@@ -45,18 +45,18 @@ spec:
4545 apiVersion : kro.run/v1alpha1
4646 kind : EKSCRDGroup
4747 metadata :
48- name : ${spec.name}-crd-group
48+ name : ${schema. spec.name}-crd-group
4949 spec :
50- name : ${spec.name}-crd-group
50+ name : ${schema. spec.name}-crd-group
5151 - name : eksControllerIamPolicy
5252 template :
5353 apiVersion : iam.services.k8s.aws/v1alpha1
5454 kind : Policy
5555 metadata :
56- name : ${spec.name}-iam-policy
56+ name : ${schema. spec.name}-iam-policy
5757 spec :
58- name : ${spec.name}-iam-policy
59- description : ${spec.values.iamPolicy.description}
58+ name : ${schema. spec.name}-iam-policy
59+ description : ${schema. spec.values.iamPolicy.description}
6060 policyDocument : >
6161 {
6262 "Version": "2012-10-17",
@@ -80,23 +80,23 @@ spec:
8080 apiVersion : iam.services.k8s.aws/v1alpha1
8181 kind : Role
8282 metadata :
83- name : ${spec.name}-iam-role
84- namespace : ${spec.namespace}
83+ name : ${schema. spec.name}-iam-role
84+ namespace : ${schema. spec.namespace}
8585 spec :
86- name : ${spec.name}-iam-role
87- description : ${spec.values.iamRole.roleDescription}
88- maxSessionDuration : ${spec.values.iamRole.maxSessionDuration}
86+ name : ${schema. spec.name}-iam-role
87+ description : ${schema. spec.values.iamRole.roleDescription}
88+ maxSessionDuration : ${schema. spec.values.iamRole.maxSessionDuration}
8989 policies :
9090 - ${eksControllerIamPolicy.status.ackResourceMetadata.arn}
9191 assumeRolePolicyDocument : >
9292 {
9393 "Version":"2012-10-17",
9494 "Statement": [{
9595 "Effect":"Allow",
96- "Principal": {"Federated": "arn:aws:iam::${spec.values.aws.accountID}:oidc-provider/${spec.values.iamRole.oidcProvider}"},
96+ "Principal": {"Federated": "arn:aws:iam::${schema. spec.values.aws.accountID}:oidc-provider/${schema. spec.values.iamRole.oidcProvider}"},
9797 "Action": ["sts:AssumeRoleWithWebIdentity"],
9898 "Condition": {
99- "StringEquals": {"${spec.values.iamRole.oidcProvider}:sub": "system:serviceaccount:${spec.namespace}:${spec.values.serviceAccount.name}"}
99+ "StringEquals": {"${schema. spec.values.iamRole.oidcProvider}:sub": "system:serviceaccount:${schema. spec.namespace}:${schema. spec.values.serviceAccount.name}"}
100100 }
101101 }]
102102 }
@@ -105,75 +105,75 @@ spec:
105105 apiVersion : v1
106106 kind : ServiceAccount
107107 metadata :
108- name : ${spec.values.serviceAccount.name}
109- namespace : ${spec.namespace}
108+ name : ${schema. spec.values.serviceAccount.name}
109+ namespace : ${schema. spec.namespace}
110110 annotations :
111111 eks.amazonaws.com/role-arn : ${eksControllerIamRole.status.ackResourceMetadata.arn}
112112 - name : deployment
113113 template :
114114 apiVersion : apps/v1
115115 kind : Deployment
116116 metadata :
117- name : ${spec.name}-deployment
118- namespace : ${spec.namespace}
117+ name : ${schema. spec.name}-deployment
118+ namespace : ${schema. spec.namespace}
119119 labels :
120- app.kubernetes.io.name : ${spec.name}-deployment
121- app.kubernetes.io.instance : ${spec.name}
120+ app.kubernetes.io.name : ${schema. spec.name}-deployment
121+ app.kubernetes.io.instance : ${schema. spec.name}
122122 spec :
123- replicas : ${spec.values.deployment.replicas}
123+ replicas : ${schema. spec.values.deployment.replicas}
