Skip to content

Commit 927eaca

Browse files
committed
Update helm-docs version and add PR action to ensure docs are updated
Use Helm-Docs container Helm-Docs Enforcement - Bump Chart Version
1 parent 5a7e7cf commit 927eaca

File tree

6 files changed

+23
-11
lines changed

6 files changed

+23
-11
lines changed

.github/workflows/pr.yaml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,5 +38,19 @@ jobs:
3838
uses: helm/[email protected]
3939
with:
4040
command: install
41+
helm-docs-validate:
42+
if: ${{ needs.changes.outputs.charts == 'true' }}
43+
name: Helm Docs
44+
needs:
45+
- changes
46+
runs-on: ubuntu-latest
47+
steps:
48+
- name: Checkout
49+
uses: actions/checkout@v2
50+
- name: Run helm-docs
51+
uses: docker://jnorwood/helm-docs:v1.3.0
52+
- name: Check for changes
53+
run: git diff --quiet charts/*/README.md
54+
4155
name: Lint and Test Charts
4256
on: pull_request

.pre-commit-config.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,6 @@ repos:
1010
rev: v0.1.9
1111
- hooks:
1212
- id: helm-docs
13+
files: (README\.md\.gotmpl|(Chart|requirements|values)\.yaml)$
1314
repo: https://github.com/norwoodj/helm-docs
14-
rev: v0.13.0
15+
rev: v1.3.0

charts/README.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,6 @@ $ pre-commit install
2727

2828
### Install hook dependencies
2929

30-
The pre-commit hooks themselves call binaries under the hood; they can be installed via the following command:
30+
The pre-commit hooks themselves call binaries under the hood; they can be installed via the [instructions found here](https://github.com/norwoodj/helm-docs#installation).
3131

32-
```shell
33-
$ brew install helm norwoodj/tap/helm-docs
34-
```
32+
Note: You should ensure that whichever installation method you are using you either install the same version of helm-docs as used in the PR workflow to ensure your PR passes CI checks or update the version used by the workflow to match.

charts/cluster-autoscaler-chart/Chart.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ name: cluster-autoscaler-chart
1717
sources:
1818
- https://github.com/kubernetes/autoscaler/tree/master/cluster-autoscaler
1919
type: application
20-
version: 1.0.4
20+
version: 1.0.5

charts/cluster-autoscaler-chart/README.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
1-
cluster-autoscaler-chart
2-
========================
1+
# cluster-autoscaler-chart
32

43
Scales Kubernetes worker nodes within autoscaling groups.
54

@@ -286,7 +285,7 @@ Containers:
286285

287286
Though enough for the majority of installations, the default PodSecurityPolicy _could_ be too restrictive depending on the specifics of your release. Please make sure to check that the template fits with any customizations made or disable it by setting `rbac.pspEnabled` to `false`.
288287

289-
## Chart Values
288+
## Values
290289

291290
| Key | Type | Default | Description |
292291
|-----|------|---------|-------------|
@@ -335,8 +334,8 @@ Though enough for the majority of installations, the default PodSecurityPolicy _
335334
| resources | object | `{}` | Pod resource requests and limits. |
336335
| securityContext | object | `{}` | [Security context for pod](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
337336
| service.annotations | object | `{}` | Annotations to add to service |
338-
| service.labels | object | `{}` | Labels to add to service |
339337
| service.externalIPs | list | `[]` | List of IP addresses at which the service is available. Ref: https://kubernetes.io/docs/user-guide/services/#external-ips. |
338+
| service.labels | object | `{}` | Labels to add to service |
340339
| service.loadBalancerIP | string | `""` | IP address to assign to load balancer (if supported). |
341340
| service.loadBalancerSourceRanges | list | `[]` | List of IP CIDRs allowed access to load balancer (if supported). |
342341
| service.portName | string | `"http"` | Name for service port. |

charts/cluster-autoscaler-chart/README.md.gotmpl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -252,7 +252,7 @@ For Kubernetes clusters that use Amazon EKS, the service account can be configur
252252

253253
In order to accomplish this, you will first need to create a new IAM role with the above mentions policies. Take care in [configuring the trust relationship](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts-technical-overview.html#iam-role-configuration) to restrict access just to the service account used by cluster autoscaler.
254254

255-
Once you have the IAM role configured, you would then need to `--set rbac.serviceAccountAnnotations."eks\.amazonaws\.com/role-arn"=arn:aws:iam::123456789012:role/MyRoleName` when installing.
255+
Once you have the IAM role configured, you would then need to `--set rbac.serviceAccount.annotations."eks\.amazonaws\.com/role-arn"=arn:aws:iam::123456789012:role/MyRoleName` when installing.
256256

257257
## Troubleshooting
258258

0 commit comments

Comments
 (0)