Skip to content

Commit 7febe52

Browse files
Guard against cluster certificate authority being undefined (#903)
Likely addresses #676 Although the types don't describe the certificate authority as being possibly undefined, the error reported would indicate it can be. Therefore we'll add some extra guards just in case. If the cluster certificate authority is undefined, then we'll pass the certData to generateKubeConfig as undefined. This will then not set the property within the kubeconfig, but at least it won't throw a hard error causing the whole deployment to fail. Aside: Fix resolve() call which requires a value to be passed.
1 parent 6e8c641 commit 7febe52

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

nodejs/eks/cluster.ts

+10-8
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ interface ExecEnvVar {
199199
export function generateKubeconfig(
200200
clusterName: pulumi.Input<string>,
201201
clusterEndpoint: pulumi.Input<string>,
202-
certData: pulumi.Input<string>,
202+
certData?: pulumi.Input<string>,
203203
opts?: KubeconfigOptions,
204204
) {
205205
let args = ["eks", "get-token", "--cluster-name", clusterName];
@@ -627,7 +627,7 @@ export function createCore(
627627
timeout: reqTimeoutMilliseconds,
628628
};
629629
const req = https.request(options, (res) => {
630-
res.statusCode === 200 ? resolve() : reject(); // Verify healthz returns 200
630+
res.statusCode === 200 ? resolve(undefined) : reject(); // Verify healthz returns 200
631631
});
632632
req.on("timeout", reject);
633633
req.on("error", reject);
@@ -675,22 +675,22 @@ export function createCore(
675675
return generateKubeconfig(
676676
clusterName,
677677
clusterEndpoint,
678-
clusterCertificateAuthority.data,
678+
clusterCertificateAuthority?.data,
679679
opts,
680680
);
681681
});
682682
} else if (providerCredentialOpts) {
683683
config = generateKubeconfig(
684684
clusterName,
685685
clusterEndpoint,
686-
clusterCertificateAuthority.data,
686+
clusterCertificateAuthority?.data,
687687
providerCredentialOpts,
688688
);
689689
} else {
690690
config = generateKubeconfig(
691691
clusterName,
692692
clusterEndpoint,
693-
clusterCertificateAuthority.data,
693+
clusterCertificateAuthority?.data,
694694
);
695695
}
696696
return config;
@@ -918,7 +918,9 @@ export function createCore(
918918
selectors: selectors,
919919
subnetIds: pulumi
920920
.output(clusterSubnetIds)
921-
.apply((subnets) => computeWorkerSubnets(parent, fargate.subnetIds ?? subnets)),
921+
.apply((subnets) =>
922+
computeWorkerSubnets(parent, fargate.subnetIds ?? subnets),
923+
),
922924
},
923925
{ parent, dependsOn: [eksNodeAccess], provider },
924926
);
@@ -1673,7 +1675,7 @@ export class Cluster extends pulumi.ComponentResource {
16731675
const kc = generateKubeconfig(
16741676
this.eksCluster.name,
16751677
this.eksCluster.endpoint,
1676-
this.eksCluster.certificateAuthority.data,
1678+
this.eksCluster.certificateAuthority?.data,
16771679
args,
16781680
);
16791681
return pulumi.output(kc).apply(JSON.stringify);
@@ -1876,7 +1878,7 @@ export class ClusterInternal extends pulumi.ComponentResource {
18761878
const kc = generateKubeconfig(
18771879
this.eksCluster.name,
18781880
this.eksCluster.endpoint,
1879-
this.eksCluster.certificateAuthority.data,
1881+
this.eksCluster.certificateAuthority?.data,
18801882
args,
18811883
);
18821884
return pulumi.output(kc).apply(JSON.stringify);

0 commit comments

Comments
 (0)