browserstack-node-sdk 1.34.37 → 1.34.38
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ats/src/cloudproviders/AWS.js +1 -1
- package/ats/src/cloudproviders/Azure.js +1 -1
- package/ats/src/cloudproviders/CloudProvider.js +1 -1
- package/ats/src/cloudproviders/GoogleCloudProvider.js +1 -1
- package/ats/src/cloudproviders/utils.js +1 -1
- package/ats/src/commands/configure.js +1 -1
- package/ats/src/commands/connect.js +1 -1
- package/ats/src/commands/connect_commands/grid.js +1 -1
- package/ats/src/commands/create.js +1 -1
- package/ats/src/commands/create_commands/grid.js +1 -1
- package/ats/src/commands/delete.js +1 -1
- package/ats/src/commands/delete_commands/grid.js +1 -1
- package/ats/src/commands/init.js +1 -1
- package/ats/src/commands/list.js +1 -1
- package/ats/src/commands/list_commands/grid_profiles.js +1 -1
- package/ats/src/commands/list_commands/grids.js +1 -1
- package/ats/src/commands/start.js +1 -1
- package/ats/src/commands/start_commands/grid.js +1 -1
- package/ats/src/commands/stop.js +1 -1
- package/ats/src/commands/stop_commands/grid.js +1 -1
- package/ats/src/config/constants.js +1 -1
- package/ats/src/config/logger.js +1 -1
- package/ats/src/index.js +1 -1
- package/ats/src/templates/hub-deployment.yaml +3 -25
- package/ats/src/templates/nginx/helper.yaml +0 -1
- package/ats/src/templates/nginx/private-pods-and-services.yaml +0 -1
- package/ats/src/templates/turboscale-agent.yaml +8 -0
- package/ats/src/utils/AWSUtils.js +1 -1
- package/ats/src/utils/createAutoscalerStack.js +1 -1
- package/ats/src/utils/createClusterStack.js +1 -1
- package/ats/src/utils/createk8sClient.js +1 -1
- package/ats/src/utils/deleteStack.js +1 -1
- package/ats/src/utils/gridComponents.js +1 -1
- package/ats/src/utils/hstUtils.js +1 -1
- package/ats/src/utils/instrumentationUtils.js +1 -1
- package/ats/src/utils/userInput.js +1 -1
- package/ats/src/utils/utilityMethods.js +1 -1
- package/ats/src/utils/webSocketUtils.js +1 -1
- package/package.json +1 -1
- package/src/ai-sdk-node/bundle.js +1 -1
- package/src/bin/codeceptjs/BrowserStackPlugin.js +1 -1
- package/src/bin/codeceptjs/command.js +1 -1
- package/src/bin/codeceptjs/helper.js +1 -1
- package/src/bin/codeceptjs/o11yHelper.js +1 -1
- package/src/bin/cucumber-js/command.js +1 -1
- package/src/bin/cucumber-js/formatter/custom_formatter.js +1 -1
- package/src/bin/cucumber-js/formatter/custom_formatter_old_versions.js +1 -1
- package/src/bin/cucumber-js/test-observability.js +1 -1
- package/src/bin/cucumber-js/test.setup.js +1 -1
- package/src/bin/cucumber-js/test_old.setup.js +1 -1
- package/src/bin/cucumber-js/timeout.setup.js +1 -1
- package/src/bin/integrations/command.js +1 -1
- package/src/bin/integrations/constants.js +1 -1
- package/src/bin/jest/command.js +1 -1
- package/src/bin/jest/customImplements/customCircus.js +1 -1
- package/src/bin/jest/customImplements/customEnvironment.js +1 -1
- package/src/bin/jest/customImplements/customJestAdapterInit.js +1 -1
- package/src/bin/jest/customImplements/customTestRunnerTemplate.js +1 -1
- package/src/bin/jest/jest.setup.js +1 -1
- package/src/bin/jest/test-observability/data-hooks.js +1 -1
- package/src/bin/jest/test-observability/helper.js +1 -1
- package/src/bin/jest/test-observability/obsReporter.js +1 -1
- package/src/bin/jest/test-observability/test-details.js +1 -1
- package/src/bin/jest/test_before.setup.js +1 -1
- package/src/bin/launcher/launcher.js +1 -1
- package/src/bin/mocha/accessibility-automation/helper.js +1 -1
- package/src/bin/mocha/bstack-reporter/customReporter.js +1 -1
- package/src/bin/mocha/command.js +1 -1
- package/src/bin/mocha/test-observability/builderPatch.js +1 -1
- package/src/bin/mocha/test-observability/data-hooks.js +1 -1
- package/src/bin/mocha/test-observability/mochaUtils.js +1 -1
- package/src/bin/mocha/test.setup.js +1 -1
- package/src/bin/nightwatch/command.js +1 -1
- package/src/bin/playwright/accessibility-helper.js +1 -1
- package/src/bin/playwright/command.js +1 -1
- package/src/bin/playwright/globalSetup.js +1 -1
- package/src/bin/playwright/mock-process.js +1 -1
- package/src/bin/playwright/modifyPlaywrightConf.js +1 -1
- package/src/bin/playwright/patches.js +1 -1
- package/src/bin/playwright/reporter/pwUtils.js +1 -1
- package/src/bin/playwright/reporter/reporter.js +1 -1
- package/src/bin/playwright/reporter/test-details.js +1 -1
- package/src/bin/playwright/sessionDetails.js +1 -1
- package/src/bin/runner.js +1 -1
- package/src/bin/setup.js +1 -1
- package/src/bin/test-runner/index.js +1 -1
- package/src/bin/test-runner/runTest.js +1 -1
- package/src/bin/test-runner/testWorker.js +1 -1
- package/src/bin/utils/constants.js +1 -1
- package/src/bin/utils/log4jsAppender.js +1 -1
- package/src/bin/utils/logPatcher.js +1 -1
- package/src/bin/utils/logReportingAPI.js +1 -1
- package/src/bin/vanilla-js/command.js +1 -1
- package/src/browserStackSdk.js +1 -1
- package/src/helpers/BrowserStackSetup.js +1 -1
- package/src/helpers/accessibility-automation/constants.js +1 -1
- package/src/helpers/accessibility-automation/helper.js +1 -1
- package/src/helpers/accessibility-automation/scripts.js +1 -1
- package/src/helpers/ai-sdk/aiSdkWrapper.js +1 -1
- package/src/helpers/ai-sdk/autoHealHelper.js +1 -1
- package/src/helpers/ats/constants.js +1 -1
- package/src/helpers/ats/helper.js +1 -1
- package/src/helpers/capsMapping.js +1 -1
- package/src/helpers/central-scanner/constants.js +1 -1
- package/src/helpers/central-scanner/helpers.js +1 -1
- package/src/helpers/globals.js +1 -1
- package/src/helpers/helper.js +1 -1
- package/src/helpers/logger.js +1 -1
- package/src/helpers/patchHelper.js +1 -1
- package/src/helpers/patchHelpers.js +1 -1
- package/src/helpers/percy/Percy.js +1 -1
- package/src/helpers/percy/PercyBinary.js +1 -1
- package/src/helpers/percy/PercyCaptureMap.js +1 -1
- package/src/helpers/percy/PercyCaptureModes.js +1 -1
- package/src/helpers/percy/PercySDK.js +1 -1
- package/src/helpers/percy/index.js +1 -1
- package/src/helpers/percy/utils.js +1 -1
- package/src/helpers/performance/constants.js +1 -1
- package/src/helpers/performance/performance-tester.js +1 -1
- package/src/helpers/processHelper.js +1 -1
- package/src/helpers/request-spy.js +1 -1
- package/src/helpers/setKeepAlive.js +1 -1
- package/src/helpers/test-observability/constants.js +1 -1
- package/src/helpers/test-observability/error-handler.js +1 -1
- package/src/helpers/test-observability/requestQueueHandler.js +1 -1
- package/src/helpers/test-observability/sessionHandler.js +1 -1
- package/src/helpers/test-observability/utils.js +1 -1
- package/src/helpers/testhub/constants.js +1 -1
- package/src/helpers/testhub/testhubHandler.js +1 -1
- package/src/helpers/testhub/utils.js +1 -1
- package/src/helpers/timeoutPromise.js +1 -1
- package/src/helpers/utilities.js +1 -1
- package/src/helpers/w3cMapping.js +1 -1
- package/src/hubAllocationMethods.js +1 -1
- package/src/index.js +1 -1
- package/ats/src/CFTemplates/hub-ha.yaml +0 -81
- package/ats/src/templates/browserstack-secret.yaml +0 -10
- package/ats/src/templates/hubharesources/bitnami-kafka.yaml +0 -711
- package/ats/src/templates/hubharesources/bitnami-redis.yaml +0 -1048
- package/ats/src/templates/hubharesources/browserstack-secret.yaml +0 -10
- package/ats/src/templates/hubharesources/efs-csi-driver-aws.yaml +0 -401
- package/ats/src/templates/hubharesources/federatedidentityuploader.json +0 -50
- package/ats/src/templates/hubharesources/storage-class.yaml +0 -12
- package/ats/src/templates/hubharesources/turboscale-uploader.yaml +0 -53
- package/ats/src/utils/createHubHaStack.js +0 -1
- package/ats/src/utils/deleteEFSMountTargets.js +0 -1
- package/ats/src/utils/describeStack.js +0 -1
|
@@ -1,401 +0,0 @@
|
|
|
1
|
-
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
2
|
-
apiVersion: v1
|
|
3
|
-
kind: ServiceAccount
|
|
4
|
-
metadata:
|
|
5
|
-
name: efs-csi-controller-sa
|
|
6
|
-
namespace: kube-system
|
|
7
|
-
labels:
|
|
8
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
9
|
-
annotations:
|
|
10
|
-
eks.amazonaws.com/role-arn: <EfsCSIControllerARN>
|
|
11
|
-
---
|
|
12
|
-
# Source: aws-efs-csi-driver/templates/node-serviceaccount.yaml
|
|
13
|
-
apiVersion: v1
|
|
14
|
-
kind: ServiceAccount
|
|
15
|
-
metadata:
|
|
16
|
-
name: efs-csi-node-sa
|
|
17
|
-
namespace: kube-system
|
|
18
|
-
labels:
|
|
19
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
20
|
-
---
|
|
21
|
-
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
22
|
-
kind: ClusterRole
|
|
23
|
-
apiVersion: rbac.authorization.k8s.io/v1
|
|
24
|
-
metadata:
|
|
25
|
-
name: efs-csi-external-provisioner-role
|
|
26
|
-
labels:
|
|
27
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
28
|
-
rules:
|
|
29
|
-
- apiGroups: [""]
|
|
30
|
-
resources: ["persistentvolumes"]
|
|
31
|
-
verbs: ["get", "list", "watch", "create", "patch", "delete"]
|
|
32
|
-
- apiGroups: [""]
|
|
33
|
-
resources: ["persistentvolumeclaims"]
|
|
34
|
-
verbs: ["get", "list", "watch", "update"]
|
|
35
|
-
- apiGroups: ["storage.k8s.io"]
|
|
36
|
-
resources: ["storageclasses"]
|
|
37
|
-
verbs: ["get", "list", "watch"]
|
|
38
|
-
- apiGroups: [""]
|
|
39
|
-
resources: ["events"]
|
|
40
|
-
verbs: ["list", "watch", "create", "patch"]
|
|
41
|
-
- apiGroups: ["storage.k8s.io"]
|
|
42
|
-
resources: ["csinodes"]
|
|
43
|
-
verbs: ["get", "list", "watch"]
|
|
44
|
-
- apiGroups: [""]
|
|
45
|
-
resources: ["nodes"]
|
|
46
|
-
verbs: ["get", "list", "watch"]
|
|
47
|
-
- apiGroups: ["coordination.k8s.io"]
|
|
48
|
-
resources: ["leases"]
|
|
49
|
-
verbs: ["get", "watch", "list", "delete", "update", "create"]
|
|
50
|
-
---
|
|
51
|
-
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
52
|
-
kind: ClusterRole
|
|
53
|
-
apiVersion: rbac.authorization.k8s.io/v1
|
|
54
|
-
metadata:
|
|
55
|
-
name: efs-csi-external-provisioner-role-describe-secrets
|
|
56
|
-
labels:
|
|
57
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
58
|
-
rules:
|
|
59
|
-
- apiGroups: [ "" ]
|
|
60
|
-
resources: [ "secrets" ]
|
|
61
|
-
resourceNames: ["x-account"]
|
|
62
|
-
verbs: [ "get", "watch", "list" ]
|
|
63
|
-
---
|
|
64
|
-
# Source: aws-efs-csi-driver/templates/node-serviceaccount.yaml
|
|
65
|
-
kind: ClusterRole
|
|
66
|
-
apiVersion: rbac.authorization.k8s.io/v1
|
|
67
|
-
metadata:
|
|
68
|
-
name: efs-csi-node-role
|
|
69
|
-
labels:
|
|
70
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
71
|
-
rules:
|
|
72
|
-
- apiGroups: [""]
|
|
73
|
-
resources: ["nodes"]
|
|
74
|
-
verbs: ["get", "list", "watch", "patch"]
|
|
75
|
-
---
|
|
76
|
-
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
77
|
-
kind: ClusterRoleBinding
|
|
78
|
-
apiVersion: rbac.authorization.k8s.io/v1
|
|
79
|
-
metadata:
|
|
80
|
-
name: efs-csi-provisioner-binding
|
|
81
|
-
labels:
|
|
82
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
83
|
-
subjects:
|
|
84
|
-
- kind: ServiceAccount
|
|
85
|
-
name: efs-csi-controller-sa
|
|
86
|
-
namespace: kube-system
|
|
87
|
-
roleRef:
|
|
88
|
-
kind: ClusterRole
|
|
89
|
-
name: efs-csi-external-provisioner-role
|
|
90
|
-
apiGroup: rbac.authorization.k8s.io
|
|
91
|
-
---
|
|
92
|
-
# Source: aws-efs-csi-driver/templates/node-serviceaccount.yaml
|
|
93
|
-
kind: ClusterRoleBinding
|
|
94
|
-
apiVersion: rbac.authorization.k8s.io/v1
|
|
95
|
-
metadata:
|
|
96
|
-
name: efs-csi-node-binding
|
|
97
|
-
labels:
|
|
98
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
99
|
-
subjects:
|
|
100
|
-
- kind: ServiceAccount
|
|
101
|
-
name: efs-csi-node-sa
|
|
102
|
-
namespace: kube-system
|
|
103
|
-
roleRef:
|
|
104
|
-
kind: ClusterRole
|
|
105
|
-
name: efs-csi-node-role
|
|
106
|
-
apiGroup: rbac.authorization.k8s.io
|
|
107
|
-
---
|
|
108
|
-
# Source: aws-efs-csi-driver/templates/controller-serviceaccount.yaml
|
|
109
|
-
# We use a RoleBinding to restrict Secret access to the namespace that the
|
|
110
|
-
# RoleBinding is created in (typically kube-system)
|
|
111
|
-
kind: RoleBinding
|
|
112
|
-
apiVersion: rbac.authorization.k8s.io/v1
|
|
113
|
-
metadata:
|
|
114
|
-
name: efs-csi-provisioner-binding-describe-secrets
|
|
115
|
-
namespace: kube-system
|
|
116
|
-
labels:
|
|
117
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
118
|
-
subjects:
|
|
119
|
-
- kind: ServiceAccount
|
|
120
|
-
name: efs-csi-controller-sa
|
|
121
|
-
namespace: kube-system
|
|
122
|
-
roleRef:
|
|
123
|
-
kind: ClusterRole
|
|
124
|
-
name: efs-csi-external-provisioner-role-describe-secrets
|
|
125
|
-
apiGroup: rbac.authorization.k8s.io
|
|
126
|
-
---
|
|
127
|
-
# Source: aws-efs-csi-driver/templates/node-daemonset.yaml
|
|
128
|
-
# Node Service
|
|
129
|
-
kind: DaemonSet
|
|
130
|
-
apiVersion: apps/v1
|
|
131
|
-
metadata:
|
|
132
|
-
name: efs-csi-node
|
|
133
|
-
namespace: kube-system
|
|
134
|
-
labels:
|
|
135
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
136
|
-
spec:
|
|
137
|
-
selector:
|
|
138
|
-
matchLabels:
|
|
139
|
-
app: efs-csi-node
|
|
140
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
141
|
-
app.kubernetes.io/instance: release-name
|
|
142
|
-
template:
|
|
143
|
-
metadata:
|
|
144
|
-
labels:
|
|
145
|
-
app: efs-csi-node
|
|
146
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
147
|
-
app.kubernetes.io/instance: release-name
|
|
148
|
-
spec:
|
|
149
|
-
nodeSelector:
|
|
150
|
-
kubernetes.io/os: linux
|
|
151
|
-
affinity:
|
|
152
|
-
nodeAffinity:
|
|
153
|
-
requiredDuringSchedulingIgnoredDuringExecution:
|
|
154
|
-
nodeSelectorTerms:
|
|
155
|
-
- matchExpressions:
|
|
156
|
-
- key: eks.amazonaws.com/compute-type
|
|
157
|
-
operator: NotIn
|
|
158
|
-
values:
|
|
159
|
-
- fargate
|
|
160
|
-
- hybrid
|
|
161
|
-
hostNetwork: true
|
|
162
|
-
dnsPolicy: ClusterFirst
|
|
163
|
-
serviceAccountName: efs-csi-node-sa
|
|
164
|
-
priorityClassName: system-node-critical
|
|
165
|
-
tolerations:
|
|
166
|
-
- operator: Exists
|
|
167
|
-
securityContext:
|
|
168
|
-
fsGroup: 0
|
|
169
|
-
runAsGroup: 0
|
|
170
|
-
runAsNonRoot: false
|
|
171
|
-
runAsUser: 0
|
|
172
|
-
containers:
|
|
173
|
-
- name: efs-plugin
|
|
174
|
-
securityContext:
|
|
175
|
-
privileged: true
|
|
176
|
-
image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/eks/aws-efs-csi-driver:latest
|
|
177
|
-
imagePullPolicy: IfNotPresent
|
|
178
|
-
args:
|
|
179
|
-
- --endpoint=$(CSI_ENDPOINT)
|
|
180
|
-
- --logtostderr
|
|
181
|
-
- --v=2
|
|
182
|
-
- --vol-metrics-opt-in=false
|
|
183
|
-
- --vol-metrics-refresh-period=240
|
|
184
|
-
- --vol-metrics-fs-rate-limit=5
|
|
185
|
-
env:
|
|
186
|
-
- name: CSI_ENDPOINT
|
|
187
|
-
value: unix:/csi/csi.sock
|
|
188
|
-
- name: CSI_NODE_NAME
|
|
189
|
-
valueFrom:
|
|
190
|
-
fieldRef:
|
|
191
|
-
fieldPath: spec.nodeName
|
|
192
|
-
- name: PORT_RANGE_UPPER_BOUND
|
|
193
|
-
value: "21049"
|
|
194
|
-
volumeMounts:
|
|
195
|
-
- name: kubelet-dir
|
|
196
|
-
mountPath: /var/lib/kubelet
|
|
197
|
-
mountPropagation: "Bidirectional"
|
|
198
|
-
- name: plugin-dir
|
|
199
|
-
mountPath: /csi
|
|
200
|
-
- name: efs-state-dir
|
|
201
|
-
mountPath: /var/run/efs
|
|
202
|
-
- name: efs-utils-config
|
|
203
|
-
mountPath: /var/amazon/efs
|
|
204
|
-
- name: efs-utils-config-legacy
|
|
205
|
-
mountPath: /etc/amazon/efs-legacy
|
|
206
|
-
ports:
|
|
207
|
-
- name: healthz
|
|
208
|
-
containerPort: 9809
|
|
209
|
-
protocol: TCP
|
|
210
|
-
livenessProbe:
|
|
211
|
-
httpGet:
|
|
212
|
-
path: /healthz
|
|
213
|
-
port: healthz
|
|
214
|
-
initialDelaySeconds: 10
|
|
215
|
-
timeoutSeconds: 3
|
|
216
|
-
periodSeconds: 2
|
|
217
|
-
failureThreshold: 5
|
|
218
|
-
- name: csi-driver-registrar
|
|
219
|
-
image: public.ecr.aws/eks-distro/kubernetes-csi/node-driver-registrar:v2.12.0-eks-1-31-5
|
|
220
|
-
imagePullPolicy: IfNotPresent
|
|
221
|
-
args:
|
|
222
|
-
- --csi-address=$(ADDRESS)
|
|
223
|
-
- --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)
|
|
224
|
-
- --v=2
|
|
225
|
-
env:
|
|
226
|
-
- name: ADDRESS
|
|
227
|
-
value: /csi/csi.sock
|
|
228
|
-
- name: DRIVER_REG_SOCK_PATH
|
|
229
|
-
value: /var/lib/kubelet/plugins/efs.csi.aws.com/csi.sock
|
|
230
|
-
- name: KUBE_NODE_NAME
|
|
231
|
-
valueFrom:
|
|
232
|
-
fieldRef:
|
|
233
|
-
fieldPath: spec.nodeName
|
|
234
|
-
volumeMounts:
|
|
235
|
-
- name: plugin-dir
|
|
236
|
-
mountPath: /csi
|
|
237
|
-
- name: registration-dir
|
|
238
|
-
mountPath: /registration
|
|
239
|
-
securityContext:
|
|
240
|
-
allowPrivilegeEscalation: false
|
|
241
|
-
readOnlyRootFilesystem: true
|
|
242
|
-
- name: liveness-probe
|
|
243
|
-
image: public.ecr.aws/eks-distro/kubernetes-csi/livenessprobe:v2.14.0-eks-1-31-5
|
|
244
|
-
imagePullPolicy: IfNotPresent
|
|
245
|
-
args:
|
|
246
|
-
- --csi-address=/csi/csi.sock
|
|
247
|
-
- --health-port=9809
|
|
248
|
-
- --v=2
|
|
249
|
-
volumeMounts:
|
|
250
|
-
- name: plugin-dir
|
|
251
|
-
mountPath: /csi
|
|
252
|
-
securityContext:
|
|
253
|
-
allowPrivilegeEscalation: false
|
|
254
|
-
readOnlyRootFilesystem: true
|
|
255
|
-
volumes:
|
|
256
|
-
- name: kubelet-dir
|
|
257
|
-
hostPath:
|
|
258
|
-
path: /var/lib/kubelet
|
|
259
|
-
type: Directory
|
|
260
|
-
- name: plugin-dir
|
|
261
|
-
hostPath:
|
|
262
|
-
path: /var/lib/kubelet/plugins/efs.csi.aws.com/
|
|
263
|
-
type: DirectoryOrCreate
|
|
264
|
-
- name: registration-dir
|
|
265
|
-
hostPath:
|
|
266
|
-
path: /var/lib/kubelet/plugins_registry/
|
|
267
|
-
type: Directory
|
|
268
|
-
- name: efs-state-dir
|
|
269
|
-
hostPath:
|
|
270
|
-
path: /var/run/efs
|
|
271
|
-
type: DirectoryOrCreate
|
|
272
|
-
- name: efs-utils-config
|
|
273
|
-
hostPath:
|
|
274
|
-
path: /var/amazon/efs
|
|
275
|
-
type: DirectoryOrCreate
|
|
276
|
-
- name: efs-utils-config-legacy
|
|
277
|
-
hostPath:
|
|
278
|
-
path: /etc/amazon/efs
|
|
279
|
-
type: DirectoryOrCreate
|
|
280
|
-
---
|
|
281
|
-
# Source: aws-efs-csi-driver/templates/controller-deployment.yaml
|
|
282
|
-
# Controller Service
|
|
283
|
-
kind: Deployment
|
|
284
|
-
apiVersion: apps/v1
|
|
285
|
-
metadata:
|
|
286
|
-
name: efs-csi-controller
|
|
287
|
-
namespace: kube-system
|
|
288
|
-
labels:
|
|
289
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
290
|
-
spec:
|
|
291
|
-
replicas: 2
|
|
292
|
-
selector:
|
|
293
|
-
matchLabels:
|
|
294
|
-
app: efs-csi-controller
|
|
295
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
296
|
-
app.kubernetes.io/instance: release-name
|
|
297
|
-
template:
|
|
298
|
-
metadata:
|
|
299
|
-
labels:
|
|
300
|
-
app: efs-csi-controller
|
|
301
|
-
app.kubernetes.io/name: aws-efs-csi-driver
|
|
302
|
-
app.kubernetes.io/instance: release-name
|
|
303
|
-
spec:
|
|
304
|
-
hostNetwork: false
|
|
305
|
-
nodeSelector:
|
|
306
|
-
kubernetes.io/os: linux
|
|
307
|
-
serviceAccountName: efs-csi-controller-sa
|
|
308
|
-
priorityClassName: system-cluster-critical
|
|
309
|
-
tolerations:
|
|
310
|
-
- key: CriticalAddonsOnly
|
|
311
|
-
operator: Exists
|
|
312
|
-
- key: efs.csi.aws.com/agent-not-ready
|
|
313
|
-
operator: Exists
|
|
314
|
-
securityContext:
|
|
315
|
-
fsGroup: 0
|
|
316
|
-
runAsGroup: 0
|
|
317
|
-
runAsNonRoot: false
|
|
318
|
-
runAsUser: 0
|
|
319
|
-
dnsPolicy: ClusterFirst
|
|
320
|
-
containers:
|
|
321
|
-
- name: efs-plugin
|
|
322
|
-
securityContext:
|
|
323
|
-
privileged: true
|
|
324
|
-
image: 602401143452.dkr.ecr.us-west-2.amazonaws.com/eks/aws-efs-csi-driver:v2.1.4
|
|
325
|
-
imagePullPolicy: IfNotPresent
|
|
326
|
-
args:
|
|
327
|
-
- --endpoint=$(CSI_ENDPOINT)
|
|
328
|
-
- --logtostderr
|
|
329
|
-
- --v=2
|
|
330
|
-
- --delete-access-point-root-dir=false
|
|
331
|
-
env:
|
|
332
|
-
- name: CSI_ENDPOINT
|
|
333
|
-
value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock
|
|
334
|
-
- name: CSI_NODE_NAME
|
|
335
|
-
valueFrom:
|
|
336
|
-
fieldRef:
|
|
337
|
-
fieldPath: spec.nodeName
|
|
338
|
-
- name: PORT_RANGE_UPPER_BOUND
|
|
339
|
-
value: "21049"
|
|
340
|
-
volumeMounts:
|
|
341
|
-
- name: socket-dir
|
|
342
|
-
mountPath: /var/lib/csi/sockets/pluginproxy/
|
|
343
|
-
ports:
|
|
344
|
-
- name: healthz
|
|
345
|
-
containerPort: 9909
|
|
346
|
-
protocol: TCP
|
|
347
|
-
livenessProbe:
|
|
348
|
-
httpGet:
|
|
349
|
-
path: /healthz
|
|
350
|
-
port: healthz
|
|
351
|
-
initialDelaySeconds: 10
|
|
352
|
-
timeoutSeconds: 3
|
|
353
|
-
periodSeconds: 10
|
|
354
|
-
failureThreshold: 5
|
|
355
|
-
- name: csi-provisioner
|
|
356
|
-
image: public.ecr.aws/eks-distro/kubernetes-csi/external-provisioner:v5.1.0-eks-1-31-5
|
|
357
|
-
imagePullPolicy: IfNotPresent
|
|
358
|
-
args:
|
|
359
|
-
- --csi-address=$(ADDRESS)
|
|
360
|
-
- --v=2
|
|
361
|
-
- --feature-gates=Topology=true
|
|
362
|
-
- --extra-create-metadata
|
|
363
|
-
- --leader-election
|
|
364
|
-
- --leader-election-renew-deadline=10s
|
|
365
|
-
- --leader-election-lease-duration=15s
|
|
366
|
-
env:
|
|
367
|
-
- name: ADDRESS
|
|
368
|
-
value: /var/lib/csi/sockets/pluginproxy/csi.sock
|
|
369
|
-
volumeMounts:
|
|
370
|
-
- name: socket-dir
|
|
371
|
-
mountPath: /var/lib/csi/sockets/pluginproxy/
|
|
372
|
-
securityContext:
|
|
373
|
-
allowPrivilegeEscalation: false
|
|
374
|
-
readOnlyRootFilesystem: true
|
|
375
|
-
- name: liveness-probe
|
|
376
|
-
image: public.ecr.aws/eks-distro/kubernetes-csi/livenessprobe:v2.14.0-eks-1-31-5
|
|
377
|
-
imagePullPolicy: IfNotPresent
|
|
378
|
-
args:
|
|
379
|
-
- --csi-address=/csi/csi.sock
|
|
380
|
-
- --health-port=9909
|
|
381
|
-
volumeMounts:
|
|
382
|
-
- name: socket-dir
|
|
383
|
-
mountPath: /csi
|
|
384
|
-
securityContext:
|
|
385
|
-
allowPrivilegeEscalation: false
|
|
386
|
-
readOnlyRootFilesystem: true
|
|
387
|
-
volumes:
|
|
388
|
-
- name: socket-dir
|
|
389
|
-
emptyDir: {}
|
|
390
|
-
---
|
|
391
|
-
# Source: aws-efs-csi-driver/templates/csidriver.yaml
|
|
392
|
-
apiVersion: storage.k8s.io/v1
|
|
393
|
-
kind: CSIDriver
|
|
394
|
-
metadata:
|
|
395
|
-
name: efs.csi.aws.com
|
|
396
|
-
annotations:
|
|
397
|
-
"helm.sh/hook": pre-install, pre-upgrade
|
|
398
|
-
"helm.sh/hook-delete-policy": before-hook-creation
|
|
399
|
-
"helm.sh/resource-policy": keep
|
|
400
|
-
spec:
|
|
401
|
-
attachRequired: false
|
|
@@ -1,50 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
|
|
3
|
-
"contentVersion": "1.0.0.0",
|
|
4
|
-
"parameters": {
|
|
5
|
-
"clusterName": {
|
|
6
|
-
"type": "string",
|
|
7
|
-
"metadata": {
|
|
8
|
-
"description": "The name of the Managed Cluster resource."
