[#58] Make structs golint compliant

This patch addresses golint failures such as:
pkg/bootstrap/isogen/command_test.go:24:2: struct field getId should be
getID
pkg/config/types.go:83:2: don't use leading k in Go names; struct field
kCluster should be cluster
pkg/config/types.go:108:2: don't use leading k in Go names; struct field
kContext should be context
pkg/config/types.go:113:2: don't use leading k in Go names; struct field
kAuthInfo should be authInfo
pkg/container/container_docker.go:79:2: struct field imageUrl should be
imageURL
pkg/container/container_docker_test.go:427:3: struct field imageUrl
should be imageURL
pkg/remote/redfish/redfish.go:23:2: struct field EphemeralNodeId should
be EphemeralNodeID
pkg/remote/redfish/redfish.go:29:2: struct field Api should be API

Relates-To: #58

Change-Id: Ie8d1c49c9d392f10be0f38224c98b588a9e2a544
Signed-off-by: Alexander Hughes <Alexander.Hughes@pm.me>
This commit is contained in:
Alexander Hughes 2020-02-28 10:08:35 -05:00
parent 27825bdf2c
commit 0a4764e93a
8 changed files with 39 additions and 39 deletions

View File

@ -21,7 +21,7 @@ type mockContainer struct {
runCommand func() error
runCommandOutput func() (io.ReadCloser, error)
rmContainer func() error
getId func() string
getID func() string
}
func (mc *mockContainer) ImagePull() error {
@ -41,7 +41,7 @@ func (mc *mockContainer) RmContainer() error {
}
func (mc *mockContainer) GetId() string {
return mc.getId()
return mc.getID()
}
func TestBootstrapIso(t *testing.T) {
@ -91,7 +91,7 @@ func TestBootstrapIso(t *testing.T) {
{
builder: &mockContainer{
runCommand: func() error { return nil },
getId: func() string { return "TESTID" },
getID: func() string { return "TESTID" },
},
cfg: testCfg,
debug: true,
@ -101,7 +101,7 @@ func TestBootstrapIso(t *testing.T) {
{
builder: &mockContainer{
runCommand: func() error { return nil },
getId: func() string { return "TESTID" },
getID: func() string { return "TESTID" },
rmContainer: func() error { return testErr },
},
cfg: testCfg,

View File

@ -47,7 +47,7 @@ func TestRunGetAuthInfo(t *testing.T) {
conf := DummyConfig()
secondAuthInfo := DummyAuthInfo()
secondUserName := "second_user"
secondAuthInfo.kAuthInfo.Username = secondUserName
secondAuthInfo.authInfo.Username = secondUserName
conf.AuthInfos[secondUserName] = secondAuthInfo
dummyAuthInfoOptions := DummyAuthInfoOptions()
@ -194,7 +194,7 @@ func TestRunSetAuthInfo(t *testing.T) {
modified, err := RunSetAuthInfo(dummyAuthInfoOptions, conf, false)
assert.NoError(t, err)
assert.True(t, modified)
assert.Equal(t, dummyAuthInfoOptions.Password, conf.AuthInfos["dummy_user"].kAuthInfo.Password)
assert.Equal(t, dummyAuthInfoOptions.Password, conf.AuthInfos["dummy_user"].authInfo.Password)
})
}
@ -220,7 +220,7 @@ func TestRunSetCluster(t *testing.T) {
assert.True(t, modified)
assert.Equal(
t, "http://123.45.67.890",
conf.Clusters["dummy_cluster"].ClusterTypes["ephemeral"].kCluster.Server)
conf.Clusters["dummy_cluster"].ClusterTypes["ephemeral"].cluster.Server)
})
}
@ -244,7 +244,7 @@ func TestRunSetContext(t *testing.T) {
modified, err := RunSetContext(dummyContextOptions, conf, false)
assert.NoError(t, err)
assert.True(t, modified)
assert.Equal(t, "new_namespace", conf.Contexts["dummy_context"].kContext.Namespace)
assert.Equal(t, "new_namespace", conf.Contexts["dummy_context"].context.Namespace)
})
}

