k8s-client 0.8.1 → 0.8.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: '07159856646ed2fb7cf99551fe1a559a99e840e77de8d93e1fd870250f50d028'
4
- data.tar.gz: 5d6482b1867217f957c3cb416e4c105305d81d904878800c96428e1a65c39a2b
3
+ metadata.gz: cf12325f19d80c009c489573c3ce561397d6ad5c190f8762e5b757c8667f0425
4
+ data.tar.gz: e919447858418b774ba475d94f3f314353d914f0e957ab5a699a70c679ed2e78
5
5
  SHA512:
6
- metadata.gz: 1d2b4f67c639661dba69ce55301e0ef1364765f94503108d7c3208990f78b73497d3bc651cd0a5876e513edcedda09b78dd25ae87739317a6bca4b35b53b9eac
7
- data.tar.gz: b325bcbc0ea0abb46d6d7f6a4ba7c2449110a7465cbd3e6255f76ebe4be80f8da87f86a00f1b6ecef0eb5b224bb1caad125f018e219e5786522df236f219b241
6
+ metadata.gz: 10e874c65467366c8d9876e1641f9491393923e7dd94adc30ccfd42e12e3ff2a721bd0720157a7edaa2621f221e7fe9fca3eff318d6ba0e9f469aa705f9c0afa
7
+ data.tar.gz: 04bd779fac44decaa636fb5c4876c6b6a415e5fc2177e6f1495a743868ca30ce01496a4ad77d5765b8385dbdd110dc68fdd14512f2423498eab579e7a37dcff2
@@ -70,7 +70,7 @@ module K8s
70
70
  if ENV.values_at('KUBE_TOKEN', 'KUBE_CA', 'KUBE_SERVER').none? { |v| v.nil? || v.empty? }
71
71
  configuration = K8s::Config.build(server: ENV['KUBE_SERVER'], ca: ENV['KUBE_CA'], auth_token: options[:auth_token] || ENV['KUBE_TOKEN'])
72
72
  elsif !ENV['KUBECONFIG'].to_s.empty?
73
- configuration = K8s::Config.from_kubeconfig_env(ENV['KUBECONFIG'], auth_token: options[:auth_token])
73
+ configuration = K8s::Config.from_kubeconfig_env(ENV['KUBECONFIG'])
74
74
  elsif File.exist?(File.join(Dir.home, '.kube', 'config'))
75
75
  configuration = K8s::Config.load_file(File.join(Dir.home, '.kube', 'config'))
76
76
  end
@@ -3,6 +3,6 @@
3
3
  module K8s
4
4
  class Client
5
5
  # Updated on releases using semver.
6
- VERSION = "0.8.1"
6
+ VERSION = "0.8.2"
7
7
  end
8
8
  end
@@ -315,7 +315,7 @@ module K8s
315
315
  query: make_query(
316
316
  'propagationPolicy' => propagationPolicy
317
317
  ),
318
- response_class: @resource_class, # XXX: documented as returning Status
318
+ response_class: @resource_class # XXX: documented as returning Status
319
319
  )
320
320
  end
321
321
 
@@ -333,7 +333,7 @@ module K8s
333
333
  'fieldSelector' => selector_query(fieldSelector),
334
334
  'propagationPolicy' => propagationPolicy
335
335
  ),
336
- response_class: K8s::API::MetaV1::List, # XXX: documented as returning Status
336
+ response_class: K8s::API::MetaV1::List # XXX: documented as returning Status
337
337
  )
338
338
  process_list(list)
339
339
  end
@@ -20,7 +20,7 @@ module K8s
20
20
  # These would lead to stack prune misbehaving if not skipped.
21
21
  PRUNE_IGNORE = [
22
22
  'v1:ComponentStatus', # apiserver ignores GET /v1/componentstatuses?labelSelector=... and returns all resources
23
- 'v1:Endpoints', # inherits stack label from service, but not checksum annotation
23
+ 'v1:Endpoints' # inherits stack label from service, but not checksum annotation
24
24
  ].freeze
25
25
 
26
26
  # @param name [String] unique name for stack
@@ -98,10 +98,10 @@ module K8s
98
98
  # @raise [Errno::ENOENT,Errno::EACCES] when /var/run/secrets/kubernetes.io/serviceaccount/ca.crt or /var/run/secrets/kubernetes.io/serviceaccount/token can not be read
99
99
  def self.in_cluster_config(**options)
100
100
  host = ENV['KUBERNETES_SERVICE_HOST'].to_s
101
- raise(K8s::Error::Config, "in_cluster_config failed: KUBERNETES_SERVICE_HOST environment not set") if host.empty?
101
+ raise(K8s::Error::Configuration, "in_cluster_config failed: KUBERNETES_SERVICE_HOST environment not set") if host.empty?
102
102
 
103
103
  port = ENV['KUBERNETES_SERVICE_PORT_HTTPS'].to_s
104
- raise(K8s::Error::Config, "in_cluster_config failed: KUBERNETES_SERVICE_HOST environment not set") if port.empty?
104
+ raise(K8s::Error::Configuration, "in_cluster_config failed: KUBERNETES_SERVICE_HOST environment not set") if port.empty?
105
105
 
106
106
  new(
107
107
  "https://#{host}:#{port}",
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: k8s-client
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.8.1
4
+ version: 0.8.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Kontena, Inc.
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-01-10 00:00:00.000000000 Z
11
+ date: 2019-01-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: excon