-
Notifications
You must be signed in to change notification settings - Fork 288
ROB-2586 allow disable svc account #1959
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
WalkthroughAdded conditional flags and wrapped RBAC templates so kubewatch and runner service-account related resources are emitted only when their respective Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~8 minutes
Pre-merge checks and finishing touches❌ Failed checks (1 inconclusive)
✅ Passed checks (2 passed)
✨ Finishing touches🧪 Generate unit tests (beta)
📜 Recent review detailsConfiguration used: CodeRabbit UI Review profile: CHILL Plan: Pro 📒 Files selected for processing (1)
🚧 Files skipped from review as they are similar to previous changes (1)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (3)
Tip 📝 Customizable high-level summaries are now available in beta!You can now customize how CodeRabbit generates the high-level summary in your pull requests — including its content, structure, tone, and formatting.
Example instruction:
Note: This feature is currently in beta for Pro-tier users, and pricing will be announced later. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (1)
helm/robusta/templates/forwarder-service-account.yaml (1)
1-1: Conditional service account creation properly implemented, but fix closing comment for consistency.The RBAC resource block is correctly wrapped with
.Values.kubewatch.createServiceAccount. However, the closing comment on line 139 uses the generic form# createServiceAccount, while the parallel runner template uses the more specific form# runner.createServiceAccount. Standardize the comment for better maintainability.Update line 139 to match the pattern used in runner-service-account.yaml:
-{{- end }} # createServiceAccount +{{- end }} # kubewatch.createServiceAccountAlso applies to: 139-139
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (3)
helm/robusta/templates/forwarder-service-account.yaml(2 hunks)helm/robusta/templates/runner-service-account.yaml(2 hunks)helm/robusta/values.yaml(2 hunks)
🧰 Additional context used
🪛 YAMLlint (1.37.1)
helm/robusta/templates/forwarder-service-account.yaml
[error] 1-1: syntax error: expected the node content, but found '-'
(syntax)
helm/robusta/templates/runner-service-account.yaml
[error] 1-1: syntax error: expected the node content, but found '-'
(syntax)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: run_tests
🔇 Additional comments (3)
helm/robusta/values.yaml (2)
660-661: Configuration flag properly positioned and defaults to backwards-compatible behavior.The new
createServiceAccount: trueflag for kubewatch is well-placed alongside the existingcustomServiceAccountfield, allowing users to either auto-create or specify a manually-managed service account.
701-702: Configuration flag properly positioned and defaults to backwards-compatible behavior.The new
createServiceAccount: trueflag for runner follows the same pattern as kubewatch, providing a clean opt-out mechanism for users managing RBAC externally.helm/robusta/templates/runner-service-account.yaml (1)
1-1: Conditional service account creation properly implemented.The entire RBAC resource block (ClusterRole, ServiceAccount, ClusterRoleBinding) is correctly wrapped with the
.Values.runner.createServiceAccountcondition. When set to false, users must either specify an existing service account viacustomServiceAccountor manage the RBAC resources externally.Verify that the runner deployment correctly handles the case when
createServiceAccount: falseby confirming that eithercustomServiceAccountis specified or the service account already exists in the target namespace.Also applies to: 376-376
No description provided.