View File

@ -761,10 +761,10 @@ func (c *Cluster) PrettyString() string {
}
func (c *Cluster) KubeCluster() *clientcmdapi.Cluster {
return c.kCluster
return c.cluster
}
func (c *Cluster) SetKubeCluster(kc *clientcmdapi.Cluster) {
c.kCluster = kc
c.cluster = kc
}
// Context functions
@ -774,7 +774,7 @@ func (c *Context) Equal(d *Context) bool {
}
return c.NameInKubeconf == d.NameInKubeconf &&
c.Manifest == d.Manifest &&
c.kContext == d.kContext
c.context == d.context
}
func (c *Context) String() string {
@ -799,11 +799,11 @@ func (c *Context) PrettyString() string {
}
func (c *Context) KubeContext() *clientcmdapi.Context {
return c.kContext
return c.context
}
func (c *Context) SetKubeContext(kc *clientcmdapi.Context) {
c.kContext = kc
c.context = kc
}
func (c *Context) ClusterType() string {
@ -817,7 +817,7 @@ func (c *AuthInfo) Equal(d *AuthInfo) bool {
if d == nil {
return c == d
}
return c.kAuthInfo == d.kAuthInfo
return c.authInfo == d.authInfo
}
func (c *AuthInfo) String() string {
@ -830,10 +830,10 @@ func (c *AuthInfo) String() string {
}
func (c *AuthInfo) KubeAuthInfo() *clientcmdapi.AuthInfo {
return c.kAuthInfo
return c.authInfo
}
func (c *AuthInfo) SetKubeAuthInfo(kc *clientcmdapi.AuthInfo) {
c.kAuthInfo = kc
c.authInfo = kc
}
// Manifest functions

View File

@ -80,7 +80,7 @@ type Cluster struct {
NameInKubeconf string `json:"cluster-kubeconf"`
// Kubeconfig Cluster Object
kCluster *kubeconfig.Cluster
cluster *kubeconfig.Cluster
// Bootstrap configuration this clusters ephemeral hosts will rely on
Bootstrap string `json:"bootstrap-info"`
@ -105,12 +105,12 @@ type Context struct {
Manifest string `json:"manifest,omitempty"`
// Kubeconfig Context Object
kContext *kubeconfig.Context
context *kubeconfig.Context
}
type AuthInfo struct {
// Kubeconfig AuthInfo Object
kAuthInfo *kubeconfig.AuthInfo
authInfo *kubeconfig.AuthInfo
}
// Manifests is a tuple of references to a Manifest (how do Identify, collect ,

View File

@ -76,7 +76,7 @@ type DockerClient interface {
// DockerContainer docker container object wrapper
type DockerContainer struct {
tag string
imageUrl string
imageURL string
id string
dockerClient DockerClient
ctx *context.Context
@ -108,7 +108,7 @@ func NewDockerContainer(ctx *context.Context, url string, cli DockerClient) (*Do
cnt := &DockerContainer{
tag: t,
imageUrl: url,
imageURL: url,
id: "",
dockerClient: cli,
ctx: ctx,
@ -134,7 +134,7 @@ func (c *DockerContainer) getCmd(cmd []string) ([]string, error) {
return cmd, nil
}
id, err := c.getImageId(c.imageUrl)
id, err := c.getImageId(c.imageURL)
if err != nil {
return nil, err
}
@ -154,7 +154,7 @@ func (c *DockerContainer) getConfig(
envVars []string,
) (container.Config, container.HostConfig) {
cCfg := container.Config{
Image: c.imageUrl,
Image: c.imageURL,
Cmd: cmd,
AttachStdin: true,
OpenStdin: true,
@ -198,7 +198,7 @@ func (c *DockerContainer) GetId() string {
func (c *DockerContainer) ImagePull() error {
// TODO (D. Ukov) add logic for searching among local images
// to avoid image download on each execution
resp, err := c.dockerClient.ImagePull(*c.ctx, c.imageUrl, types.ImagePullOptions{})
resp, err := c.dockerClient.ImagePull(*c.ctx, c.imageURL, types.ImagePullOptions{})
if err != nil {
return err
}

View File

@ -424,7 +424,7 @@ func TestNewDockerContainer(t *testing.T) {
testError := fmt.Errorf("image pull error")
type resultStruct struct {
tag string
imageUrl string
imageURL string
id string
}
@ -446,7 +446,7 @@ func TestNewDockerContainer(t *testing.T) {
expectedErr: nil,
expectedResult: resultStruct{
tag: "testTag",
imageUrl: "testPrefix/testImage:testTag",
imageURL: "testPrefix/testImage:testTag",
id: "",
},
},
@ -473,7 +473,7 @@ func TestNewDockerContainer(t *testing.T) {
} else {
actualResStruct = resultStruct{
tag: actualRes.tag,
imageUrl: actualRes.imageUrl,
imageURL: actualRes.imageURL,
id: actualRes.id,
}
}

View File

@ -20,13 +20,13 @@ type RedfishRemoteDirect struct {
RemoteURL url.URL
// ephemeral Host ID
EphemeralNodeId string
EphemeralNodeID string
// ISO URL
IsoPath string
// Redfish Client implementation
Api redfishApi.RedfishAPI
RedfishAPI redfishApi.RedfishAPI
}
// Top level function to handle Redfish remote direct
@ -36,8 +36,8 @@ func (cfg RedfishRemoteDirect) DoRemoteDirect() error {
/* TODO: Add Authentication when redfish library supports it. */
/* Get system details */
systemID := cfg.EphemeralNodeId
system, _, err := cfg.Api.GetSystem(cfg.Context, systemID)
systemID := cfg.EphemeralNodeID
system, _, err := cfg.RedfishAPI.GetSystem(cfg.Context, systemID)
if err != nil {
return NewRedfishClientErrorf("Get System[%s] failed with err: %s", systemID, err.Error())
}
@ -48,27 +48,27 @@ func (cfg RedfishRemoteDirect) DoRemoteDirect() error {
alog.Debugf("Ephemeral node managerID: '%s'", managerID)
/* Get manager's Cd or DVD virtual media ID */
vMediaID, vMediaType, err := GetVirtualMediaID(cfg.Context, cfg.Api, managerID)
vMediaID, vMediaType, err := GetVirtualMediaID(cfg.Context, cfg.RedfishAPI, managerID)
if err != nil {
return err
}
alog.Debugf("Ephemeral Node Virtual Media Id: '%s'", vMediaID)
/* Load ISO in manager's virtual media */
err = SetVirtualMedia(cfg.Context, cfg.Api, managerID, vMediaID, cfg.IsoPath)
err = SetVirtualMedia(cfg.Context, cfg.RedfishAPI, managerID, vMediaID, cfg.IsoPath)
if err != nil {
return err
}
alog.Debugf("Successfully loaded virtual media: '%s'", cfg.IsoPath)
/* Set system's bootsource to selected media */
err = SetSystemBootSourceForMediaType(cfg.Context, cfg.Api, systemID, vMediaType)
err = SetSystemBootSourceForMediaType(cfg.Context, cfg.RedfishAPI, systemID, vMediaType)
if err != nil {
return err
}
/* Reboot system */
err = RebootSystem(cfg.Context, cfg.Api, systemID)
err = RebootSystem(cfg.Context, cfg.RedfishAPI, systemID)
if err != nil {
return err
}
@ -123,9 +123,9 @@ func NewRedfishRemoteDirectClient(ctx context.Context,
client := RedfishRemoteDirect{
Context: ctx,
RemoteURL: *parsedURL,
EphemeralNodeId: ephNodeID,
EphemeralNodeID: ephNodeID,
IsoPath: isoPath,
Api: api,
RedfishAPI: api,
}
return client, nil

View File

@ -66,7 +66,7 @@ func TestRedfishRemoteDirectInvalidSystemId(t *testing.T) {
systemID := "invalid-server"
localRDCfg := getDefaultRedfishRemoteDirectObj(t, m)
localRDCfg.EphemeralNodeId = systemID
localRDCfg.EphemeralNodeID = systemID
realErr := fmt.Errorf("%s system do not exist", systemID)
m.On("GetSystem", context.Background(), systemID).
@ -252,7 +252,7 @@ func getDefaultRedfishRemoteDirectObj(t *testing.T, api redfishAPI.RedfishAPI) R
require.NoError(t, err)
rDCfg.Api = api
rDCfg.RedfishAPI = api
return rDCfg
}