Skip to content

Commit

Permalink
chore: Enable Prettier (#866)
Browse files Browse the repository at this point in the history
  • Loading branch information
niallthomson authored Mar 22, 2024
1 parent 658b582 commit 68159b0
Show file tree
Hide file tree
Showing 449 changed files with 4,154 additions and 3,778 deletions.
2 changes: 1 addition & 1 deletion .github/ISSUE_TEMPLATE/bug-report.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ body:
- Workshop Studio
validations:
required: true

- type: textarea
id: problem
attributes:
Expand Down
8 changes: 4 additions & 4 deletions .github/ISSUE_TEMPLATE/lab-proposal.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,28 +8,28 @@ body:
label: Outline the high level topic of the lab
validations:
required: true

- type: textarea
id: rationale
attributes:
label: Provide the flow of the lab exercise, including what sample application components will be used
validations:
required: true

- type: textarea
id: infrastructure
attributes:
label: What additional AWS infrastructure or EKS addons/components will need to be created or installed to support this lab?
validations:
required: true

- type: textarea
id: cloud9
attributes:
label: What additional software or configuration will be required in the Cloud9 IDE?
validations:
required: true

- type: textarea
id: sample-enhancements
attributes:
Expand Down
20 changes: 10 additions & 10 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -1,34 +1,34 @@
version: 2

updates:
- package-ecosystem: "terraform"
directory: "/terraform/modules/cluster"
- package-ecosystem: "terraform"
directory: "/terraform/modules/cluster"
schedule:
interval: "weekly"
ignore:
# EKS blueprints upgrades will be handled separately
- dependency-name: '*terraform-aws-eks-blueprints*'
- package-ecosystem: "terraform"
directory: "/terraform/modules/ide"
- dependency-name: "*terraform-aws-eks-blueprints*"
- package-ecosystem: "terraform"
directory: "/terraform/modules/ide"
schedule:
interval: "weekly"
ignore:
# EKS blueprints upgrades will be handled separately
- dependency-name: '*terraform-aws-eks-blueprints*'
- package-ecosystem: "terraform"
directory: "/terraform/modules/addons/descheduler"
- dependency-name: "*terraform-aws-eks-blueprints*"
- package-ecosystem: "terraform"
directory: "/terraform/modules/addons/descheduler"
schedule:
interval: "weekly"
ignore:
# EKS blueprints upgrades will be handled separately
- dependency-name: '*terraform-aws-eks-blueprints*'
- dependency-name: "*terraform-aws-eks-blueprints*"
- package-ecosystem: npm
directory: "/website"
schedule:
interval: monthly
ignore:
# Let backstage-cli do these version bumps
- dependency-name: '@docusaurus*'
- dependency-name: "@docusaurus*"
- package-ecosystem: npm
directory: "/test/util"
schedule:
Expand Down
28 changes: 14 additions & 14 deletions .github/labeler.yml
Original file line number Diff line number Diff line change
@@ -1,27 +1,27 @@
content/introduction:
- environment/modules/introduction/**/*
- website/docs/introduction/**/*
- environment/modules/introduction/**/*
- website/docs/introduction/**/*

content/fundamentals:
- environment/modules/fundamentals/**/*
- website/docs/fundamentals/**/*
- environment/modules/fundamentals/**/*
- website/docs/fundamentals/**/*

content/autoscaling:
- environment/modules/autoscaling/**/*
- website/docs/autoscaling/**/*
- environment/modules/autoscaling/**/*
- website/docs/autoscaling/**/*

content/security:
- environment/modules/security/**/*
- website/docs/security/**/*
- environment/modules/security/**/*
- website/docs/security/**/*

content/networking:
- environment/modules/networking/**/*
- website/docs/networking/**/*
- environment/modules/networking/**/*
- website/docs/networking/**/*

content/observability:
- environment/modules/observability/**/*
- website/docs/observability/**/*
- environment/modules/observability/**/*
- website/docs/observability/**/*

content/cost-optimization:
- environment/modules/costoptimization/**/*
- website/docs/costoptimization/**/*
- environment/modules/costoptimization/**/*
- website/docs/costoptimization/**/*
202 changes: 101 additions & 101 deletions .github/workflows/e2e-dispatch.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,20 +4,20 @@ on:
workflow_dispatch:
inputs:
module:
description: 'Top level module to test'
description: "Top level module to test"
required: true
default: 'fundamentals'
default: "fundamentals"
type: choice
options:
- fundamentals/managed-node-groups
- fundamentals/fargate
- fundamentals/exposing
- fundamentals/storage
- security
- networking
- autoscaling
- observability
- automation
- fundamentals/managed-node-groups
- fundamentals/fargate
- fundamentals/exposing
- fundamentals/storage
- security
- networking
- autoscaling
- observability
- automation

permissions:
id-token: write
Expand All @@ -28,100 +28,100 @@ jobs:
name: run-tests
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v2
- name: Install utilities
run: |
sudo apt install -y gettext
- name: Check out code
uses: actions/checkout@v2
- name: Install utilities
run: |
sudo apt install -y gettext
mkdir -p ${HOME}/.local/bin
wget https://github.com/jckuester/awsweeper/releases/download/v0.12.0/awsweeper_0.12.0_linux_amd64.tar.gz
tar zxf awsweeper_0.12.0_linux_amd64.tar.gz
mv awsweeper_0.12.0_linux_amd64/awsweeper ${HOME}/.local/bin
mkdir -p ${HOME}/.local/bin
wget https://github.com/jckuester/awsweeper/releases/download/v0.12.0/awsweeper_0.12.0_linux_amd64.tar.gz
tar zxf awsweeper_0.12.0_linux_amd64.tar.gz
mv awsweeper_0.12.0_linux_amd64/awsweeper ${HOME}/.local/bin
wget https://github.com/eksctl-io/eksctl/releases/download/v0.150.0/eksctl_Linux_amd64.tar.gz
tar zxf eksctl_Linux_amd64.tar.gz
mv eksctl ${HOME}/.local/bin
wget https://github.com/eksctl-io/eksctl/releases/download/v0.150.0/eksctl_Linux_amd64.tar.gz
tar zxf eksctl_Linux_amd64.tar.gz
mv eksctl ${HOME}/.local/bin
chmod +x ${HOME}/.local/bin/*
chmod +x ${HOME}/.local/bin/*
echo "${HOME}/.local/bin" >> $GITHUB_PATH
- name: Get AWS credentials
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-duration-seconds: 3600
aws-region: ${{ secrets.AWS_REGION }}
role-session-name: GithubActionsSession
- name: Set cluster ID
env:
RUN_ID: "${{ github.run_id }}"
AWS_REGION: "${{ secrets.AWS_REGION }}"
run: |
CLUSTER_ID="ci-${RUN_ID}"
echo "CLUSTER_ID=$CLUSTER_ID" >> $GITHUB_ENV
- name: Create infrastructure
id: create-infrastructure
env:
AWS_REGION: "${{ secrets.AWS_REGION }}"
run: |
make create-infrastructure environment="$CLUSTER_ID"
- name: Refresh AWS credentials
if: always()
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-duration-seconds: 3600
aws-region: ${{ secrets.AWS_REGION }}
role-session-name: GithubActionsSession
- name: Run tests - Module
env:
DOCKER_BUILDKIT: 1
DEV_MODE: 1
MODULE: ${{ inputs.module }}
AWS_REGION: "${{ secrets.AWS_REGION }}"
ASSUME_ROLE: "${{ secrets.AWS_ROLE_ARN }}"
run: |
export AWS_DEFAULT_REGION="$AWS_REGION"
make test environment="$CLUSTER_ID" module="$MODULE"
- name: Refresh AWS credentials
if: always()
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-duration-seconds: 3600
aws-region: ${{ secrets.AWS_REGION }}
role-session-name: GithubActionsSession
- name: Run tests - Cleanup
if: always()
env:
DOCKER_BUILDKIT: 1
DEV_MODE: 1
AWS_REGION: "${{ secrets.AWS_REGION }}"
ASSUME_ROLE: "${{ secrets.AWS_ROLE_ARN }}"
run: |
export AWS_DEFAULT_REGION="$AWS_REGION"
make test environment="$CLUSTER_ID" module="cleanup"
- name: Refresh AWS credentials
if: always()
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-duration-seconds: 3600
aws-region: ${{ secrets.AWS_REGION }}
role-session-name: GithubActionsSession
- name: Cleanup environment
if: always()
env:
AWS_REGION: "${{ secrets.AWS_REGION }}"
run: |
export CLEANUP_ENVIRONMENT_NAME="$CLUSTER_ID"
export AWS_DEFAULT_REGION="$AWS_REGION"
envsubst < hack/lib/filter.yml > filter.yml
echo "${HOME}/.local/bin" >> $GITHUB_PATH
- name: Get AWS credentials
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-duration-seconds: 3600
aws-region: ${{ secrets.AWS_REGION }}
role-session-name: GithubActionsSession
- name: Set cluster ID
env:
RUN_ID: "${{ github.run_id }}"
AWS_REGION: "${{ secrets.AWS_REGION }}"
run: |
CLUSTER_ID="ci-${RUN_ID}"
echo "CLUSTER_ID=$CLUSTER_ID" >> $GITHUB_ENV
- name: Create infrastructure
id: create-infrastructure
env:
AWS_REGION: "${{ secrets.AWS_REGION }}"
run: |
make create-infrastructure environment="$CLUSTER_ID"
- name: Refresh AWS credentials
if: always()
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-duration-seconds: 3600
aws-region: ${{ secrets.AWS_REGION }}
role-session-name: GithubActionsSession
- name: Run tests - Module
env:
DOCKER_BUILDKIT: 1
DEV_MODE: 1
MODULE: ${{ inputs.module }}
AWS_REGION: "${{ secrets.AWS_REGION }}"
ASSUME_ROLE: "${{ secrets.AWS_ROLE_ARN }}"
run: |
export AWS_DEFAULT_REGION="$AWS_REGION"
make test environment="$CLUSTER_ID" module="$MODULE"
- name: Refresh AWS credentials
if: always()
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-duration-seconds: 3600
aws-region: ${{ secrets.AWS_REGION }}
role-session-name: GithubActionsSession
- name: Run tests - Cleanup
if: always()
env:
DOCKER_BUILDKIT: 1
DEV_MODE: 1
AWS_REGION: "${{ secrets.AWS_REGION }}"
ASSUME_ROLE: "${{ secrets.AWS_ROLE_ARN }}"
run: |
export AWS_DEFAULT_REGION="$AWS_REGION"
make test environment="$CLUSTER_ID" module="cleanup"
- name: Refresh AWS credentials
if: always()
uses: aws-actions/[email protected]
with:
role-to-assume: ${{ secrets.AWS_ROLE_ARN }}
role-duration-seconds: 3600
aws-region: ${{ secrets.AWS_REGION }}
role-session-name: GithubActionsSession
- name: Cleanup environment
if: always()
env:
AWS_REGION: "${{ secrets.AWS_REGION }}"
run: |
export CLEANUP_ENVIRONMENT_NAME="$CLUSTER_ID"
export AWS_DEFAULT_REGION="$AWS_REGION"
cat filter.yml
envsubst < hack/lib/filter.yml > filter.yml
awsweeper --force filter.yml
cat filter.yml
make destroy-infrastructure environment="$CLUSTER_ID"
awsweeper --force filter.yml
make destroy-infrastructure environment="$CLUSTER_ID"
30 changes: 0 additions & 30 deletions .github/workflows/markdownlint.yaml

This file was deleted.

Loading

0 comments on commit 68159b0

Please sign in to comment.