File tree 4 files changed +9
-9
lines changed
deploy/helm/hbase-operator/templates
4 files changed +9
-9
lines changed Original file line number Diff line number Diff line change 7
7
{{ (.Files.Glob "configs/*").AsConfig | indent 2 }}
8
8
kind : ConfigMap
9
9
metadata :
10
- name : {{ include "operator.fullname" . }}-configspec
10
+ name : {{ .Release.Name }}-configmap
11
11
labels :
12
12
{{- include "operator.labels" . | nindent 4 }}
Original file line number Diff line number Diff line change 5
5
apiVersion : apps/v1
6
6
kind : Deployment
7
7
metadata :
8
- name : {{ include "operator.fullname" . }}
8
+ name : {{ .Release.Name }}-deployment
9
9
labels :
10
10
{{- include "operator.labels" . | nindent 4 }}
11
11
spec :
29
29
imagePullSecrets :
30
30
{{- toYaml . | nindent 8 }}
31
31
{{- end }}
32
- serviceAccountName : {{ include "operator.serviceAccountName" . }}
32
+ serviceAccountName : {{ .Release.Name }}-serviceaccount
33
33
securityContext :
34
34
{{- toYaml .Values.podSecurityContext | nindent 8 }}
35
35
containers :
46
46
volumes :
47
47
- name : config-spec
48
48
configMap :
49
- name : {{ include "operator.fullname" . }}-configspec
49
+ name : {{ .Release.Name }}-configmap
50
50
{{- with .Values.nodeSelector }}
51
51
nodeSelector :
52
52
{{- toYaml . | nindent 8 }}
Original file line number Diff line number Diff line change 1
1
apiVersion : rbac.authorization.k8s.io/v1
2
2
kind : ClusterRole
3
3
metadata :
4
- name : {{ include "operator.name" . }}-operator
4
+ name : {{ .Release.Name }}-clusterrole
5
5
rules :
6
6
# For Apache ZooKeeper dependents
7
7
- apiGroups :
Original file line number Diff line number Diff line change 6
6
apiVersion : v1
7
7
kind : ServiceAccount
8
8
metadata :
9
- name : {{ include "operator.serviceAccountName" . }}
9
+ name : {{ .Release.Name }}-serviceaccount
10
10
labels :
11
11
{{- include "operator.labels" . | nindent 4 }}
12
12
{{- with .Values.serviceAccount.annotations }}
@@ -18,15 +18,15 @@ apiVersion: rbac.authorization.k8s.io/v1
18
18
# This cluster role binding allows anyone in the "manager" group to read secrets in any namespace.
19
19
kind : ClusterRoleBinding
20
20
metadata :
21
- name : {{ include "operator.serviceAccountName" . }}-rolebinding
21
+ name : {{ .Release.Name }}-clusterrolebinding
22
22
labels :
23
23
{{- include "operator.labels" . | nindent 4 }}
24
24
subjects :
25
25
- kind : ServiceAccount
26
- name : {{ include "operator.serviceAccountName" . }}
26
+ name : {{ .Release.Name }}-serviceaccount
27
27
namespace : {{ .Release.Namespace }}
28
28
roleRef :
29
29
kind : ClusterRole
30
- name : {{ include "operator.serviceAccountName" . }}
30
+ name : {{ .Release.Name }}-clusterrole
31
31
apiGroup : rbac.authorization.k8s.io
32
32
{{- end }}
You can’t perform that action at this time.
0 commit comments