Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tweak(subo): Rename scc -> scn in subo everywhere #334

Closed
wants to merge 8 commits into from
Closed
41 changes: 36 additions & 5 deletions .golangci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,44 @@ linters:
disable-all: true
enable:
- deadcode
- revive
- gci
- godot
- unparam
- unused

linters-settings:
gci:
local-prefixes: github.com/suborbital
godot:
scope: all
no-inline-comments: true
no-prefix-comments: true
sections:
- standard
- default
- prefix(github.com/suborbital)
revive:
# Maximum number of open files at the same time.
# See https://github.com/mgechev/revive#command-line-flags
# Defaults to unlimited.
max-open-files: 2048
# When set to false, ignores files with "GENERATED" header, similar to golint.
# See https://github.com/mgechev/revive#available-rules for details.
# Default: false
ignore-generated-header: true
# Sets the default severity.
# See https://github.com/mgechev/revive#configuration
# Default: warning
severity: error
# Enable all available rules.
# Default: false
enable-all-rules: false
# Sets the default failure confidence.
# This means that linting errors with less than 0.8 confidence will be ignored.
# Default: 0.8
confidence: 0.1
rules:
# https://github.com/mgechev/revive/blob/master/RULES_DESCRIPTIONS.md#import-shadowing
- name: import-shadowing
severity: warning
disabled: false
# https://github.com/mgechev/revive/blob/master/RULES_DESCRIPTIONS.md#duplicated-imports
- name: duplicated-imports
severity: warning
disabled: false
10 changes: 5 additions & 5 deletions project/context.go
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ func ForDirectory(dir string) (*Context, error) {
return nil, errors.Wrap(err, "failed to bundleIfExists")
}

directive, err := readDirectiveFile(fullDir)
localDirective, err := readDirectiveFile(fullDir)
if err != nil {
if !os.IsNotExist(errors.Cause(err)) {
return nil, errors.Wrap(err, "failed to readDirectiveFile")
Expand All @@ -84,23 +84,23 @@ func ForDirectory(dir string) (*Context, error) {
if err != nil {
return nil, errors.Wrap(err, "failed to readQueriesFile")
} else if len(queries) > 0 {
directive.Queries = queries
localDirective.Queries = queries
}

bctx := &Context{
Cwd: fullDir,
CwdIsRunnable: cwdIsRunnable,
Runnables: runnables,
Bundle: *bundle,
Directive: directive,
Directive: localDirective,
Langs: []string{},
MountPath: fullDir,
RelDockerPath: ".",
BuilderTag: fmt.Sprintf("v%s", release.SuboDotVersion),
}

if directive != nil {
bctx.AtmoVersion = directive.AtmoVersion
if localDirective != nil {
bctx.AtmoVersion = localDirective.AtmoVersion
}

return bctx, nil
Expand Down
16 changes: 8 additions & 8 deletions project/directive.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,10 +15,10 @@ import (
)

// WriteDirectiveFile writes a Directive to disk.
func WriteDirectiveFile(cwd string, directive *directive.Directive) error {
func WriteDirectiveFile(cwd string, localDirective *directive.Directive) error {
filePath := filepath.Join(cwd, "Directive.yaml")

directiveBytes, err := yaml.Marshal(directive)
directiveBytes, err := yaml.Marshal(localDirective)
if err != nil {
return errors.Wrap(err, "failed to Marshal")
}
Expand All @@ -44,12 +44,12 @@ func readDirectiveFile(cwd string) (*directive.Directive, error) {
return nil, errors.Wrap(err, "failed to ReadFile for Directive")
}

directive := &directive.Directive{}
if err := directive.Unmarshal(directiveBytes); err != nil {
localDirective := &directive.Directive{}
if err := localDirective.Unmarshal(directiveBytes); err != nil {
return nil, errors.Wrap(err, "failed to Unmarshal Directive")
}

return directive, nil
return localDirective, nil
}

// readQueriesFile finds a queries.yaml from disk.
Expand All @@ -65,12 +65,12 @@ func readQueriesFile(cwd string) ([]directive.DBQuery, error) {
return nil, errors.Wrap(err, "failed to ReadFile for Queries.yaml")
}

directive := &directive.Directive{}
if err := directive.Unmarshal(directiveBytes); err != nil {
localDirective := &directive.Directive{}
if err := localDirective.Unmarshal(directiveBytes); err != nil {
return nil, errors.Wrap(err, "failed to Unmarshal Directive")
}

return directive.Queries, nil
return localDirective.Queries, nil
}

// AugmentAndValidateDirectiveFns ensures that all functions referenced in a handler exist
Expand Down
8 changes: 4 additions & 4 deletions publisher/bindlepublisher.go
Original file line number Diff line number Diff line change
Expand Up @@ -120,20 +120,20 @@ func (b *BindlePublishJob) Publish(log util.FriendlyLogger, ctx *project.Context
return errors.Wrap(err, "failed to GenerateCreatorSignaure")
}

client, err := client.New("http://127.0.0.1:8080/v1", nil)
publishClient, err := client.New("http://127.0.0.1:8080/v1", nil)
if err != nil {
return errors.Wrap(err, "failed to client.New")
return errors.Wrap(err, "failed to publishClient.New")
}

invResp, err := client.CreateInvoice(*invoice)
invResp, err := publishClient.CreateInvoice(*invoice)
if err != nil {
return errors.Wrap(err, "failed to CreateInvoice")
}

for _, p := range invResp.Missing {
wrapper := parcelsBySHA[p.SHA256]

if err := client.CreateParcel(invoice.Name(), p.SHA256, wrapper.data); err != nil {
if err := publishClient.CreateParcel(invoice.Name(), p.SHA256, wrapper.data); err != nil {
return errors.Wrapf(err, "failed to CreateParcel for %s", wrapper.parcel.Label.Name)
}
}
Expand Down
26 changes: 16 additions & 10 deletions subo/command/compute_deploy_core.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,13 +22,19 @@ import (
)

type deployData struct {
SCCVersion string
SCNVersion string
EnvToken string
BuilderDomain string
StorageClassName string
}

const proxyDefaultPort int = 80
const (
proxyDefaultPort int = 80
dockerTemplateName = "scn-docker"
k8sTemplateName = "scn-k8s"
configType = "scn-config"
configFileName = configType + ".yaml"
)

// ComputeDeployCoreCommand returns the compute deploy command.
func ComputeDeployCoreCommand() *cobra.Command {
Expand Down Expand Up @@ -92,11 +98,11 @@ func ComputeDeployCoreCommand() *cobra.Command {
}

data := deployData{
SCCVersion: tag,
SCNVersion: tag,
EnvToken: envToken,
}

templateName := "scc-docker"
templateName := dockerTemplateName

if !localInstall {
data.BuilderDomain, err = getBuilderDomain()
Expand All @@ -109,7 +115,7 @@ func ComputeDeployCoreCommand() *cobra.Command {
return errors.Wrap(err, "🚫 failed to getStorageClass")
}

templateName = "scc-k8s"
templateName = k8sTemplateName
}

if err := template.ExecTmplDir(bctx.Cwd, "", templatesPath, templateName, data); err != nil {
Expand Down Expand Up @@ -177,7 +183,7 @@ func ComputeDeployCoreCommand() *cobra.Command {
}

cmd.Flags().String(branchFlag, "main", "git branch to download templates from")
cmd.Flags().String(versionFlag, release.SCCTag, "Docker tag to use for control plane images")
cmd.Flags().String(versionFlag, release.SCNTag, "Docker tag to use for control plane images")
cmd.Flags().Int(proxyPortFlag, proxyDefaultPort, "port that the Editor proxy listens on")
cmd.Flags().Bool(localFlag, false, "deploy locally using docker-compose")
cmd.Flags().Bool(dryRunFlag, false, "prepare the deployment in the .suborbital directory, but do not apply it")
Expand Down Expand Up @@ -305,15 +311,15 @@ func detectStorageClass() (string, error) {
}

func createConfigMap(cwd string) error {
configFilepath := filepath.Join(cwd, "config", "scc-config.yaml")
configFilepath := filepath.Join(cwd, "config", configFileName)

_, err := os.Stat(configFilepath)
if err != nil {
return errors.Wrap(err, "failed to Stat scc-config.yaml")
return errors.Wrap(err, fmt.Sprintf("failed to Stat %s", configFileName))
}

if _, err := util.Command.Run(fmt.Sprintf("kubectl create configmap scc-config --from-file=scc-config.yaml=%s -n suborbital", configFilepath)); err != nil {
return errors.Wrap(err, "failed to create configmap (you may need to run `kubectl delete configmap scc-config -n suborbital`)")
if _, err := util.Command.Run(fmt.Sprintf("kubectl create configmap %s --from-file=%s=%s -n suborbital", configType, configFileName, configFilepath)); err != nil {
return errors.Wrap(err, fmt.Sprintf("failed to create configmap (you may need to run `kubectl delete configmap %s -n suborbital`)", configType))
}

return nil
Expand Down
4 changes: 2 additions & 2 deletions subo/release/version.go
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,5 @@ var FFIVersion = "0.15.1"
// AtmoVersion is the default version of Atmo that will be used for new projects.
var AtmoVersion = "0.4.7"

// SCCTag is the docker tag used for creating new compute core deployments.
var SCCTag = "v0.3.1"
// SCNTag is the docker tag used for creating new compute core deployments.
var SCNTag = "v0.3.1"
2 changes: 1 addition & 1 deletion templates/scc-docker/SCC.env.tmpl
Original file line number Diff line number Diff line change
@@ -1 +1 @@
SCC_ENV_TOKEN={{ .EnvToken }}
SCN_ENV_TOKEN={{ .EnvToken }}
4 changes: 3 additions & 1 deletion templates/scc-docker/config/scc-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,8 @@ networkRules: &networkRules
- "*.cluster.local"
- "scc-controlplane-service"
- "scc-builder-service"
- "scn-controlplane-service"
- "scn-builder-service"

capabilities:
logger:
Expand All @@ -21,4 +23,4 @@ capabilities:
file:
enabled: false
db:
enabled: false
enabled: false
32 changes: 16 additions & 16 deletions templates/scc-docker/docker-compose.yml.tmpl
Original file line number Diff line number Diff line change
@@ -1,41 +1,41 @@
version: '3'
services:
scc-control-plane:
image: suborbital/scc-control-plane:{{ .SCCVersion }}
scn-controlplane:
image: suborbital/scn-controlplane:{{ .SCNVersion }}
command: controlplane
volumes:
- ./:/home/scn
environment:
SCC_LOG_LEVEL: info
SCC_HEADLESS: "true"
SCC_HTTP_PORT: 8081
env_file:
- SCC.env
SCN_LOG_LEVEL: info
SCN_HEADLESS: "true"
SCN_HTTP_PORT: 8081
env_file:
- SCN.env
ports:
- "8081:8081"
networks:
- scn

scc-builder:
image: suborbital/scc-builder:{{ .SCCVersion }}
scn-builder:
image: suborbital/scn-builder:{{ .SCNVersion }}
command: builder
volumes:
- ./:/home/scn
environment:
SCC_LOG_LEVEL: info
SCC_HTTP_PORT: 8082
SCN_LOG_LEVEL: info
SCN_HTTP_PORT: 8082
ports:
- "8082:8082"
networks:
- scn
scc-atmo:

scn-atmo:
image: suborbital/atmo:v0.4.7
command: atmo
depends_on:
- scc-control-plane
- scn-controlplane
environment:
ATMO_CONTROL_PLANE: "scc-control-plane:8081"
ATMO_CONTROL_PLANE: "scn-controlplane:8081"
ATMO_HEADLESS: "true"
ATMO_LOG_LEVEL: info
ATMO_HTTP_PORT: 8080
Expand All @@ -45,4 +45,4 @@ services:
- scn

networks:
scn:
scn:
20 changes: 10 additions & 10 deletions templates/scc-k8s/.suborbital/scc-atmo-deployment.yaml.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -2,22 +2,22 @@ apiVersion: apps/v1
kind: Deployment

metadata:
name: scc-atmo-deployment
name: scn-atmo-deployment
namespace: suborbital
labels:
app: scc-atmo
app: scn-atmo

spec:
replicas: 1

selector:
matchLabels:
app: scc-atmo
app: scn-atmo

template:
metadata:
labels:
app: scc-atmo
app: scn-atmo

spec:
containers:
Expand All @@ -31,13 +31,13 @@ spec:
env:
- name: ATMO_HTTP_PORT
value: "8080"

- name: ATMO_LOG_LEVEL
value: "info"

- name: ATMO_CONTROL_PLANE
value: "scc-controlplane-service:8081"
value: "scn-controlplane-service:8081"

- name: ATMO_HEADLESS
value: "true"

Expand All @@ -47,11 +47,11 @@ apiVersion: v1
kind: Service
metadata:
namespace: suborbital
name: scc-atmo-service
name: scn-atmo-service
spec:
selector:
app: scc-atmo
app: scn-atmo
ports:
- protocol: TCP
port: 80
targetPort: 8080
targetPort: 8080
Loading