Skip to content

Commit f4871ba

Browse files
authored
Merge pull request #1177 from gargipanatula/trivial-sdk-upgrade
Update aws & awserr packages to AWS SDK Go V2
2 parents 4a7ff41 + d2de27f commit f4871ba

21 files changed

+183
-193
lines changed

THIRD-PARTY-LICENSES

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ Copyright © 2015 Steve Francia <[email protected]>
180180

181181
-----
182182

183-
** aws/aws-sdk-go; version 1.15.7 -- https://github.com/aws/aws-sdk-go/
183+
** aws/aws-sdk-go-v2; version 1.24.4 -- https://github.com/aws/aws-sdk-go-v2/
184184
** Etcd; version v3.1.0-alpha.1 -- https://github.com/coreos/etcd/tree/v3.1.0-alpha.1
185185
** github.com/coreos/go-semver; version 0.2 -- https://github.com/coreos/go-semver
186186
** github.com/coreos/go-systemd/; version 10 -- https://github.com/coreos/go-systemd/
@@ -412,9 +412,9 @@ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
412412
See the License for the specific language governing permissions and
413413
limitations under the License.
414414

415-
* For aws/aws-sdk-go see also this required NOTICE:
415+
* For aws/aws-sdk-go-v2 see also this required NOTICE:
416416
AWS SDK for Go
417-
Copyright 2015 Amazon.com, Inc. or its affiliates. All Rights Reserved.
417+
Copyright 2015 Amazon.com, Inc. or its affiliates. All Rights Reserved.
418418
Copyright 2014-2015 Stripe, Inc.
419419
* For Etcd see also this required NOTICE:
420420
CoreOS Project

go.mod

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ go 1.24.4
44

55
require (
66
github.com/Pallinder/go-randomdata v1.2.0
7-
github.com/aws/aws-sdk-go v1.55.5
87
github.com/aws/aws-sdk-go-v2 v1.36.5
98
github.com/aws/aws-sdk-go-v2/config v1.29.14
109
github.com/aws/aws-sdk-go-v2/service/autoscaling v1.53.3

go.sum

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,6 @@ github.com/Pallinder/go-randomdata v1.2.0 h1:DZ41wBchNRb/0GfsePLiSwb0PHZmT67XY00
88
github.com/Pallinder/go-randomdata v1.2.0/go.mod h1:yHmJgulpD2Nfrm0cR9tI/+oAgRqCQQixsA8HyRZfV9Y=
99
github.com/antlr4-go/antlr/v4 v4.13.0 h1:lxCg3LAv+EUK6t1i0y1V6/SLeUi0eKEKdhQAlS8TVTI=
1010
github.com/antlr4-go/antlr/v4 v4.13.0/go.mod h1:pfChB/xh/Unjila75QW7+VU4TSnWnnk9UTnmpPaOR2g=
11-
github.com/aws/aws-sdk-go v1.55.5 h1:KKUZBfBoyqy5d3swXyiC7Q76ic40rYcbqH7qjh59kzU=
12-
github.com/aws/aws-sdk-go v1.55.5/go.mod h1:eRwEWoyTWFMVYVQzKMNHWP5/RV4xIUGMQfXQHfHkpNU=
1311
github.com/aws/aws-sdk-go-v2 v1.36.5 h1:0OF9RiEMEdDdZEMqF9MRjevyxAQcf6gY+E7vwBILFj0=
1412
github.com/aws/aws-sdk-go-v2 v1.36.5/go.mod h1:EYrzvCCN9CMUTa5+6lf6MM4tq3Zjp8UhSGR/cBsjai0=
1513
github.com/aws/aws-sdk-go-v2/config v1.29.14 h1:f+eEi/2cKCg9pqKBoAIwRGzVb70MRKqWX4dg1BDcSJM=

pkg/providers/v1/aws.go

Lines changed: 46 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ import (
2828
"strings"
2929
"time"
3030

