diff --git a/helm/sealed-secrets/values.yaml b/helm/sealed-secrets/values.yaml index 17844318c..bb0148dc7 100644 --- a/helm/sealed-secrets/values.yaml +++ b/helm/sealed-secrets/values.yaml @@ -56,7 +56,7 @@ secretName: "sealed-secrets-key" ## @param updateStatus Specifies whether the Sealed Secrets controller should update the status subresource ## updateStatus: true -## @param skip-recreate Specifies whether the Sealed Secrets controller should skip recreating removed secrets +## @param skipRecreate Specifies whether the Sealed Secrets controller should skip recreating removed secrets ## Setting it to false allows to optionally restore backward compatibility in low priviledge ## environments when old versions of the controller did not require watch permissions on secrets ## for secret re-creation. diff --git a/pkg/controller/controller_test.go b/pkg/controller/controller_test.go index 42bd017a1..c6e99d810 100644 --- a/pkg/controller/controller_test.go +++ b/pkg/controller/controller_test.go @@ -72,7 +72,7 @@ func TestDefaultConfigDoesNotSkipRecreate(t *testing.T) { } } -func TestSkipReleaseConfigDoesSkipIt(t *testing.T) { +func TestSkipRecreateConfigDoesSkipIt(t *testing.T) { ns := "some-namespace" var tweakopts func(*metav1.ListOptions) clientset := fake.NewSimpleClientset()