helpful-advantage-49286
08/01/2019, 5:53 PMhelpful-advantage-49286
08/01/2019, 5:53 PMhelpful-advantage-49286
08/01/2019, 5:56 PMsome-waitress-78905
08/01/2019, 5:58 PMsquare-ability-48831
08/01/2019, 6:39 PMconst apikeys = awsx.apigateway.createAssociatedAPIKeys(...)
..., I'm confused how to convert Output<T> to strings to get concise exports ...continued in thread...cool-egg-852
08/01/2019, 6:42 PMup
is run.adamant-dress-73325
08/01/2019, 8:13 PM[Listener] was not connected to a [defaultAction] that can provide [portMapping]s
. Do you know what might be happening?
const httpsListener = targetGroup.createListener('https-443-listener', {
certificateArn: options.certificateArn,
defaultAction: {
fixedResponse: {
contentType: 'text/html',
messageBody: '<!DOCTYPE html><title>404 - Not Found</title><body><h1>404 - Not Found',
statusCode: '404',
},
type: 'fixed-response',
},
external: true,
port: 443,
protocol: 'HTTPS',
sslPolicy: 'ELBSecurityPolicy-2016-08',
});
ripe-dinner-40604
08/01/2019, 8:46 PMkubernetes:<http://rbac.authorization.k8s.io:ClusterRoleBinding|rbac.authorization.k8s.io:ClusterRoleBinding> (argo-binding):
error: Failed to check for changes in resource /argo-binding because of an error computing the JSON patch describing the resource changes: unrecognized type: string
Relevant code:
// Create resources for Argo from its YAML manifests
const argo = new k8s.yaml.ConfigFile("argo",
{
file: "<https://raw.githubusercontent.com/argoproj/argo/stable/manifests/install.yaml>",
transformations: [
(obj: any) => {
// Convert `argo` to the unique namespace generated above
if (obj.kind == "ClusterRoleBinding") {
obj.subjects[0].namespace = argoNamespace.apply(val => `${val.toString()}`)
console.log(obj)
}
}
],
},
{
providers: { "kubernetes": mainCluster.provider },
},
);
Debug output
{
apiVersion: '<http://rbac.authorization.k8s.io/v1|rbac.authorization.k8s.io/v1>',
kind: 'ClusterRoleBinding',
metadata: { name: 'argo-binding' },
roleRef: {
apiGroup: '<http://rbac.authorization.k8s.io|rbac.authorization.k8s.io>',
kind: 'ClusterRole',
name: 'argo-cluster-role'
},
subjects: [ { kind: 'ServiceAccount', name: 'argo', namespace: [OutputImpl] } ]
}
cool-egg-852
08/01/2019, 9:20 PMearly-intern-90238
08/01/2019, 11:06 PMripe-dinner-40604
08/01/2019, 11:33 PMglamorous-waitress-51149
08/02/2019, 12:09 PMloud-nest-15724
08/02/2019, 7:27 PMloud-nest-15724
08/02/2019, 7:28 PMloud-nest-15724
08/02/2019, 7:30 PMhigh-translator-22614
08/02/2019, 7:33 PMloud-nest-15724
08/02/2019, 7:36 PMbitter-island-28909
08/02/2019, 9:17 PMError initializing PostgreSQL client: error detecting capabilities: error PostgreSQL version: pq: SSL is not enabled on the server
This is despite the fact that SSL works fine using the psql
client, and I have tried setting the sslmode
property to false
.
Like I said, this smells like an incompatibility somewhere else in the stack, but thought it wouldn’t hurt to ask 🙂silly-table-38618
08/02/2019, 10:09 PMsilly-table-38618
08/02/2019, 10:10 PMstocky-spoon-28903
08/02/2019, 10:12 PMsilly-table-38618
08/02/2019, 10:15 PMsilly-table-38618
08/02/2019, 10:15 PMhigh-translator-22614
08/02/2019, 10:49 PMhigh-translator-22614
08/02/2019, 10:51 PMhigh-translator-22614
08/02/2019, 10:55 PMserverless = Package("Serverless-Package", "srcdir")
vh = VHost("<http://mysite.com|mysite.com>")
vh.get("/static", StaticDir("statics"))
vh.any("/api", HttpBackend(service))
vh.any("/", serverless.handler("mypackage:myfunc"))
early-intern-90238
08/02/2019, 10:58 PMearly-intern-90238
08/02/2019, 10:59 PMearly-intern-90238
08/03/2019, 1:12 PMearly-intern-90238
08/03/2019, 1:13 PM