Skip to content

Commit 5ac570d

Browse files
committed
Remove trailing whitespace from all files
Signed-off-by: kahirokunn <[email protected]>
1 parent b0023c2 commit 5ac570d

40 files changed

+111
-111
lines changed

.github/ISSUE_TEMPLATE/bug-report.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ body:
1111
Describe the bug in as much detail as possible.
1212
validations:
1313
required: true
14-
14+
1515
- type: dropdown
1616
id: area
1717
attributes:
@@ -37,7 +37,7 @@ body:
3737
How can we reproduce it (as minimally and precisely as possible)?
3838
validations:
3939
required: true
40-
40+
4141
- type: input
4242
id: k0smotron-version
4343
attributes:

.github/workflows/publish-docs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ jobs:
9696
make release IMG=quay.io/k0sproject/k0smotron:${STABLE}
9797
cp install.yaml /tmp/install.yaml
9898
git checkout gh-pages
99-
cp /tmp/install.yaml ${STABLE}/install.yaml
99+
cp /tmp/install.yaml ${STABLE}/install.yaml
100100
git add ${STABLE}/install.yaml && git update-index --refresh
101101
git diff-index --quiet HEAD -- || git commit -m "Update install.yaml to ${STABLE}"
102102
git push origin gh-pages

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ jobs:
129129
asset_path: ./templates/cluster-template.yaml
130130
asset_name: cluster-template.yaml
131131
asset_content_type: application/octet-stream
132-
132+
133133
- name: Upload Release Assets - cluster-template-hcp.yaml
134134
id: upload-release-asset-cluster-template-hcp
135135
uses: shogo82148/[email protected]

docs/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Using k0smotron the clusters controlplane and workerplane are truly separated. T
1616

1717
### Bring your own workers
1818

19-
With k0smotron you can connect worker nodes from ANY infrastructure to your cluster control plane.
19+
With k0smotron you can connect worker nodes from ANY infrastructure to your cluster control plane.
2020

2121
## How does it work
2222

@@ -34,7 +34,7 @@ Often when running integration and end-to-end testing for your software running
3434

3535
### Edge
3636

37-
Running Kubernetes on the network edge usually means running in low resource infrastructure. What this often means is that setting up the controlplane is either a challenge or a mission impossible. Running the controlplane on a existing cluster, on a separate dedicated infrastructure, removes that challenge and let's you focus on the real edge.
37+
Running Kubernetes on the network edge usually means running in low resource infrastructure. What this often means is that setting up the controlplane is either a challenge or a mission impossible. Running the controlplane on a existing cluster, on a separate dedicated infrastructure, removes that challenge and let's you focus on the real edge.
3838

3939
Running on the edge often also means large number of clusters to manage. Do you really want to dedicate nodes for each cluster controlplane and manage all the infrastructure for those?
4040

docs/capi-aws.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Cluster API - AWS (Hosted Control Plane)
22

3-
This example demonstrates how k0smotron can be used with CAPA (Cluster API Provider Amazon Web Services) to deploy
3+
This example demonstrates how k0smotron can be used with CAPA (Cluster API Provider Amazon Web Services) to deploy
44
a cluster with hosted control plane and workers in AWS.
55

66
## Prerequisites
@@ -115,7 +115,7 @@ spec:
115115
spec:
116116
ami:
117117
# Replace with your AMI ID
118-
id: ami-0989fb15ce71ba39e # Ubuntu 22.04 in eu-central-1
118+
id: ami-0989fb15ce71ba39e # Ubuntu 22.04 in eu-central-1
119119
instanceType: t3.large
120120
iamInstanceProfile: nodes.cluster-api-provider-aws.sigs.k8s.io # Instance Profile created by `clusterawsadm bootstrap iam create-cloudformation-stack`
121121
cloudInit:
@@ -146,20 +146,20 @@ Once complete, your command line should display output similar to this:
146146
```shell
147147
% kubectl get cluster,machine
148148
NAME PHASE AGE VERSION
149-
cluster.cluster.x-k8s.io/k0s-aws-test Provisioned 16m
149+
cluster.cluster.x-k8s.io/k0s-aws-test Provisioned 16m
150150

151151
NAME CLUSTER NODENAME PROVIDERID PHASE AGE VERSION
152-
machine.cluster.x-k8s.io/k0s-aws-test-md-0 k0s-aws-test aws:///eu-central-1a/i-05f2de7da41dc542a Provisioned 16m
152+
machine.cluster.x-k8s.io/k0s-aws-test-md-0 k0s-aws-test aws:///eu-central-1a/i-05f2de7da41dc542a Provisioned 16m
153153
```
154154

155155
You can also check the status of the cluster deployment with `clusterctl`:
156156
```shell
157-
% clusterctl describe cluster
158-
NAME READY SEVERITY REASON SINCE MESSAGE
159-
Cluster/k0s-aws-test True 25m
160-
├─ClusterInfrastructure - AWSCluster/k0s-aws-test
161-
├─ControlPlane - K0smotronControlPlane/k0s-aws-test-cp
162-
└─Workers
157+
% clusterctl describe cluster
158+
NAME READY SEVERITY REASON SINCE MESSAGE
159+
Cluster/k0s-aws-test True 25m
160+
├─ClusterInfrastructure - AWSCluster/k0s-aws-test
161+
├─ControlPlane - K0smotronControlPlane/k0s-aws-test-cp
162+
└─Workers
163163
└─Other
164164
```
165165

@@ -169,7 +169,7 @@ k0smotron, running in a management cluster in AWS, supports flexible networking
169169
If you prefer using an NLB instead of ELB, you must specify annotations for the Service in the `k0smotronControlPlane`. These annotations guide the AWS Cloud Controller Manager (CCM) or the AWS Load Balancer Controller to create the respective services.
170170

171171
```yaml
172-
[...]
172+
[...]
173173
service:
174174
type: LoadBalancer
175175
apiPort: 6443
@@ -184,7 +184,7 @@ For scenarios involving Classic ELBs or NLBs without special options, the AWS CC
184184
If you aim to use the NLB and set the schema to `internal`, the target group attribute `preserve_client_ip.enabled=false` is required due to "hairpinning" or "NAT loopback". In such cases, the AWS CCM cannot be used because it doesn't support setting Target Group Attributes. Therefore, the AWS Load Balancer Controller, which has the ability to set Target Group Attributes, becomes necessary. Follow [this guide](https://docs.aws.amazon.com/eks/latest/userguide/aws-load-balancer-controller.html) to install the AWS Load Balancer Controller.
185185

186186
```yaml
187-
[...]
187+
[...]
188188
service:
189189
type: LoadBalancer
190190
apiPort: 6443

docs/capi-bootstrap.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,6 @@ spec:
112112
# More details about the aws machine template can be set here
113113
```
114114

115-
This example creates a `MachineDeployment` with 2 replicas, using k0smotron as the bootstrap provider. The `infrastructureRef` is used to specify the infrastructure requirements for the machines, in this case, AWS.
115+
This example creates a `MachineDeployment` with 2 replicas, using k0smotron as the bootstrap provider. The `infrastructureRef` is used to specify the infrastructure requirements for the machines, in this case, AWS.
116116

117117
Check the [examples](capi-examples.md) pages for more detailed examples how k0smotron can be used with various Cluster API infrastructure providers.

docs/capi-clusterclass.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# ClusterClass
22

3-
K0smotron supports ClusterClass, a simple way to create many clusters of a similar shape.
3+
K0smotron supports ClusterClass, a simple way to create many clusters of a similar shape.
44

55
For instance, we will create a ClusterClass that will create a cluster running control plane and worker nodes on DockerMachines:
66

@@ -136,7 +136,7 @@ spec:
136136
spec:
137137
api:
138138
extraArgs:
139-
anonymous-auth: "true" # anonymous-auth=true is needed for k0s to allow unauthorized health-checks on /healthz
139+
anonymous-auth: "true" # anonymous-auth=true is needed for k0s to allow unauthorized health-checks on /healthz
140140
---
141141
apiVersion: infrastructure.cluster.x-k8s.io/v1beta1
142142
kind: DockerMachineTemplate

docs/capi-controlplane-bootstrap.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ spec:
4242
spec:
4343
api:
4444
extraArgs:
45-
anonymous-auth: "true" # anonymous-auth=true is needed for k0s to allow unauthorized health-checks on /healthz
45+
anonymous-auth: "true" # anonymous-auth=true is needed for k0s to allow unauthorized health-checks on /healthz
4646
machineTemplate:
4747
infrastructureRef:
4848
apiVersion: infrastructure.cluster.x-k8s.io/v1beta1
@@ -69,7 +69,7 @@ For a full reference on `K0sControlPlane` configurability see the [reference doc
6969
**WARNING: Downscaling is a potentially dangerous operation.**
7070

7171
Kubernetes using etcd as its backing store. It's crucial to have a quorum of etcd nodes available at all times. Always run etcd as a cluster of **odd** members.
72-
72+
7373
When downscaling the control plane, you need firstly to deregister the node from the etcd cluster. k0smotron will do it automatically for you.
7474

7575
**NOTE:** k0smotron gives node names sequentially and on downscaling it will remove the "latest" nodes. For instance, if you have `k0smotron-test` cluster of 5 nodes and you downscale to 3 nodes, the nodes `k0smotron-test-3` and `k0smotron-test-4` will be removed.

docs/capi-hetzner.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ spec:
5959
apiPort: 6443
6060
konnectivityPort: 8132
6161
annotations:
62-
load-balancer.hetzner.cloud/location: fsn1
62+
load-balancer.hetzner.cloud/location: fsn1
6363
---
6464
apiVersion: infrastructure.cluster.x-k8s.io/v1beta1
6565
kind: HetznerCluster
@@ -134,7 +134,7 @@ spec:
134134
apiVersion: v1
135135
kind: Secret
136136
data:
137-
hcloud: <base64 encoded token>
137+
hcloud: <base64 encoded token>
138138
metadata:
139139
name: hetzner
140140
```
@@ -146,7 +146,7 @@ After applying the manifests to the management cluster and confirming the infras
146146
```
147147
% kubectl get cluster,machine
148148
NAME PHASE AGE VERSION
149-
cluster.cluster.x-k8s.io/hetzer-test Provisioned 3m51s
149+
cluster.cluster.x-k8s.io/hetzer-test Provisioned 3m51s
150150
151151
NAME CLUSTER NODENAME PROVIDERID PHASE AGE VERSION
152152
machine.cluster.x-k8s.io/hetzner-test-md-0 hetzner-test hcloud://12345678 Provisioned 3m50s

docs/capi-kubevirt.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ This example demonstrates how k0smotron can be used with CAPK (Cluster API Provi
44

55
## Preparations
66

7-
Before starting this example, ensure that you have met the [general prerequisites](capi-examples.md#prerequisites).
7+
Before starting this example, ensure that you have met the [general prerequisites](capi-examples.md#prerequisites).
88

99
To install the latest stable version of Kubevirt you can run:
1010

@@ -155,7 +155,7 @@ After applying the manifests to the management cluster and confirming the infras
155155
```bash
156156
% kubectl get cluster,machine
157157
NAME PHASE AGE VERSION
158-
cluster.cluster.x-k8s.io/kubevirt-test Provisioned 22h
158+
cluster.cluster.x-k8s.io/kubevirt-test Provisioned 22h
159159

160160
NAME CLUSTER NODENAME PROVIDERID PHASE AGE VERSION
161161
machine.cluster.x-k8s.io/kubevirt-md-mdvns-l2rxb kubevirt-test kubevirt-md-mdvns-l2rxb kubevirt://kubevirt-md-mdvns-l2rxb Running 22h v1.27.4

0 commit comments

Comments
 (0)