Skip to content

Commit

Permalink
Apply recommendations
Browse files Browse the repository at this point in the history
  • Loading branch information
mershad-manesh committed Nov 17, 2023
1 parent 72fb44c commit 061f03d
Show file tree
Hide file tree
Showing 7 changed files with 0 additions and 20 deletions.
1 change: 0 additions & 1 deletion minion/OpenShift_README.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ This documentation provides basic information on how to install Minion on Red Ha
6. Under Repository, select the newly created repository entry.
7. Click on Minion.
8. Make sure that the project name matches the name you set in step 2.
* Skip this step if you are setting “CreateNamespace” option to true.
9. Make the required modifications (for example, set the PostgreSQL information).
10. Click Create.
11. Wait for the pods to come up. This may take a few minutes.
Expand Down
1 change: 0 additions & 1 deletion minion/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ This template can be used to bring up a minion and connect it to a OpenNMS core.
| clusterRole | bool | `true` | |
| clusterRoleBinding | bool | `true` | |
| core.instanceID | string | `"monms"` | |
| createNamespace | bool | `false` | |
| imagePullSecrets | list | `[]` | |
| minion.configuration.ports.karaf.enabled | bool | `true` | |
| minion.configuration.ports.karaf.externalPort | int | `8201` | |
Expand Down
2 changes: 0 additions & 2 deletions minion/templates/minion.clusterrole.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
{{ $name :=(printf "system:openshift:scc:%s" (.Values.securitycontext).securitycontextconstraints.name) }}
{{- if and (eq (include "onOpenShift" .) "true") (.Values.clusterRole) }}
{{- if not (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" $name ) }}
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
Expand All @@ -15,4 +14,3 @@ rules:
resourceNames:
- {{ (.Values.securitycontext).securitycontextconstraints.name | quote }}
{{- end }}
{{- end }}
2 changes: 0 additions & 2 deletions minion/templates/minion.clusterrolebinding.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
{{ $name :=(printf "system:openshift:scc:%s" (.Values.securitycontext).securitycontextconstraints.name) }}
{{- if and (eq (include "onOpenShift" .) "true") (.Values.clusterRoleBinding) }}
{{- if not (lookup "rbac.authorization.k8s.io/v1" "ClusterRoleBinding" "" $name ) }}
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
Expand All @@ -14,4 +13,3 @@ roleRef:
kind: ClusterRole
name: {{ printf "system:openshift:scc:%s" (.Values.securitycontext).securitycontextconstraints.name | quote }}
{{- end }}
{{- end }}
7 changes: 0 additions & 7 deletions minion/templates/namespace.yaml

This file was deleted.

5 changes: 0 additions & 5 deletions minion/values.schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,6 @@
"$schema": "http://json-schema.org/schema#",
"type": "object",
"properties": {
"createNamespace": {
"type": "boolean",
"title": "Create Namespace",
"default": false
},
"imagePullSecrets": {
"type": "array",
"title": "Image Pull Secrets",
Expand Down
2 changes: 0 additions & 2 deletions minion/values.yaml
Original file line number Diff line number Diff line change
@@ -1,5 +1,3 @@
createNamespace: false # Whether to create the namespace for this deployment

# Red Hat OpenShift related settings for creating Cluster Role and Binding
clusterRole: true
clusterRoleBinding: true
Expand Down

0 comments on commit 061f03d

Please sign in to comment.