separate cloud development and ci pipeline
parent
c9cee6d74f
commit
96217c1e7d
|
|
@ -3379,7 +3379,14 @@ class KubernetesSecret {
|
||||||
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
|
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
|
||||||
}
|
}
|
||||||
cloud_runner_logger_1.default.log(`Creating secret: ${secretName}`);
|
cloud_runner_logger_1.default.log(`Creating secret: ${secretName}`);
|
||||||
cloud_runner_logger_1.default.log(`Secrets: ${JSON.stringify(yield kubeClient.listNamespacedSecret(namespace), undefined, 4)}`);
|
const existingSecrets = yield kubeClient.listNamespacedSecret(namespace);
|
||||||
|
const mappedSecrets = existingSecrets.body.items.map((x) => {
|
||||||
|
var _a;
|
||||||
|
return {
|
||||||
|
name: ((_a = x.metadata) === null || _a === void 0 ? void 0 : _a.name) || `no name`,
|
||||||
|
};
|
||||||
|
});
|
||||||
|
cloud_runner_logger_1.default.log(`Secrets: ${JSON.stringify(mappedSecrets, undefined, 4)}`);
|
||||||
yield kubeClient.createNamespacedSecret(namespace, secret);
|
yield kubeClient.createNamespacedSecret(namespace, secret);
|
||||||
cloud_runner_logger_1.default.log('Created secret');
|
cloud_runner_logger_1.default.log('Created secret');
|
||||||
}
|
}
|
||||||
|
|
|
||||||
File diff suppressed because one or more lines are too long
|
|
@ -24,9 +24,14 @@ class KubernetesSecret {
|
||||||
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
|
secret.data[buildSecret.ParameterKey] = base64.encode(buildSecret.ParameterValue);
|
||||||
}
|
}
|
||||||
CloudRunnerLogger.log(`Creating secret: ${secretName}`);
|
CloudRunnerLogger.log(`Creating secret: ${secretName}`);
|
||||||
CloudRunnerLogger.log(
|
const existingSecrets = await kubeClient.listNamespacedSecret(namespace);
|
||||||
`Secrets: ${JSON.stringify(await kubeClient.listNamespacedSecret(namespace), undefined, 4)}`,
|
const mappedSecrets = existingSecrets.body.items.map((x) => {
|
||||||
);
|
return {
|
||||||
|
name: x.metadata?.name || `no name`,
|
||||||
|
};
|
||||||
|
});
|
||||||
|
|
||||||
|
CloudRunnerLogger.log(`Secrets: ${JSON.stringify(mappedSecrets, undefined, 4)}`);
|
||||||
await kubeClient.createNamespacedSecret(namespace, secret);
|
await kubeClient.createNamespacedSecret(namespace, secret);
|
||||||
CloudRunnerLogger.log('Created secret');
|
CloudRunnerLogger.log('Created secret');
|
||||||
} catch (error) {
|
} catch (error) {
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue