Skip to content

Commit

Permalink
reformat code
Browse files Browse the repository at this point in the history
  • Loading branch information
maciaszczykm committed Dec 17, 2024
1 parent eb004c5 commit 6ddd426
Showing 1 changed file with 50 additions and 50 deletions.
100 changes: 50 additions & 50 deletions catalogs/data/dagster/helm/dagster.yaml.liquid
Original file line number Diff line number Diff line change
@@ -1,62 +1,62 @@
{% raw %}
{% assign imports_dagster_key = 'dagster-' | append: configuration.cluster %}
{ % assign imports_dagster_key = 'dagster-' | append: configuration.cluster % }
dagsterWebserver:
annotations:
security.plural.sh/oauth-env-secret: dagster-proxy-config
{% if configuration["basicAuth"] %}
security.plural.sh/htpasswd-secret: httpaswd-users
{% endif %}
labels:
security.plural.sh/inject-oauth-sidecar: "true"
annotations:
security.plural.sh/oauth-env-secret: dagster-proxy-config
{ % if configuration[ "basicAuth" ] % }
security.plural.sh/htpasswd-secret: httpaswd-users
{ % endif % }
labels:
security.plural.sh/inject-oauth-sidecar: "true"
postgresql:
enabled: false
postgresqlHost: {{ imports[imports_dagster_key].postgres_host }}
postgresqlUsername: dagster
postgresqlPassword: {{ imports[imports_dagster_key].postgres_password }}
postgresqlDatabase: dagster
postgresqlParams:
sslmode: require
enabled: false
postgresqlHost: { { imports[ imports_dagster_key ].postgres_host } }
postgresqlUsername: dagster
postgresqlPassword: { { imports[ imports_dagster_key ].postgres_password } }
postgresqlDatabase: dagster
postgresqlParams:
sslmode: require
computeLogManager:
type: S3ComputeLogManager
config:
s3ComputeLogManager:
bucket: {{ configuration.bucket }}
type: S3ComputeLogManager
config:
s3ComputeLogManager:
bucket: { { configuration.bucket } }
ingress:
enabled: true
ingressClassName: nginx
dagsterWebserver:
host: {{ configuration.hostname }}
tls:
enabled: true
secretName: dagster-tls
precedingPaths:
- path: /.*
pathType: ImplementationSpecific
serviceName: dagster-oauth2-proxy
servicePort: http-oauth
annotations:
kubernetes.io/tls-acme: "true"
cert-manager.io/cluster-issuer: letsencrypt-prod
# Extend timeout to allow long running queries.
nginx.ingress.kubernetes.io/proxy-connect-timeout: "300"
nginx.ingress.kubernetes.io/proxy-read-timeout: "300"
nginx.ingress.kubernetes.io/proxy-send-timeout: "300"
nginx.ingress.kubernetes.io/use-regex: "true"
enabled: true
ingressClassName: nginx
dagsterWebserver:
host: { { configuration.hostname } }
tls:
enabled: true
secretName: dagster-tls
precedingPaths:
- path: /.*
pathType: ImplementationSpecific
serviceName: dagster-oauth2-proxy
servicePort: http-oauth
annotations:
kubernetes.io/tls-acme: "true"
cert-manager.io/cluster-issuer: letsencrypt-prod
# Extend timeout to allow long running queries.
nginx.ingress.kubernetes.io/proxy-connect-timeout: "300"
nginx.ingress.kubernetes.io/proxy-read-timeout: "300"
nginx.ingress.kubernetes.io/proxy-send-timeout: "300"
nginx.ingress.kubernetes.io/use-regex: "true"
dagster-user-deployments:
enabled: true
deployments:
- name: "k8s-example-user-code-1"
image:
repository: "docker.io/dagster/user-code-example"
tag: latest
pullPolicy: Always
dagsterApiGrpcArgs:
- "--python-file"
- "/example_project/example_repo/repo.py"
port: 3030
enabled: true
deployments:
- name: "k8s-example-user-code-1"
image:
repository: "docker.io/dagster/user-code-example"
tag: latest
pullPolicy: Always
dagsterApiGrpcArgs:
- "--python-file"
- "/example_project/example_repo/repo.py"
port: 3030
{% endraw %}

0 comments on commit 6ddd426

Please sign in to comment.