Automated Manifest Update #4929

Merged
alexlebens merged 3 commits from auto/update-manifests into manifests 2026-03-20 21:55:19 +00:00
26 changed files with 71 additions and 47 deletions
Showing only changes of commit 7e45422d04 - Show all commits

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-edit
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-servicebindings
labels:
servicebinding.io/controller: "true"
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-view
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -665,6 +665,7 @@ spec:
namespaceSelector:
description: |-
The labels to select by to find the Namespaces to create the ExternalSecrets in.
Deprecated: Use NamespaceSelectors instead.
properties:
matchExpressions:
@@ -761,6 +762,7 @@ spec:
namespaces:
description: |-
Choose namespaces by name. This field is ORed with anything that NamespaceSelectors ends up choosing.
Deprecated: Use NamespaceSelectors instead.
items:
maxLength: 63
@@ -1494,6 +1496,7 @@ spec:
namespaces:
description: |-
Choose namespaces by name. This field is ORed with anything that NamespaceSelectors ends up choosing.
Deprecated: Use NamespaceSelectors instead.
items:
maxLength: 63

View File

@@ -1545,6 +1545,7 @@ spec:
Optional audiences field that will be used to request a temporary Kubernetes service
account token for the service account referenced by `serviceAccountRef`.
Defaults to a single audience `vault` it not specified.
Deprecated: use serviceAccountRef.Audiences instead
items:
type: string
@@ -1554,6 +1555,7 @@ spec:
Optional expiration time in seconds that will be used to request a temporary
Kubernetes service account token for the service account referenced by
`serviceAccountRef`.
Deprecated: this will be removed in the future.
Defaults to 10 minutes.
format: int64

View File

@@ -4761,6 +4761,7 @@ spec:
Optional audiences field that will be used to request a temporary Kubernetes service
account token for the service account referenced by `serviceAccountRef`.
Defaults to a single audience `vault` it not specified.
Deprecated: use serviceAccountRef.Audiences instead
items:
type: string
@@ -4770,6 +4771,7 @@ spec:
Optional expiration time in seconds that will be used to request a temporary
Kubernetes service account token for the service account referenced by
`serviceAccountRef`.
Deprecated: this will be removed in the future.
Defaults to 10 minutes.
format: int64
@@ -9105,6 +9107,7 @@ spec:
Optional audiences field that will be used to request a temporary Kubernetes service
account token for the service account referenced by `serviceAccountRef`.
Defaults to a single audience `vault` it not specified.
Deprecated: use serviceAccountRef.Audiences instead
items:
type: string
@@ -9114,6 +9117,7 @@ spec:
Optional expiration time in seconds that will be used to request a temporary
Kubernetes service account token for the service account referenced by
`serviceAccountRef`.
Deprecated: this will be removed in the future.
Defaults to 10 minutes.
format: int64

View File

@@ -35,6 +35,9 @@ spec:
- jsonPath: .status.conditions[?(@.type=="Ready")].status
name: Ready
type: string
- jsonPath: .status.refreshTime
name: Last Sync
type: date
name: v1
schema:
openAPIV3Schema:
@@ -725,6 +728,9 @@ spec:
- jsonPath: .status.conditions[?(@.type=="Ready")].status
name: Ready
type: string
- jsonPath: .status.refreshTime
name: Last Sync
type: date
deprecated: true
name: v1beta1
schema:

View File

@@ -26,6 +26,9 @@ spec:
- jsonPath: .status.conditions[?(@.type=="Ready")].reason
name: Status
type: string
- jsonPath: .status.refreshTime
name: Last Sync
type: date
name: v1alpha1
schema:
openAPIV3Schema:

View File

@@ -4761,6 +4761,7 @@ spec:
Optional audiences field that will be used to request a temporary Kubernetes service
account token for the service account referenced by `serviceAccountRef`.
Defaults to a single audience `vault` it not specified.
Deprecated: use serviceAccountRef.Audiences instead
items:
type: string
@@ -4770,6 +4771,7 @@ spec:
Optional expiration time in seconds that will be used to request a temporary
Kubernetes service account token for the service account referenced by
`serviceAccountRef`.
Deprecated: this will be removed in the future.
Defaults to 10 minutes.
format: int64
@@ -9105,6 +9107,7 @@ spec:
Optional audiences field that will be used to request a temporary Kubernetes service
account token for the service account referenced by `serviceAccountRef`.
Defaults to a single audience `vault` it not specified.
Deprecated: use serviceAccountRef.Audiences instead
items:
type: string
@@ -9114,6 +9117,7 @@ spec:
Optional expiration time in seconds that will be used to request a temporary
Kubernetes service account token for the service account referenced by
`serviceAccountRef`.
Deprecated: this will be removed in the future.
Defaults to 10 minutes.
format: int64

View File

@@ -501,6 +501,7 @@ spec:
Optional audiences field that will be used to request a temporary Kubernetes service
account token for the service account referenced by `serviceAccountRef`.
Defaults to a single audience `vault` it not specified.
Deprecated: use serviceAccountRef.Audiences instead
items:
type: string
@@ -510,6 +511,7 @@ spec:
Optional expiration time in seconds that will be used to request a temporary
Kubernetes service account token for the service account referenced by
`serviceAccountRef`.
Deprecated: this will be removed in the future.
Defaults to 10 minutes.
format: int64

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets-cert-controller
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.1.0
image: ghcr.io/external-secrets/external-secrets:v2.2.0
imagePullPolicy: IfNotPresent
args:
- certcontroller

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
spec:
hostNetwork: false
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.1.0
image: ghcr.io/external-secrets/external-secrets:v2.2.0
imagePullPolicy: IfNotPresent
args:
- webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.1.0
image: ghcr.io/external-secrets/external-secrets:v2.2.0
imagePullPolicy: IfNotPresent
args:
- --concurrent=1

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -4,9 +4,9 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
spec:

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: externalsecret-validate
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks:

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: secretstore-validate
labels:
helm.sh/chart: external-secrets-2.1.0
helm.sh/chart: external-secrets-2.2.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.1.0"
app.kubernetes.io/version: "v2.2.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks: