def test_parse_kubeconf_data_insecure(self): """ Test parsing kubeconf data with current context containing cluster, user, namespace info and skipping tls verification """ kubecfg_data = { "current-context": "context2", "contexts": [ {"name": "context1"}, {"name": "context2", "context": {"cluster": "cluster1", "user": "******", "namespace": "namespace1"}}, ], "clusters": [{"name": "cluster1", "cluster": {"insecure-skip-tls-verify": "true", "server": "server1"}}], "users": [{"name": "user1", "user": {"token": "token1"}}], } self.assertEqual( KubeConfig.parse_kubeconf_data(kubecfg_data), { "provider-api": "server1", "provider-auth": "token1", "namespace": "namespace1", "provider-tlsverify": False, "provider-cafile": None, }, )
def test_parse_kubeconf_data_cafile(self): """ Test parsing kubeconf data with current context containing cluster, user, namespace info and certificate-authority """ kubecfg_data = { "current-context": "context2", "contexts": [ {"name": "context1"}, {"name": "context2", "context": {"cluster": "cluster1", "user": "******", "namespace": "namespace1"}}, ], "clusters": [{"name": "cluster1", "cluster": {"certificate-authority": "/foo/bar", "server": "server1"}}], "users": [{"name": "user1", "user": {"token": "token1"}}], } self.assertEqual( KubeConfig.parse_kubeconf_data(kubecfg_data), { "provider-api": "server1", "provider-auth": "token1", "namespace": "namespace1", "provider-tlsverify": True, "provider-cafile": "/foo/bar", }, )
def test_parse_kubeconf_data_insecure(self): """ Test parsing kubeconf data with current context containing cluster, user, namespace info and skipping tls verification """ kubecfg_data = { 'current-context': 'context2', 'contexts': [ { 'name': 'context1', }, { 'name': 'context2', 'context': { 'cluster': 'cluster1', 'user': '******', 'namespace': 'namespace1' } } ], 'clusters': [ { 'name': 'cluster1', 'cluster': { 'insecure-skip-tls-verify': 'true', 'server': 'server1' } } ], 'users': [ { 'name': 'user1', 'user': { 'token': 'token1' } } ] } self.assertEqual(KubeConfig.parse_kubeconf_data(kubecfg_data), {'providerapi': 'server1', 'accesstoken': 'token1', 'namespace': 'namespace1', 'providertlsverify': False, 'providercafile': None})
def test_parse_kubeconf_data_cafile(self): """ Test parsing kubeconf data with current context containing cluster, user, namespace info and certificate-authority """ kubecfg_data = { 'current-context': 'context2', 'contexts': [ { 'name': 'context1', }, { 'name': 'context2', 'context': { 'cluster': 'cluster1', 'user': '******', 'namespace': 'namespace1' } } ], 'clusters': [ { 'name': 'cluster1', 'cluster': { 'certificate-authority': '/foo/bar', 'server': 'server1' } } ], 'users': [ { 'name': 'user1', 'user': { 'token': 'token1' } } ] } self.assertEqual(KubeConfig.parse_kubeconf_data(kubecfg_data), {'providerapi': 'server1', 'accesstoken': 'token1', 'namespace': 'namespace1', 'providertlsverify': True, 'providercafile': '/foo/bar'})
def test_parse_kubeconf_data_insecure(self): """ Test parsing kubeconf data with current context containing cluster, user, namespace info and skipping tls verification """ kubecfg_data = { 'current-context': 'context2', 'contexts': [{ 'name': 'context1', }, { 'name': 'context2', 'context': { 'cluster': 'cluster1', 'user': '******', 'namespace': 'namespace1' } }], 'clusters': [{ 'name': 'cluster1', 'cluster': { 'insecure-skip-tls-verify': 'true', 'server': 'server1' } }], 'users': [{ 'name': 'user1', 'user': { 'token': 'token1' } }] } self.assertEqual( KubeConfig.parse_kubeconf_data(kubecfg_data), { 'provider-api': 'server1', 'provider-auth': 'token1', 'namespace': 'namespace1', 'provider-tlsverify': False, 'provider-cafile': None })
def test_parse_kubeconf_data_cafile(self): """ Test parsing kubeconf data with current context containing cluster, user, namespace info and certificate-authority """ kubecfg_data = { 'current-context': 'context2', 'contexts': [{ 'name': 'context1', }, { 'name': 'context2', 'context': { 'cluster': 'cluster1', 'user': '******', 'namespace': 'namespace1' } }], 'clusters': [{ 'name': 'cluster1', 'cluster': { 'certificate-authority': '/foo/bar', 'server': 'server1' } }], 'users': [{ 'name': 'user1', 'user': { 'token': 'token1' } }] } self.assertEqual( KubeConfig.parse_kubeconf_data(kubecfg_data), { 'provider-api': 'server1', 'provider-auth': 'token1', 'namespace': 'namespace1', 'provider-tlsverify': True, 'provider-cafile': '/foo/bar' })