kubeclient 4.6.0 → 4.9.2

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of kubeclient might be problematic. Click here for more details.

Files changed (116) hide show
  1. checksums.yaml +4 -4
  2. data/.github/workflows/actions.yml +35 -0
  3. data/CHANGELOG.md +37 -0
  4. data/README.md +155 -37
  5. data/RELEASING.md +3 -1
  6. data/kubeclient.gemspec +5 -4
  7. data/lib/kubeclient.rb +1 -1
  8. data/lib/kubeclient/common.rb +35 -6
  9. data/lib/kubeclient/config.rb +17 -4
  10. data/lib/kubeclient/exec_credentials.rb +33 -4
  11. data/lib/kubeclient/google_application_default_credentials.rb +6 -1
  12. data/lib/kubeclient/version.rb +1 -1
  13. metadata +13 -217
  14. data/.travis.yml +0 -26
  15. data/test/cassettes/kubernetes_guestbook.yml +0 -879
  16. data/test/config/allinone.kubeconfig +0 -20
  17. data/test/config/execauth.kubeconfig +0 -62
  18. data/test/config/external-ca.pem +0 -18
  19. data/test/config/external-cert.pem +0 -19
  20. data/test/config/external-key.rsa +0 -27
  21. data/test/config/external.kubeconfig +0 -20
  22. data/test/config/gcpauth.kubeconfig +0 -22
  23. data/test/config/gcpcmdauth.kubeconfig +0 -26
  24. data/test/config/nouser.kubeconfig +0 -16
  25. data/test/config/oidcauth.kubeconfig +0 -25
  26. data/test/config/timestamps.kubeconfig +0 -25
  27. data/test/config/userauth.kubeconfig +0 -28
  28. data/test/json/bindings_list.json +0 -10
  29. data/test/json/component_status.json +0 -17
  30. data/test/json/component_status_list.json +0 -52
  31. data/test/json/config.istio.io_api_resource_list.json +0 -679
  32. data/test/json/config_map_list.json +0 -9
  33. data/test/json/core_api_resource_list.json +0 -181
  34. data/test/json/core_api_resource_list_without_kind.json +0 -129
  35. data/test/json/core_oapi_resource_list_without_kind.json +0 -197
  36. data/test/json/created_endpoint.json +0 -28
  37. data/test/json/created_namespace.json +0 -20
  38. data/test/json/created_secret.json +0 -16
  39. data/test/json/created_security_context_constraint.json +0 -65
  40. data/test/json/created_service.json +0 -31
  41. data/test/json/empty_pod_list.json +0 -9
  42. data/test/json/endpoint_list.json +0 -48
  43. data/test/json/entity_list.json +0 -56
  44. data/test/json/event_list.json +0 -35
  45. data/test/json/extensions_v1beta1_api_resource_list.json +0 -217
  46. data/test/json/limit_range.json +0 -23
  47. data/test/json/limit_range_list.json +0 -31
  48. data/test/json/namespace.json +0 -13
  49. data/test/json/namespace_exception.json +0 -8
  50. data/test/json/namespace_list.json +0 -32
  51. data/test/json/node.json +0 -29
  52. data/test/json/node_list.json +0 -37
  53. data/test/json/node_notice.json +0 -160
  54. data/test/json/persistent_volume.json +0 -37
  55. data/test/json/persistent_volume_claim.json +0 -32
  56. data/test/json/persistent_volume_claim_list.json +0 -40
  57. data/test/json/persistent_volume_claims_nil_items.json +0 -8
  58. data/test/json/persistent_volume_list.json +0 -45
  59. data/test/json/pod.json +0 -92
  60. data/test/json/pod_list.json +0 -79
  61. data/test/json/pod_template_list.json +0 -9
  62. data/test/json/pods_1.json +0 -265
  63. data/test/json/pods_2.json +0 -102
