docs(argo-workflows): fix wrong artifactRepository identations on values.yaml (#2426)

* fix: wrong `artifactRepository` identations on values.yaml

on `artifactRepository.gcs`
the following 3 keys were in the same level:
- `.serviceAccountKeySecret`
- `.name`
- `.key`

Signed-off-by: Lucas Fernando Cardoso Nunes <lucasfc.nunes@gmail.com>

* Update Chart.yaml

Signed-off-by: Lucas Fernando Cardoso Nunes <lucasfc.nunes@gmail.com>

---------

Signed-off-by: Lucas Fernando Cardoso Nunes <lucasfc.nunes@gmail.com>
This commit is contained in:
Lucas Fernando Cardoso Nunes 2024-01-17 04:56:17 -03:00 committed by GitHub
parent e6de8c47b9
commit d5b942a873
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
2 changed files with 32 additions and 32 deletions

View file

@ -3,7 +3,7 @@ appVersion: v3.5.4
name: argo-workflows
description: A Helm chart for Argo Workflows
type: application
version: 0.40.6
version: 0.40.7
icon: https://argoproj.github.io/argo-workflows/assets/logo.png
home: https://github.com/argoproj/argo-helm
sources:
@ -16,5 +16,5 @@ annotations:
fingerprint: 2B8F22F57260EFA67BE1C5824B11F800CD9D2252
url: https://argoproj.github.io/argo-helm/pgp_keys.asc
artifacthub.io/changes: |
- kind: changed
description: Bump argo-workflows to v3.5.4
- kind: fixed
description: Wrong identation in artifactRepository block

View file

@ -775,14 +775,14 @@ artifactRepository:
gcs: {}
# bucket: <project>-argo
# keyFormat: "{{ \"{{workflow.namespace}}/{{workflow.name}}/{{pod.name}}\" }}"
# serviceAccountKeySecret is a secret selector.
# It references the k8s secret named 'my-gcs-credentials'.
# This secret is expected to have have the key 'serviceAccountKey',
# containing the base64 encoded credentials
# to the bucket.
#
# If it's running on GKE and Workload Identity is used,
# serviceAccountKeySecret is not needed.
# # serviceAccountKeySecret is a secret selector.
# # It references the k8s secret named 'my-gcs-credentials'.
# # This secret is expected to have have the key 'serviceAccountKey',
# # containing the base64 encoded credentials
# # to the bucket.
# #
# # If it's running on GKE and Workload Identity is used,
# # serviceAccountKeySecret is not needed.
# serviceAccountKeySecret:
# name: my-gcs-credentials
# key: serviceAccountKey