error handling for k8s

pull/437/head
Frostebite 2022-11-01 19:28:56 +00:00
parent c455a14e70
commit 1efc0f7154
3 changed files with 40 additions and 25 deletions

32
dist/index.js vendored
View File

@ -3371,19 +3371,27 @@ const base64 = __nccwpck_require__(85848);
class KubernetesSecret {
static createSecret(secrets, secretName, namespace, kubeClient) {
return __awaiter(this, void 0, void 0, function* () {
const secret = new k8s.V1Secret();
secret.apiVersion = 'v1';
secret.kind = 'Secret';
secret.type = 'Opaque';
secret.metadata = {
name: secretName,
};
secret.data = {};
for (const buildSecret of secrets) {
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
try {
const secret = new k8s.V1Secret();
secret.apiVersion = 'v1';
secret.kind = 'Secret';
secret.type = 'Opaque';
secret.metadata = {
name: secretName,
};
secret.data = {};
for (const buildSecret of secrets) {
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
}
cloud_runner_logger_1.default.log('Creating secret');
yield kubeClient.createNamespacedSecret(namespace, secret, undefined, `true`);
yield kubeClient.createNamespacedSecret(namespace, secret);
cloud_runner_logger_1.default.log('Created secret');
}
catch (error) {
cloud_runner_logger_1.default.log(`Created secret failed ${error}`);
throw new Error(`Failed to create kubernetes secret`);
}
cloud_runner_logger_1.default.log('Creating secret');
yield kubeClient.createNamespacedSecret(namespace, secret);
});
}
}

2
dist/index.js.map vendored

File diff suppressed because one or more lines are too long

View File

@ -11,19 +11,26 @@ class KubernetesSecret {
namespace: string,
kubeClient: CoreV1Api,
) {
const secret = new k8s.V1Secret();
secret.apiVersion = 'v1';
secret.kind = 'Secret';
secret.type = 'Opaque';
secret.metadata = {
name: secretName,
};
secret.data = {};
for (const buildSecret of secrets) {
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
try {
const secret = new k8s.V1Secret();
secret.apiVersion = 'v1';
secret.kind = 'Secret';
secret.type = 'Opaque';
secret.metadata = {
name: secretName,
};
secret.data = {};
for (const buildSecret of secrets) {
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
}
CloudRunnerLogger.log('Creating secret');
await kubeClient.createNamespacedSecret(namespace, secret, undefined, `true`);
await kubeClient.createNamespacedSecret(namespace, secret);
CloudRunnerLogger.log('Created secret');
} catch (error) {
CloudRunnerLogger.log(`Created secret failed ${error}`);
throw new Error(`Failed to create kubernetes secret`);
}
CloudRunnerLogger.log('Creating secret');
await kubeClient.createNamespacedSecret(namespace, secret);
}
}