  64. data/test/json/pods_410.json +0 -9
  65. data/test/json/processed_template.json +0 -27
  66. data/test/json/replication_controller.json +0 -57
  67. data/test/json/replication_controller_list.json +0 -66
  68. data/test/json/resource_quota.json +0 -46
  69. data/test/json/resource_quota_list.json +0 -54
  70. data/test/json/secret_list.json +0 -44
  71. data/test/json/security.openshift.io_api_resource_list.json +0 -69
  72. data/test/json/security_context_constraint_list.json +0 -375
  73. data/test/json/service.json +0 -33
  74. data/test/json/service_account.json +0 -25
  75. data/test/json/service_account_list.json +0 -82
  76. data/test/json/service_illegal_json_404.json +0 -1
  77. data/test/json/service_json_patch.json +0 -26
  78. data/test/json/service_list.json +0 -97
  79. data/test/json/service_merge_patch.json +0 -26
  80. data/test/json/service_patch.json +0 -25
  81. data/test/json/service_update.json +0 -22
  82. data/test/json/template.json +0 -27
  83. data/test/json/template.openshift.io_api_resource_list.json +0 -75
  84. data/test/json/template_list.json +0 -35
  85. data/test/json/versions_list.json +0 -6
  86. data/test/json/watch_stream.json +0 -3
  87. data/test/test_common.rb +0 -95
  88. data/test/test_component_status.rb +0 -29
  89. data/test/test_config.rb +0 -222
  90. data/test/test_endpoint.rb +0 -54
  91. data/test/test_exec_credentials.rb +0 -125
  92. data/test/test_gcp_command_credentials.rb +0 -27
  93. data/test/test_google_application_default_credentials.rb +0 -15
  94. data/test/test_guestbook_go.rb +0 -235
  95. data/test/test_helper.rb +0 -18
  96. data/test/test_kubeclient.rb +0 -881
  97. data/test/test_limit_range.rb +0 -25
  98. data/test/test_missing_methods.rb +0 -80
  99. data/test/test_namespace.rb +0 -59
  100. data/test/test_node.rb +0 -70
  101. data/test/test_oidc_auth_provider.rb +0 -103
  102. data/test/test_persistent_volume.rb +0 -29
  103. data/test/test_persistent_volume_claim.rb +0 -28
  104. data/test/test_pod.rb +0 -81
  105. data/test/test_pod_log.rb +0 -157
  106. data/test/test_process_template.rb +0 -80
  107. data/test/test_replication_controller.rb +0 -47
  108. data/test/test_resource_list_without_kind.rb +0 -78
  109. data/test/test_resource_quota.rb +0 -23
  110. data/test/test_secret.rb +0 -62
  111. data/test/test_security_context_constraint.rb +0 -62
  112. data/test/test_service.rb +0 -330
  113. data/test/test_service_account.rb +0 -26
  114. data/test/test_watch.rb +0 -195
  115. data/test/txt/pod_log.txt +0 -6
  116. data/test/valid_token_file +0 -1
@@ -1,375 +0,0 @@
1
- {
2
- "kind": "SecurityContextConstraintsList",
3
- "apiVersion": "security.openshift.io/v1",
4
- "metadata": {
5
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints",
6
- "resourceVersion": "5751"
7
- },
8
- "items": [
9
- {
10
- "metadata": {
11
- "name": "anyuid",
12
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/anyuid",
13
- "uid": "12ba8540-ef00-11e8-b4c0-68f728fac3ab",
14
- "resourceVersion": "71",
15
- "creationTimestamp": "2018-11-23T09:13:42Z",
16
- "annotations": {
17
- "kubernetes.io/description": "anyuid provides all features of the restricted SCC but allows users to run with any UID and any GID."
18
- }
19
- },
20
- "priority": 10,
21
- "allowPrivilegedContainer": false,
22
- "defaultAddCapabilities": null,
23
- "requiredDropCapabilities": [
24
- "MKNOD"
25
- ],
26
- "allowedCapabilities": null,
27
- "allowHostDirVolumePlugin": false,
28
- "volumes": [
29
- "configMap",
30
- "downwardAPI",
31
- "emptyDir",
32
- "persistentVolumeClaim",
33
- "projected",
34
- "secret"
35
- ],
36
- "allowedFlexVolumes": null,
37
- "allowHostNetwork": false,
38
- "allowHostPorts": false,
39
- "allowHostPID": false,
40
- "allowHostIPC": false,
41
- "seLinuxContext": {
42
- "type": "MustRunAs"
43
- },
44
- "runAsUser": {
45
- "type": "RunAsAny"
46
- },
47
- "supplementalGroups": {
48
- "type": "RunAsAny"
49
- },
50
- "fsGroup": {
51
- "type": "RunAsAny"
52
- },
53
- "readOnlyRootFilesystem": false,
54
- "users": [],
55
- "groups": [
56
- "system:cluster-admins"
57
- ]
58
- },
59
- {
60
- "metadata": {
61
- "name": "hostaccess",
62
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostaccess",
63
- "uid": "12b5b3a2-ef00-11e8-b4c0-68f728fac3ab",
64
- "resourceVersion": "69",
65
- "creationTimestamp": "2018-11-23T09:13:42Z",
66
- "annotations": {
67
- "kubernetes.io/description": "hostaccess allows access to all host namespaces but still requires pods to be run with a UID and SELinux context that are allocated to the namespace. WARNING: this SCC allows host access to namespaces, file systems, and PIDS. It should only be used by trusted pods. Grant with caution."
68
- }
69
- },
70
- "priority": null,
71
- "allowPrivilegedContainer": false,
72
- "defaultAddCapabilities": null,
73
- "requiredDropCapabilities": [
74
- "KILL",
75
- "MKNOD",
76
- "SETUID",
77
- "SETGID"
78
- ],
79
- "allowedCapabilities": null,
80
- "allowHostDirVolumePlugin": true,
81
- "volumes": [
82
- "configMap",
83
- "downwardAPI",
84
- "emptyDir",
85
- "hostPath",
86
- "persistentVolumeClaim",
87
- "projected",
88
- "secret"
89
- ],
90
- "allowedFlexVolumes": null,
91
- "allowHostNetwork": true,
92
- "allowHostPorts": true,
93
- "allowHostPID": true,
94
- "allowHostIPC": true,
95
- "seLinuxContext": {
96
- "type": "MustRunAs"
97
- },
98
- "runAsUser": {
99
- "type": "MustRunAsRange"
100
- },
101
- "supplementalGroups": {
102
- "type": "RunAsAny"
103
- },
104
- "fsGroup": {
105
- "type": "MustRunAs"
106
- },
107
- "readOnlyRootFilesystem": false,
108
- "users": [],
109
- "groups": []
110
- },
111
- {
112
- "metadata": {
113
- "name": "hostmount-anyuid",
114
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostmount-anyuid",
115
- "uid": "12b512c0-ef00-11e8-b4c0-68f728fac3ab",
116
- "resourceVersion": "68",
117
- "creationTimestamp": "2018-11-23T09:13:42Z",
118
- "annotations": {
119
- "kubernetes.io/description": "hostmount-anyuid provides all the features of the restricted SCC but allows host mounts and any UID by a pod. This is primarily used by the persistent volume recycler. WARNING: this SCC allows host file system access as any UID, including UID 0. Grant with caution."
120
- }
121
- },
122
- "priority": null,
123
- "allowPrivilegedContainer": false,
124
- "defaultAddCapabilities": null,
125
- "requiredDropCapabilities": [
126
- "MKNOD"
127
- ],
128
- "allowedCapabilities": null,
129
- "allowHostDirVolumePlugin": true,
130
- "volumes": [
131
- "configMap",
132
- "downwardAPI",
133
- "emptyDir",
134
- "hostPath",
135
- "nfs",
136
- "persistentVolumeClaim",
137
- "projected",
138
- "secret"
139
- ],
140
- "allowedFlexVolumes": null,
141
- "allowHostNetwork": false,
142
- "allowHostPorts": false,
143
- "allowHostPID": false,
144
- "allowHostIPC": false,
145
- "seLinuxContext": {
146
- "type": "MustRunAs"
147
- },
148
- "runAsUser": {
149
- "type": "RunAsAny"
150
- },
151
- "supplementalGroups": {
152
- "type": "RunAsAny"
153
- },
154
- "fsGroup": {
155
- "type": "RunAsAny"
156
- },
157
- "readOnlyRootFilesystem": false,
158
- "users": [
159
- "system:serviceaccount:openshift-infra:pv-recycler-controller"
160
- ],
161
- "groups": []
162
- },
163
- {
164
- "metadata": {
165
- "name": "hostnetwork",
166
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/hostnetwork",
167
- "uid": "12bb0984-ef00-11e8-b4c0-68f728fac3ab",
168
- "resourceVersion": "72",
169
- "creationTimestamp": "2018-11-23T09:13:42Z",
170
- "annotations": {
171
- "kubernetes.io/description": "hostnetwork allows using host networking and host ports but still requires pods to be run with a UID and SELinux context that are allocated to the namespace."
