Skip to content

Commit 01a653b

Browse files
committed
Refactored k8s/generate for redability
1 parent af039b4 commit 01a653b

File tree

2 files changed

+26
-24
lines changed

2 files changed

+26
-24
lines changed

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ RUN pip install awscli
4747
RUN chmod +x /usr/local/bin/* && \
4848
upx --lzma /usr/local/bin/*
4949

50-
WORKDIR tmp/commit0
50+
WORKDIR /tmp/commit0
5151
COPY . .
5252

5353
RUN make build-deps && make build && \

internal/generate/kubernetes/generate.go

Lines changed: 25 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -33,15 +33,22 @@ func Generate(t *templator.Templator, cfg *config.Commit0Config, wg *sync.WaitGr
3333
t.Kubernetes.TemplateFiles(data, false, wg, pathPrefix)
3434
}
3535

36-
// Execute terraform
36+
func getCwd() string {
37+
dir, err := os.Getwd()
38+
if err != nil {
39+
log.Fatalf("Getting working directory failed: %v\n", err)
40+
panic(err)
41+
}
42+
43+
return dir
44+
}
45+
46+
// Execute terrafrom init & plan
3747
func Execute(config *config.Commit0Config, pathPrefix string) {
3848
if config.Infrastructure.AWS.EKS.Deploy {
3949
log.Println("Preparing aws environment...")
4050

41-
dir, err := os.Getwd()
42-
if err != nil {
43-
log.Fatalf("Getting working directory failed: %v\n", err)
44-
}
51+
dir := getCwd()
4552

4653
if fileExists(fmt.Sprintf("%s/secrets.yaml", dir)) {
4754
log.Println("secrets.yaml exists ...")
@@ -113,12 +120,7 @@ func getAwsEnvars(awsSecrets Secrets) []string {
113120

114121
func readSecrets() Secrets {
115122

116-
dir, err := os.Getwd()
117-
118-
if err != nil {
119-
log.Fatalf("Getting working directory failed: %v\n", err)
120-
panic(err)
121-
}
123+
dir := getCwd()
122124

123125
secretsFile := fmt.Sprintf("%s/secrets.yaml", dir)
124126

@@ -195,11 +197,11 @@ func promptCredentials() Secrets {
195197
Validate: validateAKID,
196198
}
197199

198-
accessKeyIDResult, err1 := accessKeyIDPrompt.Run()
200+
accessKeyIDResult, err := accessKeyIDPrompt.Run()
199201

200-
if err1 != nil {
201-
log.Fatalf("Prompt failed %v\n", err1)
202-
panic(err1)
202+
if err != nil {
203+
log.Fatalf("Prompt failed %v\n", err)
204+
panic(err)
203205
}
204206

205207
secretAccessKeyPrompt := promptui.Prompt{
@@ -208,11 +210,11 @@ func promptCredentials() Secrets {
208210
Mask: '*',
209211
}
210212

211-
secretAccessKeyResult, err2 := secretAccessKeyPrompt.Run()
213+
secretAccessKeyResult, err := secretAccessKeyPrompt.Run()
212214

213-
if err2 != nil {
214-
log.Fatalf("Prompt failed %v\n", err2)
215-
panic(err2)
215+
if err != nil {
216+
log.Fatalf("Prompt failed %v\n", err)
217+
panic(err)
216218
}
217219

218220
regionPrompt := promptui.Select{
@@ -221,11 +223,11 @@ func promptCredentials() Secrets {
221223
"eu-central-1", "eu-west-1", "ap-east-1", "ap-south-1"},
222224
}
223225

224-
_, regionResult, err3 := regionPrompt.Run()
226+
_, regionResult, err := regionPrompt.Run()
225227

226-
if err3 != nil {
227-
log.Fatalf("Prompt failed %v\n", err3)
228-
panic(err3)
228+
if err != nil {
229+
log.Fatalf("Prompt failed %v\n", err)
230+
panic(err)
229231
}
230232

231233
awsSecrets := Secrets{}

0 commit comments

Comments
 (0)