Skip to content

Commit

Permalink
vendor: update go-tsuruclient and fixes for new version
Browse files Browse the repository at this point in the history
  • Loading branch information
cezarsa committed Dec 20, 2018
1 parent 4ae3f4e commit 12d698d
Show file tree
Hide file tree
Showing 150 changed files with 10,624 additions and 6,548 deletions.
255 changes: 228 additions & 27 deletions Gopkg.lock

Large diffs are not rendered by default.

25 changes: 4 additions & 21 deletions tsuru/admin/broker.go
Original file line number Diff line number Diff line change
Expand Up @@ -158,12 +158,10 @@ func (c *BrokerList) Run(ctx *cmd.Context, cli *cmd.Client) error {
}
for _, b := range brokerList.Brokers {
authMethod := "None"
if b.Config.AuthConfig != nil {
if b.Config.AuthConfig.BasicAuthConfig != nil {
authMethod = "Basic\n"
} else if b.Config.AuthConfig.BearerConfig != nil {
authMethod = "Bearer\n"
}
if b.Config.AuthConfig.BasicAuthConfig.Username != "" {
authMethod = "Basic\n"
} else if b.Config.AuthConfig.BearerConfig.Token != "" {
authMethod = "Bearer\n"
}
var contexts []string
for k, v := range b.Config.Context {
Expand All @@ -185,15 +183,6 @@ func (c *BrokerList) Run(ctx *cmd.Context, cli *cmd.Client) error {
func flagsForServiceBroker(broker *tsuru.ServiceBroker, cacheExpiration *string) *gnuflag.FlagSet {
fs := gnuflag.NewFlagSet("", gnuflag.ExitOnError)

if broker.Config == nil {
broker.Config = &tsuru.ServiceBrokerConfig{
AuthConfig: &tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: &tsuru.ServiceBrokerConfigAuthConfigBasicAuthConfig{},
BearerConfig: &tsuru.ServiceBrokerConfigAuthConfigBearerConfig{},
},
}
}

insecure := "Ignore TLS errors in the broker request."
fs.BoolVar(&broker.Config.Insecure, "insecure", false, insecure)
fs.BoolVar(&broker.Config.Insecure, "i", false, insecure)
Expand Down Expand Up @@ -222,12 +211,6 @@ func flagsForServiceBroker(broker *tsuru.ServiceBroker, cacheExpiration *string)

func parseServiceBroker(broker *tsuru.ServiceBroker, ctx *cmd.Context, cacheExpiration string) error {
broker.Name, broker.URL = ctx.Args[0], ctx.Args[1]
if broker.Config.AuthConfig.BearerConfig.Token == "" {
broker.Config.AuthConfig.BearerConfig = nil
}
if broker.Config.AuthConfig.BasicAuthConfig.Password == "" && broker.Config.AuthConfig.BasicAuthConfig.Username == "" {
broker.Config.AuthConfig.BasicAuthConfig = nil
}
if len(cacheExpiration) > 0 {
duration, err := time.ParseDuration(cacheExpiration)
if err != nil {
Expand Down
40 changes: 16 additions & 24 deletions tsuru/admin/broker_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,13 +34,13 @@ func (s *S) TestBrokerAdd(c *check.C) {
c.Assert(ret, check.DeepEquals, tsuru.ServiceBroker{
Name: "br1",
URL: "http://x.com",
Config: &tsuru.ServiceBrokerConfig{
AuthConfig: &tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: &tsuru.ServiceBrokerConfigAuthConfigBasicAuthConfig{
Config: tsuru.ServiceBrokerConfig{
AuthConfig: tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: tsuru.ServiceBrokerConfigAuthConfigBasicAuthConfig{
Password: "password",
Username: "username",
},
BearerConfig: &tsuru.ServiceBrokerConfigAuthConfigBearerConfig{
BearerConfig: tsuru.ServiceBrokerConfigAuthConfigBearerConfig{
Token: "ABCDE",
},
},
Expand Down Expand Up @@ -85,11 +85,7 @@ func (s *S) TestBrokerAddEmptyAuth(c *check.C) {
c.Assert(ret, check.DeepEquals, tsuru.ServiceBroker{
Name: "br1",
URL: "http://x.com",
Config: &tsuru.ServiceBrokerConfig{
AuthConfig: &tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: nil,
BearerConfig: nil,
},
Config: tsuru.ServiceBrokerConfig{
Context: map[string]string{
"p1": "v1",
"p2": "v2",
Expand Down Expand Up @@ -159,13 +155,13 @@ func (s *S) TestBrokerUpdate(c *check.C) {
c.Assert(ret, check.DeepEquals, tsuru.ServiceBroker{
Name: "br1",
URL: "http://x.com",
Config: &tsuru.ServiceBrokerConfig{
AuthConfig: &tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: &tsuru.ServiceBrokerConfigAuthConfigBasicAuthConfig{
Config: tsuru.ServiceBrokerConfig{
AuthConfig: tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: tsuru.ServiceBrokerConfigAuthConfigBasicAuthConfig{
Password: "password",
Username: "username",
},
BearerConfig: &tsuru.ServiceBrokerConfigAuthConfigBearerConfig{
BearerConfig: tsuru.ServiceBrokerConfigAuthConfigBearerConfig{
Token: "ABCDE",
},
},
Expand Down Expand Up @@ -210,11 +206,7 @@ func (s *S) TestBrokerUpdateEmptyAuth(c *check.C) {
c.Assert(ret, check.DeepEquals, tsuru.ServiceBroker{
Name: "br1",
URL: "http://x.com",
Config: &tsuru.ServiceBrokerConfig{
AuthConfig: &tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: nil,
BearerConfig: nil,
},
Config: tsuru.ServiceBrokerConfig{
Context: map[string]string{
"p1": "v1",
"p2": "v2",
Expand Down Expand Up @@ -324,10 +316,10 @@ func (s *S) TestBrokerList(c *check.C) {
{
Name: "aws",
URL: "https://192.168.99.100:31767/aws-service-broker",
Config: &tsuru.ServiceBrokerConfig{
Config: tsuru.ServiceBrokerConfig{
Insecure: true,
AuthConfig: &tsuru.ServiceBrokerConfigAuthConfig{
BearerConfig: &tsuru.ServiceBrokerConfigAuthConfigBearerConfig{
AuthConfig: tsuru.ServiceBrokerConfigAuthConfig{
BearerConfig: tsuru.ServiceBrokerConfigAuthConfigBearerConfig{
Token: "xpto",
},
},
Expand All @@ -340,9 +332,9 @@ func (s *S) TestBrokerList(c *check.C) {
{
Name: "azure",
URL: "https://localhost:9090",
Config: &tsuru.ServiceBrokerConfig{
AuthConfig: &tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: &tsuru.ServiceBrokerConfigAuthConfigBasicAuthConfig{
Config: tsuru.ServiceBrokerConfig{
AuthConfig: tsuru.ServiceBrokerConfigAuthConfig{
BasicAuthConfig: tsuru.ServiceBrokerConfigAuthConfigBasicAuthConfig{
Password: "pass",
Username: "user",
},
Expand Down
18 changes: 9 additions & 9 deletions tsuru/admin/cluster.go
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ func (c *ClusterAdd) Run(ctx *cmd.Context, cli *cmd.Client) error {
Addresses: c.addresses,
Pools: c.pools,
CustomData: c.customData,
Default_: c.isDefault,
Default: c.isDefault,
Provisioner: provisioner,
CreateData: c.createData,
}
Expand All @@ -89,21 +89,21 @@ func (c *ClusterAdd) Run(ctx *cmd.Context, cli *cmd.Client) error {
if err != nil {
return err
}
clus.Cacert = string(data)
clus.Cacert = data
}
if c.clientcert != "" {
data, err = ioutil.ReadFile(c.clientcert)
if err != nil {
return err
}
clus.Clientcert = string(data)
clus.Clientcert = data
}
if c.clientkey != "" {
data, err = ioutil.ReadFile(c.clientkey)
if err != nil {
return err
}
clus.Clientkey = string(data)
clus.Clientkey = data
}
response, err := apiClient.ClusterApi.ClusterCreate(context.TODO(), clus)
if err != nil {
Expand Down Expand Up @@ -171,7 +171,7 @@ func (c *ClusterUpdate) Run(ctx *cmd.Context, cli *cmd.Client) error {
Addresses: c.addresses,
Pools: c.pools,
CustomData: c.customData,
Default_: c.isDefault,
Default: c.isDefault,
Provisioner: provisioner,
}
var data []byte
Expand All @@ -180,21 +180,21 @@ func (c *ClusterUpdate) Run(ctx *cmd.Context, cli *cmd.Client) error {
if err != nil {
return err
}
clus.Cacert = string(data)
clus.Cacert = data
}
if c.clientcert != "" {
data, err = ioutil.ReadFile(c.clientcert)
if err != nil {
return err
}
clus.Clientcert = string(data)
clus.Clientcert = data
}
if c.clientkey != "" {
data, err = ioutil.ReadFile(c.clientkey)
if err != nil {
return err
}
clus.Clientkey = string(data)
clus.Clientkey = data
}
resp, err := apiClient.ClusterApi.ClusterUpdate(context.TODO(), name, clus)
if err != nil {
Expand Down Expand Up @@ -242,7 +242,7 @@ func (c *ClusterList) Run(ctx *cmd.Context, cli *cmd.Client) error {
for k, v := range c.CustomData {
custom = append(custom, fmt.Sprintf("%s=%s", k, v))
}
tbl.AddRow(tablecli.Row{c.Name, c.Provisioner, strings.Join(c.Addresses, "\n"), strings.Join(custom, "\n"), strconv.FormatBool(c.Default_), strings.Join(c.Pools, "\n")})
tbl.AddRow(tablecli.Row{c.Name, c.Provisioner, strings.Join(c.Addresses, "\n"), strings.Join(custom, "\n"), strconv.FormatBool(c.Default), strings.Join(c.Pools, "\n")})
}
fmt.Fprint(ctx.Stdout, tbl.String())
return nil
Expand Down
26 changes: 13 additions & 13 deletions tsuru/admin/cluster_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,13 +40,13 @@ func (s *S) TestClusterAddRun(c *check.C) {
c.Assert(err, check.IsNil)
c.Assert(clus, check.DeepEquals, tsuru.Cluster{
Name: "c1",
Cacert: "cadata",
Clientcert: "certdata",
Clientkey: "keydata",
Cacert: []byte("cadata"),
Clientcert: []byte("certdata"),
Clientkey: []byte("keydata"),
CustomData: map[string]string{"a": "b", "c": "d"},
Addresses: []string{"addr1", "addr2"},
Pools: []string{"p1", "p2"},
Default_: true,
Default: true,
Provisioner: "myprov",
CreateData: map[string]string{"iaas": "dockermachine"},
})
Expand Down Expand Up @@ -105,13 +105,13 @@ func (s *S) TestClusterUpdateRun(c *check.C) {
c.Assert(err, check.IsNil)
c.Assert(clus, check.DeepEquals, tsuru.Cluster{
Name: "c1",
Cacert: "cadata",
Clientcert: "certdata",
Clientkey: "keydata",
Cacert: []byte("cadata"),
Clientcert: []byte("certdata"),
Clientkey: []byte("keydata"),
CustomData: map[string]string{"a": "b", "c": "d"},
Addresses: []string{"addr1", "addr2"},
Pools: []string{"p1", "p2"},
Default_: true,
Default: true,
Provisioner: "myprov",
})
return true
Expand Down Expand Up @@ -156,16 +156,16 @@ func (s *S) TestClusterListRun(c *check.C) {
clusters := []tsuru.Cluster{{
Name: "c1",
Addresses: []string{"addr1", "addr2"},
Cacert: "cacert",
Clientcert: "clientcert",
Clientkey: "clientkey",
Cacert: []byte("cacert"),
Clientcert: []byte("clientcert"),
Clientkey: []byte("clientkey"),
CustomData: map[string]string{"namespace": "ns1"},
Default_: true,
Default: true,
Provisioner: "prov1",
}, {
Name: "c2",
Addresses: []string{"addr3"},
Default_: false,
Default: false,
Pools: []string{"p1", "p2"},
Provisioner: "prov2",
}}
Expand Down
4 changes: 2 additions & 2 deletions tsuru/client/auth.go
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,7 @@ func (c *TeamCreate) Run(ctx *cmd.Context, cli *cmd.Client) error {
return err
}
team := ctx.Args[0]
_, err = apiClient.TeamApi.TeamCreate(context.TODO(), tsuru.TeamData{
_, err = apiClient.TeamApi.TeamCreate(context.TODO(), tsuru.TeamCreateArgs{
Name: team,
Tags: c.tags,
})
Expand Down Expand Up @@ -236,7 +236,7 @@ func (t *TeamUpdate) Run(ctx *cmd.Context, cli *cmd.Client) error {
return err
}
team := ctx.Args[0]
_, err = apiClient.TeamApi.TeamUpdate(context.TODO(), team, tsuru.UpdateData{
_, err = apiClient.TeamApi.TeamUpdate(context.TODO(), team, tsuru.TeamUpdateArgs{
Newname: t.newName,
Tags: t.tags,
})
Expand Down
8 changes: 4 additions & 4 deletions tsuru/client/auth_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -39,10 +39,10 @@ func (s *S) TestTeamCreate(c *check.C) {
c.Assert(r.Header.Get("Content-Type"), check.Equals, "application/json")
data, err := ioutil.ReadAll(r.Body)
c.Assert(err, check.IsNil)
var ret tsuru.TeamData
var ret tsuru.TeamCreateArgs
err = json.Unmarshal(data, &ret)
c.Assert(err, check.IsNil)
c.Assert(ret, check.DeepEquals, tsuru.TeamData{Name: "core", Tags: []string{"tag1", "tag2"}})
c.Assert(ret, check.DeepEquals, tsuru.TeamCreateArgs{Name: "core", Tags: []string{"tag1", "tag2"}})
c.Assert(r.URL.Path, check.DeepEquals, "/1.0/teams")
return true
},
Expand Down Expand Up @@ -72,10 +72,10 @@ func (s *S) TestTeamUpdate(c *check.C) {
c.Assert(r.Header.Get("Content-Type"), check.Equals, "application/json")
data, err := ioutil.ReadAll(r.Body)
c.Assert(err, check.IsNil)
var ret tsuru.UpdateData
var ret tsuru.TeamUpdateArgs
err = json.Unmarshal(data, &ret)
c.Assert(err, check.IsNil)
c.Assert(ret, check.DeepEquals, tsuru.UpdateData{Newname: "new-team", Tags: []string{"tag1", "tag2"}})
c.Assert(ret, check.DeepEquals, tsuru.TeamUpdateArgs{Newname: "new-team", Tags: []string{"tag1", "tag2"}})
c.Assert(strings.HasSuffix(r.URL.Path, "/teams/my-team"), check.Equals, true)
c.Assert(r.Method, check.Equals, http.MethodPut)
return true
Expand Down
10 changes: 2 additions & 8 deletions tsuru/client/webhook.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ func flagsForWebhook(webhook *tsuru.Webhook) *gnuflag.FlagSet {