172
- }
173
- },
174
- "priority": null,
175
- "allowPrivilegedContainer": false,
176
- "defaultAddCapabilities": null,
177
- "requiredDropCapabilities": [
178
- "KILL",
179
- "MKNOD",
180
- "SETUID",
181
- "SETGID"
182
- ],
183
- "allowedCapabilities": null,
184
- "allowHostDirVolumePlugin": false,
185
- "volumes": [
186
- "configMap",
187
- "downwardAPI",
188
- "emptyDir",
189
- "persistentVolumeClaim",
190
- "projected",
191
- "secret"
192
- ],
193
- "allowedFlexVolumes": null,
194
- "allowHostNetwork": true,
195
- "allowHostPorts": true,
196
- "allowHostPID": false,
197
- "allowHostIPC": false,
198
- "seLinuxContext": {
199
- "type": "MustRunAs"
200
- },
201
- "runAsUser": {
202
- "type": "MustRunAsRange"
203
- },
204
- "supplementalGroups": {
205
- "type": "MustRunAs"
206
- },
207
- "fsGroup": {
208
- "type": "MustRunAs"
209
- },
210
- "readOnlyRootFilesystem": false,
211
- "users": [],
212
- "groups": []
213
- },
214
- {
215
- "metadata": {
216
- "name": "nonroot",
217
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/nonroot",
218
- "uid": "12b37c59-ef00-11e8-b4c0-68f728fac3ab",
219
- "resourceVersion": "67",
220
- "creationTimestamp": "2018-11-23T09:13:42Z",
221
- "annotations": {
222
- "kubernetes.io/description": "nonroot provides all features of the restricted SCC but allows users to run with any non-root UID. The user must specify the UID or it must be specified on the by the manifest of the container runtime."
223
- }
224
- },
225
- "priority": null,
226
- "allowPrivilegedContainer": false,
227
- "defaultAddCapabilities": null,
228
- "requiredDropCapabilities": [
229
- "KILL",
230
- "MKNOD",
231
- "SETUID",
232
- "SETGID"
233
- ],
234
- "allowedCapabilities": null,
235
- "allowHostDirVolumePlugin": false,
236
- "volumes": [
237
- "configMap",
238
- "downwardAPI",
239
- "emptyDir",
240
- "persistentVolumeClaim",
241
- "projected",
242
- "secret"
243
- ],
244
- "allowedFlexVolumes": null,
245
- "allowHostNetwork": false,
246
- "allowHostPorts": false,
247
- "allowHostPID": false,
248
- "allowHostIPC": false,
249
- "seLinuxContext": {
250
- "type": "MustRunAs"
251
- },
252
- "runAsUser": {
253
- "type": "MustRunAsNonRoot"
254
- },
255
- "supplementalGroups": {
256
- "type": "RunAsAny"
257
- },
258
- "fsGroup": {
259
- "type": "RunAsAny"
260
- },
261
- "readOnlyRootFilesystem": false,
262
- "users": [],
263
- "groups": []
264
- },
265
- {
266
- "metadata": {
267
- "name": "privileged",
268
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/privileged",
269
- "uid": "12b18f4a-ef00-11e8-b4c0-68f728fac3ab",
270
- "resourceVersion": "300",
271
- "creationTimestamp": "2018-11-23T09:13:42Z",
272
- "annotations": {
273
- "kubernetes.io/description": "privileged allows access to all privileged and host features and the ability to run as any user, any group, any fsGroup, and with any SELinux context. WARNING: this is the most relaxed SCC and should be used only for cluster administration. Grant with caution."
