Skip to content

Commit 3911bec

Browse files
authored
chore: fix gofumpt linter (#1293)
1 parent be5ce9f commit 3911bec

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+120
-112
lines changed

.golangci.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ linters:
2222
- goconst # Finds repeated strings that could be replaced by a constant [fast: true, auto-fix: false]
2323
- gocyclo # Computes and checks the cyclomatic complexity of functions [fast: true, auto-fix: false]
2424
- gofmt # Gofmt checks whether code was gofmt-ed. By default this tool runs with -s option to check for code simplification [fast: true, auto-fix: true]
25+
- gofumpt # Gofumpt checks whether code was gofumpt-ed. [fast: true, auto-fix: true]
2526
- goheader # Checks is file header matches to pattern [fast: true, auto-fix: false]
2627
- goimports # In addition to fixing imports, goimports also formats your code in the same style as gofmt. [fast: true, auto-fix: true]
2728
- gomoddirectives # Manage the use of 'replace', 'retract', and 'excludes' directives in go.mod. [fast: true, auto-fix: false]
@@ -74,7 +75,6 @@ linters:
7475
- godot # Check if comments end in a period [fast: true, auto-fix: true]
7576
- godox # Tool for detection of FIXME, TODO and other comment keywords [fast: true, auto-fix: false]
7677
- goerr113 # Golang linter to check the errors handling expressions [fast: false, auto-fix: false]
77-
- gofumpt # Gofumpt checks whether code was gofumpt-ed. [fast: true, auto-fix: true]
7878
- gomnd # An analyzer to detect magic numbers. [fast: true, auto-fix: false]
7979
- lll # Reports long lines [fast: true, auto-fix: false]
8080
- maintidx # maintidx measures the maintainability index of each function. [fast: true, auto-fix: false]

scaleway/data_source_account_ssh_key_test.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@ func TestAccScalewayDataSourceAccountSSHKey_Basic(t *testing.T) {
4646
testAccCheckScalewayAccountSSHKeyExists(tt, "data.scaleway_account_ssh_key.stg"),
4747
resource.TestCheckResourceAttr("data.scaleway_account_ssh_key.stg", "name", sshKeyName),
4848
resource.TestCheckResourceAttr("data.scaleway_account_ssh_key.stg", "public_key", dataSourceAccountSSHKey),
49-
)},
49+
),
50+
},
5051
},
5152
})
5253
}

scaleway/data_source_baremetal_offer_test.go

+1-2
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ func TestAccScalewayDataSourceBaremetalOffer_Basic(t *testing.T) {
4343
resource.TestCheckResourceAttr("data.scaleway_baremetal_offer.test2", "include_disabled", "false"),
4444
resource.TestCheckResourceAttr("data.scaleway_baremetal_offer.test2", "bandwidth", "1000000000"),
4545
resource.TestCheckResourceAttr("data.scaleway_baremetal_offer.test2", "commercial_range", "aluminium"),
46-
//resource.TestCheckResourceAttr("data.scaleway_baremetal_offer.test2", "stock", "available"), // skipping this as stocks vary too much
46+
// resource.TestCheckResourceAttr("data.scaleway_baremetal_offer.test2", "stock", "available"), // skipping this as stocks vary too much
4747
resource.TestCheckResourceAttr("data.scaleway_baremetal_offer.test2", "cpu.0.name", "AMD Ryzen PRO 3600"),
4848
resource.TestCheckResourceAttr("data.scaleway_baremetal_offer.test2", "cpu.0.core_count", "6"),
4949
resource.TestCheckResourceAttr("data.scaleway_baremetal_offer.test2", "cpu.0.frequency", "3600"),
@@ -81,7 +81,6 @@ func testAccCheckScalewayBaremetalOfferExists(tt *TestTools, n string) resource.
8181
resp, err := baremetalAPI.ListOffers(&baremetal.ListOffersRequest{
8282
Zone: zone,
8383
}, scw.WithAllPages())
84-
8584
if err != nil {
8685
return err
8786
}

scaleway/data_source_object_bucket_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ func TestAccScalewayDataSourceObjectStorage_Basic(t *testing.T) {
1515
tt := NewTestTools(t)
1616
defer tt.Cleanup()
1717
bucketName := sdkacctest.RandomWithPrefix("test-acc-scaleway-object-bucket")
18-
//resourceName := "data.scaleway_object_bucket.main"
18+
// resourceName := "data.scaleway_object_bucket.main"
1919
resource.ParallelTest(t, resource.TestCase{
2020
PreCheck: func() { testAccPreCheck(t) },
2121
ProviderFactories: tt.ProviderFactories,

scaleway/helpers.go

+3-5
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,8 @@ import (
2020
"golang.org/x/xerrors"
2121
)
2222

23-
var (
24-
// DefaultWaitRetryInterval is used to set the retry interval to 0 during acceptance tests
25-
DefaultWaitRetryInterval *time.Duration
26-
)
23+
// DefaultWaitRetryInterval is used to set the retry interval to 0 during acceptance tests
24+
var DefaultWaitRetryInterval *time.Duration
2725

2826
// RegionalID represents an ID that is linked with a region, eg fr-par/11111111-1111-1111-1111-111111111111
2927
type RegionalID struct {
@@ -244,7 +242,7 @@ func is403Error(err error) bool {
244242

245243
// is409Error return true is err is an HTTP 409 error
246244
func is409Error(err error) bool {
247-
//check transient error
245+
// check transient error
248246
transientStateError := &scw.TransientStateError{}
249247
return isHTTPCodeError(err, http.StatusConflict) || xerrors.As(err, &transientStateError)
250248
}

scaleway/helpers_instance.go

+10-5
Original file line numberDiff line numberDiff line change
@@ -270,7 +270,8 @@ func sanitizeVolumeMap(serverName string, volumes map[string]*instance.VolumeSer
270270

271271
func preparePrivateNIC(
272272
ctx context.Context, data interface{},
273-
server *instance.Server, vpcAPI *vpc.API) ([]*instance.CreatePrivateNICRequest, error) {
273+
server *instance.Server, vpcAPI *vpc.API,
274+
) ([]*instance.CreatePrivateNICRequest, error) {
274275
if data == nil {
275276
return nil, nil
276277
}
@@ -292,7 +293,8 @@ func preparePrivateNIC(
292293
query := &instance.CreatePrivateNICRequest{
293294
Zone: currentPN.Zone,
294295
ServerID: server.ID,
295-
PrivateNetworkID: currentPN.ID}
296+
PrivateNetworkID: currentPN.ID,
297+
}
296298
res = append(res, query)
297299
}
298300
}
@@ -311,7 +313,8 @@ func newPrivateNICHandler(ctx context.Context, api *instance.API, server string,
311313
handler := &privateNICsHandler{
312314
instanceAPI: api,
313315
serverID: server,
314-
zone: zone}
316+
zone: zone,
317+
}
315318
return handler, handler.flatPrivateNICs()
316319
}
317320

@@ -343,7 +346,8 @@ func (ph *privateNICsHandler) detach(ctx context.Context, o interface{}, timeout
343346
err = ph.instanceAPI.DeletePrivateNIC(&instance.DeletePrivateNICRequest{
344347
PrivateNicID: expandID(p.ID),
345348
Zone: ph.zone,
346-
ServerID: ph.serverID},
349+
ServerID: ph.serverID,
350+
},
347351
scw.WithContext(ctx))
348352
if err != nil {
349353
return err
@@ -362,7 +366,8 @@ func (ph *privateNICsHandler) attach(ctx context.Context, n interface{}, timeout
362366
pn, err := ph.instanceAPI.CreatePrivateNIC(&instance.CreatePrivateNICRequest{
363367
Zone: ph.zone,
364368
ServerID: ph.serverID,
365-
PrivateNetworkID: privateNetworkID})
369+
PrivateNetworkID: privateNetworkID,
370+
})
366371
if err != nil {
367372
return err
368373
}

scaleway/helpers_k8s.go

-3
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,6 @@ func waitK8SClusterDeleted(ctx context.Context, k8sAPI *k8s.API, region scw.Regi
117117
Timeout: scw.TimeDurationPtr(timeout),
118118
RetryInterval: &retryInterval,
119119
}, scw.WithContext(ctx))
120-
121120
if err != nil {
122121
if is404Error(err) {
123122
return nil
@@ -140,7 +139,6 @@ func waitK8SPoolReady(ctx context.Context, k8sAPI *k8s.API, region scw.Region, p
140139
Timeout: scw.TimeDurationPtr(timeout),
141140
RetryInterval: &retryInterval,
142141
}, scw.WithContext(ctx))
143-
144142
if err != nil {
145143
return nil, err
146144
}
@@ -177,7 +175,6 @@ func getNodes(ctx context.Context, k8sAPI *k8s.API, pool *k8s.Pool) ([]map[strin
177175
}
178176

179177
nodes, err := k8sAPI.ListNodes(req, scw.WithAllPages(), scw.WithContext(ctx))
180-
181178
if err != nil {
182179
return nil, err
183180
}

scaleway/helpers_lb.go

+5-3
Original file line numberDiff line numberDiff line change
@@ -69,14 +69,15 @@ func expandLbACL(i interface{}) *lbSDK.ACL {
6969
Action: expandLbACLAction(rawRule["action"]),
7070
}
7171

72-
//remove http filter values if we do not pass any http filter
72+
// remove http filter values if we do not pass any http filter
7373
if acl.Match.HTTPFilter == "" || acl.Match.HTTPFilter == lbSDK.ACLHTTPFilterACLHTTPFilterNone {
7474
acl.Match.HTTPFilter = lbSDK.ACLHTTPFilterACLHTTPFilterNone
7575
acl.Match.HTTPFilterValue = []*string{}
7676
}
7777

7878
return acl
7979
}
80+
8081
func flattenLbACLAction(action *lbSDK.ACLAction) interface{} {
8182
return []map[string]interface{}{
8283
{
@@ -151,6 +152,7 @@ func newPrivateNetwork(raw map[string]interface{}) *lbSDK.PrivateNetwork {
151152

152153
return pn
153154
}
155+
154156
func privateNetworksToDetach(pns []*lbSDK.PrivateNetwork, updates interface{}) (map[string]bool, error) {
155157
actions := make(map[string]bool, len(pns))
156158
configs := make(map[string]*lbSDK.PrivateNetwork, len(pns))
@@ -159,7 +161,7 @@ func privateNetworksToDetach(pns []*lbSDK.PrivateNetwork, updates interface{}) (
159161
actions[pn.PrivateNetworkID] = true
160162
configs[pn.PrivateNetworkID] = pn
161163
}
162-
//check if private network still exist or is different
164+
// check if private network still exist or is different
163165
for _, pn := range updates.([]interface{}) {
164166
r := pn.(map[string]interface{})
165167
_, pnID, err := parseZonedID(r["private_network_id"].(string))
@@ -226,7 +228,7 @@ func expandLbACLMatch(raw interface{}) *lbSDK.ACLMatch {
226228
}
227229
rawMap := raw.([]interface{})[0].(map[string]interface{})
228230

229-
//scaleway api require ip subnet, so if we did not specify one, just put 0.0.0.0/0 instead
231+
// scaleway api require ip subnet, so if we did not specify one, just put 0.0.0.0/0 instead
230232
ipSubnet := expandSliceStringPtr(rawMap["ip_subnet"].([]interface{}))
231233
if len(ipSubnet) == 0 {
232234
ipSubnet = []*string{expandStringPtr("0.0.0.0/0")}

scaleway/helpers_rdb.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,8 @@ func expandLoadBalancer() []*rdb.EndpointSpec {
116116
var res []*rdb.EndpointSpec
117117

118118
res = append(res, &rdb.EndpointSpec{
119-
LoadBalancer: &rdb.EndpointSpecLoadBalancer{}})
119+
LoadBalancer: &rdb.EndpointSpecLoadBalancer{},
120+
})
120121

121122
return res
122123
}

scaleway/helpers_rdb_test.go

+34-17
Original file line numberDiff line numberDiff line change
@@ -19,33 +19,41 @@ func TestIsEndPointEqual(t *testing.T) {
1919
{
2020
name: "isEqualPrivateNetworkDetails",
2121
A: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8", ServiceIP: scw.IPNet{IPNet: net.IPNet{
22-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}}, Zone: scw.ZoneFrPar1},
22+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
23+
}}, Zone: scw.ZoneFrPar1},
2324
B: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8", ServiceIP: scw.IPNet{IPNet: net.IPNet{
24-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}}, Zone: scw.ZoneFrPar1},
25+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
26+
}}, Zone: scw.ZoneFrPar1},
2527
expected: true,
2628
},
2729
{
2830
name: "notEqualIP",
2931
A: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8", ServiceIP: scw.IPNet{IPNet: net.IPNet{
30-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}}, Zone: scw.ZoneFrPar1},
32+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
33+
}}, Zone: scw.ZoneFrPar1},
3134
B: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8", ServiceIP: scw.IPNet{IPNet: net.IPNet{
32-
IP: net.IPv4(1, 1, 1, 2), Mask: net.CIDRMask(24, 32)}}, Zone: scw.ZoneFrPar1},
35+
IP: net.IPv4(1, 1, 1, 2), Mask: net.CIDRMask(24, 32),
36+
}}, Zone: scw.ZoneFrPar1},
3337
expected: false,
3438
},
3539
{
3640
name: "notEqualZone",
3741
A: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8", ServiceIP: scw.IPNet{IPNet: net.IPNet{
38-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}}, Zone: scw.ZoneFrPar1},
42+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
43+
}}, Zone: scw.ZoneFrPar1},
3944
B: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8", ServiceIP: scw.IPNet{IPNet: net.IPNet{
40-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}}, Zone: scw.ZoneFrPar2},
45+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
46+
}}, Zone: scw.ZoneFrPar2},
4147
expected: false,
4248
},
4349
{
4450
name: "notEqualMask",
4551
A: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8", ServiceIP: scw.IPNet{IPNet: net.IPNet{
46-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(25, 32)}}, Zone: scw.ZoneFrPar1},
52+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(25, 32),
53+
}}, Zone: scw.ZoneFrPar1},
4754
B: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8", ServiceIP: scw.IPNet{IPNet: net.IPNet{
48-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}}, Zone: scw.ZoneFrPar1},
55+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
56+
}}, Zone: scw.ZoneFrPar1},
4957
expected: false,
5058
},
5159
}
@@ -67,10 +75,13 @@ func TestEndpointsToRemove(t *testing.T) {
6775
name: "removeAll",
6876
Endpoints: []*rdb.Endpoint{{
6977
ID: "6ba7b810-9dad-11d1-80b4-00c04fd430c1",
70-
PrivateNetwork: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8",
78+
PrivateNetwork: &rdb.EndpointPrivateNetworkDetails{
79+
PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8",
7180
ServiceIP: scw.IPNet{IPNet: net.IPNet{
72-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}},
73-
Zone: scw.ZoneFrPar1},
81+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
82+
}},
83+
Zone: scw.ZoneFrPar1,
84+
},
7485
}},
7586
Expected: map[string]bool{
7687
"6ba7b810-9dad-11d1-80b4-00c04fd430c1": true,
@@ -80,10 +91,13 @@ func TestEndpointsToRemove(t *testing.T) {
8091
name: "shouldUpdatePrivateNetwork",
8192
Endpoints: []*rdb.Endpoint{{
8293
ID: "6ba7b810-9dad-11d1-80b4-00c04fd430c1",
83-
PrivateNetwork: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8",
94+
PrivateNetwork: &rdb.EndpointPrivateNetworkDetails{
95+
PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8",
8496
ServiceIP: scw.IPNet{IPNet: net.IPNet{
85-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}},
86-
Zone: scw.ZoneFrPar1},
97+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
98+
}},
99+
Zone: scw.ZoneFrPar1,
100+
},
87101
}},
88102
Updates: []interface{}{map[string]interface{}{"pn_id": "fr-par-1/6ba7b810-9dad-11d1-80b4-00c04fd430c8", "ip_net": "192.168.1.43/24"}},
89103
Expected: map[string]bool{
@@ -94,10 +108,13 @@ func TestEndpointsToRemove(t *testing.T) {
94108
name: "shouldNotUpdatePrivateNetwork",
95109
Endpoints: []*rdb.Endpoint{{
96110
ID: "6ba7b810-9dad-11d1-80b4-00c04fd430c1",
97-
PrivateNetwork: &rdb.EndpointPrivateNetworkDetails{PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8",
111+
PrivateNetwork: &rdb.EndpointPrivateNetworkDetails{
112+
PrivateNetworkID: "6ba7b810-9dad-11d1-80b4-00c04fd430c8",
98113
ServiceIP: scw.IPNet{IPNet: net.IPNet{
99-
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32)}},
100-
Zone: scw.ZoneFrPar1},
114+
IP: net.IPv4(1, 1, 1, 1), Mask: net.CIDRMask(24, 32),
115+
}},
116+
Zone: scw.ZoneFrPar1,
117+
},
101118
}},
102119
Updates: []interface{}{map[string]interface{}{"pn_id": "fr-par-1/6ba7b810-9dad-11d1-80b4-00c04fd430c8", "ip_net": "1.1.1.1/24"}},
103120
Expected: map[string]bool{

scaleway/logger.go

+1-2
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,7 @@ import (
1010
// logger is the implementation of the SDK Logger interface for this terraform plugin.
1111
//
1212
// cf. https://godoc.org/github.com/scaleway/scaleway-sdk-go/logger#Logger
13-
type logger struct {
14-
}
13+
type logger struct{}
1514

1615
// l is the global logger singleton
1716
var l = logger{}

scaleway/provider_test.go

+2-4
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,8 @@ import (
1919
"github.com/stretchr/testify/require"
2020
)
2121

22-
var (
23-
// UpdateCassettes will update all cassettes of a given test
24-
UpdateCassettes = flag.Bool("cassettes", os.Getenv("TF_UPDATE_CASSETTES") == "true", "Record Cassettes")
25-
)
22+
// UpdateCassettes will update all cassettes of a given test
23+
var UpdateCassettes = flag.Bool("cassettes", os.Getenv("TF_UPDATE_CASSETTES") == "true", "Record Cassettes")
2624

2725
func testAccPreCheck(_ *testing.T) {}
2826

scaleway/resource_apple_silicon_server.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,8 @@ func resourceScalewayAppleSiliconServer() *schema.Resource {
3737
Required: true,
3838
ForceNew: true,
3939
ValidateFunc: validation.StringInSlice([]string{
40-
AppleSiliconM1Type}, false),
40+
AppleSiliconM1Type,
41+
}, false),
4142
},
4243
// Computed
4344
"ip": {

scaleway/resource_container.go

+5-3
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,8 @@ func resourceScalewayContainer() *schema.Resource {
121121
Default: container.ContainerProtocolHTTP1.String(),
122122
ValidateFunc: validation.StringInSlice([]string{
123123
container.ContainerProtocolH2c.String(),
124-
container.ContainerProtocolHTTP1.String()}, false),
124+
container.ContainerProtocolHTTP1.String(),
125+
}, false),
125126
},
126127
"port": {
127128
Type: schema.TypeInt,
@@ -382,8 +383,9 @@ func resourceScalewayContainerDelete(ctx context.Context, d *schema.ResourceData
382383
}
383384

384385
// check for container state
385-
_, err = api.WaitForContainer(&container.WaitForContainerRequest{ContainerID: containerID,
386-
Region: region,
386+
_, err = api.WaitForContainer(&container.WaitForContainerRequest{
387+
ContainerID: containerID,
388+
Region: region,
387389
}, scw.WithContext(ctx))
388390
if err != nil {
389391
return diag.Errorf("unexpected waiting container error: %s", err)

scaleway/resource_container_test.go

+4-5
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,7 @@ import (
1818
container "github.com/scaleway/scaleway-sdk-go/api/container/v1beta1"
1919
)
2020

21-
var (
22-
testDockerIMG = ""
23-
)
21+
var testDockerIMG = ""
2422

2523
func init() {
2624
testDockerIMGPtr := flag.String("test-image", os.Getenv("TF_TEST_DOCKER_IMG"), "Test image")
@@ -32,6 +30,7 @@ func init() {
3230
}
3331
l.Infof("start container registry with image: %s", testDockerIMG)
3432
}
33+
3534
func TestAccScalewayContainer_Basic(t *testing.T) {
3635
tt := NewTestTools(t)
3736
defer tt.Cleanup()
@@ -299,8 +298,8 @@ func testConfigContainerNamespace(tt *TestTools, n string) resource.TestCheckFun
299298
}
300299
}
301300

302-
var imageTag = testDockerIMG + ":latest"
303-
var scwTag = ns.RegistryEndpoint + "/alpine:test"
301+
imageTag := testDockerIMG + ":latest"
302+
scwTag := ns.RegistryEndpoint + "/alpine:test"
304303

305304
err = cli.ImageTag(ctx, imageTag, scwTag)
306305
if err != nil {

0 commit comments

Comments
 (0)