124124 selector :
125125 matchLabels :
126- app.kubernetes.io.name : ${spec.name}-deployment
127- app.kubernetes.io.instance : ${spec.name}
126+ app.kubernetes.io.name : ${schema. spec.name}-deployment
127+ app.kubernetes.io.instance : ${schema. spec.name}
128128 template :
129129 metadata :
130130 labels :
131- app.kubernetes.io.name : ${spec.name}-deployment
132- app.kubernetes.io.instance : ${spec.name}
131+ app.kubernetes.io.name : ${schema. spec.name}-deployment
132+ app.kubernetes.io.instance : ${schema. spec.name}
133133 spec :
134134 serviceAccountName : ${serviceAccount.metadata.name}
135135 containers :
136136 - command :
137137 - ./bin/controller
138138 args :
139139 - --aws-region
140- - ${spec.values.aws.region}
141- - --enable-development-logging=${spec.values.log.enabled}
140+ - ${schema. spec.values.aws.region}
141+ - --enable-development-logging=${schema. spec.values.log.enabled}
142142 - --log-level
143- - ${spec.values.log.level}
143+ - ${schema. spec.values.log.level}
144144 - --deletion-policy
145- - ${spec.values.image.deletePolicy}
145+ - ${schema. spec.values.image.deletePolicy}
146146 - --watch-namespace
147- - ${spec.namespace}
148- image : ${spec.values.image.repository}:${spec.values.image.tag}
147+ - ${schema. spec.namespace}
148+ image : ${schema. spec.values.image.repository}:${schema. spec.values.image.tag}
149149 name : controller
150150 ports :
151151 - name : http
152- containerPort : ${spec.values.deployment.containerPort}
152+ containerPort : ${schema. spec.values.deployment.containerPort}
153153 resources :
154154 requests :
155- memory : ${spec.values.image.resources.requests.memory}
156- cpu : ${spec.values.image.resources.requests.cpu}
155+ memory : ${schema. spec.values.image.resources.requests.memory}
156+ cpu : ${schema. spec.values.image.resources.requests.cpu}
157157 limits :
158- memory : ${spec.values.image.resources.limits.memory}
159- cpu : ${spec.values.image.resources.limits.cpu}
158+ memory : ${schema. spec.values.image.resources.limits.memory}
159+ cpu : ${schema. spec.values.image.resources.limits.cpu}
160160 env :
161161 - name : ACK_SYSTEM_NAMESPACE
162- value : ${spec.namespace}
162+ value : ${schema. spec.namespace}
163163 - name : AWS_REGION
164- value : ${spec.values.aws.region}
164+ value : ${schema. spec.values.aws.region}
165165 - name : DELETE_POLICY
166- value : ${spec.values.image.deletePolicy}
166+ value : ${schema. spec.values.image.deletePolicy}
167167 - name : ACK_LOG_LEVEL
168- value : ${spec.values.log.level}
168+ value : ${schema. spec.values.log.level}
169169 ports :
170170 - containerPort : 80
171171 - name : clusterRoleBinding
172172 template :
173173 apiVersion : rbac.authorization.k8s.io/v1
174174 kind : ClusterRoleBinding
175175 metadata :
176- name : ${spec.name}-clusterrolebinding
176+ name : ${schema. spec.name}-clusterrolebinding
177177 roleRef :
178178 kind : ClusterRole
179179 apiGroup : rbac.authorization.k8s.io
@@ -187,7 +187,7 @@ spec:
187187 apiVersion : rbac.authorization.k8s.io/v1
188188 kind : ClusterRole
189189 metadata :
190- name : ${spec.name}-clusterrole
190+ name : ${schema. spec.name}-clusterrole
191191 rules :
192192 - apiGroups :
193193 - " "
0 commit comments