 @@ -require_relative 'test_helper' - -# ComponentStatus tests -class TestComponentStatus < MiniTest::Test - def test_get_from_json_v3 - stub_core_api_list - stub_request(:get, %r{/componentstatuses}) - .to_return(body: open_test_file('component_status.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - component_status = client.get_component_status('etcd-0', 'default') - - assert_instance_of(Kubeclient::Resource, component_status) - assert_equal('etcd-0', component_status.metadata.name) - assert_equal('Healthy', component_status.conditions[0].type) - assert_equal('True', component_status.conditions[0].status) - - assert_requested( - :get, - 'http://localhost:8080/api/v1', - times: 1 - ) - assert_requested( - :get, - 'http://localhost:8080/api/v1/namespaces/default/componentstatuses/etcd-0', - times: 1 - ) - end -end diff --git a/vendor/gems/kubeclient/test/test_config.rb b/vendor/gems/kubeclient/test/test_config.rb deleted file mode 100644 index d47827e0393..00000000000 --- a/vendor/gems/kubeclient/test/test_config.rb +++ /dev/null @@ -1,271 +0,0 @@ -require_relative 'test_helper' -require 'yaml' -require 'open3' - -# Testing Kubernetes client configuration -class KubeclientConfigTest < MiniTest::Test - def test_allinone - config = Kubeclient::Config.read(config_file('allinone.kubeconfig')) - assert_equal(['Default'], config.contexts) - check_context(config.context, ssl: true, custom_ca: true, client_cert: true) - end - - def test_external - config = Kubeclient::Config.read(config_file('external.kubeconfig')) - assert_equal(['Default'], config.contexts) - check_context(config.context, ssl: true, custom_ca: true, client_cert: true) - end - - def test_explicit_secure - config = Kubeclient::Config.read(config_file('secure.kubeconfig')) - assert_equal(['Default'], config.contexts) - # Same as external.kubeconfig, but with explicit `insecure-skip-tls-verify: false` - check_context(config.context, ssl: true, custom_ca: true, client_cert: true) - end - - def test_external_public_ca - config = Kubeclient::Config.read(config_file('external-without-ca.kubeconfig')) - assert_equal(['Default'], config.contexts) - # Same as external.kubeconfig, no custom CA data (cluster has a publicly trusted cert) - check_context(config.context, ssl: true, custom_ca: false, client_cert: true) - end - - def test_secure_public_ca - config = Kubeclient::Config.read(config_file('secure-without-ca.kubeconfig')) - assert_equal(['Default'], config.contexts) - # no custom CA data + explicit `insecure-skip-tls-verify: false` - check_context(config.context, ssl: true, custom_ca: false, client_cert: true) - end - - def test_insecure - config = Kubeclient::Config.read(config_file('insecure.kubeconfig')) - assert_equal(['Default'], config.contexts) - # Has explicit `insecure-skip-tls-verify: false` - check_context(config.context, ssl: false, custom_ca: false, client_cert: true) - end - - def test_insecure_custom_ca - config = Kubeclient::Config.read(config_file('insecure-custom-ca.kubeconfig')) - assert_equal(['Default'], config.contexts) - # Has explicit `insecure-skip-tls-verify: false` - check_context(config.context, ssl: false, custom_ca: true, client_cert: true) - end - - def test_allinone_nopath - yaml = File.read(config_file('allinone.kubeconfig')) - # A self-contained config shouldn't depend on kcfg_path. - config = Kubeclient::Config.new(YAML.safe_load(yaml), nil) - assert_equal(['Default'], config.contexts) - check_context(config.context, ssl: true, custom_ca: true, client_cert: true) - end - - def test_external_nopath - yaml = File.read(config_file('external.kubeconfig')) - # kcfg_path = nil should prevent file access - config = Kubeclient::Config.new(YAML.safe_load(yaml), nil) - assert_raises(StandardError) do - config.context - end - end - - def test_external_nopath_absolute - yaml = File.read(config_file('external.kubeconfig')) - # kcfg_path = nil should prevent file access, even if absolute path specified - ca_absolute_path = File.absolute_path(config_file('external-')) - yaml = yaml.gsub('external-', ca_absolute_path) - config = Kubeclient::Config.new(YAML.safe_load(yaml), nil) - assert_raises(StandardError) do - config.context - end - end - - def test_concatenated_ca - config = Kubeclient::Config.read(config_file('concatenated-ca.kubeconfig')) - assert_equal(['Default'], config.contexts) - check_context(config.context, ssl: true) - end - - def test_nouser - config = Kubeclient::Config.read(config_file('nouser.kubeconfig')) - assert_equal(['default/localhost:6443/nouser'], config.contexts) - check_context(config.context, ssl: true, custom_ca: false, client_cert: false) - end - - def test_user_token - config = Kubeclient::Config.read(config_file('userauth.kubeconfig')) - assert_equal(['localhost/system:admin:token', 'localhost/system:admin:userpass'], - config.contexts) - context = config.context('localhost/system:admin:token') - check_context(context, ssl: true, custom_ca: false, client_cert: false) - assert_equal('0123456789ABCDEF0123456789ABCDEF', context.auth_options[:bearer_token]) - end - - def test_user_password - config = Kubeclient::Config.read(config_file('userauth.kubeconfig')) - assert_equal(['localhost/system:admin:token', 'localhost/system:admin:userpass'], - config.contexts) - context = config.context('localhost/system:admin:userpass') - check_context(context, ssl: true, custom_ca: false, client_cert: false) - assert_equal('admin', context.auth_options[:username]) - assert_equal('pAssw0rd123', context.auth_options[:password]) - end - - def test_timestamps - # Test YAML parsing doesn't crash on YAML timestamp syntax. - Kubeclient::Config.read(config_file('timestamps.kubeconfig')) - end - - def test_user_exec - token = '0123456789ABCDEF0123456789ABCDEF' - creds = { - 'apiVersion': 'client.authentication.k8s.io/v1beta1', - 'status': { - 'token': token - } - } - - config = Kubeclient::Config.read(config_file('execauth.kubeconfig')) - assert_equal(['localhost/system:admin:exec-search-path', - 'localhost/system:admin:exec-relative-path', - 'localhost/system:admin:exec-absolute-path'], - config.contexts) - - # A bare command name in config means search PATH, so it's executed as bare command. - stub_exec(%r{^example-exec-plugin$}, creds) do - context = config.context('localhost/system:admin:exec-search-path') - check_context(context, ssl: true, custom_ca: false, client_cert: false) - assert_equal(token, context.auth_options[:bearer_token]) - end - - # A relative path is taken relative to the dir of the kubeconfig. - stub_exec(%r{.*config/dir/example-exec-plugin$}, creds) do - context = config.context('localhost/system:admin:exec-relative-path') - check_context(context, ssl: true, custom_ca: false, client_cert: false) - assert_equal(token, context.auth_options[:bearer_token]) - end - - # An absolute path is taken as-is. - stub_exec(%r{^/abs/path/example-exec-plugin$}, creds) do - context = config.context('localhost/system:admin:exec-absolute-path') - check_context(context, ssl: true, custom_ca: false, client_cert: false) - assert_equal(token, context.auth_options[:bearer_token]) - end - end - - def test_user_exec_nopath - yaml = File.read(config_file('execauth.kubeconfig')) - config = Kubeclient::Config.new(YAML.safe_load(yaml), nil) - config.contexts.each do |context_name| - Open3.stub(:capture3, proc { flunk 'should not execute command' }) do - assert_raises(StandardError) do - config.context(context_name) - end - end - end - end - - def test_gcp_default_auth - Kubeclient::GoogleApplicationDefaultCredentials.expects(:token).returns('token1').once - parsed = load_yaml(config_file('gcpauth.kubeconfig')) - config = Kubeclient::Config.new(parsed, nil) - config.context(config.contexts.first) - end - - # Each call to .context() obtains a new token, calling .auth_options doesn't change anything. - # NOTE: this is not a guarantee, may change, just testing current behavior. - def test_gcp_default_auth_renew - Kubeclient::GoogleApplicationDefaultCredentials.expects(:token).returns('token1').once - parsed = load_yaml(config_file('gcpauth.kubeconfig')) - config = Kubeclient::Config.new(parsed, nil) - context = config.context(config.contexts.first) - assert_equal({ bearer_token: 'token1' }, context.auth_options) - assert_equal({ bearer_token: 'token1' }, context.auth_options) - - Kubeclient::GoogleApplicationDefaultCredentials.expects(:token).returns('token2').once - context2 = config.context(config.contexts.first) - assert_equal({ bearer_token: 'token2' }, context2.auth_options) - assert_equal({ bearer_token: 'token1' }, context.auth_options) - end - - def test_gcp_command_auth - Kubeclient::GCPCommandCredentials.expects(:token) - .with('access-token' => '<fake_token>', - 'cmd-args' => 'config config-helper --format=json', - 'cmd-path' => '/path/to/gcloud', - 'expiry' => '2019-04-09 19:26:18 UTC', - 'expiry-key' => '{.credential.token_expiry}', - 'token-key' => '{.credential.access_token}') - .returns('token1') - .once - config = Kubeclient::Config.read(config_file('gcpcmdauth.kubeconfig')) - config.context(config.contexts.first) - end - - def test_oidc_auth_provider - Kubeclient::OIDCAuthProvider.expects(:token) - .with('client-id' => 'fake-client-id', - 'client-secret' => 'fake-client-secret', - 'id-token' => 'fake-id-token', - 'idp-issuer-url' => 'https://accounts.google.com', - 'refresh-token' => 'fake-refresh-token') - .returns('token1') - .once - parsed = YAML.safe_load(File.read(config_file('oidcauth.kubeconfig'))) - config = Kubeclient::Config.new(parsed, nil) - config.context(config.contexts.first) - end - - private - - def check_context(context, ssl: true, custom_ca: true, client_cert: true) - assert_equal('https://localhost:6443', context.api_endpoint) - assert_equal('v1', context.api_version) - assert_equal('default', context.namespace) - if custom_ca - assert_kind_of(OpenSSL::X509::Store, context.ssl_options[:cert_store]) - else - assert_nil(context.ssl_options[:cert_store]) - end - if client_cert - assert_kind_of(OpenSSL::X509::Certificate, context.ssl_options[:client_cert]) - assert_kind_of(OpenSSL::PKey::RSA, context.ssl_options[:client_key]) - if custom_ca - # When certificates expire one way to recreate them is using a k0s single-node cluster: - # test/config/update_certs_k0s.rb - assert(context.ssl_options[:cert_store].verify(context.ssl_options[:client_cert])) - end - else - assert_nil(context.ssl_options[:client_cert]) - assert_nil(context.ssl_options[:client_key]) - end - if ssl - assert_equal(OpenSSL::SSL::VERIFY_PEER, context.ssl_options[:verify_ssl], - 'expected VERIFY_PEER') - else - assert_equal(OpenSSL::SSL::VERIFY_NONE, context.ssl_options[:verify_ssl], - 'expected VERIFY_NONE') - end - end - - def stub_exec(command_regexp, creds) - st = Minitest::Mock.new - st.expect(:success?, true) - - capture3_stub = lambda do |_env, command, *_args| - assert_match command_regexp, command - [JSON.dump(creds), nil, st] - end - - Open3.stub(:capture3, capture3_stub) do - yield - end - end - - def load_yaml(file_name) - if RUBY_VERSION >= '2.6' - YAML.safe_load(File.read(file_name), permitted_classes: [Date, Time]) - else - YAML.safe_load(File.read(file_name), [Date, Time]) - end - end -end diff --git a/vendor/gems/kubeclient/test/test_endpoint.rb b/vendor/gems/kubeclient/test/test_endpoint.rb deleted file mode 100644 index ec2cd9306d4..00000000000 --- a/vendor/gems/kubeclient/test/test_endpoint.rb +++ /dev/null @@ -1,54 +0,0 @@ -require_relative 'test_helper' - -# kind: 'Endpoints' entity tests. -# This is one of the unusual `kind`s that are already plural (https://github.com/kubernetes/kubernetes/issues/8115). -# We force singular in method names like 'create_endpoint', -# but `kind` should remain plural as in kubernetes. -class TestEndpoint < MiniTest::Test - def test_create_endpoint - stub_core_api_list - testing_ep = Kubeclient::Resource.new - testing_ep.metadata = {} - testing_ep.metadata.name = 'myendpoint' - testing_ep.metadata.namespace = 'default' - testing_ep.subsets = [ - { - 'addresses' => [{ 'ip' => '172.17.0.25' }], - 'ports' => [{ 'name' => 'https', 'port' => 6443, 'protocol' => 'TCP' }] - } - ] - - req_body = '{"metadata":{"name":"myendpoint","namespace":"default"},' \ - '"subsets":[{"addresses":[{"ip":"172.17.0.25"}],"ports":[{"name":"https",' \ - '"port":6443,"protocol":"TCP"}]}],"kind":"Endpoints","apiVersion":"v1"}' - - stub_request(:post, 'http://localhost:8080/api/v1/namespaces/default/endpoints') - .with(body: req_body) - .to_return(body: open_test_file('created_endpoint.json'), status: 201) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - created_ep = client.create_endpoint(testing_ep) - assert_equal('Endpoints', created_ep.kind) - assert_equal('v1', created_ep.apiVersion) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1', as: :parsed_symbolized) - created_ep = client.create_endpoint(testing_ep) - assert_equal('Endpoints', created_ep[:kind]) - assert_equal('v1', created_ep[:apiVersion]) - end - - def test_get_endpoints - stub_core_api_list - stub_request(:get, %r{/endpoints}) - .to_return(body: open_test_file('endpoint_list.json'), status: 200) - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - - collection = client.get_endpoints(as: :parsed_symbolized) - assert_equal('EndpointsList', collection[:kind]) - assert_equal('v1', collection[:apiVersion]) - - # Stripping of 'List' in collection.kind RecursiveOpenStruct mode only is historic. - collection = client.get_endpoints - assert_equal('Endpoints', collection.kind) - end -end diff --git a/vendor/gems/kubeclient/test/test_exec_credentials.rb b/vendor/gems/kubeclient/test/test_exec_credentials.rb deleted file mode 100644 index f0e51827f55..00000000000 --- a/vendor/gems/kubeclient/test/test_exec_credentials.rb +++ /dev/null @@ -1,225 +0,0 @@ -require_relative 'test_helper' -require 'open3' - -# Unit tests for the ExecCredentials provider -class ExecCredentialsTest < MiniTest::Test - def test_exec_opts_missing - expected_msg = - 'exec options are required' - exception = assert_raises(ArgumentError) do - Kubeclient::ExecCredentials.run(nil) - end - assert_equal(expected_msg, exception.message) - end - - def test_exec_command_missing - expected_msg = - 'exec command is required' - exception = assert_raises(KeyError) do - Kubeclient::ExecCredentials.run({}) - end - assert_equal(expected_msg, exception.message) - end - - def test_exec_command_failure - err = 'Error' - expected_msg = - "exec command