fix: wrong artifactRepository identations on values.yaml

on `artifactRepository.gcs`
the following 3 keys were in the same level:
- `.serviceAccountKeySecret`
- `.name`
- `.key`

Signed-off-by: Lucas Fernando Cardoso Nunes <lucasfc.nunes@gmail.com>
This commit is contained in:
Lucas Fernando Cardoso Nunes 2024-01-16 19:12:47 -03:00 committed by GitHub
parent e6de8c47b9
commit 8def764ff6
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -769,41 +769,41 @@ artifactRepository:
# roleARN: # roleARN:
# useSDKCreds: true # useSDKCreds: true
# encryptionOptions: # encryptionOptions:
# enableEncryption: true # enableEncryption: true
# -- Store artifact in a GCS object store # -- Store artifact in a GCS object store
# @default -- `{}` (See [values.yaml]) # @default -- `{}` (See [values.yaml])
gcs: {} gcs: {}
# bucket: <project>-argo # bucket: <project>-argo
# keyFormat: "{{ \"{{workflow.namespace}}/{{workflow.name}}/{{pod.name}}\" }}" # keyFormat: "{{ \"{{workflow.namespace}}/{{workflow.name}}/{{pod.name}}\" }}"
# serviceAccountKeySecret is a secret selector. # # serviceAccountKeySecret is a secret selector.
# It references the k8s secret named 'my-gcs-credentials'. # # It references the k8s secret named 'my-gcs-credentials'.
# This secret is expected to have have the key 'serviceAccountKey', # # This secret is expected to have have the key 'serviceAccountKey',
# containing the base64 encoded credentials # # containing the base64 encoded credentials
# to the bucket. # # to the bucket.
# # #
# If it's running on GKE and Workload Identity is used, # # If it's running on GKE and Workload Identity is used,
# serviceAccountKeySecret is not needed. # # serviceAccountKeySecret is not needed.
# serviceAccountKeySecret: # serviceAccountKeySecret:
# name: my-gcs-credentials # name: my-gcs-credentials
# key: serviceAccountKey # key: serviceAccountKey
# -- Store artifact in Azure Blob Storage # -- Store artifact in Azure Blob Storage
# @default -- `{}` (See [values.yaml]) # @default -- `{}` (See [values.yaml])
azure: {} azure: {}
# endpoint: https://mystorageaccountname.blob.core.windows.net # endpoint: https://mystorageaccountname.blob.core.windows.net
# container: my-container-name # container: my-container-name
# blobNameFormat: path/in/container # blobNameFormat: path/in/container
## accountKeySecret is a secret selector. # # accountKeySecret is a secret selector.
## It references the k8s secret named 'my-azure-storage-credentials'. # # It references the k8s secret named 'my-azure-storage-credentials'.
## This secret is expected to have have the key 'account-access-key', # # This secret is expected to have have the key 'account-access-key',
## containing the base64 encoded credentials to the storage account. # # containing the base64 encoded credentials to the storage account.
## If a managed identity has been assigned to the machines running the # # If a managed identity has been assigned to the machines running the
## workflow (e.g., https://docs.microsoft.com/en-us/azure/aks/use-managed-identity) # # workflow (e.g., https://docs.microsoft.com/en-us/azure/aks/use-managed-identity)
## then accountKeySecret is not needed, and useSDKCreds should be # # then accountKeySecret is not needed, and useSDKCreds should be
## set to true instead: # # set to true instead:
# useSDKCreds: true # useSDKCreds: true
# accountKeySecret: # accountKeySecret:
# name: my-azure-storage-credentials # name: my-azure-storage-credentials
# key: account-access-key # key: account-access-key
# -- The section of custom artifact repository. # -- The section of custom artifact repository.
# Utilize a custom artifact repository that is not one of the current base ones (s3, gcs, azure) # Utilize a custom artifact repository that is not one of the current base ones (s3, gcs, azure)