diff --git a/deploy/helm/commons-operator/templates/configmap.yaml b/deploy/helm/commons-operator/templates/configmap.yaml index 7fa8613..e75acc2 100644 --- a/deploy/helm/commons-operator/templates/configmap.yaml +++ b/deploy/helm/commons-operator/templates/configmap.yaml @@ -4,6 +4,6 @@ data: {{ (.Files.Glob "configs/*").AsConfig | indent 2 }} kind: ConfigMap metadata: - name: {{ .Release.Name }}-configmap + name: {{ include "operator.fullname" . }}-configmap labels: {{- include "operator.labels" . | nindent 4 }} diff --git a/deploy/helm/commons-operator/templates/deployment.yaml b/deploy/helm/commons-operator/templates/deployment.yaml index 90a210d..44bfa1c 100644 --- a/deploy/helm/commons-operator/templates/deployment.yaml +++ b/deploy/helm/commons-operator/templates/deployment.yaml @@ -2,7 +2,7 @@ apiVersion: apps/v1 kind: Deployment metadata: - name: {{ .Release.Name }}-deployment + name: {{ include "operator.fullname" . }}-deployment labels: {{- include "operator.labels" . | nindent 4 }} spec: @@ -26,7 +26,7 @@ spec: imagePullSecrets: {{- toYaml . | nindent 8 }} {{- end }} - serviceAccountName: {{ .Release.Name }}-serviceaccount + serviceAccountName: {{ include "operator.fullname" . }}-serviceaccount securityContext: {{- toYaml .Values.podSecurityContext | nindent 8 }} containers: @@ -43,7 +43,7 @@ spec: volumes: - name: config-spec configMap: - name: {{ .Release.Name }}-configmap + name: {{ include "operator.fullname" . }}-configmap {{- with .Values.nodeSelector }} nodeSelector: {{- toYaml . | nindent 8 }} diff --git a/deploy/helm/commons-operator/templates/serviceaccount.yaml b/deploy/helm/commons-operator/templates/serviceaccount.yaml index ff2b7f8..8ba0d58 100644 --- a/deploy/helm/commons-operator/templates/serviceaccount.yaml +++ b/deploy/helm/commons-operator/templates/serviceaccount.yaml @@ -3,7 +3,7 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: {{ .Release.Name }}-serviceaccount + name: {{ include "operator.fullname" . }}-serviceaccount labels: {{- include "operator.labels" . | nindent 4 }} {{- with .Values.serviceAccount.annotations }} @@ -15,15 +15,15 @@ apiVersion: rbac.authorization.k8s.io/v1 # This cluster role binding allows anyone in the "manager" group to read secrets in any namespace. kind: ClusterRoleBinding metadata: - name: {{ .Release.Name }}-clusterrolebinding + name: {{ include "operator.fullname" . }}-clusterrolebinding labels: {{- include "operator.labels" . | nindent 4 }} subjects: - kind: ServiceAccount - name: {{ .Release.Name }}-serviceaccount + name: {{ include "operator.fullname" . }}-serviceaccount namespace: {{ .Release.Namespace }} roleRef: kind: ClusterRole - name: {{ .Release.Name }}-clusterrole + name: {{ include "operator.fullname" . }}-clusterrole apiGroup: rbac.authorization.k8s.io {{- end }}