From 7634c1a15ff74d2c3e252268476e5d3fb22bc5ea Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Fri, 23 Jan 2026 20:35:12 +0000 Subject: [PATCH] chore: Update manifests after change --- ...Role-external-secrets-cert-controller.yaml | 4 +- ...usterRole-external-secrets-controller.yaml | 4 +- .../ClusterRole-external-secrets-edit.yaml | 4 +- ...Role-external-secrets-servicebindings.yaml | 4 +- .../ClusterRole-external-secrets-view.yaml | 4 +- ...ding-external-secrets-cert-controller.yaml | 4 +- ...leBinding-external-secrets-controller.yaml | 4 +- ...ustersecretstores.external-secrets.io.yaml | 111 ++++++++++++++++++ ...tion-secretstores.external-secrets.io.yaml | 111 ++++++++++++++++++ ...ment-external-secrets-cert-controller.yaml | 15 ++- .../Deployment-external-secrets-webhook.yaml | 15 ++- .../Deployment-external-secrets.yaml | 10 +- .../Role-external-secrets-leaderelection.yaml | 4 +- ...nding-external-secrets-leaderelection.yaml | 4 +- .../Secret-external-secrets-webhook.yaml | 4 +- .../Service-external-secrets-webhook.yaml | 4 +- ...ount-external-secrets-cert-controller.yaml | 4 +- ...rviceAccount-external-secrets-webhook.yaml | 4 +- .../ServiceAccount-external-secrets.yaml | 4 +- ...Configuration-externalsecret-validate.yaml | 4 +- ...ookConfiguration-secretstore-validate.yaml | 4 +- 21 files changed, 277 insertions(+), 49 deletions(-) diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml index 5bf6c649b..ca41b03b4 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml index d4aab0a48..e0daa0f70 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml index 417b1cb16..abb01b676 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-edit labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml index 0c085534e..5095fcd0f 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml index 40d6df2f0..da8b5b407 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-view labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml index d61e79b4a..783965f04 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml index 5d0b33012..3a9443632 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml index 694246788..a72695c74 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml @@ -1126,6 +1126,10 @@ spec: clientTimeOutSeconds: description: Timeout specifies a time limit for requests made by this Client. The timeout includes connection time, any redirects, and reading the response body. Defaults to 45 seconds. type: integer + decrypt: + default: true + description: 'When true, the response includes the decrypted password. When false, the password field is omitted. This option only applies to the SECRET retrieval type. Default: true.' + type: boolean retrievalType: description: The secret retrieval type. SECRET = Secrets Safe (credential, text, file). MANAGED_ACCOUNT = Password Safe account associated with a system. type: string @@ -1813,6 +1817,87 @@ spec: required: - auth type: object + dvls: + description: DVLS configures this store to sync secrets using Devolutions Server provider + properties: + auth: + description: Auth defines the authentication method to use. + properties: + secretRef: + description: SecretRef contains the Application ID and Application Secret for authentication. + properties: + appId: + description: AppID is the reference to the secret containing the Application ID. + properties: + key: + description: |- + A key in the referenced Secret. + Some instances of this field may be defaulted, in others it may be required. + maxLength: 253 + minLength: 1 + pattern: ^[-._a-zA-Z0-9]+$ + type: string + name: + description: The name of the Secret resource being referred to. + maxLength: 253 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + namespace: + description: |- + The namespace of the Secret resource being referred to. + Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + type: object + appSecret: + description: AppSecret is the reference to the secret containing the Application Secret. + properties: + key: + description: |- + A key in the referenced Secret. + Some instances of this field may be defaulted, in others it may be required. + maxLength: 253 + minLength: 1 + pattern: ^[-._a-zA-Z0-9]+$ + type: string + name: + description: The name of the Secret resource being referred to. + maxLength: 253 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + namespace: + description: |- + The namespace of the Secret resource being referred to. + Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + type: object + required: + - appId + - appSecret + type: object + required: + - secretRef + type: object + insecure: + description: |- + Insecure allows connecting to DVLS over plain HTTP. + This is NOT RECOMMENDED for production use. + Set to true only if you understand the security implications. + type: boolean + serverUrl: + description: ServerURL is the DVLS instance URL (e.g., https://dvls.example.com). + type: string + required: + - auth + - serverUrl + type: object fake: description: Fake configures a store with static key/value pairs properties: @@ -3586,6 +3671,28 @@ spec: required: - serviceAccountSecretRef type: object + cache: + description: |- + Cache configures client-side caching for read operations (GetSecret, GetSecretMap). + When enabled, secrets are cached with the specified TTL. + Write operations (PushSecret, DeleteSecret) automatically invalidate relevant cache entries. + If omitted, caching is disabled (default). + cache: {} is a valid option to set. + properties: + maxSize: + default: 100 + description: |- + MaxSize is the maximum number of secrets to cache. + When the cache is full, least-recently-used entries are evicted. + minimum: 1 + type: integer + ttl: + default: 5m + description: |- + TTL is the time-to-live for cached secrets. + Format: duration string (e.g., "5m", "1h", "30s") + type: string + type: object integrationInfo: description: |- IntegrationInfo specifies the name and version of the integration built using the 1Password Go SDK. @@ -6630,6 +6737,10 @@ spec: clientTimeOutSeconds: description: Timeout specifies a time limit for requests made by this Client. The timeout includes connection time, any redirects, and reading the response body. Defaults to 45 seconds. type: integer + decrypt: + default: true + description: 'When true, the response includes the decrypted password. When false, the password field is omitted. This option only applies to the SECRET retrieval type. Default: true.' + type: boolean retrievalType: description: The secret retrieval type. SECRET = Secrets Safe (credential, text, file). MANAGED_ACCOUNT = Password Safe account associated with a system. type: string diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml index 9da9f966b..dfa33f638 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml @@ -1126,6 +1126,10 @@ spec: clientTimeOutSeconds: description: Timeout specifies a time limit for requests made by this Client. The timeout includes connection time, any redirects, and reading the response body. Defaults to 