failed: #{err}" - - st = Minitest::Mock.new - st.expect(:success?, false) - - opts = { 'command' => 'dummy' } - - Open3.stub(:capture3, [nil, err, st]) do - exception = assert_raises(RuntimeError) do - Kubeclient::ExecCredentials.run(opts) - end - assert_equal(expected_msg, exception.message) - end - end - - def test_run_with_token_credentials - opts = { 'command' => 'dummy' } - - credentials = { - 'token' => '0123456789ABCDEF0123456789ABCDEF' - } - - creds = JSON.dump( - 'apiVersion' => 'client.authentication.k8s.io/v1alpha1', - 'status' => credentials - ) - - st = Minitest::Mock.new - st.expect(:success?, true) - - Open3.stub(:capture3, [creds, nil, st]) do - assert_equal(credentials, Kubeclient::ExecCredentials.run(opts)) - end - end - - def test_run_with_client_credentials - opts = { 'command' => 'dummy' } - - credentials = { - 'clientCertificateData' => '0123456789ABCDEF0123456789ABCDEF', - 'clientKeyData' => '0123456789ABCDEF0123456789ABCDEF' - } - - creds = JSON.dump( - 'apiVersion' => 'client.authentication.k8s.io/v1alpha1', - 'status' => credentials - ) - - st = Minitest::Mock.new - st.expect(:success?, true) - - Open3.stub(:capture3, [creds, nil, st]) do - assert_equal(credentials, Kubeclient::ExecCredentials.run(opts)) - end - end - - def test_run_with_missing_client_certificate_data - opts = { 'command' => 'dummy' } - - credentials = { - 'clientKeyData' => '0123456789ABCDEF0123456789ABCDEF' - } - - creds = JSON.dump( - 'apiVersion' => 'client.authentication.k8s.io/v1alpha1', - 'status' => credentials - ) - - st = Minitest::Mock.new - st.expect(:success?, true) - - expected_msg = 'exec plugin didn\'t return client certificate data' - - Open3.stub(:capture3, [creds, nil, st]) do - exception = assert_raises(RuntimeError) do - Kubeclient::ExecCredentials.run(opts) - end - assert_equal(expected_msg, exception.message) - end - end - - def test_run_with_missing_client_key_data - opts = { 'command' => 'dummy' } - - credentials = { - 'clientCertificateData' => '0123456789ABCDEF0123456789ABCDEF' - } - - creds = JSON.dump( - 'apiVersion' => 'client.authentication.k8s.io/v1alpha1', - 'status' => credentials - ) - - st = Minitest::Mock.new - st.expect(:success?, true) - - expected_msg = 'exec plugin didn\'t return client key data' - - Open3.stub(:capture3, [creds, nil, st]) do - exception = assert_raises(RuntimeError) do - Kubeclient::ExecCredentials.run(opts) - end - assert_equal(expected_msg, exception.message) - end - end - - def test_run_with_client_data_and_token - opts = { 'command' => 'dummy' } - - credentials = { - 'clientCertificateData' => '0123456789ABCDEF0123456789ABCDEF', - 'clientKeyData' => '0123456789ABCDEF0123456789ABCDEF', - 'token' => '0123456789ABCDEF0123456789ABCDEF' - } - - creds = JSON.dump( - 'apiVersion' => 'client.authentication.k8s.io/v1alpha1', - 'status' => credentials - ) - - st = Minitest::Mock.new - st.expect(:success?, true) - - expected_msg = 'exec plugin returned both token and client data' - - Open3.stub(:capture3, [creds, nil, st]) do - exception = assert_raises(RuntimeError) do - Kubeclient::ExecCredentials.run(opts) - end - assert_equal(expected_msg, exception.message) - end - end - - def test_status_missing - opts = { 'command' => 'dummy' } - - creds = JSON.dump('apiVersion' => 'client.authentication.k8s.io/v1alpha1') - - st = Minitest::Mock.new - st.expect(:success?, true) - - expected_msg = 'exec plugin didn\'t return a status field' - - Open3.stub(:capture3, [creds, nil, st]) do - exception = assert_raises(RuntimeError) do - Kubeclient::ExecCredentials.run(opts) - end - assert_equal(expected_msg, exception.message) - end - end - - def test_credentials_missing - opts = { 'command' => 'dummy' } - - creds = JSON.dump( - 'apiVersion' => 'client.authentication.k8s.io/v1alpha1', - 'status' => {} - ) - - st = Minitest::Mock.new - st.expect(:success?, true) - - expected_msg = 'exec plugin didn\'t return a token or client data' - - Open3.stub(:capture3, [creds, nil, st]) do - exception = assert_raises(RuntimeError) do - Kubeclient::ExecCredentials.run(opts) - end - assert_equal(expected_msg, exception.message) - end - end - - def test_api_version_mismatch - api_version = 'client.authentication.k8s.io/v1alpha1' - expected_version = 'client.authentication.k8s.io/v1beta1' - - opts = { - 'command' => 'dummy', - 'apiVersion' => expected_version - } - - creds = JSON.dump( - 'apiVersion' => api_version - ) - - st = Minitest::Mock.new - st.expect(:success?, true) - - expected_msg = "exec plugin is configured to use API version #{expected_version}," \ - " plugin returned version #{api_version}" - - Open3.stub(:capture3, [creds, nil, st]) do - exception = assert_raises(RuntimeError) do - Kubeclient::ExecCredentials.run(opts) - end - assert_equal(expected_msg, exception.message) - end - end -end diff --git a/vendor/gems/kubeclient/test/test_gcp_command_credentials.rb b/vendor/gems/kubeclient/test/test_gcp_command_credentials.rb deleted file mode 100644 index f95b8fd045e..00000000000 --- a/vendor/gems/kubeclient/test/test_gcp_command_credentials.rb +++ /dev/null @@ -1,27 +0,0 @@ -require_relative 'test_helper' -require 'open3' - -# Unit tests for the GCPCommandCredentials token provider -class GCPCommandCredentialsTest < MiniTest::Test - def test_token - opts = { 'cmd-args' => 'config config-helper --format=json', - 'cmd-path' => '/path/to/gcloud', - 'expiry-key' => '{.credential.token_expiry}', - 'token-key' => '{.credential.access_token}' } - - creds = JSON.dump( - 'credential' => { - 'access_token' => '9A3A941836F2458175BE18AA1971EBBF47949B07', - 'token_expiry' => '2019-04-12T15:02:51Z' - } - ) - - st = Minitest::Mock.new - st.expect(:success?, true) - - Open3.stub(:capture3, [creds, nil, st]) do - assert_equal('9A3A941836F2458175BE18AA1971EBBF47949B07', - Kubeclient::GCPCommandCredentials.token(opts)) - end - end -end diff --git a/vendor/gems/kubeclient/test/test_google_application_default_credentials.rb b/vendor/gems/kubeclient/test/test_google_application_default_credentials.rb deleted file mode 100644 index 238ae729c16..00000000000 --- a/vendor/gems/kubeclient/test/test_google_application_default_credentials.rb +++ /dev/null @@ -1,15 +0,0 @@ -require_relative 'test_helper' -require 'googleauth' - -# Unit tests for the ApplicationDefaultCredentials token provider -class GoogleApplicationDefaultCredentialsTest < MiniTest::Test - def test_token - auth = Minitest::Mock.new - auth.expect(:apply, nil, [{}]) - auth.expect(:access_token, 'valid_token') - - Google::Auth.stub(:get_application_default, auth) do - assert_equal('valid_token', Kubeclient::GoogleApplicationDefaultCredentials.token) - end - end -end diff --git a/vendor/gems/kubeclient/test/test_guestbook_go.rb b/vendor/gems/kubeclient/test/test_guestbook_go.rb deleted file mode 100644 index a50e192a0c5..00000000000 --- a/vendor/gems/kubeclient/test/test_guestbook_go.rb +++ /dev/null @@ -1,237 +0,0 @@ -require_relative 'test_helper' -require 'vcr' - -# creation of google's example of guest book -class CreateGuestbookGo < MiniTest::Test - def test_create_guestbook_entities - VCR.configure do |c| - c.cassette_library_dir = 'test/cassettes' - c.hook_into(:webmock) - end - - # WebMock.allow_net_connect! - VCR.use_cassette('kubernetes_guestbook') do # , record: :new_episodes) do - client = Kubeclient::Client.new('http://10.35.0.23:8080/api/', 'v1') - - testing_ns = Kubeclient::Resource.new - testing_ns.metadata = {} - testing_ns.metadata.name = 'kubeclient-ns' - - # delete in case they existed before so creation can be tested - delete_namespace(client, testing_ns.metadata.name) - delete_services( - client, testing_ns.metadata.name, - ['guestbook', 'redis-master', 'redis-slave'] - ) - delete_replication_controllers( - client, testing_ns.metadata.name, - ['guestbook', 'redis-master', 'redis-slave'] - ) - - client.create_namespace(testing_ns) - services = create_services(client, testing_ns.metadata.name) - replicators = create_replication_controllers(client, testing_ns.metadata.name) - - get_namespaces(client) - get_services(client, testing_ns.metadata.name) - get_replication_controllers(client, testing_ns.metadata.name) - - delete_services(client, testing_ns.metadata.name, services) - delete_replication_controllers(client, testing_ns.metadata.name, replicators) - - client.delete_namespace(testing_ns.metadata.name) - end - ensure - VCR.turn_off! - end - - def delete_namespace(client, namespace_name) - client.delete_namespace(namespace_name) - rescue Kubeclient::ResourceNotFoundError => exception - assert_equal(404, exception.error_code) - end - - def get_namespaces(client) - namespaces = client.get_namespaces - assert(true, namespaces.size > 2) - end - - def get_services(client, ns) - retrieved_services = client.get_services(namespace: ns) - assert_equal(3, retrieved_services.size) - end - - def get_replication_controllers(client, ns) - retrieved_replicators = client.get_replication_controllers(namespace: ns) - assert_equal(3, retrieved_replicators.size) - end - - def create_services(client, ns) - guestbook_service = client.create_service(guestbook_service(ns)) - redis_service = client.create_service(redis_service(ns)) - redis_slave_service = client.create_service(redis_slave_service(ns)) - [guestbook_service, redis_service, redis_slave_service] - end - - def create_replication_controllers(client, namespace) - rc = client.create_replication_controller(guestbook_rc(namespace)) - rc2 = client.create_replication_controller(redis_master_rc(namespace)) - rc3 = client.create_replication_controller(redis_slave_rc(namespace)) - [rc, rc2, rc3] - end - - def delete_services(client, namespace, services) - # if the entity is not found, no need to fail the test - services.each do |service| - begin - if service.instance_of?(Kubeclient::Resource) - client.delete_service(service.metadata.name, namespace) - else - # it's just a string - service name - client.delete_service(service, namespace) - end - rescue Kubeclient::ResourceNotFoundError => exception - assert_equal(404, exception.error_code) - end - end - end - - def delete_replication_controllers(client, namespace, replication_controllers) - # if the entity is not found, no need to fail the test - replication_controllers.each do |rc| - begin - if rc.instance_of?(Kubeclient::Resource) - client.delete_replication_controller(rc.metadata.name, namespace) - else - # it's just a string - rc name - client.delete_replication_controller(rc, namespace) - end - rescue Kubeclient::ResourceNotFoundError => exception - assert_equal(404, exception.error_code) - end - end - end - - private - - def construct_base_rc(namespace) - rc = Kubeclient::Resource.new - rc.metadata = {} - rc.metadata.namespace = namespace - rc.metadata.labels = {} - rc.spec = {} - rc.spec.selector = {} - rc.spec.template = {} - rc.spec.template.metadata = {} - rc.spec.template.spec = {} - rc.spec.template.metadata.labels = {} - rc - end - - def redis_master_rc(namespace) - rc = construct_base_rc(namespace) - rc.metadata.name = 'redis-master' - rc.metadata.labels.app = 'redis' - rc.metadata.labels.role = 'master' - rc.spec.replicas = 1 - rc.spec.selector.app = 'redis' - rc.spec.selector.role = 'master' - rc.spec.template.metadata.labels.app = 'redis' - rc.spec.template.metadata.labels.role = 'master' - rc.spec.template.spec.containers = [{ - 'name' => 'redis-master', - 'image' => 'redis', - 'ports' => [{ - 'name' => 'redis-server', - 'containerPort' => 6379 - }] - }] - rc - end - - def redis_slave_rc(namespace) - rc = construct_base_rc(namespace) - rc.metadata.name = 'redis-slave' - rc.metadata.labels.app = 'redis' - rc.metadata.labels.role = 'slave' - rc.spec.replicas = 2 - rc.spec.selector.app = 'redis' - rc.spec.selector.role = 'slave' - rc.spec.template.metadata.labels.app = 'redis' - rc.spec.template.metadata.labels.role = 'slave' - rc.spec.template.spec.containers = [{ - 'name' => 'redis-slave', - 'image' => 'kubernetes/redis-slave:v2', - 'ports' => [{ - 'name' => 'redis-server', - 'containerPort' => 6379 - }] - }] - rc - end - - def guestbook_rc(namespace) - rc = construct_base_rc(namespace) - rc.metadata.name = 'guestbook' - rc.metadata.labels.app = 'guestbook' - rc.metadata.labels.role = 'slave' - rc.spec.replicas = 3 - rc.spec.selector.app = 'guestbook' - rc.spec.template.metadata.labels.app = 'guestbook' - rc.spec.template.spec.containers = [ - { - 'name' => 'guestbook', - 'image' => 'kubernetes/guestbook:v2', - 'ports' => [ - { - 'name' => 'http-server', - 'containerPort' => 3000 - } - ] - } - ] - rc - end - - def base_service(namespace) - our_service = Kubeclient::Resource.new - our_service.metadata = {} - our_service.metadata.namespace = namespace - our_service.metadata.labels = {} - our_service.spec = {} - our_service.spec.selector = {} - our_service - end - - def redis_slave_service(namespace) - our_service = base_service(namespace) - our_service.metadata.name = 'redis-slave' - our_service.metadata.labels.app = 'redis' - our_service.metadata.labels.role = 'slave' - our_service.spec.ports = [{ 'port' => 6379, 'targetPort' => 'redis-server' }] - our_service.spec.selector.app = 'redis' - our_service.spec.selector.role = 'slave' - our_service - end - - def redis_service(namespace) - our_service = base_service(namespace) - our_service.metadata.name = 'redis-master' - our_service.metadata.labels.app = 'redis' - our_service.metadata.labels.role = 'master' - our_service.spec.ports = [{ 'port' => 6379, 'targetPort' => 'redis-server' }] - our_service.spec.selector.app = 'redis' - our_service.spec.selector.role = 'master' - our_service - end - - def guestbook_service(namespace) - our_service = base_service(namespace) - our_service.metadata.name = 'guestbook' - our_service.metadata.labels.name = 'guestbook' - our_service.spec.ports = [{ 'port' => 3000, 'targetPort' => 'http-server' }] - our_service.spec.selector.app = 'guestbook' - our_service.type = 'LoadBalancer' - our_service - end -end diff --git a/vendor/gems/kubeclient/test/test_helper.rb b/vendor/gems/kubeclient/test/test_helper.rb deleted file mode 100644 index 042a08a0d80..00000000000 --- a/vendor/gems/kubeclient/test/test_helper.rb +++ /dev/null @@ -1,28 +0,0 @@ -require 'bundler/setup' -require 'minitest/autorun' -require 'minitest/rg' -require 'webmock/minitest' -require 'mocha/minitest' -require 'json' -require 'kubeclient' - -MiniTest::Test.class_eval do - # Assumes test files will be in a subdirectory with the same name as the - # file