Skip to content

Commit cb7d9fe

Browse files
committed
reviews
1 parent 8216e87 commit cb7d9fe

File tree

3 files changed

+3
-15
lines changed

3 files changed

+3
-15
lines changed

Documentation/resources.adoc

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,6 @@ $ curl -k -H "Authorization: Bearer $TOKEN" "https://$ROUTE/api/v2/alerts?filter
9292
# Access Alertmanager endpoints from within the cluster.
9393
$ curl -k -H "Authorization: Bearer $TOKEN" "https://alertmanager-main.openshift-monitoring:9094/api/v2/alerts?filter=alertname=Watchdog"
9494
----
95-
9695
+
9796
The following example exercises permissions granted by the `monitoring-alertmanager-edit` role. The binding commands must be run by a user with the necessary privileges.
9897
+
@@ -179,7 +178,6 @@ $ curl -k -X POST -f "https://alertmanager-main.openshift-monitoring:9092/api/v2
179178
"comment": "Silence test"
180179
}'
181180
----
182-
183181
+
184182
The following example exercises permissions granted by the `monitoring-edit` cluster role. The binding commands must be run by a user with the necessary privileges.
185183
+
@@ -270,7 +268,6 @@ $ curl -k -H "Authorization: Bearer $TOKEN" "https://$ROUTE/api/v1/query?query=u
270268
# Access Prometheus endpoints from within the cluster.
271269
$ curl -k -H "Authorization: Bearer $TOKEN" "https://prometheus-k8s.openshift-monitoring:9091/api/v1/query?query=up"
272270
----
273-
274271
+
275272
The following example exercises permissions granted by the `cluster-monitoring-metrics-api` role. The binding commands must be run by a user with the necessary privileges.
276273
+
@@ -344,7 +341,6 @@ $ curl -k -H "Authorization: Bearer $TOKEN" "https://$ROUTE/api/v1/query?query=u
344341
# Access Thanos Querier endpoints from within the cluster.
345342
$ curl -k -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9091/api/v1/query?query=up"
346343
----
347-
348344
+
349345
The following example exercises permissions granted by the `cluster-monitoring-metrics-api` role. The binding commands must be run by a user with the necessary privileges.
350346
+
@@ -410,7 +406,6 @@ $ TOKEN=$(oc create token thanos-client --namespace=test-thanos-querier-tenancy-
410406
$ curl -k -f -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9093/api/v1/rules?namespace=test-thanos-querier-tenancy-rules-monitoring-rules-edit"
411407
$ curl -k -f -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9093/api/v1/alerts?namespace=test-thanos-querier-tenancy-rules-monitoring-rules-edit"
412408
----
413-
414409
+
415410
The following example exercises permissions granted by the `monitoring-edit` cluster role. The binding commands must be run by a user with the necessary privileges.
416411
+
@@ -431,7 +426,6 @@ $ TOKEN=$(oc create token thanos-client --namespace=test-thanos-querier-tenancy-
431426
$ curl -k -f -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9093/api/v1/rules?namespace=test-thanos-querier-tenancy-rules-monitoring-edit"
432427
$ curl -k -f -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9093/api/v1/alerts?namespace=test-thanos-querier-tenancy-rules-monitoring-edit"
433428
----
434-
435429
+
436430
The following example exercises permissions granted by the `monitoring-rules-view` cluster role. The binding commands must be run by a user with the necessary privileges.
437431
+

