chore: Update manifests after change
This commit is contained in:
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-cert-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-edit
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-servicebindings
|
||||
labels:
|
||||
servicebinding.io/controller: "true"
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-view
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: external-secrets-cert-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: external-secrets-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -665,6 +665,7 @@ spec:
|
||||
namespaceSelector:
|
||||
description: |-
|
||||
The labels to select by to find the Namespaces to create the ExternalSecrets in.
|
||||
|
||||
Deprecated: Use NamespaceSelectors instead.
|
||||
properties:
|
||||
matchExpressions:
|
||||
@@ -761,6 +762,7 @@ spec:
|
||||
namespaces:
|
||||
description: |-
|
||||
Choose namespaces by name. This field is ORed with anything that NamespaceSelectors ends up choosing.
|
||||
|
||||
Deprecated: Use NamespaceSelectors instead.
|
||||
items:
|
||||
maxLength: 63
|
||||
@@ -1494,6 +1496,7 @@ spec:
|
||||
namespaces:
|
||||
description: |-
|
||||
Choose namespaces by name. This field is ORed with anything that NamespaceSelectors ends up choosing.
|
||||
|
||||
Deprecated: Use NamespaceSelectors instead.
|
||||
items:
|
||||
maxLength: 63
|
||||
|
||||
@@ -1545,6 +1545,7 @@ spec:
|
||||
Optional audiences field that will be used to request a temporary Kubernetes service
|
||||
account token for the service account referenced by `serviceAccountRef`.
|
||||
Defaults to a single audience `vault` it not specified.
|
||||
|
||||
Deprecated: use serviceAccountRef.Audiences instead
|
||||
items:
|
||||
type: string
|
||||
@@ -1554,6 +1555,7 @@ spec:
|
||||
Optional expiration time in seconds that will be used to request a temporary
|
||||
Kubernetes service account token for the service account referenced by
|
||||
`serviceAccountRef`.
|
||||
|
||||
Deprecated: this will be removed in the future.
|
||||
Defaults to 10 minutes.
|
||||
format: int64
|
||||
|
||||
@@ -4761,6 +4761,7 @@ spec:
|
||||
Optional audiences field that will be used to request a temporary Kubernetes service
|
||||
account token for the service account referenced by `serviceAccountRef`.
|
||||
Defaults to a single audience `vault` it not specified.
|
||||
|
||||
Deprecated: use serviceAccountRef.Audiences instead
|
||||
items:
|
||||
type: string
|
||||
@@ -4770,6 +4771,7 @@ spec:
|
||||
Optional expiration time in seconds that will be used to request a temporary
|
||||
Kubernetes service account token for the service account referenced by
|
||||
`serviceAccountRef`.
|
||||
|
||||
Deprecated: this will be removed in the future.
|
||||
Defaults to 10 minutes.
|
||||
format: int64
|
||||
@@ -9105,6 +9107,7 @@ spec:
|
||||
Optional audiences field that will be used to request a temporary Kubernetes service
|
||||
account token for the service account referenced by `serviceAccountRef`.
|
||||
Defaults to a single audience `vault` it not specified.
|
||||
|
||||
Deprecated: use serviceAccountRef.Audiences instead
|
||||
items:
|
||||
type: string
|
||||
@@ -9114,6 +9117,7 @@ spec:
|
||||
Optional expiration time in seconds that will be used to request a temporary
|
||||
Kubernetes service account token for the service account referenced by
|
||||
`serviceAccountRef`.
|
||||
|
||||
Deprecated: this will be removed in the future.
|
||||
Defaults to 10 minutes.
|
||||
format: int64
|
||||
|
||||
@@ -35,6 +35,9 @@ spec:
|
||||
- jsonPath: .status.conditions[?(@.type=="Ready")].status
|
||||
name: Ready
|
||||
type: string
|
||||
- jsonPath: .status.refreshTime
|
||||
name: Last Sync
|
||||
type: date
|
||||
name: v1
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
@@ -725,6 +728,9 @@ spec:
|
||||
- jsonPath: .status.conditions[?(@.type=="Ready")].status
|
||||
name: Ready
|
||||
type: string
|
||||
- jsonPath: .status.refreshTime
|
||||
name: Last Sync
|
||||
type: date
|
||||
deprecated: true
|
||||
name: v1beta1
|
||||
schema:
|
||||
|
||||
@@ -26,6 +26,9 @@ spec:
|
||||
- jsonPath: .status.conditions[?(@.type=="Ready")].reason
|
||||
name: Status
|
||||
type: string
|
||||
- jsonPath: .status.refreshTime
|
||||
name: Last Sync
|
||||
type: date
|
||||
name: v1alpha1
|
||||
schema:
|
||||
openAPIV3Schema:
|
||||
|
||||
@@ -4761,6 +4761,7 @@ spec:
|
||||
Optional audiences field that will be used to request a temporary Kubernetes service
|
||||
account token for the service account referenced by `serviceAccountRef`.
|
||||
Defaults to a single audience `vault` it not specified.
|
||||
|
||||
Deprecated: use serviceAccountRef.Audiences instead
|
||||
items:
|
||||
type: string
|
||||
@@ -4770,6 +4771,7 @@ spec:
|
||||
Optional expiration time in seconds that will be used to request a temporary
|
||||
Kubernetes service account token for the service account referenced by
|
||||
`serviceAccountRef`.
|
||||
|
||||
Deprecated: this will be removed in the future.
|
||||
Defaults to 10 minutes.
|
||||
format: int64
|
||||
@@ -9105,6 +9107,7 @@ spec:
|
||||
Optional audiences field that will be used to request a temporary Kubernetes service
|
||||
account token for the service account referenced by `serviceAccountRef`.
|
||||
Defaults to a single audience `vault` it not specified.
|
||||
|
||||
Deprecated: use serviceAccountRef.Audiences instead
|
||||
items:
|
||||
type: string
|
||||
@@ -9114,6 +9117,7 @@ spec:
|
||||
Optional expiration time in seconds that will be used to request a temporary
|
||||
Kubernetes service account token for the service account referenced by
|
||||
`serviceAccountRef`.
|
||||
|
||||
Deprecated: this will be removed in the future.
|
||||
Defaults to 10 minutes.
|
||||
format: int64
|
||||
|
||||
@@ -501,6 +501,7 @@ spec:
|
||||
Optional audiences field that will be used to request a temporary Kubernetes service
|
||||
account token for the service account referenced by `serviceAccountRef`.
|
||||
Defaults to a single audience `vault` it not specified.
|
||||
|
||||
Deprecated: use serviceAccountRef.Audiences instead
|
||||
items:
|
||||
type: string
|
||||
@@ -510,6 +511,7 @@ spec:
|
||||
Optional expiration time in seconds that will be used to request a temporary
|
||||
Kubernetes service account token for the service account referenced by
|
||||
`serviceAccountRef`.
|
||||
|
||||
Deprecated: this will be removed in the future.
|
||||
Defaults to 10 minutes.
|
||||
format: int64
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-cert-controller
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
serviceAccountName: external-secrets-cert-controller
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.1.0
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.2.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- certcontroller
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
hostNetwork: false
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.1.0
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.2.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- webhook
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
serviceAccountName: external-secrets
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.1.0
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.2.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- --concurrent=1
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-leaderelection
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-leaderelection
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -4,9 +4,9 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
spec:
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets-cert-controller
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
|
||||
metadata:
|
||||
name: externalsecret-validate
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
webhooks:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
|
||||
metadata:
|
||||
name: secretstore-validate
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-2.1.0
|
||||
helm.sh/chart: external-secrets-2.2.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v2.1.0"
|
||||
app.kubernetes.io/version: "v2.2.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
webhooks:
|
||||
|
||||
Reference in New Issue
Block a user