From 80c0a74f971873f5c03391ac6029ff36072ae9c4 Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Sat, 6 Dec 2025 18:02:02 +0000 Subject: [PATCH] chore: Update manifests after automerge --- ...ClusterRole-external-secrets-cert-controller.yaml | 4 ++-- .../ClusterRole-external-secrets-controller.yaml | 4 ++-- .../ClusterRole-external-secrets-edit.yaml | 4 ++-- ...ClusterRole-external-secrets-servicebindings.yaml | 4 ++-- .../ClusterRole-external-secrets-view.yaml | 4 ++-- ...RoleBinding-external-secrets-cert-controller.yaml | 4 ++-- ...usterRoleBinding-external-secrets-controller.yaml | 4 ++-- ...n-clusterexternalsecrets.external-secrets.io.yaml | 12 ++++++------ ...tergenerators.generators.external-secrets.io.yaml | 8 ++++++++ ...ition-clusterpushsecrets.external-secrets.io.yaml | 2 +- ...finition-externalsecrets.external-secrets.io.yaml | 12 ++++++------ ...ion-passwords.generators.external-secrets.io.yaml | 8 ++++++++ ...ceDefinition-pushsecrets.external-secrets.io.yaml | 2 +- .../Deployment-external-secrets-cert-controller.yaml | 10 +++++----- .../Deployment-external-secrets-webhook.yaml | 10 +++++----- .../Deployment-external-secrets.yaml | 10 +++++----- .../Role-external-secrets-leaderelection.yaml | 4 ++-- .../RoleBinding-external-secrets-leaderelection.yaml | 4 ++-- .../Secret-external-secrets-webhook.yaml | 4 ++-- .../Service-external-secrets-webhook.yaml | 4 ++-- ...viceAccount-external-secrets-cert-controller.yaml | 4 ++-- .../ServiceAccount-external-secrets-webhook.yaml | 4 ++-- .../ServiceAccount-external-secrets.yaml | 4 ++-- ...WebhookConfiguration-externalsecret-validate.yaml | 4 ++-- ...ingWebhookConfiguration-secretstore-validate.yaml | 4 ++-- 25 files changed, 77 insertions(+), 61 deletions(-) diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml index 3cc5fe3e4..38cd8de23 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml @@ -5,10 +5,10 @@ kind: ClusterRole metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml index 1e0cf6b79..72cfcc370 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml @@ -5,10 +5,10 @@ kind: ClusterRole metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml index 6c003806b..30a565a53 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml @@ -5,10 +5,10 @@ kind: ClusterRole metadata: name: external-secrets-edit labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml index 5c9099a0f..63d9ea1e5 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml index a183e24b3..bafd41dc6 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml @@ -5,10 +5,10 @@ kind: ClusterRole metadata: name: external-secrets-view labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml index e93ebde38..d6e81b163 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml @@ -5,10 +5,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml index c2374ff3d..d5b98be01 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml @@ -5,10 +5,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml index e3a330897..1b3b2326c 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml @@ -435,13 +435,13 @@ spec: type: object type: array refreshInterval: - default: 1h + default: 1h0m0s description: |- RefreshInterval is the amount of time before the values are read again from the SecretStore provider, specified as Golang Duration strings. Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h" - Example values: "1h", "2h30m", "10s" - May be set to zero to fetch and create it once. Defaults to 1h. + Example values: "1h0m0s", "2h30m0s", "10m0s" + May be set to "0s" to fetch and create it once. Defaults to 1h0m0s. type: string refreshPolicy: description: |- @@ -1195,13 +1195,13 @@ spec: type: object type: array refreshInterval: - default: 1h + default: 1h0m0s description: |- RefreshInterval is the amount of time before the values are read again from the SecretStore provider, specified as Golang Duration strings. Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h" - Example values: "1h", "2h30m", "10s" - May be set to zero to fetch and create it once. Defaults to 1h. + Example values: "1h0m0s", "2h30m0s", "10m0s" + May be set to "0s" to fetch and create it once. Defaults to 1h0m0s. type: string refreshPolicy: description: |- diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustergenerators.generators.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustergenerators.generators.external-secrets.io.yaml index 4211f2c37..ff3519138 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustergenerators.generators.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustergenerators.generators.external-secrets.io.yaml @@ -841,6 +841,14 @@ spec: default: false description: Set NoUpper to disable uppercase characters type: boolean + secretKeys: + description: |- + SecretKeys defines the keys that will be populated with generated passwords. + Defaults to "password" when not set. + items: + type: string + minItems: 1 + type: array symbolCharacters: description: |- SymbolCharacters specifies the special characters that should be used diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterpushsecrets.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterpushsecrets.external-secrets.io.yaml index 11503da8f..ecdae4409 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterpushsecrets.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clusterpushsecrets.external-secrets.io.yaml @@ -174,7 +174,7 @@ spec: - None type: string refreshInterval: - default: 1h + default: 1h0m0s description: The Interval to which External Secrets will try to push a secret definition type: string secretStoreRefs: diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-externalsecrets.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-externalsecrets.external-secrets.io.yaml index 91ce69f2b..9da2cb04c 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-externalsecrets.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-externalsecrets.external-secrets.io.yaml @@ -420,13 +420,13 @@ spec: type: object type: array refreshInterval: - default: 1h + default: 1h0m0s description: |- RefreshInterval is the amount of time before the values are read again from the SecretStore provider, specified as Golang Duration strings. Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h" - Example values: "1h", "2h30m", "10s" - May be set to zero to fetch and create it once. Defaults to 1h. + Example values: "1h0m0s", "2h30m0s", "10m0s" + May be set to "0s" to fetch and create it once. Defaults to 1h0m0s. type: string refreshPolicy: description: |- @@ -1065,13 +1065,13 @@ spec: type: object type: array refreshInterval: - default: 1h + default: 1h0m0s description: |- RefreshInterval is the amount of time before the values are read again from the SecretStore provider, specified as Golang Duration strings. Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h" - Example values: "1h", "2h30m", "10s" - May be set to zero to fetch and create it once. Defaults to 1h. + Example values: "1h0m0s", "2h30m0s", "10m0s" + May be set to "0s" to fetch and create it once. Defaults to 1h0m0s. type: string refreshPolicy: description: |- diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-passwords.generators.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-passwords.generators.external-secrets.io.yaml index a73dacd19..c5481489e 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-passwords.generators.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-passwords.generators.external-secrets.io.yaml @@ -84,6 +84,14 @@ spec: default: false description: Set NoUpper to disable uppercase characters type: boolean + secretKeys: + description: |- + SecretKeys defines the keys that will be populated with generated passwords. + Defaults to "password" when not set. + items: + type: string + minItems: 1 + type: array symbolCharacters: description: |- SymbolCharacters specifies the special characters that should be used diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-pushsecrets.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-pushsecrets.external-secrets.io.yaml index e6ae3398c..bdf0bd897 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-pushsecrets.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-pushsecrets.external-secrets.io.yaml @@ -103,7 +103,7 @@ spec: - None type: string refreshInterval: - default: 1h + default: 1h0m0s description: The Interval to which External Secrets will try to push a secret definition type: string secretStoreRefs: diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml index 0d778670a..46c1edd1d 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -21,10 +21,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller @@ -42,7 +42,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.1.0 + image: ghcr.io/external-secrets/external-secrets:v1.1.1 imagePullPolicy: IfNotPresent args: - certcontroller diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml index 303038bc3..45431f64f 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -21,10 +21,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm spec: hostNetwork: false @@ -42,7 +42,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.1.0 + image: ghcr.io/external-secrets/external-secrets:v1.1.1 imagePullPolicy: IfNotPresent args: - webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml index 5891656ff..55c452e4a 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -21,10 +21,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets @@ -42,7 +42,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.1.0 + image: ghcr.io/external-secrets/external-secrets:v1.1.1 imagePullPolicy: IfNotPresent args: - --concurrent=1 diff --git a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml index 5010fbedf..0c00a48b4 100644 --- a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml index 3a50263aa..fe24b2410 100644 --- a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml index 8c21186b9..af32cf7cd 100644 --- a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml @@ -6,9 +6,9 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml index 6d61ac5ed..ccbf7b166 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml index 44055af56..d2d5be29b 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml @@ -6,8 +6,8 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml index 07e3e11ab..cbea74fdc 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml @@ -6,8 +6,8 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml index 285452cc1..b406c86b8 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml @@ -6,8 +6,8 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml index 7596695c1..343436329 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml @@ -5,10 +5,10 @@ kind: ValidatingWebhookConfiguration metadata: name: externalsecret-validate labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook webhooks: diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml index 7621a5815..66c1c23b9 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml @@ -5,10 +5,10 @@ kind: ValidatingWebhookConfiguration metadata: name: secretstore-validate labels: - helm.sh/chart: external-secrets-1.1.0 + helm.sh/chart: external-secrets-1.1.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.1.0" + app.kubernetes.io/version: "v1.1.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook webhooks: