Merge pull request 'Automated Manifest Update - Automerge' (#3040) from auto/update-manifests-automerge-20260103230303 into manifests

This commit was merged in pull request #3040.
This commit is contained in:
2026-01-03 23:03:19 +00:00
21 changed files with 151 additions and 67 deletions

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-edit
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-servicebindings
labels:
servicebinding.io/controller: "true"
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-view
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -58,7 +58,7 @@ spec:
description: SecretStoreSpec defines the desired state of SecretStore.
properties:
conditions:
description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore
description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore.
items:
description: |-
ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in
@@ -2091,7 +2091,7 @@ spec:
type: object
github:
description: |-
Github configures this store to push GitHub Action secrets using GitHub API provider.
Github configures this store to push GitHub Actions secrets using the GitHub API provider.
Note: This provider only supports write operations (PushSecret) and cannot fetch secrets from GitHub
properties:
appID:
@@ -3039,6 +3039,48 @@ spec:
- clientSecret
type: object
type: object
caBundle:
description: |-
CABundle is a PEM-encoded CA certificate bundle used to validate
the Infisical server's TLS certificate. Mutually exclusive with CAProvider.
format: byte
type: string
caProvider:
description: |-
CAProvider is a reference to a Secret or ConfigMap that contains a CA certificate.
The certificate is used to validate the Infisical server's TLS certificate.
Mutually exclusive with CABundle.
properties:
key:
description: The key where the CA certificate can be found in the Secret or ConfigMap.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the object located at the provider type.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace the Provider type is in.
Can only be defined when used in a ClusterSecretStore.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type:
description: The type of provider to use such as "Secret", or "ConfigMap".
enum:
- Secret
- ConfigMap
type: string
required:
- name
- type
type: object
hostAPI:
default: https://app.infisical.com/api
description: HostAPI specifies the base URL of the Infisical API. If not provided, it defaults to "https://app.infisical.com/api".
@@ -3932,7 +3974,7 @@ spec:
- project
type: object
scaleway:
description: Scaleway
description: Scaleway configures this store to sync secrets using the Scaleway provider.
properties:
accessKey:
description: AccessKey is the non-secret part of the api key.
@@ -4195,7 +4237,7 @@ spec:
- url
type: object
vault:
description: Vault configures this store to sync secrets using Hashi provider
description: Vault configures this store to sync secrets using the HashiCorp Vault provider.
properties:
auth:
description: Auth configures how secret-manager authenticates with the Vault server.
@@ -5564,7 +5606,7 @@ spec:
description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config.
type: integer
retrySettings:
description: Used to configure http retries if failed
description: Used to configure HTTP retries on failures.
properties:
maxRetries:
format: int32
@@ -5648,7 +5690,7 @@ spec:
description: SecretStoreSpec defines the desired state of SecretStore.
properties:
conditions:
description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore
description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore.
items:
description: |-
ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in
@@ -7381,7 +7423,7 @@ spec:
type: string
type: object
github:
description: Github configures this store to push Github Action secrets using Github API provider
description: Github configures this store to push GitHub Actions secrets using the GitHub API provider.
properties:
appID:
description: appID specifies the Github APP that will be used to authenticate the client
@@ -8449,7 +8491,7 @@ spec:
- project
type: object
scaleway:
description: Scaleway
description: Scaleway configures this store to sync secrets using the Scaleway provider.
properties:
accessKey:
description: AccessKey is the non-secret part of the api key.
@@ -8669,7 +8711,7 @@ spec:
- url
type: object
vault:
description: Vault configures this store to sync secrets using Hashi provider
description: Vault configures this store to sync secrets using the HashiCorp Vault provider.
properties:
auth:
description: Auth configures how secret-manager authenticates with the Vault server.
@@ -9755,7 +9797,7 @@ spec:
description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config.
type: integer
retrySettings:
description: Used to configure http retries if failed
description: Used to configure HTTP retries on failures.
properties:
maxRetries:
description: MaxRetries is the maximum number of retry attempts.

