Skip to content

Commit

Permalink
linting fixes
Browse files Browse the repository at this point in the history
  • Loading branch information
konstructcarrie committed Nov 26, 2024
1 parent 5c8dd19 commit 544e252
Show file tree
Hide file tree
Showing 8 changed files with 123 additions and 105 deletions.
17 changes: 9 additions & 8 deletions docs/akamai/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -38,29 +38,30 @@ export const TabLabel = ({ imgSrc, label, alt }) => (

<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```

<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Akamai" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>

</Tabs>

<CommonRootCredentialsCmd cloud="akamai" />
<CommonClusterConnectivity />
40 changes: 22 additions & 18 deletions docs/aws/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -37,51 +37,55 @@ export const TabLabel = ({ imgSrc, label, alt }) => (
<Tabs groupId="git_provider" defaultValue="github" queryString>
<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```

<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Aws" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>
<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
</TabItem>
<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```

<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="Aws" minutes="10" handoffScreen={GitLabHandoffScreen} />
</TabItem>
</Tabs>

<CommonRootCredentialsCmd cloud="aws" />
<CommonClusterConnectivity />
<CommonRootCredentialsCmd cloud="aws" />
<CommonClusterConnectivity />
30 changes: 16 additions & 14 deletions docs/azure/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -27,48 +27,50 @@ import GitLabHandoffScreen from "../../../img/azure/gitlab/handoff-screen.png";

<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```
<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Azure" minutes="20" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />

Check failure on line 55 in docs/azure/quick-start/install/cli.mdx

View workflow job for this annotation

GitHub Actions / check-markdown (.mdx, **.mdx, mdx.markdownlint.json)

Trailing spaces

docs/azure/quick-start/install/cli.mdx:55:1 MD009/no-trailing-spaces Trailing spaces [Expected: 0 or 2; Actual: 8] https://github.com/DavidAnson/markdownlint/blob/v0.33.0/doc/md009.md
### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```
<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="Azure" minutes="20" handoffScreen={GitLabHandoffScreen} />
</TabItem>
Expand Down
34 changes: 18 additions & 16 deletions docs/civo/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -45,48 +45,50 @@ We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certifi

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```

<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Civo" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```

<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="Civo" minutes="10" handoffScreen={GitLabHandoffScreen} />
</TabItem>

</Tabs>

<CommonRootCredentialsCmd cloud="civo" />
<CommonClusterConnectivity />
<CommonRootCredentialsCmd cloud="civo" />
<CommonClusterConnectivity />
30 changes: 16 additions & 14 deletions docs/do/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -39,49 +39,51 @@ export const TabLabel = ({ imgSrc, label, alt }) => (

<TabItem attributes={{ className: styles.github }} value="github" label={<GitHubLogo /> }>
<GitHubPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```
<GitHubClusterCreateCmd />
<SpaceRegion />
<CommonTerminalOutput cloud="Do" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```
<GitLabClusterCreateCmd />
<SpaceRegion />
<CommonTerminalOutput cloud="Do" minutes="10" handoffScreen={GitLabHandoffScreen} />
Expand Down
34 changes: 18 additions & 16 deletions docs/gcp/quick-start/install/cli.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -38,53 +38,55 @@ export const TabLabel = ({ imgSrc, label, alt }) => (

<TabItem attributes={{ className: styles.github }} value="github" label={ <GitHubLogo /> }>
<GitHubPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```
<GitHubClusterCreateCmd />
<CommonTerminalOutput cloud="Gcp" minutes="10" handoffScreen={GitHubHandoffScreen} />
</TabItem>

<TabItem attributes={{ className: styles.gitlab }} value="gitlab" label={ <GitLabLogo /> }>
<GitLabPrerequisites />

### Install the CA (Certificate Authority) of mkcert in your trusted store

We use [mkcert](https://github.com/FiloSottile/mkcert) to generate local certificates and serve `https` with the Traefik Ingress Controller. During the installation, Kubefirst generates these certificates and pushes them to Kubernetes as secrets to attach to Ingress resources.

To allow the applications running in your Kubefirst platform in addition to your browser to trust the certificates generated by your Kubefirst local install, you need to install the CA (Certificate Authority) of mkcert in your trusted store. To do so, follow these simple steps:

```shell
brew install mkcert
mkcert -install
```
```shell
brew install mkcert
mkcert -install
```

This is not an optional step: the cluster creation will fail if you don't install the mkcert CA in your trusted store.

If you are using Firefox, you have one more step: you need to install the [Network Security Services](https://firefox-source-docs.mozilla.org/security/nss/index.html) (NSS):

```shell
brew install nss
```
```shell
brew install nss
```
<GitLabClusterCreateCmd />
<CommonTerminalOutput cloud="Gcp" minutes="10" handoffScreen={GitLabHandoffScreen} />
</TabItem>

</Tabs>

<CommonRootCredentialsCmd cloud="beta google" />
<CommonClusterConnectivity />
<CommonRootCredentialsCmd cloud="beta google" />
<CommonClusterConnectivity />
Loading

0 comments on commit 544e252

Please sign in to comment.