Skip to content

Commit

Permalink
Apply suggestions from code review
Browse files Browse the repository at this point in the history
Co-authored-by: Alejandro Moreno <[email protected]>
Signed-off-by: josvaz <[email protected]>
  • Loading branch information
josvaz and alemorcuq authored Mar 6, 2023
1 parent 5325e94 commit a0344ee
Show file tree
Hide file tree
Showing 5 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion carvel/package.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ spec:
type: boolean
description: Specifies whether the Sealed Secrets controller should update the status subresource
default: true
skip-recreate:
skipRecreate:
type: boolean
description: Specifies whether the Sealed Secrets controller should skip recreating removed secrets
default: false
Expand Down
2 changes: 1 addition & 1 deletion helm/sealed-secrets/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ The command removes all the Kubernetes components associated with the chart and
| `createController` | Specifies whether the Sealed Secrets controller should be created | `true` |
| `secretName` | The name of an existing TLS secret containing the key used to encrypt secrets | `sealed-secrets-key` |
| `updateStatus` | Specifies whether the Sealed Secrets controller should update the status subresource | `true` |
| `skip-recreate` | Specifies whether the Sealed Secrets controller should skip recreating removed secrets | `false` |
| `skipRecreate` | Specifies whether the Sealed Secrets controller should skip recreating removed secrets | `false` |
| `keyrenewperiod` | Specifies key renewal period. Default 30 days | `""` |
| `rateLimit` | Number of allowed sustained request per second for verify endpoint | `""` |
| `rateLimitBurst` | Number of requests allowed to exceed the rate limit per second for verify endpoint | `""` |
Expand Down
2 changes: 1 addition & 1 deletion helm/sealed-secrets/templates/deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -70,7 +70,7 @@ spec:
{{- if .Values.updateStatus }}
- --update-status
{{- end }}
{{- if .Values.recreate }}
{{- if .Values.skipRecreate }}
- --skip-recreate
{{- end }}
{{- if .Values.keyrenewperiod }}
Expand Down
2 changes: 1 addition & 1 deletion helm/sealed-secrets/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ updateStatus: true
## environments when old versions of the controller did not require watch permissions on secrets
## for secret re-creation.
##
skip-recreate: false
skipRecreate: false
## @param keyrenewperiod Specifies key renewal period. Default 30 days
## e.g
## keyrenewperiod: "720h30m"
Expand Down
4 changes: 2 additions & 2 deletions pkg/controller/controller_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ func TestDefaultConfigDoesNotSkipRecreate(t *testing.T) {
var tweakopts func(*metav1.ListOptions)
clientset := fake.NewSimpleClientset()
ssc := ssfake.NewSimpleClientset()
sinformer := initSecretInformerFactory(clientset, ns, tweakopts, false /* skip-recreate */)
sinformer := initSecretInformerFactory(clientset, ns, tweakopts, false)
if sinformer == nil {
t.Fatalf("sinformer %v want non nil", sinformer)
}
Expand All @@ -77,7 +77,7 @@ func TestSkipReleaseConfigDoesSkipIt(t *testing.T) {
var tweakopts func(*metav1.ListOptions)
clientset := fake.NewSimpleClientset()
ssc := ssfake.NewSimpleClientset()
sinformer := initSecretInformerFactory(clientset, ns, tweakopts, true /* skip-recreate */)
sinformer := initSecretInformerFactory(clientset, ns, tweakopts, true)
if sinformer != nil {
t.Fatalf("sinformer %v want nil", sinformer)
}
Expand Down

0 comments on commit a0344ee

Please sign in to comment.