45 seconds. type: integer + decrypt: + default: true + description: 'When true, the response includes the decrypted password. When false, the password field is omitted. This option only applies to the SECRET retrieval type. Default: true.' + type: boolean retrievalType: description: The secret retrieval type. SECRET = Secrets Safe (credential, text, file). MANAGED_ACCOUNT = Password Safe account associated with a system. type: string @@ -1813,6 +1817,87 @@ spec: required: - auth type: object + dvls: + description: DVLS configures this store to sync secrets using Devolutions Server provider + properties: + auth: + description: Auth defines the authentication method to use. + properties: + secretRef: + description: SecretRef contains the Application ID and Application Secret for authentication. + properties: + appId: + description: AppID is the reference to the secret containing the Application ID. + properties: + key: + description: |- + A key in the referenced Secret. + Some instances of this field may be defaulted, in others it may be required. + maxLength: 253 + minLength: 1 + pattern: ^[-._a-zA-Z0-9]+$ + type: string + name: + description: The name of the Secret resource being referred to. + maxLength: 253 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + namespace: + description: |- + The namespace of the Secret resource being referred to. + Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + type: object + appSecret: + description: AppSecret is the reference to the secret containing the Application Secret. + properties: + key: + description: |- + A key in the referenced Secret. + Some instances of this field may be defaulted, in others it may be required. + maxLength: 253 + minLength: 1 + pattern: ^[-._a-zA-Z0-9]+$ + type: string + name: + description: The name of the Secret resource being referred to. + maxLength: 253 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + namespace: + description: |- + The namespace of the Secret resource being referred to. + Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + type: object + required: + - appId + - appSecret + type: object + required: + - secretRef + type: object + insecure: + description: |- + Insecure allows connecting to DVLS over plain HTTP. + This is NOT RECOMMENDED for production use. + Set to true only if you understand the security implications. + type: boolean + serverUrl: + description: ServerURL is the DVLS instance URL (e.g., https://dvls.example.com). + type: string + required: + - auth + - serverUrl + type: object fake: description: Fake configures a store with static key/value pairs properties: @@ -3586,6 +3671,28 @@ spec: required: - serviceAccountSecretRef type: object + cache: + description: |- + Cache configures client-side caching for read operations (GetSecret, GetSecretMap). + When enabled, secrets are cached with the specified TTL. + Write operations (PushSecret, DeleteSecret) automatically invalidate relevant cache entries. + If omitted, caching is disabled (default). + cache: {} is a valid option to set. + properties: + maxSize: + default: 100 + description: |- + MaxSize is the maximum number of secrets to cache. + When the cache is full, least-recently-used entries are evicted. + minimum: 1 + type: integer + ttl: + default: 5m + description: |- + TTL is the time-to-live for cached secrets. + Format: duration string (e.g., "5m", "1h", "30s") + type: string + type: object integrationInfo: description: |- IntegrationInfo specifies the name and version of the integration built using the 1Password Go SDK. @@ -6630,6 +6737,10 @@ spec: clientTimeOutSeconds: description: Timeout specifies a time limit for requests made by this Client. The timeout includes connection time, any redirects, and reading the response body. Defaults to 45 seconds. type: integer + decrypt: + default: true + description: 'When true, the response includes the decrypted password. When false, the password field is omitted. This option only applies to the SECRET retrieval type. Default: true.' + type: boolean retrievalType: description: The secret retrieval type. SECRET = Secrets Safe (credential, text, file). MANAGED_ACCOUNT = Password Safe account associated with a system. type: string diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml index a267e6b47..dd6ddef39 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.2.1 + image: ghcr.io/external-secrets/external-secrets:v1.3.1 imagePullPolicy: IfNotPresent args: - certcontroller @@ -58,9 +58,12 @@ spec: - containerPort: 8080 protocol: TCP name: metrics + - containerPort: 8081 + protocol: TCP + name: ready readinessProbe: httpGet: - port: 8081 + port: ready path: /readyz initialDelaySeconds: 20 periodSeconds: 5 diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml index 2ed6dfa49..dcdaadeee 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm spec: hostNetwork: false @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.2.1 + image: ghcr.io/external-secrets/external-secrets:v1.3.1 imagePullPolicy: IfNotPresent args: - webhook @@ -59,9 +59,12 @@ spec: - containerPort: 10250 protocol: TCP name: webhook + - containerPort: 8081 + protocol: TCP + name: ready readinessProbe: httpGet: - port: 8081 + port: ready path: /readyz initialDelaySeconds: 20 periodSeconds: 5 diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml index 0c37415c4..290cf05e1 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.2.1 + image: ghcr.io/external-secrets/external-secrets:v1.3.1 imagePullPolicy: IfNotPresent args: - --concurrent=1 diff --git a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml index b70b38ccd..11bf7915a 100644 --- a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml index 8e045db99..0760937a6 100644 --- a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml index fb6bf6b0f..560a16001 100644 --- a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml @@ -4,9 +4,9 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml index 95fcd28d9..bfc38505c 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml index 8f7b625fb..10f211983 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml index b9bd81c96..f38e5ff5d 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml index e429f74c7..fd7511e6f 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml index 6cecbea77..bac026032 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml @@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration metadata: name: externalsecret-validate labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook webhooks: diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml index 2d27db1a2..4414478c1 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml @@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration metadata: name: secretstore-validate labels: - helm.sh/chart: external-secrets-1.2.1 + helm.sh/chart: external-secrets-1.3.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.1" + app.kubernetes.io/version: "v1.3.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook webhooks: