summaryrefslogtreecommitdiff
path: root/vendor/gems/kubeclient/test
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2023-03-20 15:19:03 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2023-03-20 15:19:03 +0000
commit14bd84b61276ef29b97d23642d698de769bacfd2 (patch)
treef9eba90140c1bd874211dea17750a0d422c04080 /vendor/gems/kubeclient/test
parent891c388697b2db0d8ee0c8358a9bdbf6dc56d581 (diff)
downloadgitlab-ce-14bd84b61276ef29b97d23642d698de769bacfd2.tar.gz
Add latest changes from gitlab-org/gitlab@15-10-stable-eev15.10.0-rc42
Diffstat (limited to 'vendor/gems/kubeclient/test')
-rw-r--r--vendor/gems/kubeclient/test/cassettes/kubernetes_guestbook.yml879
-rw-r--r--vendor/gems/kubeclient/test/config/allinone.kubeconfig21
-rw-r--r--vendor/gems/kubeclient/test/config/another-ca1.pem19
-rw-r--r--vendor/gems/kubeclient/test/config/another-ca2.pem19
-rw-r--r--vendor/gems/kubeclient/test/config/concatenated-ca.kubeconfig20
-rw-r--r--vendor/gems/kubeclient/test/config/concatenated-ca.pem57
-rw-r--r--vendor/gems/kubeclient/test/config/execauth.kubeconfig61
-rw-r--r--vendor/gems/kubeclient/test/config/external-ca.pem19
-rw-r--r--vendor/gems/kubeclient/test/config/external-cert.pem20
-rw-r--r--vendor/gems/kubeclient/test/config/external-key.rsa27
-rw-r--r--vendor/gems/kubeclient/test/config/external-without-ca.kubeconfig21
-rw-r--r--vendor/gems/kubeclient/test/config/external.kubeconfig20
-rw-r--r--vendor/gems/kubeclient/test/config/gcpauth.kubeconfig21
-rw-r--r--vendor/gems/kubeclient/test/config/gcpcmdauth.kubeconfig25
-rw-r--r--vendor/gems/kubeclient/test/config/insecure-custom-ca.kubeconfig22
-rw-r--r--vendor/gems/kubeclient/test/config/insecure.kubeconfig25
-rw-r--r--vendor/gems/kubeclient/test/config/nouser.kubeconfig15
-rw-r--r--vendor/gems/kubeclient/test/config/oidcauth.kubeconfig24
-rw-r--r--vendor/gems/kubeclient/test/config/secure-without-ca.kubeconfig22
-rw-r--r--vendor/gems/kubeclient/test/config/secure.kubeconfig21
-rw-r--r--vendor/gems/kubeclient/test/config/timestamps.kubeconfig25
-rwxr-xr-xvendor/gems/kubeclient/test/config/update_certs_k0s.rb53
-rw-r--r--vendor/gems/kubeclient/test/config/userauth.kubeconfig27
-rw-r--r--vendor/gems/kubeclient/test/json/bindings_list.json10
-rw-r--r--vendor/gems/kubeclient/test/json/component_status.json17
-rw-r--r--vendor/gems/kubeclient/test/json/component_status_list.json52
-rw-r--r--vendor/gems/kubeclient/test/json/config.istio.io_api_resource_list.json679
-rw-r--r--vendor/gems/kubeclient/test/json/config_map_list.json9
-rw-r--r--vendor/gems/kubeclient/test/json/core_api_resource_list.json181
-rw-r--r--vendor/gems/kubeclient/test/json/core_api_resource_list_without_kind.json129
-rw-r--r--vendor/gems/kubeclient/test/json/core_oapi_resource_list_without_kind.json197
-rw-r--r--vendor/gems/kubeclient/test/json/created_endpoint.json28
-rw-r--r--vendor/gems/kubeclient/test/json/created_namespace.json20
-rw-r--r--vendor/gems/kubeclient/test/json/created_secret.json16
-rw-r--r--vendor/gems/kubeclient/test/json/created_security_context_constraint.json65
-rw-r--r--vendor/gems/kubeclient/test/json/created_service.json31
-rw-r--r--vendor/gems/kubeclient/test/json/empty_pod_list.json9
-rw-r--r--vendor/gems/kubeclient/test/json/endpoint_list.json48
-rw-r--r--vendor/gems/kubeclient/test/json/entity_list.json56
-rw-r--r--vendor/gems/kubeclient/test/json/event_list.json35
-rw-r--r--vendor/gems/kubeclient/test/json/extensions_v1beta1_api_resource_list.json217
-rw-r--r--vendor/gems/kubeclient/test/json/limit_range.json23
-rw-r--r--vendor/gems/kubeclient/test/json/limit_range_list.json31
-rw-r--r--vendor/gems/kubeclient/test/json/namespace.json13
-rw-r--r--vendor/gems/kubeclient/test/json/namespace_exception.json8
-rw-r--r--vendor/gems/kubeclient/test/json/namespace_list.json32
-rw-r--r--vendor/gems/kubeclient/test/json/node.json29
-rw-r--r--vendor/gems/kubeclient/test/json/node_list.json37
-rw-r--r--vendor/gems/kubeclient/test/json/node_notice.json160
-rw-r--r--vendor/gems/kubeclient/test/json/persistent_volume.json37
-rw-r--r--vendor/gems/kubeclient/test/json/persistent_volume_claim.json32
-rw-r--r--vendor/gems/kubeclient/test/json/persistent_volume_claim_list.json40
-rw-r--r--vendor/gems/kubeclient/test/json/persistent_volume_claims_nil_items.json8
-rw-r--r--vendor/gems/kubeclient/test/json/persistent_volume_list.json45
-rw-r--r--vendor/gems/kubeclient/test/json/pod.json92
-rw-r--r--vendor/gems/kubeclient/test/json/pod_list.json79
-rw-r--r--vendor/gems/kubeclient/test/json/pod_template_list.json9
-rw-r--r--vendor/gems/kubeclient/test/json/pods_1.json265
-rw-r--r--vendor/gems/kubeclient/test/json/pods_2.json102
-rw-r--r--vendor/gems/kubeclient/test/json/pods_410.json9
-rw-r--r--vendor/gems/kubeclient/test/json/processed_template.json27
-rw-r--r--vendor/gems/kubeclient/test/json/replication_controller.json57
-rw-r--r--vendor/gems/kubeclient/test/json/replication_controller_list.json66
-rw-r--r--vendor/gems/kubeclient/test/json/resource_quota.json46
-rw-r--r--vendor/gems/kubeclient/test/json/resource_quota_list.json54
-rw-r--r--vendor/gems/kubeclient/test/json/secret_list.json44
-rw-r--r--vendor/gems/kubeclient/test/json/security.openshift.io_api_resource_list.json69
-rw-r--r--vendor/gems/kubeclient/test/json/security_context_constraint_list.json375
-rw-r--r--vendor/gems/kubeclient/test/json/service.json33
-rw-r--r--vendor/gems/kubeclient/test/json/service_account.json25
-rw-r--r--vendor/gems/kubeclient/test/json/service_account_list.json82
-rw-r--r--vendor/gems/kubeclient/test/json/service_illegal_json_404.json1
-rw-r--r--vendor/gems/kubeclient/test/json/service_json_patch.json26
-rw-r--r--vendor/gems/kubeclient/test/json/service_list.json97
-rw-r--r--vendor/gems/kubeclient/test/json/service_merge_patch.json26
-rw-r--r--vendor/gems/kubeclient/test/json/service_patch.json25
-rw-r--r--vendor/gems/kubeclient/test/json/service_update.json22
-rw-r--r--vendor/gems/kubeclient/test/json/template.json27
-rw-r--r--vendor/gems/kubeclient/test/json/template.openshift.io_api_resource_list.json75
-rw-r--r--vendor/gems/kubeclient/test/json/template_list.json35
-rw-r--r--vendor/gems/kubeclient/test/json/versions_list.json6
-rw-r--r--vendor/gems/kubeclient/test/json/watch_stream.json3
-rw-r--r--vendor/gems/kubeclient/test/test_common.rb95
-rw-r--r--vendor/gems/kubeclient/test/test_common_url_handling.rb160
-rw-r--r--vendor/gems/kubeclient/test/test_component_status.rb29
-rw-r--r--vendor/gems/kubeclient/test/test_config.rb271
-rw-r--r--vendor/gems/kubeclient/test/test_endpoint.rb54
-rw-r--r--vendor/gems/kubeclient/test/test_exec_credentials.rb225
-rw-r--r--vendor/gems/kubeclient/test/test_gcp_command_credentials.rb27
-rw-r--r--vendor/gems/kubeclient/test/test_google_application_default_credentials.rb15
-rw-r--r--vendor/gems/kubeclient/test/test_guestbook_go.rb237
-rw-r--r--vendor/gems/kubeclient/test/test_helper.rb28
-rw-r--r--vendor/gems/kubeclient/test/test_kubeclient.rb881
-rw-r--r--vendor/gems/kubeclient/test/test_limit_range.rb25
-rw-r--r--vendor/gems/kubeclient/test/test_missing_methods.rb80
-rw-r--r--vendor/gems/kubeclient/test/test_namespace.rb59
-rw-r--r--vendor/gems/kubeclient/test/test_node.rb70
-rw-r--r--vendor/gems/kubeclient/test/test_oidc_auth_provider.rb103
-rw-r--r--vendor/gems/kubeclient/test/test_persistent_volume.rb29
-rw-r--r--vendor/gems/kubeclient/test/test_persistent_volume_claim.rb28
-rw-r--r--vendor/gems/kubeclient/test/test_pod.rb81
-rw-r--r--vendor/gems/kubeclient/test/test_pod_log.rb157
-rw-r--r--vendor/gems/kubeclient/test/test_process_template.rb80
-rw-r--r--vendor/gems/kubeclient/test/test_real_cluster.rb162
-rw-r--r--vendor/gems/kubeclient/test/test_replication_controller.rb47
-rw-r--r--vendor/gems/kubeclient/test/test_resource_list_without_kind.rb78
-rw-r--r--vendor/gems/kubeclient/test/test_resource_quota.rb23
-rw-r--r--vendor/gems/kubeclient/test/test_secret.rb62
-rw-r--r--vendor/gems/kubeclient/test/test_security_context_constraint.rb62
-rw-r--r--vendor/gems/kubeclient/test/test_service.rb357
-rw-r--r--vendor/gems/kubeclient/test/test_service_account.rb26
-rw-r--r--vendor/gems/kubeclient/test/test_watch.rb195
-rw-r--r--vendor/gems/kubeclient/test/txt/pod_log.txt6
-rw-r--r--vendor/gems/kubeclient/test/valid_token_file1
114 files changed, 0 insertions, 9287 deletions
diff --git a/vendor/gems/kubeclient/test/cassettes/kubernetes_guestbook.yml b/vendor/gems/kubeclient/test/cassettes/kubernetes_guestbook.yml
deleted file mode 100644
index 3829add6d75..00000000000
--- a/vendor/gems/kubeclient/test/cassettes/kubernetes_guestbook.yml
+++ /dev/null
@@ -1,879 +0,0 @@
----
-http_interactions:
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 404
- message: Not Found
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '253'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "namespaces \"kubeclient-ns\" not found",
- "reason": "NotFound",
- "details": {
- "name": "kubeclient-ns",
- "kind": "namespaces"
- },
- "code": 404
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/guestbook
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 404
- message: Not Found
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '239'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "service \"guestbook\" not found",
- "reason": "NotFound",
- "details": {
- "name": "guestbook",
- "kind": "service"
- },
- "code": 404
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/redis-master
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 404
- message: Not Found
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '245'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "service \"redis-master\" not found",
- "reason": "NotFound",
- "details": {
- "name": "redis-master",
- "kind": "service"
- },
- "code": 404
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/redis-slave
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 404
- message: Not Found
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '243'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "service \"redis-slave\" not found",
- "reason": "NotFound",
- "details": {
- "name": "redis-slave",
- "kind": "service"
- },
- "code": 404
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/guestbook
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 404
- message: Not Found
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '269'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "replicationControllers \"guestbook\" not found",
- "reason": "NotFound",
- "details": {
- "name": "guestbook",
- "kind": "replicationControllers"
- },
- "code": 404
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-master
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 404
- message: Not Found
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '275'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "replicationControllers \"redis-master\" not found",
- "reason": "NotFound",
- "details": {
- "name": "redis-master",
- "kind": "replicationControllers"
- },
- "code": 404
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-slave
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 404
- message: Not Found
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '273'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "replicationControllers \"redis-slave\" not found",
- "reason": "NotFound",
- "details": {
- "name": "redis-slave",
- "kind": "replicationControllers"
- },
- "code": 404
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: post
- uri: http://10.35.0.23:8080/api/v1/namespaces
- body:
- encoding: UTF-8
- string: '{"metadata":{"name":"kubeclient-ns"},"kind":"Namespace","apiVersion":"v1"}'
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- Content-Length:
- - '74'
- User-Agent:
- - Ruby
- response:
- status:
- code: 201
- message: Created
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '297'
- body:
- encoding: UTF-8
- string: '{"kind":"Namespace","apiVersion":"v1","metadata":{"name":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns","uid":"f41e6b27-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"534","creationTimestamp":"2015-08-09T10:03:59Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: post
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services
- body:
- encoding: UTF-8
- string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"name":"guestbook"},"name":"guestbook"},"spec":{"selector":{"app":"guestbook"},"ports":[{"port":3000,"targetPort":"http-server"}]},"type":"LoadBalancer","kind":"Service","apiVersion":"v1"}'
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- Content-Length:
- - '239'
- User-Agent:
- - Ruby
- response:
- status:
- code: 201
- message: Created
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '521'
- body:
- encoding: UTF-8
- string: '{"kind":"Service","apiVersion":"v1","metadata":{"name":"guestbook","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/guestbook","uid":"f42187e1-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"538","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"name":"guestbook"}},"spec":{"ports":[{"protocol":"TCP","port":3000,"targetPort":"http-server","nodePort":0}],"selector":{"app":"guestbook"},"clusterIP":"10.0.0.80","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: post
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services
- body:
- encoding: UTF-8
- string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"redis","role":"master"},"name":"redis-master"},"spec":{"selector":{"app":"redis","role":"master"},"ports":[{"port":6379,"targetPort":"redis-server"}]},"kind":"Service","apiVersion":"v1"}'
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- Content-Length:
- - '244'
- User-Agent:
- - Ruby
- response:
- status:
- code: 201
- message: Created
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '552'
- body:
- encoding: UTF-8
- string: '{"kind":"Service","apiVersion":"v1","metadata":{"name":"redis-master","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/redis-master","uid":"f423bf8b-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"542","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"master"}},"spec":{"ports":[{"protocol":"TCP","port":6379,"targetPort":"redis-server","nodePort":0}],"selector":{"app":"redis","role":"master"},"clusterIP":"10.0.0.140","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: post
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services
- body:
- encoding: UTF-8
- string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"redis","role":"slave"},"name":"redis-slave"},"spec":{"selector":{"app":"redis","role":"slave"},"ports":[{"port":6379,"targetPort":"redis-server"}]},"kind":"Service","apiVersion":"v1"}'
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- Content-Length:
- - '241'
- User-Agent:
- - Ruby
- response:
- status:
- code: 201
- message: Created
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '548'
- body:
- encoding: UTF-8
- string: '{"kind":"Service","apiVersion":"v1","metadata":{"name":"redis-slave","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/redis-slave","uid":"f4264678-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"545","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"slave"}},"spec":{"ports":[{"protocol":"TCP","port":6379,"targetPort":"redis-server","nodePort":0}],"selector":{"app":"redis","role":"slave"},"clusterIP":"10.0.0.154","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: post
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers
- body:
- encoding: UTF-8
- string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"guestbook","role":"slave"},"name":"guestbook"},"spec":{"selector":{"app":"guestbook"},"template":{"metadata":{"labels":{"app":"guestbook"}},"spec":{"containers":[{"name":"guestbook","image":"kubernetes/guestbook:v2","ports":[{"name":"http-server","containerPort":3000}]}]}},"replicas":3},"kind":"ReplicationController","apiVersion":"v1"}'
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- Content-Length:
- - '395'
- User-Agent:
- - Ruby
- response:
- status:
- code: 201
- message: Created
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '815'
- body:
- encoding: UTF-8
- string: '{"kind":"ReplicationController","apiVersion":"v1","metadata":{"name":"guestbook","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/guestbook","uid":"f4287784-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"547","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"guestbook","role":"slave"}},"spec":{"replicas":3,"selector":{"app":"guestbook"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"guestbook"}},"spec":{"containers":[{"name":"guestbook","image":"kubernetes/guestbook:v2","ports":[{"name":"http-server","containerPort":3000,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0}}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: post
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers
- body:
- encoding: UTF-8
- string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"redis","role":"master"},"name":"redis-master"},"spec":{"selector":{"app":"redis","role":"master"},"template":{"metadata":{"labels":{"app":"redis","role":"master"}},"spec":{"containers":[{"name":"redis-master","image":"redis","ports":[{"name":"redis-server","containerPort":6379}]}]}},"replicas":1},"kind":"ReplicationController","apiVersion":"v1"}'
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- Content-Length:
- - '405'
- User-Agent:
- - Ruby
- response:
- status:
- code: 201
- message: Created
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '828'
- body:
- encoding: UTF-8
- string: '{"kind":"ReplicationController","apiVersion":"v1","metadata":{"name":"redis-master","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-master","uid":"f42a9800-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"558","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"master"}},"spec":{"replicas":1,"selector":{"app":"redis","role":"master"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"redis","role":"master"}},"spec":{"containers":[{"name":"redis-master","image":"redis","ports":[{"name":"redis-server","containerPort":6379,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0}}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: post
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers
- body:
- encoding: UTF-8
- string: '{"metadata":{"namespace":"kubeclient-ns","labels":{"app":"redis","role":"slave"},"name":"redis-slave"},"spec":{"selector":{"app":"redis","role":"slave"},"template":{"metadata":{"labels":{"app":"redis","role":"slave"}},"spec":{"containers":[{"name":"redis-slave","image":"kubernetes/redis-slave:v2","ports":[{"name":"redis-server","containerPort":6379}]}]}},"replicas":2},"kind":"ReplicationController","apiVersion":"v1"}'
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- Content-Length:
- - '420'
- User-Agent:
- - Ruby
- response:
- status:
- code: 201
- message: Created
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '842'
- body:
- encoding: UTF-8
- string: '{"kind":"ReplicationController","apiVersion":"v1","metadata":{"name":"redis-slave","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-slave","uid":"f42e1d09-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"567","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"slave"}},"spec":{"replicas":2,"selector":{"app":"redis","role":"slave"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"redis","role":"slave"}},"spec":{"containers":[{"name":"redis-slave","image":"kubernetes/redis-slave:v2","ports":[{"name":"redis-server","containerPort":6379,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0}}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: get
- uri: http://10.35.0.23:8080/api/v1/namespaces
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '629'
- body:
- encoding: UTF-8
- string: '{"kind":"NamespaceList","apiVersion":"v1","metadata":{"selfLink":"/api/v1/namespaces","resourceVersion":"570"},"items":[{"metadata":{"name":"default","selfLink":"/api/v1/namespaces/default","uid":"37360c82-3e77-11e5-a75a-18037327aaeb","resourceVersion":"6","creationTimestamp":"2015-08-09T09:15:45Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}},{"metadata":{"name":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns","uid":"f41e6b27-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"534","creationTimestamp":"2015-08-09T10:03:59Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Active"}}]}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: get
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '1661'
- body:
- encoding: UTF-8
- string: '{"kind":"ServiceList","apiVersion":"v1","metadata":{"selfLink":"/api/v1/namespaces/kubeclient-ns/services","resourceVersion":"571"},"items":[{"metadata":{"name":"guestbook","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/guestbook","uid":"f42187e1-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"538","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"name":"guestbook"}},"spec":{"ports":[{"protocol":"TCP","port":3000,"targetPort":"http-server","nodePort":0}],"selector":{"app":"guestbook"},"clusterIP":"10.0.0.80","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}},{"metadata":{"name":"redis-master","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/redis-master","uid":"f423bf8b-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"542","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"master"}},"spec":{"ports":[{"protocol":"TCP","port":6379,"targetPort":"redis-server","nodePort":0}],"selector":{"app":"redis","role":"master"},"clusterIP":"10.0.0.140","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}},{"metadata":{"name":"redis-slave","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/services/redis-slave","uid":"f4264678-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"545","creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"slave"}},"spec":{"ports":[{"protocol":"TCP","port":6379,"targetPort":"redis-server","nodePort":0}],"selector":{"app":"redis","role":"slave"},"clusterIP":"10.0.0.154","type":"ClusterIP","sessionAffinity":"None"},"status":{"loadBalancer":{}}}]}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: get
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Transfer-Encoding:
- - chunked
- body:
- encoding: UTF-8
- string: '{"kind":"ReplicationControllerList","apiVersion":"v1","metadata":{"selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers","resourceVersion":"571"},"items":[{"metadata":{"name":"guestbook","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/guestbook","uid":"f4287784-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"557","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"guestbook","role":"slave"}},"spec":{"replicas":3,"selector":{"app":"guestbook"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"guestbook"}},"spec":{"containers":[{"name":"guestbook","image":"kubernetes/guestbook:v2","ports":[{"name":"http-server","containerPort":3000,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":3,"observedGeneration":1}},{"metadata":{"name":"redis-master","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-master","uid":"f42a9800-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"565","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"master"}},"spec":{"replicas":1,"selector":{"app":"redis","role":"master"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"redis","role":"master"}},"spec":{"containers":[{"name":"redis-master","image":"redis","ports":[{"name":"redis-server","containerPort":6379,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0,"observedGeneration":1}},{"metadata":{"name":"redis-slave","namespace":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-slave","uid":"f42e1d09-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"567","generation":1,"creationTimestamp":"2015-08-09T10:03:59Z","labels":{"app":"redis","role":"slave"}},"spec":{"replicas":2,"selector":{"app":"redis","role":"slave"},"template":{"metadata":{"creationTimestamp":null,"labels":{"app":"redis","role":"slave"}},"spec":{"containers":[{"name":"redis-slave","image":"kubernetes/redis-slave:v2","ports":[{"name":"redis-server","containerPort":6379,"protocol":"TCP"}],"resources":{},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","dnsPolicy":"ClusterFirst"}}},"status":{"replicas":0}}]}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/guestbook
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '100'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Success",
- "code": 200
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/redis-master
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '100'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Success",
- "code": 200
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/services/redis-slave
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '100'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Success",
- "code": 200
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/guestbook
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '100'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Success",
- "code": 200
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-master
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '100'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Success",
- "code": 200
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns/replicationcontrollers/redis-slave
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '100'
- body:
- encoding: UTF-8
- string: |-
- {
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Success",
- "code": 200
- }
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: delete
- uri: http://10.35.0.23:8080/api/v1/namespaces/kubeclient-ns
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - '*/*; q=0.5, application/xml'
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - Ruby
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Sun, 09 Aug 2015 10:03:59 GMT
- Content-Length:
- - '345'
- body:
- encoding: UTF-8
- string: '{"kind":"Namespace","apiVersion":"v1","metadata":{"name":"kubeclient-ns","selfLink":"/api/v1/namespaces/kubeclient-ns","uid":"f41e6b27-3e7d-11e5-a75a-18037327aaeb","resourceVersion":"584","creationTimestamp":"2015-08-09T10:03:59Z","deletionTimestamp":"2015-08-09T10:03:59Z"},"spec":{"finalizers":["kubernetes"]},"status":{"phase":"Terminating"}}'
- http_version:
- recorded_at: Sun, 09 Aug 2015 10:00:02 GMT
-- request:
- method: get
- uri: http://10.35.0.23:8080/api/v1
- body:
- encoding: US-ASCII
- string: ''
- headers:
- Accept:
- - "*/*"
- Accept-Encoding:
- - gzip, deflate
- User-Agent:
- - rest-client/2.0.0 (linux-gnu x86_64) ruby/2.3.0p0
- Host:
- - localhost:8080
- response:
- status:
- code: 200
- message: OK
- headers:
- Content-Type:
- - application/json
- Date:
- - Mon, 29 Aug 2016 15:51:30 GMT
- Transfer-Encoding:
- - chunked
- body:
- encoding: UTF-8
- string: '{"kind":"APIResourceList","groupVersion":"v1","resources":[{"name":"bindings","namespaced":true,"kind":"Binding"},{"name":"componentstatuses","namespaced":false,"kind":"ComponentStatus"},{"name":"configmaps","namespaced":true,"kind":"ConfigMap"},{"name":"endpoints","namespaced":true,"kind":"Endpoints"},{"name":"events","namespaced":true,"kind":"Event"},{"name":"limitranges","namespaced":true,"kind":"LimitRange"},{"name":"namespaces","namespaced":false,"kind":"Namespace"},{"name":"namespaces/finalize","namespaced":false,"kind":"Namespace"},{"name":"namespaces/status","namespaced":false,"kind":"Namespace"},{"name":"nodes","namespaced":false,"kind":"Node"},{"name":"nodes/proxy","namespaced":false,"kind":"Node"},{"name":"nodes/status","namespaced":false,"kind":"Node"},{"name":"persistentvolumeclaims","namespaced":true,"kind":"PersistentVolumeClaim"},{"name":"persistentvolumeclaims/status","namespaced":true,"kind":"PersistentVolumeClaim"},{"name":"persistentvolumes","namespaced":false,"kind":"PersistentVolume"},{"name":"persistentvolumes/status","namespaced":false,"kind":"PersistentVolume"},{"name":"pods","namespaced":true,"kind":"Pod"},{"name":"pods/attach","namespaced":true,"kind":"Pod"},{"name":"pods/binding","namespaced":true,"kind":"Binding"},{"name":"pods/exec","namespaced":true,"kind":"Pod"},{"name":"pods/log","namespaced":true,"kind":"Pod"},{"name":"pods/portforward","namespaced":true,"kind":"Pod"},{"name":"pods/proxy","namespaced":true,"kind":"Pod"},{"name":"pods/status","namespaced":true,"kind":"Pod"},{"name":"podtemplates","namespaced":true,"kind":"PodTemplate"},{"name":"replicationcontrollers","namespaced":true,"kind":"ReplicationController"},{"name":"replicationcontrollers/scale","namespaced":true,"kind":"Scale"},{"name":"replicationcontrollers/status","namespaced":true,"kind":"ReplicationController"},{"name":"resourcequotas","namespaced":true,"kind":"ResourceQuota"},{"name":"resourcequotas/status","namespaced":true,"kind":"ResourceQuota"},{"name":"secrets","namespaced":true,"kind":"Secret"},{"name":"serviceaccounts","namespaced":true,"kind":"ServiceAccount"},{"name":"services","namespaced":true,"kind":"Service"},{"name":"services/proxy","namespaced":true,"kind":"Service"},{"name":"services/status","namespaced":true,"kind":"Service"}]}
-
-'
- http_version:
- recorded_at: Mon, 29 Aug 2016 15:51:30 GMT
-recorded_with: VCR 3.0.3
diff --git a/vendor/gems/kubeclient/test/config/allinone.kubeconfig b/vendor/gems/kubeclient/test/config/allinone.kubeconfig
deleted file mode 100644
index f06db6af123..00000000000
--- a/vendor/gems/kubeclient/test/config/allinone.kubeconfig
+++ /dev/null
@@ -1,21 +0,0 @@
-
-apiVersion: v1
-clusters:
-- cluster:
- server: https://localhost:6443
- certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUMvekNDQWVlZ0F3SUJBZ0lUUGJmcHkyOWFCRzY3Q2hSZEI2bEplZ1RrbURBTkJna3Foa2lHOXcwQkFRc0YKQURBWU1SWXdGQVlEVlFRREV3MXJkV0psY201bGRHVnpMV05oTUI0WERUSXlNREl5TVRBNU1ESXdNRm9YRFRNeQpNREl4T1RBNU1ESXdNRm93R0RFV01CUUdBMVVFQXhNTmEzVmlaWEp1WlhSbGN5MWpZVENDQVNJd0RRWUpLb1pJCmh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTUxqWjJjRkJhbHpvaW1hRWNwVDlKejJKbWRnc0hNT2FnVmQKSXQ3T1FwVHdEWjNucElJQ1ZwZ3VFaDl4dG92UjhtOC9IWU0rL2E0dk1RSFQrM3A4SFBqaURhUllHZzdPWjlMKwpGcC85emhCdWlhSXZnOForQmJ5czlROVV1ajZWRXdmRkpCY05INlRtemRpRGdRVXM1L2srNi92dHVKNHlzM3NECktrQU94cVBYRGFCb0FObkxwSXhkSU1RRGNXU0xGQTB3bUZoZFpKcTNLRUFvSnBFTDBXWW8xWlJCVjNpSDc3eWYKc0RiTjFPQnUydk5uUlorRHJWMFpKNUFwbWJGWFBYOGk0S0phVzlsQ0I2MkZOMGo1WHNORG95VGVBVnBlc2ZOcwp6WXVmVnBCZHFOWkZrT0tnOWRpTXVUTWlrYTJhWWZEdWlWemRlYkRnY3A5YU1sb0t0YkVDQXdFQUFhTkNNRUF3CkRnWURWUjBQQVFIL0JBUURBZ0VHTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3SFFZRFZSME9CQllFRkJkT2l5Z0MKTGN1SnJxOHJOYTF4QURyNVNwN0NNQTBHQ1NxR1NJYjNEUUVCQ3dVQUE0SUJBUURDeTRJbGhBU2g2QnI1WEVjSQpUcFA1VGhEMU95UnpRbnNQZTZQMXFnV1Aza0JYSy9BY3NTbCtWR3RhWnAyb0VoSm9VbnN6N2tFOHlXM2dLK1BBCjUxelk0YUhUaUY5eGt5ZDV6T0NBR0IrY2ZwOVlzK3N6V3p5dTBRUTlJQmpKNCtlRGpnN1cwL1MrQk0yUW4xaUwKalRGSWUyQmRmK1EvSjI0L3Eza3NUWEsxN1VOdW4xNHZEUnNKZ3NOY3JGdC9ydW1mSFB4MXl0d3NpcUt5RUtWNwprRnhTd2EzZDgvQXZoR2dGcFBtZlJqVTdnQUpDRmNIejUwMXpoaTJhNkw1VFlCVGVjVlJicVpvZUhpWjBZTldJCmlzNWc0Vm1WQitCeE1BTTJXRWQyOXY0bC8zb0kxUGV5OXJ2dDdOSnFTZTFpbTl1cVpnVkRlZy92UDh6S3MvZEYKWll3OAotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
- name: local
-contexts:
-- context:
- cluster: local
- namespace: default
- user: user
- name: Default
-current-context: Default
-kind: Config
-preferences: {}
-users:
-- name: user
- user:
- client-certificate-data: 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
- client-key-data: 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
diff --git a/vendor/gems/kubeclient/test/config/another-ca1.pem b/vendor/gems/kubeclient/test/config/another-ca1.pem
deleted file mode 100644
index 50825d47519..00000000000
--- a/vendor/gems/kubeclient/test/config/another-ca1.pem
+++ /dev/null
@@ -1,19 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIDADCCAeigAwIBAgIUQZjM/5qoAF78qIDyc+rKi4qBdOIwDQYJKoZIhvcNAQEL
-BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAzMjIxNDQzMDBaFw0z
-MjAzMTkxNDQzMDBaMBgxFjAUBgNVBAMTDWt1YmVybmV0ZXMtY2EwggEiMA0GCSqG
-SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGkG7g+UjpDhZ7A4Pm7Hme+RWs5IHz4I2X
-IclvtO3LuJ26yzz2S8VaXFFeUqzEPb2G1RxFGvoAVN7qrTw0n5MQJCFLAA4dI7oY
-8XLRJ7KgTBBIw1jYpgKb2zyHPIJE6VmslliKUiX+QDovdRU/dsbdup2EucrnGw4+
-QNNAc3XMbXgm6lubA6znYZlSpcQ8BKer3tq75q4KUZicIjS6gKQyZjk9a6fcOuCS
-ybtlAKp9lYzcwxZkNrx+V1PJMQ1qaJWPnMAVi7Oj5Dm3Jmf1WHBcNEh52Q/0vYlt
-4WSaeM5t/Py/m/7c4Ve97f5m2X6EhYyUbzov4qeZOnIJI3MnU1FxAgMBAAGjQjBA
-MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSl1qyt
-jd96WstRE8h9x5qkCvZUvjANBgkqhkiG9w0BAQsFAAOCAQEAJt55qYvBaniAwvgO
-tbO79g1FcQGrxpMX45TuoCE/K+MWDjrr6bp+FbLOqT8MwOsbGwwJIRTHGvkEkVso
-5AWI5aSNs3hWnltOdz27ZSHeX77WB4daK1tLK6ggZrp3v9iIpbBwWBFdmAqsPvEs
-H17K2BgAzdh6xRKPQd0BGTUpJBfk50R2gDMj7FKyIzBN69IOGytBfAXBhHzEGy4+
-MvtTEIMUjR//KgCrpNeyDuaWHttR5FdnuRxFO7O3BAfyNSaNmd/IEHQf7DIGgzOy
-+xWLyH/HRHj5C70qAqjbnrgBODI99BsA9U7oXTuyPLdIboAcFt2zD5DIYgZET52X
-53w4jA==
------END CERTIFICATE-----
diff --git a/vendor/gems/kubeclient/test/config/another-ca2.pem b/vendor/gems/kubeclient/test/config/another-ca2.pem
deleted file mode 100644
index 53be72e87d7..00000000000
--- a/vendor/gems/kubeclient/test/config/another-ca2.pem
+++ /dev/null
@@ -1,19 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIDADCCAeigAwIBAgIUHW3OPnmuTquJ0YgbGpmm/blsY2QwDQYJKoZIhvcNAQEL
-BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAzMjIxNDQ0MDBaFw0z
-MjAzMTkxNDQ0MDBaMBgxFjAUBgNVBAMTDWt1YmVybmV0ZXMtY2EwggEiMA0GCSqG
-SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDLMEJs5agS0hNQBxPTtsI6dIhIi/pY8liI
-sNukbi5KwKf80FYNyRXqE8ufDVyTFzOc+MG96jnHjDaBWjrVN9On0PgUBo4nPyd4
-DtyvYx2jMzwToSEIo/Z1aroMx1oGywCgdS4/3FWAbhlSbyXKJmhfh6gX0TxWz+dV
-zqNuqQq9EWuRhOMg9vgzjfp3mjiPE10lW8pT0j5JT3PI/eGO+C2Z7z33LJXb6GM2
-nXvhGFMGY+7XG65pqJ3L8g1mk+LjPiwyIItw8wPtrnrZ2VXMklMd5Mn+jgCTNe1B
-om0nPpPIiTblCr6gcNcVjy5WGN37OKlqrT0JTuSPHcxSUp05LFjDAgMBAAGjQjBA
-MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBQvV/sB
-wbR3UwjkLAMN+6P3fZ/3OjANBgkqhkiG9w0BAQsFAAOCAQEACAk4EQwCkw2EBsSR
-2SKoa1SjYFkZzIr/0/TB2YcMUvHF+RpvlD5vQ8/RJjeAl1kc6/niZ9TWCemjBLqI
-hPoFe49zr49DyQjC2ZfsXVJvFCr6g7o4q4DtQ6ltyBuTJbkn1hI+aB8zgvpofG44
-mKj18Y7tPvgXtRua4SaeBq777+22AOvKxPied9p4PTrMN4RKTP6+yIbLflej7dBD
-zQDjfmmYsH0T2ZRtBpE1dYrUbU3tkizcMZRJBgreoxoff+r5coibMIm/7gh+YoSb
-BCItCaeuGSKQ8CJb8DElcPUd6nKUjmeiQL68ztsG/+CXLiL/TZb914VaaCXvPInw
-49jJ7w==
------END CERTIFICATE-----
diff --git a/vendor/gems/kubeclient/test/config/concatenated-ca.kubeconfig b/vendor/gems/kubeclient/test/config/concatenated-ca.kubeconfig
deleted file mode 100644
index ed20e4dde50..00000000000
--- a/vendor/gems/kubeclient/test/config/concatenated-ca.kubeconfig
+++ /dev/null
@@ -1,20 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- certificate-authority: concatenated-ca.pem
- server: https://localhost:6443
- name: local
-contexts:
-- context:
- cluster: local
- namespace: default
- user: user
- name: Default
-current-context: Default
-kind: Config
-preferences: {}
-users:
-- name: user
- user:
- client-certificate: external-cert.pem
- client-key: external-key.rsa
diff --git a/vendor/gems/kubeclient/test/config/concatenated-ca.pem b/vendor/gems/kubeclient/test/config/concatenated-ca.pem
deleted file mode 100644
index 1117298ff2d..00000000000
--- a/vendor/gems/kubeclient/test/config/concatenated-ca.pem
+++ /dev/null
@@ -1,57 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIDADCCAeigAwIBAgIUQZjM/5qoAF78qIDyc+rKi4qBdOIwDQYJKoZIhvcNAQEL
-BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAzMjIxNDQzMDBaFw0z
-MjAzMTkxNDQzMDBaMBgxFjAUBgNVBAMTDWt1YmVybmV0ZXMtY2EwggEiMA0GCSqG
-SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGkG7g+UjpDhZ7A4Pm7Hme+RWs5IHz4I2X
-IclvtO3LuJ26yzz2S8VaXFFeUqzEPb2G1RxFGvoAVN7qrTw0n5MQJCFLAA4dI7oY
-8XLRJ7KgTBBIw1jYpgKb2zyHPIJE6VmslliKUiX+QDovdRU/dsbdup2EucrnGw4+
-QNNAc3XMbXgm6lubA6znYZlSpcQ8BKer3tq75q4KUZicIjS6gKQyZjk9a6fcOuCS
-ybtlAKp9lYzcwxZkNrx+V1PJMQ1qaJWPnMAVi7Oj5Dm3Jmf1WHBcNEh52Q/0vYlt
-4WSaeM5t/Py/m/7c4Ve97f5m2X6EhYyUbzov4qeZOnIJI3MnU1FxAgMBAAGjQjBA
-MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSl1qyt
-jd96WstRE8h9x5qkCvZUvjANBgkqhkiG9w0BAQsFAAOCAQEAJt55qYvBaniAwvgO
-tbO79g1FcQGrxpMX45TuoCE/K+MWDjrr6bp+FbLOqT8MwOsbGwwJIRTHGvkEkVso
-5AWI5aSNs3hWnltOdz27ZSHeX77WB4daK1tLK6ggZrp3v9iIpbBwWBFdmAqsPvEs
-H17K2BgAzdh6xRKPQd0BGTUpJBfk50R2gDMj7FKyIzBN69IOGytBfAXBhHzEGy4+
-MvtTEIMUjR//KgCrpNeyDuaWHttR5FdnuRxFO7O3BAfyNSaNmd/IEHQf7DIGgzOy
-+xWLyH/HRHj5C70qAqjbnrgBODI99BsA9U7oXTuyPLdIboAcFt2zD5DIYgZET52X
-53w4jA==
------END CERTIFICATE-----
------BEGIN CERTIFICATE-----
-MIIC/zCCAeegAwIBAgITPbfpy29aBG67ChRdB6lJegTkmDANBgkqhkiG9w0BAQsF
-ADAYMRYwFAYDVQQDEw1rdWJlcm5ldGVzLWNhMB4XDTIyMDIyMTA5MDIwMFoXDTMy
-MDIxOTA5MDIwMFowGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTCCASIwDQYJKoZI
-hvcNAQEBBQADggEPADCCAQoCggEBAMLjZ2cFBalzoimaEcpT9Jz2JmdgsHMOagVd
-It7OQpTwDZ3npIICVpguEh9xtovR8m8/HYM+/a4vMQHT+3p8HPjiDaRYGg7OZ9L+
-Fp/9zhBuiaIvg8Z+Bbys9Q9Uuj6VEwfFJBcNH6TmzdiDgQUs5/k+6/vtuJ4ys3sD
-KkAOxqPXDaBoANnLpIxdIMQDcWSLFA0wmFhdZJq3KEAoJpEL0WYo1ZRBV3iH77yf
-sDbN1OBu2vNnRZ+DrV0ZJ5ApmbFXPX8i4KJaW9lCB62FN0j5XsNDoyTeAVpesfNs
-zYufVpBdqNZFkOKg9diMuTMika2aYfDuiVzdebDgcp9aMloKtbECAwEAAaNCMEAw
-DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFBdOiygC
-LcuJrq8rNa1xADr5Sp7CMA0GCSqGSIb3DQEBCwUAA4IBAQDCy4IlhASh6Br5XEcI
-TpP5ThD1OyRzQnsPe6P1qgWP3kBXK/AcsSl+VGtaZp2oEhJoUnsz7kE8yW3gK+PA
-51zY4aHTiF9xkyd5zOCAGB+cfp9Ys+szWzyu0QQ9IBjJ4+eDjg7W0/S+BM2Qn1iL
-jTFIe2Bdf+Q/J24/q3ksTXK17UNun14vDRsJgsNcrFt/rumfHPx1ytwsiqKyEKV7
-kFxSwa3d8/AvhGgFpPmfRjU7gAJCFcHz501zhi2a6L5TYBTecVRbqZoeHiZ0YNWI
-is5g4VmVB+BxMAM2WEd29v4l/3oI1Pey9rvt7NJqSe1im9uqZgVDeg/vP8zKs/dF
-ZYw8
------END CERTIFICATE-----
------BEGIN CERTIFICATE-----
-MIIDADCCAeigAwIBAgIUHW3OPnmuTquJ0YgbGpmm/blsY2QwDQYJKoZIhvcNAQEL
-BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAzMjIxNDQ0MDBaFw0z
-MjAzMTkxNDQ0MDBaMBgxFjAUBgNVBAMTDWt1YmVybmV0ZXMtY2EwggEiMA0GCSqG
-SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDLMEJs5agS0hNQBxPTtsI6dIhIi/pY8liI
-sNukbi5KwKf80FYNyRXqE8ufDVyTFzOc+MG96jnHjDaBWjrVN9On0PgUBo4nPyd4
-DtyvYx2jMzwToSEIo/Z1aroMx1oGywCgdS4/3FWAbhlSbyXKJmhfh6gX0TxWz+dV
-zqNuqQq9EWuRhOMg9vgzjfp3mjiPE10lW8pT0j5JT3PI/eGO+C2Z7z33LJXb6GM2
-nXvhGFMGY+7XG65pqJ3L8g1mk+LjPiwyIItw8wPtrnrZ2VXMklMd5Mn+jgCTNe1B
-om0nPpPIiTblCr6gcNcVjy5WGN37OKlqrT0JTuSPHcxSUp05LFjDAgMBAAGjQjBA
-MA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBQvV/sB
-wbR3UwjkLAMN+6P3fZ/3OjANBgkqhkiG9w0BAQsFAAOCAQEACAk4EQwCkw2EBsSR
-2SKoa1SjYFkZzIr/0/TB2YcMUvHF+RpvlD5vQ8/RJjeAl1kc6/niZ9TWCemjBLqI
-hPoFe49zr49DyQjC2ZfsXVJvFCr6g7o4q4DtQ6ltyBuTJbkn1hI+aB8zgvpofG44
-mKj18Y7tPvgXtRua4SaeBq777+22AOvKxPied9p4PTrMN4RKTP6+yIbLflej7dBD
-zQDjfmmYsH0T2ZRtBpE1dYrUbU3tkizcMZRJBgreoxoff+r5coibMIm/7gh+YoSb
-BCItCaeuGSKQ8CJb8DElcPUd6nKUjmeiQL68ztsG/+CXLiL/TZb914VaaCXvPInw
-49jJ7w==
------END CERTIFICATE-----
diff --git a/vendor/gems/kubeclient/test/config/execauth.kubeconfig b/vendor/gems/kubeclient/test/config/execauth.kubeconfig
deleted file mode 100644
index c9a9773fe5e..00000000000
--- a/vendor/gems/kubeclient/test/config/execauth.kubeconfig
+++ /dev/null
@@ -1,61 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- server: https://localhost:6443
- name: localhost:6443
-contexts:
-- context:
- cluster: localhost:6443
- namespace: default
- user: system:admin:exec-search-path
- name: localhost/system:admin:exec-search-path
-- context:
- cluster: localhost:6443
- namespace: default
- user: system:admin:exec-relative-path
- name: localhost/system:admin:exec-relative-path
-- context:
- cluster: localhost:6443
- namespace: default
- user: system:admin:exec-absolute-path
- name: localhost/system:admin:exec-absolute-path
-kind: Config
-preferences: {}
-users:
-- name: system:admin:exec-search-path
- user:
- exec:
- # Command to execute. Required.
- command: "example-exec-plugin"
-
- # API version to use when decoding the ExecCredentials resource. Required.
- #
- # The API version returned by the plugin MUST match the version listed here.
- #
- # To integrate with tools that support multiple versions (such as client.authentication.k8s.io/v1alpha1),
- # set an environment variable or pass an argument to the tool that indicates which version the exec plugin expects.
- apiVersion: "client.authentication.k8s.io/v1beta1"
-
- # Environment variables to set when executing the plugin. Optional.
- env:
- - name: "FOO"
- value: "bar"
-
- # Arguments to pass when executing the plugin. Optional.
- args:
- - "arg1"
- - "arg2"
-
-- name: system:admin:exec-relative-path
- user:
- exec:
- # Command to execute. Required.
- command: "dir/example-exec-plugin"
- apiVersion: "client.authentication.k8s.io/v1beta1"
-
-- name: system:admin:exec-absolute-path
- user:
- exec:
- # Command to execute. Required.
- command: "/abs/path/example-exec-plugin"
- apiVersion: "client.authentication.k8s.io/v1beta1"
diff --git a/vendor/gems/kubeclient/test/config/external-ca.pem b/vendor/gems/kubeclient/test/config/external-ca.pem
deleted file mode 100644
index f1c8a8b615d..00000000000
--- a/vendor/gems/kubeclient/test/config/external-ca.pem
+++ /dev/null
@@ -1,19 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIC/zCCAeegAwIBAgITPbfpy29aBG67ChRdB6lJegTkmDANBgkqhkiG9w0BAQsF
-ADAYMRYwFAYDVQQDEw1rdWJlcm5ldGVzLWNhMB4XDTIyMDIyMTA5MDIwMFoXDTMy
-MDIxOTA5MDIwMFowGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTCCASIwDQYJKoZI
-hvcNAQEBBQADggEPADCCAQoCggEBAMLjZ2cFBalzoimaEcpT9Jz2JmdgsHMOagVd
-It7OQpTwDZ3npIICVpguEh9xtovR8m8/HYM+/a4vMQHT+3p8HPjiDaRYGg7OZ9L+
-Fp/9zhBuiaIvg8Z+Bbys9Q9Uuj6VEwfFJBcNH6TmzdiDgQUs5/k+6/vtuJ4ys3sD
-KkAOxqPXDaBoANnLpIxdIMQDcWSLFA0wmFhdZJq3KEAoJpEL0WYo1ZRBV3iH77yf
-sDbN1OBu2vNnRZ+DrV0ZJ5ApmbFXPX8i4KJaW9lCB62FN0j5XsNDoyTeAVpesfNs
-zYufVpBdqNZFkOKg9diMuTMika2aYfDuiVzdebDgcp9aMloKtbECAwEAAaNCMEAw
-DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFBdOiygC
-LcuJrq8rNa1xADr5Sp7CMA0GCSqGSIb3DQEBCwUAA4IBAQDCy4IlhASh6Br5XEcI
-TpP5ThD1OyRzQnsPe6P1qgWP3kBXK/AcsSl+VGtaZp2oEhJoUnsz7kE8yW3gK+PA
-51zY4aHTiF9xkyd5zOCAGB+cfp9Ys+szWzyu0QQ9IBjJ4+eDjg7W0/S+BM2Qn1iL
-jTFIe2Bdf+Q/J24/q3ksTXK17UNun14vDRsJgsNcrFt/rumfHPx1ytwsiqKyEKV7
-kFxSwa3d8/AvhGgFpPmfRjU7gAJCFcHz501zhi2a6L5TYBTecVRbqZoeHiZ0YNWI
-is5g4VmVB+BxMAM2WEd29v4l/3oI1Pey9rvt7NJqSe1im9uqZgVDeg/vP8zKs/dF
-ZYw8
------END CERTIFICATE-----
diff --git a/vendor/gems/kubeclient/test/config/external-cert.pem b/vendor/gems/kubeclient/test/config/external-cert.pem
deleted file mode 100644
index 6c8b5232d7a..00000000000
--- a/vendor/gems/kubeclient/test/config/external-cert.pem
+++ /dev/null
@@ -1,20 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIDWTCCAkGgAwIBAgIUKO1eRmXmCc+vvM+LoByZE0IMGD8wDQYJKoZIhvcNAQEL
-BQAwGDEWMBQGA1UEAxMNa3ViZXJuZXRlcy1jYTAeFw0yMjAyMjEwOTAyMDBaFw0y
-MzAyMjEwOTAyMDBaMDQxFzAVBgNVBAoTDnN5c3RlbTptYXN0ZXJzMRkwFwYDVQQD
-ExBrdWJlcm5ldGVzLWFkbWluMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
-AQEAwhw1zJaAYW0kIcn5mWyXNm7IYDa+QMzH3HVZrgwYycCZZP90bYJj4TF+++3n
-PMZ2uMfZEXcmNpGXCIqzNYJQzvT+a1zCMuUT9+v1g343/VaYpxRzGueCVF+pvB/g
-jI0U4l1YmJIEk5XcDM9xE+hoUkwqVahMmrvsq8hynYjzWEtl0mJ+TO89/1ZjwAuQ
-t4ohNO1pQu3r4HCu3HGbFSTPJ6E4oxRgdMqHlqswpG0+ZLRXVkogUbtlIULtctoU
-T67fhsThRCYu2AAin+L20gr3Tcp4UtMWtTcZ66vlL2Ep6TkWiutb04L/Bo46VfxO
-sKBCdN1jysOeTPgTWKh088vM0wIDAQABo38wfTAOBgNVHQ8BAf8EBAMCBaAwHQYD
-VR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0O
-BBYEFJ675z7GCIuJcbGxJ7bLI3JAL3BeMB8GA1UdIwQYMBaAFBdOiygCLcuJrq8r
-Na1xADr5Sp7CMA0GCSqGSIb3DQEBCwUAA4IBAQCXGCheo+VUxlFRPEXRSpw480lb
-2mvdzB4O/rOIG2H9vzgjhxbdCJNVedkGzmHZ75eEHzv1EkInebSGLFz5/P3BQUXw
-xyu84jNJer9Re2gemV0t2mwzHWCfQGLKG4AJi7M+cxZ49XhumZRVkw7iORF+qYOj
-hSloB/4kfyq3UaprKCvhqjEsKJqDndwlOwKLVMic3lQDLLXoKa5Tiv6ihBiCVWAI
-XUy5l2doDvZhzgEjLeQ0CGHb59vCvdotTc0b7HJ4Zw21ALz2CF7xkwXjP5uUIq56
-6PmQ+gpHXklbNJIODtkf/9I4rMlHUzeK5DVYY5kdxJTzh2nx4R0icFx1jnc0
------END CERTIFICATE-----
diff --git a/vendor/gems/kubeclient/test/config/external-key.rsa b/vendor/gems/kubeclient/test/config/external-key.rsa
deleted file mode 100644
index c79c1f2c310..00000000000
--- a/vendor/gems/kubeclient/test/config/external-key.rsa
+++ /dev/null
@@ -1,27 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIEpQIBAAKCAQEAwhw1zJaAYW0kIcn5mWyXNm7IYDa+QMzH3HVZrgwYycCZZP90
-bYJj4TF+++3nPMZ2uMfZEXcmNpGXCIqzNYJQzvT+a1zCMuUT9+v1g343/VaYpxRz
-GueCVF+pvB/gjI0U4l1YmJIEk5XcDM9xE+hoUkwqVahMmrvsq8hynYjzWEtl0mJ+
-TO89/1ZjwAuQt4ohNO1pQu3r4HCu3HGbFSTPJ6E4oxRgdMqHlqswpG0+ZLRXVkog
-UbtlIULtctoUT67fhsThRCYu2AAin+L20gr3Tcp4UtMWtTcZ66vlL2Ep6TkWiutb
-04L/Bo46VfxOsKBCdN1jysOeTPgTWKh088vM0wIDAQABAoIBAQDBXGCrQHD6nEIV
-9qDRGL841fp8/Ytf+Z5OGggPvLUkpNspJN/SBsWAGlIom8BxZjH1t/6fy1Uhnr4Z
-IDGM6BefUaXvRSOel1vg6AhVyHH1x0GhjllrP5sweWsXn5mL6S4YoGwU77/nVK0z
-haFa93SUJpM1aMWGjhUgujiSfU4LcLDRVKDERO48XP8FiCA6PB2IJXP0S9BaMVKQ
-HARCWNGX5ziNao1roIvPQNEMDTtnWbb4z4SvRmpcF60E/f4Jp06SH00QNeTv7n57
-DzSXYdcqlfLR9QSTdVktSOxQ8cHalTcy5sU2xyFwc1S9aZZ8nzRpbFu1VYFCIVcf
-E4QVv1UBAoGBAMWg4nZTHiGthf6KyzOGkh1r2kBSmVy9BcYjB8TbzQbrNUy7YAlT
-i7eOnF+uTKcaVc5vnUrV0l7zD3WSWu1ARb9K6ZpVL5wjYNmm/zurR+mJc8LKl7d6
-54z1c111T5iivM1bYRnU0OujHDoX5ZD5WGsxMKaHtLaGWX/gK49hPbfzAoGBAPtx
-TWQHiOq/uVsk0QnYkKZEwezfdC2daVJoAyDAV5gcU4NsN62UKfgTraD+ChmyJ5R7
-jOSL8bUX33QQEvmK9WYXMVBwz28HrZypuByQEEc8e9yy4YQ+RYZ1L2kmGdaeZ8Mz
-iDffLrXby7NZp4xcfMZWYmLwdGESYo8jzuci1K+hAoGBAJDIzkBbom6P3uPdsQLd
-qvxNAIcxPFP501oWXeG2Gh3ggZrmh3QtteVTYHKkklm17Hkhwj2KKuYO8htzjpPU
-C4Uaj8vWbtvX+2NZehGv6S5J2foyTDZKn4rgY5VrlVXAm8tjD99Jz4liZRKWYUP1
-uPZHAlpuf1FdWgJaK++OERZLAoGAKJd9+uwMenlBHymuZXyEvZLUC713L/X9jsQj
-3SGwAmpwQQMzad5FeDsVCKx6TPOp2BqqACtndejIth/yMD7ypuyPlYDgu/ftWyE7
-C8FmH1nwVQy7w3GaH77DTKJOAYvJDIZBM2PgUpONKwMKPWqg6hQABiDzaMhjCOCr
-Aj1pQIECgYEAl6LvgpYzzyTU8mFaXk5+AuZTpuvVs5sNTE0BgrQbA7HZ/HcOxKid
-bLOSWbW3ZgNZWLW8SauiTD+x/ifTdzQBGBvNhaIjIF6ymtYpO3ZX+60my/XTfbFQ
-+uBwP7nqMIRsnB53FW4KuVqic05DlgoEby5c5y9OB9rYD3RrSOMDlas=
------END RSA PRIVATE KEY-----
diff --git a/vendor/gems/kubeclient/test/config/external-without-ca.kubeconfig b/vendor/gems/kubeclient/test/config/external-without-ca.kubeconfig
deleted file mode 100644
index 1f3d617a40d..00000000000
--- a/vendor/gems/kubeclient/test/config/external-without-ca.kubeconfig
+++ /dev/null
@@ -1,21 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- # Not defining custom `certificate-authority`.
- # Without it, the localhost cert should be rejected.
- server: https://localhost:6443
- name: local
-contexts:
-- context:
- cluster: local
- namespace: default
- user: user
- name: Default
-current-context: Default
-kind: Config
-preferences: {}
-users:
-- name: user
- user:
- client-certificate: external-cert.pem
- client-key: external-key.rsa
diff --git a/vendor/gems/kubeclient/test/config/external.kubeconfig b/vendor/gems/kubeclient/test/config/external.kubeconfig
deleted file mode 100644
index ef2dca61348..00000000000
--- a/vendor/gems/kubeclient/test/config/external.kubeconfig
+++ /dev/null
@@ -1,20 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- certificate-authority: external-ca.pem
- server: https://localhost:6443
- name: local
-contexts:
-- context:
- cluster: local
- namespace: default
- user: user
- name: Default
-current-context: Default
-kind: Config
-preferences: {}
-users:
-- name: user
- user:
- client-certificate: external-cert.pem
- client-key: external-key.rsa
diff --git a/vendor/gems/kubeclient/test/config/gcpauth.kubeconfig b/vendor/gems/kubeclient/test/config/gcpauth.kubeconfig
deleted file mode 100644
index 0ee387ebb16..00000000000
--- a/vendor/gems/kubeclient/test/config/gcpauth.kubeconfig
+++ /dev/null
@@ -1,21 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- server: https://localhost:8443
- name: localhost:8443
-contexts:
-- context:
- cluster: localhost:8443
- namespace: default
- user: application-default-credentials
- name: localhost/application-default-credentials
-kind: Config
-preferences: {}
-users:
-- name: application-default-credentials
- user:
- auth-provider:
- config:
- access-token: <fake_token>
- expiry: 2019-02-19T11:07:29.827352-05:00
- name: gcp
diff --git a/vendor/gems/kubeclient/test/config/gcpcmdauth.kubeconfig b/vendor/gems/kubeclient/test/config/gcpcmdauth.kubeconfig
deleted file mode 100644
index 2e2db395834..00000000000
--- a/vendor/gems/kubeclient/test/config/gcpcmdauth.kubeconfig
+++ /dev/null
@@ -1,25 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- server: https://localhost:8443
- name: localhost:8443
-contexts:
-- context:
- cluster: localhost:8443
- namespace: default
- user: application-default-credentials
- name: localhost/application-default-credentials
-kind: Config
-preferences: {}
-users:
-- name: application-default-credentials
- user:
- auth-provider:
- config:
- access-token: <fake_token>
- cmd-args: config config-helper --format=json
- cmd-path: /path/to/gcloud
- expiry: 2019-04-09T19:26:18Z
- expiry-key: '{.credential.token_expiry}'
- token-key: '{.credential.access_token}'
- name: gcp
diff --git a/vendor/gems/kubeclient/test/config/insecure-custom-ca.kubeconfig b/vendor/gems/kubeclient/test/config/insecure-custom-ca.kubeconfig
deleted file mode 100644
index 06c803c16bf..00000000000
--- a/vendor/gems/kubeclient/test/config/insecure-custom-ca.kubeconfig
+++ /dev/null
@@ -1,22 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- # This is a silly configuration, skip-tls-verify makes CA data useless, but testing for completeness.
- certificate-authority: external-ca.pem
- server: https://localhost:6443
- insecure-skip-tls-verify: true
- name: local
-contexts:
-- context:
- cluster: local
- namespace: default
- user: user
- name: Default
-current-context: Default
-kind: Config
-preferences: {}
-users:
-- name: user
- user:
- client-certificate: external-cert.pem
- client-key: external-key.rsa
diff --git a/vendor/gems/kubeclient/test/config/insecure.kubeconfig b/vendor/gems/kubeclient/test/config/insecure.kubeconfig
deleted file mode 100644
index d7c28087a92..00000000000
--- a/vendor/gems/kubeclient/test/config/insecure.kubeconfig
+++ /dev/null
@@ -1,25 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- server: https://localhost:6443
- insecure-skip-tls-verify: true
- name: local
-contexts:
-- context:
- cluster: local
- namespace: default
- user: user
- name: Default
-current-context: Default
-kind: Config
-preferences: {}
-users:
-- name: user
- user:
- # Providing ANY credentials in `insecure-skip-tls-verify` mode is unwise due to MITM risk.
- # At least client certs are not as catastrophic as bearer tokens.
- #
- # This combination of insecure + client certs was once broken in kubernetes but
- # is meaningful since 2015 (https://github.com/kubernetes/kubernetes/pull/15430).
- client-certificate: external-cert.pem
- client-key: external-key.rsa
diff --git a/vendor/gems/kubeclient/test/config/nouser.kubeconfig b/vendor/gems/kubeclient/test/config/nouser.kubeconfig
deleted file mode 100644
index 9289895cc81..00000000000
--- a/vendor/gems/kubeclient/test/config/nouser.kubeconfig
+++ /dev/null
@@ -1,15 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- server: https://localhost:6443
- name: localhost:6443
-contexts:
-- context:
- cluster: localhost:6443
- namespace: default
- user: ""
- name: default/localhost:6443/nouser
-current-context: default/localhost:6443/nouser
-kind: Config
-preferences: {}
-users: []
diff --git a/vendor/gems/kubeclient/test/config/oidcauth.kubeconfig b/vendor/gems/kubeclient/test/config/oidcauth.kubeconfig
deleted file mode 100644
index e1f389da46f..00000000000
--- a/vendor/gems/kubeclient/test/config/oidcauth.kubeconfig
+++ /dev/null
@@ -1,24 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- server: https://localhost:8443
- name: localhost:8443
-contexts:
-- context:
- cluster: localhost:8443
- namespace: default
- user: oidc-auth-provider
- name: localhost/oidc-auth-provider
-kind: Config
-preferences: {}
-users:
-- name: oidc-auth-provider
- user:
- auth-provider:
- config:
- client-id: fake-client-id
- client-secret: fake-client-secret
- id-token: fake-id-token
- idp-issuer-url: https://accounts.google.com
- refresh-token: fake-refresh-token
- name: oidc
diff --git a/vendor/gems/kubeclient/test/config/secure-without-ca.kubeconfig b/vendor/gems/kubeclient/test/config/secure-without-ca.kubeconfig
deleted file mode 100644
index 1b1acefe905..00000000000
--- a/vendor/gems/kubeclient/test/config/secure-without-ca.kubeconfig
+++ /dev/null
@@ -1,22 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- # Not defining custom `certificate-authority`.
- # Without it, the localhost cert should be rejected.
- server: https://localhost:6443
- insecure-skip-tls-verify: false # Same as external-without-ca.kubeconfig but with explicit false here.
- name: local
-contexts:
-- context:
- cluster: local
- namespace: default
- user: user
- name: Default
-current-context: Default
-kind: Config
-preferences: {}
-users:
-- name: user
- user:
- client-certificate: external-cert.pem
- client-key: external-key.rsa
diff --git a/vendor/gems/kubeclient/test/config/secure.kubeconfig b/vendor/gems/kubeclient/test/config/secure.kubeconfig
deleted file mode 100644
index b0a00bb8d0d..00000000000
--- a/vendor/gems/kubeclient/test/config/secure.kubeconfig
+++ /dev/null
@@ -1,21 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- certificate-authority: external-ca.pem
- server: https://localhost:6443
- insecure-skip-tls-verify: false # Same as external.kubeconfig but with explicit false here.
- name: local
-contexts:
-- context:
- cluster: local
- namespace: default
- user: user
- name: Default
-current-context: Default
-kind: Config
-preferences: {}
-users:
-- name: user
- user:
- client-certificate: external-cert.pem
- client-key: external-key.rsa
diff --git a/vendor/gems/kubeclient/test/config/timestamps.kubeconfig b/vendor/gems/kubeclient/test/config/timestamps.kubeconfig
deleted file mode 100644
index 7b718da21e9..00000000000
--- a/vendor/gems/kubeclient/test/config/timestamps.kubeconfig
+++ /dev/null
@@ -1,25 +0,0 @@
-apiVersion: v1
-users:
-- name: gke_username
- user:
- auth-provider:
- config:
- access-token: REDACTED
- cmd-args: config config-helper --format=json
- cmd-path: /Users/tannerbruce/opt/google-cloud-sdk/bin/gcloud
- expiry: 2018-07-07T18:25:36Z
- expiry-key: '{.credential.token_expiry}'
- token-key: '{.credential.access_token}'
- name: gcp
-
-# More syntaxes from go-yaml tests, hopefully covering all types possible in kubeconfig
-IPv4: 1.2.3.4
-Duration: 3s
-date_only: 2015-01-01
-rfc3339: 2015-02-24T18:19:39Z
-longer: 2015-02-24T18:19:39.123456789-03:00
-shorter: 2015-2-3T3:4:5Z
-iso_lower_t: 2015-02-24t18:19:39Z
-space_no_tz: 2015-02-24 18:19:39
-space_tz: 2001-12-14 21:59:43.10 -5
-timestamp_like_string: "2015-02-24T18:19:39Z"
diff --git a/vendor/gems/kubeclient/test/config/update_certs_k0s.rb b/vendor/gems/kubeclient/test/config/update_certs_k0s.rb
deleted file mode 100755
index 2632d72685c..00000000000
--- a/vendor/gems/kubeclient/test/config/update_certs_k0s.rb
+++ /dev/null
@@ -1,53 +0,0 @@
-#!/usr/bin/env ruby
-# https://docs.k0sproject.io/latest/k0s-in-docker/
-# Runs in --prividged mode, only run this if you trust the k0s distribution.
-
-require 'English'
-
-# Like Kernel#system, returns true iff exit status == 0
-def sh?(*cmd)
- puts("+ #{cmd.join(' ')}")
- system(*cmd)
-end
-
-# Raises if exit status != 0
-def sh!(*cmd)
- sh?(*cmd) || raise("returned #{$CHILD_STATUS}")
-end
-
-# allow DOCKER='sudo docker', DOCKER=podman etc.
-DOCKER = ENV['DOCKER'] || 'docker'
-
-CONTAINER = 'k0s'.freeze
-
-sh! "#{DOCKER} container inspect #{CONTAINER} --format='exists' ||
- #{DOCKER} run -d --name #{CONTAINER} --hostname k0s --privileged -v /var/lib/k0s -p 6443:6443 \
- ghcr.io/k0sproject/k0s/k0s:v1.23.3-k0s.1"
-
-# sh! "#{DOCKER} exec #{CONTAINER} kubectl config view --raw"
-# is another way to dump kubeconfig but succeeds with dummy output even before admin.conf exists;
-# so accessing the file is better way as it lets us poll until ready:
-sleep(1) until sh?("#{DOCKER} exec #{CONTAINER} ls -l /var/lib/k0s/pki/admin.conf")
-
-sh! "#{DOCKER} exec #{CONTAINER} cat /var/lib/k0s/pki/admin.conf > test/config/allinone.kubeconfig"
-# The rest could easily be extracted from allinone.kubeconfig, but the test is more robust
-# if we don't reuse YAML and/or Kubeclient::Config parsing to construct test data.
-sh! "#{DOCKER} exec #{CONTAINER} cat /var/lib/k0s/pki/ca.crt > test/config/external-ca.pem"
-sh! 'cat test/config/another-ca1.pem test/config/external-ca.pem '\
- ' test/config/another-ca2.pem > test/config/concatenated-ca.pem'
-sh! "#{DOCKER} exec #{CONTAINER} cat /var/lib/k0s/pki/admin.crt > test/config/external-cert.pem"
-sh! "#{DOCKER} exec #{CONTAINER} cat /var/lib/k0s/pki/admin.key > test/config/external-key.rsa"
-
-# Wait for apiserver to be up. To speed startup, this only retries connection errors;
-# without `--fail-with-body` curl still returns 0 for well-formed 4xx or 5xx responses.
-sleep(1) until sh?(
- 'curl --cacert test/config/external-ca.pem ' \
- '--key test/config/external-key.rsa ' \
- '--cert test/config/external-cert.pem https://127.0.0.1:6443/healthz'
-)
-
-sh! 'env KUBECLIENT_TEST_REAL_CLUSTER=true bundle exec rake test'
-
-sh! "#{DOCKER} rm -f #{CONTAINER}"
-
-puts 'If you run this only for tests, cleanup by running: git restore test/config/'
diff --git a/vendor/gems/kubeclient/test/config/userauth.kubeconfig b/vendor/gems/kubeclient/test/config/userauth.kubeconfig
deleted file mode 100644
index 604e3bda920..00000000000
--- a/vendor/gems/kubeclient/test/config/userauth.kubeconfig
+++ /dev/null
@@ -1,27 +0,0 @@
-apiVersion: v1
-clusters:
-- cluster:
- server: https://localhost:6443
- name: localhost:6443
-contexts:
-- context:
- cluster: localhost:6443
- namespace: default
- user: system:admin:token
- name: localhost/system:admin:token
-- context:
- cluster: localhost:6443
- namespace: default
- user: system:admin:userpass
- name: localhost/system:admin:userpass
-current-context: localhost/system:admin:token
-kind: Config
-preferences: {}
-users:
-- name: system:admin:token
- user:
- token: 0123456789ABCDEF0123456789ABCDEF
-- name: system:admin:userpass
- user:
- username: admin
- password: pAssw0rd123
diff --git a/vendor/gems/kubeclient/test/json/bindings_list.json b/vendor/gems/kubeclient/test/json/bindings_list.json
deleted file mode 100644
index 260748c3aa4..00000000000
--- a/vendor/gems/kubeclient/test/json/bindings_list.json
+++ /dev/null
@@ -1,10 +0,0 @@
-{
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "the server could not find the requested resource",
- "reason": "NotFound",
- "details": {},
- "code": 404
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/component_status.json b/vendor/gems/kubeclient/test/json/component_status.json
deleted file mode 100644
index 109936d3dac..00000000000
--- a/vendor/gems/kubeclient/test/json/component_status.json
+++ /dev/null
@@ -1,17 +0,0 @@
-{
- "kind": "ComponentStatus",
- "apiVersion": "v1",
- "metadata": {
- "name": "etcd-0",
- "selfLink": "/api/v1/namespaces/componentstatuses/etcd-0",
- "creationTimestamp": null
- },
- "conditions": [
- {
- "type": "Healthy",
- "status": "True",
- "message": "{\"health\": \"true\"}",
- "error": "nil"
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/component_status_list.json b/vendor/gems/kubeclient/test/json/component_status_list.json
deleted file mode 100644
index 1849f489eb2..00000000000
--- a/vendor/gems/kubeclient/test/json/component_status_list.json
+++ /dev/null
@@ -1,52 +0,0 @@
-{
- "kind": "ComponentStatusList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/componentstatuses"
- },
- "items": [
- {
- "metadata": {
- "name": "controller-manager",
- "selfLink": "/api/v1/namespaces/componentstatuses/controller-manager",
- "creationTimestamp": null
- },
- "conditions": [
- {
- "type": "Healthy",
- "status": "Unknown",
- "error": "Get http://127.0.0.1:10252/healthz: dial tcp 127.0.0.1:10252: connection refused"
- }
- ]
- },
- {
- "metadata": {
- "name": "scheduler",
- "selfLink": "/api/v1/namespaces/componentstatuses/scheduler",
- "creationTimestamp": null
- },
- "conditions": [
- {
- "type": "Healthy",
- "status": "Unknown",
- "error": "Get http://127.0.0.1:10251/healthz: dial tcp 127.0.0.1:10251: connection refused"
- }
- ]
- },
- {
- "metadata": {
- "name": "etcd-0",
- "selfLink": "/api/v1/namespaces/componentstatuses/etcd-0",
- "creationTimestamp": null
- },
- "conditions": [
- {
- "type": "Healthy",
- "status": "True",
- "message": "{\"health\": \"true\"}",
- "error": "nil"
- }
- ]
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/config.istio.io_api_resource_list.json b/vendor/gems/kubeclient/test/json/config.istio.io_api_resource_list.json
deleted file mode 100644
index 5317e865b63..00000000000
--- a/vendor/gems/kubeclient/test/json/config.istio.io_api_resource_list.json
+++ /dev/null
@@ -1,679 +0,0 @@
-{
- "kind": "APIResourceList",
- "apiVersion": "v1",
- "groupVersion": "config.istio.io/v1alpha2",
- "resources": [
- {
- "name": "metrics",
- "singularName": "metric",
- "namespaced": true,
- "kind": "metric",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "servicecontrolreports",
- "singularName": "servicecontrolreport",
- "namespaced": true,
- "kind": "servicecontrolreport",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "opas",
- "singularName": "opa",
- "namespaced": true,
- "kind": "opa",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "redisquotas",
- "singularName": "redisquota",
- "namespaced": true,
- "kind": "redisquota",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "authorizations",
- "singularName": "authorization",
- "namespaced": true,
- "kind": "authorization",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "listentries",
- "singularName": "listentry",
- "namespaced": true,
- "kind": "listentry",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "logentries",
- "singularName": "logentry",
- "namespaced": true,
- "kind": "logentry",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "tracespans",
- "singularName": "tracespan",
- "namespaced": true,
- "kind": "tracespan",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "quotaspecs",
- "singularName": "quotaspec",
- "namespaced": true,
- "kind": "QuotaSpec",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "fluentds",
- "singularName": "fluentd",
- "namespaced": true,
- "kind": "fluentd",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "rbacs",
- "singularName": "rbac",
- "namespaced": true,
- "kind": "rbac",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "checknothings",
- "singularName": "checknothing",
- "namespaced": true,
- "kind": "checknothing",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "edges",
- "singularName": "edge",
- "namespaced": true,
- "kind": "edge",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "apikeys",
- "singularName": "apikey",
- "namespaced": true,
- "kind": "apikey",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "kuberneteses",
- "singularName": "kubernetes",
- "namespaced": true,
- "kind": "kubernetes",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "httpapispecs",
- "singularName": "httpapispec",
- "namespaced": true,
- "kind": "HTTPAPISpec",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "attributemanifests",
- "singularName": "attributemanifest",
- "namespaced": true,
- "kind": "attributemanifest",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "kubernetesenvs",
- "singularName": "kubernetesenv",
- "namespaced": true,
- "kind": "kubernetesenv",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "listcheckers",
- "singularName": "listchecker",
- "namespaced": true,
- "kind": "listchecker",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "quotas",
- "singularName": "quota",
- "namespaced": true,
- "kind": "quota",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "instances",
- "singularName": "instance",
- "namespaced": true,
- "kind": "instance",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "memquotas",
- "singularName": "memquota",
- "namespaced": true,
- "kind": "memquota",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "noops",
- "singularName": "noop",
- "namespaced": true,
- "kind": "noop",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "prometheuses",
- "singularName": "prometheus",
- "namespaced": true,
- "kind": "prometheus",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "solarwindses",
- "singularName": "solarwinds",
- "namespaced": true,
- "kind": "solarwinds",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "cloudwatches",
- "singularName": "cloudwatch",
- "namespaced": true,
- "kind": "cloudwatch",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "reportnothings",
- "singularName": "reportnothing",
- "namespaced": true,
- "kind": "reportnothing",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "stackdrivers",
- "singularName": "stackdriver",
- "namespaced": true,
- "kind": "stackdriver",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "statsds",
- "singularName": "statsd",
- "namespaced": true,
- "kind": "statsd",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "httpapispecbindings",
- "singularName": "httpapispecbinding",
- "namespaced": true,
- "kind": "HTTPAPISpecBinding",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "quotaspecbindings",
- "singularName": "quotaspecbinding",
- "namespaced": true,
- "kind": "QuotaSpecBinding",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "bypasses",
- "singularName": "bypass",
- "namespaced": true,
- "kind": "bypass",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "circonuses",
- "singularName": "circonus",
- "namespaced": true,
- "kind": "circonus",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "deniers",
- "singularName": "denier",
- "namespaced": true,
- "kind": "denier",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "signalfxs",
- "singularName": "signalfx",
- "namespaced": true,
- "kind": "signalfx",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "adapters",
- "singularName": "adapter",
- "namespaced": true,
- "kind": "adapter",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "servicecontrols",
- "singularName": "servicecontrol",
- "namespaced": true,
- "kind": "servicecontrol",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "templates",
- "singularName": "template",
- "namespaced": true,
- "kind": "template",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "handlers",
- "singularName": "handler",
- "namespaced": true,
- "kind": "handler",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "rules",
- "singularName": "rule",
- "namespaced": true,
- "kind": "rule",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "dogstatsds",
- "singularName": "dogstatsd",
- "namespaced": true,
- "kind": "dogstatsd",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- },
- {
- "name": "stdios",
- "singularName": "stdio",
- "namespaced": true,
- "kind": "stdio",
- "verbs": [
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "create",
- "update",
- "watch"
- ]
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/config_map_list.json b/vendor/gems/kubeclient/test/json/config_map_list.json
deleted file mode 100644
index 85e0e30d7fe..00000000000
--- a/vendor/gems/kubeclient/test/json/config_map_list.json
+++ /dev/null
@@ -1,9 +0,0 @@
-{
- "kind": "ConfigMapList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/configmaps",
- "resourceVersion": "665"
- },
- "items": []
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/core_api_resource_list.json b/vendor/gems/kubeclient/test/json/core_api_resource_list.json
deleted file mode 100644
index 395acb249df..00000000000
--- a/vendor/gems/kubeclient/test/json/core_api_resource_list.json
+++ /dev/null
@@ -1,181 +0,0 @@
-{
- "kind": "APIResourceList",
- "groupVersion": "v1",
- "resources": [
- {
- "name": "bindings",
- "namespaced": true,
- "kind": "Binding"
- },
- {
- "name": "componentstatuses",
- "namespaced": false,
- "kind": "ComponentStatus"
- },
- {
- "name": "configmaps",
- "namespaced": true,
- "kind": "ConfigMap"
- },
- {
- "name": "endpoints",
- "namespaced": true,
- "kind": "Endpoints"
- },
- {
- "name": "events",
- "namespaced": true,
- "kind": "Event"
- },
- {
- "name": "limitranges",
- "namespaced": true,
- "kind": "LimitRange"
- },
- {
- "name": "namespaces",
- "namespaced": false,
- "kind": "Namespace"
- },
- {
- "name": "namespaces/finalize",
- "namespaced": false,
- "kind": "Namespace"
- },
- {
- "name": "namespaces/status",
- "namespaced": false,
- "kind": "Namespace"
- },
- {
- "name": "nodes",
- "namespaced": false,
- "kind": "Node"
- },
- {
- "name": "nodes/proxy",
- "namespaced": false,
- "kind": "Node"
- },
- {
- "name": "nodes/status",
- "namespaced": false,
- "kind": "Node"
- },
- {
- "name": "persistentvolumeclaims",
- "namespaced": true,
- "kind": "PersistentVolumeClaim"
- },
- {
- "name": "persistentvolumeclaims/status",
- "namespaced": true,
- "kind": "PersistentVolumeClaim"
- },
- {
- "name": "persistentvolumes",
- "namespaced": false,
- "kind": "PersistentVolume"
- },
- {
- "name": "persistentvolumes/status",
- "namespaced": false,
- "kind": "PersistentVolume"
- },
- {
- "name": "pods",
- "namespaced": true,
- "kind": "Pod"
- },
- {
- "name": "pods/attach",
- "namespaced": true,
- "kind": "Pod"
- },
- {
- "name": "pods/binding",
- "namespaced": true,
- "kind": "Binding"
- },
- {
- "name": "pods/exec",
- "namespaced": true,
- "kind": "Pod"
- },
- {
- "name": "pods/log",
- "namespaced": true,
- "kind": "Pod"
- },
- {
- "name": "pods/portforward",
- "namespaced": true,
- "kind": "Pod"
- },
- {
- "name": "pods/proxy",
- "namespaced": true,
- "kind": "Pod"
- },
- {
- "name": "pods/status",
- "namespaced": true,
- "kind": "Pod"
- },
- {
- "name": "podtemplates",
- "namespaced": true,
- "kind": "PodTemplate"
- },
- {
- "name": "replicationcontrollers",
- "namespaced": true,
- "kind": "ReplicationController"
- },
- {
- "name": "replicationcontrollers/scale",
- "namespaced": true,
- "kind": "Scale"
- },
- {
- "name": "replicationcontrollers/status",
- "namespaced": true,
- "kind": "ReplicationController"
- },
- {
- "name": "resourcequotas",
- "namespaced": true,
- "kind": "ResourceQuota"
- },
- {
- "name": "resourcequotas/status",
- "namespaced": true,
- "kind": "ResourceQuota"
- },
- {
- "name": "secrets",
- "namespaced": true,
- "kind": "Secret"
- },
- {
- "name": "serviceaccounts",
- "namespaced": true,
- "kind": "ServiceAccount"
- },
- {
- "name": "services",
- "namespaced": true,
- "kind": "Service"
- },
- {
- "name": "services/proxy",
- "namespaced": true,
- "kind": "Service"
- },
- {
- "name": "services/status",
- "namespaced": true,
- "kind": "Service"
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/core_api_resource_list_without_kind.json b/vendor/gems/kubeclient/test/json/core_api_resource_list_without_kind.json
deleted file mode 100644
index f60e113d6e5..00000000000
--- a/vendor/gems/kubeclient/test/json/core_api_resource_list_without_kind.json
+++ /dev/null
@@ -1,129 +0,0 @@
-{
- "groupVersion": "v1",
- "resources": [
- {
- "name": "bindings",
- "namespaced": true
- },
- {
- "name": "componentstatuses",
- "namespaced": true
- },
- {
- "name": "endpoints",
- "namespaced": true
- },
- {
- "name": "events",
- "namespaced": true
- },
- {
- "name": "limitranges",
- "namespaced": true
- },
- {
- "name": "namespaces",
- "namespaced": false
- },
- {
- "name": "namespaces/finalize",
- "namespaced": false
- },
- {
- "name": "namespaces/status",
- "namespaced": false
- },
- {
- "name": "nodes",
- "namespaced": false
- },
- {
- "name": "nodes/status",
- "namespaced": false
- },
- {
- "name": "persistentvolumeclaims",
- "namespaced": true
- },
- {
- "name": "persistentvolumeclaims/status",
- "namespaced": true
- },
- {
- "name": "persistentvolumes",
- "namespaced": false
- },
- {
- "name": "persistentvolumes/status",
- "namespaced": false
- },
- {
- "name": "pods",
- "namespaced": true
- },
- {
- "name": "pods/attach",
- "namespaced": true
- },
- {
- "name": "pods/binding",
- "namespaced": true
- },
- {
- "name": "pods/exec",
- "namespaced": true
- },
- {
- "name": "pods/log",
- "namespaced": true
- },
- {
- "name": "pods/portforward",
- "namespaced": true
- },
- {
- "name": "pods/proxy",
- "namespaced": true
- },
- {
- "name": "pods/status",
- "namespaced": true
- },
- {
- "name": "podtemplates",
- "namespaced": true
- },
- {
- "name": "replicationcontrollers",
- "namespaced": true
- },
- {
- "name": "replicationcontrollers/status",
- "namespaced": true
- },
- {
- "name": "resourcequotas",
- "namespaced": true
- },
- {
- "name": "resourcequotas/status",
- "namespaced": true
- },
- {
- "name": "secrets",
- "namespaced": true
- },
- {
- "name": "securitycontextconstraints",
- "namespaced": false
- },
- {
- "name": "serviceaccounts",
- "namespaced": true
- },
- {
- "name": "services",
- "namespaced": true
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/core_oapi_resource_list_without_kind.json b/vendor/gems/kubeclient/test/json/core_oapi_resource_list_without_kind.json
deleted file mode 100644
index a902a6a7fd1..00000000000
--- a/vendor/gems/kubeclient/test/json/core_oapi_resource_list_without_kind.json
+++ /dev/null
@@ -1,197 +0,0 @@
-{
- "groupVersion": "v1",
- "resources": [
- {
- "name": "buildconfigs",
- "namespaced": true
- },
- {
- "name": "buildconfigs/instantiate",
- "namespaced": true
- },
- {
- "name": "buildconfigs/instantiatebinary",
- "namespaced": true
- },
- {
- "name": "buildconfigs/webhooks",
- "namespaced": true
- },
- {
- "name": "builds",
- "namespaced": true
- },
- {
- "name": "builds/clone",
- "namespaced": true
- },
- {
- "name": "builds/details",
- "namespaced": true
- },
- {
- "name": "builds/log",
- "namespaced": true
- },
- {
- "name": "clusternetworks",
- "namespaced": false
- },
- {
- "name": "clusterpolicies",
- "namespaced": false
- },
- {
- "name": "clusterpolicybindings",
- "namespaced": false
- },
- {
- "name": "clusterrolebindings",
- "namespaced": false
- },
- {
- "name": "clusterroles",
- "namespaced": false
- },
- {
- "name": "deploymentconfigrollbacks",
- "namespaced": true
- },
- {
- "name": "deploymentconfigs",
- "namespaced": true
- },
- {
- "name": "deploymentconfigs/log",
- "namespaced": true
- },
- {
- "name": "deploymentconfigs/scale",
- "namespaced": true
- },
- {
- "name": "generatedeploymentconfigs",
- "namespaced": true
- },
- {
- "name": "groups",
- "namespaced": false
- },
- {
- "name": "hostsubnets",
- "namespaced": false
- },
- {
- "name": "identities",
- "namespaced": false
- },
- {
- "name": "images",
- "namespaced": false
- },
- {
- "name": "imagestreamimages",
- "namespaced": true
- },
- {
- "name": "imagestreammappings",
- "namespaced": true
- },
- {
- "name": "imagestreams",
- "namespaced": true
- },
- {
- "name": "imagestreams/status",
- "namespaced": true
- },
- {
- "name": "imagestreamtags",
- "namespaced": true
- },
- {
- "name": "localresourceaccessreviews",
- "namespaced": true
- },
- {
- "name": "localsubjectaccessreviews",
- "namespaced": true
- },
- {
- "name": "netnamespaces",
- "namespaced": false
- },
- {
- "name": "oauthaccesstokens",
- "namespaced": false
- },
- {
- "name": "oauthauthorizetokens",
- "namespaced": false
- },
- {
- "name": "oauthclientauthorizations",
- "namespaced": false
- },
- {
- "name": "oauthclients",
- "namespaced": false
- },
- {
- "name": "policies",
- "namespaced": true
- },
- {
- "name": "policybindings",
- "namespaced": true
- },
- {
- "name": "processedtemplates",
- "namespaced": true
- },
- {
- "name": "projectrequests",
- "namespaced": false
- },
- {
- "name": "projects",
- "namespaced": false
- },
- {
- "name": "resourceaccessreviews",
- "namespaced": true
- },
- {
- "name": "rolebindings",
- "namespaced": true
- },
- {
- "name": "roles",
- "namespaced": true
- },
- {
- "name": "routes",
- "namespaced": true
- },
- {
- "name": "routes/status",
- "namespaced": true
- },
- {
- "name": "subjectaccessreviews",
- "namespaced": true
- },
- {
- "name": "templates",
- "namespaced": true
- },
- {
- "name": "useridentitymappings",
- "namespaced": false
- },
- {
- "name": "users",
- "namespaced": false
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/created_endpoint.json b/vendor/gems/kubeclient/test/json/created_endpoint.json
deleted file mode 100644
index 1e0fd7dc41d..00000000000
--- a/vendor/gems/kubeclient/test/json/created_endpoint.json
+++ /dev/null
@@ -1,28 +0,0 @@
-{
- "kind": "Endpoints",
- "apiVersion": "v1",
- "metadata": {
- "name": "myendpoint",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/endpoints/myendpoint",
- "uid": "59d05b48-dadb-11e5-937e-18037327aaeb",
- "resourceVersion": "393",
- "creationTimestamp": "2016-02-24T09:45:34Z"
- },
- "subsets": [
- {
- "addresses": [
- {
- "ip": "172.17.0.25"
- }
- ],
- "ports": [
- {
- "name": "https",
- "port": 6443,
- "protocol": "TCP"
- }
- ]
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/created_namespace.json b/vendor/gems/kubeclient/test/json/created_namespace.json
deleted file mode 100644
index 218bc000aa8..00000000000
--- a/vendor/gems/kubeclient/test/json/created_namespace.json
+++ /dev/null
@@ -1,20 +0,0 @@
-{
-"kind": "Namespace",
-"apiVersion": "v1",
-"metadata": {
-"name": "development",
-"selfLink": "/api/v1/namespaces/development",
-"uid": "13d820d6-df5b-11e4-bd42-f8b156af4ae1",
-"resourceVersion": "2533",
-"creationTimestamp": "2015-04-10T08:24:59Z"
-},
-"spec": {
-"finalizers": [
-"kubernetes"
-]
-},
-"status": {
-"phase": "Active"
-}
-}
-
diff --git a/vendor/gems/kubeclient/test/json/created_secret.json b/vendor/gems/kubeclient/test/json/created_secret.json
deleted file mode 100644
index bcea8848335..00000000000
--- a/vendor/gems/kubeclient/test/json/created_secret.json
+++ /dev/null
@@ -1,16 +0,0 @@
-{
- "kind": "Secret",
- "apiVersion": "v1",
- "metadata": {
- "name": "test-secret",
- "namespace": "dev",
- "selfLink": "/api/v1/namespaces/dev/secrets/test-secret",
- "uid": "4e38a198-2bcb-11e5-a483-0e840567604d",
- "resourceVersion": "245569",
- "creationTimestamp": "2015-07-16T14:59:49Z"
- },
- "data": {
- "super-secret": "Y2F0J3MgYXJlIGF3ZXNvbWUK"
- },
- "type": "Opaque"
-}
diff --git a/vendor/gems/kubeclient/test/json/created_security_context_constraint.json b/vendor/gems/kubeclient/test/json/created_security_context_constraint.json
deleted file mode 100644
index c2981712cb5..00000000000
--- a/vendor/gems/kubeclient/test/json/created_security_context_constraint.json
+++ /dev/null
@@ -1,65 +0,0 @@
-{
- "allowHostDirVolumePlugin": false,
- "allowHostIPC": false,
- "allowHostNetwork": false,
- "allowHostPID": false,
- "allowHostPorts": false,
- "allowPrivilegedContainer": false,
- "allowedCapabilities": null,
- "allowedFlexVolumes": null,
- "apiVersion": "security.openshift.io/v1",
- "defaultAddCapabilities": null,
- "fsGroup": {
- "type": "RunAsAny"
- },
- "groups": [],
- "kind": "SecurityContextConstraints",
- "metadata": {
- "creationTimestamp": "2018-11-23T10:01:42Z",
- "name": "teleportation",
- "resourceVersion": "5274",
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/teleportation",
- "uid": "c6e8e2ec-ef06-11e8-b4c0-68f728fac3ab"
- },
- "priority": null,
- "readOnlyRootFilesystem": false,
- "requiredDropCapabilities": null,
- "runAsUser": {
- "type": "MustRunAs"
- },
- "seLinuxContext": {
- "type": "MustRunAs"
- },
- "supplementalGroups": {
- "type": "RunAsAny"
- },
- "users": [],
- "volumes": [
- "awsElasticBlockStore",
- "azureDisk",
- "azureFile",
- "cephFS",
- "cinder",
- "configMap",
- "downwardAPI",
- "emptyDir",
- "fc",
- "flexVolume",
- "flocker",
- "gcePersistentDisk",
- "gitRepo",
- "glusterfs",
- "iscsi",
- "nfs",
- "persistentVolumeClaim",
- "photonPersistentDisk",
- "portworxVolume",
- "projected",
- "quobyte",
- "rbd",
- "scaleIO",
- "secret",
- "storageOS",
- "vsphere"
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/created_service.json b/vendor/gems/kubeclient/test/json/created_service.json
deleted file mode 100644
index 4c2bc7d7196..00000000000
--- a/vendor/gems/kubeclient/test/json/created_service.json
+++ /dev/null
@@ -1,31 +0,0 @@
-{
- "kind": "Service",
- "apiVersion": "v1",
- "metadata": {
- "name": "guestbook",
- "namespace": "staging",
- "selfLink": "/api/v1/namespaces/staging/services/guestbook",
- "uid": "29885239-df58-11e4-bd42-f8b156af4ae1",
- "resourceVersion": "1908",
- "creationTimestamp": "2015-04-10T08:04:07Z",
- "labels": {
- "name": "guestbook"
- }
- },
- "spec": {
- "ports": [
- {
- "name": "",
- "protocol": "TCP",
- "port": 3000,
- "targetPort": "http-server"
- }
- ],
- "selector": {
- "name": "guestbook"
- },
- "clusterIP": "10.0.0.99",
- "sessionAffinity": "None"
- },
- "status": {}
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/empty_pod_list.json b/vendor/gems/kubeclient/test/json/empty_pod_list.json
deleted file mode 100644
index a82cba1148f..00000000000
--- a/vendor/gems/kubeclient/test/json/empty_pod_list.json
+++ /dev/null
@@ -1,9 +0,0 @@
-{
- "kind": "PodList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/pods",
- "resourceVersion": "565"
- },
- "items": []
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/endpoint_list.json b/vendor/gems/kubeclient/test/json/endpoint_list.json
deleted file mode 100644
index bd6c00ab678..00000000000
--- a/vendor/gems/kubeclient/test/json/endpoint_list.json
+++ /dev/null
@@ -1,48 +0,0 @@
-{
- "kind": "EndpointsList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/namespaces/endpoints",
- "resourceVersion": "39"
- },
- "items": [
- {
- "metadata": {
- "name": "example",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/endpoints/example",
- "uid": "db467530-b6aa-11e4-974a-525400c903c1",
- "resourceVersion": "38",
- "creationTimestamp": "2015-02-17T08:42:46-05:00"
- },
- "endpoints": [
- "172.17.0.63:80",
- "172.17.0.64:80"
- ]
- },
- {
- "metadata": {
- "name": "kubernetes",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/endpoints/kubernetes",
- "resourceVersion": "8",
- "creationTimestamp": null
- },
- "endpoints": [
- "192.168.122.4:6443"
- ]
- },
- {
- "metadata": {
- "name": "kubernetes-ro",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/endpoints/kubernetes-ro",
- "resourceVersion": "7",
- "creationTimestamp": null
- },
- "endpoints": [
- "192.168.122.4:7080"
- ]
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/entity_list.json b/vendor/gems/kubeclient/test/json/entity_list.json
deleted file mode 100644
index 3dd140d38c8..00000000000
--- a/vendor/gems/kubeclient/test/json/entity_list.json
+++ /dev/null
@@ -1,56 +0,0 @@
-{
- "kind": "ServiceList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/services",
- "resourceVersion": "59"
- },
- "items": [
- {
- "metadata": {
- "name": "kubernetes",
- "namespace": "default",
- "selfLink": "/api/v1/services/kubernetes?namespace=default",
- "uid": "016e9dcd-ce39-11e4-ac24-3c970e4a436a",
- "resourceVersion": "6",
- "creationTimestamp": "2015-03-19T15:08:16+02:00",
- "labels": {
- "component": "apiserver",
- "provider": "kubernetes"
- }
- },
- "spec": {
- "port": 443,
- "protocol": "TCP",
- "selector": null,
- "clusterIP": "10.0.0.2",
- "containerPort": 0,
- "sessionAffinity": "None"
- },
- "status": {}
- },
- {
- "metadata": {
- "name": "kubernetes-ro",
- "namespace": "default",
- "selfLink": "/api/v1/services/kubernetes-ro?namespace=default",
- "uid": "015b78bf-ce39-11e4-ac24-3c970e4a436a",
- "resourceVersion": "5",
- "creationTimestamp": "2015-03-19T15:08:15+02:00",
- "labels": {
- "component": "apiserver",
- "provider": "kubernetes"
- }
- },
- "spec": {
- "port": 80,
- "protocol": "TCP",
- "selector": null,
- "clusterIP": "10.0.0.1",
- "containerPort": 0,
- "sessionAffinity": "None"
- },
- "status": {}
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/event_list.json b/vendor/gems/kubeclient/test/json/event_list.json
deleted file mode 100644
index 45abfccc278..00000000000
--- a/vendor/gems/kubeclient/test/json/event_list.json
+++ /dev/null
@@ -1,35 +0,0 @@
-{
- "kind": "EventList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/events",
- "resourceVersion": "152"
- },
- "items": [
- {
- "metadata": {
- "name": "php.13c130f78da4641e",
- "namespace": "default",
- "selfLink": "/api/v1/events/php.13c130f78da4641e?namespace=default",
- "uid": "f3a454d2-b03a-11e4-89e4-525400c903c1",
- "resourceVersion": "178",
- "creationTimestamp": "2015-02-09T04:06:37-05:00"
- },
- "involvedObject": {
- "kind": "BoundPod",
- "namespace": "default",
- "name": "php",
- "uid": "64273d20-b03a-11e4-89e4-525400c903c1",
- "apiVersion": "v1beta1",
- "fieldPath": "spec.containers{nginx}"
- },
- "reason": "created",
- "message": "Created with docker id 9ba2a714411d2d0dd1e826b2fe5c3222b5cbfd9dd9133c841585cbb96b8c2c0f",
- "source": {
- "component": "kubelet",
- "host": "127.0.0.1"
- },
- "timestamp": "2015-02-09T04:06:37-05:00"
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/extensions_v1beta1_api_resource_list.json b/vendor/gems/kubeclient/test/json/extensions_v1beta1_api_resource_list.json
deleted file mode 100644
index 16fc80cf4d7..00000000000
--- a/vendor/gems/kubeclient/test/json/extensions_v1beta1_api_resource_list.json
+++ /dev/null
@@ -1,217 +0,0 @@
-{
- "kind": "APIResourceList",
- "groupVersion": "extensions/v1beta1",
- "resources": [
- {
- "name": "daemonsets",
- "singularName": "",
- "namespaced": true,
- "kind": "DaemonSet",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ],
- "shortNames": [
- "ds"
- ]
- },
- {
- "name": "daemonsets/status",
- "singularName": "",
- "namespaced": true,
- "kind": "DaemonSet",
- "verbs": [
- "get",
- "patch",
- "update"
- ]
- },
- {
- "name": "deployments",
- "singularName": "",
- "namespaced": true,
- "kind": "Deployment",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ],
- "shortNames": [
- "deploy"
- ]
- },
- {
- "name": "deployments/rollback",
- "singularName": "",
- "namespaced": true,
- "kind": "DeploymentRollback",
- "verbs": [
- "create"
- ]
- },
- {
- "name": "deployments/scale",
- "singularName": "",
- "namespaced": true,
- "group": "extensions",
- "version": "v1beta1",
- "kind": "Scale",
- "verbs": [
- "get",
- "patch",
- "update"
- ]
- },
- {
- "name": "deployments/status",
- "singularName": "",
- "namespaced": true,
- "kind": "Deployment",
- "verbs": [
- "get",
- "patch",
- "update"
- ]
- },
- {
- "name": "ingresses",
- "singularName": "",
- "namespaced": true,
- "kind": "Ingress",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ],
- "shortNames": [
- "ing"
- ]
- },
- {
- "name": "ingresses/status",
- "singularName": "",
- "namespaced": true,
- "kind": "Ingress",
- "verbs": [
- "get",
- "patch",
- "update"
- ]
- },
- {
- "name": "networkpolicies",
- "singularName": "",
- "namespaced": true,
- "kind": "NetworkPolicy",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ],
- "shortNames": [
- "netpol"
- ]
- },
- {
- "name": "podsecuritypolicies",
- "singularName": "",
- "namespaced": false,
- "kind": "PodSecurityPolicy",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ],
- "shortNames": [
- "psp"
- ]
- },
- {
- "name": "replicasets",
- "singularName": "",
- "namespaced": true,
- "kind": "ReplicaSet",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ],
- "shortNames": [
- "rs"
- ]
- },
- {
- "name": "replicasets/scale",
- "singularName": "",
- "namespaced": true,
- "group": "extensions",
- "version": "v1beta1",
- "kind": "Scale",
- "verbs": [
- "get",
- "patch",
- "update"
- ]
- },
- {
- "name": "replicasets/status",
- "singularName": "",
- "namespaced": true,
- "kind": "ReplicaSet",
- "verbs": [
- "get",
- "patch",
- "update"
- ]
- },
- {
- "name": "replicationcontrollers",
- "singularName": "",
- "namespaced": true,
- "kind": "ReplicationControllerDummy",
- "verbs": []
- },
- {
- "name": "replicationcontrollers/scale",
- "singularName": "",
- "namespaced": true,
- "kind": "Scale",
- "verbs": [
- "get",
- "patch",
- "update"
- ]
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/limit_range.json b/vendor/gems/kubeclient/test/json/limit_range.json
deleted file mode 100644
index ac2e21aa744..00000000000
--- a/vendor/gems/kubeclient/test/json/limit_range.json
+++ /dev/null
@@ -1,23 +0,0 @@
-{
- "kind": "LimitRange",
- "apiVersion": "v1",
- "metadata": {
- "name": "limits",
- "namespace": "quota-example",
- "selfLink": "/api/v1/namespaces/quota-example/limitranges/limits",
- "uid": "7a76a44c-3e9d-11e5-8214-0aaeec44370e",
- "resourceVersion": "103384",
- "creationTimestamp": "2015-08-09T13:49:39Z"
- },
- "spec": {
- "limits": [
- {
- "type": "Container",
- "default": {
- "cpu": "100m",
- "memory": "512Mi"
- }
- }
- ]
- }
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/limit_range_list.json b/vendor/gems/kubeclient/test/json/limit_range_list.json
deleted file mode 100644
index 7986ec861d8..00000000000
--- a/vendor/gems/kubeclient/test/json/limit_range_list.json
+++ /dev/null
@@ -1,31 +0,0 @@
-{
- "kind": "LimitRangeList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/namespaces/quota-example/limitranges/",
- "resourceVersion": "103421"
- },
- "items": [
- {
- "metadata": {
- "name": "limits",
- "namespace": "quota-example",
- "selfLink": "/api/v1/namespaces/quota-example/limitranges/limits",
- "uid": "7a76a44c-3e9d-11e5-8214-0aaeec44370e",
- "resourceVersion": "103384",
- "creationTimestamp": "2015-08-09T13:49:39Z"
- },
- "spec": {
- "limits": [
- {
- "type": "Container",
- "default": {
- "cpu": "100m",
- "memory": "512Mi"
- }
- }
- ]
- }
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/namespace.json b/vendor/gems/kubeclient/test/json/namespace.json
deleted file mode 100644
index 5a856730188..00000000000
--- a/vendor/gems/kubeclient/test/json/namespace.json
+++ /dev/null
@@ -1,13 +0,0 @@
-{
- "kind": "Namespace",
- "apiVersion": "v1",
- "metadata": {
- "name": "staging",
- "selfLink": "/api/v1/namespaces/staging",
- "uid": "e388bc10-c021-11e4-a514-3c970e4a436a",
- "resourceVersion": "1168",
- "creationTimestamp": "2015-03-01T16:47:31+02:00"
- },
- "spec": {},
- "status": {}
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/namespace_exception.json b/vendor/gems/kubeclient/test/json/namespace_exception.json
deleted file mode 100644
index 555ef24cabb..00000000000
--- a/vendor/gems/kubeclient/test/json/namespace_exception.json
+++ /dev/null
@@ -1,8 +0,0 @@
-{
- "kind": "Status",
- "apiVersion": "v1",
- "metadata": {},
- "status": "Failure",
- "message": "converting to : type names don't match (Pod, Namespace)",
- "code": 500
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/namespace_list.json b/vendor/gems/kubeclient/test/json/namespace_list.json
deleted file mode 100644
index af6feb7485c..00000000000
--- a/vendor/gems/kubeclient/test/json/namespace_list.json
+++ /dev/null
@@ -1,32 +0,0 @@
-{
- "kind": "NamespaceList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/namespaces",
- "resourceVersion": "1707"
- },
- "items": [
- {
- "metadata": {
- "name": "default",
- "selfLink": "/api/v1/namespaces/default",
- "uid": "56c3eb7c-c009-11e4-a514-3c970e4a436a",
- "resourceVersion": "4",
- "creationTimestamp": "2015-03-01T13:51:47+02:00"
- },
- "spec": {},
- "status": {}
- },
- {
- "metadata": {
- "name": "staging",
- "selfLink": "/api/v1/namespaces/staging",
- "uid": "e388bc10-c021-11e4-a514-3c970e4a436a",
- "resourceVersion": "1168",
- "creationTimestamp": "2015-03-01T16:47:31+02:00"
- },
- "spec": {},
- "status": {}
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/node.json b/vendor/gems/kubeclient/test/json/node.json
deleted file mode 100644
index bb4772c3f20..00000000000
--- a/vendor/gems/kubeclient/test/json/node.json
+++ /dev/null
@@ -1,29 +0,0 @@
-{
- "kind": "Node",
- "apiVersion": "v1",
- "metadata": {
- "name": "127.0.0.1",
- "selfLink": "/api/v1/nodes/127.0.0.1",
- "uid": "041143c5-ce39-11e4-ac24-3c970e4a436a",
- "resourceVersion": "1724",
- "creationTimestamp": "2015-03-19T15:08:20+02:00"
- },
- "spec": {
- "capacity": {
- "cpu": "1",
- "memory": "3Gi"
- }
- },
- "status": {
- "hostIP": "127.0.0.1",
- "conditions": [
- {
- "kind": "Ready",
- "status": "None",
- "lastProbeTime": "2015-03-20T14:16:52+02:00",
- "lastTransitionTime": "2015-03-19T15:08:20+02:00",
- "reason": "Node health check failed: kubelet /healthz endpoint returns not ok"
- }
- ]
- }
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/node_list.json b/vendor/gems/kubeclient/test/json/node_list.json
deleted file mode 100644
index a5c7cbb77a3..00000000000
--- a/vendor/gems/kubeclient/test/json/node_list.json
+++ /dev/null
@@ -1,37 +0,0 @@
-{
- "kind": "NodeList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/nodes",
- "resourceVersion": "137"
- },
- "items": [
- {
- "metadata": {
- "name": "127.0.0.1",
- "selfLink": "/api/v1/nodes/127.0.0.1",
- "uid": "041143c5-ce39-11e4-ac24-3c970e4a436a",
- "resourceVersion": "137",
- "creationTimestamp": "2015-03-19T15:08:20+02:00"
- },
- "spec": {
- "capacity": {
- "cpu": "1",
- "memory": "3Gi"
- }
- },
- "status": {
- "hostIP": "127.0.0.1",
- "conditions": [
- {
- "kind": "Ready",
- "status": "None",
- "lastProbeTime": "2015-03-19T15:29:33+02:00",
- "lastTransitionTime": "2015-03-19T15:08:20+02:00",
- "reason": "Node health check failed: kubelet /healthz endpoint returns not ok"
- }
- ]
- }
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/node_notice.json b/vendor/gems/kubeclient/test/json/node_notice.json
deleted file mode 100644
index 69ee438ecc2..00000000000
--- a/vendor/gems/kubeclient/test/json/node_notice.json
+++ /dev/null
@@ -1,160 +0,0 @@
-{
- "type": "ADDED",
- "object": {
- "apiVersion": "v1",
- "kind": "Node",
- "metadata": {
- "annotations": {
- "volumes.kubernetes.io/controller-managed-attach-detach": "true"
- },
- "creationTimestamp": "2017-12-11T12:00:13Z",
- "labels": {
- "beta.kubernetes.io/arch": "amd64",
- "beta.kubernetes.io/os": "linux",
- "kubernetes.io/hostname": "openshift.local",
- "openshift-infra": "apiserver"
- },
- "name": "openshift.local",
- "resourceVersion": "367410",
- "selfLink": "/api/v1/nodes/openshift.local",
- "uid": "d88c7af6-de6a-11e7-8725-52540080f1d2"
- },
- "spec": {
- "externalID": "openshift.local"
- },
- "status": {
- "addresses": [
- {
- "address": "192.168.122.40",
- "type": "InternalIP"
- },
- {
- "address": "openshift.local",
- "type": "Hostname"
- }
- ],
- "allocatable": {
- "cpu": "2",
- "memory": "8072896Ki",
- "pods": "20"
- },
- "capacity": {
- "cpu": "2",
- "memory": "8175296Ki",
- "pods": "20"
- },
- "conditions": [
- {
- "lastHeartbeatTime": "2017-12-15T00:36:13Z",
- "lastTransitionTime": "2017-12-11T12:00:13Z",
- "message": "kubelet has sufficient disk space available",
- "reason": "KubeletHasSufficientDisk",
- "status": "False",
- "type": "OutOfDisk"
- },
- {
- "lastHeartbeatTime": "2017-12-15T00:36:13Z",
- "lastTransitionTime": "2017-12-11T12:00:13Z",
- "message": "kubelet has sufficient memory available",
- "reason": "KubeletHasSufficientMemory",
- "status": "False",
- "type": "MemoryPressure"
- },
- {
- "lastHeartbeatTime": "2017-12-15T00:36:13Z",
- "lastTransitionTime": "2017-12-11T12:00:13Z",
- "message": "kubelet has no disk pressure",
- "reason": "KubeletHasNoDiskPressure",
- "status": "False",
- "type": "DiskPressure"
- },
- {
- "lastHeartbeatTime": "2017-12-15T00:36:13Z",
- "lastTransitionTime": "2017-12-14T15:43:39Z",
- "message": "kubelet is posting ready status",
- "reason": "KubeletReady",
- "status": "True",
- "type": "Ready"
- }
- ],
- "daemonEndpoints": {
- "kubeletEndpoint": {
- "Port": 10250
- }
- },
- "images": [
- {
- "names": [
- "docker.io/openshift/origin@sha256:908c6c9ccf0e0feefe2658899656c6e73d2854777fa340738fb903f0a40c328d",
- "docker.io/openshift/origin:latest"
- ],
- "sizeBytes": 1222636603
- },
- {
- "names": [
- "docker.io/openshift/origin-deployer@sha256:3d324bce1870047edc418041cefdec88e0a5bbb5b3b9f6fd35b43f14919a656c",
- "docker.io/openshift/origin-deployer:v3.7.0"
- ],
- "sizeBytes": 1098951248
- },
- {
- "names": [
- "docker.io/cockpit/kubernetes@sha256:a8e58cd5e6f5a4d12d1e2dfd339686b74f3c22586952ca7aa184dc254ab49714",
- "docker.io/cockpit/kubernetes:latest"
- ],
- "sizeBytes": 375926556
- },
- {
- "names": [
- "docker.io/cockpit/kubernetes@sha256:0745b3823efc57e03a5ef378614dfcb6c2b1e3964220bbf908fb3046a91cef70"
- ],
- "sizeBytes": 350062743
- },
- {
- "names": [
- "docker.io/openshift/origin-service-catalog@sha256:ef851e06276af96838a93320d0e4be51cc8de6e5afb2fb0efd4e56cec114b937"
- ],
- "sizeBytes": 284732029
- },
- {
- "names": [
- "docker.io/openshift/origin-service-catalog@sha256:8addfd742d92d8da819b091d6bda40edc45e88d1446ffd1ad658b6d21b3c36fd"
- ],
- "sizeBytes": 284731998
- },
- {
- "names": [
- "docker.io/openshift/origin-service-catalog@sha256:b3a737cc346b3cae85ef2f5d020b607781a1cac38fe70678cb78fee2c2a3bf8a"
- ],
- "sizeBytes": 284731943
- },
- {
- "names": [
- "docker.io/openshift/origin-service-catalog@sha256:957934537721da33362693d4f1590dc79dc5da7438799bf14d645165768e53ef",
- "docker.io/openshift/origin-service-catalog:latest"
- ],
- "sizeBytes": 283929631
- },
- {
- "names": [
- "docker.io/openshift/origin-pod@sha256:2c257d83a01607b229ef5e3dca09f52c3a2a2788c09dc33f0444ec4e572a9e1d",
- "docker.io/openshift/origin-pod:v3.7.0"
- ],
- "sizeBytes": 218423400
- }
- ],
- "nodeInfo": {
- "architecture": "amd64",
- "bootID": "75be791d-88a2-4f56-a588-c071a80bf7cf",
- "containerRuntimeVersion": "docker://1.12.6",
- "kernelVersion": "3.10.0-693.11.1.el7.x86_64",
- "kubeProxyVersion": "v1.7.6+a08f5eeb62",
- "kubeletVersion": "v1.7.6+a08f5eeb62",
- "machineID": "adf09ffc2de2624aa5ed335727c7400d",
- "operatingSystem": "linux",
- "osImage": "CentOS Linux 7 (Core)",
- "systemUUID": "FC9FF0AD-E22D-4A62-A5ED-335727C7400D"
- }
- }
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/persistent_volume.json b/vendor/gems/kubeclient/test/json/persistent_volume.json
deleted file mode 100644
index 612d9df1564..00000000000
--- a/vendor/gems/kubeclient/test/json/persistent_volume.json
+++ /dev/null
@@ -1,37 +0,0 @@
-{
- "kind": "PersistentVolume",
- "apiVersion": "v1",
- "metadata": {
- "name": "pv0001",
- "selfLink": "/api/v1/persistentvolumes/pv0001",
- "uid": "c83eece1-4b38-11e5-8d27-28d2447dcefe",
- "resourceVersion": "1585",
- "creationTimestamp": "2015-08-25T14:51:35Z",
- "labels": {
- "type": "local"
- }
- },
- "spec": {
- "capacity": {
- "storage": "10Gi"
- },
- "hostPath": {
- "path": "/tmp/data01"
- },
- "accessModes": [
- "ReadWriteOnce"
- ],
- "claimRef": {
- "kind": "PersistentVolumeClaim",
- "namespace": "default",
- "name": "myclaim-1",
- "uid": "d47384a3-4b38-11e5-8d27-28d2447dcefe",
- "apiVersion": "v1",
- "resourceVersion": "1582"
- },
- "persistentVolumeReclaimPolicy": "Retain"
- },
- "status": {
- "phase": "Bound"
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/persistent_volume_claim.json b/vendor/gems/kubeclient/test/json/persistent_volume_claim.json
deleted file mode 100644
index 65154685348..00000000000
--- a/vendor/gems/kubeclient/test/json/persistent_volume_claim.json
+++ /dev/null
@@ -1,32 +0,0 @@
-{
- "kind": "PersistentVolumeClaim",
- "apiVersion": "v1",
- "metadata": {
- "name": "myclaim-1",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/persistentvolumeclaims/myclaim-1",
- "uid": "d47384a3-4b38-11e5-8d27-28d2447dcefe",
- "resourceVersion": "1584",
- "creationTimestamp": "2015-08-25T14:51:55Z"
- },
- "spec": {
- "accessModes": [
- "ReadWriteOnce"
- ],
- "resources": {
- "requests": {
- "storage": "3Gi"
- }
- },
- "volumeName": "pv0001"
- },
- "status": {
- "phase": "Bound",
- "accessModes": [
- "ReadWriteOnce"
- ],
- "capacity": {
- "storage": "10Gi"
- }
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/persistent_volume_claim_list.json b/vendor/gems/kubeclient/test/json/persistent_volume_claim_list.json
deleted file mode 100644
index 9533d75603b..00000000000
--- a/vendor/gems/kubeclient/test/json/persistent_volume_claim_list.json
+++ /dev/null
@@ -1,40 +0,0 @@
-{
- "kind": "PersistentVolumeClaimList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/persistentvolumeclaims",
- "resourceVersion": "3188"
- },
- "items": [
- {
- "metadata": {
- "name": "myclaim-1",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/persistentvolumeclaims/myclaim-1",
- "uid": "d47384a3-4b38-11e5-8d27-28d2447dcefe",
- "resourceVersion": "1584",
- "creationTimestamp": "2015-08-25T14:51:55Z"
- },
- "spec": {
- "accessModes": [
- "ReadWriteOnce"
- ],
- "resources": {
- "requests": {
- "storage": "3Gi"
- }
- },
- "volumeName": "pv0001"
- },
- "status": {
- "phase": "Bound",
- "accessModes": [
- "ReadWriteOnce"
- ],
- "capacity": {
- "storage": "10Gi"
- }
- }
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/persistent_volume_claims_nil_items.json b/vendor/gems/kubeclient/test/json/persistent_volume_claims_nil_items.json
deleted file mode 100644
index b23ff4dcffd..00000000000
--- a/vendor/gems/kubeclient/test/json/persistent_volume_claims_nil_items.json
+++ /dev/null
@@ -1,8 +0,0 @@
-{
- "kind": "PersistentVolumeClaimList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/persistentvolumeclaims",
- "resourceVersion": "1089012"
- }
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/persistent_volume_list.json b/vendor/gems/kubeclient/test/json/persistent_volume_list.json
deleted file mode 100644
index fa7e53cb914..00000000000
--- a/vendor/gems/kubeclient/test/json/persistent_volume_list.json
+++ /dev/null
@@ -1,45 +0,0 @@
-{
- "kind": "PersistentVolumeList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/persistentvolumes",
- "resourceVersion": "2999"
- },
- "items": [
- {
- "metadata": {
- "name": "pv0001",
- "selfLink": "/api/v1/persistentvolumes/pv0001",
- "uid": "c83eece1-4b38-11e5-8d27-28d2447dcefe",
- "resourceVersion": "1585",
- "creationTimestamp": "2015-08-25T14:51:35Z",
- "labels": {
- "type": "local"
- }
- },
- "spec": {
- "capacity": {
- "storage": "10Gi"
- },
- "hostPath": {
- "path": "/tmp/data01"
- },
- "accessModes": [
- "ReadWriteOnce"
- ],
- "claimRef": {
- "kind": "PersistentVolumeClaim",
- "namespace": "default",
- "name": "myclaim-1",
- "uid": "d47384a3-4b38-11e5-8d27-28d2447dcefe",
- "apiVersion": "v1",
- "resourceVersion": "1582"
- },
- "persistentVolumeReclaimPolicy": "Retain"
- },
- "status": {
- "phase": "Bound"
- }
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/pod.json b/vendor/gems/kubeclient/test/json/pod.json
deleted file mode 100644
index 913c2146f6a..00000000000
--- a/vendor/gems/kubeclient/test/json/pod.json
+++ /dev/null
@@ -1,92 +0,0 @@
-{
- "kind": "Pod",
- "apiVersion": "v1",
- "metadata": {
- "name": "redis-master3",
- "namespace": "default",
- "selfLink": "/api/v1/pods/redis-master3?namespace=default",
- "uid": "a344023f-a23c-11e4-a36b-3c970e4a436a",
- "resourceVersion": "9",
- "creationTimestamp": "2015-01-22T15:43:24+02:00",
- "labels": {
- "name": "redis-master"
- }
- },
- "spec": {
- "volumes": null,
- "containers": [
- {
- "name": "master",
- "image": "dockerfile/redis",
- "ports": [
- {
- "hostPort": 6379,
- "containerPort": 6379,
- "protocol": "TCP"
- }
- ],
- "memory": "0",
- "cpu": "100m",
- "imagePullPolicy": ""
- },
- {
- "name": "php-redis",
- "image": "kubernetes/example-guestbook-php-redis",
- "ports": [
- {
- "hostPort": 8000,
- "containerPort": 80,
- "protocol": "TCP"
- }
- ],
- "memory": "50000000",
- "cpu": "100m",
- "imagePullPolicy": ""
- }
- ],
- "restartPolicy": {
- "always": {
-
- }
- },
- "dnsPolicy": "ClusterFirst"
- },
- "status": {
- "phase": "Running",
- "host": "127.0.0.1",
- "podIP": "172.17.0.2",
- "info": {
- "master": {
- "state": {
- "running": {
- "startedAt": "2015-01-22T13:43:29Z"
- }
- },
- "restartCount": 0,
- "containerID": "docker://87458d9a12f9dc9a01b52c1eee5f09cf48939380271c0eaf31af298ce67b125e",
- "image": "dockerfile/redis"
- },
- "net": {
- "state": {
- "running": {
- "startedAt": "2015-01-22T13:43:27Z"
- }
- },
- "restartCount": 0,
- "containerID": "docker://3bb5ced1f831322d370f70b58137e1dd41216c2960b7a99394542b5230cbd259",
- "podIP": "172.17.0.2",
- "image": "kubernetes/pause:latest"
- },
- "php-redis": {
- "state": {
- "running": {
- "startedAt": "2015-01-22T13:43:31Z"
- }
- },
- "restartCount": 0,
- "containerID": "docker://5f08685c0a7a5c974d438a52c6560d72bb0aae7e805d2a34302b9b460f1297c7",
- "image": "kubernetes/example-guestbook-php-redis"
- }
- }
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/pod_list.json b/vendor/gems/kubeclient/test/json/pod_list.json
deleted file mode 100644
index d08bbdce0c0..00000000000
--- a/vendor/gems/kubeclient/test/json/pod_list.json
+++ /dev/null
@@ -1,79 +0,0 @@
-{
- "kind": "PodList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/pods",
- "resourceVersion": "1315"
- },
- "items": [
- {
- "metadata": {
- "name": "redis-master3",
- "namespace": "default",
- "selfLink": "/api/v1/pods/redis-master3?namespace=default",
- "uid": "1da148b4-cef5-11e4-ac24-3c970e4a436a",
- "resourceVersion": "1301",
- "creationTimestamp": "2015-03-20T13:34:48+02:00",
- "labels": {
- "mylabel": "mylabelvalue",
- "role": "pod"
- }
- },
- "spec": {
- "volumes": null,
- "containers": [
- {
- "name": "master",
- "image": "dockerfile/redis",
- "ports": [
- {
- "hostPort": 6379,
- "containerPort": 6379,
- "protocol": "TCP"
- }
- ],
- "resources": {
- "limits": {
- "cpu": "100m"
- }
- },
- "terminationMessagePath": "/dev/termination-log",
- "imagePullPolicy": "IfNotPresent",
- "securityContext": {
- "capabilities": {}
- }
- },
- {
- "name": "php-redis",
- "image": "kubernetes/example-guestbook-php-redis",
- "ports": [
- {
- "hostPort": 8000,
- "containerPort": 80,
- "protocol": "TCP"
- }
- ],
- "resources": {
- "limits": {
- "cpu": "100m",
- "memory": "50000000"
- }
- },
- "terminationMessagePath": "/dev/termination-log",
- "imagePullPolicy": "IfNotPresent",
- "securityContext": {
- "capabilities": {}
- }
- }
- ],
- "restartPolicy": {
- "always": {}
- },
- "dnsPolicy": "ClusterFirst"
- },
- "status": {
- "phase": "Pending"
- }
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/pod_template_list.json b/vendor/gems/kubeclient/test/json/pod_template_list.json
deleted file mode 100644
index 5acb2c2f83a..00000000000
--- a/vendor/gems/kubeclient/test/json/pod_template_list.json
+++ /dev/null
@@ -1,9 +0,0 @@
-{
- "kind": "PodTemplateList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/podtemplates",
- "resourceVersion": "672"
- },
- "items": []
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/pods_1.json b/vendor/gems/kubeclient/test/json/pods_1.json
deleted file mode 100644
index ec00bd3b5cc..00000000000
--- a/vendor/gems/kubeclient/test/json/pods_1.json
+++ /dev/null
@@ -1,265 +0,0 @@
-{
- "kind":"PodList",
- "apiVersion":"v1",
- "metadata":{
- "selfLink":"/api/v1/pods",
- "resourceVersion":"53225946",
- "continue":"eyJ2IjoibWV0YS5rOHMua"
- },
- "items":[
- {
- "metadata":{
- "name":"my-ruby-project-2-build",
- "namespace":"my-project",
- "selfLink":"/api/v1/namespaces/my-project/pods/my-ruby-project-2-build",
- "uid":"0c478b50-babb-11e8-ba7e-d094660d31fb",
- "resourceVersion":"42398462",
- "creationTimestamp":"2018-09-17T20:48:36Z",
- "deletionTimestamp":"2018-09-19T13:22:50Z",
- "deletionGracePeriodSeconds":0,
- "labels":{
- "openshift.io/build.name":"my-ruby-project-2"
- },
- "annotations":{
- "openshift.io/build.name":"my-ruby-project-2",
- "openshift.io/scc":"privileged"
- },
- "ownerReferences":[
- {
- "apiVersion":"build.openshift.io/v1",
- "kind":"Build",
- "name":"my-ruby-project-2",
- "uid":"0c450e6d-babb-11e8-ba7e-d094660d31fb",
- "controller":true
- }
- ],
- "finalizers":[
- "foregroundDeletion"
- ]
- },
- "spec":{
- "volumes":[
- {
- "name":"buildworkdir",
- "emptyDir":{
-
- }
- },
- {
- "name":"docker-socket",
- "hostPath":{
- "path":"/var/run/docker.sock",
- "type":""
- }
- },
- {
- "name":"crio-socket",
- "hostPath":{
- "path":"/var/run/crio/crio.sock",
- "type":""
- }
- },
- {
- "name":"builder-dockercfg-rjgnm-push",
- "secret":{
- "secretName":"builder-dockercfg-rjgnm",
- "defaultMode":384
- }
- },
- {
- "name":"builder-token-zkpb6",
- "secret":{
- "secretName":"builder-token-zkpb6",
- "defaultMode":420
- }
- }
- ],
- "containers":[
- {
- "name":"sti-build",
- "image":"openshift3/ose-sti-builder:v3.9.25",
- "command":[
- "openshift-sti-build"
- ]
- }
- ],
- "restartPolicy":"Never",
- "terminationGracePeriodSeconds":30,
- "dnsPolicy":"ClusterFirst",
- "nodeSelector":{
- "node-role.kubernetes.io/compute":"true"
- },
- "serviceAccountName":"builder",
- "serviceAccount":"builder",
- "nodeName":"dell-r430-20.example.com",
- "securityContext":{
-
- },
- "imagePullSecrets":[
- {
- "name":"builder-dockercfg-rjgnm"
- }
- ],
- "schedulerName":"default-scheduler"
- },
- "status":{
- "phase":"Failed",
- "conditions":[
- {
- "type":"Initialized",
- "status":"True",
- "lastProbeTime":null,
- "lastTransitionTime":"2018-09-17T20:48:49Z"
- },
- {
- "type":"Ready",
- "status":"False",
- "lastProbeTime":null,
- "lastTransitionTime":"2018-09-17T20:49:08Z",
- "reason":"ContainersNotReady",
- "message":"containers with unready status: [sti-build]"
- },
- {
- "type":"PodScheduled",
- "status":"True",
- "lastProbeTime":null,
- "lastTransitionTime":"2018-09-17T20:48:36Z"
- }
- ],
- "hostIP":"10.8.96.55",
- "podIP":"10.129.0.207",
- "startTime":"2018-09-17T20:48:36Z",
- "qosClass":"BestEffort"
- }
- },
- {
- "metadata":{
- "name":"redis-1-94zxb",
- "generateName":"redis-1-",
- "namespace":"customer-logging",
- "selfLink":"/api/v1/namespaces/customer-logging/pods/redis-1-94zxb",
- "uid":"a8aea5f4-5f91-11e8-ba7e-d094660d31fb",
- "resourceVersion":"47622190",
- "creationTimestamp":"2018-05-24T20:33:03Z",
- "labels":{
- "app":"elastic-log-ripper",
- "deployment":"redis-1",
- "deploymentconfig":"redis",
- "name":"redis"
- },
- "annotations":{
- "openshift.io/deployment-config.latest-version":"1",
- "openshift.io/deployment-config.name":"redis",
- "openshift.io/deployment.name":"redis-1",
- "openshift.io/generated-by":"OpenShiftNewApp",
- "openshift.io/scc":"restricted"
- },
- "ownerReferences":[
- {
- "apiVersion":"v1",
- "kind":"ReplicationController",
- "name":"redis-1",
- "uid":"9e2e46b3-5f91-11e8-ba7e-d094660d31fb",
- "controller":true,
- "blockOwnerDeletion":true
- }
- ]
- },
- "spec":{
- "volumes":[
- {
- "name":"default-token-n2wzs",
- "secret":{
- "secretName":"default-token-n2wzs",
- "defaultMode":420
- }
- }
- ],
- "containers":[
- {
- "name":"redis",
- "image":"manageiq/redis:latest",
- "ports":[
- {
- "containerPort":6379,
- "protocol":"TCP"
- }
- ],
- "resources":{
-
- },
- "volumeMounts":[
- {
- "name":"default-token-n2wzs",
- "readOnly":true,
- "mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"
- }
- ],
- "terminationMessagePath":"/dev/termination-log",
- "terminationMessagePolicy":"File",
- "imagePullPolicy":"Always",
- "securityContext":{
- "capabilities":{
- "drop":[
- "KILL",
- "MKNOD",
- "SETGID",
- "SETUID"
- ]
- },
- "runAsUser":1000260000
- }
- }
- ],
- "restartPolicy":"Always",
- "terminationGracePeriodSeconds":30,
- "dnsPolicy":"ClusterFirst",
- "nodeSelector":{
- "node-role.kubernetes.io/compute":"true"
- },
- "serviceAccountName":"default",
- "serviceAccount":"default",
- "nodeName":"dell-r430-20.example.com",
- "securityContext":{
- "seLinuxOptions":{
- "level":"s0:c16,c10"
- },
- "fsGroup":1000260000
- },
- "imagePullSecrets":[
- {
- "name":"default-dockercfg-ck286"
- }
- ],
- "schedulerName":"default-scheduler"
- },
- "status":{
- "phase":"Running",
- "conditions":[
- {
- "type":"Initialized",
- "status":"True",
- "lastProbeTime":null,
- "lastTransitionTime":"2018-05-24T20:33:04Z"
- },
- {
- "type":"Ready",
- "status":"True",
- "lastProbeTime":null,
- "lastTransitionTime":"2018-09-18T12:06:18Z"
- },
- {
- "type":"PodScheduled",
- "status":"True",
- "lastProbeTime":null,
- "lastTransitionTime":"2018-05-24T20:33:03Z"
- }
- ],
- "hostIP":"10.8.96.55",
- "podIP":"10.129.0.222",
- "startTime":"2018-05-24T20:33:04Z",
- "qosClass":"BestEffort"
- }
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/pods_2.json b/vendor/gems/kubeclient/test/json/pods_2.json
deleted file mode 100644
index fd6085bc5de..00000000000
--- a/vendor/gems/kubeclient/test/json/pods_2.json
+++ /dev/null
@@ -1,102 +0,0 @@
-{
- "kind":"PodList",
- "apiVersion":"v1",
- "metadata":{
- "selfLink":"/api/v1/pods",
- "resourceVersion":"53226147"
- },
- "items":[
- {
- "metadata":{
- "name":"topological-inventory-persister-9-hznds",
- "generateName":"topological-inventory-persister-9-",
- "namespace":"topological-inventory-ci",
- "selfLink":"/api/v1/namespaces/topological-inventory-ci/pods/topological-inventory-persister-9-hznds",
- "uid":"0c114dde-d865-11e8-ba7e-d094660d31fb",
- "resourceVersion":"51987342",
- "creationTimestamp":"2018-10-25T14:48:34Z",
- "labels":{
- "name":"topological-inventory-persister"
- }
- },
- "spec":{
- "volumes":[
- {
- "name":"default-token-5pdjl",
- "secret":{
- "secretName":"default-token-5pdjl",
- "defaultMode":420
- }
- }
- ],
- "containers":[
- {
- "name":"topological-inventory-persister",
- "image":"docker-registry.default.svc:5000/topological-inventory-ci/topological-inventory-persister@sha256:0f654ea09e749019cf3bcc4b8ee43b8dd813fcbf487843b917cf190213741927",
- "resources":{
- }
- }
- ],
- "restartPolicy":"Always",
- "terminationGracePeriodSeconds":30,
- "dnsPolicy":"ClusterFirst",
- "nodeSelector":{
- "node-role.kubernetes.io/compute":"true"
- },
- "serviceAccountName":"default",
- "serviceAccount":"default",
- "nodeName":"dell-r430-20.example.com",
- "schedulerName":"default-scheduler"
- },
- "status":{
- "phase":"Running",
- "hostIP":"10.8.96.55",
- "podIP":"10.129.1.108",
- "startTime":"2018-10-25T14:48:34Z",
- "qosClass":"BestEffort"
- }
- },
- {
- "metadata":{
- "name":"topological-inventory-persister-9-vzr6h",
- "generateName":"topological-inventory-persister-9-",
- "namespace":"topological-inventory-ci",
- "selfLink":"/api/v1/namespaces/topological-inventory-ci/pods/topological-inventory-persister-9-vzr6h",
- "uid":"3065d8ce-d86a-11e8-ba7e-d094660d31fb",
- "resourceVersion":"51996115",
- "creationTimestamp":"2018-10-25T15:25:22Z",
- "labels":{
- "name":"topological-inventory-persister"
- }
- },
- "spec":{
- "volumes":null,
- "containers":[
- {
- "name":"topological-inventory-persister",
- "image":"docker-registry.default.svc:5000/topological-inventory-ci/topological-inventory-persister@sha256:0f654ea09e749019cf3bcc4b8ee43b8dd813fcbf487843b917cf190213741927",
- "resources":{
- }
- }
- ],
- "restartPolicy":"Always",
- "terminationGracePeriodSeconds":30,
- "dnsPolicy":"ClusterFirst",
- "nodeSelector":{
- "node-role.kubernetes.io/compute":"true"
- },
- "serviceAccountName":"default",
- "serviceAccount":"default",
- "nodeName":"dell-r430-20.example.com",
- "schedulerName":"default-scheduler"
- },
- "status":{
- "phase":"Running",
- "hostIP":"10.8.96.55",
- "podIP":"10.129.1.168",
- "startTime":"2018-10-25T15:25:22Z",
- "qosClass":"BestEffort"
- }
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/pods_410.json b/vendor/gems/kubeclient/test/json/pods_410.json
deleted file mode 100644
index eb1a31937b7..00000000000
--- a/vendor/gems/kubeclient/test/json/pods_410.json
+++ /dev/null
@@ -1,9 +0,0 @@
-{
- "kind":"Status",
- "apiVersion":"v1",
- "metadata":{},
- "status":"Failure",
- "message":"The provided from parameter is too old to display a consistent list result. You must start a new list without the from.",
- "reason":"Expired",
- "code":410
-}
diff --git a/vendor/gems/kubeclient/test/json/processed_template.json b/vendor/gems/kubeclient/test/json/processed_template.json
deleted file mode 100644
index 66c6e32ea70..00000000000
--- a/vendor/gems/kubeclient/test/json/processed_template.json
+++ /dev/null
@@ -1,27 +0,0 @@
-{
- "kind": "Template",
- "apiVersion": "v1",
- "metadata": {
- "name": "my-templtae",
- "namespace": "default",
- "selfLink": "/oapi/v1/namespaces/default/processedtemplates/my-templtae",
- "uid": "2240c61c-8f70-11e5-a806-001a4a231290",
- "resourceVersion": "1399",
- "creationTimestamp": "2015-11-20T10:19:07Z"
- },
- "objects": [
- {
- "apiVersion": "v1",
- "kind": "Service",
- "metadata": {
- "name": "test/my-service"
- }
- }
- ],
- "parameters": [
- {
- "name": "NAME_PREFIX",
- "value": "test/"
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/replication_controller.json b/vendor/gems/kubeclient/test/json/replication_controller.json
deleted file mode 100644
index 26ac7a9a39e..00000000000
--- a/vendor/gems/kubeclient/test/json/replication_controller.json
+++ /dev/null
@@ -1,57 +0,0 @@
-{
- "kind": "ReplicationController",
- "apiVersion": "v1",
- "metadata": {
- "name": "guestbook-controller",
- "namespace": "default",
- "selfLink": "/api/v1/replicationcontrollers/guestbook-controller?namespace=default",
- "uid": "c71aa4c0-a240-11e4-a265-3c970e4a436a",
- "resourceVersion": "8",
- "creationTimestamp": "2015-01-22T16:13:02+02:00",
- "labels": {
- "name": "guestbook"
- }
- },
- "spec": {
- "replicas": 3,
- "selector": {
- "name": "guestbook"
- },
- "template": {
- "metadata": {
- "creationTimestamp": null,
- "labels": {
- "name": "guestbook"
- }
- },
- "spec": {
- "volumes": null,
- "containers": [
- {
- "name": "guestbook",
- "image": "kubernetes/guestbook",
- "ports": [
- {
- "name": "http-server",
- "containerPort": 3000,
- "protocol": "TCP"
- }
- ],
- "memory": "0",
- "cpu": "0m",
- "imagePullPolicy": ""
- }
- ],
- "restartPolicy": {
- "always": {
-
- }
- },
- "dnsPolicy": "ClusterFirst"
- }
- }
- },
- "status": {
- "replicas": 3
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/replication_controller_list.json b/vendor/gems/kubeclient/test/json/replication_controller_list.json
deleted file mode 100644
index b7f2f7bd521..00000000000
--- a/vendor/gems/kubeclient/test/json/replication_controller_list.json
+++ /dev/null
@@ -1,66 +0,0 @@
-{
- "kind": "ReplicationControllerList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/namespaces/default/replicationcontrollers",
- "resourceVersion": "1636"
- },
- "items": [
- {
- "metadata": {
- "name": "redis-master-controller",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/replicationcontrollers/redis-master-controller?namespace=default",
- "uid": "108eb547-cefa-11e4-ac24-3c970e4a436a",
- "resourceVersion": "1631",
- "creationTimestamp": "2015-03-20T14:10:14+02:00",
- "labels": {
- "name": "redis-master"
- }
- },
- "spec": {
- "replicas": 1,
- "selector": {
- "name": "redis-master"
- },
- "template": {
- "metadata": {
- "creationTimestamp": null,
- "labels": {
- "app": "redis",
- "name": "redis-master"
- }
- },
- "spec": {
- "volumes": null,
- "containers": [
- {
- "name": "redis-master",
- "image": "dockerfile/redis",
- "ports": [
- {
- "containerPort": 6379,
- "protocol": "TCP"
- }
- ],
- "resources": {},
- "terminationMessagePath": "/dev/termination-log",
- "imagePullPolicy": "IfNotPresent",
- "securityContext": {
- "capabilities": {}
- }
- }
- ],
- "restartPolicy": {
- "always": {}
- },
- "dnsPolicy": "ClusterFirst"
- }
- }
- },
- "status": {
- "replicas": 1
- }
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/resource_quota.json b/vendor/gems/kubeclient/test/json/resource_quota.json
deleted file mode 100644
index 75b40391d68..00000000000
--- a/vendor/gems/kubeclient/test/json/resource_quota.json
+++ /dev/null
@@ -1,46 +0,0 @@
-{
- "kind": "ResourceQuota",
- "apiVersion": "v1",
- "metadata": {
- "name": "quota",
- "namespace": "quota-example",
- "selfLink": "/api/v1/namespaces/quota-example/resourcequotas/quota",
- "uid": "ab9f24a4-3c43-11e5-8214-0aaeec44370e",
- "resourceVersion": "12919",
- "creationTimestamp": "2015-08-06T14:01:44Z"
- },
- "spec": {
- "hard": {
- "cpu": "20",
- "memory": "1Gi",
- "persistentvolumeclaims": "10",
- "pods": "10",
- "replicationcontrollers": "20",
- "resourcequotas": "1",
- "secrets": "10",
- "services": "5"
- }
- },
- "status": {
- "hard": {
- "cpu": "20",
- "memory": "1Gi",
- "persistentvolumeclaims": "10",
- "pods": "10",
- "replicationcontrollers": "20",
- "resourcequotas": "1",
- "secrets": "10",
- "services": "5"
- },
- "used": {
- "cpu": "0",
- "memory": "0",
- "persistentvolumeclaims": "0",
- "pods": "0",
- "replicationcontrollers": "1",
- "resourcequotas": "1",
- "secrets": "9",
- "services": "0"
- }
- }
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/resource_quota_list.json b/vendor/gems/kubeclient/test/json/resource_quota_list.json
deleted file mode 100644
index 371f3feb649..00000000000
--- a/vendor/gems/kubeclient/test/json/resource_quota_list.json
+++ /dev/null
@@ -1,54 +0,0 @@
-{
- "kind": "ResourceQuotaList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/namespaces/quota-example/resourcequotas/",
- "resourceVersion": "102452"
- },
- "items": [
- {
- "metadata": {
- "name": "quota",
- "namespace": "quota-example",
- "selfLink": "/api/v1/namespaces/quota-example/resourcequotas/quota",
- "uid": "ab9f24a4-3c43-11e5-8214-0aaeec44370e",
- "resourceVersion": "12919",
- "creationTimestamp": "2015-08-06T14:01:44Z"
- },
- "spec": {
- "hard": {
- "cpu": "20",
- "memory": "1Gi",
- "persistentvolumeclaims": "10",
- "pods": "10",
- "replicationcontrollers": "20",
- "resourcequotas": "1",
- "secrets": "10",
- "services": "5"
- }
- },
- "status": {
- "hard": {
- "cpu": "20",
- "memory": "1Gi",
- "persistentvolumeclaims": "10",
- "pods": "10",
- "replicationcontrollers": "20",
- "resourcequotas": "1",
- "secrets": "10",
- "services": "5"
- },
- "used": {
- "cpu": "0",
- "memory": "0",
- "persistentvolumeclaims": "0",
- "pods": "0",
- "replicationcontrollers": "1",
- "resourcequotas": "1",
- "secrets": "9",
- "services": "0"
- }
- }
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/secret_list.json b/vendor/gems/kubeclient/test/json/secret_list.json
deleted file mode 100644
index bfd7661b390..00000000000
--- a/vendor/gems/kubeclient/test/json/secret_list.json
+++ /dev/null
@@ -1,44 +0,0 @@
-{
- "kind": "SecretList",
- "apiVersion":"v1",
- "metadata":{
- "selfLink":"/api/v1/secrets",
- "resourceVersion":"256788"
- },
- "items": [
- {
- "metadata": {
- "name":"default-token-my2pi",
- "namespace":"default",
- "selfLink":"/api/v1/namespaces/default/secrets/default-token-my2pi",
- "uid":"07b60654-2a65-11e5-a483-0e840567604d",
- "resourceVersion":"11",
- "creationTimestamp":"2015-07-14T20:15:11Z",
- "annotations": {
- "kubernetes.io/service-account.name":"default",
- "kubernetes.io/service-account.uid":"07b350a0-2a65-11e5-a483-0e840567604d"
- }
- },
- "data":{
- "ca.crt":"Y2F0J3MgYXJlIGF3ZXNvbWUK",
- "token":"Y2F0J3MgYXJlIGF3ZXNvbWUK"
- },
- "type":"kubernetes.io/service-account-token"
- },
- {
- "metadata": {
- "name": "test-secret",
- "namespace": "dev",
- "selfLink": "/api/v1/namespaces/dev/secrets/test-secret",
- "uid": "4e38a198-2bcb-11e5-a483-0e840567604d",
- "resourceVersion": "245569",
- "creationTimestamp": "2015-07-16T14:59:49Z"
- },
- "data": {
- "super-secret": "Y2F0J3MgYXJlIGF3ZXNvbWUK"
- },
- "type": "Opaque"
- }
- ]
-}
-
diff --git a/vendor/gems/kubeclient/test/json/security.openshift.io_api_resource_list.json b/vendor/gems/kubeclient/test/json/security.openshift.io_api_resource_list.json
deleted file mode 100644
index 18e2021cff5..00000000000
--- a/vendor/gems/kubeclient/test/json/security.openshift.io_api_resource_list.json
+++ /dev/null
@@ -1,69 +0,0 @@
-{
- "kind": "APIResourceList",
- "apiVersion": "v1",
- "groupVersion": "security.openshift.io/v1",
- "resources": [
- {
- "name": "podsecuritypolicyreviews",
- "singularName": "",
- "namespaced": true,
- "kind": "PodSecurityPolicyReview",
- "verbs": [
- "create"
- ]
- },
- {
- "name": "podsecuritypolicyselfsubjectreviews",
- "singularName": "",
- "namespaced": true,
- "kind": "PodSecurityPolicySelfSubjectReview",
- "verbs": [
- "create"
- ]
- },
- {
- "name": "podsecuritypolicysubjectreviews",
- "singularName": "",
- "namespaced": true,
- "kind": "PodSecurityPolicySubjectReview",
- "verbs": [
- "create"
- ]
- },
- {
- "name": "rangeallocations",
- "singularName": "",
- "namespaced": false,
- "kind": "RangeAllocation",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ]
- },
- {
- "name": "securitycontextconstraints",
- "singularName": "",
- "namespaced": false,
- "kind": "SecurityContextConstraints",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ],
- "shortNames": [
- "scc"
- ]
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/security_context_constraint_list.json b/vendor/gems/kubeclient/test/json/security_context_constraint_list.json
deleted file mode 100644
index 1e9d4c474a7..00000000000
--- a/vendor/gems/kubeclient/test/json/security_context_constraint_list.json
+++ /dev/null
@@ -1,375 +0,0 @@
-{
- "kind": "SecurityContextConstraintsList",
- "apiVersion": "security.openshift.io/v1",
- "metadata": {
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints",
- "resourceVersion": "5751"
- },
- "items": [
- {
- "metadata": {
- "name": "anyuid",
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/anyuid",
- "uid": "12ba8540-ef00-11e8-b4c0-68f728fac3ab",
- "resourceVersion": "71",
- "creationTimestamp": "2018-11-23T09:13:42Z",
- "annotations": {
- "kubernetes.io/description": "anyuid provides all features of the restricted SCC but allows users to run with any UID and any GID."
- }
- },
- "priority": 10,
- "allowPrivilegedContainer": false,
- "defaultAddCapabilities": null,
- "requiredDropCapabilities": [
- "MKNOD"
- ],
- "allowedCapabilities": null,
- "allowHostDirVolumePlugin": false,
- "volumes": [
- "configMap",
- "downwardAPI",
- "emptyDir",
- "persistentVolumeClaim",
- "projected",
- "secret"
- ],
- "allowedFlexVolumes": null,
- "allowHostNetwork": false,
- "allowHostPorts": false,
- "allowHostPID": false,
- "allowHostIPC": false,
- "seLinuxContext": {
- "type": "MustRunAs"
- },
- "runAsUser": {
- "type": "RunAsAny"
- },
- "supplementalGroups": {
- "type": "RunAsAny"
- },
- "fsGroup": {
- "type": "RunAsAny"
- },
- "readOnlyRootFilesystem": false,
- "users": [],
- "groups": [
- "system:cluster-admins"
- ]
- },
- {
- "metadata": {
- "name": "hostaccess",
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostaccess",
- "uid": "12b5b3a2-ef00-11e8-b4c0-68f728fac3ab",
- "resourceVersion": "69",
- "creationTimestamp": "2018-11-23T09:13:42Z",
- "annotations": {
- "kubernetes.io/description": "hostaccess allows access to all host namespaces but still requires pods to be run with a UID and SELinux context that are allocated to the namespace. WARNING: this SCC allows host access to namespaces, file systems, and PIDS. It should only be used by trusted pods. Grant with caution."
- }
- },
- "priority": null,
- "allowPrivilegedContainer": false,
- "defaultAddCapabilities": null,
- "requiredDropCapabilities": [
- "KILL",
- "MKNOD",
- "SETUID",
- "SETGID"
- ],
- "allowedCapabilities": null,
- "allowHostDirVolumePlugin": true,
- "volumes": [
- "configMap",
- "downwardAPI",
- "emptyDir",
- "hostPath",
- "persistentVolumeClaim",
- "projected",
- "secret"
- ],
- "allowedFlexVolumes": null,
- "allowHostNetwork": true,
- "allowHostPorts": true,
- "allowHostPID": true,
- "allowHostIPC": true,
- "seLinuxContext": {
- "type": "MustRunAs"
- },
- "runAsUser": {
- "type": "MustRunAsRange"
- },
- "supplementalGroups": {
- "type": "RunAsAny"
- },
- "fsGroup": {
- "type": "MustRunAs"
- },
- "readOnlyRootFilesystem": false,
- "users": [],
- "groups": []
- },
- {
- "metadata": {
- "name": "hostmount-anyuid",
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostmount-anyuid",
- "uid": "12b512c0-ef00-11e8-b4c0-68f728fac3ab",
- "resourceVersion": "68",
- "creationTimestamp": "2018-11-23T09:13:42Z",
- "annotations": {
- "kubernetes.io/description": "hostmount-anyuid provides all the features of the restricted SCC but allows host mounts and any UID by a pod. This is primarily used by the persistent volume recycler. WARNING: this SCC allows host file system access as any UID, including UID 0. Grant with caution."
- }
- },
- "priority": null,
- "allowPrivilegedContainer": false,
- "defaultAddCapabilities": null,
- "requiredDropCapabilities": [
- "MKNOD"
- ],
- "allowedCapabilities": null,
- "allowHostDirVolumePlugin": true,
- "volumes": [
- "configMap",
- "downwardAPI",
- "emptyDir",
- "hostPath",
- "nfs",
- "persistentVolumeClaim",
- "projected",
- "secret"
- ],
- "allowedFlexVolumes": null,
- "allowHostNetwork": false,
- "allowHostPorts": false,
- "allowHostPID": false,
- "allowHostIPC": false,
- "seLinuxContext": {
- "type": "MustRunAs"
- },
- "runAsUser": {
- "type": "RunAsAny"
- },
- "supplementalGroups": {
- "type": "RunAsAny"
- },
- "fsGroup": {
- "type": "RunAsAny"
- },
- "readOnlyRootFilesystem": false,
- "users": [
- "system:serviceaccount:openshift-infra:pv-recycler-controller"
- ],
- "groups": []
- },
- {
- "metadata": {
- "name": "hostnetwork",
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostnetwork",
- "uid": "12bb0984-ef00-11e8-b4c0-68f728fac3ab",
- "resourceVersion": "72",
- "creationTimestamp": "2018-11-23T09:13:42Z",
- "annotations": {
- "kubernetes.io/description": "hostnetwork allows using host networking and host ports but still requires pods to be run with a UID and SELinux context that are allocated to the namespace."
- }
- },
- "priority": null,
- "allowPrivilegedContainer": false,
- "defaultAddCapabilities": null,
- "requiredDropCapabilities": [
- "KILL",
- "MKNOD",
- "SETUID",
- "SETGID"
- ],
- "allowedCapabilities": null,
- "allowHostDirVolumePlugin": false,
- "volumes": [
- "configMap",
- "downwardAPI",
- "emptyDir",
- "persistentVolumeClaim",
- "projected",
- "secret"
- ],
- "allowedFlexVolumes": null,
- "allowHostNetwork": true,
- "allowHostPorts": true,
- "allowHostPID": false,
- "allowHostIPC": false,
- "seLinuxContext": {
- "type": "MustRunAs"
- },
- "runAsUser": {
- "type": "MustRunAsRange"
- },
- "supplementalGroups": {
- "type": "MustRunAs"
- },
- "fsGroup": {
- "type": "MustRunAs"
- },
- "readOnlyRootFilesystem": false,
- "users": [],
- "groups": []
- },
- {
- "metadata": {
- "name": "nonroot",
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/nonroot",
- "uid": "12b37c59-ef00-11e8-b4c0-68f728fac3ab",
- "resourceVersion": "67",
- "creationTimestamp": "2018-11-23T09:13:42Z",
- "annotations": {
- "kubernetes.io/description": "nonroot provides all features of the restricted SCC but allows users to run with any non-root UID. The user must specify the UID or it must be specified on the by the manifest of the container runtime."
- }
- },
- "priority": null,
- "allowPrivilegedContainer": false,
- "defaultAddCapabilities": null,
- "requiredDropCapabilities": [
- "KILL",
- "MKNOD",
- "SETUID",
- "SETGID"
- ],
- "allowedCapabilities": null,
- "allowHostDirVolumePlugin": false,
- "volumes": [
- "configMap",
- "downwardAPI",
- "emptyDir",
- "persistentVolumeClaim",
- "projected",
- "secret"
- ],
- "allowedFlexVolumes": null,
- "allowHostNetwork": false,
- "allowHostPorts": false,
- "allowHostPID": false,
- "allowHostIPC": false,
- "seLinuxContext": {
- "type": "MustRunAs"
- },
- "runAsUser": {
- "type": "MustRunAsNonRoot"
- },
- "supplementalGroups": {
- "type": "RunAsAny"
- },
- "fsGroup": {
- "type": "RunAsAny"
- },
- "readOnlyRootFilesystem": false,
- "users": [],
- "groups": []
- },
- {
- "metadata": {
- "name": "privileged",
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/privileged",
- "uid": "12b18f4a-ef00-11e8-b4c0-68f728fac3ab",
- "resourceVersion": "300",
- "creationTimestamp": "2018-11-23T09:13:42Z",
- "annotations": {
- "kubernetes.io/description": "privileged allows access to all privileged and host features and the ability to run as any user, any group, any fsGroup, and with any SELinux context. WARNING: this is the most relaxed SCC and should be used only for cluster administration. Grant with caution."
- }
- },
- "priority": null,
- "allowPrivilegedContainer": true,
- "defaultAddCapabilities": null,
- "requiredDropCapabilities": null,
- "allowedCapabilities": [
- "*"
- ],
- "allowHostDirVolumePlugin": true,
- "volumes": [
- "*"
- ],
- "allowedFlexVolumes": null,
- "allowHostNetwork": true,
- "allowHostPorts": true,
- "allowHostPID": true,
- "allowHostIPC": true,
- "seLinuxContext": {
- "type": "RunAsAny"
- },
- "runAsUser": {
- "type": "RunAsAny"
- },
- "supplementalGroups": {
- "type": "RunAsAny"
- },
- "fsGroup": {
- "type": "RunAsAny"
- },
- "readOnlyRootFilesystem": false,
- "users": [
- "system:admin",
- "system:serviceaccount:openshift-infra:build-controller",
- "system:serviceaccount:default:pvinstaller",
- "system:serviceaccount:default:registry",
- "system:serviceaccount:default:router"
- ],
- "groups": [
- "system:cluster-admins",
- "system:nodes",
- "system:masters"
- ],
- "seccompProfiles": [
- "*"
- ]
- },
- {
- "metadata": {
- "name": "restricted",
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/restricted",
- "uid": "12b9a842-ef00-11e8-b4c0-68f728fac3ab",
- "resourceVersion": "70",
- "creationTimestamp": "2018-11-23T09:13:42Z",
- "annotations": {
- "kubernetes.io/description": "restricted denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace. This is the most restrictive SCC and it is used by default for authenticated users."
- }
- },
- "priority": null,
- "allowPrivilegedContainer": false,
- "defaultAddCapabilities": null,
- "requiredDropCapabilities": [
- "KILL",
- "MKNOD",
- "SETUID",
- "SETGID"
- ],
- "allowedCapabilities": null,
- "allowHostDirVolumePlugin": false,
- "volumes": [
- "configMap",
- "downwardAPI",
- "emptyDir",
- "persistentVolumeClaim",
- "projected",
- "secret"
- ],
- "allowedFlexVolumes": null,
- "allowHostNetwork": false,
- "allowHostPorts": false,
- "allowHostPID": false,
- "allowHostIPC": false,
- "seLinuxContext": {
- "type": "MustRunAs"
- },
- "runAsUser": {
- "type": "MustRunAsRange"
- },
- "supplementalGroups": {
- "type": "RunAsAny"
- },
- "fsGroup": {
- "type": "MustRunAs"
- },
- "readOnlyRootFilesystem": false,
- "users": [],
- "groups": [
- "system:authenticated"
- ]
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/service.json b/vendor/gems/kubeclient/test/json/service.json
deleted file mode 100644
index 6e2e5c79ce1..00000000000
--- a/vendor/gems/kubeclient/test/json/service.json
+++ /dev/null
@@ -1,33 +0,0 @@
-{
- "kind": "Service",
- "apiVersion": "v1",
- "metadata": {
- "name": "redis-slave",
- "namespace": "development",
- "selfLink": "/api/v1/namespaces/development/services/redis-slave",
- "uid": "bdb80a8f-db93-11e4-b293-f8b156af4ae1",
- "resourceVersion": "2815",
- "creationTimestamp": "2015-04-05T13:00:31Z",
- "labels": {
- "name": "redis",
- "role": "slave"
- }
- },
- "spec": {
- "ports": [
- {
- "name": "",
- "protocol": "TCP",
- "port": 6379,
- "targetPort": "redis-server"
- }
- ],
- "selector": {
- "name": "redis",
- "role": "slave"
- },
- "clusterIP": "10.0.0.140",
- "sessionAffinity": "None"
- },
- "status": {}
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/service_account.json b/vendor/gems/kubeclient/test/json/service_account.json
deleted file mode 100644
index 632d429260d..00000000000
--- a/vendor/gems/kubeclient/test/json/service_account.json
+++ /dev/null
@@ -1,25 +0,0 @@
-{
- "kind": "ServiceAccount",
- "apiVersion": "v1",
- "metadata": {
- "name": "default",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/serviceaccounts/default",
- "uid": "d3d773f4-6bf0-11e5-843a-525400f8b93e",
- "resourceVersion": "94",
- "creationTimestamp": "2015-10-06T06:09:39Z"
- },
- "secrets": [
- {
- "name": "default-token-6s23q"
- },
- {
- "name": "default-dockercfg-62tf3"
- }
- ],
- "imagePullSecrets": [
- {
- "name": "default-dockercfg-62tf3"
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/service_account_list.json b/vendor/gems/kubeclient/test/json/service_account_list.json
deleted file mode 100644
index 934e729ed08..00000000000
--- a/vendor/gems/kubeclient/test/json/service_account_list.json
+++ /dev/null
@@ -1,82 +0,0 @@
-{
- "kind": "List",
- "apiVersion": "v1",
- "metadata": {},
- "items": [
- {
- "kind": "ServiceAccount",
- "apiVersion": "v1",
- "metadata": {
- "name": "builder",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/serviceaccounts/builder",
- "uid": "d40655f6-6bf0-11e5-843a-525400f8b93e",
- "resourceVersion": "133",
- "creationTimestamp": "2015-10-06T06:09:39Z"
- },
- "secrets": [
- {
- "name": "builder-token-5v6z2"
- },
- {
- "name": "builder-dockercfg-qe2re"
- }
- ],
- "imagePullSecrets": [
- {
- "name": "builder-dockercfg-qe2re"
- }
- ]
- },
- {
- "kind": "ServiceAccount",
- "apiVersion": "v1",
- "metadata": {
- "name": "default",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/serviceaccounts/default",
- "uid": "d3d773f4-6bf0-11e5-843a-525400f8b93e",
- "resourceVersion": "94",
- "creationTimestamp": "2015-10-06T06:09:39Z"
- },
- "secrets": [
- {
- "name": "default-token-6s23q"
- },
- {
- "name": "default-dockercfg-62tf3"
- }
- ],
- "imagePullSecrets": [
- {
- "name": "default-dockercfg-62tf3"
- }
- ]
- },
- {
- "kind": "ServiceAccount",
- "apiVersion": "v1",
- "metadata": {
- "name": "deployer",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/serviceaccounts/deployer",
- "uid": "d41d385e-6bf0-11e5-843a-525400f8b93e",
- "resourceVersion": "137",
- "creationTimestamp": "2015-10-06T06:09:39Z"
- },
- "secrets": [
- {
- "name": "deployer-token-h3i57"
- },
- {
- "name": "deployer-dockercfg-qgjjj"
- }
- ],
- "imagePullSecrets": [
- {
- "name": "deployer-dockercfg-qgjjj"
- }
- ]
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/service_illegal_json_404.json b/vendor/gems/kubeclient/test/json/service_illegal_json_404.json
deleted file mode 100644
index faa82b3aa87..00000000000
--- a/vendor/gems/kubeclient/test/json/service_illegal_json_404.json
+++ /dev/null
@@ -1 +0,0 @@
-404: Page Not Found \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/service_json_patch.json b/vendor/gems/kubeclient/test/json/service_json_patch.json
deleted file mode 100644
index f960242ba4d..00000000000
--- a/vendor/gems/kubeclient/test/json/service_json_patch.json
+++ /dev/null
@@ -1,26 +0,0 @@
-{
- "status" : {},
- "kind" : "Service",
- "apiVersion" : "v1",
- "spec" : {
- "ports" : [
- {
- "targetPort" : 80,
- "nodePort" : 0,
- "port" : 80,
- "protocol" : "TCP"
- }
- ],
- "clusterIP" : "1.2.3.4",
- "type": "LoadBalancer"
- },
- "metadata" : {
- "name" : "my-service",
- "creationTimestamp" : null,
- "namespace" : "development",
- "resourceVersion" : "2",
- "annotations" : {
- "key" : "value"
- }
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/service_list.json b/vendor/gems/kubeclient/test/json/service_list.json
deleted file mode 100644
index f0f97a12c4e..00000000000
--- a/vendor/gems/kubeclient/test/json/service_list.json
+++ /dev/null
@@ -1,97 +0,0 @@
-{
- "kind": "ServiceList",
- "apiVersion": "v1",
- "metadata": {
- "selfLink": "/api/v1/services",
- "resourceVersion": "36727"
- },
- "items": [
- {
- "metadata": {
- "name": "kubernetes",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/services/kubernetes",
- "uid": "b6606490-db86-11e4-b293-f8b156af4ae1",
- "resourceVersion": "6",
- "creationTimestamp": "2015-04-05T11:27:15Z",
- "labels": {
- "component": "apiserver",
- "provider": "kubernetes"
- }
- },
- "spec": {
- "ports": [
- {
- "name": "",
- "protocol": "TCP",
- "port": 443,
- "targetPort": 443
- }
- ],
- "selector": null,
- "clusterIP": "10.0.0.2",
- "sessionAffinity": "None"
- },
- "status": {}
- },
- {
- "metadata": {
- "name": "kubernetes-ro",
- "namespace": "default",
- "selfLink": "/api/v1/namespaces/default/services/kubernetes-ro",
- "uid": "b6606694-db86-11e4-b293-f8b156af4ae1",
- "resourceVersion": "5",
- "creationTimestamp": "2015-04-05T11:27:15Z",
- "labels": {
- "component": "apiserver",
- "provider": "kubernetes"
- }
- },
- "spec": {
- "ports": [
- {
- "name": "",
- "protocol": "TCP",
- "port": 80,
- "targetPort": 80
- }
- ],
- "selector": null,
- "clusterIP": "10.0.0.1",
- "sessionAffinity": "None"
- },
- "status": {}
- },
- {
- "metadata": {
- "name": "redis-slave",
- "namespace": "development",
- "selfLink": "/api/v1/namespaces/development/services/redis-slave",
- "uid": "bdb80a8f-db93-11e4-b293-f8b156af4ae1",
- "resourceVersion": "2815",
- "creationTimestamp": "2015-04-05T13:00:31Z",
- "labels": {
- "name": "redis",
- "role": "slave"
- }
- },
- "spec": {
- "ports": [
- {
- "name": "",
- "protocol": "TCP",
- "port": 6379,
- "targetPort": "redis-server"
- }
- ],
- "selector": {
- "name": "redis",
- "role": "slave"
- },
- "clusterIP": "10.0.0.140",
- "sessionAffinity": "None"
- },
- "status": {}
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/service_merge_patch.json b/vendor/gems/kubeclient/test/json/service_merge_patch.json
deleted file mode 100644
index 5a9cf7dd384..00000000000
--- a/vendor/gems/kubeclient/test/json/service_merge_patch.json
+++ /dev/null
@@ -1,26 +0,0 @@
-{
- "status" : {},
- "kind" : "Service",
- "apiVersion" : "v1",
- "spec" : {
- "ports" : [
- {
- "targetPort" : 80,
- "nodePort" : 0,
- "port" : 80,
- "protocol" : "TCP"
- }
- ],
- "clusterIP" : "1.2.3.4",
- "type": "NodePort"
- },
- "metadata" : {
- "name" : "my-service",
- "creationTimestamp" : null,
- "namespace" : "development",
- "resourceVersion" : "2",
- "annotations" : {
- "key" : "value"
- }
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/service_patch.json b/vendor/gems/kubeclient/test/json/service_patch.json
deleted file mode 100644
index d6c9c29e691..00000000000
--- a/vendor/gems/kubeclient/test/json/service_patch.json
+++ /dev/null
@@ -1,25 +0,0 @@
-{
- "status" : {},
- "kind" : "Service",
- "apiVersion" : "v1",
- "spec" : {
- "ports" : [
- {
- "targetPort" : 80,
- "nodePort" : 0,
- "port" : 80,
- "protocol" : "TCP"
- }
- ],
- "clusterIP" : "1.2.3.4"
- },
- "metadata" : {
- "name" : "my_service",
- "creationTimestamp" : null,
- "namespace" : "development",
- "resourceVersion" : "2",
- "annotations" : {
- "key" : "value"
- }
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/service_update.json b/vendor/gems/kubeclient/test/json/service_update.json
deleted file mode 100644
index 1053d750e60..00000000000
--- a/vendor/gems/kubeclient/test/json/service_update.json
+++ /dev/null
@@ -1,22 +0,0 @@
-{
- "status" : {},
- "kind" : "Service",
- "apiVersion" : "v1",
- "spec" : {
- "ports" : [
- {
- "targetPort" : 80,
- "nodePort" : 0,
- "port" : 80,
- "protocol" : "TCP"
- }
- ],
- "clusterIP" : "1.2.3.4"
- },
- "metadata" : {
- "name" : "my_service",
- "creationTimestamp" : null,
- "namespace" : "default",
- "resourceVersion" : "2"
- }
-}
diff --git a/vendor/gems/kubeclient/test/json/template.json b/vendor/gems/kubeclient/test/json/template.json
deleted file mode 100644
index 85d8bad748e..00000000000
--- a/vendor/gems/kubeclient/test/json/template.json
+++ /dev/null
@@ -1,27 +0,0 @@
-{
- "apiVersion": "template.openshift.io/v1",
- "kind": "Template",
- "metadata": {
- "creationTimestamp": "2018-12-17T16:11:36Z",
- "name": "my-template",
- "namespace": "default",
- "resourceVersion": "21954",
- "selfLink": "/apis/template.openshift.io/v1/namespaces/default/templates/my-template",
- "uid": "6e03e3e6-0216-11e9-b1e0-68f728fac3ab"
- },
- "objects": [
- {
- "apiVersion": "v1",
- "kind": "Service",
- "metadata": {
- "name": "${NAME_PREFIX}my-service"
- }
- }
- ],
- "parameters": [
- {
- "description": "Prefix for names",
- "name": "NAME_PREFIX"
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/template.openshift.io_api_resource_list.json b/vendor/gems/kubeclient/test/json/template.openshift.io_api_resource_list.json
deleted file mode 100644
index 1ba147f795d..00000000000
--- a/vendor/gems/kubeclient/test/json/template.openshift.io_api_resource_list.json
+++ /dev/null
@@ -1,75 +0,0 @@
-{
- "kind": "APIResourceList",
- "apiVersion": "v1",
- "groupVersion": "template.openshift.io/v1",
- "resources": [
- {
- "name": "brokertemplateinstances",
- "singularName": "",
- "namespaced": false,
- "kind": "BrokerTemplateInstance",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ]
- },
- {
- "name": "processedtemplates",
- "singularName": "",
- "namespaced": true,
- "kind": "Template",
- "verbs": [
- "create"
- ]
- },
- {
- "name": "templateinstances",
- "singularName": "",
- "namespaced": true,
- "kind": "TemplateInstance",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ]
- },
- {
- "name": "templateinstances/status",
- "singularName": "",
- "namespaced": true,
- "kind": "TemplateInstance",
- "verbs": [
- "get",
- "patch",
- "update"
- ]
- },
- {
- "name": "templates",
- "singularName": "",
- "namespaced": true,
- "kind": "Template",
- "verbs": [
- "create",
- "delete",
- "deletecollection",
- "get",
- "list",
- "patch",
- "update",
- "watch"
- ]
- }
- ]
-} \ No newline at end of file
diff --git a/vendor/gems/kubeclient/test/json/template_list.json b/vendor/gems/kubeclient/test/json/template_list.json
deleted file mode 100644
index a0f84ad3e01..00000000000
--- a/vendor/gems/kubeclient/test/json/template_list.json
+++ /dev/null
@@ -1,35 +0,0 @@
-{
- "kind": "TemplateList",
- "apiVersion": "template.openshift.io/v1",
- "metadata": {
- "selfLink": "/apis/template.openshift.io/v1/namespaces/default/templates",
- "resourceVersion": "22758"
- },
- "items": [
- {
- "metadata": {
- "name": "my-template",
- "namespace": "default",
- "selfLink": "/apis/template.openshift.io/v1/namespaces/default/templates/my-template",
- "uid": "6e03e3e6-0216-11e9-b1e0-68f728fac3ab",
- "resourceVersion": "21954",
- "creationTimestamp": "2018-12-17T16:11:36Z"
- },
- "objects": [
- {
- "apiVersion": "v1",
- "kind": "Service",
- "metadata": {
- "name": "${NAME_PREFIX}my-service"
- }
- }
- ],
- "parameters": [
- {
- "name": "NAME_PREFIX",
- "description": "Prefix for names"
- }
- ]
- }
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/versions_list.json b/vendor/gems/kubeclient/test/json/versions_list.json
deleted file mode 100644
index 372e101b6ab..00000000000
--- a/vendor/gems/kubeclient/test/json/versions_list.json
+++ /dev/null
@@ -1,6 +0,0 @@
-{
- "versions": [
- "v1beta3",
- "v1"
- ]
-}
diff --git a/vendor/gems/kubeclient/test/json/watch_stream.json b/vendor/gems/kubeclient/test/json/watch_stream.json
deleted file mode 100644
index aa8f03dd078..00000000000
--- a/vendor/gems/kubeclient/test/json/watch_stream.json
+++ /dev/null
@@ -1,3 +0,0 @@
-{"type":"ADDED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"php","namespace":"default","selfLink":"/api/v1/pods/php","uid":"e75f2c07-b047-11e4-89e4-525400c903c1","resourceVersion":"1389","creationTimestamp":"2015-02-09T05:39:19-05:00","labels":{"name":"foo"}},"spec":{"volumes":null,"containers":[{"name":"nginx","image":"dockerfile/nginx","ports":[{"hostPort":9090,"containerPort":80,"protocol":"TCP"}],"resources":{},"livenessProbe":{"httpGet":{"path":"/index.html","port":"9090"},"initialDelaySeconds":30},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{}}}],"restartPolicy":{"always":{}},"dnsPolicy":"ClusterFirst"},"status":{"phase":"Pending"}}}
-{"type":"MODIFIED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"php","namespace":"default","selfLink":"/api/v1/pods/php","uid":"e75f2c07-b047-11e4-89e4-525400c903c1","resourceVersion":"1390","creationTimestamp":"2015-02-09T05:39:19-05:00","labels":{"name":"foo"}},"spec":{"volumes":null,"containers":[{"name":"nginx","image":"dockerfile/nginx","ports":[{"hostPort":9090,"containerPort":80,"protocol":"TCP"}],"resources":{},"livenessProbe":{"httpGet":{"path":"/index.html","port":"9090"},"initialDelaySeconds":30},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{}}}],"restartPolicy":{"always":{}},"dnsPolicy":"ClusterFirst"},"status":{"phase":"Pending","host":"127.0.0.1"}}}
-{"type":"DELETED","object":{"kind":"Pod","apiVersion":"v1","metadata":{"name":"php","namespace":"default","selfLink":"/api/v1/pods/php","uid":"e75f2c07-b047-11e4-89e4-525400c903c1","resourceVersion":"1398","creationTimestamp":"2015-02-09T05:39:19-05:00","labels":{"name":"foo"}},"spec":{"volumes":null,"containers":[{"name":"nginx","image":"dockerfile/nginx","ports":[{"hostPort":9090,"containerPort":80,"protocol":"TCP"}],"resources":{},"livenessProbe":{"httpGet":{"path":"/index.html","port":"9090"},"initialDelaySeconds":30},"terminationMessagePath":"/dev/termination-log","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{}}}],"restartPolicy":{"always":{}},"dnsPolicy":"ClusterFirst"},"status":{"phase":"Pending","host":"127.0.0.1"}}}
diff --git a/vendor/gems/kubeclient/test/test_common.rb b/vendor/gems/kubeclient/test/test_common.rb
deleted file mode 100644
index 32bf826085d..00000000000
--- a/vendor/gems/kubeclient/test/test_common.rb
+++ /dev/null
@@ -1,95 +0,0 @@
-
-require_relative 'test_helper'
-
-# Unit tests for the common module
-class CommonTest < MiniTest::Test
- class ClientStub
- include Kubeclient::ClientMixin
- end
-
- def client
- @client ||= ClientStub.new
- end
-
- def test_underscore_entity
- %w[
- Pod pod
- Service service
- ReplicationController replication_controller
- Node node
- Event event
- Endpoint endpoint
- Namespace namespace
- Secret secret
- ResourceQuota resource_quota
- LimitRange limit_range
- PersistentVolume persistent_volume
- PersistentVolumeClaim persistent_volume_claim
- ComponentStatus component_status
- ServiceAccount service_account
- Project project
- Route route
- ClusterRoleBinding cluster_role_binding
- Build build
- BuildConfig build_config
- Image image
- ImageStream image_stream
- dogstatsd dogstatsd
- lowerCamelUPPERCase lower_camel_uppercase
- HTTPAPISpecBinding httpapispec_binding
- APIGroup apigroup
- APIGroupList apigroup_list
- APIResourceList apiresource_list
- APIService apiservice
- APIServiceList apiservice_list
- APIVersions apiversions
- OAuthAccessToken oauth_access_token
- OAuthAccessTokenList oauth_access_token_list
- OAuthAuthorizeToken oauth_authorize_token
- OAuthAuthorizeTokenList oauth_authorize_token_list
- OAuthClient oauth_client
- OAuthClientAuthorization oauth_client_authorization
- OAuthClientAuthorizationList oauth_client_authorization_list
- OAuthClientList oauth_client_list
- ].each_slice(2) do |kind, expected_underscore|
- underscore = Kubeclient::ClientMixin.underscore_entity(kind)
- assert_equal(underscore, expected_underscore)
- end
- end
-
- def test_format_datetime_with_string
- value = '2018-04-27T18:30:17.480321984Z'
- formatted = client.send(:format_datetime, value)
- assert_equal(formatted, value)
- end
-
- def test_format_datetime_with_datetime
- value = DateTime.new(2018, 4, 30, 19, 20, 33)
- formatted = client.send(:format_datetime, value)
- assert_equal(formatted, '2018-04-30T19:20:33.000000000+00:00')
- end
-
- def test_format_datetime_with_time
- value = Time.new(2018, 4, 30, 19, 20, 33, 0)
- formatted = client.send(:format_datetime, value)
- assert_equal(formatted, '2018-04-30T19:20:33.000000000+00:00')
- end
-
- def test_parse_definition_with_unconventional_names
- %w[
- PluralPolicy pluralpolicies plural_policy plural_policies
- LatinDatum latindata latin_datum latin_data
- Noseparator noseparators noseparator noseparators
- lowercase lowercases lowercase lowercases
- TestWithDash test-with-dashes test_with_dash test_with_dashes
- TestUnderscore test_underscores test_underscore test_underscores
- TestMismatch other-odd-name testmismatch otheroddname
- MixedDashMinus mixed-dash_minuses mixed_dash_minus mixed_dash_minuses
- SameUptoWordboundary sameup-toword-boundarys sameuptowordboundary sameuptowordboundarys
- ].each_slice(4) do |kind, plural, expected_single, expected_plural|
- method_names = Kubeclient::ClientMixin.parse_definition(kind, plural).method_names
- assert_equal(method_names[0], expected_single)
- assert_equal(method_names[1], expected_plural)
- end
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_common_url_handling.rb b/vendor/gems/kubeclient/test/test_common_url_handling.rb
deleted file mode 100644
index e7798c2f489..00000000000
--- a/vendor/gems/kubeclient/test/test_common_url_handling.rb
+++ /dev/null
@@ -1,160 +0,0 @@
-require_relative 'test_helper'
-
-# URLHandling tests
-class TestCommonUrlHandling < MiniTest::Test
- def test_no_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s)
- end
-
- def test_with_api_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080/api', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s)
- end
-
- def test_with_api_path_in_uri_other_version
- client = Kubeclient::Client.new('http://localhost:8080/api', 'v2')
- rest_client = client.rest_client
- assert_equal('v2', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/api/v2', rest_client.url.to_s)
- end
-
- def test_with_api_group_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080/apis/this_is_the_group', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('this_is_the_group/', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/apis/this_is_the_group/v1', rest_client.url.to_s)
- end
-
- def test_with_api_group_path_in_uri_other_version
- client = Kubeclient::Client.new('http://localhost:8080/apis/this_is_the_group', 'v2')
- rest_client = client.rest_client
- assert_equal('v2', client.instance_variable_get(:@api_version))
- assert_equal('this_is_the_group/', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/apis/this_is_the_group/v2', rest_client.url.to_s)
- end
-
- def test_with_api_path_in_uri_trailing_slash
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s)
- end
-
- def test_with_api_path_in_api
- client = Kubeclient::Client.new('http://localhost:8080/api/but/I/want/a/hidden/k8s/api', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/api/but/I/want/a/hidden/k8s/api/v1', rest_client.url.to_s)
- end
-
- def test_with_api_group_path_in_api
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/but/I/want/a/hidden/k8s/apis/this_is_the_group',
- 'v1'
- )
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('this_is_the_group/', client.instance_variable_get(:@api_group))
- assert_equal(
- 'http://localhost:8080/api/but/I/want/a/hidden/k8s/apis/this_is_the_group/v1',
- rest_client.url.to_s
- )
- end
-
- def test_rancher_with_api_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080/k8s/clusters/c-somerancherID/api', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/k8s/clusters/c-somerancherID/api/v1', rest_client.url.to_s)
- end
-
- def test_rancher_no_api_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080/k8s/clusters/c-somerancherID', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/k8s/clusters/c-somerancherID/api/v1', rest_client.url.to_s)
- end
-
- def test_rancher_no_api_path_in_uri_trailing_slash
- client = Kubeclient::Client.new('http://localhost:8080/k8s/clusters/c-somerancherID/', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/k8s/clusters/c-somerancherID/api/v1', rest_client.url.to_s)
- end
-
- def test_rancher_with_api_path_in_uri_trailing_slash
- client = Kubeclient::Client.new('http://localhost:8080/k8s/clusters/c-somerancherID/api/', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/k8s/clusters/c-somerancherID/api/v1', rest_client.url.to_s)
- end
-
- def test_rancher_with_api_group_in_uri_trailing_slash
- client = Kubeclient::Client.new(
- 'http://localhost:8080/k8s/clusters/c-somerancherID/apis/this_is_the_group',
- 'v1'
- )
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('this_is_the_group/', client.instance_variable_get(:@api_group))
- assert_equal(
- 'http://localhost:8080/k8s/clusters/c-somerancherID/apis/this_is_the_group/v1',
- rest_client.url.to_s
- )
- end
-
- def test_with_openshift_api_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080/oapi', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/oapi/v1', rest_client.url.to_s)
- end
-
- def test_arbitrary_path_with_openshift_api_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080/foobarbaz/oapi', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/foobarbaz/oapi/v1', rest_client.url.to_s)
- end
-
- def test_with_openshift_api_path_in_uri_trailing_slash
- client = Kubeclient::Client.new('http://localhost:8080/oapi/', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/oapi/v1', rest_client.url.to_s)
- end
-
- def test_with_arbitrary_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080/foobarbaz', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/foobarbaz/api/v1', rest_client.url.to_s)
- end
-
- def test_with_arbitrary_and_api_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080/foobarbaz/api', 'v1')
- rest_client = client.rest_client
- assert_equal('v1', client.instance_variable_get(:@api_version))
- assert_equal('', client.instance_variable_get(:@api_group))
- assert_equal('http://localhost:8080/foobarbaz/api/v1', rest_client.url.to_s)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_component_status.rb b/vendor/gems/kubeclient/test/test_component_status.rb
deleted file mode 100644
index 7bb4ca1ad51..00000000000
--- a/vendor/gems/kubeclient/test/test_component_status.rb
+++ /dev/null
@@ -1,29 +0,0 @@
-require_relative 'test_helper'
-
-# ComponentStatus tests
-class TestComponentStatus < MiniTest::Test
- def test_get_from_json_v3
- stub_core_api_list
- stub_request(:get, %r{/componentstatuses})
- .to_return(body: open_test_file('component_status.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- component_status = client.get_component_status('etcd-0', 'default')
-
- assert_instance_of(Kubeclient::Resource, component_status)
- assert_equal('etcd-0', component_status.metadata.name)
- assert_equal('Healthy', component_status.conditions[0].type)
- assert_equal('True', component_status.conditions[0].status)
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1',
- times: 1
- )
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/namespaces/default/componentstatuses/etcd-0',
- times: 1
- )
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_config.rb b/vendor/gems/kubeclient/test/test_config.rb
deleted file mode 100644
index d47827e0393..00000000000
--- a/vendor/gems/kubeclient/test/test_config.rb
+++ /dev/null
@@ -1,271 +0,0 @@
-require_relative 'test_helper'
-require 'yaml'
-require 'open3'
-
-# Testing Kubernetes client configuration
-class KubeclientConfigTest < MiniTest::Test
- def test_allinone
- config = Kubeclient::Config.read(config_file('allinone.kubeconfig'))
- assert_equal(['Default'], config.contexts)
- check_context(config.context, ssl: true, custom_ca: true, client_cert: true)
- end
-
- def test_external
- config = Kubeclient::Config.read(config_file('external.kubeconfig'))
- assert_equal(['Default'], config.contexts)
- check_context(config.context, ssl: true, custom_ca: true, client_cert: true)
- end
-
- def test_explicit_secure
- config = Kubeclient::Config.read(config_file('secure.kubeconfig'))
- assert_equal(['Default'], config.contexts)
- # Same as external.kubeconfig, but with explicit `insecure-skip-tls-verify: false`
- check_context(config.context, ssl: true, custom_ca: true, client_cert: true)
- end
-
- def test_external_public_ca
- config = Kubeclient::Config.read(config_file('external-without-ca.kubeconfig'))
- assert_equal(['Default'], config.contexts)
- # Same as external.kubeconfig, no custom CA data (cluster has a publicly trusted cert)
- check_context(config.context, ssl: true, custom_ca: false, client_cert: true)
- end
-
- def test_secure_public_ca
- config = Kubeclient::Config.read(config_file('secure-without-ca.kubeconfig'))
- assert_equal(['Default'], config.contexts)
- # no custom CA data + explicit `insecure-skip-tls-verify: false`
- check_context(config.context, ssl: true, custom_ca: false, client_cert: true)
- end
-
- def test_insecure
- config = Kubeclient::Config.read(config_file('insecure.kubeconfig'))
- assert_equal(['Default'], config.contexts)
- # Has explicit `insecure-skip-tls-verify: false`
- check_context(config.context, ssl: false, custom_ca: false, client_cert: true)
- end
-
- def test_insecure_custom_ca
- config = Kubeclient::Config.read(config_file('insecure-custom-ca.kubeconfig'))
- assert_equal(['Default'], config.contexts)
- # Has explicit `insecure-skip-tls-verify: false`
- check_context(config.context, ssl: false, custom_ca: true, client_cert: true)
- end
-
- def test_allinone_nopath
- yaml = File.read(config_file('allinone.kubeconfig'))
- # A self-contained config shouldn't depend on kcfg_path.
- config = Kubeclient::Config.new(YAML.safe_load(yaml), nil)
- assert_equal(['Default'], config.contexts)
- check_context(config.context, ssl: true, custom_ca: true, client_cert: true)
- end
-
- def test_external_nopath
- yaml = File.read(config_file('external.kubeconfig'))
- # kcfg_path = nil should prevent file access
- config = Kubeclient::Config.new(YAML.safe_load(yaml), nil)
- assert_raises(StandardError) do
- config.context
- end
- end
-
- def test_external_nopath_absolute
- yaml = File.read(config_file('external.kubeconfig'))
- # kcfg_path = nil should prevent file access, even if absolute path specified
- ca_absolute_path = File.absolute_path(config_file('external-'))
- yaml = yaml.gsub('external-', ca_absolute_path)
- config = Kubeclient::Config.new(YAML.safe_load(yaml), nil)
- assert_raises(StandardError) do
- config.context
- end
- end
-
- def test_concatenated_ca
- config = Kubeclient::Config.read(config_file('concatenated-ca.kubeconfig'))
- assert_equal(['Default'], config.contexts)
- check_context(config.context, ssl: true)
- end
-
- def test_nouser
- config = Kubeclient::Config.read(config_file('nouser.kubeconfig'))
- assert_equal(['default/localhost:6443/nouser'], config.contexts)
- check_context(config.context, ssl: true, custom_ca: false, client_cert: false)
- end
-
- def test_user_token
- config = Kubeclient::Config.read(config_file('userauth.kubeconfig'))
- assert_equal(['localhost/system:admin:token', 'localhost/system:admin:userpass'],
- config.contexts)
- context = config.context('localhost/system:admin:token')
- check_context(context, ssl: true, custom_ca: false, client_cert: false)
- assert_equal('0123456789ABCDEF0123456789ABCDEF', context.auth_options[:bearer_token])
- end
-
- def test_user_password
- config = Kubeclient::Config.read(config_file('userauth.kubeconfig'))
- assert_equal(['localhost/system:admin:token', 'localhost/system:admin:userpass'],
- config.contexts)
- context = config.context('localhost/system:admin:userpass')
- check_context(context, ssl: true, custom_ca: false, client_cert: false)
- assert_equal('admin', context.auth_options[:username])
- assert_equal('pAssw0rd123', context.auth_options[:password])
- end
-
- def test_timestamps
- # Test YAML parsing doesn't crash on YAML timestamp syntax.
- Kubeclient::Config.read(config_file('timestamps.kubeconfig'))
- end
-
- def test_user_exec
- token = '0123456789ABCDEF0123456789ABCDEF'
- creds = {
- 'apiVersion': 'client.authentication.k8s.io/v1beta1',
- 'status': {
- 'token': token
- }
- }
-
- config = Kubeclient::Config.read(config_file('execauth.kubeconfig'))
- assert_equal(['localhost/system:admin:exec-search-path',
- 'localhost/system:admin:exec-relative-path',
- 'localhost/system:admin:exec-absolute-path'],
- config.contexts)
-
- # A bare command name in config means search PATH, so it's executed as bare command.
- stub_exec(%r{^example-exec-plugin$}, creds) do
- context = config.context('localhost/system:admin:exec-search-path')
- check_context(context, ssl: true, custom_ca: false, client_cert: false)
- assert_equal(token, context.auth_options[:bearer_token])
- end
-
- # A relative path is taken relative to the dir of the kubeconfig.
- stub_exec(%r{.*config/dir/example-exec-plugin$}, creds) do
- context = config.context('localhost/system:admin:exec-relative-path')
- check_context(context, ssl: true, custom_ca: false, client_cert: false)
- assert_equal(token, context.auth_options[:bearer_token])
- end
-
- # An absolute path is taken as-is.
- stub_exec(%r{^/abs/path/example-exec-plugin$}, creds) do
- context = config.context('localhost/system:admin:exec-absolute-path')
- check_context(context, ssl: true, custom_ca: false, client_cert: false)
- assert_equal(token, context.auth_options[:bearer_token])
- end
- end
-
- def test_user_exec_nopath
- yaml = File.read(config_file('execauth.kubeconfig'))
- config = Kubeclient::Config.new(YAML.safe_load(yaml), nil)
- config.contexts.each do |context_name|
- Open3.stub(:capture3, proc { flunk 'should not execute command' }) do
- assert_raises(StandardError) do
- config.context(context_name)
- end
- end
- end
- end
-
- def test_gcp_default_auth
- Kubeclient::GoogleApplicationDefaultCredentials.expects(:token).returns('token1').once
- parsed = load_yaml(config_file('gcpauth.kubeconfig'))
- config = Kubeclient::Config.new(parsed, nil)
- config.context(config.contexts.first)
- end
-
- # Each call to .context() obtains a new token, calling .auth_options doesn't change anything.
- # NOTE: this is not a guarantee, may change, just testing current behavior.
- def test_gcp_default_auth_renew
- Kubeclient::GoogleApplicationDefaultCredentials.expects(:token).returns('token1').once
- parsed = load_yaml(config_file('gcpauth.kubeconfig'))
- config = Kubeclient::Config.new(parsed, nil)
- context = config.context(config.contexts.first)
- assert_equal({ bearer_token: 'token1' }, context.auth_options)
- assert_equal({ bearer_token: 'token1' }, context.auth_options)
-
- Kubeclient::GoogleApplicationDefaultCredentials.expects(:token).returns('token2').once
- context2 = config.context(config.contexts.first)
- assert_equal({ bearer_token: 'token2' }, context2.auth_options)
- assert_equal({ bearer_token: 'token1' }, context.auth_options)
- end
-
- def test_gcp_command_auth
- Kubeclient::GCPCommandCredentials.expects(:token)
- .with('access-token' => '<fake_token>',
- 'cmd-args' => 'config config-helper --format=json',
- 'cmd-path' => '/path/to/gcloud',
- 'expiry' => '2019-04-09 19:26:18 UTC',
- 'expiry-key' => '{.credential.token_expiry}',
- 'token-key' => '{.credential.access_token}')
- .returns('token1')
- .once
- config = Kubeclient::Config.read(config_file('gcpcmdauth.kubeconfig'))
- config.context(config.contexts.first)
- end
-
- def test_oidc_auth_provider
- Kubeclient::OIDCAuthProvider.expects(:token)
- .with('client-id' => 'fake-client-id',
- 'client-secret' => 'fake-client-secret',
- 'id-token' => 'fake-id-token',
- 'idp-issuer-url' => 'https://accounts.google.com',
- 'refresh-token' => 'fake-refresh-token')
- .returns('token1')
- .once
- parsed = YAML.safe_load(File.read(config_file('oidcauth.kubeconfig')))
- config = Kubeclient::Config.new(parsed, nil)
- config.context(config.contexts.first)
- end
-
- private
-
- def check_context(context, ssl: true, custom_ca: true, client_cert: true)
- assert_equal('https://localhost:6443', context.api_endpoint)
- assert_equal('v1', context.api_version)
- assert_equal('default', context.namespace)
- if custom_ca
- assert_kind_of(OpenSSL::X509::Store, context.ssl_options[:cert_store])
- else
- assert_nil(context.ssl_options[:cert_store])
- end
- if client_cert
- assert_kind_of(OpenSSL::X509::Certificate, context.ssl_options[:client_cert])
- assert_kind_of(OpenSSL::PKey::RSA, context.ssl_options[:client_key])
- if custom_ca
- # When certificates expire one way to recreate them is using a k0s single-node cluster:
- # test/config/update_certs_k0s.rb
- assert(context.ssl_options[:cert_store].verify(context.ssl_options[:client_cert]))
- end
- else
- assert_nil(context.ssl_options[:client_cert])
- assert_nil(context.ssl_options[:client_key])
- end
- if ssl
- assert_equal(OpenSSL::SSL::VERIFY_PEER, context.ssl_options[:verify_ssl],
- 'expected VERIFY_PEER')
- else
- assert_equal(OpenSSL::SSL::VERIFY_NONE, context.ssl_options[:verify_ssl],
- 'expected VERIFY_NONE')
- end
- end
-
- def stub_exec(command_regexp, creds)
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- capture3_stub = lambda do |_env, command, *_args|
- assert_match command_regexp, command
- [JSON.dump(creds), nil, st]
- end
-
- Open3.stub(:capture3, capture3_stub) do
- yield
- end
- end
-
- def load_yaml(file_name)
- if RUBY_VERSION >= '2.6'
- YAML.safe_load(File.read(file_name), permitted_classes: [Date, Time])
- else
- YAML.safe_load(File.read(file_name), [Date, Time])
- end
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_endpoint.rb b/vendor/gems/kubeclient/test/test_endpoint.rb
deleted file mode 100644
index ec2cd9306d4..00000000000
--- a/vendor/gems/kubeclient/test/test_endpoint.rb
+++ /dev/null
@@ -1,54 +0,0 @@
-require_relative 'test_helper'
-
-# kind: 'Endpoints' entity tests.
-# This is one of the unusual `kind`s that are already plural (https://github.com/kubernetes/kubernetes/issues/8115).
-# We force singular in method names like 'create_endpoint',
-# but `kind` should remain plural as in kubernetes.
-class TestEndpoint < MiniTest::Test
- def test_create_endpoint
- stub_core_api_list
- testing_ep = Kubeclient::Resource.new
- testing_ep.metadata = {}
- testing_ep.metadata.name = 'myendpoint'
- testing_ep.metadata.namespace = 'default'
- testing_ep.subsets = [
- {
- 'addresses' => [{ 'ip' => '172.17.0.25' }],
- 'ports' => [{ 'name' => 'https', 'port' => 6443, 'protocol' => 'TCP' }]
- }
- ]
-
- req_body = '{"metadata":{"name":"myendpoint","namespace":"default"},' \
- '"subsets":[{"addresses":[{"ip":"172.17.0.25"}],"ports":[{"name":"https",' \
- '"port":6443,"protocol":"TCP"}]}],"kind":"Endpoints","apiVersion":"v1"}'
-
- stub_request(:post, 'http://localhost:8080/api/v1/namespaces/default/endpoints')
- .with(body: req_body)
- .to_return(body: open_test_file('created_endpoint.json'), status: 201)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- created_ep = client.create_endpoint(testing_ep)
- assert_equal('Endpoints', created_ep.kind)
- assert_equal('v1', created_ep.apiVersion)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1', as: :parsed_symbolized)
- created_ep = client.create_endpoint(testing_ep)
- assert_equal('Endpoints', created_ep[:kind])
- assert_equal('v1', created_ep[:apiVersion])
- end
-
- def test_get_endpoints
- stub_core_api_list
- stub_request(:get, %r{/endpoints})
- .to_return(body: open_test_file('endpoint_list.json'), status: 200)
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
-
- collection = client.get_endpoints(as: :parsed_symbolized)
- assert_equal('EndpointsList', collection[:kind])
- assert_equal('v1', collection[:apiVersion])
-
- # Stripping of 'List' in collection.kind RecursiveOpenStruct mode only is historic.
- collection = client.get_endpoints
- assert_equal('Endpoints', collection.kind)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_exec_credentials.rb b/vendor/gems/kubeclient/test/test_exec_credentials.rb
deleted file mode 100644
index f0e51827f55..00000000000
--- a/vendor/gems/kubeclient/test/test_exec_credentials.rb
+++ /dev/null
@@ -1,225 +0,0 @@
-require_relative 'test_helper'
-require 'open3'
-
-# Unit tests for the ExecCredentials provider
-class ExecCredentialsTest < MiniTest::Test
- def test_exec_opts_missing
- expected_msg =
- 'exec options are required'
- exception = assert_raises(ArgumentError) do
- Kubeclient::ExecCredentials.run(nil)
- end
- assert_equal(expected_msg, exception.message)
- end
-
- def test_exec_command_missing
- expected_msg =
- 'exec command is required'
- exception = assert_raises(KeyError) do
- Kubeclient::ExecCredentials.run({})
- end
- assert_equal(expected_msg, exception.message)
- end
-
- def test_exec_command_failure
- err = 'Error'
- expected_msg =
- "exec command failed: #{err}"
-
- st = Minitest::Mock.new
- st.expect(:success?, false)
-
- opts = { 'command' => 'dummy' }
-
- Open3.stub(:capture3, [nil, err, st]) do
- exception = assert_raises(RuntimeError) do
- Kubeclient::ExecCredentials.run(opts)
- end
- assert_equal(expected_msg, exception.message)
- end
- end
-
- def test_run_with_token_credentials
- opts = { 'command' => 'dummy' }
-
- credentials = {
- 'token' => '0123456789ABCDEF0123456789ABCDEF'
- }
-
- creds = JSON.dump(
- 'apiVersion' => 'client.authentication.k8s.io/v1alpha1',
- 'status' => credentials
- )
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- Open3.stub(:capture3, [creds, nil, st]) do
- assert_equal(credentials, Kubeclient::ExecCredentials.run(opts))
- end
- end
-
- def test_run_with_client_credentials
- opts = { 'command' => 'dummy' }
-
- credentials = {
- 'clientCertificateData' => '0123456789ABCDEF0123456789ABCDEF',
- 'clientKeyData' => '0123456789ABCDEF0123456789ABCDEF'
- }
-
- creds = JSON.dump(
- 'apiVersion' => 'client.authentication.k8s.io/v1alpha1',
- 'status' => credentials
- )
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- Open3.stub(:capture3, [creds, nil, st]) do
- assert_equal(credentials, Kubeclient::ExecCredentials.run(opts))
- end
- end
-
- def test_run_with_missing_client_certificate_data
- opts = { 'command' => 'dummy' }
-
- credentials = {
- 'clientKeyData' => '0123456789ABCDEF0123456789ABCDEF'
- }
-
- creds = JSON.dump(
- 'apiVersion' => 'client.authentication.k8s.io/v1alpha1',
- 'status' => credentials
- )
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- expected_msg = 'exec plugin didn\'t return client certificate data'
-
- Open3.stub(:capture3, [creds, nil, st]) do
- exception = assert_raises(RuntimeError) do
- Kubeclient::ExecCredentials.run(opts)
- end
- assert_equal(expected_msg, exception.message)
- end
- end
-
- def test_run_with_missing_client_key_data
- opts = { 'command' => 'dummy' }
-
- credentials = {
- 'clientCertificateData' => '0123456789ABCDEF0123456789ABCDEF'
- }
-
- creds = JSON.dump(
- 'apiVersion' => 'client.authentication.k8s.io/v1alpha1',
- 'status' => credentials
- )
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- expected_msg = 'exec plugin didn\'t return client key data'
-
- Open3.stub(:capture3, [creds, nil, st]) do
- exception = assert_raises(RuntimeError) do
- Kubeclient::ExecCredentials.run(opts)
- end
- assert_equal(expected_msg, exception.message)
- end
- end
-
- def test_run_with_client_data_and_token
- opts = { 'command' => 'dummy' }
-
- credentials = {
- 'clientCertificateData' => '0123456789ABCDEF0123456789ABCDEF',
- 'clientKeyData' => '0123456789ABCDEF0123456789ABCDEF',
- 'token' => '0123456789ABCDEF0123456789ABCDEF'
- }
-
- creds = JSON.dump(
- 'apiVersion' => 'client.authentication.k8s.io/v1alpha1',
- 'status' => credentials
- )
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- expected_msg = 'exec plugin returned both token and client data'
-
- Open3.stub(:capture3, [creds, nil, st]) do
- exception = assert_raises(RuntimeError) do
- Kubeclient::ExecCredentials.run(opts)
- end
- assert_equal(expected_msg, exception.message)
- end
- end
-
- def test_status_missing
- opts = { 'command' => 'dummy' }
-
- creds = JSON.dump('apiVersion' => 'client.authentication.k8s.io/v1alpha1')
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- expected_msg = 'exec plugin didn\'t return a status field'
-
- Open3.stub(:capture3, [creds, nil, st]) do
- exception = assert_raises(RuntimeError) do
- Kubeclient::ExecCredentials.run(opts)
- end
- assert_equal(expected_msg, exception.message)
- end
- end
-
- def test_credentials_missing
- opts = { 'command' => 'dummy' }
-
- creds = JSON.dump(
- 'apiVersion' => 'client.authentication.k8s.io/v1alpha1',
- 'status' => {}
- )
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- expected_msg = 'exec plugin didn\'t return a token or client data'
-
- Open3.stub(:capture3, [creds, nil, st]) do
- exception = assert_raises(RuntimeError) do
- Kubeclient::ExecCredentials.run(opts)
- end
- assert_equal(expected_msg, exception.message)
- end
- end
-
- def test_api_version_mismatch
- api_version = 'client.authentication.k8s.io/v1alpha1'
- expected_version = 'client.authentication.k8s.io/v1beta1'
-
- opts = {
- 'command' => 'dummy',
- 'apiVersion' => expected_version
- }
-
- creds = JSON.dump(
- 'apiVersion' => api_version
- )
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- expected_msg = "exec plugin is configured to use API version #{expected_version}," \
- " plugin returned version #{api_version}"
-
- Open3.stub(:capture3, [creds, nil, st]) do
- exception = assert_raises(RuntimeError) do
- Kubeclient::ExecCredentials.run(opts)
- end
- assert_equal(expected_msg, exception.message)
- end
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_gcp_command_credentials.rb b/vendor/gems/kubeclient/test/test_gcp_command_credentials.rb
deleted file mode 100644
index f95b8fd045e..00000000000
--- a/vendor/gems/kubeclient/test/test_gcp_command_credentials.rb
+++ /dev/null
@@ -1,27 +0,0 @@
-require_relative 'test_helper'
-require 'open3'
-
-# Unit tests for the GCPCommandCredentials token provider
-class GCPCommandCredentialsTest < MiniTest::Test
- def test_token
- opts = { 'cmd-args' => 'config config-helper --format=json',
- 'cmd-path' => '/path/to/gcloud',
- 'expiry-key' => '{.credential.token_expiry}',
- 'token-key' => '{.credential.access_token}' }
-
- creds = JSON.dump(
- 'credential' => {
- 'access_token' => '9A3A941836F2458175BE18AA1971EBBF47949B07',
- 'token_expiry' => '2019-04-12T15:02:51Z'
- }
- )
-
- st = Minitest::Mock.new
- st.expect(:success?, true)
-
- Open3.stub(:capture3, [creds, nil, st]) do
- assert_equal('9A3A941836F2458175BE18AA1971EBBF47949B07',
- Kubeclient::GCPCommandCredentials.token(opts))
- end
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_google_application_default_credentials.rb b/vendor/gems/kubeclient/test/test_google_application_default_credentials.rb
deleted file mode 100644
index 238ae729c16..00000000000
--- a/vendor/gems/kubeclient/test/test_google_application_default_credentials.rb
+++ /dev/null
@@ -1,15 +0,0 @@
-require_relative 'test_helper'
-require 'googleauth'
-
-# Unit tests for the ApplicationDefaultCredentials token provider
-class GoogleApplicationDefaultCredentialsTest < MiniTest::Test
- def test_token
- auth = Minitest::Mock.new
- auth.expect(:apply, nil, [{}])
- auth.expect(:access_token, 'valid_token')
-
- Google::Auth.stub(:get_application_default, auth) do
- assert_equal('valid_token', Kubeclient::GoogleApplicationDefaultCredentials.token)
- end
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_guestbook_go.rb b/vendor/gems/kubeclient/test/test_guestbook_go.rb
deleted file mode 100644
index a50e192a0c5..00000000000
--- a/vendor/gems/kubeclient/test/test_guestbook_go.rb
+++ /dev/null
@@ -1,237 +0,0 @@
-require_relative 'test_helper'
-require 'vcr'
-
-# creation of google's example of guest book
-class CreateGuestbookGo < MiniTest::Test
- def test_create_guestbook_entities
- VCR.configure do |c|
- c.cassette_library_dir = 'test/cassettes'
- c.hook_into(:webmock)
- end
-
- # WebMock.allow_net_connect!
- VCR.use_cassette('kubernetes_guestbook') do # , record: :new_episodes) do
- client = Kubeclient::Client.new('http://10.35.0.23:8080/api/', 'v1')
-
- testing_ns = Kubeclient::Resource.new
- testing_ns.metadata = {}
- testing_ns.metadata.name = 'kubeclient-ns'
-
- # delete in case they existed before so creation can be tested
- delete_namespace(client, testing_ns.metadata.name)
- delete_services(
- client, testing_ns.metadata.name,
- ['guestbook', 'redis-master', 'redis-slave']
- )
- delete_replication_controllers(
- client, testing_ns.metadata.name,
- ['guestbook', 'redis-master', 'redis-slave']
- )
-
- client.create_namespace(testing_ns)
- services = create_services(client, testing_ns.metadata.name)
- replicators = create_replication_controllers(client, testing_ns.metadata.name)
-
- get_namespaces(client)
- get_services(client, testing_ns.metadata.name)
- get_replication_controllers(client, testing_ns.metadata.name)
-
- delete_services(client, testing_ns.metadata.name, services)
- delete_replication_controllers(client, testing_ns.metadata.name, replicators)
-
- client.delete_namespace(testing_ns.metadata.name)
- end
- ensure
- VCR.turn_off!
- end
-
- def delete_namespace(client, namespace_name)
- client.delete_namespace(namespace_name)
- rescue Kubeclient::ResourceNotFoundError => exception
- assert_equal(404, exception.error_code)
- end
-
- def get_namespaces(client)
- namespaces = client.get_namespaces
- assert(true, namespaces.size > 2)
- end
-
- def get_services(client, ns)
- retrieved_services = client.get_services(namespace: ns)
- assert_equal(3, retrieved_services.size)
- end
-
- def get_replication_controllers(client, ns)
- retrieved_replicators = client.get_replication_controllers(namespace: ns)
- assert_equal(3, retrieved_replicators.size)
- end
-
- def create_services(client, ns)
- guestbook_service = client.create_service(guestbook_service(ns))
- redis_service = client.create_service(redis_service(ns))
- redis_slave_service = client.create_service(redis_slave_service(ns))
- [guestbook_service, redis_service, redis_slave_service]
- end
-
- def create_replication_controllers(client, namespace)
- rc = client.create_replication_controller(guestbook_rc(namespace))
- rc2 = client.create_replication_controller(redis_master_rc(namespace))
- rc3 = client.create_replication_controller(redis_slave_rc(namespace))
- [rc, rc2, rc3]
- end
-
- def delete_services(client, namespace, services)
- # if the entity is not found, no need to fail the test
- services.each do |service|
- begin
- if service.instance_of?(Kubeclient::Resource)
- client.delete_service(service.metadata.name, namespace)
- else
- # it's just a string - service name
- client.delete_service(service, namespace)
- end
- rescue Kubeclient::ResourceNotFoundError => exception
- assert_equal(404, exception.error_code)
- end
- end
- end
-
- def delete_replication_controllers(client, namespace, replication_controllers)
- # if the entity is not found, no need to fail the test
- replication_controllers.each do |rc|
- begin
- if rc.instance_of?(Kubeclient::Resource)
- client.delete_replication_controller(rc.metadata.name, namespace)
- else
- # it's just a string - rc name
- client.delete_replication_controller(rc, namespace)
- end
- rescue Kubeclient::ResourceNotFoundError => exception
- assert_equal(404, exception.error_code)
- end
- end
- end
-
- private
-
- def construct_base_rc(namespace)
- rc = Kubeclient::Resource.new
- rc.metadata = {}
- rc.metadata.namespace = namespace
- rc.metadata.labels = {}
- rc.spec = {}
- rc.spec.selector = {}
- rc.spec.template = {}
- rc.spec.template.metadata = {}
- rc.spec.template.spec = {}
- rc.spec.template.metadata.labels = {}
- rc
- end
-
- def redis_master_rc(namespace)
- rc = construct_base_rc(namespace)
- rc.metadata.name = 'redis-master'
- rc.metadata.labels.app = 'redis'
- rc.metadata.labels.role = 'master'
- rc.spec.replicas = 1
- rc.spec.selector.app = 'redis'
- rc.spec.selector.role = 'master'
- rc.spec.template.metadata.labels.app = 'redis'
- rc.spec.template.metadata.labels.role = 'master'
- rc.spec.template.spec.containers = [{
- 'name' => 'redis-master',
- 'image' => 'redis',
- 'ports' => [{
- 'name' => 'redis-server',
- 'containerPort' => 6379
- }]
- }]
- rc
- end
-
- def redis_slave_rc(namespace)
- rc = construct_base_rc(namespace)
- rc.metadata.name = 'redis-slave'
- rc.metadata.labels.app = 'redis'
- rc.metadata.labels.role = 'slave'
- rc.spec.replicas = 2
- rc.spec.selector.app = 'redis'
- rc.spec.selector.role = 'slave'
- rc.spec.template.metadata.labels.app = 'redis'
- rc.spec.template.metadata.labels.role = 'slave'
- rc.spec.template.spec.containers = [{
- 'name' => 'redis-slave',
- 'image' => 'kubernetes/redis-slave:v2',
- 'ports' => [{
- 'name' => 'redis-server',
- 'containerPort' => 6379
- }]
- }]
- rc
- end
-
- def guestbook_rc(namespace)
- rc = construct_base_rc(namespace)
- rc.metadata.name = 'guestbook'
- rc.metadata.labels.app = 'guestbook'
- rc.metadata.labels.role = 'slave'
- rc.spec.replicas = 3
- rc.spec.selector.app = 'guestbook'
- rc.spec.template.metadata.labels.app = 'guestbook'
- rc.spec.template.spec.containers = [
- {
- 'name' => 'guestbook',
- 'image' => 'kubernetes/guestbook:v2',
- 'ports' => [
- {
- 'name' => 'http-server',
- 'containerPort' => 3000
- }
- ]
- }
- ]
- rc
- end
-
- def base_service(namespace)
- our_service = Kubeclient::Resource.new
- our_service.metadata = {}
- our_service.metadata.namespace = namespace
- our_service.metadata.labels = {}
- our_service.spec = {}
- our_service.spec.selector = {}
- our_service
- end
-
- def redis_slave_service(namespace)
- our_service = base_service(namespace)
- our_service.metadata.name = 'redis-slave'
- our_service.metadata.labels.app = 'redis'
- our_service.metadata.labels.role = 'slave'
- our_service.spec.ports = [{ 'port' => 6379, 'targetPort' => 'redis-server' }]
- our_service.spec.selector.app = 'redis'
- our_service.spec.selector.role = 'slave'
- our_service
- end
-
- def redis_service(namespace)
- our_service = base_service(namespace)
- our_service.metadata.name = 'redis-master'
- our_service.metadata.labels.app = 'redis'
- our_service.metadata.labels.role = 'master'
- our_service.spec.ports = [{ 'port' => 6379, 'targetPort' => 'redis-server' }]
- our_service.spec.selector.app = 'redis'
- our_service.spec.selector.role = 'master'
- our_service
- end
-
- def guestbook_service(namespace)
- our_service = base_service(namespace)
- our_service.metadata.name = 'guestbook'
- our_service.metadata.labels.name = 'guestbook'
- our_service.spec.ports = [{ 'port' => 3000, 'targetPort' => 'http-server' }]
- our_service.spec.selector.app = 'guestbook'
- our_service.type = 'LoadBalancer'
- our_service
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_helper.rb b/vendor/gems/kubeclient/test/test_helper.rb
deleted file mode 100644
index 042a08a0d80..00000000000
--- a/vendor/gems/kubeclient/test/test_helper.rb
+++ /dev/null
@@ -1,28 +0,0 @@
-require 'bundler/setup'
-require 'minitest/autorun'
-require 'minitest/rg'
-require 'webmock/minitest'
-require 'mocha/minitest'
-require 'json'
-require 'kubeclient'
-
-MiniTest::Test.class_eval do
- # Assumes test files will be in a subdirectory with the same name as the
- # file suffix. e.g. a file named foo.json would be a "json" subdirectory.
- def open_test_file(name)
- File.new(File.join(File.dirname(__FILE__), name.split('.').last, name))
- end
-
- # kubeconfig files deviate from above convention.
- # They link to relaved certs etc. with various extensions, all in same dir.
- def config_file(name)
- File.join(File.dirname(__FILE__), 'config', name)
- end
-
- def stub_core_api_list
- stub_request(:get, %r{/api/v1$})
- .to_return(body: open_test_file('core_api_resource_list.json'), status: 200)
- end
-end
-
-WebMock.disable_net_connect!
diff --git a/vendor/gems/kubeclient/test/test_kubeclient.rb b/vendor/gems/kubeclient/test/test_kubeclient.rb
deleted file mode 100644
index f866bfc89df..00000000000
--- a/vendor/gems/kubeclient/test/test_kubeclient.rb
+++ /dev/null
@@ -1,881 +0,0 @@
-require_relative 'test_helper'
-
-# Kubernetes client entity tests
-class KubeclientTest < MiniTest::Test
- def test_json
- our_object = Kubeclient::Resource.new
- our_object.foo = 'bar'
- our_object.nested = {}
- our_object.nested.again = {}
- our_object.nested.again.again = {}
- our_object.nested.again.again.name = 'aaron'
-
- expected = {
- 'foo' => 'bar',
- 'nested' => { 'again' => { 'again' => { 'name' => 'aaron' } } }
- }
-
- assert_equal(expected, JSON.parse(JSON.dump(our_object.to_h)))
- end
-
- def test_pass_uri
- # URI::Generic#hostname= was added in ruby 1.9.3 and will automatically
- # wrap an ipv6 address in []
- uri = URI::HTTP.build(port: 8080)
- uri.hostname = 'localhost'
- client = Kubeclient::Client.new(uri)
- rest_client = client.rest_client
- assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s)
- end
-
- def test_no_path_in_uri
- client = Kubeclient::Client.new('http://localhost:8080', 'v1')
- rest_client = client.rest_client
- assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s)
- end
-
- def test_no_version_passed
- client = Kubeclient::Client.new('http://localhost:8080')
- rest_client = client.rest_client
- assert_equal('http://localhost:8080/api/v1', rest_client.url.to_s)
- end
-
- def test_pass_proxy
- uri = URI::HTTP.build(host: 'localhost', port: 8080)
- proxy_uri = URI::HTTP.build(host: 'myproxyhost', port: 8888)
- stub_core_api_list
-
- client = Kubeclient::Client.new(uri, http_proxy_uri: proxy_uri)
- rest_client = client.rest_client
- assert_equal(proxy_uri.to_s, rest_client.options[:proxy])
-
- watch_client = client.watch_pods
- assert_equal(watch_client.send(:build_client_options)[:proxy][:proxy_address], proxy_uri.host)
- assert_equal(watch_client.send(:build_client_options)[:proxy][:proxy_port], proxy_uri.port)
- end
-
- def test_pass_max_redirects
- max_redirects = 0
- client = Kubeclient::Client.new('http://localhost:8080/api/', http_max_redirects: max_redirects)
- rest_client = client.rest_client
- assert_equal(max_redirects, rest_client.options[:max_redirects])
-
- stub_request(:get, 'http://localhost:8080/api')
- .to_return(status: 302, headers: { location: 'http://localhost:1234/api' })
-
- exception = assert_raises(Kubeclient::HttpError) { client.api }
- assert_equal(302, exception.error_code)
- end
-
- def test_exception
- stub_core_api_list
- stub_request(:post, %r{/services})
- .to_return(body: open_test_file('namespace_exception.json'), status: 409)
-
- service = Kubeclient::Resource.new
- service.metadata = {}
- service.metadata.name = 'redisslave'
- service.metadata.namespace = 'default'
- # service.port = 80
- # service.container_port = 6379
- # service.protocol = 'TCP'
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
-
- exception = assert_raises(Kubeclient::HttpError) do
- service = client.create_service(service)
- end
-
- assert_instance_of(Kubeclient::HttpError, exception)
- assert_equal("converting to : type names don't match (Pod, Namespace)",
- exception.message)
-
- assert_includes(exception.to_s, ' for POST http://localhost:8080/api')
- assert_equal(409, exception.error_code)
- end
-
- def test_deprecated_exception
- error_message = 'certificate verify failed'
-
- stub_request(:get, 'http://localhost:8080/api')
- .to_raise(OpenSSL::SSL::SSLError.new(error_message))
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
-
- exception = assert_raises(KubeException) { client.api }
- assert_equal(error_message, exception.message)
- end
-
- def test_api
- stub_request(:get, 'http://localhost:8080/api')
- .to_return(status: 200, body: open_test_file('versions_list.json'))
-
- response = client.api
- assert_includes(response, 'versions')
- end
-
- def test_api_ssl_failure
- error_message = 'certificate verify failed'
-
- stub_request(:get, 'http://localhost:8080/api')
- .to_raise(OpenSSL::SSL::SSLError.new(error_message))
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
-
- exception = assert_raises(Kubeclient::HttpError) { client.api }
- assert_equal(error_message, exception.message)
- end
-
- def test_api_timeout
- stub_request(:get, 'http://localhost:8080/api').to_timeout
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
-
- exception = assert_raises(Kubeclient::HttpError) { client.api }
- assert_match(/(timed out|timeout)/i, exception.message)
- end
-
- def test_api_valid
- stub_request(:get, 'http://localhost:8080/api')
- .to_return(status: 200, body: open_test_file('versions_list.json'))
-
- args = ['http://localhost:8080/api/']
-
- [nil, 'v1beta3', 'v1'].each do |version|
- client = Kubeclient::Client.new(*(version ? args + [version] : args))
- assert client.api_valid?
- end
- end
-
- def test_api_valid_with_invalid_version
- stub_request(:get, 'http://localhost:8080/api')
- .to_return(status: 200, body: open_test_file('versions_list.json'))
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'foobar1')
- refute client.api_valid?
- end
-
- def test_api_valid_with_unreported_versions
- stub_request(:get, 'http://localhost:8080/api')
- .to_return(status: 200, body: '{}')
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- refute client.api_valid?
- end
-
- def test_api_valid_with_invalid_json
- stub_request(:get, 'http://localhost:8080/api')
- .to_return(status: 200, body: '[]')
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- refute client.api_valid?
- end
-
- def test_api_valid_with_bad_endpoint
- stub_request(:get, 'http://localhost:8080/api')
- .to_return(status: [404, 'Resource Not Found'])
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- assert_raises(Kubeclient::HttpError) { client.api_valid? }
- end
-
- def test_api_valid_with_non_json
- stub_request(:get, 'http://localhost:8080/api')
- .to_return(status: 200, body: '<html></html>')
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- assert_raises(JSON::ParserError) { client.api_valid? }
- end
-
- def test_nonjson_exception
- stub_core_api_list
- stub_request(:get, %r{/servic})
- .to_return(body: open_test_file('service_illegal_json_404.json'), status: 404)
-
- exception = assert_raises(Kubeclient::ResourceNotFoundError) do
- client.get_services
- end
-
- assert(exception.message.include?('Not Found'))
- assert_equal(404, exception.error_code)
- end
-
- def test_nonjson_exception_raw
- stub_core_api_list
- stub_request(:get, %r{/servic})
- .to_return(body: open_test_file('service_illegal_json_404.json'), status: 404)
-
- exception = assert_raises(Kubeclient::ResourceNotFoundError) do
- client.get_services(as: :raw)
- end
-
- assert(exception.message.include?('Not Found'))
- assert_equal(404, exception.error_code)
- end
-
- def test_entity_list
- stub_core_api_list
- stub_get_services
-
- services = client.get_services
-
- refute_empty(services)
- assert_instance_of(Kubeclient::Common::EntityList, services)
- # Stripping of 'List' in collection.kind RecursiveOpenStruct mode only is historic.
- assert_equal('Service', services.kind)
- assert_equal(2, services.size)
- assert_instance_of(Kubeclient::Resource, services[0])
- assert_instance_of(Kubeclient::Resource, services[1])
-
- assert_requested(:get, 'http://localhost:8080/api/v1/services', times: 1)
- end
-
- def test_entity_list_raw
- stub_core_api_list
- stub_get_services
-
- response = client.get_services(as: :raw)
-
- refute_empty(response)
- assert_equal(open_test_file('entity_list.json').read, response)
-
- assert_requested(:get, 'http://localhost:8080/api/v1/services', times: 1)
- end
-
- def test_entity_list_parsed
- stub_core_api_list
- stub_get_services
-
- response = client.get_services(as: :parsed)
- assert_equal Hash, response.class
- assert_equal 'ServiceList', response['kind']
- assert_equal %w[metadata spec status], response['items'].first.keys
- end
-
- def test_entity_list_parsed_symbolized
- stub_core_api_list
- stub_get_services
-
- response = client.get_services(as: :parsed_symbolized)
- assert_equal Hash, response.class
- assert_equal 'ServiceList', response[:kind]
- assert_equal %i[metadata spec status], response[:items].first.keys
- end
-
- def test_entity_list_unknown
- stub_core_api_list
- stub_get_services
-
- e = assert_raises(ArgumentError) { client.get_services(as: :whoops) }
- assert_equal 'Unsupported format :whoops', e.message
- end
-
- def test_entity_list_raw_failure
- stub_core_api_list
- stub_request(:get, %r{/services})
- .to_return(body: open_test_file('entity_list.json'), status: 500)
-
- exception = assert_raises(Kubeclient::HttpError) { client.get_services(as: :raw) }
- assert_equal('500 Internal Server Error', exception.message)
- assert_equal(500, exception.error_code)
- end
-
- def test_entities_with_label_selector
- selector = 'component=apiserver'
-
- stub_core_api_list
- stub_get_services
-
- services = client.get_services(label_selector: selector)
-
- assert_instance_of(Kubeclient::Common::EntityList, services)
- assert_requested(
- :get,
- "http://localhost:8080/api/v1/services?labelSelector=#{selector}",
- times: 1
- )
- end
-
- def test_entities_with_resource_version
- version = '329'
-
- stub_core_api_list
- stub_get_services
-
- services = client.get_services(resource_version: version)
-
- assert_instance_of(Kubeclient::Common::EntityList, services)
- assert_requested(
- :get,
- "http://localhost:8080/api/v1/services?resourceVersion=#{version}",
- times: 1
- )
- end
-
- def test_entities_with_field_selector
- selector = 'involvedObject.name=redis-master'
-
- stub_core_api_list
- stub_get_services
-
- services = client.get_services(field_selector: selector)
-
- assert_instance_of(Kubeclient::Common::EntityList, services)
- assert_requested(
- :get,
- "http://localhost:8080/api/v1/services?fieldSelector=#{selector}",
- times: 1
- )
- end
-
- def test_empty_list
- stub_core_api_list
- stub_request(:get, %r{/pods})
- .to_return(body: open_test_file('empty_pod_list.json'), status: 200)
-
- pods = client.get_pods
- assert_instance_of(Kubeclient::Common::EntityList, pods)
- assert_equal(0, pods.size)
- end
-
- def test_get_all
- stub_core_api_list
-
- stub_request(:get, %r{/bindings})
- .to_return(body: open_test_file('bindings_list.json'), status: 404)
-
- stub_request(:get, %r{/configmaps})
- .to_return(body: open_test_file('config_map_list.json'), status: 200)
-
- stub_request(:get, %r{/podtemplates})
- .to_return(body: open_test_file('pod_template_list.json'), status: 200)
-
- stub_request(:get, %r{/services})
- .to_return(body: open_test_file('service_list.json'), status: 200)
-
- stub_request(:get, %r{/pods})
- .to_return(body: open_test_file('pod_list.json'), status: 200)
-
- stub_request(:get, %r{/nodes})
- .to_return(body: open_test_file('node_list.json'), status: 200)
-
- stub_request(:get, %r{/replicationcontrollers})
- .to_return(body: open_test_file('replication_controller_list.json'), status: 200)
-
- stub_request(:get, %r{/events})
- .to_return(body: open_test_file('event_list.json'), status: 200)
-
- stub_request(:get, %r{/endpoints})
- .to_return(body: open_test_file('endpoint_list.json'), status: 200)
-
- stub_request(:get, %r{/namespaces})
- .to_return(body: open_test_file('namespace_list.json'), status: 200)
-
- stub_request(:get, %r{/secrets})
- .to_return(body: open_test_file('secret_list.json'), status: 200)
-
- stub_request(:get, %r{/resourcequotas})
- .to_return(body: open_test_file('resource_quota_list.json'), status: 200)
-
- stub_request(:get, %r{/limitranges})
- .to_return(body: open_test_file('limit_range_list.json'), status: 200)
-
- stub_request(:get, %r{/persistentvolumes})
- .to_return(body: open_test_file('persistent_volume_list.json'), status: 200)
-
- stub_request(:get, %r{/persistentvolumeclaims})
- .to_return(body: open_test_file('persistent_volume_claim_list.json'), status: 200)
-
- stub_request(:get, %r{/componentstatuses})
- .to_return(body: open_test_file('component_status_list.json'), status: 200)
-
- stub_request(:get, %r{/serviceaccounts})
- .to_return(body: open_test_file('service_account_list.json'), status: 200)
-
- result = client.all_entities
- assert_equal(16, result.keys.size)
- assert_instance_of(Kubeclient::Common::EntityList, result['node'])
- assert_instance_of(Kubeclient::Common::EntityList, result['service'])
- assert_instance_of(Kubeclient::Common::EntityList, result['replication_controller'])
- assert_instance_of(Kubeclient::Common::EntityList, result['pod'])
- assert_instance_of(Kubeclient::Common::EntityList, result['event'])
- assert_instance_of(Kubeclient::Common::EntityList, result['namespace'])
- assert_instance_of(Kubeclient::Common::EntityList, result['secret'])
- assert_instance_of(Kubeclient::Resource, result['service'][0])
- assert_instance_of(Kubeclient::Resource, result['node'][0])
- assert_instance_of(Kubeclient::Resource, result['event'][0])
- assert_instance_of(Kubeclient::Resource, result['endpoint'][0])
- assert_instance_of(Kubeclient::Resource, result['namespace'][0])
- assert_instance_of(Kubeclient::Resource, result['secret'][0])
- assert_instance_of(Kubeclient::Resource, result['resource_quota'][0])
- assert_instance_of(Kubeclient::Resource, result['limit_range'][0])
- assert_instance_of(Kubeclient::Resource, result['persistent_volume'][0])
- assert_instance_of(Kubeclient::Resource, result['persistent_volume_claim'][0])
- assert_instance_of(Kubeclient::Resource, result['component_status'][0])
- assert_instance_of(Kubeclient::Resource, result['service_account'][0])
- end
-
- def test_get_all_raw
- stub_core_api_list
-
- stub_request(:get, %r{/bindings})
- .to_return(body: open_test_file('bindings_list.json'), status: 404)
-
- stub_request(:get, %r{/configmaps})
- .to_return(body: open_test_file('config_map_list.json'), status: 200)
-
- stub_request(:get, %r{/podtemplates})
- .to_return(body: open_test_file('pod_template_list.json'), status: 200)
-
- stub_request(:get, %r{/services})
- .to_return(body: open_test_file('service_list.json'), status: 200)
-
- stub_request(:get, %r{/pods})
- .to_return(body: open_test_file('pod_list.json'), status: 200)
-
- stub_request(:get, %r{/nodes})
- .to_return(body: open_test_file('node_list.json'), status: 200)
-
- stub_request(:get, %r{/replicationcontrollers})
- .to_return(body: open_test_file('replication_controller_list.json'), status: 200)
-
- stub_request(:get, %r{/events})
- .to_return(body: open_test_file('event_list.json'), status: 200)
-
- stub_request(:get, %r{/endpoints})
- .to_return(body: open_test_file('endpoint_list.json'), status: 200)
-
- stub_request(:get, %r{/namespaces})
- .to_return(body: open_test_file('namespace_list.json'), status: 200)
-
- stub_request(:get, %r{/secrets})
- .to_return(body: open_test_file('secret_list.json'), status: 200)
-
- stub_request(:get, %r{/resourcequotas})
- .to_return(body: open_test_file('resource_quota_list.json'), status: 200)
-
- stub_request(:get, %r{/limitranges})
- .to_return(body: open_test_file('limit_range_list.json'), status: 200)
-
- stub_request(:get, %r{/persistentvolumes})
- .to_return(body: open_test_file('persistent_volume_list.json'), status: 200)
-
- stub_request(:get, %r{/persistentvolumeclaims})
- .to_return(body: open_test_file('persistent_volume_claim_list.json'), status: 200)
-
- stub_request(:get, %r{/componentstatuses})
- .to_return(body: open_test_file('component_status_list.json'), status: 200)
-
- stub_request(:get, %r{/serviceaccounts})
- .to_return(body: open_test_file('service_account_list.json'), status: 200)
-
- result = client.all_entities(as: :raw)
- assert_equal(16, result.keys.size)
-
- %w[
- component_status config_map endpoint event limit_range namespace node
- persistent_volume persistent_volume_claim pod replication_controller
- resource_quota secret service service_account
- ].each do |entity|
- assert_equal(open_test_file("#{entity}_list.json").read, result[entity])
- end
- end
-
- def test_api_bearer_token_with_params_success
- stub_request(:get, 'http://localhost:8080/api/v1/pods?labelSelector=name=redis-master')
- .with(headers: { Authorization: 'Bearer valid_token' })
- .to_return(body: open_test_file('pod_list.json'), status: 200)
- stub_request(:get, %r{/api/v1$})
- .with(headers: { Authorization: 'Bearer valid_token' })
- .to_return(body: open_test_file('core_api_resource_list.json'), status: 200)
-
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { bearer_token: 'valid_token' }
- )
-
- pods = client.get_pods(label_selector: 'name=redis-master')
-
- assert_equal('Pod', pods.kind)
- assert_equal(1, pods.size)
- end
-
- def test_api_bearer_token_success
- stub_core_api_list
- stub_request(:get, 'http://localhost:8080/api/v1/pods')
- .with(headers: { Authorization: 'Bearer valid_token' })
- .to_return(
- body: open_test_file('pod_list.json'), status: 200
- )
-
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { bearer_token: 'valid_token' }
- )
-
- pods = client.get_pods
-
- assert_equal('Pod', pods.kind)
- assert_equal(1, pods.size)
- end
-
- def test_api_bearer_token_failure
- error_message =
- '"/api/v1" is forbidden because ' \
- 'system:anonymous cannot list on pods in'
- response = OpenStruct.new(code: 401, message: error_message)
-
- stub_request(:get, 'http://localhost:8080/api/v1')
- .with(headers: { Authorization: 'Bearer invalid_token' })
- .to_raise(Kubeclient::HttpError.new(403, error_message, response))
-
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { bearer_token: 'invalid_token' }
- )
-
- exception = assert_raises(Kubeclient::HttpError) { client.get_pods }
- assert_equal(403, exception.error_code)
- assert_equal(error_message, exception.message)
- assert_equal(response, exception.response)
- end
-
- def test_api_bearer_token_failure_raw
- error_message =
- '"/api/v1" is forbidden because ' \
- 'system:anonymous cannot list on pods in'
- response = OpenStruct.new(code: 401, message: error_message)
-
- stub_request(:get, 'http://localhost:8080/api/v1')
- .with(headers: { Authorization: 'Bearer invalid_token' })
- .to_raise(Kubeclient::HttpError.new(403, error_message, response))
-
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { bearer_token: 'invalid_token' }
- )
-
- exception = assert_raises(Kubeclient::HttpError) { client.get_pods(as: :raw) }
- assert_equal(403, exception.error_code)
- assert_equal(error_message, exception.message)
- assert_equal(response, exception.response)
- end
-
- def test_api_basic_auth_success
- stub_request(:get, 'http://localhost:8080/api/v1')
- .with(basic_auth: %w[username password])
- .to_return(body: open_test_file('core_api_resource_list.json'), status: 200)
- stub_request(:get, 'http://localhost:8080/api/v1/pods')
- .with(basic_auth: %w[username password])
- .to_return(body: open_test_file('pod_list.json'), status: 200)
-
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { username: 'username', password: 'password' }
- )
-
- pods = client.get_pods
-
- assert_equal('Pod', pods.kind)
- assert_equal(1, pods.size)
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/pods',
- times: 1
- )
- end
-
- def test_api_basic_auth_back_comp_success
- stub_request(:get, 'http://localhost:8080/api/v1')
- .with(basic_auth: %w[username password])
- .to_return(body: open_test_file('core_api_resource_list.json'), status: 200)
- stub_request(:get, 'http://localhost:8080/api/v1/pods')
- .with(basic_auth: %w[username password])
- .to_return(body: open_test_file('pod_list.json'), status: 200)
-
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { user: 'username', password: 'password' }
- )
-
- pods = client.get_pods
-
- assert_equal('Pod', pods.kind)
- assert_equal(1, pods.size)
- assert_requested(:get, 'http://localhost:8080/api/v1/pods', times: 1)
- end
-
- def test_api_basic_auth_failure
- error_message = 'HTTP status code 401, 401 Unauthorized'
- response = OpenStruct.new(code: 401, message: '401 Unauthorized')
-
- stub_request(:get, 'http://localhost:8080/api/v1')
- .with(basic_auth: %w[username password])
- .to_raise(Kubeclient::HttpError.new(401, error_message, response))
-
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { username: 'username', password: 'password' }
- )
-
- exception = assert_raises(Kubeclient::HttpError) { client.get_pods }
- assert_equal(401, exception.error_code)
- assert_equal(error_message, exception.message)
- assert_equal(response, exception.response)
- assert_requested(:get, 'http://localhost:8080/api/v1', times: 1)
- end
-
- def test_api_basic_auth_failure_raw
- error_message = 'HTTP status code 401, 401 Unauthorized'
- response = OpenStruct.new(code: 401, message: '401 Unauthorized')
-
- stub_request(:get, 'http://localhost:8080/api/v1')
- .with(basic_auth: %w[username password])
- .to_raise(Kubeclient::HttpError.new(401, error_message, response))
-
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { username: 'username', password: 'password' }
- )
-
- exception = assert_raises(Kubeclient::HttpError) { client.get_pods(as: :raw) }
- assert_equal(401, exception.error_code)
- assert_equal(error_message, exception.message)
- assert_equal(response, exception.response)
-
- assert_requested(:get, 'http://localhost:8080/api/v1', times: 1)
- end
-
- def test_init_username_no_password
- expected_msg = 'Basic auth requires both username & password'
- exception = assert_raises(ArgumentError) do
- Kubeclient::Client.new(
- 'http://localhost:8080',
- auth_options: { username: 'username' }
- )
- end
- assert_equal(expected_msg, exception.message)
- end
-
- def test_init_user_no_password
- expected_msg = 'Basic auth requires both username & password'
- exception = assert_raises(ArgumentError) do
- Kubeclient::Client.new(
- 'http://localhost:8080',
- auth_options: { user: 'username' }
- )
- end
- assert_equal(expected_msg, exception.message)
- end
-
- def test_init_username_and_bearer_token
- expected_msg = 'Invalid auth options: specify only one of username/password,' \
- ' bearer_token or bearer_token_file'
- exception = assert_raises(ArgumentError) do
- Kubeclient::Client.new(
- 'http://localhost:8080',
- auth_options: { username: 'username', bearer_token: 'token' }
- )
- end
- assert_equal(expected_msg, exception.message)
- end
-
- def test_init_username_and_bearer_token_file
- expected_msg = 'Invalid auth options: specify only one of username/password,' \
- ' bearer_token or bearer_token_file'
- exception = assert_raises(ArgumentError) do
- Kubeclient::Client.new(
- 'http://localhost:8080',
- auth_options: { username: 'username', bearer_token_file: 'token-file' }
- )
- end
- assert_equal(expected_msg, exception.message)
- end
-
- def test_bearer_token_and_bearer_token_file
- expected_msg =
- 'Invalid auth options: specify only one of username/password,' \
- ' bearer_token or bearer_token_file'
- exception = assert_raises(ArgumentError) do
- Kubeclient::Client.new(
- 'http://localhost:8080',
- auth_options: { bearer_token: 'token', bearer_token_file: 'token-file' }
- )
- end
- assert_equal(expected_msg, exception.message)
- end
-
- def test_bearer_token_file_not_exist
- expected_msg = 'Token file token-file does not exist'
- exception = assert_raises(ArgumentError) do
- Kubeclient::Client.new(
- 'http://localhost:8080',
- auth_options: { bearer_token_file: 'token-file' }
- )
- end
- assert_equal(expected_msg, exception.message)
- end
-
- def test_api_bearer_token_file_success
- stub_core_api_list
- stub_request(:get, 'http://localhost:8080/api/v1/pods')
- .with(headers: { Authorization: 'Bearer valid_token' })
- .to_return(body: open_test_file('pod_list.json'), status: 200)
-
- file = File.join(File.dirname(__FILE__), 'valid_token_file')
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- auth_options: { bearer_token_file: file }
- )
-
- pods = client.get_pods
-
- assert_equal('Pod', pods.kind)
- assert_equal(1, pods.size)
- end
-
- def test_proxy_url
- stub_core_api_list
-
- client = Kubeclient::Client.new('http://host:8080', 'v1')
- assert_equal(
- 'http://host:8080/api/v1/namespaces/ns/services/srvname:srvportname/proxy',
- client.proxy_url('service', 'srvname', 'srvportname', 'ns')
- )
-
- assert_equal(
- 'http://host:8080/api/v1/namespaces/ns/services/srvname:srvportname/proxy',
- client.proxy_url('services', 'srvname', 'srvportname', 'ns')
- )
-
- assert_equal(
- 'http://host:8080/api/v1/namespaces/ns/pods/srvname:srvportname/proxy',
- client.proxy_url('pod', 'srvname', 'srvportname', 'ns')
- )
-
- assert_equal(
- 'http://host:8080/api/v1/namespaces/ns/pods/srvname:srvportname/proxy',
- client.proxy_url('pods', 'srvname', 'srvportname', 'ns')
- )
-
- # Check no namespace provided
- assert_equal(
- 'http://host:8080/api/v1/nodes/srvname:srvportname/proxy',
- client.proxy_url('nodes', 'srvname', 'srvportname')
- )
-
- assert_equal(
- 'http://host:8080/api/v1/nodes/srvname:srvportname/proxy',
- client.proxy_url('node', 'srvname', 'srvportname')
- )
-
- # Check integer port
- assert_equal(
- 'http://host:8080/api/v1/nodes/srvname:5001/proxy',
- client.proxy_url('nodes', 'srvname', 5001)
- )
-
- assert_equal(
- 'http://host:8080/api/v1/nodes/srvname:5001/proxy',
- client.proxy_url('node', 'srvname', 5001)
- )
- end
-
- def test_attr_readers
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- ssl_options: { client_key: 'secret' },
- auth_options: { bearer_token: 'token' }
- )
- assert_equal('/api', client.api_endpoint.path)
- assert_equal('secret', client.ssl_options[:client_key])
- assert_equal('token', client.auth_options[:bearer_token])
- assert_equal('Bearer token', client.headers[:Authorization])
- end
-
- def test_nil_items
- # handle https://github.com/kubernetes/kubernetes/issues/13096
- stub_core_api_list
- stub_request(:get, %r{/persistentvolumeclaims})
- .to_return(body: open_test_file('persistent_volume_claims_nil_items.json'), status: 200)
-
- client.get_persistent_volume_claims
- end
-
- # Timeouts
-
- def test_timeouts_defaults
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/'
- )
- rest_client = client.rest_client
- assert_default_open_timeout(rest_client.open_timeout)
- assert_equal(60, rest_client.read_timeout)
- end
-
- def test_timeouts_open
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- timeouts: { open: 10 }
- )
- rest_client = client.rest_client
- assert_equal(10, rest_client.open_timeout)
- assert_equal(60, rest_client.read_timeout)
- end
-
- def test_timeouts_read
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- timeouts: { read: 300 }
- )
- rest_client = client.rest_client
- assert_default_open_timeout(rest_client.open_timeout)
- assert_equal(300, rest_client.read_timeout)
- end
-
- def test_timeouts_both
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- timeouts: { open: 10, read: 300 }
- )
- rest_client = client.rest_client
- assert_equal(10, rest_client.open_timeout)
- assert_equal(300, rest_client.read_timeout)
- end
-
- def test_timeouts_infinite
- client = Kubeclient::Client.new(
- 'http://localhost:8080/api/',
- timeouts: { open: nil, read: nil }
- )
- rest_client = client.rest_client
- assert_nil(rest_client.open_timeout)
- assert_nil(rest_client.read_timeout)
- end
-
- def assert_default_open_timeout(actual)
- if RUBY_VERSION >= '2.3'
- assert_equal(60, actual)
- else
- assert_nil(actual)
- end
- end
-
- private
-
- def stub_get_services
- stub_request(:get, %r{/services})
- .to_return(body: open_test_file('entity_list.json'), status: 200)
- end
-
- def client
- @client ||= Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- end
-
- # dup method creates a shallow copy which is not good in this case
- # since rename_keys changes the input hash
- # hence need to create a deep_copy
- def deep_copy(hash)
- Marshal.load(Marshal.dump(hash))
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_limit_range.rb b/vendor/gems/kubeclient/test/test_limit_range.rb
deleted file mode 100644
index e9822578e00..00000000000
--- a/vendor/gems/kubeclient/test/test_limit_range.rb
+++ /dev/null
@@ -1,25 +0,0 @@
-require_relative 'test_helper'
-
-# LimitRange tests
-class TestLimitRange < MiniTest::Test
- def test_get_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/limitranges})
- .to_return(body: open_test_file('limit_range.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- limit_range = client.get_limit_range('limits', 'quota-example')
-
- assert_instance_of(Kubeclient::Resource, limit_range)
- assert_equal('limits', limit_range.metadata.name)
- assert_equal('Container', limit_range.spec.limits[0].type)
- assert_equal('100m', limit_range.spec.limits[0].default.cpu)
- assert_equal('512Mi', limit_range.spec.limits[0].default.memory)
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/namespaces/quota-example/limitranges/limits',
- times: 1
- )
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_missing_methods.rb b/vendor/gems/kubeclient/test/test_missing_methods.rb
deleted file mode 100644
index 67614c95adc..00000000000
--- a/vendor/gems/kubeclient/test/test_missing_methods.rb
+++ /dev/null
@@ -1,80 +0,0 @@
-require_relative 'test_helper'
-
-# Test method_missing, respond_to? and respond_to_missing behaviour
-class TestMissingMethods < MiniTest::Test
- def test_missing
- stub_core_api_list
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- assert_equal(true, client.respond_to?(:get_pod))
- assert_equal(true, client.respond_to?(:get_pods))
- assert_equal(false, client.respond_to?(:get_pie))
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') # Reset discovery
- assert_equal(false, client.respond_to?(:get_pie))
- assert_equal(true, client.respond_to?(:get_pods))
- assert_equal(true, client.respond_to?(:get_pod))
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') # Reset discovery
- assert_instance_of(Method, client.method(:get_pods))
- assert_raises(NameError) do
- client.method(:get_pies)
- end
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1') # Reset discovery
- assert_raises(NameError) do
- client.method(:get_pies)
- end
- assert_instance_of(Method, client.method(:get_pods))
-
- stub_request(:get, %r{/api/v1$}).to_return(
- body: '',
- status: 404
- ) # If discovery fails we expect the below raise an exception
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- assert_raises(Kubeclient::HttpError) do
- client.discover
- end
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- assert_raises(Kubeclient::HttpError) do
- client.method(:get_pods)
- end
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- assert_raises(Kubeclient::HttpError) do
- client.respond_to?(:get_pods)
- end
- end
-
- def test_nonsuffix_plurals
- stub_request(:get, %r{/apis/extensions/v1beta1$}).to_return(
- body: open_test_file('extensions_v1beta1_api_resource_list.json'),
- status: 200
- )
- client = Kubeclient::Client.new('http://localhost:8080/apis/extensions', 'v1beta1')
- assert_equal(true, client.respond_to?(:get_network_policy))
- assert_equal(true, client.respond_to?(:get_network_policies))
- assert_equal(true, client.respond_to?(:get_pod_security_policy))
- assert_equal(true, client.respond_to?(:get_pod_security_policies))
- end
-
- def test_irregular_names
- stub_core_api_list
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- assert_equal(true, client.respond_to?(:get_endpoint))
- assert_equal(true, client.respond_to?(:get_endpoints))
-
- stub_request(:get, %r{/apis/security.openshift.io/v1$}).to_return(
- body: open_test_file('security.openshift.io_api_resource_list.json'),
- status: 200
- )
- client = Kubeclient::Client.new('http://localhost:8080/apis/security.openshift.io', 'v1')
- assert_equal(true, client.respond_to?(:get_security_context_constraint))
- assert_equal(true, client.respond_to?(:get_security_context_constraints))
- end
-
- def test_lowercase_kind
- stub_request(:get, %r{/apis/config.istio.io/v1alpha2$}).to_return(
- body: open_test_file('config.istio.io_api_resource_list.json'),
- status: 200
- )
- client = Kubeclient::Client.new('http://localhost:8080/apis/config.istio.io', 'v1alpha2')
- assert_equal(true, client.respond_to?(:get_servicecontrolreport))
- assert_equal(true, client.respond_to?(:get_servicecontrolreports))
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_namespace.rb b/vendor/gems/kubeclient/test/test_namespace.rb
deleted file mode 100644
index 7283aa69b67..00000000000
--- a/vendor/gems/kubeclient/test/test_namespace.rb
+++ /dev/null
@@ -1,59 +0,0 @@
-require_relative 'test_helper'
-
-# Namespace entity tests
-class TestNamespace < MiniTest::Test
- def test_get_namespace_v1
- stub_core_api_list
- stub_request(:get, %r{/namespaces})
- .to_return(body: open_test_file('namespace.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- namespace = client.get_namespace('staging')
-
- assert_instance_of(Kubeclient::Resource, namespace)
- assert_equal('e388bc10-c021-11e4-a514-3c970e4a436a', namespace.metadata.uid)
- assert_equal('staging', namespace.metadata.name)
- assert_equal('1168', namespace.metadata.resourceVersion)
- assert_equal('v1', namespace.apiVersion)
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/namespaces/staging',
- times: 1
- )
- end
-
- def test_delete_namespace_v1
- our_namespace = Kubeclient::Resource.new
- our_namespace.metadata = {}
- our_namespace.metadata.name = 'staging'
-
- stub_core_api_list
- stub_request(:delete, %r{/namespaces})
- .to_return(body: open_test_file('namespace.json'), status: 200)
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- our_namespace = client.delete_namespace(our_namespace.metadata.name)
- assert_kind_of(RecursiveOpenStruct, our_namespace)
-
- assert_requested(
- :delete,
- 'http://localhost:8080/api/v1/namespaces/staging',
- times: 1
- )
- end
-
- def test_create_namespace
- stub_core_api_list
- stub_request(:post, %r{/namespaces})
- .to_return(body: open_test_file('created_namespace.json'), status: 201)
-
- namespace = Kubeclient::Resource.new
- namespace.metadata = {}
- namespace.metadata.name = 'development'
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- created_namespace = client.create_namespace(namespace)
- assert_instance_of(Kubeclient::Resource, created_namespace)
- assert_equal(namespace.metadata.name, created_namespace.metadata.name)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_node.rb b/vendor/gems/kubeclient/test/test_node.rb
deleted file mode 100644
index aa7459d63c9..00000000000
--- a/vendor/gems/kubeclient/test/test_node.rb
+++ /dev/null
@@ -1,70 +0,0 @@
-require_relative 'test_helper'
-
-# Node entity tests
-class TestNode < MiniTest::Test
- def test_get_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/nodes})
- .to_return(body: open_test_file('node.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- node = client.get_node('127.0.0.1')
-
- assert_instance_of(Kubeclient::Resource, node)
-
- assert_equal('041143c5-ce39-11e4-ac24-3c970e4a436a', node.metadata.uid)
- assert_equal('127.0.0.1', node.metadata.name)
- assert_equal('1724', node.metadata.resourceVersion)
- assert_equal('v1', node.apiVersion)
- assert_equal('2015-03-19T15:08:20+02:00', node.metadata.creationTimestamp)
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1',
- times: 1
- )
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/nodes/127.0.0.1',
- times: 1
- )
- end
-
- def test_get_from_json_v1_raw
- stub_core_api_list
- stub_request(:get, %r{/nodes})
- .to_return(body: open_test_file('node.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- response = client.get_node('127.0.0.1', nil, as: :raw)
-
- assert_equal(open_test_file('node.json').read, response)
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1',
- times: 1
- )
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/nodes/127.0.0.1',
- times: 1
- )
- end
-
- def test_get_from_json_v1_raw_error
- stub_request(:get, %r{/nodes})
- .to_return(body: open_test_file('node.json'), status: 200)
- stub_request(:get, %r{/api/v1$})
- .to_return(body: open_test_file('core_api_resource_list.json'), status: 500)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
-
- exception = assert_raises(Kubeclient::HttpError) do
- client.get_node('127.0.0.1', nil, as: :raw)
- end
-
- assert_instance_of(Kubeclient::HttpError, exception)
- assert_equal('500 Internal Server Error', exception.message)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_oidc_auth_provider.rb b/vendor/gems/kubeclient/test/test_oidc_auth_provider.rb
deleted file mode 100644
index cdf325e9406..00000000000
--- a/vendor/gems/kubeclient/test/test_oidc_auth_provider.rb
+++ /dev/null
@@ -1,103 +0,0 @@
-require_relative 'test_helper'
-require 'openid_connect'
-
-class OIDCAuthProviderTest < MiniTest::Test
- def setup
- @client_id = 'client_id'
- @client_secret = 'client_secret'
- @idp_issuer_url = 'idp_issuer_url'
- @refresh_token = 'refresh_token'
- @id_token = 'id_token'
- @new_id_token = 'new_id_token'
- end
-
- def test_expired_token
- OpenIDConnect::Discovery::Provider::Config.stub(:discover!, discovery_mock) do
- OpenIDConnect::ResponseObject::IdToken.stub(:decode, id_token_mock(Time.now.to_i - 7200)) do
- OpenIDConnect::Client.stub(:new, openid_client_mock) do
- retrieved_id_token = Kubeclient::OIDCAuthProvider.token(
- 'client-id' => @client_id,
- 'client-secret' => @client_secret,
- 'id-token' => @id_token,
- 'idp-issuer-url' => @idp_issuer_url,
- 'refresh-token' => @refresh_token
- )
- assert_equal(@new_id_token, retrieved_id_token)
- end
- end
- end
- end
-
- def test_valid_token
- OpenIDConnect::Discovery::Provider::Config.stub(:discover!, discovery_mock) do
- OpenIDConnect::ResponseObject::IdToken.stub(:decode, id_token_mock(Time.now.to_i + 7200)) do
- retrieved_id_token = Kubeclient::OIDCAuthProvider.token(
- 'client-id' => @client_id,
- 'client-secret' => @client_secret,
- 'id-token' => @id_token,
- 'idp-issuer-url' => @idp_issuer_url,
- 'refresh-token' => @refresh_token
- )
- assert_equal(@id_token, retrieved_id_token)
- end
- end
- end
-
- def test_missing_id_token
- OpenIDConnect::Discovery::Provider::Config.stub(:discover!, discovery_mock) do
- OpenIDConnect::Client.stub(:new, openid_client_mock) do
- retrieved_id_token = Kubeclient::OIDCAuthProvider.token(
- 'client-id' => @client_id,
- 'client-secret' => @client_secret,
- 'idp-issuer-url' => @idp_issuer_url,
- 'refresh-token' => @refresh_token
- )
- assert_equal(@new_id_token, retrieved_id_token)
- end
- end
- end
-
- def test_token_with_unknown_kid
- OpenIDConnect::Discovery::Provider::Config.stub(:discover!, discovery_mock) do
- OpenIDConnect::ResponseObject::IdToken.stub(
- :decode, ->(_token, _jwks) { raise JSON::JWK::Set::KidNotFound }
- ) do
- OpenIDConnect::Client.stub(:new, openid_client_mock) do
- retrieved_id_token = Kubeclient::OIDCAuthProvider.token(
- 'client-id' => @client_id,
- 'client-secret' => @client_secret,
- 'id-token' => @id_token,
- 'idp-issuer-url' => @idp_issuer_url,
- 'refresh-token' => @refresh_token
- )
- assert_equal(@new_id_token, retrieved_id_token)
- end
- end
- end
- end
-
- private
-
- def openid_client_mock
- access_token = Minitest::Mock.new
- access_token.expect(@id_token, @new_id_token)
-
- openid_client = Minitest::Mock.new
- openid_client.expect(:refresh_token=, nil, [@refresh_token])
- openid_client.expect(:access_token!, access_token)
- end
-
- def id_token_mock(expiry)
- id_token_mock = Minitest::Mock.new
- id_token_mock.expect(:exp, expiry)
- end
-
- def discovery_mock
- discovery = Minitest::Mock.new
- discovery.expect(:jwks, 'jwks')
- discovery.expect(:authorization_endpoint, 'authz_endpoint')
- discovery.expect(:token_endpoint, 'token_endpoint')
- discovery.expect(:userinfo_endpoint, 'userinfo_endpoint')
- discovery
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_persistent_volume.rb b/vendor/gems/kubeclient/test/test_persistent_volume.rb
deleted file mode 100644
index 8b283868a1f..00000000000
--- a/vendor/gems/kubeclient/test/test_persistent_volume.rb
+++ /dev/null
@@ -1,29 +0,0 @@
-require_relative 'test_helper'
-
-# PersistentVolume tests
-class TestPersistentVolume < MiniTest::Test
- def test_get_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/persistentvolumes})
- .to_return(body: open_test_file('persistent_volume.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- volume = client.get_persistent_volume('pv0001')
-
- assert_instance_of(Kubeclient::Resource, volume)
- assert_equal('pv0001', volume.metadata.name)
- assert_equal('10Gi', volume.spec.capacity.storage)
- assert_equal('/tmp/data01', volume.spec.hostPath.path)
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1',
- times: 1
- )
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/persistentvolumes/pv0001',
- times: 1
- )
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_persistent_volume_claim.rb b/vendor/gems/kubeclient/test/test_persistent_volume_claim.rb
deleted file mode 100644
index e51d8562e60..00000000000
--- a/vendor/gems/kubeclient/test/test_persistent_volume_claim.rb
+++ /dev/null
@@ -1,28 +0,0 @@
-require_relative 'test_helper'
-
-# PersistentVolumeClaim tests
-class TestPersistentVolumeClaim < MiniTest::Test
- def test_get_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/persistentvolumeclaims})
- .to_return(body: open_test_file('persistent_volume_claim.json'), status: 200)
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- claim = client.get_persistent_volume_claim('myclaim-1', 'default')
-
- assert_instance_of(Kubeclient::Resource, claim)
- assert_equal('myclaim-1', claim.metadata.name)
- assert_equal('3Gi', claim.spec.resources.requests.storage)
- assert_equal('pv0001', claim.spec.volumeName)
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1',
- times: 1
- )
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/namespaces/default/persistentvolumeclaims/myclaim-1',
- times: 1
- )
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_pod.rb b/vendor/gems/kubeclient/test/test_pod.rb
deleted file mode 100644
index afad1774f5e..00000000000
--- a/vendor/gems/kubeclient/test/test_pod.rb
+++ /dev/null
@@ -1,81 +0,0 @@
-require_relative 'test_helper'
-
-# Pod entity tests
-class TestPod < MiniTest::Test
- def test_get_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/pods})
- .to_return(body: open_test_file('pod.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- pod = client.get_pod('redis-master-pod', 'default')
-
- assert_instance_of(Kubeclient::Resource, pod)
- assert_equal('redis-master3', pod.metadata.name)
- assert_equal('dockerfile/redis', pod.spec.containers[0]['image'])
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1',
- times: 1
- )
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod',
- times: 1
- )
- end
-
- def test_get_chunks
- stub_core_api_list
- stub_request(:get, %r{/pods})
- .to_return(body: open_test_file('pods_1.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- pods = client.get_pods(limit: 2)
-
- assert_equal(2, pods.count)
- assert_equal('eyJ2IjoibWV0YS5rOHMua', pods.continue)
-
- continue = pods.continue
-
- stub_request(:get, %r{/pods})
- .to_return(body: open_test_file('pods_2.json'), status: 200)
-
- pods = client.get_pods(limit: 2, continue: continue)
- assert_equal(2, pods.count)
- assert_nil(pods.continue)
-
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1',
- times: 1
- )
- assert_requested(
- :get,
- 'http://localhost:8080/api/v1/pods?limit=2',
- times: 1
- )
- assert_requested(
- :get,
- "http://localhost:8080/api/v1/pods?continue=#{continue}&limit=2",
- times: 1
- )
- end
-
- def test_get_chunks_410_gone
- stub_core_api_list
- stub_request(:get, %r{/pods})
- .to_return(body: open_test_file('pods_410.json'), status: 410)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
-
- err = assert_raises Kubeclient::HttpError do
- client.get_pods(limit: 2, continue: 'eyJ2IjoibWV0YS5')
- end
-
- assert_equal(err.message,
- "The provided from parameter is too old to display a consistent list result. \
-You must start a new list without the from.")
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_pod_log.rb b/vendor/gems/kubeclient/test/test_pod_log.rb
deleted file mode 100644
index d9ba3eaabbd..00000000000
--- a/vendor/gems/kubeclient/test/test_pod_log.rb
+++ /dev/null
@@ -1,157 +0,0 @@
-require_relative 'test_helper'
-
-# Pod log tests
-class TestPodLog < MiniTest::Test
- def test_get_pod_log
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log})
- .to_return(body: open_test_file('pod_log.txt'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- retrieved_log = client.get_pod_log('redis-master-pod', 'default')
-
- assert_equal(open_test_file('pod_log.txt').read, retrieved_log)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log',
- times: 1)
- end
-
- def test_get_pod_log_container
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log})
- .to_return(body: open_test_file('pod_log.txt'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- retrieved_log = client.get_pod_log('redis-master-pod', 'default', container: 'ruby')
-
- assert_equal(open_test_file('pod_log.txt').read, retrieved_log)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log?container=ruby',
- times: 1)
- end
-
- def test_get_pod_log_since_time
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log})
- .to_return(body: open_test_file('pod_log.txt'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- retrieved_log = client.get_pod_log('redis-master-pod',
- 'default',
- timestamps: true,
- since_time: '2018-04-27T18:30:17.480321984Z')
-
- assert_equal(open_test_file('pod_log.txt').read, retrieved_log)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log?sinceTime=2018-04-27T18:30:17.480321984Z&timestamps=true',
- times: 1)
- end
-
- def test_get_pod_log_tail_lines
- selected_lines = open_test_file('pod_log.txt').to_a[-2..1].join
-
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log})
- .to_return(body: selected_lines,
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- retrieved_log = client.get_pod_log('redis-master-pod',
- 'default',
- tail_lines: 2)
-
- assert_equal(selected_lines, retrieved_log)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log?tailLines=2',
- times: 1)
- end
-
- def test_get_pod_limit_bytes
- selected_bytes = open_test_file('pod_log.txt').read(10)
-
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log})
- .to_return(body: selected_bytes,
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- retrieved_log = client.get_pod_log('redis-master-pod',
- 'default',
- limit_bytes: 10)
-
- assert_equal(selected_bytes, retrieved_log)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/default/pods/redis-master-pod/log?limitBytes=10',
- times: 1)
- end
-
- def test_watch_pod_log
- file = open_test_file('pod_log.txt')
- expected_lines = file.read.split("\n")
-
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log\?.*follow})
- .to_return(body: file, status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
-
- stream = client.watch_pod_log('redis-master-pod', 'default')
- stream.to_enum.with_index do |notice, index|
- assert_instance_of(String, notice)
- assert_equal(expected_lines[index], notice)
- end
- end
-
- def test_watch_pod_log_with_block
- file = open_test_file('pod_log.txt')
- first = file.readlines.first.chomp
-
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log\?.*follow})
- .to_return(body: file, status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
-
- client.watch_pod_log('redis-master-pod', 'default') do |line|
- assert_equal first, line
- break
- end
- end
-
- def test_watch_pod_log_follow_redirect
- expected_lines = open_test_file('pod_log.txt').read.split("\n")
- redirect = 'http://localhost:1234/api/namespaces/default/pods/redis-master-pod/log'
-
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log\?.*follow})
- .to_return(status: 302, headers: { location: redirect })
-
- stub_request(:get, redirect)
- .to_return(body: open_test_file('pod_log.txt'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- stream = client.watch_pod_log('redis-master-pod', 'default')
- stream.to_enum.with_index do |notice, index|
- assert_instance_of(String, notice)
- assert_equal(expected_lines[index], notice)
- end
- end
-
- def test_watch_pod_log_max_redirect
- redirect = 'http://localhost:1234/api/namespaces/default/pods/redis-master-pod/log'
-
- stub_request(:get, %r{/namespaces/default/pods/[a-z0-9-]+/log\?.*follow})
- .to_return(status: 302, headers: { location: redirect })
-
- stub_request(:get, redirect)
- .to_return(body: open_test_file('pod_log.txt'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1', http_max_redirects: 0)
- assert_raises(Kubeclient::HttpError) do
- client.watch_pod_log('redis-master-pod', 'default').each do
- end
- end
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_process_template.rb b/vendor/gems/kubeclient/test/test_process_template.rb
deleted file mode 100644
index e3b4670fb87..00000000000
--- a/vendor/gems/kubeclient/test/test_process_template.rb
+++ /dev/null
@@ -1,80 +0,0 @@
-require_relative 'test_helper'
-
-# Process Template tests
-class TestProcessTemplate < MiniTest::Test
- def test_process_template
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- template = {}
- template[:metadata] = {}
- template[:metadata][:name] = 'my-template'
- template[:metadata][:namespace] = 'default'
- template[:kind] = 'Template'
- template[:apiVersion] = 'v1'
- service = {}
- service[:metadata] = {}
- service[:metadata][:name] = '${NAME_PREFIX}my-service'
- service[:kind] = 'Service'
- service[:apiVersion] = 'v1'
- template[:objects] = [service]
- param = { name: 'NAME_PREFIX', value: 'test/' }
- template[:parameters] = [param]
-
- req_body = '{"metadata":{"name":"my-template","namespace":"default"},' \
- '"kind":"Template","apiVersion":"v1","objects":[{"metadata":' \
- '{"name":"${NAME_PREFIX}my-service"},"kind":"Service","apiVersion":"v1"}],' \
- '"parameters":[{"name":"NAME_PREFIX","value":"test/"}]}'
-
- expected_url = 'http://localhost:8080/api/v1/namespaces/default/processedtemplates'
- stub_request(:post, expected_url)
- .with(body: req_body, headers: { 'Content-Type' => 'application/json' })
- .to_return(body: open_test_file('processed_template.json'), status: 200)
-
- processed_template = client.process_template(template)
-
- assert_equal('test/my-service', processed_template['objects'].first['metadata']['name'])
-
- assert_requested(:post, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- data['kind'] == 'Template' &&
- data['apiVersion'] == 'v1' &&
- data['metadata']['name'] == 'my-template' &&
- data['metadata']['namespace'] == 'default'
- end
- end
-
- # Ensure _template and _templates methods hit `/templates` rather than
- # `/processedtemplates` URL.
- def test_templates_methods
- stub_request(:get, %r{/apis/template\.openshift\.io/v1$}).to_return(
- body: open_test_file('template.openshift.io_api_resource_list.json'),
- status: 200
- )
- client = Kubeclient::Client.new('http://localhost:8080/apis/template.openshift.io', 'v1')
-
- expected_url = 'http://localhost:8080/apis/template.openshift.io/v1/namespaces/default/templates'
- stub_request(:get, expected_url)
- .to_return(body: open_test_file('template_list.json'), status: 200)
- client.get_templates(namespace: 'default')
- assert_requested(:get, expected_url, times: 1)
-
- expected_url = 'http://localhost:8080/apis/template.openshift.io/v1/namespaces/default/templates/my-template'
- stub_request(:get, expected_url)
- .to_return(body: open_test_file('template.json'), status: 200)
- client.get_template('my-template', 'default')
- assert_requested(:get, expected_url, times: 1)
- end
-
- def test_no_processedtemplates_methods
- stub_request(:get, %r{/apis/template\.openshift\.io/v1$}).to_return(
- body: open_test_file('template.openshift.io_api_resource_list.json'),
- status: 200
- )
- client = Kubeclient::Client.new('http://localhost:8080/apis/template.openshift.io', 'v1')
- client.discover
-
- refute_respond_to(client, :get_processedtemplates)
- refute_respond_to(client, :get_processedtemplate)
- refute_respond_to(client, :get_processed_templates)
- refute_respond_to(client, :get_processed_template)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_real_cluster.rb b/vendor/gems/kubeclient/test/test_real_cluster.rb
deleted file mode 100644
index 7ce9493a1bb..00000000000
--- a/vendor/gems/kubeclient/test/test_real_cluster.rb
+++ /dev/null
@@ -1,162 +0,0 @@
-require_relative 'test_helper'
-
-class KubeclientRealClusterTest < MiniTest::Test
- # Tests here actually connect to a cluster!
- # For simplicity, these tests use same config/*.kubeconfig files as test_config.rb,
- # so are intended to run from config/update_certs_k0s.rb script.
- def setup
- if ENV['KUBECLIENT_TEST_REAL_CLUSTER'] == 'true'
- WebMock.enable_net_connect!
- else
- skip('Requires real cluster, see test/config/update_certs_k0s.rb.')
- end
- end
-
- def teardown
- WebMock.disable_net_connect! # Don't allow any connections in other tests.
- end
-
- # Partially isolated tests that check Client behavior with given `verify_ssl` value:
-
- # localhost and 127.0.0.1 are among names on the certificate
- HOSTNAME_COVERED_BY_CERT = 'https://127.0.0.1:6443'.freeze
- # 127.0.0.2 also means localhost but is not included in the certificate.
- HOSTNAME_NOT_ON_CERT = 'https://127.0.0.2:6443'.freeze
-
- def test_real_cluster_verify_peer
- config = Kubeclient::Config.read(config_file('external.kubeconfig'))
- context = config.context
- client1 = Kubeclient::Client.new(
- HOSTNAME_COVERED_BY_CERT, 'v1',
- ssl_options: context.ssl_options.merge(verify_ssl: OpenSSL::SSL::VERIFY_PEER),
- auth_options: context.auth_options
- )
- check_cert_accepted(client1)
- client2 = Kubeclient::Client.new(
- HOSTNAME_NOT_ON_CERT, 'v1',
- ssl_options: context.ssl_options.merge(verify_ssl: OpenSSL::SSL::VERIFY_PEER),
- auth_options: context.auth_options
- )
- check_cert_rejected(client2)
- end
-
- def test_real_cluster_verify_none
- config = Kubeclient::Config.read(config_file('external.kubeconfig'))
- context = config.context
- client1 = Kubeclient::Client.new(
- HOSTNAME_COVERED_BY_CERT, 'v1',
- ssl_options: context.ssl_options.merge(verify_ssl: OpenSSL::SSL::VERIFY_NONE),
- auth_options: context.auth_options
- )
- check_cert_accepted(client1)
- client2 = Kubeclient::Client.new(
- HOSTNAME_NOT_ON_CERT, 'v1',
- ssl_options: context.ssl_options.merge(verify_ssl: OpenSSL::SSL::VERIFY_NONE),
- auth_options: context.auth_options
- )
- check_cert_accepted(client2)
- end
-
- # Integration tests that check combined Config -> Client behavior wrt. `verify_ssl`.
- # Quite redundant, but this was an embarrasing vulnerability so want to confirm...
-
- def test_real_cluster_concatenated_ca
- config = Kubeclient::Config.read(config_file('concatenated-ca.kubeconfig'))
- context = config.context
- client1 = Kubeclient::Client.new(
- HOSTNAME_COVERED_BY_CERT, 'v1',
- ssl_options: context.ssl_options, auth_options: context.auth_options
- )
- check_cert_accepted(client1)
- client2 = Kubeclient::Client.new(
- HOSTNAME_NOT_ON_CERT, 'v1',
- ssl_options: context.ssl_options, auth_options: context.auth_options
- )
- check_cert_rejected(client2)
- end
-
- def test_real_cluster_verify_ssl_with_ca
- config = Kubeclient::Config.read(config_file('external.kubeconfig'))
- context = config.context
- client1 = Kubeclient::Client.new(
- HOSTNAME_COVERED_BY_CERT, 'v1',
- ssl_options: context.ssl_options, auth_options: context.auth_options
- )
- check_cert_accepted(client1)
- client2 = Kubeclient::Client.new(
- HOSTNAME_NOT_ON_CERT, 'v1',
- ssl_options: context.ssl_options, auth_options: context.auth_options
- )
- check_cert_rejected(client2)
- end
-
- def test_real_cluster_verify_ssl_without_ca
- config = Kubeclient::Config.read(config_file('external-without-ca.kubeconfig'))
- context = config.context
- # Hostname matches cert but the local cluster uses self-signed certs from custom CA,
- # and this config omits CA data, so verification can't succeed.
- client1 = Kubeclient::Client.new(
- HOSTNAME_COVERED_BY_CERT, 'v1',
- ssl_options: context.ssl_options, auth_options: context.auth_options
- )
- check_cert_rejected(client1)
- client2 = Kubeclient::Client.new(
- HOSTNAME_NOT_ON_CERT, 'v1',
- ssl_options: context.ssl_options, auth_options: context.auth_options
- )
- check_cert_rejected(client2)
- end
-
- def test_real_cluster_insecure_without_ca
- config = Kubeclient::Config.read(config_file('insecure.kubeconfig'))
- context = config.context
- # Hostname matches cert but the local cluster uses self-signed certs from custom CA,
- # and this config omits CA data, so verification would fail;
- # however, this config specifies `insecure-skip-tls-verify: true` so any cert goes.
- client1 = Kubeclient::Client.new(
- HOSTNAME_COVERED_BY_CERT, 'v1',
- ssl_options: context.ssl_options, auth_options: context.auth_options
- )
- check_cert_accepted(client1)
- client2 = Kubeclient::Client.new(
- HOSTNAME_NOT_ON_CERT, 'v1',
- ssl_options: context.ssl_options, auth_options: context.auth_options
- )
- check_cert_accepted(client2)
- end
-
- private
-
- # Test cert checking on discovery, CRUD, and watch code paths.
- def check_cert_accepted(client)
- client.discover
- client.get_nodes
- exercise_watcher_with_timeout(client.watch_nodes)
- end
-
- def check_cert_rejected(client)
- # TODO: all OpenSSL exceptions should be wrapped with Kubeclient error.
- assert_raises(Kubeclient::HttpError, OpenSSL::SSL::SSLError) do
- client.discover
- end
- # Since discovery fails, methods like .get_nodes, .watch_nodes would all fail
- # on method_missing -> discover. Call lower-level methods to test actual connection.
- assert_raises(Kubeclient::HttpError, OpenSSL::SSL::SSLError) do
- client.get_entities('Node', 'nodes', {})
- end
- assert_raises(Kubeclient::HttpError, OpenSSL::SSL::SSLError) do
- exercise_watcher_with_timeout(client.watch_entities('nodes'))
- end
- end
-
- def exercise_watcher_with_timeout(watcher)
- thread = Thread.new do
- sleep(1)
- watcher.finish
- end
- watcher.each do |_notice|
- break
- end
- thread.join
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_replication_controller.rb b/vendor/gems/kubeclient/test/test_replication_controller.rb
deleted file mode 100644
index 47af72210e5..00000000000
--- a/vendor/gems/kubeclient/test/test_replication_controller.rb
+++ /dev/null
@@ -1,47 +0,0 @@
-require_relative 'test_helper'
-
-# Replication Controller entity tests
-class TestReplicationController < MiniTest::Test
- def test_get_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/replicationcontrollers})
- .to_return(body: open_test_file('replication_controller.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- rc = client.get_replication_controller('frontendController', 'default')
-
- assert_instance_of(Kubeclient::Resource, rc)
- assert_equal('guestbook-controller', rc.metadata.name)
- assert_equal('c71aa4c0-a240-11e4-a265-3c970e4a436a', rc.metadata.uid)
- assert_equal('default', rc.metadata.namespace)
- assert_equal(3, rc.spec.replicas)
- assert_equal('guestbook', rc.spec.selector.name)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/default/replicationcontrollers/frontendController',
- times: 1)
- end
-
- def test_delete_replicaset_cascade
- stub_core_api_list
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- opts = Kubeclient::Resource.new(
- apiVersion: 'meta/v1',
- gracePeriodSeconds: 0,
- kind: 'DeleteOptions',
- propagationPolicy: 'Foreground'
- )
-
- stub_request(:delete,
- 'http://localhost:8080/api/v1/namespaces/default/replicationcontrollers/frontendController')
- .with(body: opts.to_hash.to_json)
- .to_return(status: 200, body: open_test_file('replication_controller.json'), headers: {})
- rc = client.delete_replication_controller('frontendController', 'default', delete_options: opts)
- assert_kind_of(RecursiveOpenStruct, rc)
-
- assert_requested(:delete,
- 'http://localhost:8080/api/v1/namespaces/default/replicationcontrollers/frontendController',
- times: 1)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_resource_list_without_kind.rb b/vendor/gems/kubeclient/test/test_resource_list_without_kind.rb
deleted file mode 100644
index 89ab042b5f5..00000000000
--- a/vendor/gems/kubeclient/test/test_resource_list_without_kind.rb
+++ /dev/null
@@ -1,78 +0,0 @@
-require_relative 'test_helper'
-
-# Core api resource list without kind tests
-class TestResourceListWithoutKind < MiniTest::Test
- def test_get_from_json_api_v1
- stub_request(:get, %r{/api/v1$})
- .to_return(body: open_test_file('core_api_resource_list_without_kind.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- client.discover
-
- [
- {
- entity: 'pod',
- type: 'Pod',
- name: 'pods',
- methods: %w[pod pods]
- },
- {
- entity: 'node',
- type: 'Node',
- name: 'nodes',
- methods: %w[node nodes]
- },
- {
- entity: 'service',
- type: 'Service',
- name: 'services',
- methods: %w[service services]
- }
- ].each { |h| assert_entities(client.instance_variable_get(:@entities)[h[:entity]], h) }
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1',
- times: 1)
- end
-
- def test_get_from_json_oapi_v1
- stub_request(:get, %r{/oapi/v1$})
- .to_return(body: open_test_file('core_oapi_resource_list_without_kind.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/oapi/', 'v1')
- client.discover
-
- [
- {
- entity: 'template',
- type: 'Template',
- name: 'templates',
- methods: %w[template templates]
- },
- {
- entity: 'build',
- type: 'Build',
- name: 'builds',
- methods: %w[build builds]
- },
- {
- entity: 'project',
- type: 'Project',
- name: 'projects',
- methods: %w[project projects]
- }
- ].each { |h| assert_entities(client.instance_variable_get(:@entities)[h[:entity]], h) }
-
- assert_requested(:get,
- 'http://localhost:8080/oapi/v1',
- times: 1)
- end
-
- def assert_entities(entity, h)
- assert_equal(entity.entity_type, h[:type])
- assert_equal(entity.resource_name, h[:name])
- assert_equal(entity.method_names, h[:methods])
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_resource_quota.rb b/vendor/gems/kubeclient/test/test_resource_quota.rb
deleted file mode 100644
index cf91a111196..00000000000
--- a/vendor/gems/kubeclient/test/test_resource_quota.rb
+++ /dev/null
@@ -1,23 +0,0 @@
-require_relative 'test_helper'
-
-# ResourceQuota tests
-class TestResourceQuota < MiniTest::Test
- def test_get_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/resourcequotas})
- .to_return(body: open_test_file('resource_quota.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- quota = client.get_resource_quota('quota', 'quota-example')
-
- assert_instance_of(Kubeclient::Resource, quota)
- assert_equal('quota', quota.metadata.name)
- assert_equal('20', quota.spec.hard.cpu)
- assert_equal('10', quota.spec.hard.secrets)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/quota-example/resourcequotas/quota',
- times: 1)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_secret.rb b/vendor/gems/kubeclient/test/test_secret.rb
deleted file mode 100644
index ec129075a14..00000000000
--- a/vendor/gems/kubeclient/test/test_secret.rb
+++ /dev/null
@@ -1,62 +0,0 @@
-require_relative 'test_helper'
-
-# Namespace entity tests
-class TestSecret < MiniTest::Test
- def test_get_secret_v1
- stub_core_api_list
- stub_request(:get, %r{/secrets})
- .to_return(body: open_test_file('created_secret.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- secret = client.get_secret('test-secret', 'dev')
-
- assert_instance_of(Kubeclient::Resource, secret)
- assert_equal('4e38a198-2bcb-11e5-a483-0e840567604d', secret.metadata.uid)
- assert_equal('test-secret', secret.metadata.name)
- assert_equal('v1', secret.apiVersion)
- assert_equal('Y2F0J3MgYXJlIGF3ZXNvbWUK', secret.data['super-secret'])
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/dev/secrets/test-secret',
- times: 1)
- end
-
- def test_delete_secret_v1
- stub_core_api_list
- stub_request(:delete, %r{/secrets})
- .to_return(status: 200, body: open_test_file('created_secret.json'))
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- secret = client.delete_secret('test-secret', 'dev')
- assert_kind_of(RecursiveOpenStruct, secret)
-
- assert_requested(:delete,
- 'http://localhost:8080/api/v1/namespaces/dev/secrets/test-secret',
- times: 1)
- end
-
- def test_create_secret_v1
- stub_core_api_list
- stub_request(:post, %r{/secrets})
- .to_return(body: open_test_file('created_secret.json'),
- status: 201)
-
- secret = Kubeclient::Resource.new
- secret.metadata = {}
- secret.metadata.name = 'test-secret'
- secret.metadata.namespace = 'dev'
- secret.data = {}
- secret.data['super-secret'] = 'Y2F0J3MgYXJlIGF3ZXNvbWUK'
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- created_secret = client.create_secret(secret)
- assert_instance_of(Kubeclient::Resource, created_secret)
- assert_equal(secret.metadata.name, created_secret.metadata.name)
- assert_equal(secret.metadata.namespace, created_secret.metadata.namespace)
- assert_equal(
- secret.data['super-secret'],
- created_secret.data['super-secret']
- )
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_security_context_constraint.rb b/vendor/gems/kubeclient/test/test_security_context_constraint.rb
deleted file mode 100644
index 23e53c4464e..00000000000
--- a/vendor/gems/kubeclient/test/test_security_context_constraint.rb
+++ /dev/null
@@ -1,62 +0,0 @@
-require_relative 'test_helper'
-
-# kind: 'SecurityContextConstraints' entity tests.
-# This is one of the unusual `kind`s that are already plural (https://github.com/kubernetes/kubernetes/issues/8115).
-# We force singular in method names like 'create_endpoint',
-# but `kind` should remain plural as in kubernetes.
-class TestSecurityContextConstraints < MiniTest::Test
- def test_create_security_context_constraint
- stub_request(:get, %r{/apis/security.openshift.io/v1$}).to_return(
- body: open_test_file('security.openshift.io_api_resource_list.json'),
- status: 200
- )
-
- testing_scc = Kubeclient::Resource.new(
- metadata: {
- name: 'teleportation'
- },
- runAsUser: {
- type: 'MustRunAs'
- },
- seLinuxContext: {
- type: 'MustRunAs'
- }
- )
- req_body = '{"metadata":{"name":"teleportation"},"runAsUser":{"type":"MustRunAs"},' \
- '"seLinuxContext":{"type":"MustRunAs"},' \
- '"kind":"SecurityContextConstraints","apiVersion":"security.openshift.io/v1"}'
-
- stub_request(:post, 'http://localhost:8080/apis/security.openshift.io/v1/securitycontextconstraints')
- .with(body: req_body)
- .to_return(body: open_test_file('created_security_context_constraint.json'), status: 201)
-
- client = Kubeclient::Client.new('http://localhost:8080/apis/security.openshift.io', 'v1')
- created_scc = client.create_security_context_constraint(testing_scc)
- assert_equal('SecurityContextConstraints', created_scc.kind)
- assert_equal('security.openshift.io/v1', created_scc.apiVersion)
-
- client = Kubeclient::Client.new('http://localhost:8080/apis/security.openshift.io', 'v1',
- as: :parsed_symbolized)
- created_scc = client.create_security_context_constraint(testing_scc)
- assert_equal('SecurityContextConstraints', created_scc[:kind])
- assert_equal('security.openshift.io/v1', created_scc[:apiVersion])
- end
-
- def test_get_security_context_constraints
- stub_request(:get, %r{/apis/security.openshift.io/v1$}).to_return(
- body: open_test_file('security.openshift.io_api_resource_list.json'),
- status: 200
- )
- stub_request(:get, %r{/securitycontextconstraints})
- .to_return(body: open_test_file('security_context_constraint_list.json'), status: 200)
- client = Kubeclient::Client.new('http://localhost:8080/apis/security.openshift.io', 'v1')
-
- collection = client.get_security_context_constraints(as: :parsed_symbolized)
- assert_equal('SecurityContextConstraintsList', collection[:kind])
- assert_equal('security.openshift.io/v1', collection[:apiVersion])
-
- # Stripping of 'List' in collection.kind RecursiveOpenStruct mode only is historic.
- collection = client.get_security_context_constraints
- assert_equal('SecurityContextConstraints', collection.kind)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_service.rb b/vendor/gems/kubeclient/test/test_service.rb
deleted file mode 100644
index 6ef3368780d..00000000000
--- a/vendor/gems/kubeclient/test/test_service.rb
+++ /dev/null
@@ -1,357 +0,0 @@
-require_relative 'test_helper'
-
-# Service entity tests
-class TestService < MiniTest::Test
- def test_construct_our_own_service
- our_service = Kubeclient::Resource.new
- our_service.metadata = {}
- our_service.metadata.name = 'guestbook'
- our_service.metadata.namespace = 'staging'
- our_service.metadata.labels = {}
- our_service.metadata.labels.name = 'guestbook'
-
- our_service.spec = {}
- our_service.spec.ports = [{
- 'port' => 3000,
- 'targetPort' => 'http-server',
- 'protocol' => 'TCP'
- }]
-
- assert_equal('guestbook', our_service.metadata.labels.name)
-
- hash = our_service.to_h
-
- assert_equal(our_service.metadata.labels.name,
- hash[:metadata][:labels][:name])
-
- expected_url = 'http://localhost:8080/api/v1/namespaces/staging/services'
- stub_core_api_list
- stub_request(:post, expected_url)
- .to_return(body: open_test_file('created_service.json'), status: 201)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- created = client.create_service(our_service)
-
- assert_instance_of(Kubeclient::Resource, created)
- assert_equal(created.metadata.name, our_service.metadata.name)
- assert_equal(created.spec.ports.size, our_service.spec.ports.size)
-
- # Check that original entity_config is not modified by kind/apiVersion patches:
- assert_nil(our_service.kind)
-
- assert_requested(:post, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- data['kind'] == 'Service' &&
- data['apiVersion'] == 'v1' &&
- data['metadata']['name'] == 'guestbook' &&
- data['metadata']['namespace'] == 'staging'
- end
- end
-
- def test_construct_service_from_symbol_keys
- service = Kubeclient::Resource.new
- service.metadata = {
- labels: { tier: 'frontend' },
- name: 'test-service',
- namespace: 'staging'
- }
- service.spec = {
- ports: [{
- port: 3000,
- targetPort: 'http-server',
- protocol: 'TCP'
- }]
- }
-
- expected_url = 'http://localhost:8080/api/v1/namespaces/staging/services'
- stub_core_api_list
- stub_request(:post, expected_url)
- .to_return(body: open_test_file('created_service.json'), status: 201)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- client.create_service(service)
-
- assert_requested(:post, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- data['kind'] == 'Service' &&
- data['apiVersion'] == 'v1' &&
- data['metadata']['name'] == 'test-service' &&
- data['metadata']['labels']['tier'] == 'frontend' &&
- data['metadata']['namespace'] == 'staging'
- end
- end
-
- def test_construct_service_from_string_keys
- service = Kubeclient::Resource.new
- service.metadata = {
- 'labels' => { 'tier' => 'frontend' },
- 'name' => 'test-service',
- 'namespace' => 'staging'
- }
- service.spec = {
- 'ports' => [{
- 'port' => 3000,
- 'targetPort' => 'http-server',
- 'protocol' => 'TCP'
- }]
- }
-
- stub_core_api_list
- expected_url = 'http://localhost:8080/api/v1/namespaces/staging/services'
- stub_request(:post, %r{namespaces/staging/services})
- .to_return(body: open_test_file('created_service.json'), status: 201)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- client.create_service(service)
-
- assert_requested(:post, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- data['kind'] == 'Service' &&
- data['apiVersion'] == 'v1' &&
- data['metadata']['name'] == 'test-service' &&
- data['metadata']['labels']['tier'] == 'frontend' &&
- data['metadata']['namespace'] == 'staging'
- end
- end
-
- def test_conversion_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/services})
- .to_return(body: open_test_file('service.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- service = client.get_service('redis-slave', 'development')
-
- assert_instance_of(Kubeclient::Resource, service)
- assert_equal('2015-04-05T13:00:31Z',
- service.metadata.creationTimestamp)
- assert_equal('bdb80a8f-db93-11e4-b293-f8b156af4ae1', service.metadata.uid)
- assert_equal('redis-slave', service.metadata.name)
- assert_equal('2815', service.metadata.resourceVersion)
- assert_equal('v1', service.apiVersion)
- assert_equal('10.0.0.140', service.spec.clusterIP)
- assert_equal('development', service.metadata.namespace)
-
- assert_equal('TCP', service.spec.ports[0].protocol)
- assert_equal(6379, service.spec.ports[0].port)
- assert_equal('', service.spec.ports[0].name)
- assert_equal('redis-server', service.spec.ports[0].targetPort)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/development/services/redis-slave',
- times: 1)
- end
-
- def test_delete_service
- our_service = Kubeclient::Resource.new
- our_service.name = 'redis-service'
- # TODO, new ports assignment to be added
- our_service.labels = {}
- our_service.labels.component = 'apiserver'
- our_service.labels.provider = 'kubernetes'
-
- stub_core_api_list
- stub_request(:delete, %r{/namespaces/default/services})
- .to_return(body: open_test_file('service.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- our_service = client.delete_service(our_service.name, 'default')
- assert_kind_of(RecursiveOpenStruct, our_service)
-
- assert_requested(:delete,
- 'http://localhost:8080/api/v1/namespaces/default/services/redis-service',
- times: 1)
- end
-
- def test_get_service_no_ns
- stub_core_api_list
- # when not specifying namespace for entities which
- # are not node or namespace, the request will fail
- stub_request(:get, %r{/services/redis-slave})
- .to_return(status: 404)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
-
- exception = assert_raises(Kubeclient::HttpError) do
- client.get_service('redis-slave')
- end
- assert_equal(404, exception.error_code)
- end
-
- def test_get_service
- stub_core_api_list
- stub_request(:get, %r{/namespaces/development/services/redis-slave})
- .to_return(body: open_test_file('service.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/')
- service = client.get_service('redis-slave', 'development')
- assert_equal('redis-slave', service.metadata.name)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/namespaces/development/services/redis-slave',
- times: 1)
- end
-
- def test_update_service
- service = Kubeclient::Resource.new
- name = 'my_service'
-
- service.metadata = {}
- service.metadata.name = name
- service.metadata.namespace = 'development'
-
- stub_core_api_list
- expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}"
- stub_request(:put, expected_url)
- .to_return(body: open_test_file('service_update.json'), status: 201)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- service = client.update_service(service)
- assert_kind_of(RecursiveOpenStruct, service)
-
- assert_requested(:put, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- data['metadata']['name'] == name &&
- data['metadata']['namespace'] == 'development'
- end
- end
-
- def test_update_service_with_string_keys
- service = Kubeclient::Resource.new
- name = 'my_service'
-
- service.metadata = {
- 'name' => name,
- 'namespace' => 'development'
- }
-
- stub_core_api_list
- expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}"
- stub_request(:put, expected_url)
- .to_return(body: open_test_file('service_update.json'), status: 201)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- service = client.update_service(service)
- assert_kind_of(RecursiveOpenStruct, service)
-
- assert_requested(:put, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- data['metadata']['name'] == name &&
- data['metadata']['namespace'] == 'development'
- end
- end
-
- def test_patch_service
- service = Kubeclient::Resource.new
- name = 'my_service'
-
- service.metadata = {}
- service.metadata.name = name
- service.metadata.namespace = 'development'
-
- stub_core_api_list
- expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}"
- stub_request(:patch, expected_url)
- .to_return(body: open_test_file('service_patch.json'), status: 200)
-
- patch = {
- metadata: {
- annotations: {
- key: 'value'
- }
- }
- }
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- service = client.patch_service(name, patch, 'development')
- assert_kind_of(RecursiveOpenStruct, service)
-
- assert_requested(:patch, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- data['metadata']['annotations']['key'] == 'value'
- end
- end
-
- def test_apply_service
- service = Kubeclient::Resource.new
- name = 'my_service'
-
- service.metadata = {}
- service.metadata.name = name
- service.metadata.namespace = 'development'
- service.metadata.annotations = {}
- service.metadata.annotations['key'] = 'value'
-
- stub_core_api_list
- resource_name = "#{name}?fieldManager=myapp&force=true"
- expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{resource_name}"
- stub_request(:patch, expected_url)
- .to_return(body: open_test_file('service_patch.json'), status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- service = client.apply_service(service, field_manager: 'myapp')
- assert_kind_of(RecursiveOpenStruct, service)
-
- assert_requested(:patch, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- req.headers['Content-Type'] == 'application/apply-patch+yaml' &&
- data['metadata']['annotations']['key'] == 'value'
- end
- end
-
- def test_json_patch_service
- service = Kubeclient::Resource.new
- name = 'my-service'
-
- service.metadata = {}
- service.metadata.name = name
- service.metadata.namespace = 'development'
-
- stub_core_api_list
- expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}"
- stub_request(:patch, expected_url)
- .to_return(body: open_test_file('service_json_patch.json'), status: 200)
-
- patch = [
- { 'op' => 'add', 'path' => '/spec/type', 'value' => 'LoadBalancer' }
- ]
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- service = client.json_patch_service(name, patch, 'development')
- assert_kind_of(RecursiveOpenStruct, service)
-
- assert_requested(:patch, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- req.headers['Content-Type'] == 'application/json-patch+json' &&
- data == patch
- end
- end
-
- def test_merge_patch_service
- service = Kubeclient::Resource.new
- name = 'my-service'
-
- service.metadata = {}
- service.metadata.name = name
- service.metadata.namespace = 'development'
-
- stub_core_api_list
- expected_url = "http://localhost:8080/api/v1/namespaces/development/services/#{name}"
- stub_request(:patch, expected_url)
- .to_return(body: open_test_file('service_merge_patch.json'), status: 200)
-
- patch = { spec: { type: 'NodePort' } }
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- service = client.merge_patch_service(name, patch, 'development')
- assert_kind_of(RecursiveOpenStruct, service)
-
- assert_requested(:patch, expected_url, times: 1) do |req|
- data = JSON.parse(req.body)
- req.headers['Content-Type'] == 'application/merge-patch+json' &&
- data['spec']['type'] == 'NodePort'
- end
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_service_account.rb b/vendor/gems/kubeclient/test/test_service_account.rb
deleted file mode 100644
index 87a08a215bd..00000000000
--- a/vendor/gems/kubeclient/test/test_service_account.rb
+++ /dev/null
@@ -1,26 +0,0 @@
-require_relative 'test_helper'
-
-# ServiceAccount tests
-class TestServiceAccount < MiniTest::Test
- def test_get_from_json_v1
- stub_core_api_list
- stub_request(:get, %r{/serviceaccounts})
- .to_return(body: open_test_file('service_account.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- account = client.get_service_account('default')
-
- assert_instance_of(Kubeclient::Resource, account)
- assert_equal('default', account.metadata.name)
- assert_equal('default-token-6s23q', account.secrets[0].name)
- assert_equal('default-dockercfg-62tf3', account.secrets[1].name)
-
- assert_requested(:get,
- 'http://localhost:8080/api/v1/serviceaccounts/default',
- times: 1)
- assert_requested(:get,
- 'http://localhost:8080/api/v1',
- times: 1)
- end
-end
diff --git a/vendor/gems/kubeclient/test/test_watch.rb b/vendor/gems/kubeclient/test/test_watch.rb
deleted file mode 100644
index 8d74008c851..00000000000
--- a/vendor/gems/kubeclient/test/test_watch.rb
+++ /dev/null
@@ -1,195 +0,0 @@
-require_relative 'test_helper'
-
-# Watch entity tests
-class TestWatch < MiniTest::Test
- def test_watch_pod_success
- stub_core_api_list
-
- expected = [
- { 'type' => 'ADDED', 'resourceVersion' => '1389' },
- { 'type' => 'MODIFIED', 'resourceVersion' => '1390' },
- { 'type' => 'DELETED', 'resourceVersion' => '1398' }
- ]
-
- stub_request(:get, %r{/watch/pods})
- .to_return(body: open_test_file('watch_stream.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
-
- client.watch_pods.to_enum.with_index do |notice, index|
- assert_instance_of(Kubeclient::Resource, notice)
- assert_equal(expected[index]['type'], notice.type)
- assert_equal('Pod', notice.object.kind)
- assert_equal('php', notice.object.metadata.name)
- assert_equal(expected[index]['resourceVersion'],
- notice.object.metadata.resourceVersion)
- end
- end
-
- def test_watch_pod_block
- stub_core_api_list
- stub_request(:get, %r{/watch/pods})
- .to_return(body: open_test_file('watch_stream.json'),
- status: 200)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- yielded = []
- client.watch_pods { |notice| yielded << notice.type }
-
- assert_equal %w[ADDED MODIFIED DELETED], yielded
- end
-
- def test_watch_pod_raw
- stub_core_api_list
-
- stub_request(:get, %r{/watch/pods}).to_return(
- body: open_test_file('watch_stream.json'),
- status: 200
- )
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
-
- got = nil
- client.watch_pods(as: :raw).each { |notice| got = notice }
- assert_match(/\A{"type":"DELETED"/, got)
- end
-
- def test_watch_pod_failure
- stub_core_api_list
- stub_request(:get, %r{/watch/pods}).to_return(status: 404)
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
- assert_raises(Kubeclient::HttpError) do
- client.watch_pods.each do
- end
- end
- end
-
- def test_watch_pod_follow_redirect
- stub_core_api_list
-
- redirect = 'http://localhost:1234/api/v1/watch/pods'
- stub_request(:get, %r{/watch/pods})
- .to_return(status: 302, headers: { location: redirect })
-
- stub_request(:get, redirect).to_return(
- body: open_test_file('watch_stream.json'),
- status: 200
- )
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1')
-
- got = nil
- client.watch_pods.each { |notice| got = notice }
- assert_equal('DELETED', got.type)
- end
-
- def test_watch_pod_max_redirect
- stub_core_api_list
-
- redirect = 'http://localhost:1234/api/v1/watcher/pods'
- stub_request(:get, %r{/watch/pods})
- .to_return(status: 302, headers: { location: redirect })
-
- stub_request(:get, redirect).to_return(
- body: open_test_file('watch_stream.json'),
- status: 200
- )
-
- client = Kubeclient::Client.new('http://localhost:8080/api/', 'v1', http_max_redirects: 0)
-
- assert_raises(Kubeclient::HttpError) do
- client.watch_pods.each do
- end
- end
- end
-
- # Ensure that WatchStream respects a format that's not JSON
- def test_watch_stream_text
- url = 'http://www.example.com/foobar'
- expected_lines = open_test_file('pod_log.txt').read.split("\n")
-
- stub_request(:get, url)
- .to_return(body: open_test_file('pod_log.txt'),
- status: 200)
-
- stream = Kubeclient::Common::WatchStream.new(URI.parse(url), {}, formatter: ->(v) { v })
- stream.to_enum.with_index do |line, index|
- assert_instance_of(String, line)
- assert_equal(expected_lines[index], line)
- end
- end
-
- def test_watch_with_resource_version
- api_host = 'http://localhost:8080/api'
- version = '1995'
- stub_core_api_list
- stub_request(:get, %r{.*\/watch/events})
- .to_return(body: open_test_file('watch_stream.json'),
- status: 200)
-
- client = Kubeclient::Client.new(api_host, 'v1')
- results = client.watch_events(version).to_enum
-
- assert_equal(3, results.count)
- assert_requested(:get,
- "#{api_host}/v1/watch/events?resourceVersion=#{version}",
- times: 1)
- end
-
- def test_watch_with_label_selector
- api_host = 'http://localhost:8080/api'
- selector = 'name=redis-master'
-
- stub_core_api_list
- stub_request(:get, %r{.*\/watch/events})
- .to_return(body: open_test_file('watch_stream.json'),
- status: 200)
-
- client = Kubeclient::Client.new(api_host, 'v1')
- results = client.watch_events(label_selector: selector).to_enum
-
- assert_equal(3, results.count)
- assert_requested(:get,
- "#{api_host}/v1/watch/events?labelSelector=#{selector}",
- times: 1)
- end
-
- def test_watch_with_field_selector
- api_host = 'http://localhost:8080/api'
- selector = 'involvedObject.kind=Pod'
-
- stub_core_api_list
- stub_request(:get, %r{.*\/watch/events})
- .to_return(body: open_test_file('watch_stream.json'),
- status: 200)
-
- client = Kubeclient::Client.new(api_host, 'v1')
- results = client.watch_events(field_selector: selector).to_enum
-
- assert_equal(3, results.count)
- assert_requested(:get,
- "#{api_host}/v1/watch/events?fieldSelector=#{selector}",
- times: 1)
- end
-
- def test_watch_with_finish_and_ebadf
- api_host = 'http://localhost:8080/api'
-
- stub_core_api_list
- stub_request(:get, %r{.*\/watch/events})
- .to_return(body: open_test_file('watch_stream.json'), status: 200)
-
- client = Kubeclient::Client.new(api_host, 'v1')
- watcher = client.watch_events
-
- # explodes when StandardError is not caught
- watcher.each do
- watcher.finish
- raise StandardError
- end
-
- assert_requested(:get, "#{api_host}/v1/watch/events", times: 1)
- end
-end
diff --git a/vendor/gems/kubeclient/test/txt/pod_log.txt b/vendor/gems/kubeclient/test/txt/pod_log.txt
deleted file mode 100644
index 9f9a75157aa..00000000000
--- a/vendor/gems/kubeclient/test/txt/pod_log.txt
+++ /dev/null
@@ -1,6 +0,0 @@
-Initializing server...
-...loaded configuration
-...updated settings
-...discovered local servers
-...frobinated disks
-Complete!
diff --git a/vendor/gems/kubeclient/test/valid_token_file b/vendor/gems/kubeclient/test/valid_token_file
deleted file mode 100644
index df2c2eb6572..00000000000
--- a/vendor/gems/kubeclient/test/valid_token_file
+++ /dev/null
@@ -1 +0,0 @@
-valid_token