|
|
9
|
-
}
|
|
10
|
-
},
|
|
11
|
-
"oidcIssuer": {
|
|
12
|
-
"type": "string",
|
|
13
|
-
"metadata": {
|
|
14
|
-
"description": "OIDC Issuer of AKS Cluster"
|
|
15
|
-
}
|
|
16
|
-
},
|
|
17
|
-
"namespace": {
|
|
18
|
-
"type": "string",
|
|
19
|
-
"metadata": {
|
|
20
|
-
"description": "NameSpace"
|
|
21
|
-
}
|
|
22
|
-
}
|
|
23
|
-
},
|
|
24
|
-
"variables": {
|
|
25
|
-
"managedIdentityName": "[concat('turboscale-managed-identity-', parameters('clusterName'))]"
|
|
26
|
-
},
|
|
27
|
-
"resources": [
|
|
28
|
-
{
|
|
29
|
-
"type": "Microsoft.ManagedIdentity/userAssignedIdentities",
|
|
30
|
-
"apiVersion": "2022-01-31-preview",
|
|
31
|
-
"name": "[variables('managedIdentityName')]",
|
|
32
|
-
"location": "[resourceGroup().location]"
|
|
33
|
-
},
|
|
34
|
-
{
|
|
35
|
-
"type": "Microsoft.ManagedIdentity/userAssignedIdentities/federatedIdentityCredentials",
|
|
36
|
-
"apiVersion": "2022-01-31-preview",
|
|
37
|
-
"name": "[concat(variables('managedIdentityName'), '/turboscale-federated-identity-hub-', parameters('namespace'))]",
|
|
38
|
-
"dependsOn": [
|
|
39
|
-
"[resourceId('Microsoft.ManagedIdentity/userAssignedIdentities', variables('managedIdentityName'))]"
|
|
40
|
-
],
|
|
41
|
-
"properties": {
|
|
42
|
-
"issuer": "[parameters('oidcIssuer')]",
|
|
43
|
-
"subject": "[concat('system:serviceaccount:', parameters('namespace'), ':uploader')]",
|
|
44
|
-
"audiences": [
|
|
45
|
-
"api://AzureADTokenExchange"
|
|
46
|
-
]
|
|
47
|
-
}
|
|
48
|
-
}
|
|
49
|
-
]
|
|
50
|
-
}
|
|
@@ -1,12 +0,0 @@
|
|
|
1
|
-
apiVersion: storage.k8s.io/v1
|
|
2
|
-
kind: StorageClass
|
|
3
|
-
metadata:
|
|
4
|
-
name: efs-csi
|
|
5
|
-
# Below mode will not create pv even after creating pvc until some pod is associated with that pvc
|
|
6
|
-
parameters:
|
|
7
|
-
# Other params will be added dynamically based on cloud provider
|
|
8
|
-
provisioningMode: efs-ap
|
|
9
|
-
directoryPerms: "777"
|
|
10
|
-
provisioner: efs.csi.aws.com
|
|
11
|
-
reclaimPolicy: Delete
|
|
12
|
-
volumeBindingMode: Immediate
|
|
@@ -1,53 +0,0 @@
|
|
|
1
|
-
apiVersion: apps/v1
|
|
2
|
-
kind: Deployment
|
|
3
|
-
metadata:
|
|
4
|
-
name: turboscale-uploader
|
|
5
|
-
namespace: <HubHaNameSpace>
|
|
6
|
-
labels:
|
|
7
|
-
name: turboscale-uploader
|
|
8
|
-
annotations:
|
|
9
|
-
"helm.sh/hook": post-install
|
|
10
|
-
"helm.sh/hook-delete-policy": hook-failed
|
|
11
|
-
cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
|
|
12
|
-
spec:
|
|
13
|
-
replicas: 1
|
|
14
|
-
selector:
|
|
15
|
-
matchLabels:
|
|
16
|
-
name: turboscale-uploader
|
|
17
|
-
template:
|
|
18
|
-
metadata:
|
|
19
|
-
labels:
|
|
20
|
-
name: turboscale-uploader
|
|
21
|
-
spec:
|
|
22
|
-
containers:
|
|
23
|
-
- name: turboscale-uploader
|
|
24
|
-
image: public.ecr.aws/v4a1k5d3/browserstack/turboscale-kafka-uploader:<UploaderImageVersion>
|
|
25
|
-
imagePullPolicy: Always
|
|
26
|
-
securityContext:
|
|
27
|
-
allowPrivilegeEscalation: false
|
|
28
|
-
env:
|
|
29
|
-
- name: BSTACK_ENV
|
|
30
|
-
value: "production"
|
|
31
|
-
- name: REDIS_NAMESPACE
|
|
32
|
-
value: <HubHaNameSpace>
|
|
33
|
-
- name: KAFKA_NAMESPACE
|
|
34
|
-
value: <HubHaNameSpace>
|
|
35
|
-
- name: REDIS_PASSWORD
|
|
36
|
-
valueFrom:
|
|
37
|
-
secretKeyRef:
|
|
38
|
-
name: browserstack-secret
|
|
39
|
-
key: redis-password
|
|
40
|
-
- name: KAFKA_PASSWORD
|
|
41
|
-
valueFrom:
|
|
42
|
-
secretKeyRef:
|
|
43
|
-
name: browserstack-secret
|
|
44
|
-
key: kafka-password
|
|
45
|
-
resources:
|
|
46
|
-
limits:
|
|
47
|
-
cpu: "0.5"
|
|
48
|
-
memory: 1Gi
|
|
49
|
-
requests:
|
|
50
|
-
cpu: "0.5"
|
|
51
|
-
memory: 1Gi
|
|
52
|
-
nodeSelector:
|
|
53
|
-
kubernetes.io/os: linux
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
const a26_0x1af321=a26_0x4ee8;(function(_0x133569,_0x3422c9){const _0x204233=a26_0x4ee8,_0x54be3e=_0x133569();while(!![]){try{const _0x3c1bd7=-parseInt(_0x204233(0x152))/0x1*(parseInt(_0x204233(0x130))/0x2)+parseInt(_0x204233(0x11c))/0x3*(parseInt(_0x204233(0x13e))/0x4)+parseInt(_0x204233(0x145))/0x5+parseInt(_0x204233(0x12a))/0x6*(-parseInt(_0x204233(0x140))/0x7)+parseInt(_0x204233(0x11f))/0x8+-parseInt(_0x204233(0x144))/0x9+parseInt(_0x204233(0x132))/0xa*(parseInt(_0x204233(0x14b))/0xb);if(_0x3c1bd7===_0x3422c9)break;else _0x54be3e['push'](_0x54be3e['shift']());}catch(_0x17ae33){_0x54be3e['push'](_0x54be3e['shift']());}}}(a26_0x588e,0xc2e22));const fs=require('fs'),path=require(a26_0x1af321(0x139)),Promise=require(a26_0x1af321(0x120)),yaml=require(a26_0x1af321(0x129)),{CLOUDFORMATION_SCHEMA}=require(a26_0x1af321(0x14c)),AWS=require(a26_0x1af321(0x12f))[a26_0x1af321(0x12b)],AWSUtils=require('./AWSUtils'),{CLUSTER_HUB_HA_STACK_NAME,COMMON_HST_TAGS}=require(a26_0x1af321(0x128)),{logger}=require('../config/logger');Promise['promisifyAll'](fs);function a26_0x588e(){const _0x22956f=['stringify','BaseResourceName','CAPABILITY_NAMED_IAM','StackName','iwOyO','waitFor','31839whhHBF','CloudFormation','Key','8153312sTOewg','bluebird','promise','DELETE','Capabilities','wSCPC','NGxBw','Parameters','browserstack:creationDate','../config/constants','js-yaml','4776594bPRhZR','awsObj','apiVersion','nabCX','hub-ha.yaml','./AWSUtils','620ooaAuT','Properties','5669030wWwgQI','getOidcUrl','VaIEZ','OnFailure','TemplateBody','stackCreateComplete','load','path','-cf','Tags','readFileAsync','EWbHH','304fBEAkS','Resources','14zXHEog','createStack','Waiting\x20for\x20CloudFormation\x20stack\x20to\x20complete','join','6045372hEKAOB','7484415RdidHb','qbeAe','PXJHW','2010-05-15','toString','push','11shMUWp','js-yaml-cloudformation-schema','CFTemplates','UAsjq','createHubHaStack','://','info','2669DSgYTc','gFPkt','StackId','owTCi'];a26_0x588e=function(){return _0x22956f;};return a26_0x588e();}const addTags=async(_0x285de0,_0x5a9bdc)=>{const _0x5a97f2=a26_0x1af321;for(const _0x12d898 in _0x285de0['Resources']){_0x285de0[_0x5a97f2(0x13f)][_0x12d898][_0x5a97f2(0x131)]&&_0x285de0[_0x5a97f2(0x13f)][_0x12d898]['Properties'][_0x5a97f2(0x13b)]&&_0x285de0['Resources'][_0x12d898][_0x5a97f2(0x131)][_0x5a97f2(0x13b)]['push'](..._0x5a9bdc);}};function a26_0x4ee8(_0x32df76,_0x4f41ff){const _0x588ef5=a26_0x588e();return a26_0x4ee8=function(_0x4ee8ef,_0x767be9){_0x4ee8ef=_0x4ee8ef-0x114;let _0x18e804=_0x588ef5[_0x4ee8ef];return _0x18e804;},a26_0x4ee8(_0x32df76,_0x4f41ff);}exports[a26_0x1af321(0x14f)]=async(_0xff4fe3,_0x2c7e9e=null)=>{const _0xe44750=a26_0x1af321,_0x4344db={'wSCPC':'browserstack:cluster','nabCX':_0xe44750(0x127),'PEQeo':_0xe44750(0x148),'PXJHW':_0xe44750(0x14d),'UAsjq':_0xe44750(0x12e),'owTCi':'utf-8','qbeAe':function(_0x18dd19,_0x31e506,_0x2b4a0b){return _0x18dd19(_0x31e506,_0x2b4a0b);},'NGxBw':_0xe44750(0x150),'GonlH':_0xe44750(0x122),'WYWNg':'VpcId','EWbHH':_0xe44750(0x117),'iwOyO':'ClusterOIDCURL','VaIEZ':_0xe44750(0x118),'spPrK':_0xe44750(0x142),'gFPkt':_0xe44750(0x137)},_0xdb42ec=COMMON_HST_TAGS,_0x55faa8={};_0x55faa8[_0xe44750(0x11e)]=_0x4344db[_0xe44750(0x124)],_0x55faa8['Value']=_0xff4fe3,_0xdb42ec[_0xe44750(0x14a)](_0x55faa8),_0xdb42ec[_0xe44750(0x14a)]({'Key':_0x4344db[_0xe44750(0x12d)],'Value':new Date()['valueOf']()[_0xe44750(0x149)]()});const _0x4e92e5={};_0x4e92e5[_0xe44750(0x12c)]=_0x4344db['PEQeo'];const _0x3919e1=new AWS[(_0xe44750(0x11d))](_0x4e92e5),_0xade408=await fs[_0xe44750(0x13c)](path[_0xe44750(0x143)](__dirname,'..',_0x4344db[_0xe44750(0x147)],_0x4344db[_0xe44750(0x14e)]),_0x4344db[_0xe44750(0x115)]),_0x254363={};_0x254363['schema']=CLOUDFORMATION_SCHEMA;const _0x132753=yaml[_0xe44750(0x138)](_0xade408,_0x254363);await _0x4344db[_0xe44750(0x146)](addTags,_0x132753,_0xdb42ec);const _0x268122=JSON[_0xe44750(0x116)](_0x132753);let _0x1f62ce=await AWSUtils[_0xe44750(0x133)](_0xff4fe3);_0x1f62ce=_0x1f62ce['split'](_0x4344db[_0xe44750(0x125)])[0x1];const _0x492678={};_0x492678['StackName']=CLUSTER_HUB_HA_STACK_NAME+'-'+_0xff4fe3+_0xe44750(0x13a),_0x492678[_0xe44750(0x135)]=_0x4344db['GonlH'],_0x492678[_0xe44750(0x136)]=_0x268122,_0x492678[_0xe44750(0x126)]=[{'ParameterKey':_0x4344db['WYWNg'],'ParameterValue':_0x2c7e9e},{'ParameterKey':_0x4344db[_0xe44750(0x13d)],'ParameterValue':CLUSTER_HUB_HA_STACK_NAME+'-'+_0xff4fe3},{'ParameterKey':_0x4344db[_0xe44750(0x11a)],'ParameterValue':_0x1f62ce}],_0x492678[_0xe44750(0x123)]=[_0x4344db[_0xe44750(0x134)]],_0x492678[_0xe44750(0x13b)]=_0xdb42ec;const _0x2d34dd=_0x492678,_0x2cbed8=await _0x3919e1[_0xe44750(0x141)](_0x2d34dd)[_0xe44750(0x121)]();logger[_0xe44750(0x151)](_0x4344db['spPrK']);const _0x3e8db3={};return _0x3e8db3[_0xe44750(0x119)]=_0x2cbed8[_0xe44750(0x114)],_0x3919e1[_0xe44750(0x11b)](_0x4344db[_0xe44750(0x153)],_0x3e8db3)[_0xe44750(0x121)]();};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
