Bumping k8s dependencies to 1.13
This commit is contained in:
6
vendor/k8s.io/client-go/transport/round_trippers_test.go
generated
vendored
6
vendor/k8s.io/client-go/transport/round_trippers_test.go
generated
vendored
@@ -135,7 +135,7 @@ func TestImpersonationRoundTripper(t *testing.T) {
|
||||
},
|
||||
},
|
||||
expected: map[string][]string{
|
||||
ImpersonateUserHeader: {"user"},
|
||||
ImpersonateUserHeader: {"user"},
|
||||
ImpersonateUserExtraHeaderPrefix + `Test.example.com%2fthing.thing`: {"A", "a"},
|
||||
},
|
||||
},
|
||||
@@ -219,11 +219,11 @@ func TestAuthProxyRoundTripper(t *testing.T) {
|
||||
username: "user",
|
||||
groups: []string{"groupA", "groupB"},
|
||||
extra: map[string][]string{
|
||||
"one": {"alpha", "bravo"},
|
||||
"one": {"alpha", "bravo"},
|
||||
"example.com/two%20three": {"charlie", "delta"},
|
||||
},
|
||||
expectedExtra: map[string][]string{
|
||||
"one": {"alpha", "bravo"},
|
||||
"one": {"alpha", "bravo"},
|
||||
"example.com%2ftwo%2520three": {"charlie", "delta"},
|
||||
},
|
||||
},
|
||||
|
2
vendor/k8s.io/client-go/transport/spdy/spdy.go
generated
vendored
2
vendor/k8s.io/client-go/transport/spdy/spdy.go
generated
vendored
@@ -38,7 +38,7 @@ func RoundTripperFor(config *restclient.Config) (http.RoundTripper, Upgrader, er
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
}
|
||||
upgradeRoundTripper := spdy.NewRoundTripper(tlsConfig, true)
|
||||
upgradeRoundTripper := spdy.NewRoundTripper(tlsConfig, true, false)
|
||||
wrapper, err := restclient.HTTPWrappersForConfig(config, upgradeRoundTripper)
|
||||
if err != nil {
|
||||
return nil, nil, err
|
||||
|
38
vendor/k8s.io/client-go/transport/transport_test.go
generated
vendored
38
vendor/k8s.io/client-go/transport/transport_test.go
generated
vendored
@@ -93,20 +93,32 @@ stR0Yiw0buV6DL/moUO0HIM9Bjh96HJp+LxiIS6UCdIhMPp5HoQa
|
||||
|
||||
func TestNew(t *testing.T) {
|
||||
testCases := map[string]struct {
|
||||
Config *Config
|
||||
Err bool
|
||||
TLS bool
|
||||
TLSCert bool
|
||||
TLSErr bool
|
||||
Default bool
|
||||
Config *Config
|
||||
Err bool
|
||||
TLS bool
|
||||
TLSCert bool
|
||||
TLSErr bool
|
||||
Default bool
|
||||
Insecure bool
|
||||
DefaultRoots bool
|
||||
}{
|
||||
"default transport": {
|
||||
Default: true,
|
||||
Config: &Config{},
|
||||
},
|
||||
|
||||
"insecure": {
|
||||
TLS: true,
|
||||
Insecure: true,
|
||||
DefaultRoots: true,
|
||||
Config: &Config{TLS: TLSConfig{
|
||||
Insecure: true,
|
||||
}},
|
||||
},
|
||||
|
||||
"server name": {
|
||||
TLS: true,
|
||||
TLS: true,
|
||||
DefaultRoots: true,
|
||||
Config: &Config{TLS: TLSConfig{
|
||||
ServerName: "foo",
|
||||
}},
|
||||
@@ -266,6 +278,18 @@ func TestNew(t *testing.T) {
|
||||
return
|
||||
}
|
||||
|
||||
switch {
|
||||
case testCase.DefaultRoots && transport.TLSClientConfig.RootCAs != nil:
|
||||
t.Fatalf("got %#v, expected nil root CAs", transport.TLSClientConfig.RootCAs)
|
||||
case !testCase.DefaultRoots && transport.TLSClientConfig.RootCAs == nil:
|
||||
t.Fatalf("got %#v, expected non-nil root CAs", transport.TLSClientConfig.RootCAs)
|
||||
}
|
||||
|
||||
switch {
|
||||
case testCase.Insecure != transport.TLSClientConfig.InsecureSkipVerify:
|
||||
t.Fatalf("got %#v, expected %#v", transport.TLSClientConfig.InsecureSkipVerify, testCase.Insecure)
|
||||
}
|
||||
|
||||
switch {
|
||||
case testCase.TLSCert && transport.TLSClientConfig.GetClientCertificate == nil:
|
||||
t.Fatalf("got %#v, expected TLSClientConfig.GetClientCertificate", transport.TLSClientConfig)
|
||||
|
Reference in New Issue
Block a user