Skip to content

Commit 0e5e737

Browse files
committed
fix: auto pre-commit fixes
1 parent 817529a commit 0e5e737

51 files changed

Lines changed: 425 additions & 300 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The repository is structured as follows:
1212
- `base-infrastructure`: Contains the Terraform configuration files for deploying the Kubernetes clusters and other infrastructure components like managed databases, object storage etc on Azure.
1313

1414
- `applications/go-api`: Contains the deployment scripts and Helm configurations for deploying Helm charts of IFRC GO ecosystem applications onto the Kubernetes clusters.
15-
- `applications/argocd`: Contains the definitions of kubernetes resoures for managing applications whose deployment is managed by [ArgoCD](https://argo-cd.readthedocs.io/en/stable/).
15+
- `applications/argocd`: Contains the definitions of kubernetes resoures for managing applications whose deployment is managed by [ArgoCD](https://argo-cd.readthedocs.io/en/stable/).
1616

1717

1818
## Monitoring

applications/argocd/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,9 @@ Azure Key Vault is used to securely store and manage sensitive information such
5151
- Install the Secrets Store CSI Driver on your AKS cluster. For our cluster this is done through terraform with this config on the AKS cluster:
5252
```
5353
resource "azurerm_kubernetes_cluster" "ifrcgo" {
54-
54+
5555
... other config ....
56-
56+
5757
key_vault_secrets_provider {
5858
secret_rotation_enabled = true
5959
secret_rotation_interval = var.secret_rotation_interval
@@ -63,7 +63,7 @@ Azure Key Vault is used to securely store and manage sensitive information such
6363
}
6464
```
6565
The above configuration also enables the AKS cluster to check for secret changes after a fixed interval.
66-
66+
6767
- Ensure that the AKS cluster has the necessary permissions to access the Azure Key Vault.
6868
6969
2. **Create a `SecretProviderClass`**:

applications/argocd/production/applications/alert-hub-frontend.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ spec:
1919
value: nginx
2020
- name: ingress.tls.secretName
2121
value: "alerthub-helm-secret-cert"
22-
- name: env.APP_GRAPHQL_API_ENDPOINT
22+
- name: env.APP_GRAPHQL_API_ENDPOINT
2323
value: https://alerthub-api.ifrc.org/graphql/
2424
valueFiles:
2525
- values.yaml
@@ -32,4 +32,4 @@ spec:
3232
prune: true
3333
selfHeal: true
3434
syncOptions:
35-
- CreateNamespace=true
35+
- CreateNamespace=true

applications/argocd/production/applications/montandon-eoapi.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ spec:
106106
host: "DB_HOST"
107107
database: "DB_NAME"
108108
port: "DB_PORT"
109-
109+
110110
postgrescluster:
111111
enabled: false
112112

applications/argocd/production/applications/montandon-eoapi/montandon-eoapi-spc.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,4 +69,4 @@ spec:
6969
- objectName: DB-PORT
7070
key: DB_PORT
7171
- objectName: DB-PORT
72-
key: port
72+
key: port

applications/argocd/production/platform/image-updater.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ spec:
2525
prune: true
2626
selfHeal: true
2727
syncOptions:
28-
- CreateNamespace=true
28+
- CreateNamespace=true

applications/argocd/production/platform/reloader.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ spec:
1717
prune: true
1818
selfHeal: true
1919
syncOptions:
20-
- CreateNamespace=true
20+
- CreateNamespace=true

applications/argocd/staging/applications/alert-hub-backend.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ spec:
5454
aksSecretsProviderAvailable: true
5555
keyvault:
5656
name: "alert-hub-staging-kv"
57-
clientId: "99dd63fe-721e-4abb-b30d-e2b782d2893d"
57+
clientId: "99dd63fe-721e-4abb-b30d-e2b782d2893d"
5858
tenantId: "a2b53be5-734e-4e6c-ab0d-d184f60fd917"
5959
env:
6060
APP_FRONTEND_HOST: "https://alerthub-stage.ifrc.org"

applications/argocd/staging/applications/alert-hub-frontend.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ spec:
1919
value: nginx
2020
- name: ingress.tls.secretName
2121
value: "alerthub-helm-secret-cert"
22-
- name: env.APP_GRAPHQL_API_ENDPOINT
22+
- name: env.APP_GRAPHQL_API_ENDPOINT
2323
value: https://alerthub-stage-api.ifrc.org/graphql/
2424
valueFiles:
2525
- values.yaml

applications/argocd/staging/applications/montandon-eoapi.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ spec:
114114
host: "DB_HOST"
115115
database: "DB_NAME"
116116
port: "DB_PORT"
117-
117+
118118
postgrescluster:
119119
enabled: false
120120
# instances:

0 commit comments

Comments
 (0)