Skip to content

Commit

Permalink
fix: values.yaml lint error
Browse files Browse the repository at this point in the history
  • Loading branch information
almadigabor committed Feb 1, 2024
1 parent dae8f47 commit 696b543
Showing 1 changed file with 154 additions and 154 deletions.
308 changes: 154 additions & 154 deletions charts/umbrella/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,160 +18,160 @@
# #############################################################################
---
## TODO: update edc to R23.12 and adjust values
#edcconsumer:
# nameOverride: edcconsumer
#
# install:
# daps: true
# postgresql: true
# vault: true
#
# backendService:
# # TODO: what is the correct value here?
# httpProxyTokenReceiverUrl: "http://localhost"
#
# controlplane:
# endpoints:
# management:
# authKey: consumer-authkey
#
# image:
# repository: *edcCpImage
# tag: *edcImageTag
#
# daps:
# clientId: *edcConsumerDapsClientId
#
# daps:
# secret:
# clientId: *dapsClientId
# clientSecret: *dapsClientSecret
#
# image:
# repository: ghcr.io/fraunhofer-aisec/omejdn-server
#
# # podSecurityContext:
# # fsGroup: 1000
# # runAsNonRoot: true
# # runAsUser: 1000
# # runAsGroup: 1000
# # persistence:
# # accessMode: "ReadWriteOnce"
#
# dataplane:
# image:
# repository: *edcDpImage
# tag: *edcImageTag
#
# networkPolicy:
# enabled: *netPolEnabled
#
# participant:
# id: consumer
#
# postgresql:
# nameOverride: consumer-postgresql
#
# networkPolicy:
# enabled: *netPolEnabled
# ingressRules:
# primaryAccessOnlyFrom:
# enabled: true
# podSelector:
# app.kubernetes.io/name: edcconsumer-controlplane
# app.kubernetes.io/instance: '{{ .Release.Name }}-controlplane'
#
# jdbcUrl: "jdbc:postgresql://{{ .Release.Name }}-consumer-postgresql:5432/edc"
#
# auth:
# username: psql-consumer-user
# password: psql-consumer-password
#
# vault:
# hashicorp:
# token: *edcVaultToken
# server:
# dev:
# devRootToken: *edcVaultToken
#
# networkPolicy:
# enabled: *netPolEnabled
#
# secretNames:
# dapsPrivateKey: *edcConsumerVaultDapsPrivateKey
# dapsPublicKey: *edcConsumerVaultDapsPublicKey
#
# transferProxyTokenEncryptionAesKey: *edcConsumerVaultTransferEncryptionAesKey
# transferProxyTokenSignerPrivateKey: *edcConsumerVaultTransferPrivateKey
# transferProxyTokenSignerPublicKey: *edcConsumerVaultTransferPublicKey
#
#
#edcprovider:
# nameOverride: edcprovider
#
# install:
# daps: false
# postgresql: true
# vault: false
#
# backendService:
# # TODO: what is the correct value here?
# httpProxyTokenReceiverUrl: "http://localhost"
#
# controlplane:
# endpoints:
# management:
# authKey: provider-authkey
#
# image:
# repository: *edcCpImage
# tag: *edcImageTag
#
# daps:
# clientId: *edcProviderDapsClientId
#
# dataplane:
# image:
# repository: *edcDpImage
# tag: *edcImageTag
#
# participant:
# id: provider
#
# clientId: *edcProviderDapsClientId
#
# networkPolicy:
# enabled: *netPolEnabled
#
# postgresql:
# nameOverride: provider-postgresql
#
# jdbcUrl: "jdbc:postgresql://{{ .Release.Name }}-provider-postgresql:5432/edc"
#
# auth:
# username: psql-provider-user
# password: psql-provider-password
#
# networkPolicy:
# enabled: *netPolEnabled
# ingressRules:
# primaryAccessOnlyFrom:
# enabled: true
# podSelector:
# app.kubernetes.io/name: edcprovider-controlplane
# app.kubernetes.io/instance: '{{ .Release.Name }}-controlplane'
#
# vault:
# hashicorp:
# token: *edcVaultToken
#
# secretNames:
# dapsPrivateKey: *edcProviderVaultDapsPrivateKey
# dapsPublicKey: *edcProviderVaultDapsPublicKey
#
# transferProxyTokenEncryptionAesKey: *edcProviderVaultTransferEncryptionAesKey
# transferProxyTokenSignerPrivateKey: *edcProviderVaultTransferPrivateKey
# transferProxyTokenSignerPublicKey: *edcProviderVaultTransferPublicKey
# edcconsumer:
# nameOverride: edcconsumer
#

Check failure on line 23 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

23:2 [trailing-spaces] trailing spaces
# install:
# daps: true
# postgresql: true
# vault: true
#

Check failure on line 28 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

28:2 [trailing-spaces] trailing spaces
# backendService:
# # TODO: what is the correct value here?
# httpProxyTokenReceiverUrl: "http://localhost"
#

Check failure on line 32 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

32:2 [trailing-spaces] trailing spaces
# controlplane:
# endpoints:
# management:
# authKey: consumer-authkey
#

Check failure on line 37 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

37:2 [trailing-spaces] trailing spaces
# image:
# repository: *edcCpImage
# tag: *edcImageTag
#

Check failure on line 41 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

41:2 [trailing-spaces] trailing spaces
# daps:
# clientId: *edcConsumerDapsClientId
#

Check failure on line 44 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

44:2 [trailing-spaces] trailing spaces
# daps:
# secret:
# clientId: *dapsClientId
# clientSecret: *dapsClientSecret
#

Check failure on line 49 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

49:2 [trailing-spaces] trailing spaces
# image:
# repository: ghcr.io/fraunhofer-aisec/omejdn-server
#

Check failure on line 52 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

52:2 [trailing-spaces] trailing spaces
# # podSecurityContext:
# # fsGroup: 1000
# # runAsNonRoot: true
# # runAsUser: 1000
# # runAsGroup: 1000
# # persistence:
# # accessMode: "ReadWriteOnce"
#

Check failure on line 60 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

60:2 [trailing-spaces] trailing spaces
# dataplane:
# image:
# repository: *edcDpImage
# tag: *edcImageTag
#

Check failure on line 65 in charts/umbrella/values.yaml

View workflow job for this annotation

GitHub Actions / lint-test

65:2 [trailing-spaces] trailing spaces
# networkPolicy:
# enabled: *netPolEnabled
#
# participant:
# id: consumer
#
# postgresql:
# nameOverride: consumer-postgresql
#
# networkPolicy:
# enabled: *netPolEnabled
# ingressRules:
# primaryAccessOnlyFrom:
# enabled: true
# podSelector:
# app.kubernetes.io/name: edcconsumer-controlplane
# app.kubernetes.io/instance: '{{ .Release.Name }}-controlplane'
#
# jdbcUrl: "jdbc:postgresql://{{ .Release.Name }}-consumer-postgresql:5432/edc"
#
# auth:
# username: psql-consumer-user
# password: psql-consumer-password
#
# vault:
# hashicorp:
# token: *edcVaultToken
# server:
# dev:
# devRootToken: *edcVaultToken
#
# networkPolicy:
# enabled: *netPolEnabled
#
# secretNames:
# dapsPrivateKey: *edcConsumerVaultDapsPrivateKey
# dapsPublicKey: *edcConsumerVaultDapsPublicKey
#
# transferProxyTokenEncryptionAesKey: *edcConsumerVaultTransferEncryptionAesKey
# transferProxyTokenSignerPrivateKey: *edcConsumerVaultTransferPrivateKey
# transferProxyTokenSignerPublicKey: *edcConsumerVaultTransferPublicKey
#
#
# edcprovider:
# nameOverride: edcprovider
#
# install:
# daps: false
# postgresql: true
# vault: false
#
# backendService:
# # TODO: what is the correct value here?
# httpProxyTokenReceiverUrl: "http://localhost"
#
# controlplane:
# endpoints:
# management:
# authKey: provider-authkey
#
# image:
# repository: *edcCpImage
# tag: *edcImageTag
#
# daps:
# clientId: *edcProviderDapsClientId
#
# dataplane:
# image:
# repository: *edcDpImage
# tag: *edcImageTag
#
# participant:
# id: provider
#
# clientId: *edcProviderDapsClientId
#
# networkPolicy:
# enabled: *netPolEnabled
#
# postgresql:
# nameOverride: provider-postgresql
#
# jdbcUrl: "jdbc:postgresql://{{ .Release.Name }}-provider-postgresql:5432/edc"
#
# auth:
# username: psql-provider-user
# password: psql-provider-password
#
# networkPolicy:
# enabled: *netPolEnabled
# ingressRules:
# primaryAccessOnlyFrom:
# enabled: true
# podSelector:
# app.kubernetes.io/name: edcprovider-controlplane
# app.kubernetes.io/instance: '{{ .Release.Name }}-controlplane'
#
# vault:
# hashicorp:
# token: *edcVaultToken
#
# secretNames:
# dapsPrivateKey: *edcProviderVaultDapsPrivateKey
# dapsPublicKey: *edcProviderVaultDapsPublicKey
#
# transferProxyTokenEncryptionAesKey: *edcProviderVaultTransferEncryptionAesKey
# transferProxyTokenSignerPrivateKey: *edcProviderVaultTransferPrivateKey
# transferProxyTokenSignerPublicKey: *edcProviderVaultTransferPublicKey

portal:
enabled: true
Expand Down

0 comments on commit 696b543

Please sign in to comment.