Skip to content
This repository was archived by the owner on Jun 18, 2025. It is now read-only.
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion templates/sync-workspace-deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ apiVersion: apps/v1
kind: Deployment
metadata:
name: {{ template "terraform.fullname" . }}-sync-workspace
namespace: {{ .Release.Namespace }}
namespace: {{ default .Release.Namespace .Values.global.namespace }}
labels:
app: {{ template "terraform.name" . }}
chart: {{ template "terraform.chart" . }}
Expand Down
3 changes: 2 additions & 1 deletion templates/sync-workspace-role.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,12 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: {{ $kind }}
metadata:
name: {{ template "terraform.fullname" . }}-sync-workspace
namespace: {{ default .Release.Namespace .Values.global.namespace }}
labels:
app: {{ template "terraform.name" . }}
chart: {{ template "terraform.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
release: {{ .Release.Name }}
rules:
- apiGroups:
- ""
Expand Down
3 changes: 2 additions & 1 deletion templates/sync-workspace-rolebinding.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,12 @@ apiVersion: rbac.authorization.k8s.io/v1
kind: {{ ternary "RoleBinding" "ClusterRoleBinding" (eq $kind "Role") }}
metadata:
name: {{ template "terraform.fullname" . }}-sync-workspace
namespace: {{ default .Release.Namespace .Values.global.namespace }}
labels:
app: {{ template "terraform.name" . }}
chart: {{ template "terraform.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
release: {{ .Release.Name }}
subjects:
- kind: ServiceAccount
name: {{ template "terraform.fullname" . }}-sync-workspace
Expand Down
2 changes: 1 addition & 1 deletion templates/sync-workspace-secret.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ apiVersion: v1
kind: Secret
metadata:
name: cacert
namespace: {{ .Release.Namespace }}
namespace: {{ default .Release.Namespace .Values.global.namespace }}
type: Opaque
data:
ca_file: |-
Expand Down
5 changes: 3 additions & 2 deletions templates/sync-workspace-serviceaccount.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,10 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: {{ template "terraform.fullname" . }}-sync-workspace
namespace: {{ default .Release.Namespace .Values.global.namespace }}
labels:
app: {{ template "terraform.name" . }}
chart: {{ template "terraform.chart" . }}
heritage: {{ .Release.Service }}
release: {{ .Release.Name }}
{{- end }}
release: {{ .Release.Name }}
{{- end }}
9 changes: 6 additions & 3 deletions values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,9 @@ global:
# opt-in is required, such as by setting `syncWorkspace.enabled` to true.
enabled: true

# Used to override Release.Namespace
namespace: null

# imageK8S is the name (and tag) of the terraform-k8s Docker image that
# is used for functionality such as workspace sync. This can be overridden
# per component.
Expand Down Expand Up @@ -50,12 +53,12 @@ syncWorkspace:
# logLevel: error

# Name and key of Kubernetes secret containing the Terraform CLI Configuration
# Must have Terraform Cloud Team API Token
# Must have Terraform Cloud Team API Token
terraformRC:
secretName: terraformrc
secretKey: credentials

# Name of Kubernetes secret containing keys and values of sensitive variables
# Name of Kubernetes secret containing keys and values of sensitive variables
sensitiveVariables:
secretName: workspacesecrets

Expand All @@ -69,7 +72,7 @@ tests:
# moduleSource: git::https://github.com/hashicorp/terraform-helm.git//test/module

# If the TFE instance the operator talks to is using a private CA then CACerts
# can be used to install a custom CA bundle in the operator's container that
# can be used to install a custom CA bundle in the operator's container that
# will allow it to communicate with TFE.
#
# CACerts can be set like this:
Expand Down