Skip to content

Commit

Permalink
refactor: rename 'enable' to 'enabled' in the helm chart
Browse files Browse the repository at this point in the history
  • Loading branch information
Santiago Lo Coco committed Oct 25, 2024
1 parent f05f23c commit 648ae21
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion chart/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -88,7 +88,7 @@ Kubernetes native, multi-tenant synthetic monitoring system
| serviceAccount.name | string | `"canary-checker-sa"` | |
| serviceAccount.rbac.clusterRole | bool | `true` | whether to create cluster-wide or namespaced roles |
| serviceAccount.rbac.configmaps | bool | `true` | for secret management with valueFrom |
| serviceAccount.rbac.enable | bool | `true` | Install (Cluster)Role and RoleBinding for the ServiceAccount |
| serviceAccount.rbac.enabled | bool | `true` | Install (Cluster)Role and RoleBinding for the ServiceAccount |
| serviceAccount.rbac.exec | bool | `true` | |
| serviceAccount.rbac.ingressCreateAndDelete | bool | `true` | for pod canary |
| serviceAccount.rbac.namespaceCreateAndDelete | bool | `true` | for namespace canary |
Expand Down
2 changes: 1 addition & 1 deletion chart/templates/rbac.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{{- if .Values.serviceAccount.rbac.enable }}
{{- if .Values.serviceAccount.rbac.enabled }}
apiVersion: rbac.authorization.k8s.io/v1
kind: "{{if .Values.serviceAccount.rbac.clusterRole}}Cluster{{end}}Role"
metadata:
Expand Down
2 changes: 1 addition & 1 deletion chart/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -400,7 +400,7 @@ serviceAccount:
# default: true
# @schema
# -- Install (Cluster)Role and RoleBinding for the ServiceAccount
enable: true
enabled: true

# @schema
# required: false
Expand Down

0 comments on commit 648ae21

Please sign in to comment.