Automated Manifest Update (#3789)
This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow. Reviewed-on: #3789 Co-authored-by: gitea-bot <gitea-bot@alexlebens.net> Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #3789.
This commit is contained in:
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-cert-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-edit
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-servicebindings
|
||||
labels:
|
||||
servicebinding.io/controller: "true"
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-view
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: external-secrets-cert-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: external-secrets-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -352,96 +352,6 @@ spec:
|
||||
- akeylessGWApiURL
|
||||
- authSecretRef
|
||||
type: object
|
||||
alibaba:
|
||||
description: Alibaba configures this store to sync secrets using Alibaba Cloud provider
|
||||
properties:
|
||||
auth:
|
||||
description: AlibabaAuth contains a secretRef for credentials.
|
||||
properties:
|
||||
rrsa:
|
||||
description: AlibabaRRSAAuth authenticates against Alibaba using RRSA.
|
||||
properties:
|
||||
oidcProviderArn:
|
||||
type: string
|
||||
oidcTokenFilePath:
|
||||
type: string
|
||||
roleArn:
|
||||
type: string
|
||||
sessionName:
|
||||
type: string
|
||||
required:
|
||||
- oidcProviderArn
|
||||
- oidcTokenFilePath
|
||||
- roleArn
|
||||
- sessionName
|
||||
type: object
|
||||
secretRef:
|
||||
description: AlibabaAuthSecretRef holds secret references for Alibaba credentials.
|
||||
properties:
|
||||
accessKeyIDSecretRef:
|
||||
description: The AccessKeyID is used for authentication
|
||||
properties:
|
||||
key:
|
||||
description: |-
|
||||
A key in the referenced Secret.
|
||||
Some instances of this field may be defaulted, in others it may be required.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[-._a-zA-Z0-9]+$
|
||||
type: string
|
||||
name:
|
||||
description: The name of the Secret resource being referred to.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||
type: string
|
||||
namespace:
|
||||
description: |-
|
||||
The namespace of the Secret resource being referred to.
|
||||
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||
maxLength: 63
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||
type: string
|
||||
type: object
|
||||
accessKeySecretSecretRef:
|
||||
description: The AccessKeySecret is used for authentication
|
||||
properties:
|
||||
key:
|
||||
description: |-
|
||||
A key in the referenced Secret.
|
||||
Some instances of this field may be defaulted, in others it may be required.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[-._a-zA-Z0-9]+$
|
||||
type: string
|
||||
name:
|
||||
description: The name of the Secret resource being referred to.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||
type: string
|
||||
namespace:
|
||||
description: |-
|
||||
The namespace of the Secret resource being referred to.
|
||||
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||
maxLength: 63
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||
type: string
|
||||
type: object
|
||||
required:
|
||||
- accessKeyIDSecretRef
|
||||
- accessKeySecretSecretRef
|
||||
type: object
|
||||
type: object
|
||||
regionID:
|
||||
description: Alibaba Region to be used for the provider
|
||||
type: string
|
||||
required:
|
||||
- auth
|
||||
- regionID
|
||||
type: object
|
||||
aws:
|
||||
description: AWS configures this store to sync secrets using AWS Secret Manager provider
|
||||
properties:
|
||||
@@ -1653,52 +1563,6 @@ spec:
|
||||
- clientSecret
|
||||
- tenant
|
||||
type: object
|
||||
device42:
|
||||
description: Device42 configures this store to sync secrets using the Device42 provider
|
||||
properties:
|
||||
auth:
|
||||
description: Auth configures how secret-manager authenticates with a Device42 instance.
|
||||
properties:
|
||||
secretRef:
|
||||
description: Device42SecretRef contains the secret reference for accessing the Device42 instance.
|
||||
properties:
|
||||
credentials:
|
||||
description: Username / Password is used for authentication.
|
||||
properties:
|
||||
key:
|
||||
description: |-
|
||||
A key in the referenced Secret.
|
||||
Some instances of this field may be defaulted, in others it may be required.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[-._a-zA-Z0-9]+$
|
||||
type: string
|
||||
name:
|
||||
description: The name of the Secret resource being referred to.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||
type: string
|
||||
namespace:
|
||||
description: |-
|
||||
The namespace of the Secret resource being referred to.
|
||||
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||
maxLength: 63
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
required:
|
||||
- secretRef
|
||||
type: object
|
||||
host:
|
||||
description: URL configures the Device42 instance URL.
|
||||
type: string
|
||||
required:
|
||||
- auth
|
||||
- host
|
||||
type: object
|
||||
doppler:
|
||||
description: Doppler configures this store to sync secrets using the Doppler provider
|
||||
properties:
|
||||
|
||||
@@ -352,96 +352,6 @@ spec:
|
||||
- akeylessGWApiURL
|
||||
- authSecretRef
|
||||
type: object
|
||||
alibaba:
|
||||
description: Alibaba configures this store to sync secrets using Alibaba Cloud provider
|
||||
properties:
|
||||
auth:
|
||||
description: AlibabaAuth contains a secretRef for credentials.
|
||||
properties:
|
||||
rrsa:
|
||||
description: AlibabaRRSAAuth authenticates against Alibaba using RRSA.
|
||||
properties:
|
||||
oidcProviderArn:
|
||||
type: string
|
||||
oidcTokenFilePath:
|
||||
type: string
|
||||
roleArn:
|
||||
type: string
|
||||
sessionName:
|
||||
type: string
|
||||
required:
|
||||
- oidcProviderArn
|
||||
- oidcTokenFilePath
|
||||
- roleArn
|
||||
- sessionName
|
||||
type: object
|
||||
secretRef:
|
||||
description: AlibabaAuthSecretRef holds secret references for Alibaba credentials.
|
||||
properties:
|
||||
accessKeyIDSecretRef:
|
||||
description: The AccessKeyID is used for authentication
|
||||
properties:
|
||||
key:
|
||||
description: |-
|
||||
A key in the referenced Secret.
|
||||
Some instances of this field may be defaulted, in others it may be required.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[-._a-zA-Z0-9]+$
|
||||
type: string
|
||||
name:
|
||||
description: The name of the Secret resource being referred to.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||
type: string
|
||||
namespace:
|
||||
description: |-
|
||||
The namespace of the Secret resource being referred to.
|
||||
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||
maxLength: 63
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||
type: string
|
||||
type: object
|
||||
accessKeySecretSecretRef:
|
||||
description: The AccessKeySecret is used for authentication
|
||||
properties:
|
||||
key:
|
||||
description: |-
|
||||
A key in the referenced Secret.
|
||||
Some instances of this field may be defaulted, in others it may be required.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[-._a-zA-Z0-9]+$
|
||||
type: string
|
||||
name:
|
||||
description: The name of the Secret resource being referred to.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||
type: string
|
||||
namespace:
|
||||
description: |-
|
||||
The namespace of the Secret resource being referred to.
|
||||
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||
maxLength: 63
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||
type: string
|
||||
type: object
|
||||
required:
|
||||
- accessKeyIDSecretRef
|
||||
- accessKeySecretSecretRef
|
||||
type: object
|
||||
type: object
|
||||
regionID:
|
||||
description: Alibaba Region to be used for the provider
|
||||
type: string
|
||||
required:
|
||||
- auth
|
||||
- regionID
|
||||
type: object
|
||||
aws:
|
||||
description: AWS configures this store to sync secrets using AWS Secret Manager provider
|
||||
properties:
|
||||
@@ -1653,52 +1563,6 @@ spec:
|
||||
- clientSecret
|
||||
- tenant
|
||||
type: object
|
||||
device42:
|
||||
description: Device42 configures this store to sync secrets using the Device42 provider
|
||||
properties:
|
||||
auth:
|
||||
description: Auth configures how secret-manager authenticates with a Device42 instance.
|
||||
properties:
|
||||
secretRef:
|
||||
description: Device42SecretRef contains the secret reference for accessing the Device42 instance.
|
||||
properties:
|
||||
credentials:
|
||||
description: Username / Password is used for authentication.
|
||||
properties:
|
||||
key:
|
||||
description: |-
|
||||
A key in the referenced Secret.
|
||||
Some instances of this field may be defaulted, in others it may be required.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[-._a-zA-Z0-9]+$
|
||||
type: string
|
||||
name:
|
||||
description: The name of the Secret resource being referred to.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||
type: string
|
||||
namespace:
|
||||
description: |-
|
||||
The namespace of the Secret resource being referred to.
|
||||
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
|
||||
maxLength: 63
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
required:
|
||||
- secretRef
|
||||
type: object
|
||||
host:
|
||||
description: URL configures the Device42 instance URL.
|
||||
type: string
|
||||
required:
|
||||
- auth
|
||||
- host
|
||||
type: object
|
||||
doppler:
|
||||
description: Doppler configures this store to sync secrets using the Doppler provider
|
||||
properties:
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-cert-controller
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
serviceAccountName: external-secrets-cert-controller
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.3.2
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.0.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- certcontroller
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
hostNetwork: false
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.3.2
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.0.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- webhook
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
serviceAccountName: external-secrets
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.3.2
|
||||
image: ghcr.io/external-secrets/external-secrets:v2.0.0
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- --concurrent=1
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-leaderelection
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-leaderelection
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -4,9 +4,9 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
spec:
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets-cert-controller
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
|
||||
metadata:
|
||||
name: externalsecret-validate
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
webhooks:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
|
||||
metadata:
|
||||
name: secretstore-validate
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.3.2
|
||||
helm.sh/chart: external-secrets-2.0.0
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.3.2"
|
||||
app.kubernetes.io/version: "v2.0.0"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
webhooks:
|
||||
@@ -25,6 +25,7 @@ webhooks:
|
||||
admissionReviewVersions: ["v1", "v1beta1"]
|
||||
sideEffects: None
|
||||
timeoutSeconds: 5
|
||||
failurePolicy: Fail
|
||||
- name: "validate.clustersecretstore.external-secrets.io"
|
||||
rules:
|
||||
- apiGroups: ["external-secrets.io"]
|
||||
|
||||
Reference in New Issue
Block a user