function a28_0x17d9(){const _0x4ffe0c=['51404sMuXFa','48PcEWhg','info','2VJHBoc','19278662xjHmPa','region','364845IAzSCn','543010grUytX','OutputValue','656821PofKHn','MountTargetId','224693JUewUs','../config/logger','FileSystemId','EFSFileSystemId','182790whFzTQ','OutputKey','UrCrl','aws-sdk','No\x20EFS\x20FileSystem\x20ID\x20found\x20in\x20stack\x20outputs,\x20skipping\x20mount\x20target\x20deletion.','288fnIUWX','NNABr','promise','9qttRmw','EFS','../config/constants','EFS\x20FileSystem\x20ID\x20found:\x20','Mount\x20target\x20','deleteMountTarget','6DGHgQj','.\x20Deleting\x20mount\x20targets...','Error\x20deleting\x20EFS\x20mount\x20targets:','136OvbSYm','nhFfq','clusterRegion'];a28_0x17d9=function(){return _0x4ffe0c;};return a28_0x17d9();}const a28_0x4b54b6=a28_0x1cc8;(function(_0x2338f2,_0x47839d){const _0x1b8d82=a28_0x1cc8,_0xcee914=_0x2338f2();while(!![]){try{const _0x2bfce4=parseInt(_0x1b8d82(0xed))/0x1*(parseInt(_0x1b8d82(0xf1))/0x2)+-parseInt(_0x1b8d82(0x101))/0x3*(parseInt(_0x1b8d82(0xea))/0x4)+parseInt(_0x1b8d82(0xf0))/0x5*(-parseInt(_0x1b8d82(0x107))/0x6)+-parseInt(_0x1b8d82(0xf5))/0x7*(-parseInt(_0x1b8d82(0x10a))/0x8)+-parseInt(_0x1b8d82(0xfe))/0x9*(-parseInt(_0x1b8d82(0xf9))/0xa)+-parseInt(_0x1b8d82(0xf3))/0xb*(-parseInt(_0x1b8d82(0xeb))/0xc)+-parseInt(_0x1b8d82(0xee))/0xd;if(_0x2bfce4===_0x47839d)break;else _0xcee914['push'](_0xcee914['shift']());}catch(_0x3f014d){_0xcee914['push'](_0xcee914['shift']());}}}(a28_0x17d9,0x4da11));const {logger}=require(a28_0x4b54b6(0xf6)),awsSDK=require(a28_0x4b54b6(0xfc)),{global_registry}=require(a28_0x4b54b6(0x103));function a28_0x1cc8(_0x136758,_0x5b0edc){const _0x17d9b6=a28_0x17d9();return a28_0x1cc8=function(_0x1cc84c,_0x15871c){_0x1cc84c=_0x1cc84c-0xea;let _0x2ab949=_0x17d9b6[_0x1cc84c];return _0x2ab949;},a28_0x1cc8(_0x136758,_0x5b0edc);}exports['deleteEFSMountTarget']=async _0x316c0a=>{const _0x2a4ba7=a28_0x4b54b6,_0x11dbdf={};_0x11dbdf['UrCrl']='No\x20Mount\x20targets\x20found\x20for\x20the\x20EFS\x20FileSystem\x20ID,\x20skipping\x20mount\x20target\x20deletion.',_0x11dbdf['nhFfq']=_0x2a4ba7(0xfd),_0x11dbdf['NNABr']=_0x2a4ba7(0x109);const _0x88b0bd=_0x11dbdf;try{const _0x1b1992={};_0x1b1992[_0x2a4ba7(0xef)]=global_registry[_0x2a4ba7(0x10c)];const _0x3e0fb9=new awsSDK[(_0x2a4ba7(0x102))](_0x1b1992),_0x50bb4b=_0x316c0a['find'](_0x4832b7=>_0x4832b7[_0x2a4ba7(0xfa)]===_0x2a4ba7(0xf8))?.[_0x2a4ba7(0xf2)];if(_0x50bb4b){logger[_0x2a4ba7(0xec)](_0x2a4ba7(0x104)+_0x50bb4b+_0x2a4ba7(0x108));const _0x3e7e9d={};_0x3e7e9d[_0x2a4ba7(0xf7)]=_0x50bb4b;const _0x336564=_0x3e7e9d,_0x3397a4=await _0x3e0fb9['describeMountTargets'](_0x336564)['promise']();if(_0x3397a4)for(const _0x2a6014 of _0x3397a4['MountTargets']){const _0x43558d={};_0x43558d[_0x2a4ba7(0xf4)]=_0x2a6014[_0x2a4ba7(0xf4)];const _0x5c5128=_0x43558d;await _0x3e0fb9[_0x2a4ba7(0x106)](_0x5c5128)[_0x2a4ba7(0x100)](),logger[_0x2a4ba7(0xec)](_0x2a4ba7(0x105)+_0x2a6014[_0x2a4ba7(0xf4)]+'\x20deleted\x20successfully');}else logger[_0x2a4ba7(0xec)](_0x88b0bd[_0x2a4ba7(0xfb)]);}else logger[_0x2a4ba7(0xec)](_0x88b0bd[_0x2a4ba7(0x10b)]);}catch(_0x519eec){logger['error'](_0x88b0bd[_0x2a4ba7(0xff)],_0x519eec);}};
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
const a30_0x4f115c=a30_0x12a6;(function(_0x2f4681,_0x37a77d){const _0x3d3efa=a30_0x12a6,_0x47248d=_0x2f4681();while(!![]){try{const _0x2ff05b=parseInt(_0x3d3efa(0xa1))/0x1+-parseInt(_0x3d3efa(0x9e))/0x2+parseInt(_0x3d3efa(0xab))/0x3*(parseInt(_0x3d3efa(0xae))/0x4)+-parseInt(_0x3d3efa(0xa2))/0x5+-parseInt(_0x3d3efa(0xac))/0x6+-parseInt(_0x3d3efa(0xaf))/0x7+parseInt(_0x3d3efa(0xa0))/0x8*(parseInt(_0x3d3efa(0x9f))/0x9);if(_0x2ff05b===_0x37a77d)break;else _0x47248d['push'](_0x47248d['shift']());}catch(_0xc4d8f6){_0x47248d['push'](_0x47248d['shift']());}}}(a30_0x19e4,0xec639));function a30_0x12a6(_0x3fcc7f,_0x379c51){const _0x19e4b4=a30_0x19e4();return a30_0x12a6=function(_0x12a67f,_0x349ba3){_0x12a67f=_0x12a67f-0x9d;let _0x57ec02=_0x19e4b4[_0x12a67f];return _0x57ec02;},a30_0x12a6(_0x3fcc7f,_0x379c51);}function a30_0x19e4(){const _0x4cae44=['StackName','./AWSUtils','awsObj','describeStacks','../config/logger','iLhHs','3CvEoIy','4519986OEtHNy','apiVersion','1363708kjCaCJ','4634511JKtsYn','describeClusterStack','3865310XrhaYJ','576XRnZqn','613288TNPKYs','345572kNTGcV','6382475jrUwYj','CloudFormation','promise'];a30_0x19e4=function(){return _0x4cae44;};return a30_0x19e4();}const AWS=require(a30_0x4f115c(0xa6))[a30_0x4f115c(0xa7)],{logger}=require(a30_0x4f115c(0xa9));exports[a30_0x4f115c(0x9d)]=async _0x1578be=>{const _0xecbaa0=a30_0x4f115c,_0x6a2e02={};_0x6a2e02[_0xecbaa0(0xaa)]='2010-05-15';const _0x1fadbd=_0x6a2e02,_0x66bff6={};_0x66bff6[_0xecbaa0(0xad)]=_0x1fadbd[_0xecbaa0(0xaa)];const _0x3a01ed=new AWS[(_0xecbaa0(0xa3))](_0x66bff6),_0x843232={};_0x843232[_0xecbaa0(0xa5)]=_0x1578be;const _0x17decb=_0x843232;return _0x3a01ed[_0xecbaa0(0xa8)](_0x17decb)[_0xecbaa0(0xa4)]();};
|