fs.BoolVar(&webhook.Insecure, "insecure", false, "Ignore TLS errors in the webhook request.")

webhook.EventFilter = &tsuru.WebhookEventFilter{}
webhook.EventFilter = tsuru.WebhookEventFilter{}
fs.Var(cmd.StringSliceFlagWrapper{Dst: &webhook.EventFilter.TargetTypes}, "target-type",
"Target Type for matching events.")
fs.Var(cmd.StringSliceFlagWrapper{Dst: &webhook.EventFilter.TargetValues}, "target-value",
Expand Down Expand Up @@ -220,9 +220,6 @@ func (c *WebhookUpdate) mergeWebhooks(existing tsuru.Webhook) tsuru.Webhook {
} else if c.noHeader {
existing.Headers = nil
}
if existing.EventFilter == nil {
existing.EventFilter = &tsuru.WebhookEventFilter{}
}
if len(new.EventFilter.KindNames) != 0 {
existing.EventFilter.KindNames = new.EventFilter.KindNames
} else if c.noKindName {
Expand Down Expand Up @@ -316,10 +313,7 @@ func (c *WebhookList) Run(ctx *cmd.Context, cli *cmd.Client) error {
return nil
}

func filterToStr(f *tsuru.WebhookEventFilter) string {
if f == nil {
return ""
}
func filterToStr(f tsuru.WebhookEventFilter) string {
var strs []string
for _, v := range f.KindTypes {
strs = append(strs, fmt.Sprintf("kind-type == %s", v))
Expand Down
10 changes: 5 additions & 5 deletions tsuru/client/webhook_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ func (s *S) TestWebhookCreate(c *check.C) {
c.Assert(ret, check.DeepEquals, tsuru.Webhook{
Name: "wh1",
Url: "http://x.com",
EventFilter: &tsuru.WebhookEventFilter{},
EventFilter: tsuru.WebhookEventFilter{},
})
return true
},
Expand Down Expand Up @@ -82,7 +82,7 @@ func (s *S) TestWebhookCreateFlags(c *check.C) {
"b": {"d"},
},
Insecure: true,
EventFilter: &tsuru.WebhookEventFilter{
EventFilter: tsuru.WebhookEventFilter{
TargetTypes: []string{"a1", "b1"},
TargetValues: []string{"a2", "b2"},
KindTypes: []string{"k1"},
Expand Down Expand Up @@ -145,7 +145,7 @@ func (s *S) TestWebhookList(c *check.C) {
"b": {"d"},
},
Insecure: true,
EventFilter: &tsuru.WebhookEventFilter{
EventFilter: tsuru.WebhookEventFilter{
TargetTypes: []string{"a1", "b1"},
TargetValues: []string{"a2", "b2"},
KindTypes: []string{"k1"},
Expand Down Expand Up @@ -236,7 +236,7 @@ func (s *S) TestWebhookUpdate(c *check.C) {
Name: "wh1",
Url: "http://x.com",
Method: "GET",
EventFilter: &tsuru.WebhookEventFilter{},
EventFilter: tsuru.WebhookEventFilter{},
Headers: map[string][]string{"a": {"b", "c"}},
})
return true
Expand Down Expand Up @@ -290,7 +290,7 @@ func (s *S) TestWebhookUpdateWithFlags(c *check.C) {
Name: "wh1",
Url: "http://y.com",
Method: "GET",
EventFilter: &tsuru.WebhookEventFilter{
EventFilter: tsuru.WebhookEventFilter{
KindNames: []string{"app.deploy"},
},
})
Expand Down
8 changes: 8 additions & 0 deletions vendor/github.com/antihax/optional/LICENSE

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 12d698d

Please sign in to comment.