Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[RELEASE] 20230516 #3678

Merged
merged 5 commits into from
May 23, 2023
Merged

[RELEASE] 20230516 #3678

merged 5 commits into from
May 23, 2023

Conversation

Twsouza
Copy link
Contributor

@Twsouza Twsouza commented May 16, 2023

Pull Requests

Milestone Release

  • Release branch
  • Pass CI
  • Merge into master
  • Close milestone
  • Release master
  • Record release number:
  • Pass CI
  • Write release notes
  • Documentation review
  • Publish release

@codecov
Copy link

codecov bot commented May 16, 2023

Codecov Report

Patch coverage: 13.19% and project coverage change: -0.23 ⚠️

Comparison is base (b5050df) 36.04% compared to head (9962eff) 35.82%.

Additional details and impacted files
@@            Coverage Diff             @@
##           master    #3678      +/-   ##
==========================================
- Coverage   36.04%   35.82%   -0.23%     
==========================================
  Files         168      169       +1     
  Lines       18536    18719     +183     
==========================================
+ Hits         6682     6706      +24     
- Misses      10717    10874     +157     
- Partials     1137     1139       +2     
Impacted Files Coverage Δ
provider/aws/telemetry.go 0.00% <0.00%> (ø)
provider/aws/workers_heartbeat.go 0.00% <0.00%> (ø)
sdk/methods.go 76.52% <0.00%> (-1.95%) ⬇️
pkg/cli/helpers.go 45.65% <21.05%> (-4.87%) ⬇️
pkg/cli/rack.go 58.20% <21.56%> (-6.71%) ⬇️
pkg/cli/switch.go 56.66% <37.50%> (-8.56%) ⬇️
pkg/cli/resources.go 70.91% <100.00%> (+0.62%) ⬆️

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

@Twsouza
Copy link
Contributor Author

Twsouza commented May 22, 2023

### What is the feature/fix?

AWS is deprecating the Launch Configuration, they recommend using the Launch Configuration. New instances types are not being added to launch config, only to launch templates.

### Does it has a breaking change?

No, all features of Launch Config are available on Launch Template.

### How to use/test it?

1. Install the RC on a rack
2. Deploy a new app and use it

You can also set SpotInstanceBid and check if the instances are being created.

### Checklist
- [ ] New coverage tests
- [ ] Unit tests passing
- [ ] E2E tests passing
- [ ] E2E downgrade/update test passing
- [ ] Documentation updated
- [ ] No warnings or errors on Deepsource/Codecov
…service

### What is the feature/fix?

Service has an option to set if it should receive privileged access.

> When this parameter is true, the container is given elevated privileges on the host container instance (similar to the root user). This parameter maps to Privileged in the [Create a container](https://docs.docker.com/engine/api/v1.35/#operation/ContainerCreate) section of the [Docker Remote API](https://docs.docker.com/engine/api/v1.35/) and the --privileged option to [docker run](https://docs.docker.com/engine/reference/run/#security-configuration).

Set privileged option on container definition when it's set on service.

### Does it has a breaking change?

No

### How to use/test it?

- Update/install the RC in a rack
- Deploy a service with `privileged` set to true and a timer linking the service.
- Look at the container definition, on ECS, and you should see Privileged as true.

### Checklist
- [ ] New coverage tests
- [ ] Unit tests passing
- [ ] E2E tests passing
- [ ] E2E downgrade/update test passing
- [ ] Documentation updated
- [ ] No warnings or errors on Deepsource/Codecov
### What is the feature/fix?

When HighAvailability is set to false, the autoscale will maintain a certain number of extra capacity instances running on racks that are not configured for high availability

### Does it has a breaking change?

No

### How to use/test it?

** Describe how to test or use the feature **

### Checklist
- [ ] New coverage tests
- [ ] Unit tests passing
- [ ] E2E tests passing
- [ ] E2E downgrade/update test passing
- [ ] Documentation updated
- [ ] No warnings or errors on Deepsource/Codecov
### What is the feature/fix?

The resource `memcached` does not have a default scheme, and when the CLI tries to parse the URL it fails. Only when the resource doesn't have the scheme, it will prepend `https://` to it so the parse can be done correctly. The `https://` is just a mock, it will not be used by the proxy.

However in other cases, the resources already have a default scheme, so we don't need to prepend anything.

### Add screenshot or video (optional)

```
$ ./convox resources proxy memcached -r company/test-v2 -a nodejs
resourceUrl:  https://tes-ca-a9w1wj3z6inb.ggqx34.cfg.use1.cache.amazonaws.com:11211
proxying localhost:11211 to tes-ca-a9w1wj3z6inb.ggqx34.cfg.use1.cache.amazonaws.com:11211
^C

$ ./convox resources proxy db -r company/test-v2 -a nodejs
resourceUrl:  mysql://app:9da1d8b0-e918-11ed-85a0-0e0742ca01a9@test-v2-nodejs-resourcedb-dxaplp4g31i7.crsmvbsswb2b.us-east-1.rds.amazonaws.com:3306/app
proxying localhost:3306 to test-v2-nodejs-resourcedb-dxaplp4g31i7.crsmvbsswb2b.us-east-1.rds.amazonaws.com:3306
^C

$ ./convox resources proxy postgres -r company/test-v2 -a nodejs
resourceUrl:  postgres://app:9da1d8b0-e918-11ed-85a0-0e0742ca01a9@test-v2-nodejs-resourcepostgres-no8wpe8bxfby.crsmvbsswb2b.us-east-1.rds.amazonaws.com:5432/app
proxying localhost:5432 to test-v2-nodejs-resourcepostgres-no8wpe8bxfby.crsmvbsswb2b.us-east-1.rds.amazonaws.com:5432
^C

```

### Does it has a breaking change?

No

### How to use/test it?

- Create a rack and deplot an app with mysql, memcached and postgres resource
- Run `convox resources proxy` as showed above.

### Checklist
- [x] New coverage tests
- [x] Unit tests passing
- [ ] E2E tests passing
- [ ] E2E downgrade/update test passing
- [ ] Documentation updated
- [ ] No warnings or errors on Deepsource/Codecov
### What is the feature/fix?

https://app.asana.com/0/1203637156732418/1204423756010922/f

### Add screenshot or video (optional)

### Does it has a breaking change?

no

### How to use/test it?

### Checklist
- [ ] New coverage tests
- [ ] Unit tests passing
- [ ] E2E tests passing
- [ ] E2E downgrade/update test passing
- [ ] Documentation updated
- [ ] No warnings or errors on Deepsource/Codecov
Copy link

@ntner ntner left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • Install and update to rack version
  • Downgrade to previous version
  • Telemetry based param groupings at install
  • Common convox rack param set variations after install
  • New application install and running with multiple resources
  • Existing application working after upgrade
  • Review and Deploy Workflows working across update
  • General and build stress-testing

@Twsouza Twsouza merged commit 5c751cf into master May 23, 2023
@Twsouza Twsouza deleted the 20230516 branch May 23, 2023 20:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants