Skip to content
This repository has been archived by the owner on Jul 2, 2024. It is now read-only.

Commit

Permalink
Improve GH Action files (#100)
Browse files Browse the repository at this point in the history
  • Loading branch information
ruzickap authored Dec 20, 2021
1 parent 28b584f commit f3df99a
Show file tree
Hide file tree
Showing 6 changed files with 2,742 additions and 2,134 deletions.
10 changes: 1 addition & 9 deletions .github/workflows/periodic-broken-link-checks.yml
Original file line number Diff line number Diff line change
@@ -1,17 +1,9 @@
name: periodic-broken-link-checks

on:
workflow_dispatch:
schedule:
- cron: '8 8 * * 2'
pull_request:
types: [opened, synchronize]
paths:
- .github/workflows/periodic-broken-link-checks.yml
push:
branches:
- master
paths:
- .github/workflows/periodic-broken-link-checks.yml

jobs:
broken-link-checker:
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/vuepress-build-check-deploy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ jobs:
- name: Deploy
uses: peaceiris/actions-gh-pages@v3
if: ${{ github.event_name }} == 'push' && github.ref == 'refs/heads/master'
if: ${{ github.event_name == 'push' && github.ref == 'refs/heads/master' }}
with:
github_token: ${{ secrets.GITHUB_TOKEN }}
publish_dir: ./docs/.vuepress/dist
Expand Down
6 changes: 3 additions & 3 deletions docs/part-01/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ fi

## Configure AWS

Authorize to AWS using AWS CLI: [https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html)
Authorize to AWS using AWS CLI: [Configuring the AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html)

```bash
aws configure
Expand Down Expand Up @@ -103,7 +103,7 @@ Output:
{
"Policy": {
"PolicyName": "pruzicka-AmazonRoute53Domains-cert-manager",
"PolicyId": "ANPA36ZNO4Q4MTW5T5ZLX",
"PolicyId": "xxxxxxxxxxxxxxxxxxxx",
"Arn": "arn:aws:iam::822044714040:policy/pruzicka-AmazonRoute53Domains-cert-manager",
"Path": "/",
"DefaultVersionId": "v1",
Expand Down Expand Up @@ -134,7 +134,7 @@ Output:
"User": {
"Path": "/",
"UserName": "pruzicka-eks-cert-manager-route53",
"UserId": "AIDA36ZNO4Q4NSQJW6T7V",
"UserId": "xxxxxxxxxxxxxxxxxxxx",
"Arn": "arn:aws:iam::822044714040:user/pruzicka-eks-cert-manager-route53",
"CreateDate": "2019-06-05T11:16:59Z"
}
Expand Down
6 changes: 0 additions & 6 deletions docs/part-02/README.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,5 @@
# Install Helm

Helm Architecture:

![Helm Architecture](https://cdn.app.compendium.com/uploads/user/e7c690e8-6ff9-102a-ac6d-e4aebca50425/5a29c3c1-7c6b-41fa-8082-bdc8a36177c9/Image/c64c01d08df64f4420e81f962fd13a23/screen_shot_2018_09_11_at_4_48_19_pm.png
"Helm Architecture")
(blogs.oracle.com/cloudnative/helm-kubernetes-package-management)

Install [Helm](https://helm.sh/) binary:

```bash
Expand Down
4 changes: 2 additions & 2 deletions docs/part-07/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -209,8 +209,8 @@ Everything should be "green" - no vulnerability found:
![Scanned container image in Harbor UI](./harbor_scanned_container_image.png
"Scanned container image in Harbor UI")

Let's download popular web server [Nginx](https://nginx.com) based on Debian
Stretch from Docker Hub. The image is is one year old:
Let's download popular web server [Nginx](https://en.wikipedia.org/wiki/Nginx)
based on Debian Stretch from Docker Hub. The image is is one year old:
[https://hub.docker.com/_/nginx?tab=tags&page=5](https://hub.docker.com/_/nginx?tab=tags&page=5)

```bash
Expand Down
Loading

0 comments on commit f3df99a

Please sign in to comment.