Automated Manifest Update - Automerge #6400

Merged
gitea-bot merged 1 commits from auto/update-manifests-automerge-6354 into manifests 2026-05-01 03:02:03 +00:00
27 changed files with 145 additions and 59 deletions

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "cert-controller"
rules:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-edit
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-servicebindings
labels:
servicebinding.io/controller: "true"
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -3,10 +3,10 @@ kind: ClusterRole
metadata:
name: external-secrets-view
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-cert-controller
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "cert-controller"
roleRef:

View File

@@ -3,10 +3,10 @@ kind: ClusterRoleBinding
metadata:
name: external-secrets-controller
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -4078,6 +4078,46 @@ spec:
- passwordSecretRef
- privateKeySecretRef
type: object
caBundle:
description: |-
PEM encoded CA bundle used to validate Passbolt server certificate. Only used
if the Host URL is using HTTPS protocol. If not set the system root certificates
are used to validate the TLS connection.
format: byte
type: string
caProvider:
description: The provider for the CA bundle to use to validate Passbolt server certificate.
properties:
key:
description: The key where the CA certificate can be found in the Secret or ConfigMap.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the object located at the provider type.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace the Provider type is in.
Can only be defined when used in a ClusterSecretStore.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type:
description: The type of provider to use such as "Secret", or "ConfigMap".
enum:
- Secret
- ConfigMap
type: string
required:
- name
- type
type: object
host:
description: Host defines the Passbolt Server to connect to
type: string

View File

@@ -4078,6 +4078,46 @@ spec:
- passwordSecretRef
- privateKeySecretRef
type: object
caBundle:
description: |-
PEM encoded CA bundle used to validate Passbolt server certificate. Only used
if the Host URL is using HTTPS protocol. If not set the system root certificates
are used to validate the TLS connection.
format: byte
type: string
caProvider:
description: The provider for the CA bundle to use to validate Passbolt server certificate.
properties:
key:
description: The key where the CA certificate can be found in the Secret or ConfigMap.
maxLength: 253
minLength: 1
pattern: ^[-._a-zA-Z0-9]+$
type: string
name:
description: The name of the object located at the provider type.
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
namespace:
description: |-
The namespace the Provider type is in.
Can only be defined when used in a ClusterSecretStore.
maxLength: 63
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
type: string
type:
description: The type of provider to use such as "Secret", or "ConfigMap".
enum:
- Secret
- ConfigMap
type: string
required:
- name
- type
type: object
host:
description: Host defines the Passbolt Server to connect to
type: string

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "cert-controller"
spec:
@@ -20,10 +20,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "cert-controller"
spec:
@@ -42,7 +42,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.4.0@sha256:d2b74514f63f5b55360d08351f1fe5af3b1db794a81fa10389abe2ff2999c566
image: ghcr.io/external-secrets/external-secrets:v2.4.1@sha256:9440a40b394791a5e93f3f7e1b33399ecbdc0e38273de1d69ed83fe12936fc09
imagePullPolicy: IfNotPresent
args:
- certcontroller
@@ -70,6 +70,9 @@ spec:
path: /readyz
initialDelaySeconds: 20
periodSeconds: 5
timeoutSeconds: 5
failureThreshold: 3
successThreshold: 1
resources:
requests:
cpu: 1m

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "webhook"
spec:
@@ -20,10 +20,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "webhook"
spec:
@@ -42,7 +42,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.4.0@sha256:d2b74514f63f5b55360d08351f1fe5af3b1db794a81fa10389abe2ff2999c566
image: ghcr.io/external-secrets/external-secrets:v2.4.1@sha256:9440a40b394791a5e93f3f7e1b33399ecbdc0e38273de1d69ed83fe12936fc09
imagePullPolicy: IfNotPresent
args:
- webhook
@@ -70,6 +70,9 @@ spec:
path: /readyz
initialDelaySeconds: 20
periodSeconds: 5
timeoutSeconds: 5
failureThreshold: 3
successThreshold: 1
resources:
requests:
cpu: 1m

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 3
@@ -19,10 +19,10 @@ spec:
template:
metadata:
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets
@@ -40,7 +40,7 @@ spec:
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
image: ghcr.io/external-secrets/external-secrets:v2.4.0@sha256:d2b74514f63f5b55360d08351f1fe5af3b1db794a81fa10389abe2ff2999c566
image: ghcr.io/external-secrets/external-secrets:v2.4.1@sha256:9440a40b394791a5e93f3f7e1b33399ecbdc0e38273de1d69ed83fe12936fc09
imagePullPolicy: IfNotPresent
args:
- --enable-leader-election=true

View File

@@ -4,10 +4,10 @@ metadata:
name: "external-secrets-pdb"
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
spec:
minAvailable: 1

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-leaderelection
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "webhook"
external-secrets.io/component: webhook

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-cert-controller-metrics
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "cert-controller"
spec:

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-metrics
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
spec:
type: ClusterIP

View File

@@ -4,10 +4,10 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "webhook"
external-secrets.io/component: webhook

View File

@@ -4,9 +4,9 @@ metadata:
name: external-secrets-cert-controller
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "cert-controller"

View File

@@ -4,9 +4,9 @@ metadata:
name: external-secrets-webhook
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "webhook"

View File

@@ -4,8 +4,8 @@ metadata:
name: external-secrets
namespace: external-secrets
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm

View File

@@ -2,10 +2,10 @@ apiVersion: "monitoring.coreos.com/v1"
kind: ServiceMonitor
metadata:
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "cert-controller"
name: external-secrets-cert-controller-metrics

View File

@@ -2,10 +2,10 @@ apiVersion: "monitoring.coreos.com/v1"
kind: ServiceMonitor
metadata:
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
name: external-secrets-metrics
namespace: "external-secrets"

View File

@@ -2,10 +2,10 @@ apiVersion: "monitoring.coreos.com/v1"
kind: ServiceMonitor
metadata:
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "webhook"
name: external-secrets-webhook-metrics

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: externalsecret-validate
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "webhook"
external-secrets.io/component: webhook

View File

@@ -3,10 +3,10 @@ kind: ValidatingWebhookConfiguration
metadata:
name: secretstore-validate
labels:
helm.sh/chart: external-secrets-2.4.0
helm.sh/chart: external-secrets-2.4.1
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/version: "v2.4.0"
app.kubernetes.io/version: "v2.4.1"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/metrics: "webhook"
external-secrets.io/component: webhook