View File

@@ -58,7 +58,7 @@ spec:
description: SecretStoreSpec defines the desired state of SecretStore.
properties:
conditions:
description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore
description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore.
items:
description: |-
ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in
@@ -2091,7 +2091,7 @@ spec:
type: object
github:
description: |-
Github configures this store to push GitHub Action secrets using GitHub API provider.
Github configures this store to push GitHub Actions secrets using the GitHub API provider.
Note: This provider only supports write operations (PushSecret) and cannot fetch secrets from GitHub
properties:
appID:
@@ -3039,6 +3039,48 @@ spec:
- clientSecret
type: object
type: object
caBundle:
description: |-
CABundle is a PEM-encoded CA certificate bundle used to validate
the Infisical server's TLS certificate. Mutually exclusive with CAProvider.
format: byte
type: string
caProvider:
description: |-
CAProvider is a reference to a Secret or ConfigMap that contains a CA certificate.
The certificate is used to validate the Infisical server's TLS certificate.
Mutually exclusive with CABundle.
properties:
key:
description: The key where the CA certificate can be found in the Secret or ConfigMap.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the object located at the provider type.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace the Provider type is in.
Can only be defined when used in a ClusterSecretStore.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type:
description: The type of provider to use such as "Secret", or "ConfigMap".
enum:
- Secret
- ConfigMap
type: string
required:
- name
- type
type: object
hostAPI:
default: https://app.infisical.com/api
description: HostAPI specifies the base URL of the Infisical API. If not provided, it defaults to "https://app.infisical.com/api".
@@ -3932,7 +3974,7 @@ spec:
- project
type: object
scaleway:
description: Scaleway
description: Scaleway configures this store to sync secrets using the Scaleway provider.
properties:
accessKey:
description: AccessKey is the non-secret part of the api key.
@@ -4195,7 +4237,7 @@ spec:
- url
type: object
vault:
description: Vault configures this store to sync secrets using Hashi provider
description: Vault configures this store to sync secrets using the HashiCorp Vault provider.
properties:
auth:
description: Auth configures how secret-manager authenticates with the Vault server.
@@ -5564,7 +5606,7 @@ spec:
description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config.
type: integer
retrySettings:
description: Used to configure http retries if failed
description: Used to configure HTTP retries on failures.
properties:
maxRetries:
format: int32
@@ -5648,7 +5690,7 @@ spec:
description: SecretStoreSpec defines the desired state of SecretStore.
properties:
conditions:
description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore
description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore.
items:
description: |-
ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in
@@ -7381,7 +7423,7 @@ spec:
type: string
type: object
github:
description: Github configures this store to push Github Action secrets using Github API provider
description: Github configures this store to push GitHub Actions secrets using the GitHub API provider.
properties:
appID:
description: appID specifies the Github APP that will be used to authenticate the client
@@ -8449,7 +8491,7 @@ spec:
- project
type: object
scaleway:
description: Scaleway
description: Scaleway configures this store to sync secrets using the Scaleway provider.
properties:
accessKey:
description: AccessKey is the non-secret part of the api key.
@@ -8669,7 +8711,7 @@ spec:
- url
type: object
vault:
description: Vault configures this store to sync secrets using Hashi provider
description: Vault configures this store to sync secrets using the HashiCorp Vault provider.
properties:
auth:
description: Auth configures how secret-manager authenticates with the Vault server.
@@ -9755,7 +9797,7 @@ spec:
description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config.
type: integer
retrySettings:
description: Used to configure http retries if failed
description: Used to configure HTTP retries on failures.
properties:
maxRetries:
description: MaxRetries is the maximum number of retry attempts.

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets-cert-controller
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v1.2.0
image: ghcr.io/external-secrets/external-secrets:v1.2.1
imagePullPolicy: IfNotPresent
args:
- certcontroller

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
spec:
hostNetwork: false
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v1.2.0
image: ghcr.io/external-secrets/external-secrets:v1.2.1
imagePullPolicy: IfNotPresent
args:
- webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v1.2.0
image: ghcr.io/external-secrets/external-secrets:v1.2.1
imagePullPolicy: IfNotPresent
args:
- --concurrent=1

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -4,9 +4,9 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
spec:

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: externalsecret-validate
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks:

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: secretstore-validate
labels:
helm.sh/chart: external-secrets-1.2.0
helm.sh/chart: external-secrets-1.2.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v1.2.0"
app.kubernetes.io/version: "v1.2.1"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks: