From 0f2895562d9aa547b9e16f8817d61a606ea10e7c Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Sat, 3 Jan 2026 23:03:14 +0000 Subject: [PATCH] chore: Update manifests after automerge --- ...Role-external-secrets-cert-controller.yaml | 4 +- ...usterRole-external-secrets-controller.yaml | 4 +- .../ClusterRole-external-secrets-edit.yaml | 4 +- ...Role-external-secrets-servicebindings.yaml | 4 +- .../ClusterRole-external-secrets-view.yaml | 4 +- ...ding-external-secrets-cert-controller.yaml | 4 +- ...leBinding-external-secrets-controller.yaml | 4 +- ...ustersecretstores.external-secrets.io.yaml | 62 ++++++++++++++++--- ...tion-secretstores.external-secrets.io.yaml | 62 ++++++++++++++++--- ...ment-external-secrets-cert-controller.yaml | 10 +-- .../Deployment-external-secrets-webhook.yaml | 10 +-- .../Deployment-external-secrets.yaml | 10 +-- .../Role-external-secrets-leaderelection.yaml | 4 +- ...nding-external-secrets-leaderelection.yaml | 4 +- .../Secret-external-secrets-webhook.yaml | 4 +- .../Service-external-secrets-webhook.yaml | 4 +- ...ount-external-secrets-cert-controller.yaml | 4 +- ...rviceAccount-external-secrets-webhook.yaml | 4 +- .../ServiceAccount-external-secrets.yaml | 4 +- ...Configuration-externalsecret-validate.yaml | 4 +- ...ookConfiguration-secretstore-validate.yaml | 4 +- 21 files changed, 151 insertions(+), 67 deletions(-) diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml index 712d36663..5bf6c649b 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml index 1f15cc319..d4aab0a48 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml index 6fadacaac..417b1cb16 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-edit labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml index 98a3bdbda..0c085534e 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml index c01996d50..40d6df2f0 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-view labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml index 12fb51334..d61e79b4a 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml index d11893893..5d0b33012 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml index e25b99f4f..694246788 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml @@ -58,7 +58,7 @@ spec: description: SecretStoreSpec defines the desired state of SecretStore. properties: conditions: - description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore + description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore. items: description: |- ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in @@ -2091,7 +2091,7 @@ spec: type: object github: description: |- - Github configures this store to push GitHub Action secrets using GitHub API provider. + Github configures this store to push GitHub Actions secrets using the GitHub API provider. Note: This provider only supports write operations (PushSecret) and cannot fetch secrets from GitHub properties: appID: @@ -3039,6 +3039,48 @@ spec: - clientSecret type: object type: object + caBundle: + description: |- + CABundle is a PEM-encoded CA certificate bundle used to validate + the Infisical server's TLS certificate. Mutually exclusive with CAProvider. + format: byte + type: string + caProvider: + description: |- + CAProvider is a reference to a Secret or ConfigMap that contains a CA certificate. + The certificate is used to validate the Infisical server's TLS certificate. + Mutually exclusive with CABundle. + properties: + key: + description: The key where the CA certificate can be found in the Secret or ConfigMap. + maxLength: 253 + minLength: 1 + pattern: ^[-._a-zA-Z0-9]+$ + type: string + name: + description: The name of the object located at the provider type. + maxLength: 253 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + namespace: + description: |- + The namespace the Provider type is in. + Can only be defined when used in a ClusterSecretStore. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + type: + description: The type of provider to use such as "Secret", or "ConfigMap". + enum: + - Secret + - ConfigMap + type: string + required: + - name + - type + type: object hostAPI: default: https://app.infisical.com/api description: HostAPI specifies the base URL of the Infisical API. If not provided, it defaults to "https://app.infisical.com/api". @@ -3932,7 +3974,7 @@ spec: - project type: object scaleway: - description: Scaleway + description: Scaleway configures this store to sync secrets using the Scaleway provider. properties: accessKey: description: AccessKey is the non-secret part of the api key. @@ -4195,7 +4237,7 @@ spec: - url type: object vault: - description: Vault configures this store to sync secrets using Hashi provider + description: Vault configures this store to sync secrets using the HashiCorp Vault provider. properties: auth: description: Auth configures how secret-manager authenticates with the Vault server. @@ -5564,7 +5606,7 @@ spec: description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config. type: integer retrySettings: - description: Used to configure http retries if failed + description: Used to configure HTTP retries on failures. properties: maxRetries: format: int32 @@ -5648,7 +5690,7 @@ spec: description: SecretStoreSpec defines the desired state of SecretStore. properties: conditions: - description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore + description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore. items: description: |- ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in @@ -7381,7 +7423,7 @@ spec: type: string type: object github: - description: Github configures this store to push Github Action secrets using Github API provider + description: Github configures this store to push GitHub Actions secrets using the GitHub API provider. properties: appID: description: appID specifies the Github APP that will be used to authenticate the client @@ -8449,7 +8491,7 @@ spec: - project type: object scaleway: - description: Scaleway + description: Scaleway configures this store to sync secrets using the Scaleway provider. properties: accessKey: description: AccessKey is the non-secret part of the api key. @@ -8669,7 +8711,7 @@ spec: - url type: object vault: - description: Vault configures this store to sync secrets using Hashi provider + description: Vault configures this store to sync secrets using the HashiCorp Vault provider. properties: auth: description: Auth configures how secret-manager authenticates with the Vault server. @@ -9755,7 +9797,7 @@ spec: description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config. type: integer retrySettings: - description: Used to configure http retries if failed + description: Used to configure HTTP retries on failures. properties: maxRetries: description: MaxRetries is the maximum number of retry attempts. diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml index 6a2c52f9c..9da9f966b 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml @@ -58,7 +58,7 @@ spec: description: SecretStoreSpec defines the desired state of SecretStore. properties: conditions: - description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore + description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore. items: description: |- ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in @@ -2091,7 +2091,7 @@ spec: type: object github: description: |- - Github configures this store to push GitHub Action secrets using GitHub API provider. + Github configures this store to push GitHub Actions secrets using the GitHub API provider. Note: This provider only supports write operations (PushSecret) and cannot fetch secrets from GitHub properties: appID: @@ -3039,6 +3039,48 @@ spec: - clientSecret type: object type: object + caBundle: + description: |- + CABundle is a PEM-encoded CA certificate bundle used to validate + the Infisical server's TLS certificate. Mutually exclusive with CAProvider. + format: byte + type: string + caProvider: + description: |- + CAProvider is a reference to a Secret or ConfigMap that contains a CA certificate. + The certificate is used to validate the Infisical server's TLS certificate. + Mutually exclusive with CABundle. + properties: + key: + description: The key where the CA certificate can be found in the Secret or ConfigMap. + maxLength: 253 + minLength: 1 + pattern: ^[-._a-zA-Z0-9]+$ + type: string + name: + description: The name of the object located at the provider type. + maxLength: 253 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + namespace: + description: |- + The namespace the Provider type is in. + Can only be defined when used in a ClusterSecretStore. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + type: + description: The type of provider to use such as "Secret", or "ConfigMap". + enum: + - Secret + - ConfigMap + type: string + required: + - name + - type + type: object hostAPI: default: https://app.infisical.com/api description: HostAPI specifies the base URL of the Infisical API. If not provided, it defaults to "https://app.infisical.com/api". @@ -3932,7 +3974,7 @@ spec: - project type: object scaleway: - description: Scaleway + description: Scaleway configures this store to sync secrets using the Scaleway provider. properties: accessKey: description: AccessKey is the non-secret part of the api key. @@ -4195,7 +4237,7 @@ spec: - url type: object vault: - description: Vault configures this store to sync secrets using Hashi provider + description: Vault configures this store to sync secrets using the HashiCorp Vault provider. properties: auth: description: Auth configures how secret-manager authenticates with the Vault server. @@ -5564,7 +5606,7 @@ spec: description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config. type: integer retrySettings: - description: Used to configure http retries if failed + description: Used to configure HTTP retries on failures. properties: maxRetries: format: int32 @@ -5648,7 +5690,7 @@ spec: description: SecretStoreSpec defines the desired state of SecretStore. properties: conditions: - description: Used to constraint a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore + description: Used to constrain a ClusterSecretStore to specific namespaces. Relevant only to ClusterSecretStore. items: description: |- ClusterSecretStoreCondition describes a condition by which to choose namespaces to process ExternalSecrets in @@ -7381,7 +7423,7 @@ spec: type: string type: object github: - description: Github configures this store to push Github Action secrets using Github API provider + description: Github configures this store to push GitHub Actions secrets using the GitHub API provider. properties: appID: description: appID specifies the Github APP that will be used to authenticate the client @@ -8449,7 +8491,7 @@ spec: - project type: object scaleway: - description: Scaleway + description: Scaleway configures this store to sync secrets using the Scaleway provider. properties: accessKey: description: AccessKey is the non-secret part of the api key. @@ -8669,7 +8711,7 @@ spec: - url type: object vault: - description: Vault configures this store to sync secrets using Hashi provider + description: Vault configures this store to sync secrets using the HashiCorp Vault provider. properties: auth: description: Auth configures how secret-manager authenticates with the Vault server. @@ -9755,7 +9797,7 @@ spec: description: Used to configure store refresh interval in seconds. Empty or 0 will default to the controller config. type: integer retrySettings: - description: Used to configure http retries if failed + description: Used to configure HTTP retries on failures. properties: maxRetries: description: MaxRetries is the maximum number of retry attempts. diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml index 32d0afe89..a267e6b47 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.2.0 + image: ghcr.io/external-secrets/external-secrets:v1.2.1 imagePullPolicy: IfNotPresent args: - certcontroller diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml index 14c0884d4..2ed6dfa49 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm spec: hostNetwork: false @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.2.0 + image: ghcr.io/external-secrets/external-secrets:v1.2.1 imagePullPolicy: IfNotPresent args: - webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml index 29601b322..0c37415c4 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v1.2.0 + image: ghcr.io/external-secrets/external-secrets:v1.2.1 imagePullPolicy: IfNotPresent args: - --concurrent=1 diff --git a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml index 5e0379b11..b70b38ccd 100644 --- a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml index 07c43b72b..8e045db99 100644 --- a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml index 788257563..fb6bf6b0f 100644 --- a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml @@ -4,9 +4,9 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml index bcbde1074..95fcd28d9 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml index 0c515b021..8f7b625fb 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml index 671a6f7ea..b9bd81c96 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml index 6584b4a2e..e429f74c7 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml index c749d5969..6cecbea77 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml @@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration metadata: name: externalsecret-validate labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook webhooks: diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml index a2c5999f9..2d27db1a2 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml @@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration metadata: name: secretstore-validate labels: - helm.sh/chart: external-secrets-1.2.0 + helm.sh/chart: external-secrets-1.2.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v1.2.0" + app.kubernetes.io/version: "v1.2.1" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook webhooks: -- 2.49.1