Documentation/resources.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,6 @@ $ curl -k -H "Authorization: Bearer $TOKEN" "https://$ROUTE/api/v2/alerts?filter
7575
# Access Alertmanager endpoints from within the cluster.
7676
$ curl -k -H "Authorization: Bearer $TOKEN" "https://alertmanager-main.openshift-monitoring:9094/api/v2/alerts?filter=alertname=Watchdog"
7777
```
78-
7978
```
8079
# The following example exercises permissions granted by the `monitoring-alertmanager-edit` role. The binding commands must be run by a user with the necessary privileges.
8180
@@ -158,7 +157,6 @@ $ curl -k -X POST -f "https://alertmanager-main.openshift-monitoring:9092/api/v2
158157
"comment": "Silence test"
159158
}'
160159
```
161-
162160
```
163161
# The following example exercises permissions granted by the `monitoring-edit` cluster role. The binding commands must be run by a user with the necessary privileges.
164162
@@ -242,7 +240,6 @@ $ curl -k -H "Authorization: Bearer $TOKEN" "https://$ROUTE/api/v1/query?query=u
242240
# Access Prometheus endpoints from within the cluster.
243241
$ curl -k -H "Authorization: Bearer $TOKEN" "https://prometheus-k8s.openshift-monitoring:9091/api/v1/query?query=up"
244242
```
245-
246243
```
247244
# The following example exercises permissions granted by the `cluster-monitoring-metrics-api` role. The binding commands must be run by a user with the necessary privileges.
248245
@@ -310,7 +307,6 @@ $ curl -k -H "Authorization: Bearer $TOKEN" "https://$ROUTE/api/v1/query?query=u
310307
# Access Thanos Querier endpoints from within the cluster.
311308
$ curl -k -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9091/api/v1/query?query=up"
312309
```
313-
314310
```
315311
# The following example exercises permissions granted by the `cluster-monitoring-metrics-api` role. The binding commands must be run by a user with the necessary privileges.
316312
@@ -370,7 +366,6 @@ $ TOKEN=$(oc create token thanos-client --namespace=test-thanos-querier-tenancy-
370366
$ curl -k -f -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9093/api/v1/rules?namespace=test-thanos-querier-tenancy-rules-monitoring-rules-edit"
371367
$ curl -k -f -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9093/api/v1/alerts?namespace=test-thanos-querier-tenancy-rules-monitoring-rules-edit"
372368
```
373-
374369
```
375370
# The following example exercises permissions granted by the `monitoring-edit` cluster role. The binding commands must be run by a user with the necessary privileges.
376371
@@ -389,7 +384,6 @@ $ TOKEN=$(oc create token thanos-client --namespace=test-thanos-querier-tenancy-
389384
$ curl -k -f -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9093/api/v1/rules?namespace=test-thanos-querier-tenancy-rules-monitoring-edit"
390385
$ curl -k -f -H "Authorization: Bearer $TOKEN" "https://thanos-querier.openshift-monitoring:9093/api/v1/alerts?namespace=test-thanos-querier-tenancy-rules-monitoring-edit"
391386
```
392-
393387
```
394388
# The following example exercises permissions granted by the `monitoring-rules-view` cluster role. The binding commands must be run by a user with the necessary privileges.
395389

test/e2e/test_command/test_command.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ func (f markdownFormatter) formatTest(description, commands string) string {
8686
sb.WriteString("\n\n")
8787
sb.WriteString(commands)
8888
sb.WriteString("\n")
89-
sb.WriteString("```\n")
89+
sb.WriteString("```")
9090
return sb.String()
9191
}
9292

@@ -99,7 +99,7 @@ func (f asciidocFormatter) formatTest(description, commands string) string {
9999
sb.WriteString("\n+\n")
100100
sb.WriteString("[source,terminal]\n----\n")
101101
sb.WriteString(commands)
102-
sb.WriteString("\n----\n")
102+
sb.WriteString("\n----")
103103
return sb.String()
104104
}
105105

@@ -109,7 +109,7 @@ func (suite *Suite) format(f formatter) string {
109109
description, commands := t.parse()
110110
tests[i] = f.formatTest(description, formatCommands(commands))
111111
}
112-
return strings.Join(tests, "\n")
112+
return strings.Join(tests, "\n") + "\n"
113113
}
114114

115115
func (suite *Suite) StringMarkdown() string {

0 commit comments

Comments
 (0)