Просмотр исходного кода

Merge pull request #143 from cschug/fix_final_newline

fix: add final newline character to text files
Christian Lempa 2 лет назад
Родитель
Сommit
32ffb5db59
86 измененных файлов с 86 добавлено и 78 удалено
  1. 1 1
      ansible/configuration/fail2ban/config-f2b-protect-sshd.yaml
  2. 1 1
      ansible/configuration/ssh/config-add-sshkey.yaml
  3. 1 1
      ansible/deployment/portainer/deploy-portainer.yaml
  4. 1 1
      ansible/deployment/traefik/deploy-traefik.yaml
  5. 1 1
      ansible/installation/inst-docker-ubuntu.yaml
  6. 1 1
      ansible/installation/inst-k8s/ansible.cfg
  7. 1 1
      ansible/installation/inst-k8s/k8s_worker_node_connection.j2
  8. 1 1
      ansible/installation/inst-zsh.yaml
  9. 1 1
      ansible/maintenance/maint-docker-clean.yaml
  10. 1 1
      ansible/maintenance/maint-reboot-required.yaml
  11. 1 1
      ansible/maintenance/maint-reboot.yaml
  12. 1 1
      ansible/notification/notify-discord.yaml
  13. 1 0
      ansible/update/upd-apt-dist.yaml
  14. 1 1
      ansible/update/upd-apt.yaml
  15. 1 0
      docker-compose/bind9/config/example.named.conf
  16. 1 1
      docker-compose/duplicati/docker-compose.yaml
  17. 1 0
      docker-compose/factory/README.md
  18. 1 1
      docker-compose/heimdall/docker-compose.yaml
  19. 1 1
      docker-compose/homeassistant/docker-compose.yaml
  20. 1 1
      docker-compose/homer/assets/example.config.yml
  21. 1 1
      docker-compose/homer/assets/example.custom.css
  22. 1 1
      docker-compose/homer/assets/example2.config.yml
  23. 1 1
      docker-compose/homer/docker-compose.yaml
  24. 1 1
      docker-compose/nextcloud/docker-compose.yaml
  25. 1 1
      docker-compose/nginxproxymanager/docker-compose.yaml
  26. 1 1
      docker-compose/nodeexporter/docker-compose.yaml
  27. 1 1
      docker-compose/nvidiadgcm/docker-compose.yaml
  28. 1 1
      docker-compose/nvidiasmi/docker-compose.yaml
  29. 1 1
      docker-compose/passbolt/docker-compose.yaml
  30. 1 1
      docker-compose/pihole/docker-compose.yaml
  31. 1 1
      docker-compose/portainer-agent/docker-compose.yaml
  32. 1 1
      docker-compose/portainer/docker-compose.yaml
  33. 1 1
      docker-compose/swag/docker-compose.yaml
  34. 1 1
      docker-compose/teleport/config/teleport.yaml
  35. 1 1
      github-actions/scp-action/copy-config-files.yml
  36. 1 1
      kubernetes/certmanager/default-values.yml
  37. 1 1
      kubernetes/certmanager/templates/certificate.yaml
  38. 1 1
      kubernetes/certmanager/templates/clusterissuer-selfsigned.yml
  39. 1 1
      kubernetes/certmanager/templates/issuer-selfsigned.yml
  40. 1 1
      kubernetes/certmanager/templates/secret-cloudflare.yml
  41. 1 1
      kubernetes/nginx-http/nginx-http-cm.yml
  42. 1 1
      kubernetes/nginx-http/nginx-http-deploy.yml
  43. 1 1
      kubernetes/nginx-http/nginx-http-svc.yml
  44. 1 1
      kubernetes/portainer/templates/portainer-ingress.yml
  45. 1 0
      kubernetes/portainer/values.yml
  46. 1 1
      kubernetes/templates/certificate.yaml
  47. 1 1
      kubernetes/templates/cm-and-secrets/mysql-deploy.yml
  48. 1 1
      kubernetes/templates/cm-and-secrets/mysql-secret.yml
  49. 1 1
      kubernetes/templates/cm-and-secrets/nginx-http-cm.yml
  50. 1 1
      kubernetes/templates/cm-and-secrets/nginx-http-deploy.yml
  51. 1 1
      kubernetes/templates/cm-and-secrets/nginx-http-svc.yml
  52. 1 1
      kubernetes/templates/cm-and-secrets/nginx-https-secret-blank.yml
  53. 1 1
      kubernetes/templates/cm-and-secrets/nginx-https-svc.yml
  54. 1 1
      kubernetes/templates/ingress.yaml
  55. 1 1
      kubernetes/templates/namespace.yml
  56. 1 1
      kubernetes/templates/pv-and-pvc/civo-pvc.yml
  57. 1 1
      kubernetes/templates/pv-and-pvc/civo-web.yml
  58. 1 1
      kubernetes/templates/pv-and-pvc/local-web.yml
  59. 1 1
      kubernetes/templates/pv-and-pvc/nfs-pv.yml
  60. 1 1
      kubernetes/templates/pv-and-pvc/nfs-pvc.yml
  61. 1 1
      kubernetes/templates/service.yaml
  62. 1 1
      kubernetes/traefik/templates/ingress.yml
  63. 1 1
      kubernetes/traefik/templates/ingressroutetcp.yml
  64. 1 1
      packer/proxmox/ubuntu-server-focal-docker/files/99-pve.cfg
  65. 1 0
      packer/proxmox/ubuntu-server-focal-docker/http/meta-data
  66. 1 1
      packer/proxmox/ubuntu-server-focal/files/99-pve.cfg
  67. 1 0
      packer/proxmox/ubuntu-server-focal/http/meta-data
  68. 1 1
      packer/proxmox/ubuntu-server-jammy-docker/files/99-pve.cfg
  69. 1 0
      packer/proxmox/ubuntu-server-jammy-docker/http/meta-data
  70. 1 1
      packer/proxmox/ubuntu-server-jammy/files/99-pve.cfg
  71. 1 0
      packer/proxmox/ubuntu-server-jammy/http/meta-data
  72. 1 1
      terraform/helm/traefik.tf
  73. 1 1
      terraform/kubectl/manifest.tf
  74. 1 1
      terraform/kubernetes/deployment.tf
  75. 1 1
      terraform/kubernetes/ingress.tf
  76. 1 1
      terraform/kubernetes/secret.tf
  77. 1 1
      terraform/kubernetes/service.tf
  78. 1 1
      terraform/proxmox/credentials.auto.tfvars
  79. 1 1
      terraform/proxmox/full-clone.tf
  80. 1 1
      terraform/templates/cloud-deployment-example/civo.tf
  81. 1 1
      terraform/templates/cloud-deployment-example/main.tf
  82. 1 1
      terraform/templates/kubernetes-automation-example/certmanager.tf
  83. 1 1
      terraform/templates/kubernetes-automation-example/provider.tf
  84. 1 1
      terraform/templates/kubernetes-automation-example/traefik.tf
  85. 1 1
      terraform/templates/simple-docker-example/main.tf
  86. 1 1
      vagrant/hyperv/ubuntu/ubuntu-cluster-plain/Vagrantfile

+ 1 - 1
ansible/configuration/fail2ban/config-f2b-protect-sshd.yaml

@@ -16,4 +16,4 @@
     systemd:
       state: restarted
       daemon_reload: yes
-      name: fail2ban
+      name: fail2ban

+ 1 - 1
ansible/configuration/ssh/config-add-sshkey.yaml

@@ -14,4 +14,4 @@
       state: present
       regexp: '^%sudo'
       line: '%sudo ALL=(ALL) NOPASSWD: ALL'
-      validate: /usr/sbin/visudo -cf %s
+      validate: /usr/sbin/visudo -cf %s

+ 1 - 1
ansible/deployment/portainer/deploy-portainer.yaml

@@ -16,4 +16,4 @@
       volumes:
         - /var/run/docker.sock:/var/run/docker.sock
         - portainer-data:/data
-      restart_policy: unless-stopped
+      restart_policy: unless-stopped

+ 1 - 1
ansible/deployment/traefik/deploy-traefik.yaml

@@ -14,4 +14,4 @@
       volumes:
         - /var/run/docker.sock:/var/run/docker.sock
         - /etc/traefik:/etc/traefik
-      restart_policy: unless-stopped
+      restart_policy: unless-stopped

+ 1 - 1
ansible/installation/inst-docker-ubuntu.yaml

@@ -31,4 +31,4 @@
           - docker-buildx-plugin
           - docker-scan-plugin
           - docker-compose-plugin
-        update_cache: yes
+        update_cache: yes

+ 1 - 1
ansible/installation/inst-k8s/ansible.cfg

@@ -1,2 +1,2 @@
 [defaults]
-timeout = 25
+timeout = 25

+ 1 - 1
ansible/installation/inst-k8s/k8s_worker_node_connection.j2

@@ -1 +1 @@
-{{ join_output.stdout }}
+{{ join_output.stdout }}

+ 1 - 1
ansible/installation/inst-zsh.yaml

@@ -8,4 +8,4 @@
         name: zsh
         state: present
         update_cache: true
-      become: true
+      become: true

+ 1 - 1
ansible/maintenance/maint-docker-clean.yaml

@@ -10,4 +10,4 @@
           dangling: false
         networks: false
         volumes: false
-        builder_cache: false
+        builder_cache: false

+ 1 - 1
ansible/maintenance/maint-reboot-required.yaml

@@ -10,4 +10,4 @@
       register: reboot_required
     - debug:
         msg: "Reboot is required"
-      when: reboot_required.stat.exists
+      when: reboot_required.stat.exists

+ 1 - 1
ansible/maintenance/maint-reboot.yaml

@@ -5,4 +5,4 @@
   tasks:
   - name: reboot machine
     reboot:
-      reboot_timeout: 3600
+      reboot_timeout: 3600

+ 1 - 1
ansible/notification/notify-discord.yaml

@@ -11,4 +11,4 @@
         headers:
           Content-Type: application/json
         status_code: 204
-      # when: your-condition
+      # when: your-condition

+ 1 - 0
ansible/update/upd-apt-dist.yaml

@@ -0,0 +1 @@
+

+ 1 - 1
ansible/update/upd-apt.yaml

@@ -23,4 +23,4 @@
       yum:
         name: '*'
         state: latest
-        exclude: kernel*
+        exclude: kernel*

+ 1 - 0
docker-compose/bind9/config/example.named.conf

@@ -0,0 +1 @@
+

+ 1 - 1
docker-compose/duplicati/docker-compose.yaml

@@ -13,4 +13,4 @@ services:
       - /:/source
     ports:
       - 8200:8200
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 0
docker-compose/factory/README.md

@@ -0,0 +1 @@
+

+ 1 - 1
docker-compose/heimdall/docker-compose.yaml

@@ -11,4 +11,4 @@ services:
     ports:
       - 80:80
       - 443:443
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/homeassistant/docker-compose.yaml

@@ -9,4 +9,4 @@ services:
     # devices:
     #   - /dev/ttyACMO  # (optional) Add serial devices to the container
     privileged: true
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/homer/assets/example.config.yml

@@ -79,4 +79,4 @@ services:
         logo: "assets/tools/sample2.png"
         subtitle: "Another application"
         tag: "app"
-        url: "#"
+        url: "#"

+ 1 - 1
docker-compose/homer/assets/example.custom.css

@@ -5,4 +5,4 @@
 body #app .card.green {
   background-color: #006600;
   color: #00ff00;
-}
+}

+ 1 - 1
docker-compose/homer/assets/example2.config.yml

@@ -61,4 +61,4 @@ services:
         logo: "assets/tools/pingdom.png"
         subtitle: "Pingdom public reports overview"
         tag: "CI"
-        url: "https://www.pingdom.com/"
+        url: "https://www.pingdom.com/"

+ 1 - 1
docker-compose/homer/docker-compose.yaml

@@ -7,4 +7,4 @@ services:
       - "8080:8080"
     volumes:
       - /etc/homer/assets/:/www/assets
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/nextcloud/docker-compose.yaml

@@ -27,4 +27,4 @@ services:
       - MYSQL_PASSWORD=$MYSQL_PASSWORD
       - MYSQL_DATABASE=$MYSQL_DATABASE
       - MYSQL_USER=$MYSQL_USER
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/nginxproxymanager/docker-compose.yaml

@@ -27,4 +27,4 @@ services:
       - MYSQL_USER=npm
       - MYSQL_PASSWORD=npm
     volumes:
-      - nginxproxymanager-db:/var/lib/mysql
+      - nginxproxymanager-db:/var/lib/mysql

+ 1 - 1
docker-compose/nodeexporter/docker-compose.yaml

@@ -7,4 +7,4 @@ services:
     pid: host
     restart: unless-stopped
     volumes:
-      - /:/host:ro,rslave
+      - /:/host:ro,rslave

+ 1 - 1
docker-compose/nvidiadgcm/docker-compose.yaml

@@ -11,4 +11,4 @@ services:
       - NVIDIA_DRIVER_CAPABILITIES=all
     ports:
       - 9400:9400
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/nvidiasmi/docker-compose.yaml

@@ -13,4 +13,4 @@ services:
       - /usr/bin/nvidia-smi:/usr/bin/nvidia-smi
       - /usr/lib/x86_64-linux-gnu/libnvidia-ml.so:/usr/lib/x86_64-linux-gnu/libnvidia-ml.so
       - /usr/lib/x86_64-linux-gnu/libnvidia-ml.so.1:/usr/lib/x86_64-linux-gnu/libnvidia-ml.so.1
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/passbolt/docker-compose.yaml

@@ -36,4 +36,4 @@ services:
       - passbolt-data-gpg:/etc/passbolt/gpg
       - passbolt-data-jwt:/etc/passbolt/jwt
     command: ["/usr/bin/wait-for.sh", "-t", "0", "passbolt-db:3306", "--", "/docker-entrypoint.sh"]
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/pihole/docker-compose.yaml

@@ -16,4 +16,4 @@ services:
     volumes:
       - etcd:/etc/pihole
       - dnsmasq:/etc/dnsmasq.d
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/portainer-agent/docker-compose.yaml

@@ -12,4 +12,4 @@ services:
       - /var/lib/docker/volumes:/var/lib/docker/volumes
     networks:
       - portainer-agent_default
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/portainer/docker-compose.yaml

@@ -13,4 +13,4 @@ services:
     volumes:
       - /var/run/docker.sock:/var/run/docker.sock
       - portainer-data:/data
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/swag/docker-compose.yaml

@@ -33,4 +33,4 @@ services:
       - 80:80  # optional
     depends_on:
       - mariadb
-    restart: unless-stopped
+    restart: unless-stopped

+ 1 - 1
docker-compose/teleport/config/teleport.yaml

@@ -51,4 +51,4 @@ app_service:
   # apps:
   #   - name: "yourapp"
   #     uri: "http://your-app-url"
-  #     insecure_skip_verify: false
+  #     insecure_skip_verify: false

+ 1 - 1
github-actions/scp-action/copy-config-files.yml

@@ -23,4 +23,4 @@ jobs:
           key: ${{ secrets.your-private-ssh-key }}
           source: './config/*'
           target: '/target/path/'
-          strip_components: 1   # remove the top level directory
+          strip_components: 1   # remove the top level directory

+ 1 - 1
kubernetes/certmanager/default-values.yml

@@ -513,4 +513,4 @@ startupapicheck:
       helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
 
     # Automount API credentials for a Service Account.
-    automountServiceAccountToken: true
+    automountServiceAccountToken: true