31+
"github.com/aws/aws-sdk-go-v2/aws"
3132
"github.com/aws/aws-sdk-go-v2/credentials/stscreds"
3233
"github.com/aws/aws-sdk-go-v2/feature/ec2/imds"
3334
"github.com/aws/aws-sdk-go-v2/service/ec2"
@@ -37,8 +38,6 @@ import (
3738
elbv2 "github.com/aws/aws-sdk-go-v2/service/elasticloadbalancingv2"
3839
elbv2types "github.com/aws/aws-sdk-go-v2/service/elasticloadbalancingv2/types"
3940
"github.com/aws/aws-sdk-go-v2/service/kms"
40-
"github.com/aws/aws-sdk-go/aws"
41-
"github.com/aws/aws-sdk-go/aws/awserr"
4241
"github.com/aws/smithy-go"
4342
"gopkg.in/gcfg.v1"
4443

@@ -730,7 +729,7 @@ func extractIPv4NodeAddresses(instance *ec2types.Instance) ([]v1.NodeAddress, er
730729
return true
731730
}
732731

733-
return aws.Int32Value(instance.NetworkInterfaces[i].Attachment.DeviceIndex) < aws.Int32Value(instance.NetworkInterfaces[j].Attachment.DeviceIndex)
732+
return aws.ToInt32(instance.NetworkInterfaces[i].Attachment.DeviceIndex) < aws.ToInt32(instance.NetworkInterfaces[j].Attachment.DeviceIndex)
734733
})
735734

736735
// handle internal network interfaces
@@ -741,33 +740,33 @@ func extractIPv4NodeAddresses(instance *ec2types.Instance) ([]v1.NodeAddress, er
741740
}
742741

743742
for _, internalIP := range networkInterface.PrivateIpAddresses {
744-
if ipAddress := aws.StringValue(internalIP.PrivateIpAddress); ipAddress != "" {
743+
if ipAddress := aws.ToString(internalIP.PrivateIpAddress); ipAddress != "" {
745744
ip := netutils.ParseIPSloppy(ipAddress)
746745
if ip == nil {
747-
return nil, fmt.Errorf("EC2 instance had invalid private address: %s (%q)", aws.StringValue(instance.InstanceId), ipAddress)
746+
return nil, fmt.Errorf("EC2 instance had invalid private address: %s (%q)", aws.ToString(instance.InstanceId), ipAddress)
748747
}
749748
addresses = append(addresses, v1.NodeAddress{Type: v1.NodeInternalIP, Address: ip.String()})
750749
}
751750
}
752751
}
753752

754753
// TODO: Other IP addresses (multiple ips)?
755-
publicIPAddress := aws.StringValue(instance.PublicIpAddress)
754+
publicIPAddress := aws.ToString(instance.PublicIpAddress)
756755
if publicIPAddress != "" {
757756
ip := netutils.ParseIPSloppy(publicIPAddress)
758757
if ip == nil {
759-
return nil, fmt.Errorf("EC2 instance had invalid public address: %s (%s)", aws.StringValue(instance.InstanceId), publicIPAddress)
758+
return nil, fmt.Errorf("EC2 instance had invalid public address: %s (%s)", aws.ToString(instance.InstanceId), publicIPAddress)
760759
}
761760
addresses = append(addresses, v1.NodeAddress{Type: v1.NodeExternalIP, Address: ip.String()})
762761
}
763762

764-
privateDNSName := aws.StringValue(instance.PrivateDnsName)
763+
privateDNSName := aws.ToString(instance.PrivateDnsName)
765764
if privateDNSName != "" {
766765
addresses = append(addresses, v1.NodeAddress{Type: v1.NodeInternalDNS, Address: privateDNSName})
767766
addresses = append(addresses, v1.NodeAddress{Type: v1.NodeHostName, Address: privateDNSName})
768767
}
769768

770-
publicDNSName := aws.StringValue(instance.PublicDnsName)
769+
publicDNSName := aws.ToString(instance.PublicDnsName)
771770
if publicDNSName != "" {
772771
addresses = append(addresses, v1.NodeAddress{Type: v1.NodeExternalDNS, Address: publicDNSName})
773772
}
@@ -794,10 +793,10 @@ func extractIPv6NodeAddresses(instance *ec2types.Instance) ([]v1.NodeAddress, er
794793
}
795794

796795
// return only the "first" address for each ENI
797-
internalIPv6 := aws.StringValue(networkInterface.Ipv6Addresses[0].Ipv6Address)
796+
internalIPv6 := aws.ToString(networkInterface.Ipv6Addresses[0].Ipv6Address)
798797
ip := net.ParseIP(internalIPv6)
799798
if ip == nil {
800-
return nil, fmt.Errorf("EC2 instance had invalid IPv6 address: %s (%q)", aws.StringValue(instance.InstanceId), internalIPv6)
799+
return nil, fmt.Errorf("EC2 instance had invalid IPv6 address: %s (%q)", aws.ToString(instance.InstanceId), internalIPv6)
801800
}
802801
addresses = append(addresses, v1.NodeAddress{Type: v1.NodeInternalIP, Address: ip.String()})
803802
}
@@ -943,7 +942,7 @@ func (c *Cloud) InstanceID(ctx context.Context, nodeName types.NodeName) (string
943942
}
944943
return "", fmt.Errorf("getInstanceByNodeName failed for %q with %q", nodeName, err)
945944
}
946-
return "/" + aws.StringValue(inst.Placement.AvailabilityZone) + "/" + aws.StringValue(inst.InstanceId), nil
945+
return "/" + aws.ToString(inst.Placement.AvailabilityZone) + "/" + aws.ToString(inst.InstanceId), nil
947946
}
948947

949948
// InstanceTypeByProviderID returns the cloudprovider instance type of the node with the specified unique providerID
@@ -1518,13 +1517,13 @@ func (c *Cloud) ensureSecurityGroup(ctx context.Context, name string, descriptio
15181517
klog.Warningf("Found multiple security groups with name: %q", name)
15191518
}
15201519
err := c.tagging.readRepairClusterTags(ctx,
1521-
c.ec2, aws.StringValue(securityGroups[0].GroupId),
1520+
c.ec2, aws.ToString(securityGroups[0].GroupId),
15221521
ResourceLifecycleOwned, nil, securityGroups[0].Tags)
15231522
if err != nil {
15241523
return "", err
15251524
}
15261525

1527-
return aws.StringValue(securityGroups[0].GroupId), nil
1526+
return aws.ToString(securityGroups[0].GroupId), nil
15281527
}
15291528

15301529
createRequest := &ec2.CreateSecurityGroupInput{}
@@ -1550,9 +1549,9 @@ func (c *Cloud) ensureSecurityGroup(ctx context.Context, name string, descriptio
15501549
createResponse, err := c.ec2.CreateSecurityGroup(ctx, createRequest)
15511550
if err != nil {
15521551
ignore := false
1553-
switch err := err.(type) {
1554-
case awserr.Error:
1555-
if err.Code() == "InvalidGroup.Duplicate" && attempt < MaxReadThenCreateRetries {
1552+
var ae smithy.APIError
1553+
if errors.As(err, &ae) {
1554+
if ae.ErrorCode() == "InvalidGroup.Duplicate" && attempt < MaxReadThenCreateRetries {
15561555
klog.V(2).Infof("Got InvalidGroup.Duplicate while creating security group (race?); will retry")
15571556
ignore = true
15581557
}
@@ -1563,7 +1562,7 @@ func (c *Cloud) ensureSecurityGroup(ctx context.Context, name string, descriptio
15631562
}
15641563
time.Sleep(1 * time.Second)
15651564
} else {
1566-
groupID = aws.StringValue(createResponse.GroupId)
1565+
groupID = aws.ToString(createResponse.GroupId)
15671566
break
15681567
}
15691568
}
@@ -1577,8 +1576,8 @@ func (c *Cloud) ensureSecurityGroup(ctx context.Context, name string, descriptio
15771576
// Finds the value for a given tag.
15781577
func findTag(tags []ec2types.Tag, key string) (string, bool) {
15791578
for _, tag := range tags {
1580-
if aws.StringValue(tag.Key) == key {
1581-
return aws.StringValue(tag.Value), true
1579+
if aws.ToString(tag.Key) == key {
1580+
return aws.ToString(tag.Value), true
15821581
}
15831582
}
15841583
return "", false
@@ -1643,8 +1642,8 @@ func (c *Cloud) findELBSubnets(ctx context.Context, internalELB bool) ([]string,
16431642

16441643
subnetsByAZ := make(map[string]ec2types.Subnet)
16451644
for _, subnet := range subnets {
1646-
az := aws.StringValue(subnet.AvailabilityZone)
1647-
id := aws.StringValue(subnet.SubnetId)
1645+
az := aws.ToString(subnet.AvailabilityZone)
1646+
id := aws.ToString(subnet.SubnetId)
16481647
if az == "" || id == "" {
16491648
klog.Warningf("Ignoring subnet with empty az/id: %v", subnet)
16501649
continue
@@ -1725,7 +1724,7 @@ func (c *Cloud) findELBSubnets(ctx context.Context, internalELB bool) ([]string,
17251724
// does not support NLB/CLB for the moment, only ALB.
17261725
continue
17271726
}
1728-
subnetIDs = append(subnetIDs, aws.StringValue(subnetsByAZ[zone].SubnetId))
1727+
subnetIDs = append(subnetIDs, aws.ToString(subnetsByAZ[zone].SubnetId))
17291728
}
17301729

17311730
return subnetIDs, nil
@@ -1810,7 +1809,7 @@ func (c *Cloud) resolveSubnetNameOrIDs(ctx context.Context, subnetNameOrIDs []st
18101809
}
18111810
var subnets []string
18121811
for _, subnet := range resolvedSubnets {
1813-
subnets = append(subnets, aws.StringValue(subnet.SubnetId))
1812+
subnets = append(subnets, aws.ToString(subnet.SubnetId))
18141813
}
18151814
return subnets, nil
18161815
}
@@ -1819,7 +1818,7 @@ func isSubnetPublic(rt []ec2types.RouteTable, subnetID string) (bool, error) {
18191818
var subnetTable *ec2types.RouteTable
18201819
for _, table := range rt {
18211820
for _, assoc := range table.Associations {
1822-
if aws.StringValue(assoc.SubnetId) == subnetID {
1821+
if aws.ToString(assoc.SubnetId) == subnetID {
18231822
subnetTable = &table
18241823
break
18251824
}
@@ -1831,9 +1830,9 @@ func isSubnetPublic(rt []ec2types.RouteTable, subnetID string) (bool, error) {
18311830
// associated with the VPC's main routing table.
18321831
for _, table := range rt {
18331832
for _, assoc := range table.Associations {
1834-
if aws.BoolValue(assoc.Main) == true {
1833+
if aws.ToBool(assoc.Main) == true {
18351834
klog.V(4).Infof("Assuming implicit use of main routing table %s for %s",
1836-
aws.StringValue(table.RouteTableId), subnetID)
1835+
aws.ToString(table.RouteTableId), subnetID)
18371836
subnetTable = &table
18381837
break
18391838
}
@@ -1852,7 +1851,7 @@ func isSubnetPublic(rt []ec2types.RouteTable, subnetID string) (bool, error) {
18521851
// from the default in-subnet route which is called "local"
18531852
// or other virtual gateway (starting with vgv)
18541853
// or vpc peering connections (starting with pcx).
1855-
if strings.HasPrefix(aws.StringValue(route.GatewayId), "igw") {
1854+
if strings.HasPrefix(aws.ToString(route.GatewayId), "igw") {
18561855
return true, nil
18571856
}
18581857
}
@@ -2028,7 +2027,7 @@ func (c *Cloud) getSubnetCidrs(ctx context.Context, subnetIDs []string) ([]strin
20282027

20292028
cidrs := make([]string, 0, len(subnets))
20302029
for _, subnet := range subnets {
2031-
cidrs = append(cidrs, aws.StringValue(subnet.CidrBlock))
2030+
cidrs = append(cidrs, aws.ToString(subnet.CidrBlock))
20322031
}
20332032
return cidrs, nil
20342033
}
@@ -2552,13 +2551,13 @@ func (c *Cloud) EnsureLoadBalancer(ctx context.Context, clusterName string, apiS
25522551
return nil, err
25532552
}
25542553

2555-
err = c.ensureLoadBalancerInstances(ctx, aws.StringValue(loadBalancer.LoadBalancerName), loadBalancer.Instances, instances)
2554+
err = c.ensureLoadBalancerInstances(ctx, aws.ToString(loadBalancer.LoadBalancerName), loadBalancer.Instances, instances)
25562555
if err != nil {
25572556
klog.Warningf("Error registering instances with the load balancer: %q", err)
25582557
return nil, err
25592558
}
25602559

2561-
klog.V(1).Infof("Loadbalancer %s (%v) has DNS name %s", loadBalancerName, serviceName, aws.StringValue(loadBalancer.DNSName))
2560+
klog.V(1).Infof("Loadbalancer %s (%v) has DNS name %s", loadBalancerName, serviceName, aws.ToString(loadBalancer.DNSName))
25622561

25632562
// TODO: Wait for creation?
25642563

@@ -2606,9 +2605,9 @@ func (c *Cloud) GetLoadBalancerName(ctx context.Context, clusterName string, ser
26062605
func toStatus(lb *elbtypes.LoadBalancerDescription) *v1.LoadBalancerStatus {
26072606
status := &v1.LoadBalancerStatus{}
26082607

2609-
if aws.StringValue(lb.DNSName) != "" {
2608+
if aws.ToString(lb.DNSName) != "" {
26102609
var ingress v1.LoadBalancerIngress
2611-
ingress.Hostname = aws.StringValue(lb.DNSName)
2610+
ingress.Hostname = aws.ToString(lb.DNSName)
26122611
status.Ingress = []v1.LoadBalancerIngress{ingress}
26132612
}
26142613

@@ -2623,10 +2622,10 @@ func v2toStatus(lb *elbv2types.LoadBalancer) *v1.LoadBalancerStatus {
26232622
}
26242623

26252624
// We check for Active or Provisioning, the only successful statuses
2626-
if aws.StringValue(lb.DNSName) != "" && (lb.State.Code == elbv2types.LoadBalancerStateEnumActive ||
2625+
if aws.ToString(lb.DNSName) != "" && (lb.State.Code == elbv2types.LoadBalancerStateEnumActive ||
26272626
lb.State.Code == elbv2types.LoadBalancerStateEnumProvisioning) {
26282627
var ingress v1.LoadBalancerIngress
2629-
ingress.Hostname = aws.StringValue(lb.DNSName)
2628+
ingress.Hostname = aws.ToString(lb.DNSName)
26302629
status.Ingress = []v1.LoadBalancerIngress{ingress}
26312630
}
26322631

@@ -2638,12 +2637,12 @@ func v2toStatus(lb *elbv2types.LoadBalancer) *v1.LoadBalancerStatus {
26382637
// However, if there are multiple security groups, we will choose the one tagged with our cluster filter.
26392638
// Otherwise we will return an error.
26402639
func findSecurityGroupForInstance(instance *ec2types.Instance, taggedSecurityGroups map[string]*ec2types.SecurityGroup) (*ec2types.GroupIdentifier, error) {
2641-
instanceID := aws.StringValue(instance.InstanceId)
2640+
instanceID := aws.ToString(instance.InstanceId)
26422641

26432642
var tagged []ec2types.GroupIdentifier
26442643
var untagged []ec2types.GroupIdentifier
26452644
for _, group := range instance.SecurityGroups {
2646-
groupID := aws.StringValue(group.GroupId)
2645+
groupID := aws.ToString(group.GroupId)
26472646
if groupID == "" {
26482647
klog.Warningf("Ignoring security group without id for instance %q: %v", instanceID, group)
26492648
continue
@@ -2695,7 +2694,7 @@ func (c *Cloud) getTaggedSecurityGroups(ctx context.Context) (map[string]*ec2typ
26952694
continue
26962695
}
26972696

2698-
id := aws.StringValue(group.GroupId)
2697+
id := aws.ToString(group.GroupId)
26992698
if id == "" {
27002699
klog.Warningf("Ignoring group without id: %v", group)
27012700
continue
@@ -2715,7 +2714,7 @@ func (c *Cloud) updateInstanceSecurityGroupsForLoadBalancer(ctx context.Context,
27152714
// Determine the load balancer security group id
27162715
lbSecurityGroupIDs := lb.SecurityGroups
27172716
if len(lbSecurityGroupIDs) == 0 {
2718-
return fmt.Errorf("could not determine security group for load balancer: %s", aws.StringValue(lb.LoadBalancerName))
2717+
return fmt.Errorf("could not determine security group for load balancer: %s", aws.ToString(lb.LoadBalancerName))
27192718
}
27202719

27212720
taggedSecurityGroups, err := c.getTaggedSecurityGroups(ctx)
@@ -2765,10 +2764,10 @@ func (c *Cloud) updateInstanceSecurityGroupsForLoadBalancer(ctx context.Context,
27652764
}
27662765

27672766
if securityGroup == nil {
2768-
klog.Warning("Ignoring instance without security group: ", aws.StringValue(instance.InstanceId))
2767+
klog.Warning("Ignoring instance without security group: ", aws.ToString(instance.InstanceId))
27692768
continue
27702769
}
2771-
id := aws.StringValue(securityGroup.GroupId)
2770+
id := aws.ToString(securityGroup.GroupId)
27722771
if id == "" {
27732772
klog.Warningf("found security group without id: %v", securityGroup)
27742773
continue
@@ -2779,7 +2778,7 @@ func (c *Cloud) updateInstanceSecurityGroupsForLoadBalancer(ctx context.Context,
27792778

27802779
// Compare to actual groups
27812780
for actualGroup, hasClusterTag := range actualGroups {
2782-
actualGroupID := aws.StringValue(actualGroup.GroupId)
2781+
actualGroupID := aws.ToString(actualGroup.GroupId)
27832782
if actualGroupID == "" {
27842783
klog.Warning("Ignoring group without ID: ", actualGroup)
27852784
continue
@@ -2934,7 +2933,7 @@ func (c *Cloud) EnsureLoadBalancerDeleted(ctx context.Context, clusterName strin
29342933
}
29352934

29362935
for _, sg := range response {
2937-
sgID := aws.StringValue(sg.GroupId)
2936+
sgID := aws.ToString(sg.GroupId)
29382937

29392938
if sgID == c.cfg.Global.ElbSecurityGroup {
29402939
//We don't want to delete a security group that was defined in the Cloud Configuration.
@@ -2966,7 +2965,7 @@ func (c *Cloud) EnsureLoadBalancerDeleted(ctx context.Context, clusterName strin
29662965
// Determine the load balancer security group id
29672966
lbSecurityGroupIDs := lb.SecurityGroups
29682967
if len(lbSecurityGroupIDs) == 0 {
2969-
return fmt.Errorf("could not determine security group for load balancer: %s", aws.StringValue(lb.LoadBalancerName))
2968+
return fmt.Errorf("could not determine security group for load balancer: %s", aws.ToString(lb.LoadBalancerName))
29702969
}
29712970
c.sortELBSecurityGroupList(lbSecurityGroupIDs, service.Annotations, taggedLBSecurityGroups)
29722971
loadBalancerSecurityGroupID := lbSecurityGroupIDs[0]
@@ -3086,7 +3085,7 @@ func (c *Cloud) UpdateLoadBalancer(ctx context.Context, clusterName string, serv
30863085
}
30873086
}
30883087

3089-
err = c.ensureLoadBalancerInstances(ctx, aws.StringValue(lb.LoadBalancerName), lb.Instances, instances)
3088+
err = c.ensureLoadBalancerInstances(ctx, aws.ToString(lb.LoadBalancerName), lb.Instances, instances)
30903089
if err != nil {
30913090
klog.Warningf("Error registering/deregistering instances with the load balancer: %q", err)
30923091
return err
@@ -3133,7 +3132,7 @@ func (c *Cloud) getInstancesByIDs(ctx context.Context, instanceIDs []string) (ma
31333132
}
31343133

31353134
for _, instance := range instances {
3136-
instanceID := aws.StringValue(instance.InstanceId)
3135+
instanceID := aws.ToString(instance.InstanceId)
31373136
if instanceID == "" {
31383137
continue
31393138
}
@@ -3235,7 +3234,7 @@ func mapNodeNameToPrivateDNSName(nodeName types.NodeName) string {
32353234
// Deprecated: use instanceIDToNodeName instead. See
32363235
// mapNodeNameToPrivateDNSName for details.
32373236
func mapInstanceToNodeName(i *ec2types.Instance) types.NodeName {
3238-
return types.NodeName(aws.StringValue(i.PrivateDnsName))
3237+
return types.NodeName(aws.ToString(i.PrivateDnsName))
32393238
}
32403239

32413240
var aliveFilter = []string{

0 commit comments

Comments
 (0)