Automated Manifest Update (#4518)

This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow.

Reviewed-on: #4518
Co-authored-by: gitea-bot <gitea-bot@alexlebens.net>
Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #4518.
This commit is contained in:
2026-03-07 19:32:50 +00:00
committed by Alex Lebens
parent d3f1956b8b
commit 8b416ca2f7
21 changed files with 275 additions and 47 deletions

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-edit
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-servicebindings
labels:
servicebinding.io/controller: "true"
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-view
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -3308,6 +3308,120 @@ spec:
type: string
type: object
type: object
nebiusmysterybox:
description: NebiusMysterybox configures this store to sync secrets using NebiusMysterybox provider
properties:
apiDomain:
description: NebiusMysterybox API endpoint
type: string
auth:
description: Auth defines parameters to authenticate in MysteryBox
properties:
serviceAccountCredsSecretRef:
description: |-
ServiceAccountCreds references a Kubernetes Secret key that contains a JSON
document with service account credentials used to get an IAM token.
Expected JSON structure:
{
"subject-credentials": {
"alg": "RS256",
"private-key": "-----BEGIN PRIVATE KEY-----\n<private-key>\n-----END PRIVATE KEY-----\n",
"kid": "<public-key-id>",
"iss": "<issuer-service-account-id>",
"sub": "<subject-service-account-id>"
}
}
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
tokenSecretRef:
description: Token authenticates with Nebius Mysterybox by presenting a token.
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
type: object
x-kubernetes-validations:
- message: either serviceAccountCredsSecretRef or tokenSecretRef must be set
rule: has(self.serviceAccountCredsSecretRef) || has(self.tokenSecretRef)
caProvider:
description: The provider for the CA bundle to use to validate NebiusMysterybox server certificate.
properties:
certSecretRef:
description: |-
SecretKeySelector is a reference to a specific 'key' within a Secret resource.
In some instances, `key` is a required field.
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
type: object
required:
- apiDomain
- auth
type: object
ngrok:
description: Ngrok configures this store to sync secrets using the ngrok provider.
properties:

View File

@@ -3308,6 +3308,120 @@ spec:
type: string
type: object
type: object
nebiusmysterybox:
description: NebiusMysterybox configures this store to sync secrets using NebiusMysterybox provider
properties:
apiDomain:
description: NebiusMysterybox API endpoint
type: string
auth:
description: Auth defines parameters to authenticate in MysteryBox
properties:
serviceAccountCredsSecretRef:
description: |-
ServiceAccountCreds references a Kubernetes Secret key that contains a JSON
document with service account credentials used to get an IAM token.
Expected JSON structure:
{
"subject-credentials": {
"alg": "RS256",
"private-key": "-----BEGIN PRIVATE KEY-----\n<private-key>\n-----END PRIVATE KEY-----\n",
"kid": "<public-key-id>",
"iss": "<issuer-service-account-id>",
"sub": "<subject-service-account-id>"
}
}
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
tokenSecretRef:
description: Token authenticates with Nebius Mysterybox by presenting a token.
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
type: object
x-kubernetes-validations:
- message: either serviceAccountCredsSecretRef or tokenSecretRef must be set
rule: has(self.serviceAccountCredsSecretRef) || has(self.tokenSecretRef)
caProvider:
description: The provider for the CA bundle to use to validate NebiusMysterybox server certificate.
properties:
certSecretRef:
description: |-
SecretKeySelector is a reference to a specific 'key' within a Secret resource.
In some instances, `key` is a required field.
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
type: object
required:
- apiDomain
- auth
type: object
ngrok:
description: Ngrok configures this store to sync secrets using the ngrok provider.
properties:

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets-cert-controller
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.0.1
image: ghcr.io/external-secrets/external-secrets:v2.1.0
imagePullPolicy: IfNotPresent
args:
- certcontroller

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
spec:
hostNetwork: false
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.0.1
image: ghcr.io/external-secrets/external-secrets:v2.1.0
imagePullPolicy: IfNotPresent
args:
- webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.0.1
image: ghcr.io/external-secrets/external-secrets:v2.1.0
imagePullPolicy: IfNotPresent
args:
- --concurrent=1

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -4,9 +4,9 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
spec:

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: externalsecret-validate
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks:

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: secretstore-validate
labels:
helm.sh/chart: external-secrets-2.0.1
helm.sh/chart: external-secrets-2.1.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.0.1"
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks: