From fe87a80d4eeb670200e4c8aeeb7c3e37d4b3ea4a Mon Sep 17 00:00:00 2001 From: gitea-bot Date: Fri, 1 May 2026 03:01:38 +0000 Subject: [PATCH] chore: Update manifests after automerge --- ...Role-external-secrets-cert-controller.yaml | 4 +- ...usterRole-external-secrets-controller.yaml | 4 +- .../ClusterRole-external-secrets-edit.yaml | 4 +- ...Role-external-secrets-servicebindings.yaml | 4 +- .../ClusterRole-external-secrets-view.yaml | 4 +- ...ding-external-secrets-cert-controller.yaml | 4 +- ...leBinding-external-secrets-controller.yaml | 4 +- ...ustersecretstores.external-secrets.io.yaml | 40 +++++++++++++++++++ ...tion-secretstores.external-secrets.io.yaml | 40 +++++++++++++++++++ ...ment-external-secrets-cert-controller.yaml | 13 +++--- .../Deployment-external-secrets-webhook.yaml | 13 +++--- .../Deployment-external-secrets.yaml | 10 ++--- ...DisruptionBudget-external-secrets-pdb.yaml | 4 +- .../Role-external-secrets-leaderelection.yaml | 4 +- ...nding-external-secrets-leaderelection.yaml | 4 +- .../Secret-external-secrets-webhook.yaml | 4 +- ...ernal-secrets-cert-controller-metrics.yaml | 4 +- .../Service-external-secrets-metrics.yaml | 4 +- .../Service-external-secrets-webhook.yaml | 4 +- ...ount-external-secrets-cert-controller.yaml | 4 +- ...rviceAccount-external-secrets-webhook.yaml | 4 +- .../ServiceAccount-external-secrets.yaml | 4 +- ...ernal-secrets-cert-controller-metrics.yaml | 4 +- ...rviceMonitor-external-secrets-metrics.yaml | 4 +- ...itor-external-secrets-webhook-metrics.yaml | 4 +- ...Configuration-externalsecret-validate.yaml | 4 +- ...ookConfiguration-secretstore-validate.yaml | 4 +- 27 files changed, 145 insertions(+), 59 deletions(-) diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml index c7f583e8c..ff52e051b 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-cert-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "cert-controller" rules: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml index a20cdef77..1f2654c86 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml index cc62ae003..c96e31a03 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-edit.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-edit labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml index 91d78b21e..352645a61 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-servicebindings.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml index c0777295f..cb2308c7c 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRole-external-secrets-view.yaml @@ -3,10 +3,10 @@ kind: ClusterRole metadata: name: external-secrets-view labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml index 5e4560cc4..4439909a6 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-cert-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "cert-controller" roleRef: diff --git a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml index a97e906b4..3a8ce9fe1 100644 --- a/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ClusterRoleBinding-external-secrets-controller.yaml @@ -3,10 +3,10 @@ kind: ClusterRoleBinding metadata: name: external-secrets-controller labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml index d2a4b003a..55c89b635 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml @@ -4078,6 +4078,46 @@ spec: - passwordSecretRef - privateKeySecretRef type: object + caBundle: + description: |- + PEM encoded CA bundle used to validate Passbolt server certificate. Only used + if the Host URL is using HTTPS protocol. If not set the system root certificates + are used to validate the TLS connection. + format: byte + type: string + caProvider: + description: The provider for the CA bundle to use to validate Passbolt server certificate. + properties: + key: + description: The key where the CA certificate can be found in the Secret or ConfigMap. + maxLength: 253 + minLength: 1 + pattern: ^[-._a-zA-Z0-9]+$ + type: string + name: + description: The name of the object located at the provider type. + maxLength: 253 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + namespace: + description: |- + The namespace the Provider type is in. + Can only be defined when used in a ClusterSecretStore. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + type: + description: The type of provider to use such as "Secret", or "ConfigMap". + enum: + - Secret + - ConfigMap + type: string + required: + - name + - type + type: object host: description: Host defines the Passbolt Server to connect to type: string diff --git a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml index 7fa208548..489a2ae3c 100644 --- a/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml +++ b/clusters/cl01tl/manifests/external-secrets/CustomResourceDefinition-secretstores.external-secrets.io.yaml @@ -4078,6 +4078,46 @@ spec: - passwordSecretRef - privateKeySecretRef type: object + caBundle: + description: |- + PEM encoded CA bundle used to validate Passbolt server certificate. Only used + if the Host URL is using HTTPS protocol. If not set the system root certificates + are used to validate the TLS connection. + format: byte + type: string + caProvider: + description: The provider for the CA bundle to use to validate Passbolt server certificate. + properties: + key: + description: The key where the CA certificate can be found in the Secret or ConfigMap. + maxLength: 253 + minLength: 1 + pattern: ^[-._a-zA-Z0-9]+$ + type: string + name: + description: The name of the object located at the provider type. + maxLength: 253 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$ + type: string + namespace: + description: |- + The namespace the Provider type is in. + Can only be defined when used in a ClusterSecretStore. + maxLength: 63 + minLength: 1 + pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$ + type: string + type: + description: The type of provider to use such as "Secret", or "ConfigMap". + enum: + - Secret + - ConfigMap + type: string + required: + - name + - type + type: object host: description: Host defines the Passbolt Server to connect to type: string diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml index a6d70e8ec..a68e71e47 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-cert-controller.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "cert-controller" spec: @@ -20,10 +20,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "cert-controller" spec: @@ -42,7 +42,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v2.4.0@sha256:d2b74514f63f5b55360d08351f1fe5af3b1db794a81fa10389abe2ff2999c566 + image: ghcr.io/external-secrets/external-secrets:v2.4.1@sha256:9440a40b394791a5e93f3f7e1b33399ecbdc0e38273de1d69ed83fe12936fc09 imagePullPolicy: IfNotPresent args: - certcontroller @@ -70,6 +70,9 @@ spec: path: /readyz initialDelaySeconds: 20 periodSeconds: 5 + timeoutSeconds: 5 + failureThreshold: 3 + successThreshold: 1 resources: requests: cpu: 1m diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml index 3dae2e348..dc986ea75 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "webhook" spec: @@ -20,10 +20,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "webhook" spec: @@ -42,7 +42,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v2.4.0@sha256:d2b74514f63f5b55360d08351f1fe5af3b1db794a81fa10389abe2ff2999c566 + image: ghcr.io/external-secrets/external-secrets:v2.4.1@sha256:9440a40b394791a5e93f3f7e1b33399ecbdc0e38273de1d69ed83fe12936fc09 imagePullPolicy: IfNotPresent args: - webhook @@ -70,6 +70,9 @@ spec: path: /readyz initialDelaySeconds: 20 periodSeconds: 5 + timeoutSeconds: 5 + failureThreshold: 3 + successThreshold: 1 resources: requests: cpu: 1m diff --git a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml index 8c50943aa..d7a97c74a 100644 --- a/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Deployment-external-secrets.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm spec: replicas: 3 @@ -19,10 +19,10 @@ spec: template: metadata: labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets @@ -40,7 +40,7 @@ spec: runAsUser: 1000 seccompProfile: type: RuntimeDefault - image: ghcr.io/external-secrets/external-secrets:v2.4.0@sha256:d2b74514f63f5b55360d08351f1fe5af3b1db794a81fa10389abe2ff2999c566 + image: ghcr.io/external-secrets/external-secrets:v2.4.1@sha256:9440a40b394791a5e93f3f7e1b33399ecbdc0e38273de1d69ed83fe12936fc09 imagePullPolicy: IfNotPresent args: - --enable-leader-election=true diff --git a/clusters/cl01tl/manifests/external-secrets/PodDisruptionBudget-external-secrets-pdb.yaml b/clusters/cl01tl/manifests/external-secrets/PodDisruptionBudget-external-secrets-pdb.yaml index 153a17101..f337186ed 100644 --- a/clusters/cl01tl/manifests/external-secrets/PodDisruptionBudget-external-secrets-pdb.yaml +++ b/clusters/cl01tl/manifests/external-secrets/PodDisruptionBudget-external-secrets-pdb.yaml @@ -4,10 +4,10 @@ metadata: name: "external-secrets-pdb" namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm spec: minAvailable: 1 diff --git a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml index 063f3cf45..41e40c9fc 100644 --- a/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Role-external-secrets-leaderelection.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm rules: - apiGroups: diff --git a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml index 57c258f80..55452eb3a 100644 --- a/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml +++ b/clusters/cl01tl/manifests/external-secrets/RoleBinding-external-secrets-leaderelection.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-leaderelection namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io diff --git a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml index 879a79949..5df4ec20d 100644 --- a/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Secret-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml index 066030310..85af2e1e6 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-cert-controller-metrics.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-cert-controller-metrics namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "cert-controller" spec: diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml index 7f09fe6bd..859da7dd3 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-metrics.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-metrics namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm spec: type: ClusterIP diff --git a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml index 1ce6459ab..2ce73be3a 100644 --- a/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/Service-external-secrets-webhook.yaml @@ -4,10 +4,10 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml index 713715cbc..37ec7c945 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-cert-controller.yaml @@ -4,9 +4,9 @@ metadata: name: external-secrets-cert-controller namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "cert-controller" diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml index 7abac9d1f..5bbe89f66 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets-webhook.yaml @@ -4,9 +4,9 @@ metadata: name: external-secrets-webhook namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "webhook" diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml index d90753e45..8879919fb 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceAccount-external-secrets.yaml @@ -4,8 +4,8 @@ metadata: name: external-secrets namespace: external-secrets labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml index 898c52db4..c9af61519 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-cert-controller-metrics.yaml @@ -2,10 +2,10 @@ apiVersion: "monitoring.coreos.com/v1" kind: ServiceMonitor metadata: labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "cert-controller" name: external-secrets-cert-controller-metrics diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml index 352a27709..cbcefb494 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-metrics.yaml @@ -2,10 +2,10 @@ apiVersion: "monitoring.coreos.com/v1" kind: ServiceMonitor metadata: labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm name: external-secrets-metrics namespace: "external-secrets" diff --git a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml index 0d85611c5..211c1654b 100644 --- a/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ServiceMonitor-external-secrets-webhook-metrics.yaml @@ -2,10 +2,10 @@ apiVersion: "monitoring.coreos.com/v1" kind: ServiceMonitor metadata: labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "webhook" name: external-secrets-webhook-metrics diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml index 62205ed90..a6ddd55cf 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-externalsecret-validate.yaml @@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration metadata: name: externalsecret-validate labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook diff --git a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml index 3706f2106..578085906 100644 --- a/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml +++ b/clusters/cl01tl/manifests/external-secrets/ValidatingWebhookConfiguration-secretstore-validate.yaml @@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration metadata: name: secretstore-validate labels: - helm.sh/chart: external-secrets-2.4.0 + helm.sh/chart: external-secrets-2.4.1 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: external-secrets - app.kubernetes.io/version: "v2.4.0" + app.kubernetes.io/version: "v2.4.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/metrics: "webhook" external-secrets.io/component: webhook -- 2.49.1