suffix. e.g. a file named foo.json would be a "json" subdirectory. - def open_test_file(name) - File.new(File.join(File.dirname(__FILE__), name.split('.').last, name)) - end - - # kubeconfig files deviate from above convention. - # They link to relaved certs etc. with various extensions, all in same dir. - def config_file(name) - File.join(File.dirname(__FILE__), 'config', name) - end - - def stub_core_api_list - stub_request(:get, %r{/api/v1$}) - .to_return(body: open_test_file('core_api_resource_list.json'), status: 200) - end -end - -WebMock.disable_net_connect! diff --git a/vendor/gems/kubeclient/test/test_kubeclient.rb b/vendor/gems/kubeclient/test/test_kubeclient.rb deleted file mode 100644 index f866bfc89df..00000000000 --- a/vendor/gems/kubeclient/test/test_kubeclient.rb +++ /dev/null @@ -1,881 +0,0 @@ -require_relative 'test_helper' - -# Kubernetes client entity tests -class KubeclientTest < MiniTest::Test - def test_json - our_object = Kubeclient::Resource.new - our_object.foo = 'bar' - our_object.nested = {} - our_object.nested.again = {} - our_object.nested.again.again = {} - our_object.nested.again.again.name = 'aaron' - - expected = { - 'foo' => 'bar', - 'nested' => { 'again' => { 'again' => { 'name' => 'aaron' } } } - } - - assert_equal(expected, JSON.parse(JSON.dump(our_object.to_h))) - end - - def test_pass_uri - # URI::Generic#hostname= was added in ruby 1.9.3 and will automatically - # wrap an ipv6 address in [] - uri = URI::HTTP.build(port: 8080) - uri.hostname = 'localhost' - client = Kubeclient::Client.new(uri) - rest_client = client.rest_client - assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s) - end - - def test_no_path_in_uri - client = Kubeclient::Client.new('http://localhost:8080', 'v1') - rest_client = client.rest_client - assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s) - end - - def test_no_version_passed - client = Kubeclient::Client.new('http://localhost:8080') - rest_client = client.rest_client - assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s) - end - - def test_pass_proxy - uri = URI::HTTP.build(host: 'localhost', port: 8080) - proxy_uri = URI::HTTP.build(host: 'myproxyhost', port: 8888) - stub_core_api_list - - client = Kubeclient::Client.new(uri, http_proxy_uri: proxy_uri) - rest_client = client.rest_client - assert_equal(proxy_uri.to_s, rest_client.options[:proxy]) - - watch_client = client.watch_pods - assert_equal(watch_client.send(:build_client_options)[:proxy][:proxy_address], proxy_uri.host) - assert_equal(watch_client.send(:build_client_options)[:proxy][:proxy_port], proxy_uri.port) - end - - def test_pass_max_redirects - max_redirects = 0 - client = Kubeclient::Client.new('http://localhost:8080/api/', http_max_redirects: max_redirects) - rest_client = client.rest_client - assert_equal(max_redirects, rest_client.options[:max_redirects]) - - stub_request(:get, 'http://localhost:8080/api') - .to_return(status: 302, headers: { location: 'http://localhost:1234/api' }) - - exception = assert_raises(Kubeclient::HttpError) { client.api } - assert_equal(302, exception.error_code) - end - - def test_exception - stub_core_api_list - stub_request(:post, %r{/services}) - .to_return(body: open_test_file('namespace_exception.json'), status: 409) - - service = Kubeclient::Resource.new - service.metadata = {} - service.metadata.name = 'redisslave' - service.metadata.namespace = 'default' - # service.port = 80 - # service.container_port = 6379 - # service.protocol = 'TCP' - - client = Kubeclient::Client.new('http://localhost:8080/api/') - - exception = assert_raises(Kubeclient::HttpError) do - service = client.create_service(service) - end - - assert_instance_of(Kubeclient::HttpError, exception) - assert_equal("converting to : type names don't match (Pod, Namespace)", - exception.message) - - assert_includes(exception.to_s, ' for POST http://localhost:8080/api') - assert_equal(409, exception.error_code) - end - - def test_deprecated_exception - error_message = 'certificate verify failed' - - stub_request(:get, 'http://localhost:8080/api') - .to_raise(OpenSSL::SSL::SSLError.new(error_message)) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - - exception = assert_raises(KubeException) { client.api } - assert_equal(error_message, exception.message) - end - - def test_api - stub_request(:get, 'http://localhost:8080/api') - .to_return(status: 200, body: open_test_file('versions_list.json')) - - response = client.api - assert_includes(response, 'versions') - end - - def test_api_ssl_failure - error_message = 'certificate verify failed' - - stub_request(:get, 'http://localhost:8080/api') - .to_raise(OpenSSL::SSL::SSLError.new(error_message)) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - - exception = assert_raises(Kubeclient::HttpError) { client.api } - assert_equal(error_message, exception.message) - end - - def test_api_timeout - stub_request(:get, 'http://localhost:8080/api').to_timeout - - client = Kubeclient::Client.new('http://localhost:8080/api/') - - exception = assert_raises(Kubeclient::HttpError) { client.api } - assert_match(/(timed out|timeout)/i, exception.message) - end - - def test_api_valid - stub_request(:get, 'http://localhost:8080/api') - .to_return(status: 200, body: open_test_file('versions_list.json')) - - args = ['http://localhost:8080/api/'] - - [nil, 'v1beta3', 'v1'].each do |version| - client = Kubeclient::Client.new(*(version ? args + [version] : args)) - assert client.api_valid? - end - end - - def test_api_valid_with_invalid_version - stub_request(:get, 'http://localhost:8080/api') - .to_return(status: 200, body: open_test_file('versions_list.json')) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'foobar1') - refute client.api_valid? - end - - def test_api_valid_with_unreported_versions - stub_request(:get, 'http://localhost:8080/api') - .to_return(status: 200, body: '{}') - - client = Kubeclient::Client.new('http://localhost:8080/api/') - refute client.api_valid? - end - - def test_api_valid_with_invalid_json - stub_request(:get, 'http://localhost:8080/api') - .to_return(status: 200, body: '[]') - - client = Kubeclient::Client.new('http://localhost:8080/api/') - refute client.api_valid? - end - - def test_api_valid_with_bad_endpoint - stub_request(:get, 'http://localhost:8080/api') - .to_return(status: [404, 'Resource Not Found']) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - assert_raises(Kubeclient::HttpError) { client.api_valid? } - end - - def test_api_valid_with_non_json - stub_request(:get, 'http://localhost:8080/api') - .to_return(status: 200, body: '<html></html>') - - client = Kubeclient::Client.new('http://localhost:8080/api/') - assert_raises(JSON::ParserError) { client.api_valid? } - end - - def test_nonjson_exception - stub_core_api_list - stub_request(:get, %r{/servic}) - .to_return(body: open_test_file('service_illegal_json_404.json'), status: 404) - - exception = assert_raises(Kubeclient::ResourceNotFoundError) do - client.get_services - end - - assert(exception.message.include?('Not Found')) - assert_equal(404, exception.error_code) - end - - def test_nonjson_exception_raw - stub_core_api_list - stub_request(:get, %r{/servic}) - .to_return(body: open_test_file('service_illegal_json_404.json'), status: 404) - - exception = assert_raises(Kubeclient::ResourceNotFoundError) do - client.get_services(as: :raw) - end - - assert(exception.message.include?('Not Found')) - assert_equal(404, exception.error_code) - end - - def test_entity_list - stub_core_api_list - stub_get_services - - services = client.get_services - - refute_empty(services) - assert_instance_of(Kubeclient::Common::EntityList, services) - # Stripping of 'List' in collection.kind RecursiveOpenStruct mode only is historic. - assert_equal('Service', services.kind) - assert_equal(2, services.size) - assert_instance_of(Kubeclient::Resource, services[0]) - assert_instance_of(Kubeclient::Resource, services[1]) - - assert_requested(:get, 'http://localhost:8080/api/v1/services', times: 1) - end - - def test_entity_list_raw - stub_core_api_list - stub_get_services - - response = client.get_services(as: :raw) - - refute_empty(response) - assert_equal(open_test_file('entity_list.json').read, response) - - assert_requested(:get, 'http://localhost:8080/api/v1/services', times: 1) - end - - def test_entity_list_parsed - stub_core_api_list - stub_get_services - - response = client.get_services(as: :parsed) - assert_equal Hash, response.class - assert_equal 'ServiceList', response['kind'] - assert_equal %w[metadata spec status], response['items'].first.keys - end - - def test_entity_list_parsed_symbolized - stub_core_api_list - stub_get_services - - response = client.get_services(as: :parsed_symbolized) - assert_equal Hash, response.class - assert_equal 'ServiceList', response[:kind] - assert_equal %i[metadata spec status], response[:items].first.keys - end - - def test_entity_list_unknown - stub_core_api_list - stub_get_services - - e = assert_raises(ArgumentError) { client.get_services(as: :whoops) } - assert_equal 'Unsupported format :whoops', e.message - end - - def test_entity_list_raw_failure - stub_core_api_list - stub_request(:get, %r{/services}) - .to_return(body: open_test_file('entity_list.json'), status: 500) - - exception = assert_raises(Kubeclient::HttpError) { client.get_services(as: :raw) } - assert_equal('500 Internal Server Error', exception.message) - assert_equal(500, exception.error_code) - end - - def test_entities_with_label_selector - selector = 'component=apiserver' - - stub_core_api_list - stub_get_services - - services = client.get_services(label_selector: selector) - - assert_instance_of(Kubeclient::Common::EntityList, services) - assert_requested( - :get, - "http://localhost:8080/api/v1/services?labelSelector=#{selector}", - times: 1 - ) - end - - def test_entities_with_resource_version - version = '329' - - stub_core_api_list - stub_get_services - - services = client.get_services(resource_version: version) - - assert_instance_of(Kubeclient::Common::EntityList, services) - assert_requested( - :get, - "http://localhost:8080/api/v1/services?resourceVersion=#{version}", - times: 1 - ) - end - - def test_entities_with_field_selector - selector = 'involvedObject.name=redis-master' - - stub_core_api_list - stub_get_services - - services = client.get_services(field_selector: selector) - - assert_instance_of(Kubeclient::Common::EntityList, services) - assert_requested( - :get, - "http://localhost:8080/api/v1/services?fieldSelector=#{selector}", - times: 1 - ) - end - - def test_empty_list - stub_core_api_list - stub_request(:get, %r{/pods}) - .to_return(body: open_test_file('empty_pod_list.json'), status: 200) - - pods = client.get_pods - assert_instance_of(Kubeclient::Common::EntityList, pods) - assert_equal(0, pods.size) - end - - def test_get_all - stub_core_api_list - - stub_request(:get, %r{/bindings}) - .to_return(body: open_test_file('bindings_list.json'), status: 404) - - stub_request(:get, %r{/configmaps}) - .to_return(body: open_test_file('config_map_list.json'), status: 200) - - stub_request(:get, %r{/podtemplates}) - .to_return(body: open_test_file('pod_template_list.json'), status: 200) - - stub_request(:get, %r{/services}) - .to_return(body: open_test_file('service_list.json'), status: 200) - - stub_request(:get, %r{/pods}) - .to_return(body: open_test_file('pod_list.json'), status: 200) - - stub_request(:get, %r{/nodes}) - .to_return(body: open_test_file('node_list.json'), status: 200) - - stub_request(:get, %r{/replicationcontrollers}) - .to_return(body: open_test_file('replication_controller_list.json'), status: 200) - - stub_request(:get, %r{/events}) - .to_return(body: open_test_file('event_list.json'), status: 200) - - stub_request(:get, %r{/endpoints}) - .to_return(body: open_test_file('endpoint_list.json'), status: 200) - - stub_request(:get, %r{/namespaces}) - .to_return(body: open_test_file('namespace_list.json'), status: 200) - - stub_request(:get, %r{/secrets}) - .to_return(body: open_test_file('secret_list.json'), status: 200) - - stub_request(:get, %r{/resourcequotas}) - .to_return(body: open_test_file('resource_quota_list.json'), status: 200) - - stub_request(:get, %r{/limitranges}) - .to_return(body: open_test_file('limit_range_list.json'), status: 200) - - stub_request(:get, %r{/persistentvolumes}) - .to_return(body: open_test_file('persistent_volume_list.json'), status: 200) - - stub_request(:get, %r{/persistentvolumeclaims}) - .to_return(body: open_test_file('persistent_volume_claim_list.json'), status: 200) - - stub_request(:get, %r{/componentstatuses}) - .to_return(body: open_test_file('component_status_list.json'), status: 200) - - stub_request(:get, %r{/serviceaccounts}) - .to_return(body: open_test_file('service_account_list.json'), status: 200) - - result = client.all_entities - assert_equal(16, result.keys.size) - assert_instance_of(Kubeclient::Common::EntityList, result['node']) - assert_instance_of(Kubeclient::Common::EntityList, result['service']) - assert_instance_of(Kubeclient::Common::EntityList, result['replication_controller']) - assert_instance_of(Kubeclient::Common::EntityList, result['pod']) - assert_instance_of(Kubeclient::Common::EntityList, result['event']) - assert_instance_of(Kubeclient::Common::EntityList, result['namespace']) - assert_instance_of(Kubeclient::Common::EntityList, result['secret']) - assert_instance_of(Kubeclient::Resource, result['service'][0]) - assert_instance_of(Kubeclient::Resource, result['node'][0]) - assert_instance_of(Kubeclient::Resource, result['event'][0]) - assert_instance_of(Kubeclient::Resource, result['endpoint'][0]) - assert_instance_of(Kubeclient::Resource, result['namespace'][0]) - assert_instance_of(Kubeclient::Resource, result['secret'][0]) - assert_instance_of(Kubeclient::Resource, result['resource_quota'][0]) - assert_instance_of(Kubeclient::Resource, result['limit_range'][0]) - assert_instance_of(Kubeclient::Resource, result['persistent_volume'][0]) - assert_instance_of(Kubeclient::Resource, result['persistent_volume_claim'][0]) - assert_instance_of(Kubeclient::Resource, result['component_status'][0]) - assert_instance_of(Kubeclient::Resource, result['service_account'][0]) - end - - def test_get_all_raw - stub_core_api_list - - stub_request(:get, %r{/bindings}) - .to_return(body: open_test_file('bindings_list.json'), status: 404) - - stub_request(:get, %r{/configmaps}) - .to_return(body: open_test_file('config_map_list.json'), status: 200) - - stub_request(:get, %r{/podtemplates}) - .to_return(body: open_test_file('pod_template_list.json'), status: 200) - - stub_request(:get, %r{/services}) - .to_return(body: open_test_file('service_list.json'), status: 200) - - stub_request(:get, %r{/pods}) - .to_return(body: open_test_file('pod_list.json'), status: 200) - - stub_request(:get, %r{/nodes}) - .to_return(body: open_test_file('node_list.json'), status: 200) - - stub_request(:get, %r{/replicationcontrollers}) - .to_return(body: open_test_file('replication_controller_list.json'), status: 200) - - stub_request(:get, %r{/events}) - .to_return(body: open_test_file('event_list.json'), status: 200) - - stub_request(:get, %r{/endpoints}) - .to_return(body: open_test_file('endpoint_list.json'), status: 200) - - stub_request(:get, %r{/namespaces}) - .to_return(body: open_test_file('namespace_list.json'), status: 200) - - stub_request(:get, %r{/secrets}) - .to_return(body: open_test_file('secret_list.json'), status: 200) - - stub_request(:get, %r{/resourcequotas}) - .to_return(body: open_test_file('resource_quota_list.json'), status: 200) - - stub_request(:get, %r{/limitranges}) - .to_return(body: open_test_file('limit_range_list.json'), status: 200) - - stub_request(:get, %r{/persistentvolumes}) - .to_return(body: open_test_file('persistent_volume_list.json'), status: 200) - - stub_request(:get, %r{/persistentvolumeclaims}) - .to_return(body: open_test_file('persistent_volume_claim_list.json'), status: 200) - - stub_request(:get, %r{/componentstatuses}) - .to_return(body: open_test_file('component_status_list.json'), status: 200) - - stub_request(:get, %r{/serviceaccounts}) - .to_return(body: open_test_file('service_account_list.json'), status: 200) - - result = client.all_entities(as: :raw) - assert_equal(16, result.keys.size) - - %w[ - component_status config_map endpoint event limit_range namespace node - persistent_volume persistent_volume_claim pod replication_controller - resource_quota secret service service_account - ].each do |entity| - assert_equal(open_test_file("#{entity}_list.json").read, result[entity]) - end - end - - def test_api_bearer_token_with_params_success - stub_request(:get, 'http://localhost:8080/api/v1/pods?labelSelector=name=redis-master') - .with(headers: { Authorization: 'Bearer valid_token' }) - .to_return(body: open_test_file('pod_list.json'), status: 200) - stub_request(:get, %r{/api/v1$}) - .with(headers: { Authorization: 'Bearer valid_token' }) - .to_return(body: open_test_file('core_api_resource_list.json'), status: 200) - - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { bearer_token: 'valid_token' } - ) - - pods = client.get_pods(label_selector: 'name=redis-master') - - assert_equal('Pod', pods.kind) - assert_equal(1, pods.size) - end - - def test_api_bearer_token_success - stub_core_api_list - stub_request(:get, 'http://localhost:8080/api/v1/pods') - .with(headers: { Authorization: 'Bearer valid_token' }) - .to_return( - body: open_test_file('pod_list.json'), status: 200 - ) - - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { bearer_token: 'valid_token' } - ) - - pods = client.get_pods - - assert_equal('Pod', pods.kind) - assert_equal(1, pods.size) - end - - def test_api_bearer_token_failure - error_message = - '"/api/v1" is forbidden because ' \ - 'system:anonymous cannot list on pods in' - response = OpenStruct.new(code: 401, message: error_message) - - stub_request(:get, 'http://localhost:8080/api/v1') - .with(headers: { Authorization: 'Bearer invalid_token' }) - .to_raise(Kubeclient::HttpError.new(403, error_message, response)) - - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { bearer_token: 'invalid_token' } - ) - - exception = assert_raises(Kubeclient::HttpError) { client.get_pods } - assert_equal(403, exception.error_code) - assert_equal(error_message, exception.message) - assert_equal(response, exception.response) - end - - def test_api_bearer_token_failure_raw - error_message = - '"/api/v1" is forbidden because ' \ - 'system:anonymous cannot list on pods in' - response = OpenStruct.new(code: 401, message: error_message) - - stub_request(:get, 'http://localhost:8080/api/v1') - .with(headers: { Authorization: 'Bearer invalid_token' }) - .to_raise(Kubeclient::HttpError.new(403, error_message, response)) - - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { bearer_token: 'invalid_token' } - ) - - exception = assert_raises(Kubeclient::HttpError) { client.get_pods(as: :raw) } - assert_equal(403, exception.error_code) - assert_equal(error_message, exception.message) - assert_equal(response, exception.response) - end - - def test_api_basic_auth_success - stub_request(:get, 'http://localhost:8080/api/v1') - .with(basic_auth: %w[username password]) - .to_return(body: open_test_file('core_api_resource_list.json'), status: 200) - stub_request(:get, 'http://localhost:8080/api/v1/pods') - .with(basic_auth: %w[username password]) - .to_return(body: open_test_file('pod_list.json'), status: 200) - - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { username: 'username', password: 'password' } - ) - - pods = client.get_pods - - assert_equal('Pod', pods.kind) - assert_equal(1, pods.size) - assert_requested( - :get, - 'http://localhost:8080/api/v1/pods', - times: 1 - ) - end - - def test_api_basic_auth_back_comp_success - stub_request(:get, 'http://localhost:8080/api/v1') - .with(basic_auth: %w[username password]) - .to_return(body: open_test_file('core_api_resource_list.json'), status: 200) - stub_request(:get, 'http://localhost:8080/api/v1/pods') - .with(basic_auth: %w[username password]) - .to_return(body: open_test_file('pod_list.json'), status: 200) - - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { user: 'username', password: 'password' } - ) - - pods = client.get_pods - - assert_equal('Pod', pods.kind) - assert_equal(1, pods.size) - assert_requested(:get, 'http://localhost:8080/api/v1/pods', times: 1) - end - - def test_api_basic_auth_failure - error_message = 'HTTP status code 401, 401 Unauthorized' - response = OpenStruct.new(code: 401, message: '401 Unauthorized') - - stub_request(:get, 'http://localhost:8080/api/v1') - .with(basic_auth: %w[username password]) - .to_raise(Kubeclient::HttpError.new(401, error_message, response)) - - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { username: 'username', password: 'password' } - ) - - exception = assert_raises(Kubeclient::HttpError) { client.get_pods } - assert_equal(401, exception.error_code) - assert_equal(error_message, exception.message) - assert_equal(response, exception.response) - assert_requested(:get, 'http://localhost:8080/api/v1', times: 1) - end - - def test_api_basic_auth_failure_raw - error_message = 'HTTP status code 401, 401 Unauthorized' - response = OpenStruct.new(code: 401, message: '401 Unauthorized') - - stub_request(:get, 'http://localhost:8080/api/v1') - .with(basic_auth: %w[username password]) - .to_raise(Kubeclient::HttpError.new(401, error_message, response)) - - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { username: 'username', password: 'password' } - ) - - exception = assert_raises(Kubeclient::HttpError) { client.get_pods(as: :raw) } - assert_equal(401, exception.error_code) - assert_equal(error_message, exception.message) - assert_equal(response, exception.response) - - assert_requested(:get, 'http://localhost:8080/api/v1', times: 1) - end - - def test_init_username_no_password - expected_msg = 'Basic auth requires both username & password' - exception = assert_raises(ArgumentError) do - Kubeclient::Client.new( - 'http://localhost:8080', - auth_options: { username: 'username' } - ) - end - assert_equal(expected_msg, exception.message) - end - - def test_init_user_no_password - expected_msg = 'Basic auth requires both username & password' - exception = assert_raises(ArgumentError) do - Kubeclient::Client.new( - 'http://localhost:8080', - auth_options: { user: 'username' } - ) - end - assert_equal(expected_msg, exception.message) - end - - def test_init_username_and_bearer_token - expected_msg = 'Invalid auth options: specify only one of username/password,' \ - ' bearer_token or bearer_token_file' - exception = assert_raises(ArgumentError) do - Kubeclient::Client.new( - 'http://localhost:8080', - auth_options: { username: 'username', bearer_token: 'token' } - ) - end - assert_equal(expected_msg, exception.message) - end - - def test_init_username_and_bearer_token_file - expected_msg = 'Invalid auth options: specify only one of username/password,' \ - ' bearer_token or bearer_token_file' - exception = assert_raises(ArgumentError) do - Kubeclient::Client.new( - 'http://localhost:8080', - auth_options: { username: 'username', bearer_token_file: 'token-file' } - ) - end - assert_equal(expected_msg, exception.message) - end - - def test_bearer_token_and_bearer_token_file - expected_msg = - 'Invalid auth options: specify only one of username/password,' \ - ' bearer_token or bearer_token_file' - exception = assert_raises(ArgumentError) do - Kubeclient::Client.new( - 'http://localhost:8080', - auth_options: { bearer_token: 'token', bearer_token_file: 'token-file' } - ) - end - assert_equal(expected_msg, exception.message) - end - - def test_bearer_token_file_not_exist - expected_msg = 'Token file token-file does not exist' - exception = assert_raises(ArgumentError) do - Kubeclient::Client.new( - 'http://localhost:8080', - auth_options: { bearer_token_file: 'token-file' } - ) - end - assert_equal(expected_msg, exception.message) - end - - def test_api_bearer_token_file_success - stub_core_api_list - stub_request(:get, 'http://localhost:8080/api/v1/pods') - .with(headers: { Authorization: 'Bearer valid_token' }) - .to_return(body: open_test_file('pod_list.json'), status: 200) - - file = File.join(File.dirname(__FILE__), 'valid_token_file') - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - auth_options: { bearer_token_file: file } - ) - - pods = client.get_pods - - assert_equal('Pod', pods.kind) - assert_equal(1, pods.size) - end - - def test_proxy_url - stub_core_api_list - - client = Kubeclient::Client.new('http://host:8080', 'v1') - assert_equal( - 'http://host:8080/api/v1/namespaces/ns/services/srvname:srvportname/proxy', - client.proxy_url('service', 'srvname', 'srvportname', 'ns') - ) - - assert_equal( - 'http://host:8080/api/v1/namespaces/ns/services/srvname:srvportname/proxy', - client.proxy_url('services', 'srvname', 'srvportname', 'ns') - ) - - assert_equal( - 'http://host:8080/api/v1/namespaces/ns/pods/srvname:srvportname/proxy', - client.proxy_url('pod', 'srvname', 'srvportname', 'ns') - ) - - assert_equal( - 'http://host:8080/api/v1/namespaces/ns/pods/srvname:srvportname/proxy', - client.proxy_url('pods', 'srvname', 'srvportname', 'ns') - ) - - # Check no namespace provided - assert_equal( - 'http://host:8080/api/v1/nodes/srvname:srvportname/proxy', - client.proxy_url('nodes', 'srvname', 'srvportname') - ) - - assert_equal( - 'http://host:8080/api/v1/nodes/srvname:srvportname/proxy', - client.proxy_url('node', 'srvname', 'srvportname') - ) - - # Check integer port - assert_equal( - 'http://host:8080/api/v1/nodes/srvname:5001/proxy', - client.proxy_url('nodes', 'srvname', 5001) - ) - - assert_equal( - 'http://host:8080/api/v1/nodes/srvname:5001/proxy', - client.proxy_url('node', 'srvname', 5001) - ) - end - - def test_attr_readers - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - ssl_options: { client_key: 'secret' }, - auth_options: { bearer_token: 'token' } - ) - assert_equal('/api', client.api_endpoint.path) - assert_equal('secret', client.ssl_options[:client_key]) - assert_equal('token', client.auth_options[:bearer_token]) - assert_equal('Bearer token', client.headers[:Authorization]) - end - - def test_nil_items - # handle https://github.com/kubernetes/kubernetes/issues/13096 - stub_core_api_list - stub_request(:get, %r{/persistentvolumeclaims}) - .to_return(body: open_test_file('persistent_volume_claims_nil_items.json'), status: 200) - - client.get_persistent_volume_claims - end - - # Timeouts - - def test_timeouts_defaults - client = Kubeclient::Client.new( - 'http://localhost:8080/api/' - ) - rest_client = client.rest_client - assert_default_open_timeout(rest_client.open_timeout) - assert_equal(60, rest_client.read_timeout) - end - - def test_timeouts_open - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - timeouts: { open: 10 } - ) - rest_client = client.rest_client - assert_equal(10, rest_client.open_timeout) - assert_equal(60, rest_client.read_timeout) - end - - def test_timeouts_read - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - timeouts: { read: 300 } - ) - rest_client = client.rest_client - assert_default_open_timeout(rest_client.open_timeout) - assert_equal(300, rest_client.read_timeout) - end - - def test_timeouts_both - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - timeouts: { open: 10, read: 300 } - ) - rest_client = client.rest_client - assert_equal(10, rest_client.open_timeout) - assert_equal(300, rest_client.read_timeout) - end - - def test_timeouts_infinite - client = Kubeclient::Client.new( - 'http://localhost:8080/api/', - timeouts: { open: nil, read: nil } - ) - rest_client = client.rest_client - assert_nil(rest_client.open_timeout) - assert_nil(rest_client.read_timeout) - end - - def assert_default_open_timeout(actual) - if RUBY_VERSION >= '2.3' - assert_equal(60, actual) - else - assert_nil(actual) - end - end - - private - - def stub_get_services - stub_request(:get, %r{/services}) - .to_return(body: open_test_file('entity_list.json'), status: 200) - end - - def client - @client ||= Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - end - - # dup method creates a shallow copy which is not good in this case - # since rename_keys changes the input hash - # hence need to create a deep_copy - def deep_copy(hash) - Marshal.load(Marshal.dump(hash)) - end -end diff --git a/vendor/gems/kubeclient/test/test_limit_range.rb b/vendor/gems/kubeclient/test/test_limit_range.rb deleted file mode 100644 index e9822578e00..00000000000 --- a/vendor/gems/kubeclient/test/test_limit_range.rb +++ /dev/null @@ -1,25 +0,0 @@ -require_relative 'test_helper' - -# LimitRange tests -class TestLimitRange < MiniTest::Test - def test_get_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/limitranges}) - .to_return(body: open_test_file('limit_range.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - limit_range = client.get_limit_range('limits', 'quota-example') - - assert_instance_of(Kubeclient::Resource, limit_range) - assert_equal('limits', limit_range.metadata.name) - assert_equal('Container', limit_range.spec.limits[0].type) - assert_equal('100m', limit_range.spec.limits[0].default.cpu) - assert_equal('512Mi', limit_range.spec.limits[0].default.memory) - - assert_requested( - :get, - 'http://localhost:8080/api/v1/namespaces/quota-example/limitranges/limits', - times: 1 - ) - end -end diff --git a/vendor/gems/kubeclient/test/test_missing_methods.rb b/vendor/gems/kubeclient/test/test_missing_methods.rb deleted file mode 100644 index 67614c95adc..00000000000 --- a/vendor/gems/kubeclient/test/test_missing_methods.rb +++ /dev/null @@ -1,80 +0,0 @@ -require_relative 'test_helper' - -# Test method_missing, respond_to? and respond_to_missing behaviour -class TestMissingMethods < MiniTest::Test - def test_missing - stub_core_api_list - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - assert_equal(true, client.respond_to?(:get_pod)) - assert_equal(true, client.respond_to?(:get_pods)) - assert_equal(false, client.respond_to?(:get_pie)) - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') # Reset discovery - assert_equal(false, client.respond_to?(:get_pie)) - assert_equal(true, client.respond_to?(:get_pods)) - assert_equal(true, client.respond_to?(:get_pod)) - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') # Reset discovery - assert_instance_of(Method, client.method(:get_pods)) - assert_raises(NameError) do - client.method(:get_pies) - end - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') # Reset discovery - assert_raises(NameError) do - client.method(:get_pies) - end - assert_instance_of(Method, client.method(:get_pods)) - - stub_request(:get, %r{/api/v1$}).to_return( - body: '', - status: 404 - ) # If discovery fails we expect the below raise an exception - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - assert_raises(Kubeclient::HttpError) do - client.discover - end - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - assert_raises(Kubeclient::HttpError) do - client.method(:get_pods) - end - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - assert_raises(Kubeclient::HttpError) do - client.respond_to?(:get_pods) - end - end - - def test_nonsuffix_plurals - stub_request(:get, %r{/apis/extensions/v1beta1$}).to_return( - body: open_test_file('extensions_v1beta1_api_resource_list.json'), - status: 200 - ) - client = Kubeclient::Client.new('http://localhost:8080/apis/extensions', 'v1beta1') - assert_equal(true, client.respond_to?(:get_network_policy)) - assert_equal(true, client.respond_to?(:get_network_policies)) - assert_equal(true, client.respond_to?(:get_pod_security_policy)) - assert_equal(true, client.respond_to?(:get_pod_security_policies)) - end - - def test_irregular_names - stub_core_api_list - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - assert_equal(true, client.respond_to?(:get_endpoint)) - assert_equal(true, client.respond_to?(:get_endpoints)) - - stub_request(:get, %r{/apis/security.openshift.io/v1$}).to_return( - body: open_test_file('security.openshift.io_api_resource_list.json'), - status: 200 - ) - client = Kubeclient::Client.new('http://localhost:8080/apis/security.openshift.io', 'v1') - assert_equal(true, client.respond_to?(:get_security_context_constraint)) - assert_equal(true, client.respond_to?(:get_security_context_constraints)) - end - - def test_lowercase_kind - stub_request(:get, %r{/apis/config.istio.io/v1alpha2$}).to_return( - body: open_test_file('config.istio.io_api_resource_list.json'), - status: 200 - ) - client = Kubeclient::Client.new('http://localhost:8080/apis/config.istio.io', 'v1alpha2') - assert_equal(true, client.respond_to?(:get_servicecontrolreport)) - assert_equal(true, client.respond_to?(:get_servicecontrolreports)) - end -end diff --git a/vendor/gems/kubeclient/test/test_namespace.rb b/vendor/gems/kubeclient/test/test_namespace.rb deleted file mode 100644 index 7283aa69b67..00000000000 --- a/vendor/gems/kubeclient/test/test_namespace.rb +++ /dev/null @@ -1,59 +0,0 @@ -require_relative 'test_helper' - -# Namespace entity tests -class TestNamespace < MiniTest::Test - def test_get_namespace_v1 - stub_core_api_list - stub_request(:get, %r{/namespaces}) - .to_return(body: open_test_file('namespace.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - namespace = client.get_namespace('staging') - - assert_instance_of(Kubeclient::Resource, namespace) - assert_equal('e388bc10-c021-11e4-a514-3c970e4a436a', namespace.metadata.uid) - assert_equal('staging', namespace.metadata.name) - assert_equal('1168', namespace.metadata.resourceVersion) - assert_equal('v1', namespace.apiVersion) - - assert_requested( - :get, - 'http://localhost:8080/api/v1/namespaces/staging', - times: 1 - ) - end - - def test_delete_namespace_v1 - our_namespace = Kubeclient::Resource.new - our_namespace.metadata = {} - our_namespace.metadata.name = 'staging' - - stub_core_api_list - stub_request(:delete, %r{/namespaces}) - .to_return(body: open_test_file('namespace.json'), status: 200) - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - our_namespace = client.delete_namespace(our_namespace.metadata.name) - assert_kind_of(RecursiveOpenStruct, our_namespace) - - assert_requested( - :delete, - 'http://localhost:8080/api/v1/namespaces/staging', - times: 1 - ) - end - - def test_create_namespace - stub_core_api_list - stub_request(:post, %r{/namespaces}) - .to_return(body: open_test_file('created_namespace.json'), status: 201) - - namespace = Kubeclient::Resource.new - namespace.metadata = {} - namespace.metadata.name = 'development' - - client = Kubeclient::Client.new('http://localhost:8080/api/') - created_namespace = client.create_namespace(namespace) - assert_instance_of(Kubeclient::Resource, created_namespace) - assert_equal(namespace.metadata.name, created_namespace.metadata.name) - end -end diff --git a/vendor/gems/kubeclient/test/test_node.rb b/vendor/gems/kubeclient/test/test_node.rb deleted file mode 100644 index aa7459d63c9..00000000000 --- a/vendor/gems/kubeclient/test/test_node.rb +++ /dev/null @@ -1,70 +0,0 @@ -require_relative 'test_helper' - -# Node entity tests -class TestNode < MiniTest::Test - def test_get_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/nodes}) - .to_return(body: open_test_file('node.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - node = client.get_node('127.0.0.1') - - assert_instance_of(Kubeclient::Resource, node) - - assert_equal('041143c5-ce39-11e4-ac24-3c970e4a436a', node.metadata.uid) - assert_equal('127.0.0.1', node.metadata.name) - assert_equal('1724', node.metadata.resourceVersion) - assert_equal('v1', node.apiVersion) - assert_equal('2015-03-19T15:08:20+02:00', node.metadata.creationTimestamp) - - assert_requested( - :get, - 'http://localhost:8080/api/v1', - times: 1 - ) - assert_requested( - :get, - 'http://localhost:8080/api/v1/nodes/127.0.0.1', - times: 1 - ) - end - - def test_get_from_json_v1_raw - stub_core_api_list - stub_request(:get, %r{/nodes}) - .to_return(body: open_test_file('node.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - response = client.get_node('127.0.0.1', nil, as: :raw) - - assert_equal(open_test_file('node.json').read, response) - - assert_requested( - :get, - 'http://localhost:8080/api/v1', - times: 1 - ) - assert_requested( - :get, - 'http://localhost:8080/api/v1/nodes/127.0.0.1', - times: 1 - ) - end - - def test_get_from_json_v1_raw_error - stub_request(:get, %r{/nodes}) - .to_return(body: open_test_file('node.json'), status: 200) - stub_request(:get, %r{/api/v1$}) - .to_return(body: open_test_file('core_api_resource_list.json'), status: 500) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - - exception = assert_raises(Kubeclient::HttpError) do - client.get_node('127.0.0.1', nil, as: :raw) - end - - assert_instance_of(Kubeclient::HttpError, exception) - assert_equal('500 Internal Server Error', exception.message) - end -end diff --git a/vendor/gems/kubeclient/test/test_oidc_auth_provider.rb b/vendor/gems/kubeclient/test/test_oidc_auth_provider.rb deleted file mode 100644 index cdf325e9406..00000000000 --- a/vendor/gems/kubeclient/test/test_oidc_auth_provider.rb +++ /dev/null @@ -1,103 +0,0 @@ -require_relative 'test_helper' -require 'openid_connect' - -class OIDCAuthProviderTest < MiniTest::Test - def setup - @client_id = 'client_id' - @client_secret = 'client_secret' - @idp_issuer_url = 'idp_issuer_url' - @refresh_token = 'refresh_token' - @id_token = 'id_token' - @new_id_token = 'new_id_token' - end - - def test_expired_token - OpenIDConnect::Discovery::Provider::Config.stub(:discover!, discovery_mock) do - OpenIDConnect::ResponseObject::IdToken.stub(:decode, id_token_mock(Time.now.to_i - 7200)) do - OpenIDConnect::Client.stub(:new, openid_client_mock) do - retrieved_id_token = Kubeclient::OIDCAuthProvider.token( - 'client-id' => @client_id, - 'client-secret' => @client_secret, - 'id-token' => @id_token, - 'idp-issuer-url' => @idp_issuer_url, - 'refresh-token' => @refresh_token - ) - assert_equal(@new_id_token, retrieved_id_token) - end - end - end - end - - def test_valid_token - OpenIDConnect::Discovery::Provider::Config.stub(:discover!, discovery_mock) do - OpenIDConnect::ResponseObject::IdToken.stub(:decode, id_token_mock(Time.now.to_i + 7200)) do - retrieved_id_token = Kubeclient::OIDCAuthProvider.token( - 'client-id' => @client_id, - 'client-secret' => @client_secret, - 'id-token' => @id_token, - 'idp-issuer-url' => @idp_issuer_url, - 'refresh-token' => @refresh_token - ) - assert_equal(@id_token, retrieved_id_token) - end - end - end - - def test_missing_id_token - OpenIDConnect::Discovery::Provider::Config.stub(:discover!, discovery_mock) do - OpenIDConnect::Client.stub(:new, openid_client_mock) do - retrieved_id_token = Kubeclient::OIDCAuthProvider.token( - 'client-id' => @client_id, - 'client-secret' => @client_secret, - 'idp-issuer-url' => @idp_issuer_url, - 'refresh-token' => @refresh_token - ) - assert_equal(@new_id_token, retrieved_id_token) - end - end - end - - def test_token_with_unknown_kid - OpenIDConnect::Discovery::Provider::Config.stub(:discover!, discovery_mock) do - OpenIDConnect::ResponseObject::IdToken.stub( - :decode, ->(_token, _jwks) { raise JSON::JWK::Set::KidNotFound } - ) do - OpenIDConnect::Client.stub(:new, openid_client_mock) do - retrieved_id_token = Kubeclient::OIDCAuthProvider.token( - 'client-id' => @client_id, - 'client-secret' => @client_secret, - 'id-token' => @id_token, - 'idp-issuer-url' => @idp_issuer_url, - 'refresh-token' => @refresh_token - ) - assert_equal(@new_id_token, retrieved_id_token) - end - end - end - end - - private - - def openid_client_mock - access_token = Minitest::Mock.new - access_token.expect(@id_token, @new_id_token) - - openid_client = Minitest::Mock.new - openid_client.expect(:refresh_token=, nil, [@refresh_token]) - openid_client.expect(:access_token!, access_token) - end - - def id_token_mock(expiry) - id_token_mock = Minitest::Mock.new - id_token_mock.expect(:exp, expiry) - end - - def discovery_mock - discovery = Minitest::Mock.new - discovery.expect(:jwks, 'jwks') - discovery.expect(:authorization_endpoint, 'authz_endpoint') - discovery.expect(:token_endpoint, 'token_endpoint') - discovery.expect(:userinfo_endpoint, 'userinfo_endpoint') - discovery - end -end diff --git a/vendor/gems/kubeclient/test/test_persistent_volume.rb b/vendor/gems/kubeclient/test/test_persistent_volume.rb deleted file mode 100644 index 8b283868a1f..00000000000 --- a/vendor/gems/kubeclient/test/test_persistent_volume.rb +++ /dev/null @@ -1,29 +0,0 @@ -require_relative 'test_helper' - -# PersistentVolume tests -class TestPersistentVolume < MiniTest::Test - def test_get_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/persistentvolumes}) - .to_return(body: open_test_file('persistent_volume.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - volume = client.get_persistent_volume('pv0001') - - assert_instance_of(Kubeclient::Resource, volume) - assert_equal('pv0001', volume.metadata.name) - assert_equal('10Gi', volume.spec.capacity.storage) - assert_equal('/tmp/data01', volume.spec.hostPath.path) - - assert_requested( - :get, - 'http://localhost:8080/api/v1', - times: 1 - ) - assert_requested( - :get, - 'http://localhost:8080/api/v1/persistentvolumes/pv0001', - times: 1 - ) - end -end diff --git a/vendor/gems/kubeclient/test/test_persistent_volume_claim.rb b/vendor/gems/kubeclient/test/test_persistent_volume_claim.rb deleted file mode 100644 index e51d8562e60..00000000000 --- a/vendor/gems/kubeclient/test/test_persistent_volume_claim.rb +++ /dev/null @@ -1,28 +0,0 @@ -require_relative 'test_helper' - -# PersistentVolumeClaim tests -class TestPersistentVolumeClaim < MiniTest::Test - def test_get_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/persistentvolumeclaims}) - .to_return(body: open_test_file('persistent_volume_claim.json'), status: 200) - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - claim = client.get_persistent_volume_claim('myclaim-1', 'default') - - assert_instance_of(Kubeclient::Resource, claim) - assert_equal('myclaim-1', claim.metadata.name) - assert_equal('3Gi', claim.spec.resources.requests.storage) - assert_equal('pv0001', claim.spec.volumeName) - - assert_requested( - :get, - 'http://localhost:8080/api/v1', - times: 1 - ) - assert_requested( - :get, - 'http://localhost:8080/api/v1/namespaces/default/persistentvolumeclaims/myclaim-1', - times: 1 - ) - end -end diff --git a/vendor/gems/kubeclient/test/test_pod.rb b/vendor/gems/kubeclient/test/test_pod.rb deleted file mode 100644 index afad1774f5e..00000000000 --- a/vendor/gems/kubeclient/test/test_pod.rb +++ /dev/null @@ -1,81 +0,0 @@ -require_relative 'test_helper' - -# Pod entity tests -class TestPod < MiniTest::Test - def test_get_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/pods}) - .to_return(body: open_test_file('pod.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - pod = client.get_pod('redis-master-pod', 'default') - - assert_instance_of(Kubeclient::Resource, pod) - assert_equal('redis-master3', pod.metadata.name) - assert_equal('dockerfile/redis', pod.spec.containers[0]['image']) - - assert_requested( - :get, - 'http://localhost:8080/api/v1', - times: 1 - ) - assert_requested( - :get, - 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod', - times: 1 - ) - end - - def test_get_chunks - stub_core_api_list - stub_request(:get, %r{/pods}) - .to_return(body: open_test_file('pods_1.