From 7e45422d0479856d4600923886f16361e7156da0 Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Fri, 20 Mar 2026 21:52:41 +0000 Subject: [PATCH] chore: Update manifests after change --- .../ClusterRole-external-secrets-cert-controller.yaml | 4 ++-- .../ClusterRole-external-secrets-controller.yaml | 4 ++-- .../ClusterRole-external-secrets-edit.yaml | 4 ++-- .../ClusterRole-external-secrets-servicebindings.yaml | 4 ++-- .../ClusterRole-external-secrets-view.yaml | 4 ++-- ...erRoleBinding-external-secrets-cert-controller.yaml | 4 ++-- ...ClusterRoleBinding-external-secrets-controller.yaml | 4 ++-- ...ion-clusterexternalsecrets.external-secrets.io.yaml | 3 +++ ...ustergenerators.generators.external-secrets.io.yaml | 2 ++ ...nition-clustersecretstores.external-secrets.io.yaml | 4 ++++ ...Definition-externalsecrets.external-secrets.io.yaml | 6 ++++++ ...urceDefinition-pushsecrets.external-secrets.io.yaml | 3 +++ ...rceDefinition-secretstores.external-secrets.io.yaml | 4 ++++ ...tdynamicsecrets.generators.external-secrets.io.yaml | 2 ++ .../Deployment-external-secrets-cert-controller.yaml | 10 +++++----- .../Deployment-external-secrets-webhook.yaml | 10 +++++----- .../external-secrets/Deployment-external-secrets.yaml | 10 +++++----- .../Role-external-secrets-leaderelection.yaml | 4 ++-- .../RoleBinding-external-secrets-leaderelection.yaml | 4 ++-- .../Secret-external-secrets-webhook.yaml | 4 ++-- .../Service-external-secrets-webhook.yaml | 4 ++-- ...erviceAccount-external-secrets-cert-controller.yaml | 4 ++-- .../ServiceAccount-external-secrets-webhook.yaml | 4 ++-- .../ServiceAccount-external-secrets.yaml | 4 ++-- ...ngWebhookConfiguration-externalsecret-validate.yaml | 4 ++-- ...atingWebhookConfiguration-secretstore-validate.yaml | 4 ++-- 26 files changed, 71 insertions(+), 47 deletions(-) diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml index a03a954cb..45b70f340 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml index 19c01958f..14023cd16 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml index 507173ddf..765dc8c05 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-edit labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml index 963a10577..23f2497c0 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml index b68383ce6..c0385f392 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-view labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml index 4680a14fd..de4bf02fb 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml index 6fb362f3d..35a1ae5ac 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml index e8f023db3..5a320b822 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml @@ -665,6 +665,7 @@ spec: namespaceSelector: description: |- The labels to select by to find the Namespaces to create the ExternalSecrets in. + Deprecated: Use NamespaceSelectors instead. properties: matchExpressions: @@ -761,6 +762,7 @@ spec: namespaces: description: |- Choose namespaces by name. This field is ORed with anything that NamespaceSelectors ends up choosing. + Deprecated: Use NamespaceSelectors instead. items: maxLength: 63 @@ -1494,6 +1496,7 @@ spec: namespaces: description: |- Choose namespaces by name. This field is ORed with anything that NamespaceSelectors ends up choosing. + Deprecated: Use NamespaceSelectors instead. items: maxLength: 63 diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustergenerators.generators.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustergenerators.generators.external-secrets.io.yaml index b7cd3fdbb..d5ab6967b 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustergenerators.generators.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustergenerators.generators.external-secrets.io.yaml @@ -1545,6 +1545,7 @@ spec: Optional audiences field that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. Defaults to a single audience `vault` it not specified. + Deprecated: use serviceAccountRef.Audiences instead items: type: string @@ -1554,6 +1555,7 @@ spec: Optional expiration time in seconds that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. + Deprecated: this will be removed in the future. Defaults to 10 minutes. format: int64 diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml index 53d9983ef..52e6c148d 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml @@ -4761,6 +4761,7 @@ spec: Optional audiences field that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. Defaults to a single audience `vault` it not specified. + Deprecated: use serviceAccountRef.Audiences instead items: type: string @@ -4770,6 +4771,7 @@ spec: Optional expiration time in seconds that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. + Deprecated: this will be removed in the future. Defaults to 10 minutes. format: int64 @@ -9105,6 +9107,7 @@ spec: Optional audiences field that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. Defaults to a single audience `vault` it not specified. + Deprecated: use serviceAccountRef.Audiences instead items: type: string @@ -9114,6 +9117,7 @@ spec: Optional expiration time in seconds that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. + Deprecated: this will be removed in the future. Defaults to 10 minutes. format: int64 diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-externalsecrets.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-externalsecrets.external-secrets.io.yaml index c1e4367a5..d23600b4a 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-externalsecrets.