Skip to content

Commit 5524608

Browse files
Merge pull request #1174 from hongkailiu/yamllint
NO-JIRA: Fix some issues identified by yamllint
2 parents b247772 + d81848a commit 5524608

7 files changed

+144
-144
lines changed

install/0000_00_cluster-version-operator_00_namespace.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ metadata:
99
workload.openshift.io/allowed: "management"
1010
labels:
1111
name: openshift-cluster-version
12-
openshift.io/run-level: "" # specify no run-level turns it off on install and upgrades
12+
openshift.io/run-level: "" # specify no run-level turns it off on install and upgrades
1313
openshift.io/cluster-monitoring: "true"
1414
pod-security.kubernetes.io/enforce: privileged
1515
pod-security.kubernetes.io/audit: privileged

install/0000_00_cluster-version-operator_03_deployment.yaml

Lines changed: 69 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -28,49 +28,49 @@ spec:
2828
image: {{.ReleaseImage}}
2929
imagePullPolicy: IfNotPresent
3030
args:
31-
- "start"
32-
- "--release-image={{.ReleaseImage}}"
33-
- "--enable-auto-update=false"
34-
- "--listen=0.0.0.0:9099"
35-
- "--serving-cert-file=/etc/tls/serving-cert/tls.crt"
36-
- "--serving-key-file=/etc/tls/serving-cert/tls.key"
37-
- "--v=2"
38-
- "--always-enable-capabilities=Ingress"
31+
- "start"
32+
- "--release-image={{.ReleaseImage}}"
33+
- "--enable-auto-update=false"
34+
- "--listen=0.0.0.0:9099"
35+
- "--serving-cert-file=/etc/tls/serving-cert/tls.crt"
36+
- "--serving-key-file=/etc/tls/serving-cert/tls.key"
37+
- "--v=2"
38+
- "--always-enable-capabilities=Ingress"
3939
resources:
4040
requests:
4141
cpu: 20m
4242
memory: 50Mi
4343
terminationMessagePolicy: FallbackToLogsOnError
4444
volumeMounts:
45-
- mountPath: /etc/ssl/certs
46-
name: etc-ssl-certs
47-
readOnly: true
48-
- mountPath: /etc/cvo/updatepayloads
49-
name: etc-cvo-updatepayloads
50-
readOnly: true
51-
- mountPath: /etc/tls/serving-cert
52-
name: serving-cert
53-
readOnly: true
54-
- mountPath: /etc/tls/service-ca
55-
name: service-ca
56-
readOnly: true
57-
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
58-
name: kube-api-access
59-
readOnly: true
45+
- mountPath: /etc/ssl/certs
46+
name: etc-ssl-certs
47+
readOnly: true
48+
- mountPath: /etc/cvo/updatepayloads
49+
name: etc-cvo-updatepayloads
50+
readOnly: true
51+
- mountPath: /etc/tls/serving-cert
52+
name: serving-cert
53+
readOnly: true
54+
- mountPath: /etc/tls/service-ca
55+
name: service-ca
56+
readOnly: true
57+
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
58+
name: kube-api-access
59+
readOnly: true
6060
env:
61-
# Unfortunately the placeholder is not replaced, reported as OCPBUGS-30080
62-
- name: OPERATOR_IMAGE_VERSION
63-
value: "0.0.1-snapshot"
64-
- name: KUBERNETES_SERVICE_PORT # allows CVO to communicate with apiserver directly on same host. Is substituted with port from infrastructures.status.apiServerInternalURL if available.
65-
value: "6443"
66-
- name: KUBERNETES_SERVICE_HOST # allows CVO to communicate with apiserver directly on same host. Is substituted with hostname from infrastructures.status.apiServerInternalURL if available.
67-
value: "127.0.0.1"
68-
- name: NODE_NAME
69-
valueFrom:
70-
fieldRef:
71-
fieldPath: spec.nodeName
72-
- name: CLUSTER_PROFILE
73-
value: {{ .ClusterProfile }}
61+
# Unfortunately the placeholder is not replaced, reported as OCPBUGS-30080
62+
- name: OPERATOR_IMAGE_VERSION
63+
value: "0.0.1-snapshot"
64+
- name: KUBERNETES_SERVICE_PORT # allows CVO to communicate with apiserver directly on same host. Is substituted with port from infrastructures.status.apiServerInternalURL if available.
65+
value: "6443"
66+
- name: KUBERNETES_SERVICE_HOST # allows CVO to communicate with apiserver directly on same host. Is substituted with hostname from infrastructures.status.apiServerInternalURL if available.
67+
value: "127.0.0.1"
68+
- name: NODE_NAME
69+
valueFrom:
70+
fieldRef:
71+
fieldPath: spec.nodeName
72+
- name: CLUSTER_PROFILE
73+
value: {{ .ClusterProfile }}
7474
# this pod is hostNetwork and uses the internal LB DNS name when possible, which the kubelet also uses.
7575
# this dnsPolicy allows us to use the same dnsConfig as the kubelet, without access to read it ourselves.
7676
dnsPolicy: Default
@@ -88,43 +88,43 @@ spec:
8888
effect: "NoSchedule"
8989
- key: "node.kubernetes.io/not-ready"
9090
operator: "Exists"
91-
effect: "NoSchedule"
91+
effect: "NoSchedule"
9292
- key: "node.kubernetes.io/unreachable"
9393
operator: "Exists"
9494
effect: "NoExecute"
95-
tolerationSeconds: 120
95+
tolerationSeconds: 120
9696
- key: "node.kubernetes.io/not-ready"
9797
operator: "Exists"
9898
effect: "NoExecute"
99-
tolerationSeconds: 120
99+
tolerationSeconds: 120
100100
volumes:
101-
- name: etc-ssl-certs
102-
hostPath:
103-
path: /etc/ssl/certs
104-
- name: etc-cvo-updatepayloads
105-
hostPath:
106-
path: /etc/cvo/updatepayloads
107-
- name: serving-cert
108-
secret:
109-
secretName: cluster-version-operator-serving-cert
110-
- name: service-ca
111-
configMap:
112-
name: openshift-service-ca.crt
113-
- name: kube-api-access
114-
projected:
115-
defaultMode: 420
116-
sources:
117-
- serviceAccountToken:
118-
expirationSeconds: 3600
119-
path: token
120-
- configMap:
121-
items:
122-
- key: ca.crt
123-
path: ca.crt
124-
name: kube-root-ca.crt
125-
- downwardAPI:
126-
items:
127-
- fieldRef:
128-
apiVersion: v1
129-
fieldPath: metadata.namespace
130-
path: namespace
101+
- name: etc-ssl-certs
102+
hostPath:
103+
path: /etc/ssl/certs
104+
- name: etc-cvo-updatepayloads
105+
hostPath:
106+
path: /etc/cvo/updatepayloads
107+
- name: serving-cert
108+
secret:
109+
secretName: cluster-version-operator-serving-cert
110+
- name: service-ca
111+
configMap:
112+
name: openshift-service-ca.crt
113+
- name: kube-api-access
114+
projected:
115+
defaultMode: 420
116+
sources:
117+
- serviceAccountToken:
118+
expirationSeconds: 3600
119+
path: token
120+
- configMap:
121+
items:
122+
- key: ca.crt
123+
path: ca.crt
124+
name: kube-root-ca.crt
125+
- downwardAPI:
126+
items:
127+
- fieldRef:
128+
apiVersion: v1
129+
fieldPath: metadata.namespace
130+
path: namespace

install/0000_00_cluster-version-operator_04_service.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ spec:
1616
k8s-app: cluster-version-operator
1717
ports:
1818
- name: metrics
19-
port: 9099 # chosen to be in the internal open range
19+
port: 9099 # chosen to be in the internal open range

install/0000_00_update-status-controller_00_namespace-DevPreviewNoUpgrade.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ metadata:
1010
release.openshift.io/feature-set: DevPreviewNoUpgrade
1111
labels:
1212
name: openshift-update-status-controller
13-
openshift.io/run-level: "" # specify no run-level turns it off on install and upgrades
13+
openshift.io/run-level: "" # specify no run-level turns it off on install and upgrades
1414
openshift.io/cluster-monitoring: "true"

install/0000_00_update-status-controller_03_deployment-DevPreviewNoUpgrade.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ spec:
3030
imagePullPolicy: IfNotPresent
3131
args:
3232
- "update-status-controller"
33-
- -v=5 # High while in DevPreview, lower for GA
33+
- -v=5 # High while in DevPreview, lower for GA
3434
securityContext:
3535
capabilities:
3636
drop:

install/0000_90_cluster-version-operator_02_servicemonitor.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,8 @@ spec:
5959
(
6060
(
6161
time()-cluster_version_operator_update_retrieval_timestamp_seconds
62-
) >= 3600
63-
and ignoring(condition, name, reason)
62+
) >= 3600
63+
and ignoring(condition, name, reason)
6464
(cluster_operator_conditions{name="version", condition="RetrievedUpdates", endpoint="metrics", reason!="NoChannel"})
6565
)
6666
labels:

pkg/payload/testdata/TestRenderManifest_expected_cvo_deployment.yaml

Lines changed: 69 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -28,49 +28,49 @@ spec:
2828
image: quay.io/cvo/release:latest
2929
imagePullPolicy: IfNotPresent
3030
args:
31-
- "start"
32-
- "--release-image=quay.io/cvo/release:latest"
33-
- "--enable-auto-update=false"
34-
- "--listen=0.0.0.0:9099"
35-
- "--serving-cert-file=/etc/tls/serving-cert/tls.crt"
36-
- "--serving-key-file=/etc/tls/serving-cert/tls.key"
37-
- "--v=2"
38-
- "--always-enable-capabilities=Ingress"
31+
- "start"
32+
- "--release-image=quay.io/cvo/release:latest"
33+
- "--enable-auto-update=false"
34+
- "--listen=0.0.0.0:9099"
35+
- "--serving-cert-file=/etc/tls/serving-cert/tls.crt"
36+
- "--serving-key-file=/etc/tls/serving-cert/tls.key"
37+
- "--v=2"
38+
- "--always-enable-capabilities=Ingress"
3939
resources:
4040
requests:
4141
cpu: 20m
4242
memory: 50Mi
4343
terminationMessagePolicy: FallbackToLogsOnError
4444
volumeMounts:
45-
- mountPath: /etc/ssl/certs
46-
name: etc-ssl-certs
47-
readOnly: true
48-
- mountPath: /etc/cvo/updatepayloads
49-
name: etc-cvo-updatepayloads
50-
readOnly: true
51-
- mountPath: /etc/tls/serving-cert
52-
name: serving-cert
53-
readOnly: true
54-
- mountPath: /etc/tls/service-ca
55-
name: service-ca
56-
readOnly: true
57-
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
58-
name: kube-api-access
59-
readOnly: true
45+
- mountPath: /etc/ssl/certs
46+
name: etc-ssl-certs
47+
readOnly: true
48+
- mountPath: /etc/cvo/updatepayloads
49+
name: etc-cvo-updatepayloads
50+
readOnly: true
51+
- mountPath: /etc/tls/serving-cert
52+
name: serving-cert
53+
readOnly: true
54+
- mountPath: /etc/tls/service-ca
55+
name: service-ca
56+
readOnly: true
57+
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
58+
name: kube-api-access
59+
readOnly: true
6060
env:
61-
# Unfortunately the placeholder is not replaced, reported as OCPBUGS-30080
62-
- name: OPERATOR_IMAGE_VERSION
63-
value: "0.0.1-snapshot"
64-
- name: KUBERNETES_SERVICE_PORT # allows CVO to communicate with apiserver directly on same host. Is substituted with port from infrastructures.status.apiServerInternalURL if available.
65-
value: "6443"
66-
- name: KUBERNETES_SERVICE_HOST # allows CVO to communicate with apiserver directly on same host. Is substituted with hostname from infrastructures.status.apiServerInternalURL if available.
67-
value: "127.0.0.1"
68-
- name: NODE_NAME
69-
valueFrom:
70-
fieldRef:
71-
fieldPath: spec.nodeName
72-
- name: CLUSTER_PROFILE
73-
value: some-profile
61+
# Unfortunately the placeholder is not replaced, reported as OCPBUGS-30080
62+
- name: OPERATOR_IMAGE_VERSION
63+
value: "0.0.1-snapshot"
64+
- name: KUBERNETES_SERVICE_PORT # allows CVO to communicate with apiserver directly on same host. Is substituted with port from infrastructures.status.apiServerInternalURL if available.
65+
value: "6443"
66+
- name: KUBERNETES_SERVICE_HOST # allows CVO to communicate with apiserver directly on same host. Is substituted with hostname from infrastructures.status.apiServerInternalURL if available.
67+
value: "127.0.0.1"
68+
- name: NODE_NAME
69+
valueFrom:
70+
fieldRef:
71+
fieldPath: spec.nodeName
72+
- name: CLUSTER_PROFILE
73+
value: some-profile
7474
# this pod is hostNetwork and uses the internal LB DNS name when possible, which the kubelet also uses.
7575
# this dnsPolicy allows us to use the same dnsConfig as the kubelet, without access to read it ourselves.
7676
dnsPolicy: Default
@@ -88,43 +88,43 @@ spec:
8888
effect: "NoSchedule"
8989
- key: "node.kubernetes.io/not-ready"
9090
operator: "Exists"
91-
effect: "NoSchedule"
91+
effect: "NoSchedule"
9292
- key: "node.kubernetes.io/unreachable"
9393
operator: "Exists"
9494
effect: "NoExecute"
95-
tolerationSeconds: 120
95+
tolerationSeconds: 120
9696
- key: "node.kubernetes.io/not-ready"
9797
operator: "Exists"
9898
effect: "NoExecute"
99-
tolerationSeconds: 120
99+
tolerationSeconds: 120
100100
volumes:
101-
- name: etc-ssl-certs
102-
hostPath:
103-
path: /etc/ssl/certs
104-
- name: etc-cvo-updatepayloads
105-
hostPath:
106-
path: /etc/cvo/updatepayloads
107-
- name: serving-cert
108-
secret:
109-
secretName: cluster-version-operator-serving-cert
110-
- name: service-ca
111-
configMap:
112-
name: openshift-service-ca.crt
113-
- name: kube-api-access
114-
projected:
115-
defaultMode: 420
116-
sources:
117-
- serviceAccountToken:
118-
expirationSeconds: 3600
119-
path: token
120-
- configMap:
121-
items:
122-
- key: ca.crt
123-
path: ca.crt
124-
name: kube-root-ca.crt
125-
- downwardAPI:
126-
items:
127-
- fieldRef:
128-
apiVersion: v1
129-
fieldPath: metadata.namespace
130-
path: namespace
101+
- name: etc-ssl-certs
102+
hostPath:
103+
path: /etc/ssl/certs
104+
- name: etc-cvo-updatepayloads
105+
hostPath:
106+
path: /etc/cvo/updatepayloads
107+
- name: serving-cert
108+
secret:
109+
secretName: cluster-version-operator-serving-cert
110+
- name: service-ca
111+
configMap:
112+
name: openshift-service-ca.crt
113+
- name: kube-api-access
114+
projected:
115+
defaultMode: 420
116+
sources:
117+
- serviceAccountToken:
118+
expirationSeconds: 3600
119+
path: token
120+
- configMap:
121+
items:
122+
- key: ca.crt
123+
path: ca.crt
124+
name: kube-root-ca.crt
125+
- downwardAPI:
126+
items:
127+
- fieldRef:
128+
apiVersion: v1
129+
fieldPath: metadata.namespace
130+
path: namespace

0 commit comments

Comments
 (0)