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - pods = client.get_pods(limit: 2) - - assert_equal(2, pods.count) - assert_equal('eyJ2IjoibWV0YS5rOHMua', pods.continue) - - continue = pods.continue - - stub_request(:get, %r{/pods}) - .to_return(body: open_test_file('pods_2.json'), status: 200) - - pods = client.get_pods(limit: 2, continue: continue) - assert_equal(2, pods.count) - assert_nil(pods.continue) - - assert_requested( - :get, - 'http://localhost:8080/api/v1', - times: 1 - ) - assert_requested( - :get, - 'http://localhost:8080/api/v1/pods?limit=2', - times: 1 - ) - assert_requested( - :get, - "http://localhost:8080/api/v1/pods?continue=#{continue}&limit=2", - times: 1 - ) - end - - def test_get_chunks_410_gone - stub_core_api_list - stub_request(:get, %r{/pods}) - .to_return(body: open_test_file('pods_410.json'), status: 410) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - - err = assert_raises Kubeclient::HttpError do - client.get_pods(limit: 2, continue: 'eyJ2IjoibWV0YS5') - end - - assert_equal(err.message, - "The provided from parameter is too old to display a consistent list result. \ -You must start a new list without the from.") - end -end diff --git a/vendor/gems/kubeclient/test/test_pod_log.rb b/vendor/gems/kubeclient/test/test_pod_log.rb deleted file mode 100644 index d9ba3eaabbd..00000000000 --- a/vendor/gems/kubeclient/test/test_pod_log.rb +++ /dev/null @@ -1,157 +0,0 @@ -require_relative 'test_helper' - -# Pod log tests -class TestPodLog < MiniTest::Test - def test_get_pod_log - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log}) - .to_return(body: open_test_file('pod_log.txt'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - retrieved_log = client.get_pod_log('redis-master-pod', 'default') - - assert_equal(open_test_file('pod_log.txt').read, retrieved_log) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log', - times: 1) - end - - def test_get_pod_log_container - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log}) - .to_return(body: open_test_file('pod_log.txt'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - retrieved_log = client.get_pod_log('redis-master-pod', 'default', container: 'ruby') - - assert_equal(open_test_file('pod_log.txt').read, retrieved_log) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log?container=ruby', - times: 1) - end - - def test_get_pod_log_since_time - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log}) - .to_return(body: open_test_file('pod_log.txt'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - retrieved_log = client.get_pod_log('redis-master-pod', - 'default', - timestamps: true, - since_time: '2018-04-27T18:30:17.480321984Z') - - assert_equal(open_test_file('pod_log.txt').read, retrieved_log) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log?sinceTime=2018-04-27T18:30:17.480321984Z×tamps=true', - times: 1) - end - - def test_get_pod_log_tail_lines - selected_lines = open_test_file('pod_log.txt').to_a[-2..1].join - - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log}) - .to_return(body: selected_lines, - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - retrieved_log = client.get_pod_log('redis-master-pod', - 'default', - tail_lines: 2) - - assert_equal(selected_lines, retrieved_log) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log?tailLines=2', - times: 1) - end - - def test_get_pod_limit_bytes - selected_bytes = open_test_file('pod_log.txt').read(10) - - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log}) - .to_return(body: selected_bytes, - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - retrieved_log = client.get_pod_log('redis-master-pod', - 'default', - limit_bytes: 10) - - assert_equal(selected_bytes, retrieved_log) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log?limitBytes=10', - times: 1) - end - - def test_watch_pod_log - file = open_test_file('pod_log.txt') - expected_lines = file.read.split("\n") - - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log\?.*follow}) - .to_return(body: file, status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - - stream = client.watch_pod_log('redis-master-pod', 'default') - stream.to_enum.with_index do |notice, index| - assert_instance_of(String, notice) - assert_equal(expected_lines[index], notice) - end - end - - def test_watch_pod_log_with_block - file = open_test_file('pod_log.txt') - first = file.readlines.first.chomp - - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log\?.*follow}) - .to_return(body: file, status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - - client.watch_pod_log('redis-master-pod', 'default') do |line| - assert_equal first, line - break - end - end - - def test_watch_pod_log_follow_redirect - expected_lines = open_test_file('pod_log.txt').read.split("\n") - redirect = 'http://localhost:1234/api/namespaces/default/pods/redis-master-pod/log' - - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log\?.*follow}) - .to_return(status: 302, headers: { location: redirect }) - - stub_request(:get, redirect) - .to_return(body: open_test_file('pod_log.txt'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - stream = client.watch_pod_log('redis-master-pod', 'default') - stream.to_enum.with_index do |notice, index| - assert_instance_of(String, notice) - assert_equal(expected_lines[index], notice) - end - end - - def test_watch_pod_log_max_redirect - redirect = 'http://localhost:1234/api/namespaces/default/pods/redis-master-pod/log' - - stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log\?.*follow}) - .to_return(status: 302, headers: { location: redirect }) - - stub_request(:get, redirect) - .to_return(body: open_test_file('pod_log.txt'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1', http_max_redirects: 0) - assert_raises(Kubeclient::HttpError) do - client.watch_pod_log('redis-master-pod', 'default').each do - end - end - end -end diff --git a/vendor/gems/kubeclient/test/test_process_template.rb b/vendor/gems/kubeclient/test/test_process_template.rb deleted file mode 100644 index e3b4670fb87..00000000000 --- a/vendor/gems/kubeclient/test/test_process_template.rb +++ /dev/null @@ -1,80 +0,0 @@ -require_relative 'test_helper' - -# Process Template tests -class TestProcessTemplate < MiniTest::Test - def test_process_template - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - template = {} - template[:metadata] = {} - template[:metadata][:name] = 'my-template' - template[:metadata][:namespace] = 'default' - template[:kind] = 'Template' - template[:apiVersion] = 'v1' - service = {} - service[:metadata] = {} - service[:metadata][:name] = '${NAME_PREFIX}my-service' - service[:kind] = 'Service' - service[:apiVersion] = 'v1' - template[:objects] = [service] - param = { name: 'NAME_PREFIX', value: 'test/' } - template[:parameters] = [param] - - req_body = '{"metadata":{"name":"my-template","namespace":"default"},' \ - '"kind":"Template","apiVersion":"v1","objects":[{"metadata":' \ - '{"name":"${NAME_PREFIX}my-service"},"kind":"Service","apiVersion":"v1"}],' \ - '"parameters":[{"name":"NAME_PREFIX","value":"test/"}]}' - - expected_url = 'http://localhost:8080/api/v1/namespaces/default/processedtemplates' - stub_request(:post, expected_url) - .with(body: req_body, headers: { 'Content-Type' => 'application/json' }) - .to_return(body: open_test_file('processed_template.json'), status: 200) - - processed_template = client.process_template(template) - - assert_equal('test/my-service', processed_template['objects'].first['metadata']['name']) - - assert_requested(:post, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - data['kind'] == 'Template' && - data['apiVersion'] == 'v1' && - data['metadata']['name'] == 'my-template' && - data['metadata']['namespace'] == 'default' - end - end - - # Ensure _template and _templates methods hit `/templates` rather than - # `/processedtemplates` URL. - def test_templates_methods - stub_request(:get, %r{/apis/template\.openshift\.io/v1$}).to_return( - body: open_test_file('template.openshift.io_api_resource_list.json'), - status: 200 - ) - client = Kubeclient::Client.new('http://localhost:8080/apis/template.openshift.io', 'v1') - - expected_url = 'http://localhost:8080/apis/template.openshift.io/v1/namespaces/default/templates' - stub_request(:get, expected_url) - .to_return(body: open_test_file('template_list.json'), status: 200) - client.get_templates(namespace: 'default') - assert_requested(:get, expected_url, times: 1) - - expected_url = 'http://localhost:8080/apis/template.openshift.io/v1/namespaces/default/templates/my-template' - stub_request(:get, expected_url) - .to_return(body: open_test_file('template.json'), status: 200) - client.get_template('my-template', 'default') - assert_requested(:get, expected_url, times: 1) - end - - def test_no_processedtemplates_methods - stub_request(:get, %r{/apis/template\.openshift\.io/v1$}).to_return( - body: open_test_file('template.openshift.io_api_resource_list.json'), - status: 200 - ) - client = Kubeclient::Client.new('http://localhost:8080/apis/template.openshift.io', 'v1') - client.discover - - refute_respond_to(client, :get_processedtemplates) - refute_respond_to(client, :get_processedtemplate) - refute_respond_to(client, :get_processed_templates) - refute_respond_to(client, :get_processed_template) - end -end diff --git a/vendor/gems/kubeclient/test/test_real_cluster.rb b/vendor/gems/kubeclient/test/test_real_cluster.rb deleted file mode 100644 index 7ce9493a1bb..00000000000 --- a/vendor/gems/kubeclient/test/test_real_cluster.rb +++ /dev/null @@ -1,162 +0,0 @@ -require_relative 'test_helper' - -class KubeclientRealClusterTest < MiniTest::Test - # Tests here actually connect to a cluster! - # For simplicity, these tests use same config/*.kubeconfig files as test_config.rb, - # so are intended to run from config/update_certs_k0s.rb script. - def setup - if ENV['KUBECLIENT_TEST_REAL_CLUSTER'] == 'true' - WebMock.enable_net_connect! - else - skip('Requires real cluster, see test/config/update_certs_k0s.rb.') - end - end - - def teardown - WebMock.disable_net_connect! # Don't allow any connections in other tests. - end - - # Partially isolated tests that check Client behavior with given `verify_ssl` value: - - # localhost and 127.0.0.1 are among names on the certificate - HOSTNAME_COVERED_BY_CERT = 'https://127.0.0.1:6443'.freeze - # 127.0.0.2 also means localhost but is not included in the certificate. - HOSTNAME_NOT_ON_CERT = 'https://127.0.0.2:6443'.freeze - - def test_real_cluster_verify_peer - config = Kubeclient::Config.read(config_file('external.kubeconfig')) - context = config.context - client1 = Kubeclient::Client.new( - HOSTNAME_COVERED_BY_CERT, 'v1', - ssl_options: context.ssl_options.merge(verify_ssl: OpenSSL::SSL::VERIFY_PEER), - auth_options: context.auth_options - ) - check_cert_accepted(client1) - client2 = Kubeclient::Client.new( - HOSTNAME_NOT_ON_CERT, 'v1', - ssl_options: context.ssl_options.merge(verify_ssl: OpenSSL::SSL::VERIFY_PEER), - auth_options: context.auth_options - ) - check_cert_rejected(client2) - end - - def test_real_cluster_verify_none - config = Kubeclient::Config.read(config_file('external.kubeconfig')) - context = config.context - client1 = Kubeclient::Client.new( - HOSTNAME_COVERED_BY_CERT, 'v1', - ssl_options: context.ssl_options.merge(verify_ssl: OpenSSL::SSL::VERIFY_NONE), - auth_options: context.auth_options - ) - check_cert_accepted(client1) - client2 = Kubeclient::Client.new( - HOSTNAME_NOT_ON_CERT, 'v1', - ssl_options: context.ssl_options.merge(verify_ssl: OpenSSL::SSL::VERIFY_NONE), - auth_options: context.auth_options - ) - check_cert_accepted(client2) - end - - # Integration tests that check combined Config -> Client behavior wrt. `verify_ssl`. - # Quite redundant, but this was an embarrasing vulnerability so want to confirm... - - def test_real_cluster_concatenated_ca - config = Kubeclient::Config.read(config_file('concatenated-ca.kubeconfig')) - context = config.context - client1 = Kubeclient::Client.new( - HOSTNAME_COVERED_BY_CERT, 'v1', - ssl_options: context.ssl_options, auth_options: context.auth_options - ) - check_cert_accepted(client1) - client2 = Kubeclient::Client.new( - HOSTNAME_NOT_ON_CERT, 'v1', - ssl_options: context.ssl_options, auth_options: context.auth_options - ) - check_cert_rejected(client2) - end - - def test_real_cluster_verify_ssl_with_ca - config = Kubeclient::Config.read(config_file('external.kubeconfig')) - context = config.context - client1 = Kubeclient::Client.new( - HOSTNAME_COVERED_BY_CERT, 'v1', - ssl_options: context.ssl_options, auth_options: context.auth_options - ) - check_cert_accepted(client1) - client2 = Kubeclient::Client.new( - HOSTNAME_NOT_ON_CERT, 'v1', - ssl_options: context.ssl_options, auth_options: context.auth_options - ) - check_cert_rejected(client2) - end - - def test_real_cluster_verify_ssl_without_ca - config = Kubeclient::Config.read(config_file('external-without-ca.kubeconfig')) - context = config.context - # Hostname matches cert but the local cluster uses self-signed certs from custom CA, - # and this config omits CA data, so verification can't succeed. - client1 = Kubeclient::Client.new( - HOSTNAME_COVERED_BY_CERT, 'v1', - ssl_options: context.ssl_options, auth_options: context.auth_options - ) - check_cert_rejected(client1) - client2 = Kubeclient::Client.new( - HOSTNAME_NOT_ON_CERT, 'v1', - ssl_options: context.ssl_options, auth_options: context.auth_options - ) - check_cert_rejected(client2) - end - - def test_real_cluster_insecure_without_ca - config = Kubeclient::Config.read(config_file('insecure.kubeconfig')) - context = config.context - # Hostname matches cert but the local cluster uses self-signed certs from custom CA, - # and this config omits CA data, so verification would fail; - # however, this config specifies `insecure-skip-tls-verify: true` so any cert goes. - client1 = Kubeclient::Client.new( - HOSTNAME_COVERED_BY_CERT, 'v1', - ssl_options: context.ssl_options, auth_options: context.auth_options - ) - check_cert_accepted(client1) - client2 = Kubeclient::Client.new( - HOSTNAME_NOT_ON_CERT, 'v1', - ssl_options: context.ssl_options, auth_options: context.auth_options - ) - check_cert_accepted(client2) - end - - private - - # Test cert checking on discovery, CRUD, and watch code paths. - def check_cert_accepted(client) - client.discover - client.get_nodes - exercise_watcher_with_timeout(client.watch_nodes) - end - - def check_cert_rejected(client) - # TODO: all OpenSSL exceptions should be wrapped with Kubeclient error. - assert_raises(Kubeclient::HttpError, OpenSSL::SSL::SSLError) do - client.discover - end - # Since discovery fails, methods like .get_nodes, .watch_nodes would all fail - # on method_missing -> discover. Call lower-level methods to test actual connection. - assert_raises(Kubeclient::HttpError, OpenSSL::SSL::SSLError) do - client.get_entities('Node', 'nodes', {}) - end - assert_raises(Kubeclient::HttpError, OpenSSL::SSL::SSLError) do - exercise_watcher_with_timeout(client.watch_entities('nodes')) - end - end - - def exercise_watcher_with_timeout(watcher) - thread = Thread.new do - sleep(1) - watcher.finish - end - watcher.each do |_notice| - break - end - thread.join - end -end diff --git a/vendor/gems/kubeclient/test/test_replication_controller.rb b/vendor/gems/kubeclient/test/test_replication_controller.rb deleted file mode 100644 index 47af72210e5..00000000000 --- a/vendor/gems/kubeclient/test/test_replication_controller.rb +++ /dev/null @@ -1,47 +0,0 @@ -require_relative 'test_helper' - -# Replication Controller entity tests -class TestReplicationController < MiniTest::Test - def test_get_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/replicationcontrollers}) - .to_return(body: open_test_file('replication_controller.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - rc = client.get_replication_controller('frontendController', 'default') - - assert_instance_of(Kubeclient::Resource, rc) - assert_equal('guestbook-controller', rc.metadata.name) - assert_equal('c71aa4c0-a240-11e4-a265-3c970e4a436a', rc.metadata.uid) - assert_equal('default', rc.metadata.namespace) - assert_equal(3, rc.spec.replicas) - assert_equal('guestbook', rc.spec.selector.name) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/default/replicationcontrollers/frontendController', - times: 1) - end - - def test_delete_replicaset_cascade - stub_core_api_list - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - opts = Kubeclient::Resource.new( - apiVersion: 'meta/v1', - gracePeriodSeconds: 0, - kind: 'DeleteOptions', - propagationPolicy: 'Foreground' - ) - - stub_request(:delete, - 'http://localhost:8080/api/v1/namespaces/default/replicationcontrollers/frontendController') - .with(body: opts.to_hash.to_json) - .to_return(status: 200, body: open_test_file('replication_controller.json'), headers: {}) - rc = client.delete_replication_controller('frontendController', 'default', delete_options: opts) - assert_kind_of(RecursiveOpenStruct, rc) - - assert_requested(:delete, - 'http://localhost:8080/api/v1/namespaces/default/replicationcontrollers/frontendController', - times: 1) - end -end diff --git a/vendor/gems/kubeclient/test/test_resource_list_without_kind.rb b/vendor/gems/kubeclient/test/test_resource_list_without_kind.rb deleted file mode 100644 index 89ab042b5f5..00000000000 --- a/vendor/gems/kubeclient/test/test_resource_list_without_kind.rb +++ /dev/null @@ -1,78 +0,0 @@ -require_relative 'test_helper' - -# Core api resource list without kind tests -class TestResourceListWithoutKind < MiniTest::Test - def test_get_from_json_api_v1 - stub_request(:get, %r{/api/v1$}) - .to_return(body: open_test_file('core_api_resource_list_without_kind.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - client.discover - - [ - { - entity: 'pod', - type: 'Pod', - name: 'pods', - methods: %w[pod pods] - }, - { - entity: 'node', - type: 'Node', - name: 'nodes', - methods: %w[node nodes] - }, - { - entity: 'service', - type: 'Service', - name: 'services', - methods: %w[service services] - } - ].each { |h| assert_entities(client.instance_variable_get(:@entities)[h[:entity]], h) } - - assert_requested(:get, - 'http://localhost:8080/api/v1', - times: 1) - end - - def test_get_from_json_oapi_v1 - stub_request(:get, %r{/oapi/v1$}) - .to_return(body: open_test_file('core_oapi_resource_list_without_kind.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/oapi/', 'v1') - client.discover - - [ - { - entity: 'template', - type: 'Template', - name: 'templates', - methods: %w[template templates] - }, - { - entity: 'build', - type: 'Build', - name: 'builds', - methods: %w[build builds] - }, - { - entity: 'project', - type: 'Project', - name: 'projects', - methods: %w[project projects] - } - ].each { |h| assert_entities(client.instance_variable_get(:@entities)[h[:entity]], h) } - - assert_requested(:get, - 'http://localhost:8080/oapi/v1', - times: 1) - end - - def assert_entities(entity, h) - assert_equal(entity.entity_type, h[:type]) - assert_equal(entity.resource_name, h[:name]) - assert_equal(entity.method_names, h[:methods]) - end -end diff --git a/vendor/gems/kubeclient/test/test_resource_quota.rb b/vendor/gems/kubeclient/test/test_resource_quota.rb deleted file mode 100644 index cf91a111196..00000000000 --- a/vendor/gems/kubeclient/test/test_resource_quota.rb +++ /dev/null @@ -1,23 +0,0 @@ -require_relative 'test_helper' - -# ResourceQuota tests -class TestResourceQuota < MiniTest::Test - def test_get_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/resourcequotas}) - .to_return(body: open_test_file('resource_quota.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - quota = client.get_resource_quota('quota', 'quota-example') - - assert_instance_of(Kubeclient::Resource, quota) - assert_equal('quota', quota.metadata.name) - assert_equal('20', quota.spec.hard.cpu) - assert_equal('10', quota.spec.hard.secrets) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/quota-example/resourcequotas/quota', - times: 1) - end -end diff --git a/vendor/gems/kubeclient/test/test_secret.rb b/vendor/gems/kubeclient/test/test_secret.rb deleted file mode 100644 index ec129075a14..00000000000 --- a/vendor/gems/kubeclient/test/test_secret.rb +++ /dev/null @@ -1,62 +0,0 @@ -require_relative 'test_helper' - -# Namespace entity tests -class TestSecret < MiniTest::Test - def test_get_secret_v1 - stub_core_api_list - stub_request(:get, %r{/secrets}) - .to_return(body: open_test_file('created_secret.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - secret = client.get_secret('test-secret', 'dev') - - assert_instance_of(Kubeclient::Resource, secret) - assert_equal('4e38a198-2bcb-11e5-a483-0e840567604d', secret.metadata.uid) - assert_equal('test-secret', secret.metadata.name) - assert_equal('v1', secret.apiVersion) - assert_equal('Y2F0J3MgYXJlIGF3ZXNvbWUK', secret.data['super-secret']) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/dev/secrets/test-secret', - times: 1) - end - - def test_delete_secret_v1 - stub_core_api_list - stub_request(:delete, %r{/secrets}) - .to_return(status: 200, body: open_test_file('created_secret.json')) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - secret = client.delete_secret('test-secret', 'dev') - assert_kind_of(RecursiveOpenStruct, secret) - - assert_requested(:delete, - 'http://localhost:8080/api/v1/namespaces/dev/secrets/test-secret', - times: 1) - end - - def test_create_secret_v1 - stub_core_api_list - stub_request(:post, %r{/secrets}) - .to_return(body: open_test_file('created_secret.json'), - status: 201) - - secret = Kubeclient::Resource.new - secret.metadata = {} - secret.metadata.name = 'test-secret' - secret.metadata.namespace = 'dev' - secret.data = {} - secret.data['super-secret'] = 'Y2F0J3MgYXJlIGF3ZXNvbWUK' - - client = Kubeclient::Client.new('http://localhost:8080/api/') - created_secret = client.create_secret(secret) - assert_instance_of(Kubeclient::Resource, created_secret) - assert_equal(secret.metadata.name, created_secret.metadata.name) - assert_equal(secret.metadata.namespace, created_secret.metadata.namespace) - assert_equal( - secret.data['super-secret'], - created_secret.data['super-secret'] - ) - end -end diff --git a/vendor/gems/kubeclient/test/test_security_context_constraint.rb b/vendor/gems/kubeclient/test/test_security_context_constraint.rb deleted file mode 100644 index 23e53c4464e..00000000000 --- a/vendor/gems/kubeclient/test/test_security_context_constraint.rb +++ /dev/null @@ -1,62 +0,0 @@ -require_relative 'test_helper' - -# kind: 'SecurityContextConstraints' entity tests. -# This is one of the unusual `kind`s that are already plural (https://github.com/kubernetes/kubernetes/issues/8115). -# We force singular in method names like 'create_endpoint', -# but `kind` should remain plural as in kubernetes. -class TestSecurityContextConstraints < MiniTest::Test - def test_create_security_context_constraint - stub_request(:get, %r{/apis/security.openshift.io/v1$}).to_return( - body: open_test_file('security.openshift.io_api_resource_list.json'), - status: 200 - ) - - testing_scc = Kubeclient::Resource.new( - metadata: { - name: 'teleportation' - }, - runAsUser: { - type: 'MustRunAs' - }, - seLinuxContext: { - type: 'MustRunAs' - } - ) - req_body = '{"metadata":{"name":"teleportation"},"runAsUser":{"type":"MustRunAs"},' \ - '"seLinuxContext":{"type":"MustRunAs"},' \ - '"kind":"SecurityContextConstraints","apiVersion":"security.openshift.io/v1"}' - - stub_request(:post, 'http://localhost:8080/apis/security.openshift.io/v1/securitycontextconstraints') - .with(body: req_body) - .to_return(body: open_test_file('created_security_context_constraint.json'), status: 201) - - client = Kubeclient::Client.new('http://localhost:8080/apis/security.openshift.io', 'v1') - created_scc = client.create_security_context_constraint(testing_scc) - assert_equal('SecurityContextConstraints', created_scc.kind) - assert_equal('security.openshift.io/v1', created_scc.apiVersion) - - client = Kubeclient::Client.new('http://localhost:8080/apis/security.openshift.io', 'v1', - as: :parsed_symbolized) - created_scc = client.create_security_context_constraint(testing_scc) - assert_equal('SecurityContextConstraints', created_scc[:kind]) - assert_equal('security.openshift.io/v1', created_scc[:apiVersion]) - end - - def test_get_security_context_constraints - stub_request(:get, %r{/apis/security.openshift.io/v1$}).to_return( - body: open_test_file('security.openshift.io_api_resource_list.json'), - status: 200 - ) - stub_request(:get, %r{/securitycontextconstraints}) - .to_return(body: open_test_file('security_context_constraint_list.json'), status: 200) - client = Kubeclient::Client.new('http://localhost:8080/apis/security.openshift.io', 'v1') - - collection = client.get_security_context_constraints(as: :parsed_symbolized) - assert_equal('SecurityContextConstraintsList', collection[:kind]) - assert_equal('security.openshift.io/v1', collection[:apiVersion]) - - # Stripping of 'List' in collection.kind RecursiveOpenStruct mode only is historic. - collection = client.get_security_context_constraints - assert_equal('SecurityContextConstraints', collection.kind) - end -end diff --git a/vendor/gems/kubeclient/test/test_service.rb b/vendor/gems/kubeclient/test/test_service.rb deleted file mode 100644 index 6ef3368780d..00000000000 --- a/vendor/gems/kubeclient/test/test_service.rb +++ /dev/null @@ -1,357 +0,0 @@ -require_relative 'test_helper' - -# Service entity tests -class TestService < MiniTest::Test - def test_construct_our_own_service - our_service = Kubeclient::Resource.new - our_service.metadata = {} - our_service.metadata.name = 'guestbook' - our_service.metadata.namespace = 'staging' - our_service.metadata.labels = {} - our_service.metadata.labels.name = 'guestbook' - - our_service.spec = {} - our_service.spec.ports = [{ - 'port' => 3000, - 'targetPort' => 'http-server', - 'protocol' => 'TCP' - }] - - assert_equal('guestbook', our_service.metadata.labels.name) - - hash = our_service.to_h - - assert_equal(our_service.metadata.labels.name, - hash[:metadata][:labels][:name]) - - expected_url = 'http://localhost:8080/api/v1/namespaces/staging/services' - stub_core_api_list - stub_request(:post, expected_url) - .to_return(body: open_test_file('created_service.json'), status: 201) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - created = client.create_service(our_service) - - assert_instance_of(Kubeclient::Resource, created) - assert_equal(created.metadata.name, our_service.metadata.name) - assert_equal(created.spec.ports.size, our_service.spec.ports.size) - - # Check that original entity_config is not modified by kind/apiVersion patches: - assert_nil(our_service.kind) - - assert_requested(:post, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - data['kind'] == 'Service' && - data['apiVersion'] == 'v1' && - data['metadata']['name'] == 'guestbook' && - data['metadata']['namespace'] == 'staging' - end - end - - def test_construct_service_from_symbol_keys - service = Kubeclient::Resource.new - service.metadata = { - labels: { tier: 'frontend' }, - name: 'test-service', - namespace: 'staging' - } - service.spec = { - ports: [{ - port: 3000, - targetPort: 'http-server', - protocol: 'TCP' - }] - } - - expected_url = 'http://localhost:8080/api/v1/namespaces/staging/services' - stub_core_api_list - stub_request(:post, expected_url) - .to_return(body: open_test_file('created_service.json'), status: 201) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - client.create_service(service) - - assert_requested(:post, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - data['kind'] == 'Service' && - data['apiVersion'] == 'v1' && - data['metadata']['name'] == 'test-service' && - data['metadata']['labels']['tier'] == 'frontend' && - data['metadata']['namespace'] == 'staging' - end - end - - def test_construct_service_from_string_keys - service = Kubeclient::Resource.new - service.metadata = { - 'labels' => { 'tier' => 'frontend' }, - 'name' => 'test-service', - 'namespace' => 'staging' - } - service.spec = { - 'ports' => [{ - 'port' => 3000, - 'targetPort' => 'http-server', - 'protocol' => 'TCP' - }] - } - - stub_core_api_list - expected_url = 'http://localhost:8080/api/v1/namespaces/staging/services' - stub_request(:post, %r{namespaces/staging/services}) - .to_return(body: open_test_file('created_service.json'), status: 201) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - client.create_service(service) - - assert_requested(:post, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - data['kind'] == 'Service' && - data['apiVersion'] == 'v1' && - data['metadata']['name'] == 'test-service' && - data['metadata']['labels']['tier'] == 'frontend' && - data['metadata']['namespace'] == 'staging' - end - end - - def test_conversion_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/services}) - .to_return(body: open_test_file('service.