Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

Safely access/mutate fargate coredns pod annotations #7480

Merged
merged 1 commit into from
Jan 17, 2024

Conversation

a-hilaly
Copy link
Member

@a-hilaly a-hilaly commented Jan 15, 2024

Fixes #7479

Prior to this patch, the pkg/fargate/coredns package had some bits of
code that accessed/mutated pod annotations assuming that they'll always
be instantiated correctly.

This patch adds utility functions to safely mutate and access fargate
pod annotations.

Signed-off-by: Amine Hilaly hilalyamine@gmail.com

Checklist

  • Added tests that cover your change (if possible)
  • Added/modified documentation as required (such as the README.md, or the userdocs directory)
  • Manually tested
  • Made sure the title of the PR is a good description that can go into the release notes
  • (Core team) Added labels for change area (e.g. area/nodegroup) and kind (e.g. kind/improvement)

BONUS POINTS checklist: complete for good vibes and maybe prizes?! 馃く

  • Backfilled missing tests for code in same general area 馃帀
  • Refactored something and made the world a better place 馃専

pkg/fargate/coredns/coredns_test.go Outdated Show resolved Hide resolved
pkg/fargate/coredns/coredns_test.go Outdated Show resolved Hide resolved
pkg/fargate/coredns/coredns_test.go Outdated Show resolved Hide resolved
Prior to this patch, the `pkg/fargate/coredns` package had some bits of
code that accessed/mutated pod annotations assuming that they'll always
be instantiated correctly.

This patch adds utility functions to safely mutate and access fargate
pod annotations.

Signed-off-by: Amine Hilaly <hilalyamine@gmail.com>
@a-hilaly a-hilaly merged commit c74edb2 into eksctl-io:main Jan 17, 2024
9 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

eksctl now panics out of the blue
3 participants