Skip to content

Commit

Permalink
more naming cleanup
Browse files Browse the repository at this point in the history
  • Loading branch information
missylbytes committed Aug 8, 2023
1 parent eeea753 commit c75334c
Show file tree
Hide file tree
Showing 4 changed files with 11 additions and 11 deletions.
2 changes: 1 addition & 1 deletion charts/consul/templates/gateway-resources-job.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,7 @@ spec:
{{- if .Values.global.openshift.enabled }}
- -openshift-scc-name={{ .Values.connectInject.apiGateway.managedGatewayClass.openshiftSCCName }}
{{- end }}
- -mapPrivilegedContainerPorts={{ .Values.connectInject.apiGateway.managedGatewayClass.mapPrivilegedServicePorts }}
- -mapPrivilegedContainerPorts={{ .Values.connectInject.apiGateway.managedGatewayClass.mapPrivilegedContainerPorts }}
{{- end}}
resources:
requests:
Expand Down
2 changes: 1 addition & 1 deletion charts/consul/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2210,7 +2210,7 @@ connectInject:
# This is useful if you don't want to give your containers extra permissions to run privileged ports.
# Example: The gateway listener is defined on port 80, but the underlying value of the port on the container
# will be the 80 + the number defined below.
mapPrivilegedServicePorts: 0
mapPrivilegedContainerPorts: 0

# Configuration for the ServiceAccount created for the api-gateway component
serviceAccount:
Expand Down
2 changes: 1 addition & 1 deletion cli/helm/values.go
Original file line number Diff line number Diff line change
Expand Up @@ -582,7 +582,7 @@ type ManagedGatewayClass struct {
UseHostPorts bool `yaml:"useHostPorts"`
CopyAnnotations CopyAnnotations `yaml:"copyAnnotations"`
OpenshiftSCCName string `yaml:"openshiftSCCName"`
mapPrivilegedServicePorts int `yaml:"mapPrivilegedServicePorts"`
mapPrivilegedContainerPorts int `yaml:"mapPrivilegedContainerPorts"`
}

type Service struct {
Expand Down
16 changes: 8 additions & 8 deletions control-plane/api-gateway/common/helm_config.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,14 +22,14 @@ type HelmConfig struct {
EnableNamespaceMirroring bool
AuthMethod string
// LogLevel is the logging level of the deployed Consul Dataplanes.
LogLevel string
ConsulPartition string
LogJSON bool
TLSEnabled bool
PeeringEnabled bool
ConsulTLSServerName string
ConsulCACert string
ConsulConfig ConsulConfig
LogLevel string
ConsulPartition string
LogJSON bool
TLSEnabled bool
PeeringEnabled bool
ConsulTLSServerName string
ConsulCACert string
ConsulConfig ConsulConfig

// EnableOpenShift indicates whether we're deploying into an OpenShift environment
// and should create SecurityContextConstraints.
Expand Down

0 comments on commit c75334c

Please sign in to comment.