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-externalsecrets.external-secrets.io.yaml @@ -35,6 +35,9 @@ spec: - jsonPath: .status.conditions[?(@.type=="Ready")].status name: Ready type: string + - jsonPath: .status.refreshTime + name: Last Sync + type: date name: v1 schema: openAPIV3Schema: @@ -725,6 +728,9 @@ spec: - jsonPath: .status.conditions[?(@.type=="Ready")].status name: Ready type: string + - jsonPath: .status.refreshTime + name: Last Sync + type: date deprecated: true name: v1beta1 schema: diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-pushsecrets.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-pushsecrets.external-secrets.io.yaml index bc9d3e0fb..b31660da5 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-pushsecrets.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-pushsecrets.external-secrets.io.yaml @@ -26,6 +26,9 @@ spec: - jsonPath: .status.conditions[?(@.type=="Ready")].reason name: Status type: string + - jsonPath: .status.refreshTime + name: Last Sync + type: date name: v1alpha1 schema: openAPIV3Schema: diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml index c7bc2284d..59c4f5fa4 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml @@ -4761,6 +4761,7 @@ spec: Optional audiences field that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. Defaults to a single audience `vault` it not specified. + Deprecated: use serviceAccountRef.Audiences instead items: type: string @@ -4770,6 +4771,7 @@ spec: Optional expiration time in seconds that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. + Deprecated: this will be removed in the future. Defaults to 10 minutes. format: int64 @@ -9105,6 +9107,7 @@ spec: Optional audiences field that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. Defaults to a single audience `vault` it not specified. + Deprecated: use serviceAccountRef.Audiences instead items: type: string @@ -9114,6 +9117,7 @@ spec: Optional expiration time in seconds that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. + Deprecated: this will be removed in the future. Defaults to 10 minutes. format: int64 diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-vaultdynamicsecrets.generators.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-vaultdynamicsecrets.generators.external-secrets.io.yaml index a75518000..45a915c44 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-vaultdynamicsecrets.generators.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-vaultdynamicsecrets.generators.external-secrets.io.yaml @@ -501,6 +501,7 @@ spec: Optional audiences field that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. Defaults to a single audience `vault` it not specified. + Deprecated: use serviceAccountRef.Audiences instead items: type: string @@ -510,6 +511,7 @@ spec: Optional expiration time in seconds that will be used to request a temporary Kubernetes service account token for the service account referenced by `serviceAccountRef`. + Deprecated: this will be removed in the future. Defaults to 10 minutes. format: int64 diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml index bda84a7a6..204afb07d 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v2.1.0 + image: ghcr.io/external-secrets/external-secrets:v2.2.0 imagePullPolicy: IfNotPresent args: - certcontroller diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml index d7ea4d56a..d0a006a61 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm spec: hostNetwork: false @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v2.1.0 + image: ghcr.io/external-secrets/external-secrets:v2.2.0 imagePullPolicy: IfNotPresent args: - webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml index a9818a29a..b4e96b35f 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v2.1.0 + image: ghcr.io/external-secrets/external-secrets:v2.2.0 imagePullPolicy: IfNotPresent args: - --concurrent=1 diff --git a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml index 33d2f4dc9..d9d532fc5 100644 --- a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml index 5d1837b80..af6574e56 100644 --- a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml index 6b1e83242..3a64fd95a 100644 --- a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml @@ -4,9 +4,9 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml index 79c0a8eab..82909d5ef 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml index 51f8bae8f..7e790977a 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml index 815304736..ea7232f1f 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml index 819fe746f..5998eed21 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml index ba3e5e293..752518916 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml @@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration metadata: name: externalsecret-validate labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook webhooks: diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml index 320abd53a..8f476b6f3 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml @@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration metadata: name: secretstore-validate labels: - helm.sh/chart: external-secrets-2.1.0 + helm.sh/chart: external-secrets-2.2.0 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.1.0" + app.kubernetes.io/version: "v2.2.0" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook webhooks: