Browse Source

Update docs from v1alpha to v1beta1, fix typos

Docs 4 years ago
parent
commit
b8370897f0

+ 2 - 2
Makefile

@@ -177,11 +177,11 @@ helm.build: helm.generate ## Build helm chart
 helm.generate:
 helm.generate:
 # Split the generated bundle yaml file to inject control flags
 # Split the generated bundle yaml file to inject control flags
 	@for i in $(BUNDLE_DIR)/*.yaml; do \
 	@for i in $(BUNDLE_DIR)/*.yaml; do \
-		yq -Ns '"$(HELM_DIR)/templates/crds/" + .spec.names.singular' "$$i"; \
+		yq e -Ns '"$(HELM_DIR)/templates/crds/" + .spec.names.singular' "$$i"; \
 	done
 	done
 # Add helm if statement for controlling the install of CRDs
 # Add helm if statement for controlling the install of CRDs
 	@for i in $(HELM_DIR)/templates/crds/*.yml; do \
 	@for i in $(HELM_DIR)/templates/crds/*.yml; do \
-		export CRDS_FLAG_NAME="create$$(yq '.spec.names.kind' $$i)"; \
+		export CRDS_FLAG_NAME="create$$(yq e '.spec.names.kind' $$i)"; \
 		cp "$$i" "$$i.bkp"; \
 		cp "$$i" "$$i.bkp"; \
 		if [[ "$$CRDS_FLAG_NAME" == *"Cluster"* ]]; then \
 		if [[ "$$CRDS_FLAG_NAME" == *"Cluster"* ]]; then \
 			echo "{{- if and (.Values.installCRDs) (.Values.crds.$$CRDS_FLAG_NAME) }}" > "$$i"; \
 			echo "{{- if and (.Values.installCRDs) (.Values.crds.$$CRDS_FLAG_NAME) }}" > "$$i"; \

+ 2 - 2
docs/contributing-devguide.md

@@ -110,14 +110,14 @@ documentation. See `/docs` for the source code and `/hack/api-docs` for the buil
 When writing documentation it is advised to run the mkdocs server with livereload:
 When writing documentation it is advised to run the mkdocs server with livereload:
 
 
 ```shell
 ```shell
-make serve-docs
+make docs.serve
 ```
 ```
 
 
 Run the following command to run a complete build. The rendered assets are available under `/site`.
 Run the following command to run a complete build. The rendered assets are available under `/site`.
 
 
 ```shell
 ```shell
 make docs
 make docs
-make serve-docs
+make docs.serve
 ```
 ```
 
 
 Open `http://localhost:8000` in your browser.
 Open `http://localhost:8000` in your browser.

+ 1 - 1
docs/contributing-process.md

@@ -61,7 +61,7 @@ There's another suite of e2e tests that integrate with managed Kuberentes offeri
 They create real infrastructure at a cloud provider and deploy the controller
 They create real infrastructure at a cloud provider and deploy the controller
 into that environment.
 into that environment.
 This is necessary to test the authentication integration
 This is necessary to test the authentication integration
-([GCP Worklaod Identity](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity),
+([GCP Workload Identity](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity),
 [EKS IRSA](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html)...).
 [EKS IRSA](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html)...).
 
 
 These tests are time intensive (~20-45min) and must be triggered manually by
 These tests are time intensive (~20-45min) and must be triggered manually by

File diff suppressed because it is too large
+ 966 - 257
docs/spec.md


+ 2 - 2
e2e/suite/akeyless/provider.go

@@ -19,7 +19,7 @@ import (
 	"encoding/base64"
 	"encoding/base64"
 	"errors"
 	"errors"
 	"fmt"
 	"fmt"
-	"io/ioutil"
+	"io"
 	"os"
 	"os"
 	"strings"
 	"strings"
 
 
@@ -223,7 +223,7 @@ func readK8SServiceAccountJWT() (string, error) {
 	}
 	}
 	defer data.Close()
 	defer data.Close()
 
 
-	contentBytes, err := ioutil.ReadAll(data)
+	contentBytes, err := io.ReadAll(data)
 	if err != nil {
 	if err != nil {
 		return "", err
 		return "", err
 	}
 	}

+ 1 - 1
hack/api-docs/generate.sh

@@ -49,5 +49,5 @@ fi
 
 
 gendoc::build
 gendoc::build
 gendoc::exec \
 gendoc::exec \
-    -api-dir github.com/external-secrets/external-secrets/apis/externalsecrets/v1alpha1 \
+    -api-dir github.com/external-secrets/external-secrets/apis/externalsecrets/v1beta1 \
     -out-file "$1"
     -out-file "$1"

+ 1 - 1
pkg/provider/azure/keyvault/keyvault_auth_test.go

@@ -340,7 +340,7 @@ func TestAuth(t *testing.T) {
 }
 }
 
 
 func getTokenFromAuthorizer(t *testing.T, authorizer autorest.Authorizer) string {
 func getTokenFromAuthorizer(t *testing.T, authorizer autorest.Authorizer) string {
-	rq, _ := http.NewRequest("POST", "http://example.com", nil)
+	rq, _ := http.NewRequest("POST", "http://example.com", http.NoBody)
 	_, err := authorizer.WithAuthorization()(
 	_, err := authorizer.WithAuthorization()(
 		autorest.PreparerFunc(func(r *http.Request) (*http.Request, error) {
 		autorest.PreparerFunc(func(r *http.Request) (*http.Request, error) {
 			return rq, nil
 			return rq, nil