Merge pull request 'Automated Manifest Update - Automerge' (#3040) from auto/update-manifests-automerge-20260103230303 into manifests
This commit was merged in pull request #3040.
This commit is contained in:
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-cert-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-edit
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||
rbac.authorization.k8s.io/aggregate-to-admin: "true"
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-servicebindings
|
||||
labels:
|
||||
servicebinding.io/controller: "true"
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRole
|
||||
metadata:
|
||||
name: external-secrets-view
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rbac.authorization.k8s.io/aggregate-to-view: "true"
|
||||
rbac.authorization.k8s.io/aggregate-to-edit: "true"
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: external-secrets-cert-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: external-secrets-controller
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -58,7 +58,7 @@ spec:
|
||||
description: SecretStoreSpec defines the desired state of SecretStore.
|
||||
properties:
|
||||
conditions:
|
||||
description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore
|
||||
description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore.
|
||||
items:
|
||||
description: |-
|
||||
ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in
|
||||
@@ -2091,7 +2091,7 @@ spec:
|
||||
type: object
|
||||
github:
|
||||
description: |-
|
||||
Github configures this store to push GitHub Action secrets using GitHub API provider.
|
||||
Github configures this store to push GitHub Actions secrets using the GitHub API provider.
|
||||
Note: This provider only supports write operations (PushSecret) and cannot fetch secrets from GitHub
|
||||
properties:
|
||||
appID:
|
||||
@@ -3039,6 +3039,48 @@ spec:
|
||||
- clientSecret
|
||||
type: object
|
||||
type: object
|
||||
caBundle:
|
||||
description: |-
|
||||
CABundle is a PEM-encoded CA certificate bundle used to validate
|
||||
the Infisical server's TLS certificate. Mutually exclusive with CAProvider.
|
||||
format: byte
|
||||
type: string
|
||||
caProvider:
|
||||
description: |-
|
||||
CAProvider is a reference to a Secret or ConfigMap that contains a CA certificate.
|
||||
The certificate is used to validate the Infisical server's TLS certificate.
|
||||
Mutually exclusive with CABundle.
|
||||
properties:
|
||||
key:
|
||||
description: The key where the CA certificate can be found in the Secret or ConfigMap.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[-._a-zA-Z0-9]+$
|
||||
type: string
|
||||
name:
|
||||
description: The name of the object located at the provider type.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||
type: string
|
||||
namespace:
|
||||
description: |-
|
||||
The namespace the Provider type is in.
|
||||
Can only be defined when used in a ClusterSecretStore.
|
||||
maxLength: 63
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||
type: string
|
||||
type:
|
||||
description: The type of provider to use such as "Secret", or "ConfigMap".
|
||||
enum:
|
||||
- Secret
|
||||
- ConfigMap
|
||||
type: string
|
||||
required:
|
||||
- name
|
||||
- type
|
||||
type: object
|
||||
hostAPI:
|
||||
default: https://app.infisical.com/api
|
||||
description: HostAPI specifies the base URL of the Infisical API. If not provided, it defaults to "https://app.infisical.com/api".
|
||||
@@ -3932,7 +3974,7 @@ spec:
|
||||
- project
|
||||
type: object
|
||||
scaleway:
|
||||
description: Scaleway
|
||||
description: Scaleway configures this store to sync secrets using the Scaleway provider.
|
||||
properties:
|
||||
accessKey:
|
||||
description: AccessKey is the non-secret part of the api key.
|
||||
@@ -4195,7 +4237,7 @@ spec:
|
||||
- url
|
||||
type: object
|
||||
vault:
|
||||
description: Vault configures this store to sync secrets using Hashi provider
|
||||
description: Vault configures this store to sync secrets using the HashiCorp Vault provider.
|
||||
properties:
|
||||
auth:
|
||||
description: Auth configures how secret-manager authenticates with the Vault server.
|
||||
@@ -5564,7 +5606,7 @@ spec:
|
||||
description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config.
|
||||
type: integer
|
||||
retrySettings:
|
||||
description: Used to configure http retries if failed
|
||||
description: Used to configure HTTP retries on failures.
|
||||
properties:
|
||||
maxRetries:
|
||||
format: int32
|
||||
@@ -5648,7 +5690,7 @@ spec:
|
||||
description: SecretStoreSpec defines the desired state of SecretStore.
|
||||
properties:
|
||||
conditions:
|
||||
description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore
|
||||
description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore.
|
||||
items:
|
||||
description: |-
|
||||
ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in
|
||||
@@ -7381,7 +7423,7 @@ spec:
|
||||
type: string
|
||||
type: object
|
||||
github:
|
||||
description: Github configures this store to push Github Action secrets using Github API provider
|
||||
description: Github configures this store to push GitHub Actions secrets using the GitHub API provider.
|
||||
properties:
|
||||
appID:
|
||||
description: appID specifies the Github APP that will be used to authenticate the client
|
||||
@@ -8449,7 +8491,7 @@ spec:
|
||||
- project
|
||||
type: object
|
||||
scaleway:
|
||||
description: Scaleway
|
||||
description: Scaleway configures this store to sync secrets using the Scaleway provider.
|
||||
properties:
|
||||
accessKey:
|
||||
description: AccessKey is the non-secret part of the api key.
|
||||
@@ -8669,7 +8711,7 @@ spec:
|
||||
- url
|
||||
type: object
|
||||
vault:
|
||||
description: Vault configures this store to sync secrets using Hashi provider
|
||||
description: Vault configures this store to sync secrets using the HashiCorp Vault provider.
|
||||
properties:
|
||||
auth:
|
||||
description: Auth configures how secret-manager authenticates with the Vault server.
|
||||
@@ -9755,7 +9797,7 @@ spec:
|
||||
description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config.
|
||||
type: integer
|
||||
retrySettings:
|
||||
description: Used to configure http retries if failed
|
||||
description: Used to configure HTTP retries on failures.
|
||||
properties:
|
||||
maxRetries:
|
||||
description: MaxRetries is the maximum number of retry attempts.
|
||||
|
||||
@@ -58,7 +58,7 @@ spec:
|
||||
description: SecretStoreSpec defines the desired state of SecretStore.
|
||||
properties:
|
||||
conditions:
|
||||
description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore
|
||||
description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore.
|
||||
items:
|
||||
description: |-
|
||||
ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in
|
||||
@@ -2091,7 +2091,7 @@ spec:
|
||||
type: object
|
||||
github:
|
||||
description: |-
|
||||
Github configures this store to push GitHub Action secrets using GitHub API provider.
|
||||
Github configures this store to push GitHub Actions secrets using the GitHub API provider.
|
||||
Note: This provider only supports write operations (PushSecret) and cannot fetch secrets from GitHub
|
||||
properties:
|
||||
appID:
|
||||
@@ -3039,6 +3039,48 @@ spec:
|
||||
- clientSecret
|
||||
type: object
|
||||
type: object
|
||||
caBundle:
|
||||
description: |-
|
||||
CABundle is a PEM-encoded CA certificate bundle used to validate
|
||||
the Infisical server's TLS certificate. Mutually exclusive with CAProvider.
|
||||
format: byte
|
||||
type: string
|
||||
caProvider:
|
||||
description: |-
|
||||
CAProvider is a reference to a Secret or ConfigMap that contains a CA certificate.
|
||||
The certificate is used to validate the Infisical server's TLS certificate.
|
||||
Mutually exclusive with CABundle.
|
||||
properties:
|
||||
key:
|
||||
description: The key where the CA certificate can be found in the Secret or ConfigMap.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[-._a-zA-Z0-9]+$
|
||||
type: string
|
||||
name:
|
||||
description: The name of the object located at the provider type.
|
||||
maxLength: 253
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
|
||||
type: string
|
||||
namespace:
|
||||
description: |-
|
||||
The namespace the Provider type is in.
|
||||
Can only be defined when used in a ClusterSecretStore.
|
||||
maxLength: 63
|
||||
minLength: 1
|
||||
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
|
||||
type: string
|
||||
type:
|
||||
description: The type of provider to use such as "Secret", or "ConfigMap".
|
||||
enum:
|
||||
- Secret
|
||||
- ConfigMap
|
||||
type: string
|
||||
required:
|
||||
- name
|
||||
- type
|
||||
type: object
|
||||
hostAPI:
|
||||
default: https://app.infisical.com/api
|
||||
description: HostAPI specifies the base URL of the Infisical API. If not provided, it defaults to "https://app.infisical.com/api".
|
||||
@@ -3932,7 +3974,7 @@ spec:
|
||||
- project
|
||||
type: object
|
||||
scaleway:
|
||||
description: Scaleway
|
||||
description: Scaleway configures this store to sync secrets using the Scaleway provider.
|
||||
properties:
|
||||
accessKey:
|
||||
description: AccessKey is the non-secret part of the api key.
|
||||
@@ -4195,7 +4237,7 @@ spec:
|
||||
- url
|
||||
type: object
|
||||
vault:
|
||||
description: Vault configures this store to sync secrets using Hashi provider
|
||||
description: Vault configures this store to sync secrets using the HashiCorp Vault provider.
|
||||
properties:
|
||||
auth:
|
||||
description: Auth configures how secret-manager authenticates with the Vault server.
|
||||
@@ -5564,7 +5606,7 @@ spec:
|
||||
description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config.
|
||||
type: integer
|
||||
retrySettings:
|
||||
description: Used to configure http retries if failed
|
||||
description: Used to configure HTTP retries on failures.
|
||||
properties:
|
||||
maxRetries:
|
||||
format: int32
|
||||
@@ -5648,7 +5690,7 @@ spec:
|
||||
description: SecretStoreSpec defines the desired state of SecretStore.
|
||||
properties:
|
||||
conditions:
|
||||
description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore
|
||||
description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore.
|
||||
items:
|
||||
description: |-
|
||||
ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in
|
||||
@@ -7381,7 +7423,7 @@ spec:
|
||||
type: string
|
||||
type: object
|
||||
github:
|
||||
description: Github configures this store to push Github Action secrets using Github API provider
|
||||
description: Github configures this store to push GitHub Actions secrets using the GitHub API provider.
|
||||
properties:
|
||||
appID:
|
||||
description: appID specifies the Github APP that will be used to authenticate the client
|
||||
@@ -8449,7 +8491,7 @@ spec:
|
||||
- project
|
||||
type: object
|
||||
scaleway:
|
||||
description: Scaleway
|
||||
description: Scaleway configures this store to sync secrets using the Scaleway provider.
|
||||
properties:
|
||||
accessKey:
|
||||
description: AccessKey is the non-secret part of the api key.
|
||||
@@ -8669,7 +8711,7 @@ spec:
|
||||
- url
|
||||
type: object
|
||||
vault:
|
||||
description: Vault configures this store to sync secrets using Hashi provider
|
||||
description: Vault configures this store to sync secrets using the HashiCorp Vault provider.
|
||||
properties:
|
||||
auth:
|
||||
description: Auth configures how secret-manager authenticates with the Vault server.
|
||||
@@ -9755,7 +9797,7 @@ spec:
|
||||
description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config.
|
||||
type: integer
|
||||
retrySettings:
|
||||
description: Used to configure http retries if failed
|
||||
description: Used to configure HTTP retries on failures.
|
||||
properties:
|
||||
maxRetries:
|
||||
description: MaxRetries is the maximum number of retry attempts.
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-cert-controller
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
serviceAccountName: external-secrets-cert-controller
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.2.0
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.2.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- certcontroller
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
hostNetwork: false
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.2.0
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.2.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- webhook
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
replicas: 1
|
||||
@@ -19,10 +19,10 @@ spec:
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
spec:
|
||||
serviceAccountName: external-secrets
|
||||
@@ -40,7 +40,7 @@ spec:
|
||||
runAsUser: 1000
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.2.0
|
||||
image: ghcr.io/external-secrets/external-secrets:v1.2.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
args:
|
||||
- --concurrent=1
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-leaderelection
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
rules:
|
||||
- apiGroups:
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-leaderelection
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
|
||||
@@ -4,9 +4,9 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
|
||||
@@ -4,10 +4,10 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
spec:
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets-cert-controller
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-cert-controller
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets-webhook
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -4,8 +4,8 @@ metadata:
|
||||
name: external-secrets
|
||||
namespace: external-secrets
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
|
||||
metadata:
|
||||
name: externalsecret-validate
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
webhooks:
|
||||
|
||||
@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
|
||||
metadata:
|
||||
name: secretstore-validate
|
||||
labels:
|
||||
helm.sh/chart: external-secrets-1.2.0
|
||||
helm.sh/chart: external-secrets-1.2.1
|
||||
app.kubernetes.io/name: external-secrets-webhook
|
||||
app.kubernetes.io/instance: external-secrets
|
||||
app.kubernetes.io/version: "v1.2.0"
|
||||
app.kubernetes.io/version: "v1.2.1"
|
||||
app.kubernetes.io/managed-by: Helm
|
||||
external-secrets.io/component: webhook
|
||||
webhooks:
|
||||
|
||||
Reference in New Issue
Block a user