Automated Manifest Update (#3789)

This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow.

Reviewed-on: #3789
Co-authored-by: gitea-bot <gitea-bot@alexlebens.net>
Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #3789.
This commit is contained in:
2026-02-06 15:51:04 +00:00
committed by Alex Lebens
parent 566ceef0dc
commit 98b82274f5
21 changed files with 48 additions and 319 deletions

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-edit
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-servicebindings
labels:
servicebinding.io/controller: "true"
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-view
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -352,96 +352,6 @@ spec:
- akeylessGWApiURL
- authSecretRef
type: object
alibaba:
description: Alibaba configures this store to sync secrets using Alibaba Cloud provider
properties:
auth:
description: AlibabaAuth contains a secretRef for credentials.
properties:
rrsa:
description: AlibabaRRSAAuth authenticates against Alibaba using RRSA.
properties:
oidcProviderArn:
type: string
oidcTokenFilePath:
type: string
roleArn:
type: string
sessionName:
type: string
required:
- oidcProviderArn
- oidcTokenFilePath
- roleArn
- sessionName
type: object
secretRef:
description: AlibabaAuthSecretRef holds secret references for Alibaba credentials.
properties:
accessKeyIDSecretRef:
description: The AccessKeyID is used for authentication
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
accessKeySecretSecretRef:
description: The AccessKeySecret is used for authentication
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
required:
- accessKeyIDSecretRef
- accessKeySecretSecretRef
type: object
type: object
regionID:
description: Alibaba Region to be used for the provider
type: string
required:
- auth
- regionID
type: object
aws:
description: AWS configures this store to sync secrets using AWS Secret Manager provider
properties:
@@ -1653,52 +1563,6 @@ spec:
- clientSecret
- tenant
type: object
device42:
description: Device42 configures this store to sync secrets using the Device42 provider
properties:
auth:
description: Auth configures how secret-manager authenticates with a Device42 instance.
properties:
secretRef:
description: Device42SecretRef contains the secret reference for accessing the Device42 instance.
properties:
credentials:
description: Username / Password is used for authentication.
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
type: object
required:
- secretRef
type: object
host:
description: URL configures the Device42 instance URL.
type: string
required:
- auth
- host
type: object
doppler:
description: Doppler configures this store to sync secrets using the Doppler provider
properties:

View File

@@ -352,96 +352,6 @@ spec:
- akeylessGWApiURL
- authSecretRef
type: object
alibaba:
description: Alibaba configures this store to sync secrets using Alibaba Cloud provider
properties:
auth:
description: AlibabaAuth contains a secretRef for credentials.
properties:
rrsa:
description: AlibabaRRSAAuth authenticates against Alibaba using RRSA.
properties:
oidcProviderArn:
type: string
oidcTokenFilePath:
type: string
roleArn:
type: string
sessionName:
type: string
required:
- oidcProviderArn
- oidcTokenFilePath
- roleArn
- sessionName
type: object
secretRef:
description: AlibabaAuthSecretRef holds secret references for Alibaba credentials.
properties:
accessKeyIDSecretRef:
description: The AccessKeyID is used for authentication
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
accessKeySecretSecretRef:
description: The AccessKeySecret is used for authentication
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
required:
- accessKeyIDSecretRef
- accessKeySecretSecretRef
type: object
type: object
regionID:
description: Alibaba Region to be used for the provider
type: string
required:
- auth
- regionID
type: object
aws:
description: AWS configures this store to sync secrets using AWS Secret Manager provider
properties:
@@ -1653,52 +1563,6 @@ spec:
- clientSecret
- tenant
type: object
device42:
description: Device42 configures this store to sync secrets using the Device42 provider
properties:
auth:
description: Auth configures how secret-manager authenticates with a Device42 instance.
properties:
secretRef:
description: Device42SecretRef contains the secret reference for accessing the Device42 instance.
properties:
credentials:
description: Username / Password is used for authentication.
properties:
key:
description: |-
A key in the referenced Secret.
Some instances of this field may be defaulted, in others it may be required.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the Secret resource being referred to.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace of the Secret resource being referred to.
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type: object
type: object
required:
- secretRef
type: object
host:
description: URL configures the Device42 instance URL.
type: string
required:
- auth
- host
type: object
doppler:
description: Doppler configures this store to sync secrets using the Doppler provider
properties:

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets-cert-controller
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v1.3.2
image: ghcr.io/external-secrets/external-secrets:v2.0.0
imagePullPolicy: IfNotPresent
args:
- certcontroller

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
spec:
hostNetwork: false
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v1.3.2
image: ghcr.io/external-secrets/external-secrets:v2.0.0
imagePullPolicy: IfNotPresent
args:
- webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v1.3.2
image: ghcr.io/external-secrets/external-secrets:v2.0.0
imagePullPolicy: IfNotPresent
args:
- --concurrent=1

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -4,9 +4,9 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
spec:

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: externalsecret-validate
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks:

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: secretstore-validate
labels:
helm.sh/chart: external-secrets-1.3.2
helm.sh/chart: external-secrets-2.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.3.2"
app.kubernetes.io/version: "v2.0.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks:
@@ -25,6 +25,7 @@ webhooks:
admissionReviewVersions: ["v1", "v1beta1"]
sideEffects: None
timeoutSeconds: 5
failurePolicy: Fail
- name: "validate.clustersecretstore.external-secrets.io"
rules:
- apiGroups: ["external-secrets.io"]