Skip to content

Commit 4cc47c6

Browse files
committed
Auto pre-commit fixes
1 parent 6e45b7d commit 4cc47c6

52 files changed

Lines changed: 444 additions & 318 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ The repository is structured as follows:
1212
- `base-infrastructure`: Contains the Terraform configuration files for deploying the Kubernetes clusters and other infrastructure components like managed databases, object storage etc on Azure.
1313

1414
- `applications/go-api`: Contains the deployment scripts and Helm configurations for deploying Helm charts of IFRC GO ecosystem applications onto the Kubernetes clusters.
15-
- `applications/argocd`: Contains the definitions of kubernetes resoures for managing applications whose deployment is managed by [ArgoCD](https://argo-cd.readthedocs.io/en/stable/).
15+
- `applications/argocd`: Contains the definitions of kubernetes resoures for managing applications whose deployment is managed by [ArgoCD](https://argo-cd.readthedocs.io/en/stable/).

applications/argocd/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,9 @@ Azure Key Vault is used to securely store and manage sensitive information such
5151
- Install the Secrets Store CSI Driver on your AKS cluster. For our cluster this is done through terraform with this config on the AKS cluster:
5252
```
5353
resource "azurerm_kubernetes_cluster" "ifrcgo" {
54-
54+
5555
... other config ....
56-
56+
5757
key_vault_secrets_provider {
5858
secret_rotation_enabled = true
5959
secret_rotation_interval = var.secret_rotation_interval
@@ -63,7 +63,7 @@ Azure Key Vault is used to securely store and manage sensitive information such
6363
}
6464
```
6565
The above configuration also enables the AKS cluster to check for secret changes after a fixed interval.
66-
66+
6767
- Ensure that the AKS cluster has the necessary permissions to access the Azure Key Vault.
6868
6969
2. **Create a `SecretProviderClass`**:

applications/argocd/production/applications/alert-hub-backend.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,4 +85,4 @@ spec:
8585
prune: true
8686
selfHeal: true
8787
syncOptions:
88-
- CreateNamespace=true
88+
- CreateNamespace=true

applications/argocd/production/applications/alert-hub-frontend.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ spec:
1919
value: nginx
2020
- name: ingress.tls.secretName
2121
value: "alerthub-helm-secret-cert"
22-
- name: env.APP_GRAPHQL_API_ENDPOINT
22+
- name: env.APP_GRAPHQL_API_ENDPOINT
2323
value: https://alerthub-api.ifrc.org/graphql/
2424
valueFiles:
2525
- values.yaml
@@ -32,4 +32,4 @@ spec:
3232
prune: true
3333
selfHeal: true
3434
syncOptions:
35-
- CreateNamespace=true
35+
- CreateNamespace=true

applications/argocd/production/platform/image-updater.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ spec:
2525
prune: true
2626
selfHeal: true
2727
syncOptions:
28-
- CreateNamespace=true
28+
- CreateNamespace=true

applications/argocd/production/platform/reloader.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ spec:
1717
prune: true
1818
selfHeal: true
1919
syncOptions:
20-
- CreateNamespace=true
20+
- CreateNamespace=true

applications/argocd/staging/applications/alert-hub-backend.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ spec:
4848
aksSecretsProviderAvailable: true
4949
keyvault:
5050
name: "alert-hub-staging-kv"
51-
clientId: "99dd63fe-721e-4abb-b30d-e2b782d2893d"
51+
clientId: "99dd63fe-721e-4abb-b30d-e2b782d2893d"
5252
tenantId: "a2b53be5-734e-4e6c-ab0d-d184f60fd917"
5353
env:
5454
APP_FRONTEND_HOST: "https://alerthub-stage.ifrc.org"

applications/argocd/staging/applications/alert-hub-frontend.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ spec:
1919
value: nginx
2020
- name: ingress.tls.secretName
2121
value: "alerthub-helm-secret-cert"
22-
- name: env.APP_GRAPHQL_API_ENDPOINT
22+
- name: env.APP_GRAPHQL_API_ENDPOINT
2323
value: https://alerthub-stage-api.ifrc.org/graphql/
2424
valueFiles:
2525
- values.yaml

applications/argocd/staging/applications/montandon-etl.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,4 +79,4 @@ spec:
7979
prune: true
8080
selfHeal: true
8181
syncOptions:
82-
- CreateNamespace=true
82+
- CreateNamespace=true

applications/argocd/staging/platform/image-updater.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ spec:
2525
prune: true
2626
selfHeal: true
2727
syncOptions:
28-
- CreateNamespace=true
28+
- CreateNamespace=true

0 commit comments

Comments
 (0)