@@ -104,8 +104,7 @@ def create(
104104 :param addons: list of required addons. See:
105105 `hpecp k8scluster get-available-addons`
106106 :param external_identity_server: dict
107- Example {
108- "bind_pwd":"password",
107+ Example '{"bind_pwd":"password",
109108 "user_attribute":"CN",
110109 "bind_type":"search_bind",
111110 "bind_dn":"cn=Administrator,CN=Users,DC=samdom,DC=example,DC=com",
@@ -115,25 +114,25 @@ def create(
115114 "base_dn":"CN=Users,DC=samdom,DC=example,DC=com",
116115 "verify_peer":false,
117116 "type":"Active Directory",
118- "port":636}
117+ "port":636}'
119118 """
120119 host_config = [
121120 K8sClusterHostConfig .create_from_list (h .split (":" ))
122121 for h in k8shosts_config .split ("," )
123122 ]
124123
125- if external_identity_server :
126- try :
127- external_identity_server = json . loads ( external_identity_server )
128- except ValueError :
129- print (
130- (
131- "could not parse 'external_identity_server' parameter "
132- " - is it valid json? "
133- ),
134- file = sys .stderr ,
135- )
136- sys .exit (1 )
124+ if external_identity_server and not isinstance (
125+ external_identity_server , dict
126+ ):
127+ print (
128+ (
129+ "Could not parse 'external_identity_server' parameter"
130+ " - is it valid json? \n "
131+ "Received: " + external_identity_server + " \n "
132+ ),
133+ file = sys .stderr ,
134+ )
135+ sys .exit (1 )
137136
138137 print (
139138 base .get_client ().k8s_cluster .create (
0 commit comments