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - service = client.get_service('redis-slave', 'development') - - assert_instance_of(Kubeclient::Resource, service) - assert_equal('2015-04-05T13:00:31Z', - service.metadata.creationTimestamp) - assert_equal('bdb80a8f-db93-11e4-b293-f8b156af4ae1', service.metadata.uid) - assert_equal('redis-slave', service.metadata.name) - assert_equal('2815', service.metadata.resourceVersion) - assert_equal('v1', service.apiVersion) - assert_equal('10.0.0.140', service.spec.clusterIP) - assert_equal('development', service.metadata.namespace) - - assert_equal('TCP', service.spec.ports[0].protocol) - assert_equal(6379, service.spec.ports[0].port) - assert_equal('', service.spec.ports[0].name) - assert_equal('redis-server', service.spec.ports[0].targetPort) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/development/services/redis-slave', - times: 1) - end - - def test_delete_service - our_service = Kubeclient::Resource.new - our_service.name = 'redis-service' - # TODO, new ports assignment to be added - our_service.labels = {} - our_service.labels.component = 'apiserver' - our_service.labels.provider = 'kubernetes' - - stub_core_api_list - stub_request(:delete, %r{/namespaces/default/services}) - .to_return(body: open_test_file('service.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - our_service = client.delete_service(our_service.name, 'default') - assert_kind_of(RecursiveOpenStruct, our_service) - - assert_requested(:delete, - 'http://localhost:8080/api/v1/namespaces/default/services/redis-service', - times: 1) - end - - def test_get_service_no_ns - stub_core_api_list - # when not specifying namespace for entities which - # are not node or namespace, the request will fail - stub_request(:get, %r{/services/redis-slave}) - .to_return(status: 404) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - - exception = assert_raises(Kubeclient::HttpError) do - client.get_service('redis-slave') - end - assert_equal(404, exception.error_code) - end - - def test_get_service - stub_core_api_list - stub_request(:get, %r{/namespaces/development/services/redis-slave}) - .to_return(body: open_test_file('service.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/') - service = client.get_service('redis-slave', 'development') - assert_equal('redis-slave', service.metadata.name) - - assert_requested(:get, - 'http://localhost:8080/api/v1/namespaces/development/services/redis-slave', - times: 1) - end - - def test_update_service - service = Kubeclient::Resource.new - name = 'my_service' - - service.metadata = {} - service.metadata.name = name - service.metadata.namespace = 'development' - - stub_core_api_list - expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}" - stub_request(:put, expected_url) - .to_return(body: open_test_file('service_update.json'), status: 201) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - service = client.update_service(service) - assert_kind_of(RecursiveOpenStruct, service) - - assert_requested(:put, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - data['metadata']['name'] == name && - data['metadata']['namespace'] == 'development' - end - end - - def test_update_service_with_string_keys - service = Kubeclient::Resource.new - name = 'my_service' - - service.metadata = { - 'name' => name, - 'namespace' => 'development' - } - - stub_core_api_list - expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}" - stub_request(:put, expected_url) - .to_return(body: open_test_file('service_update.json'), status: 201) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - service = client.update_service(service) - assert_kind_of(RecursiveOpenStruct, service) - - assert_requested(:put, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - data['metadata']['name'] == name && - data['metadata']['namespace'] == 'development' - end - end - - def test_patch_service - service = Kubeclient::Resource.new - name = 'my_service' - - service.metadata = {} - service.metadata.name = name - service.metadata.namespace = 'development' - - stub_core_api_list - expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}" - stub_request(:patch, expected_url) - .to_return(body: open_test_file('service_patch.json'), status: 200) - - patch = { - metadata: { - annotations: { - key: 'value' - } - } - } - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - service = client.patch_service(name, patch, 'development') - assert_kind_of(RecursiveOpenStruct, service) - - assert_requested(:patch, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - data['metadata']['annotations']['key'] == 'value' - end - end - - def test_apply_service - service = Kubeclient::Resource.new - name = 'my_service' - - service.metadata = {} - service.metadata.name = name - service.metadata.namespace = 'development' - service.metadata.annotations = {} - service.metadata.annotations['key'] = 'value' - - stub_core_api_list - resource_name = "#{name}?fieldManager=myapp&force=true" - expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{resource_name}" - stub_request(:patch, expected_url) - .to_return(body: open_test_file('service_patch.json'), status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - service = client.apply_service(service, field_manager: 'myapp') - assert_kind_of(RecursiveOpenStruct, service) - - assert_requested(:patch, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - req.headers['Content-Type'] == 'application/apply-patch+yaml' && - data['metadata']['annotations']['key'] == 'value' - end - end - - def test_json_patch_service - service = Kubeclient::Resource.new - name = 'my-service' - - service.metadata = {} - service.metadata.name = name - service.metadata.namespace = 'development' - - stub_core_api_list - expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}" - stub_request(:patch, expected_url) - .to_return(body: open_test_file('service_json_patch.json'), status: 200) - - patch = [ - { 'op' => 'add', 'path' => '/spec/type', 'value' => 'LoadBalancer' } - ] - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - service = client.json_patch_service(name, patch, 'development') - assert_kind_of(RecursiveOpenStruct, service) - - assert_requested(:patch, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - req.headers['Content-Type'] == 'application/json-patch+json' && - data == patch - end - end - - def test_merge_patch_service - service = Kubeclient::Resource.new - name = 'my-service' - - service.metadata = {} - service.metadata.name = name - service.metadata.namespace = 'development' - - stub_core_api_list - expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}" - stub_request(:patch, expected_url) - .to_return(body: open_test_file('service_merge_patch.json'), status: 200) - - patch = { spec: { type: 'NodePort' } } - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - service = client.merge_patch_service(name, patch, 'development') - assert_kind_of(RecursiveOpenStruct, service) - - assert_requested(:patch, expected_url, times: 1) do |req| - data = JSON.parse(req.body) - req.headers['Content-Type'] == 'application/merge-patch+json' && - data['spec']['type'] == 'NodePort' - end - end -end diff --git a/vendor/gems/kubeclient/test/test_service_account.rb b/vendor/gems/kubeclient/test/test_service_account.rb deleted file mode 100644 index 87a08a215bd..00000000000 --- a/vendor/gems/kubeclient/test/test_service_account.rb +++ /dev/null @@ -1,26 +0,0 @@ -require_relative 'test_helper' - -# ServiceAccount tests -class TestServiceAccount < MiniTest::Test - def test_get_from_json_v1 - stub_core_api_list - stub_request(:get, %r{/serviceaccounts}) - .to_return(body: open_test_file('service_account.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - account = client.get_service_account('default') - - assert_instance_of(Kubeclient::Resource, account) - assert_equal('default', account.metadata.name) - assert_equal('default-token-6s23q', account.secrets[0].name) - assert_equal('default-dockercfg-62tf3', account.secrets[1].name) - - assert_requested(:get, - 'http://localhost:8080/api/v1/serviceaccounts/default', - times: 1) - assert_requested(:get, - 'http://localhost:8080/api/v1', - times: 1) - end -end diff --git a/vendor/gems/kubeclient/test/test_watch.rb b/vendor/gems/kubeclient/test/test_watch.rb deleted file mode 100644 index 8d74008c851..00000000000 --- a/vendor/gems/kubeclient/test/test_watch.rb +++ /dev/null @@ -1,195 +0,0 @@ -require_relative 'test_helper' - -# Watch entity tests -class TestWatch < MiniTest::Test - def test_watch_pod_success - stub_core_api_list - - expected = [ - { 'type' => 'ADDED', 'resourceVersion' => '1389' }, - { 'type' => 'MODIFIED', 'resourceVersion' => '1390' }, - { 'type' => 'DELETED', 'resourceVersion' => '1398' } - ] - - stub_request(:get, %r{/watch/pods}) - .to_return(body: open_test_file('watch_stream.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - - client.watch_pods.to_enum.with_index do |notice, index| - assert_instance_of(Kubeclient::Resource, notice) - assert_equal(expected[index]['type'], notice.type) - assert_equal('Pod', notice.object.kind) - assert_equal('php', notice.object.metadata.name) - assert_equal(expected[index]['resourceVersion'], - notice.object.metadata.resourceVersion) - end - end - - def test_watch_pod_block - stub_core_api_list - stub_request(:get, %r{/watch/pods}) - .to_return(body: open_test_file('watch_stream.json'), - status: 200) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - yielded = [] - client.watch_pods { |notice| yielded << notice.type } - - assert_equal %w[ADDED MODIFIED DELETED], yielded - end - - def test_watch_pod_raw - stub_core_api_list - - stub_request(:get, %r{/watch/pods}).to_return( - body: open_test_file('watch_stream.json'), - status: 200 - ) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - - got = nil - client.watch_pods(as: :raw).each { |notice| got = notice } - assert_match(/\A{"type":"DELETED"/, got) - end - - def test_watch_pod_failure - stub_core_api_list - stub_request(:get, %r{/watch/pods}).to_return(status: 404) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - assert_raises(Kubeclient::HttpError) do - client.watch_pods.each do - end - end - end - - def test_watch_pod_follow_redirect - stub_core_api_list - - redirect = 'http://localhost:1234/api/v1/watch/pods' - stub_request(:get, %r{/watch/pods}) - .to_return(status: 302, headers: { location: redirect }) - - stub_request(:get, redirect).to_return( - body: open_test_file('watch_stream.json'), - status: 200 - ) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') - - got = nil - client.watch_pods.each { |notice| got = notice } - assert_equal('DELETED', got.type) - end - - def test_watch_pod_max_redirect - stub_core_api_list - - redirect = 'http://localhost:1234/api/v1/watcher/pods' - stub_request(:get, %r{/watch/pods}) - .to_return(status: 302, headers: { location: redirect }) - - stub_request(:get, redirect).to_return( - body: open_test_file('watch_stream.json'), - status: 200 - ) - - client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1', http_max_redirects: 0) - - assert_raises(Kubeclient::HttpError) do - client.watch_pods.each do - end - end - end - - # Ensure that WatchStream respects a format that's not JSON - def test_watch_stream_text - url = 'http://www.example.com/foobar' - expected_lines = open_test_file('pod_log.txt').read.split("\n") - - stub_request(:get, url) - .to_return(body: open_test_file('pod_log.txt'), - status: 200) - - stream = Kubeclient::Common::WatchStream.new(URI.parse(url), {}, formatter: ->(v) { v }) - stream.to_enum.with_index do |line, index| - assert_instance_of(String, line) - assert_equal(expected_lines[index], line) - end - end - - def test_watch_with_resource_version - api_host = 'http://localhost:8080/api' - version = '1995' - stub_core_api_list - stub_request(:get, %r{.*\/watch/events}) - .to_return(body: open_test_file('watch_stream.json'), - status: 200) - - client = Kubeclient::Client.new(api_host, 'v1') - results = client.watch_events(version).to_enum - - assert_equal(3, results.count) - assert_requested(:get, - "#{api_host}/v1/watch/events?resourceVersion=#{version}", - times: 1) - end - - def test_watch_with_label_selector - api_host = 'http://localhost:8080/api' - selector = 'name=redis-master' - - stub_core_api_list - stub_request(:get, %r{.*\/watch/events}) - .to_return(body: open_test_file('watch_stream.json'), - status: 200) - - client = Kubeclient::Client.new(api_host, 'v1') - results = client.watch_events(label_selector: selector).to_enum - - assert_equal(3, results.count) - assert_requested(:get, - "#{api_host}/v1/watch/events?labelSelector=#{selector}", - times: 1) - end - - def test_watch_with_field_selector - api_host = 'http://localhost:8080/api' - selector = 'involvedObject.kind=Pod' - - stub_core_api_list - stub_request(:get, %r{.*\/watch/events}) - .to_return(body: open_test_file('watch_stream.json'), - status: 200) - - client = Kubeclient::Client.new(api_host, 'v1') - results = client.watch_events(field_selector: selector).to_enum - - assert_equal(3, results.count) - assert_requested(:get, - "#{api_host}/v1/watch/events?fieldSelector=#{selector}", - times: 1) - end - - def test_watch_with_finish_and_ebadf - api_host = 'http://localhost:8080/api' - - stub_core_api_list - stub_request(:get, %r{.*\/watch/events}) - .to_return(body: open_test_file('watch_stream.json'), status: 200) - - client = Kubeclient::Client.new(api_host, 'v1') - watcher = client.watch_events - - # explodes when StandardError is not caught - watcher.each do - watcher.finish - raise StandardError - end - - assert_requested(:get, "#{api_host}/v1/watch/events", times: 1) - end -end diff --git a/vendor/gems/kubeclient/test/txt/pod_log.txt b/vendor/gems/kubeclient/test/txt/pod_log.txt deleted file mode 100644 index 9f9a75157aa..00000000000 --- a/vendor/gems/kubeclient/test/txt/pod_log.txt +++ /dev/null @@ -1,6 +0,0 @@ -Initializing server... -...loaded configuration -...updated settings -...discovered local servers -...frobinated disks -Complete! diff --git a/vendor/gems/kubeclient/test/valid_token_file b/vendor/gems/kubeclient/test/valid_token_file deleted file mode 100644 index df2c2eb6572..00000000000 --- a/vendor/gems/kubeclient/test/valid_token_file +++ /dev/null @@ -1 +0,0 @@ -valid_token |