274
- }
275
- },
276
- "priority": null,
277
- "allowPrivilegedContainer": true,
278
- "defaultAddCapabilities": null,
279
- "requiredDropCapabilities": null,
280
- "allowedCapabilities": [
281
- "*"
282
- ],
283
- "allowHostDirVolumePlugin": true,
284
- "volumes": [
285
- "*"
286
- ],
287
- "allowedFlexVolumes": null,
288
- "allowHostNetwork": true,
289
- "allowHostPorts": true,
290
- "allowHostPID": true,
291
- "allowHostIPC": true,
292
- "seLinuxContext": {
293
- "type": "RunAsAny"
294
- },
295
- "runAsUser": {
296
- "type": "RunAsAny"
297
- },
298
- "supplementalGroups": {
299
- "type": "RunAsAny"
300
- },
301
- "fsGroup": {
302
- "type": "RunAsAny"
303
- },
304
- "readOnlyRootFilesystem": false,
305
- "users": [
306
- "system:admin",
307
- "system:serviceaccount:openshift-infra:build-controller",
308
- "system:serviceaccount:default:pvinstaller",
309
- "system:serviceaccount:default:registry",
310
- "system:serviceaccount:default:router"
311
- ],
312
- "groups": [
313
- "system:cluster-admins",
314
- "system:nodes",
315
- "system:masters"
316
- ],
317
- "seccompProfiles": [
318
- "*"
319
- ]
320
- },
321
- {
322
- "metadata": {
323
- "name": "restricted",
324
- "selfLink": "/apis/security.openshift.io/v1/securitycontextconstraints/restricted",
325
- "uid": "12b9a842-ef00-11e8-b4c0-68f728fac3ab",
326
- "resourceVersion": "70",
327
- "creationTimestamp": "2018-11-23T09:13:42Z",
328
- "annotations": {
329
- "kubernetes.io/description": "restricted denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace. This is the most restrictive SCC and it is used by default for authenticated users."
330
- }
331
- },
332
- "priority": null,
333
- "allowPrivilegedContainer": false,
334
- "defaultAddCapabilities": null,
335
- "requiredDropCapabilities": [
336
- "KILL",
337
- "MKNOD",
338
- "SETUID",
339
- "SETGID"
340
- ],
341
- "allowedCapabilities": null,
342
- "allowHostDirVolumePlugin": false,
343
- "volumes": [
344
- "configMap",
345
- "downwardAPI",
346
- "emptyDir",
347
- "persistentVolumeClaim",
348
- "projected",
349
- "secret"
350
- ],
351
- "allowedFlexVolumes": null,
352
- "allowHostNetwork": false,
353
- "allowHostPorts": false,
354
- "allowHostPID": false,
355
- "allowHostIPC": false,
356
- "seLinuxContext": {
357
- "type": "MustRunAs"
358
- },
359
- "runAsUser": {
360
- "type": "MustRunAsRange"
361
- },
362
- "supplementalGroups": {
363
- "type": "RunAsAny"
364
- },
365
- "fsGroup": {
366
- "type": "MustRunAs"
367
- },
368
- "readOnlyRootFilesystem": false,
369
- "users": [],
370
- "groups": [
371
- "system:authenticated"
372
- ]
373
- }
374
- ]
375
- }
@@ -1,33 +0,0 @@
1
- {
2
- "kind": "Service",
3
- "apiVersion": "v1",
4
- "metadata": {
5
- "name": "redis-slave",
6
- "namespace": "development",
7
- "selfLink": "/api/v1/namespaces/development/services/redis-slave",
8
- "uid": "bdb80a8f-db93-11e4-b293-f8b156af4ae1",
9
- "resourceVersion": "2815",
10
- "creationTimestamp": "2015-04-05T13:00:31Z",
11
- "labels": {
12
- "name": "redis",
13
- "role": "slave"
14
- }
15
- },
16
- "spec": {
17
- "ports": [
18
- {
19
- "name": "",
20
- "protocol": "TCP",
21
- "port": 6379,
22
- "targetPort": "redis-server"
23
- }
24
- ],
25
- "selector": {
26
- "name": "redis",
27
- "role": "slave"
28
- },
29
- "clusterIP": "10.0.0.140",
30
- "sessionAffinity": "None"
31
- },
32
- "status": {}
33
- }
@@ -1,25 +0,0 @@
1
- {
2
- "kind": "ServiceAccount",
3
- "apiVersion": "v1",
4
- "metadata": {
5
- "name": "default",
6
- "namespace": "default",
7
- "selfLink": "/api/v1/namespaces/default/serviceaccounts/default",
8
- "uid": "d3d773f4-6bf0-11e5-843a-525400f8b93e",
9
- "resourceVersion": "94",
10
- "creationTimestamp": "2015-10-06T06:09:39Z"
11
- },
12
- "secrets": [
13
- {
14
- "name": "default-token-6s23q"
15
- },
16
- {
17
- "name": "default-dockercfg-62tf3"
18
- }
19
- ],
20
- "imagePullSecrets": [
21
- {
22
- "name": "default-dockercfg-62tf3"
23
- }
24
- ]
25
- }
@@ -1,82 +0,0 @@
1
- {
2
- "kind": "List",
3
- "apiVersion": "v1",
4
- "metadata": {},
5
- "items": [
6
- {
7
- "kind": "ServiceAccount",
8
- "apiVersion": "v1",
9
- "metadata": {
10
- "name": "builder",
11
- "namespace": "default",
12
- "selfLink": "/api/v1/namespaces/default/serviceaccounts/builder",
13
- "uid": "d40655f6-6bf0-11e5-843a-525400f8b93e",
14
- "resourceVersion": "133",
15
- "creationTimestamp": "2015-10-06T06:09:39Z"
16
- },
17
- "secrets": [
18
- {
19
- "name": "builder-token-5v6z2"
20
- },
21
- {
22
- "name": "builder-dockercfg-qe2re"
23
- }
24
- ],
25
- "imagePullSecrets": [
26
- {
27
- "name": "builder-dockercfg-qe2re"
28
- }
29
- ]
30
- },
31
- {
32
- "kind": "ServiceAccount",
33
- "apiVersion": "v1",
34
- "metadata": {
35
- "name": "default",
36
- "namespace": "default",
37
- "selfLink": "/api/v1/namespaces/default/serviceaccounts/default",
38
- "uid": "d3d773f4-6bf0-11e5-843a-525400f8b93e",
39
- "resourceVersion": "94",
40
- "creationTimestamp": "2015-10-06T06:09:39Z"
41
- },
42
- "secrets": [
43
- {
44
- "name": "default-token-6s23q"
45
- },
46
- {
47
- "name": "default-dockercfg-62tf3"
48
- }
49
- ],
50
- "imagePullSecrets": [
51
- {
52
- "name": "default-dockercfg-62tf3"
53
- }
54
- ]
55
- },
56
- {
57
- "kind": "ServiceAccount",
58
- "apiVersion": "v1",
59
- "metadata": {
60
- "name": "deployer",
61
- "namespace": "default",
62
- "selfLink": "/api/v1/namespaces/default/serviceaccounts/deployer",
63
- "uid": "d41d385e-6bf0-11e5-843a-525400f8b93e",
64
- "resourceVersion": "137",
65
- "creationTimestamp": "2015-10-06T06:09:39Z"
66
- },
67
- "secrets": [
68
- {
69
- "name": "deployer-token-h3i57"
70
- },
71
- {
72
- "name": "deployer-dockercfg-qgjjj"
73
- }
74
- ],
75
- "imagePullSecrets": [
76
- {
77
- "name": "deployer-dockercfg-qgjjj"
78
- }
79
- ]
80
- }
81
- ]
82
- }