Skip to content

Commit

Permalink
test: test the "ct lint-and-install --all --target-branch main"
Browse files Browse the repository at this point in the history
Signed-off-by: chirichidi <[email protected]>
  • Loading branch information
chirichidi committed Feb 16, 2024
1 parent ef6a6b8 commit 0aebb35
Show file tree
Hide file tree
Showing 2 changed files with 9 additions and 9 deletions.
12 changes: 6 additions & 6 deletions charts/airflow/sample-values-CeleryExecutor.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -33,12 +33,12 @@ airflow:
## a list of users to create
## [FAQ] https://github.com/airflow-helm/charts/blob/main/charts/airflow/docs/faq/security/airflow-users.md
users:
- username: admin
password: admin
role: Admin
email: [email protected]
firstName: admin
lastName: admin
- username: admin
password: admin
role: Admin
email: [email protected]
firstName: admin
lastName: admin

## a list airflow connections to create
## [FAQ] https://github.com/airflow-helm/charts/blob/main/charts/airflow/docs/faq/dags/airflow-connections.md
Expand Down
6 changes: 3 additions & 3 deletions charts/airflow/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -1502,9 +1502,9 @@ dags:
bucket: ""
s3Path: ""

## Due to the issue where keys must consist of alphanumeric characters, and for security reasons,
## it is strongly recommended to inject Secrets into Pods' environment variables from external services like ExternalSecrets.
## This approach ensures sensitive information is securely managed and not embedded within source code or values.yaml,
## Due to the issue where keys must consist of alphanumeric characters, and for security reasons
## it is strongly recommended to inject Secrets into Pods' environment variables from external services like ExternalSecrets.
## This approach ensures sensitive information is securely managed and not embedded within source code or values.yaml,
## aligning with best practices for secure application configuration.
##
## the name of the pre-created Secret with AWS credentials
Expand Down

0 comments on commit 0aebb35

Please sign in to comment.