error handling for k8s

pull/437/head
Frostebite 2022-11-01 19:28:56 +00:00
parent c455a14e70
commit 1efc0f7154
3 changed files with 40 additions and 25 deletions

32
dist/index.js vendored
View File

@ -3371,19 +3371,27 @@ const base64 = __nccwpck_require__(85848);
class KubernetesSecret { class KubernetesSecret {
static createSecret(secrets, secretName, namespace, kubeClient) { static createSecret(secrets, secretName, namespace, kubeClient) {
return __awaiter(this, void 0, void 0, function* () { return __awaiter(this, void 0, void 0, function* () {
const secret = new k8s.V1Secret(); try {
secret.apiVersion = 'v1'; const secret = new k8s.V1Secret();
secret.kind = 'Secret'; secret.apiVersion = 'v1';
secret.type = 'Opaque'; secret.kind = 'Secret';
secret.metadata = { secret.type = 'Opaque';
name: secretName, secret.metadata = {
}; name: secretName,
secret.data = {}; };
for (const buildSecret of secrets) { secret.data = {};
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue); for (const buildSecret of secrets) {
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
}
cloud_runner_logger_1.default.log('Creating secret');
yield kubeClient.createNamespacedSecret(namespace, secret, undefined, `true`);
yield kubeClient.createNamespacedSecret(namespace, secret);
cloud_runner_logger_1.default.log('Created secret');
}
catch (error) {
cloud_runner_logger_1.default.log(`Created secret failed ${error}`);
throw new Error(`Failed to create kubernetes secret`);
} }
cloud_runner_logger_1.default.log('Creating secret');
yield kubeClient.createNamespacedSecret(namespace, secret);
}); });
} }
} }

2
dist/index.js.map vendored

File diff suppressed because one or more lines are too long

View File

@ -11,19 +11,26 @@ class KubernetesSecret {
namespace: string, namespace: string,
kubeClient: CoreV1Api, kubeClient: CoreV1Api,
) { ) {
const secret = new k8s.V1Secret(); try {
secret.apiVersion = 'v1'; const secret = new k8s.V1Secret();
secret.kind = 'Secret'; secret.apiVersion = 'v1';
secret.type = 'Opaque'; secret.kind = 'Secret';
secret.metadata = { secret.type = 'Opaque';
name: secretName, secret.metadata = {
}; name: secretName,
secret.data = {}; };
for (const buildSecret of secrets) { secret.data = {};
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue); for (const buildSecret of secrets) {
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
}
CloudRunnerLogger.log('Creating secret');
await kubeClient.createNamespacedSecret(namespace, secret, undefined, `true`);
await kubeClient.createNamespacedSecret(namespace, secret);
CloudRunnerLogger.log('Created secret');
} catch (error) {
CloudRunnerLogger.log(`Created secret failed ${error}`);
throw new Error(`Failed to create kubernetes secret`);
} }
CloudRunnerLogger.log('Creating secret');
await kubeClient.createNamespacedSecret(namespace, secret);
} }
} }