error handling for k8s

pull/437/head
Frostebite 2022-11-01 19:28:56 +00:00
parent c455a14e70
commit 1efc0f7154
3 changed files with 40 additions and 25 deletions

8
dist/index.js vendored
View File

@ -3371,6 +3371,7 @@ const base64 = __nccwpck_require__(85848);
class KubernetesSecret {
static createSecret(secrets, secretName, namespace, kubeClient) {
return __awaiter(this, void 0, void 0, function* () {
try {
const secret = new k8s.V1Secret();
secret.apiVersion = 'v1';
secret.kind = 'Secret';
@ -3383,7 +3384,14 @@ class KubernetesSecret {
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
}
cloud_runner_logger_1.default.log('Creating secret');
yield kubeClient.createNamespacedSecret(namespace, secret, undefined, `true`);
yield kubeClient.createNamespacedSecret(namespace, secret);
cloud_runner_logger_1.default.log('Created secret');
}
catch (error) {
cloud_runner_logger_1.default.log(`Created secret failed ${error}`);
throw new Error(`Failed to create kubernetes secret`);
}
});
}
}

2
dist/index.js.map vendored

File diff suppressed because one or more lines are too long

View File

@ -11,6 +11,7 @@ class KubernetesSecret {
namespace: string,
kubeClient: CoreV1Api,
) {
try {
const secret = new k8s.V1Secret();
secret.apiVersion = 'v1';
secret.kind = 'Secret';
@ -23,7 +24,13 @@ class KubernetesSecret {
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
}
CloudRunnerLogger.log('Creating secret');
await kubeClient.createNamespacedSecret(namespace, secret, undefined, `true`);
await kubeClient.createNamespacedSecret(namespace, secret);
CloudRunnerLogger.log('Created secret');
} catch (error) {
CloudRunnerLogger.log(`Created secret failed ${error}`);
throw new Error(`Failed to create kubernetes secret`);
}
}
}