Automated Manifest Update (#4518)
This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow. Reviewed-on: #4518 Co-authored-by: gitea-bot <gitea-bot@alexlebens.net> Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #4518.
This commit is contained in:
@@ -3,10 +3,10 @@ kind: ClusterRole
|
|||||||
metadata:
|
metadata:
|
||||||
name: external-secrets-cert-controller
|
name: external-secrets-cert-controller
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-cert-controller
|
app.kubernetes.io/name: external-secrets-cert-controller
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
rules:
|
rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|||||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
|||||||
metadata:
|
metadata:
|
||||||
name: external-secrets-controller
|
name: external-secrets-controller
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
rules:
|
rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|||||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
|||||||
metadata:
|
metadata:
|
||||||
name: external-secrets-edit
|
name: external-secrets-edit
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||||
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
||||||
|
|||||||
@@ -4,10 +4,10 @@ metadata:
|
|||||||
name: external-secrets-servicebindings
|
name: external-secrets-servicebindings
|
||||||
labels:
|
labels:
|
||||||
servicebinding.io/controller: "true"
|
servicebinding.io/controller: "true"
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
rules:
|
rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|||||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
|||||||
metadata:
|
metadata:
|
||||||
name: external-secrets-view
|
name: external-secrets-view
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
||||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||||
|
|||||||
@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
|
|||||||
metadata:
|
metadata:
|
||||||
name: external-secrets-cert-controller
|
name: external-secrets-cert-controller
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-cert-controller
|
app.kubernetes.io/name: external-secrets-cert-controller
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
|||||||
@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
|
|||||||
metadata:
|
metadata:
|
||||||
name: external-secrets-controller
|
name: external-secrets-controller
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
|||||||
@@ -3308,6 +3308,120 @@ spec:
|
|||||||
type: string
|
type: string
|
||||||
type: object
|
type: object
|
||||||
type: object
|
type: object
|
||||||
|
nebiusmysterybox:
|
||||||
|
description: NebiusMysterybox configures this store to sync secrets using NebiusMysterybox provider
|
||||||
|
properties:
|
||||||
|
apiDomain:
|
||||||
|
description: NebiusMysterybox API endpoint
|
||||||
|
type: string
|
||||||
|
auth:
|
||||||
|
description: Auth defines parameters to authenticate in MysteryBox
|
||||||
|
properties:
|
||||||
|
serviceAccountCredsSecretRef:
|
||||||
|
description: |-
|
||||||
|
ServiceAccountCreds references a Kubernetes Secret key that contains a JSON
|
||||||
|
document with service account credentials used to get an IAM token.
|
||||||
|
|
||||||
|
Expected JSON structure:
|
||||||
|
{
|
||||||
|
"subject-credentials": {
|
||||||
|
"alg": "RS256",
|
||||||
|
"private-key": "-----BEGIN PRIVATE KEY-----\n<private-key>\n-----END PRIVATE KEY-----\n",
|
||||||
|
"kid": "<public-key-id>",
|
||||||
|
"iss": "<issuer-service-account-id>",
|
||||||
|
"sub": "<subject-service-account-id>"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
properties:
|
||||||
|
key:
|
||||||
|
description: |-
|
||||||
|
A key in the referenced Secret.
|
||||||
|
Some instances of this field may be defaulted, in others it may be required.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[-._a-zA-Z0-9]+$
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: The name of the Secret resource being referred to.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: |-
|
||||||
|
The namespace of the Secret resource being referred to.
|
||||||
|
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||||
|
maxLength: 63
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
tokenSecretRef:
|
||||||
|
description: Token authenticates with Nebius Mysterybox by presenting a token.
|
||||||
|
properties:
|
||||||
|
key:
|
||||||
|
description: |-
|
||||||
|
A key in the referenced Secret.
|
||||||
|
Some instances of this field may be defaulted, in others it may be required.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[-._a-zA-Z0-9]+$
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: The name of the Secret resource being referred to.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: |-
|
||||||
|
The namespace of the Secret resource being referred to.
|
||||||
|
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||||
|
maxLength: 63
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
x-kubernetes-validations:
|
||||||
|
- message: either serviceAccountCredsSecretRef or tokenSecretRef must be set
|
||||||
|
rule: has(self.serviceAccountCredsSecretRef) || has(self.tokenSecretRef)
|
||||||
|
caProvider:
|
||||||
|
description: The provider for the CA bundle to use to validate NebiusMysterybox server certificate.
|
||||||
|
properties:
|
||||||
|
certSecretRef:
|
||||||
|
description: |-
|
||||||
|
SecretKeySelector is a reference to a specific 'key' within a Secret resource.
|
||||||
|
In some instances, `key` is a required field.
|
||||||
|
properties:
|
||||||
|
key:
|
||||||
|
description: |-
|
||||||
|
A key in the referenced Secret.
|
||||||
|
Some instances of this field may be defaulted, in others it may be required.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[-._a-zA-Z0-9]+$
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: The name of the Secret resource being referred to.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: |-
|
||||||
|
The namespace of the Secret resource being referred to.
|
||||||
|
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||||
|
maxLength: 63
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- apiDomain
|
||||||
|
- auth
|
||||||
|
type: object
|
||||||
ngrok:
|
ngrok:
|
||||||
description: Ngrok configures this store to sync secrets using the ngrok provider.
|
description: Ngrok configures this store to sync secrets using the ngrok provider.
|
||||||
properties:
|
properties:
|
||||||
|
|||||||
@@ -3308,6 +3308,120 @@ spec:
|
|||||||
type: string
|
type: string
|
||||||
type: object
|
type: object
|
||||||
type: object
|
type: object
|
||||||
|
nebiusmysterybox:
|
||||||
|
description: NebiusMysterybox configures this store to sync secrets using NebiusMysterybox provider
|
||||||
|
properties:
|
||||||
|
apiDomain:
|
||||||
|
description: NebiusMysterybox API endpoint
|
||||||
|
type: string
|
||||||
|
auth:
|
||||||
|
description: Auth defines parameters to authenticate in MysteryBox
|
||||||
|
properties:
|
||||||
|
serviceAccountCredsSecretRef:
|
||||||
|
description: |-
|
||||||
|
ServiceAccountCreds references a Kubernetes Secret key that contains a JSON
|
||||||
|
document with service account credentials used to get an IAM token.
|
||||||
|
|
||||||
|
Expected JSON structure:
|
||||||
|
{
|
||||||
|
"subject-credentials": {
|
||||||
|
"alg": "RS256",
|
||||||
|
"private-key": "-----BEGIN PRIVATE KEY-----\n<private-key>\n-----END PRIVATE KEY-----\n",
|
||||||
|
"kid": "<public-key-id>",
|
||||||
|
"iss": "<issuer-service-account-id>",
|
||||||
|
"sub": "<subject-service-account-id>"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
properties:
|
||||||
|
key:
|
||||||
|
description: |-
|
||||||
|
A key in the referenced Secret.
|
||||||
|
Some instances of this field may be defaulted, in others it may be required.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[-._a-zA-Z0-9]+$
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: The name of the Secret resource being referred to.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: |-
|
||||||
|
The namespace of the Secret resource being referred to.
|
||||||
|
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||||
|
maxLength: 63
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
tokenSecretRef:
|
||||||
|
description: Token authenticates with Nebius Mysterybox by presenting a token.
|
||||||
|
properties:
|
||||||
|
key:
|
||||||
|
description: |-
|
||||||
|
A key in the referenced Secret.
|
||||||
|
Some instances of this field may be defaulted, in others it may be required.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[-._a-zA-Z0-9]+$
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: The name of the Secret resource being referred to.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: |-
|
||||||
|
The namespace of the Secret resource being referred to.
|
||||||
|
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||||
|
maxLength: 63
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
x-kubernetes-validations:
|
||||||
|
- message: either serviceAccountCredsSecretRef or tokenSecretRef must be set
|
||||||
|
rule: has(self.serviceAccountCredsSecretRef) || has(self.tokenSecretRef)
|
||||||
|
caProvider:
|
||||||
|
description: The provider for the CA bundle to use to validate NebiusMysterybox server certificate.
|
||||||
|
properties:
|
||||||
|
certSecretRef:
|
||||||
|
description: |-
|
||||||
|
SecretKeySelector is a reference to a specific 'key' within a Secret resource.
|
||||||
|
In some instances, `key` is a required field.
|
||||||
|
properties:
|
||||||
|
key:
|
||||||
|
description: |-
|
||||||
|
A key in the referenced Secret.
|
||||||
|
Some instances of this field may be defaulted, in others it may be required.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[-._a-zA-Z0-9]+$
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
description: The name of the Secret resource being referred to.
|
||||||
|
maxLength: 253
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: |-
|
||||||
|
The namespace of the Secret resource being referred to.
|
||||||
|
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||||
|
maxLength: 63
|
||||||
|
minLength: 1
|
||||||
|
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- apiDomain
|
||||||
|
- auth
|
||||||
|
type: object
|
||||||
ngrok:
|
ngrok:
|
||||||
description: Ngrok configures this store to sync secrets using the ngrok provider.
|
description: Ngrok configures this store to sync secrets using the ngrok provider.
|
||||||
properties:
|
properties:
|
||||||
|
|||||||
@@ -4,10 +4,10 @@ metadata:
|
|||||||
name: external-secrets-cert-controller
|
name: external-secrets-cert-controller
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-cert-controller
|
app.kubernetes.io/name: external-secrets-cert-controller
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
spec:
|
spec:
|
||||||
replicas: 1
|
replicas: 1
|
||||||
@@ -19,10 +19,10 @@ spec:
|
|||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-cert-controller
|
app.kubernetes.io/name: external-secrets-cert-controller
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
spec:
|
spec:
|
||||||
serviceAccountName: external-secrets-cert-controller
|
serviceAccountName: external-secrets-cert-controller
|
||||||
@@ -40,7 +40,7 @@ spec:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: RuntimeDefault
|
type: RuntimeDefault
|
||||||
image: ghcr.io/external-secrets/external-secrets:v2.0.1
|
image: ghcr.io/external-secrets/external-secrets:v2.1.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
args:
|
args:
|
||||||
- certcontroller
|
- certcontroller
|
||||||
|
|||||||
@@ -4,10 +4,10 @@ metadata:
|
|||||||
name: external-secrets-webhook
|
name: external-secrets-webhook
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-webhook
|
app.kubernetes.io/name: external-secrets-webhook
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
spec:
|
spec:
|
||||||
replicas: 1
|
replicas: 1
|
||||||
@@ -19,10 +19,10 @@ spec:
|
|||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-webhook
|
app.kubernetes.io/name: external-secrets-webhook
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
spec:
|
spec:
|
||||||
hostNetwork: false
|
hostNetwork: false
|
||||||
@@ -40,7 +40,7 @@ spec:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: RuntimeDefault
|
type: RuntimeDefault
|
||||||
image: ghcr.io/external-secrets/external-secrets:v2.0.1
|
image: ghcr.io/external-secrets/external-secrets:v2.1.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
args:
|
args:
|
||||||
- webhook
|
- webhook
|
||||||
|
|||||||
@@ -4,10 +4,10 @@ metadata:
|
|||||||
name: external-secrets
|
name: external-secrets
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
spec:
|
spec:
|
||||||
replicas: 1
|
replicas: 1
|
||||||
@@ -19,10 +19,10 @@ spec:
|
|||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
spec:
|
spec:
|
||||||
serviceAccountName: external-secrets
|
serviceAccountName: external-secrets
|
||||||
@@ -40,7 +40,7 @@ spec:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: RuntimeDefault
|
type: RuntimeDefault
|
||||||
image: ghcr.io/external-secrets/external-secrets:v2.0.1
|
image: ghcr.io/external-secrets/external-secrets:v2.1.0
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
args:
|
args:
|
||||||
- --concurrent=1
|
- --concurrent=1
|
||||||
|
|||||||
@@ -4,10 +4,10 @@ metadata:
|
|||||||
name: external-secrets-leaderelection
|
name: external-secrets-leaderelection
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
rules:
|
rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|||||||
@@ -4,10 +4,10 @@ metadata:
|
|||||||
name: external-secrets-leaderelection
|
name: external-secrets-leaderelection
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
|||||||
@@ -4,9 +4,9 @@ metadata:
|
|||||||
name: external-secrets-webhook
|
name: external-secrets-webhook
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-webhook
|
app.kubernetes.io/name: external-secrets-webhook
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
external-secrets.io/component: webhook
|
external-secrets.io/component: webhook
|
||||||
|
|||||||
@@ -4,10 +4,10 @@ metadata:
|
|||||||
name: external-secrets-webhook
|
name: external-secrets-webhook
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-webhook
|
app.kubernetes.io/name: external-secrets-webhook
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
external-secrets.io/component: webhook
|
external-secrets.io/component: webhook
|
||||||
spec:
|
spec:
|
||||||
|
|||||||
@@ -4,8 +4,8 @@ metadata:
|
|||||||
name: external-secrets-cert-controller
|
name: external-secrets-cert-controller
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-cert-controller
|
app.kubernetes.io/name: external-secrets-cert-controller
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
|||||||
@@ -4,8 +4,8 @@ metadata:
|
|||||||
name: external-secrets-webhook
|
name: external-secrets-webhook
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-webhook
|
app.kubernetes.io/name: external-secrets-webhook
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
|||||||
@@ -4,8 +4,8 @@ metadata:
|
|||||||
name: external-secrets
|
name: external-secrets
|
||||||
namespace: external-secrets
|
namespace: external-secrets
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets
|
app.kubernetes.io/name: external-secrets
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
|||||||
@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
|
|||||||
metadata:
|
metadata:
|
||||||
name: externalsecret-validate
|
name: externalsecret-validate
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-webhook
|
app.kubernetes.io/name: external-secrets-webhook
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
external-secrets.io/component: webhook
|
external-secrets.io/component: webhook
|
||||||
webhooks:
|
webhooks:
|
||||||
|
|||||||
@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
|
|||||||
metadata:
|
metadata:
|
||||||
name: secretstore-validate
|
name: secretstore-validate
|
||||||
labels:
|
labels:
|
||||||
helm.sh/chart: external-secrets-2.0.1
|
helm.sh/chart: external-secrets-2.1.0
|
||||||
app.kubernetes.io/name: external-secrets-webhook
|
app.kubernetes.io/name: external-secrets-webhook
|
||||||
app.kubernetes.io/instance: external-secrets
|
app.kubernetes.io/instance: external-secrets
|
||||||
app.kubernetes.io/version: "v2.0.1"
|
app.kubernetes.io/version: "v2.1.0"
|
||||||
app.kubernetes.io/managed-by: Helm
|
app.kubernetes.io/managed-by: Helm
|
||||||
external-secrets.io/component: webhook
|
external-secrets.io/component: webhook
|
||||||
webhooks:
|
webhooks:
|
||||||
|
|||||||
Reference in New Issue
Block a user