+ 1 - 1
kubernetes/certmanager/templates/certificate.yaml

@@ -9,4 +9,4 @@ spec:
     name: ssl-issuer
     kind: ClusterIssuer
   dnsNames:
-    - your-hostname
+    - your-hostname

+ 1 - 1
kubernetes/certmanager/templates/clusterissuer-selfsigned.yml

@@ -3,4 +3,4 @@ kind: ClusterIssuer
 metadata:
   name: selfsigned-issuer
 spec:
-  selfSigned: {}
+  selfSigned: {}

+ 1 - 1
kubernetes/certmanager/templates/issuer-selfsigned.yml

@@ -6,4 +6,4 @@ metadata:
   # ---
   # namespace: your-namespace
 spec:
-  selfSigned: {}
+  selfSigned: {}

+ 1 - 1
kubernetes/certmanager/templates/secret-cloudflare.yml

@@ -11,4 +11,4 @@ stringData:
   # api-key: your-api-key
   # - or -
   # Token:
-  # api-token: your-api-token
+  # api-token: your-api-token

+ 1 - 1
kubernetes/nginx-http/nginx-http-cm.yml

@@ -25,4 +25,4 @@ data:
           return 401;
         }
       }
-    }
+    }

+ 1 - 1
kubernetes/nginx-http/nginx-http-deploy.yml

@@ -29,4 +29,4 @@ spec:
           name: nginx-http-cm
       - name: nginx-http-vol
         hostPath:
-          path: /var/nginxserver
+          path: /var/nginxserver

+ 1 - 1
kubernetes/nginx-http/nginx-http-svc.yml

@@ -12,4 +12,4 @@ spec:
     protocol: TCP
     name: http
   selector:
-    app: nginx-http
+    app: nginx-http

+ 1 - 1
kubernetes/portainer/templates/portainer-ingress.yml

@@ -14,4 +14,4 @@ spec:
           service:
             name: portainer
             port:
-              number: 9000
+              number: 9000

+ 1 - 0
kubernetes/portainer/values.yml

@@ -0,0 +1 @@
+

+ 1 - 1
kubernetes/templates/certificate.yaml

@@ -9,4 +9,4 @@ spec:
     name: ssl-issuer
     kind: ClusterIssuer
   dnsNames:
-    - your-hostname
+    - your-hostname

+ 1 - 1
kubernetes/templates/cm-and-secrets/mysql-deploy.yml

@@ -30,4 +30,4 @@ spec:
 #       volumes:
 #       - name: mysql-vol
 #         hostPath:
-#           path: /var/mysql-data
+#           path: /var/mysql-data

+ 1 - 1
kubernetes/templates/cm-and-secrets/mysql-secret.yml

@@ -4,4 +4,4 @@ metadata:
   name: mysql-secret
 type: Opaque
 stringData:
-  root-pass: test123
+  root-pass: test123

+ 1 - 1
kubernetes/templates/cm-and-secrets/nginx-http-cm.yml

@@ -25,4 +25,4 @@ data:
           return 401;
         }
       }
-    }
+    }

+ 1 - 1
kubernetes/templates/cm-and-secrets/nginx-http-deploy.yml

@@ -29,4 +29,4 @@ spec:
           name: nginx-http-cm
       - name: nginx-http-vol
         hostPath:
-          path: /var/nginxserver
+          path: /var/nginxserver

+ 1 - 1
kubernetes/templates/cm-and-secrets/nginx-http-svc.yml

@@ -12,4 +12,4 @@ spec:
     protocol: TCP
     name: http
   selector:
-    app: nginx-http
+    app: nginx-http

+ 1 - 1
kubernetes/templates/cm-and-secrets/nginx-https-secret-blank.yml

@@ -9,4 +9,4 @@ stringData:
     ...
     -----END CERTIFICATE-----
   server-key.pem: |
-    
+    

+ 1 - 1
kubernetes/templates/cm-and-secrets/nginx-https-svc.yml

@@ -16,4 +16,4 @@ spec:
     protocol: TCP
     name: https
   selector:
-    app: nginx-https
+    app: nginx-https

+ 1 - 1
kubernetes/templates/ingress.yaml

@@ -15,4 +15,4 @@ spec:
           service:
             name: your-service-name  # The name of the service
             port:
-              number: 80  # Service Portnumber
+              number: 80  # Service Portnumber

+ 1 - 1
kubernetes/templates/namespace.yml

@@ -1,4 +1,4 @@
 apiVersion: v1
 kind: Namespace
 metadata:
-  name: your-namespace
+  name: your-namespace

+ 1 - 1
kubernetes/templates/pv-and-pvc/civo-pvc.yml

@@ -8,4 +8,4 @@ spec:
   storageClassName: civo-volume
   resources:
     requests:
-      storage: 1Gi
+      storage: 1Gi

+ 1 - 1
kubernetes/templates/pv-and-pvc/civo-web.yml

@@ -24,4 +24,4 @@ spec:
       volumes:
       - name: civo
         persistentVolumeClaim:
-          claimName: civo
+          claimName: civo

+ 1 - 1
kubernetes/templates/pv-and-pvc/local-web.yml

@@ -24,4 +24,4 @@ spec:
       volumes:
       - name: local
         hostPath:
-          path: /var/nginxserver
+          path: /var/nginxserver

+ 1 - 1
kubernetes/templates/pv-and-pvc/nfs-pv.yml

@@ -10,4 +10,4 @@ spec:
   storageClassName: nfs
   nfs:
     server: 192.168.1.7
-    path: "/srv/nfs"
+    path: "/srv/nfs"

+ 1 - 1
kubernetes/templates/pv-and-pvc/nfs-pvc.yml

@@ -8,4 +8,4 @@ spec:
   storageClassName: nfs
   resources:
     requests:
-      storage: 100Mi
+      storage: 100Mi

+ 1 - 1
kubernetes/templates/service.yaml

@@ -29,4 +29,4 @@ spec:
   # - name:  http
   #   port:  80
   #   targetPort: 30001
-  #   protocol: TCP  # optional protocol
+  #   protocol: TCP  # optional protocol

+ 1 - 1
kubernetes/traefik/templates/ingress.yml

@@ -32,4 +32,4 @@ spec:
   # - hosts:
   #   - your-hostname.com  # Your hostname
   #   secretName: your-secret  # Your TLS Secret
-  # ---
+  # ---

+ 1 - 1
kubernetes/traefik/templates/ingressroutetcp.yml

@@ -18,4 +18,4 @@ spec:
   # (Optional) TLS Passthrough
   # tls:
   #   passthrough: true
-  # ---
+  # ---

+ 1 - 1
packer/proxmox/ubuntu-server-focal-docker/files/99-pve.cfg

@@ -1 +1 @@
-datasource_list: [ConfigDrive, NoCloud]
+datasource_list: [ConfigDrive, NoCloud]

+ 1 - 0
packer/proxmox/ubuntu-server-focal-docker/http/meta-data

@@ -0,0 +1 @@
+

+ 1 - 1
packer/proxmox/ubuntu-server-focal/files/99-pve.cfg

@@ -1 +1 @@
-datasource_list: [ConfigDrive, NoCloud]
+datasource_list: [ConfigDrive, NoCloud]

+ 1 - 0
packer/proxmox/ubuntu-server-focal/http/meta-data

@@ -0,0 +1 @@
+

+ 1 - 1
packer/proxmox/ubuntu-server-jammy-docker/files/99-pve.cfg

@@ -1 +1 @@
-datasource_list: [ConfigDrive, NoCloud]
+datasource_list: [ConfigDrive, NoCloud]

+ 1 - 0
packer/proxmox/ubuntu-server-jammy-docker/http/meta-data

@@ -0,0 +1 @@
+

+ 1 - 1
packer/proxmox/ubuntu-server-jammy/files/99-pve.cfg

@@ -1 +1 @@
-datasource_list: [ConfigDrive, NoCloud]
+datasource_list: [ConfigDrive, NoCloud]

+ 1 - 0
packer/proxmox/ubuntu-server-jammy/http/meta-data

@@ -0,0 +1 @@
+

+ 1 - 1
terraform/helm/traefik.tf

@@ -43,4 +43,4 @@ resource "helm_release" "traefik" {
         name  = "tlsOptions.default.minVersion"
         value = "VersionTLS12"
     }   
-}
+}

+ 1 - 1
terraform/kubectl/manifest.tf

@@ -4,4 +4,4 @@ resource "kubectl_manifest" "your-manifest-file" {
 # Put your Manifest-file Content right here...
 # ...
     YAML
-}
+}

+ 1 - 1
terraform/kubernetes/deployment.tf

@@ -38,4 +38,4 @@ resource "kubernetes_deployment" "your-deployment" {
             }
         }
     }
-}
+}

+ 1 - 1
terraform/kubernetes/ingress.tf

@@ -36,4 +36,4 @@ resource "kubernetes_ingress_v1" "your-ingress" {
         #     hosts = ["your-domain"]
         # }
     }
-}
+}

+ 1 - 1
terraform/kubernetes/secret.tf

@@ -12,4 +12,4 @@ resource "kubernetes_secret" "cloudflare_api_key_secret" {
     }
 
     type = "Opaque"
-}
+}

+ 1 - 1
terraform/kubernetes/service.tf

@@ -16,4 +16,4 @@ resource "kubernetes_service" "your-service" {
 
         type = "ClusterIP"
     }
-}
+}

+ 1 - 1
terraform/proxmox/credentials.auto.tfvars

@@ -1,3 +1,3 @@
 proxmox_api_url = "https://0.0.0.0:8006/api2/json"  # Your Proxmox IP Address
 proxmox_api_token_id = "terraform@pam!terraform"  # API Token ID
-proxmox_api_token_secret = "your-api-token-secret"
+proxmox_api_token_secret = "your-api-token-secret"

+ 1 - 1
terraform/proxmox/full-clone.tf

@@ -46,4 +46,4 @@ resource "proxmox_vm_qemu" "your-vm" {
     # sshkeys = <<EOF
     # #YOUR-PUBLIC-SSH-KEY
     # EOF
-}
+}

+ 1 - 1
terraform/templates/cloud-deployment-example/civo.tf

@@ -12,4 +12,4 @@ resource "civo_instance" "server" {
     # notes = "this is a note for the server"
     # initial_user = "user"
     # sshkey_id = data.civo_ssh_key.sshkey.id
-}
+}

+ 1 - 1
terraform/templates/cloud-deployment-example/main.tf

@@ -37,4 +37,4 @@ provider "civo" {
   token = var.civo_token
   # (optional) change the defaullt region
   # region = "FRA1"
-}
+}

+ 1 - 1
terraform/templates/kubernetes-automation-example/certmanager.tf

@@ -76,4 +76,4 @@ resource "time_sleep" "wait_for_clusterissuer" {
     ]
 
     create_duration = "30s"
-}
+}

+ 1 - 1
terraform/templates/kubernetes-automation-example/provider.tf

@@ -73,4 +73,4 @@ provider "kubectl" {
 provider "cloudflare" {
     email = var.cloudflare_email
     api_key = var.cloudflare_api_key
-}
+}

+ 1 - 1
terraform/templates/kubernetes-automation-example/traefik.tf

@@ -44,4 +44,4 @@ resource "helm_release" "traefik" {
         value = "true"
     }
 
-}
+}

+ 1 - 1
terraform/templates/simple-docker-example/main.tf

@@ -21,4 +21,4 @@ resource "docker_container" "nginx" {
     internal = 80
     external = 8000
   }
-}
+}

+ 1 - 1
vagrant/hyperv/ubuntu/ubuntu-cluster-plain/Vagrantfile

@@ -35,4 +35,4 @@ Vagrant.configure("2") do |config|
         end
     end
 
-end
+end