def createKube(self):
        if "TEST_KUBERNETES" not in os.environ:
            raise SkipTest(
                "kubernetes integration tests only run when environment "
                "variable TEST_KUBERNETES is set")

        self.kube = kubeclientservice.KubeClientService(
            kubeclientservice.KubeCtlProxyConfigLoader())
 def test_verify_is_forwarded_to_keywords(self):
     self.config = config = kubeclientservice.KubeHardcodedConfig(
         master_url="http://localhost:8001",
         namespace="default",
         verify="/path/to/pem")
     service = kubeclientservice.KubeClientService(config)
     url, kwargs = yield service._prepareRequest("/test", {})
     self.assertEqual('/path/to/pem', kwargs['verify'])
示例#3
0
 def createKube(self):
     self.kube = kubeclientservice.KubeClientService(
         kubeclientservice.KubeHardcodedConfig(master_url='http://m'))
     self.http = fakehttp.HTTPClientService('http://m')
     self.kube.get = self.http.get
     self.kube.post = self.http.post
     self.kube.put = self.http.put
     self.kube.delete = self.http.delete
 def test_verify_bearerToken_is_expanded(self):
     self.config = config = kubeclientservice.KubeHardcodedConfig(
         master_url="http://localhost:8001",
         namespace="default",
         verify="/path/to/pem",
         bearerToken=Interpolate("%(kw:test)s", test=10))
     service = kubeclientservice.KubeClientService(config)
     url, kwargs = yield service._prepareRequest("/test", {})
     self.assertEqual("Bearer 10", kwargs['headers']['Authorization'])
 def test_verify_headers_are_passed_to_the_query(self):
     self.config = config = kubeclientservice.KubeHardcodedConfig(
         master_url="http://localhost:8001",
         namespace="default",
         verify="/path/to/pem",
         headers={'Test': '10'})
     service = kubeclientservice.KubeClientService(config)
     url, kwargs = yield service._prepareRequest("/test", {})
     self.assertEqual({'Test': '10'}, kwargs['headers'])
示例#6
0
    def test_verify_basicAuth_is_expanded(self):
        self.config = config = kubeclientservice.KubeHardcodedConfig(
            master_url="http://localhost:8001",
            namespace="default",
            verify="/path/to/pem",
            basicAuth={'user': '******', 'password': Interpolate("%(kw:test)s", test=10)})
        service = kubeclientservice.KubeClientService(config)
        url, kwargs = yield service._prepareRequest("/test", {})

        expected = "Basic {0}".format(base64.b64encode("name:10".encode('utf-8')))
        self.assertEqual(expected, kwargs['headers']['Authorization'])
 def test_the_configuration_parent_is_set_to_the_service(self):
     # This is needed to allow secret expansion
     self.config = config = kubeclientservice.KubeHardcodedConfig(
         master_url="http://localhost:8001")
     service = kubeclientservice.KubeClientService(config)
     self.assertEqual(service, self.config.parent)