Skip to content

Commit 524636e

Browse files
committed
Update Helm release external-secrets to v2
Signed-off-by: Renovate Bot <tech+renovate@vshn.ch>
1 parent 9481206 commit 524636e

69 files changed

Lines changed: 10389 additions & 1333 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

class/defaults.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ parameters:
1313
charts:
1414
external-secrets:
1515
source: https://charts.external-secrets.io
16-
version: 0.18.0
16+
version: 2.0.0
1717

1818
helm_values:
1919
image:

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/cert-controller-deployment.yaml

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ metadata:
55
app.kubernetes.io/instance: external-secrets
66
app.kubernetes.io/managed-by: Helm
77
app.kubernetes.io/name: external-secrets-cert-controller
8-
app.kubernetes.io/version: v0.18.0
9-
helm.sh/chart: external-secrets-0.18.0
8+
app.kubernetes.io/version: v2.0.0
9+
helm.sh/chart: external-secrets-2.0.0
1010
name: external-secrets-cert-controller
1111
namespace: syn-external-secrets-operator
1212
spec:
@@ -22,8 +22,8 @@ spec:
2222
app.kubernetes.io/instance: external-secrets
2323
app.kubernetes.io/managed-by: Helm
2424
app.kubernetes.io/name: external-secrets-cert-controller
25-
app.kubernetes.io/version: v0.18.0
26-
helm.sh/chart: external-secrets-0.18.0
25+
app.kubernetes.io/version: v2.0.0
26+
helm.sh/chart: external-secrets-2.0.0
2727
spec:
2828
automountServiceAccountToken: true
2929
containers:
@@ -39,17 +39,20 @@ spec:
3939
- --loglevel=info
4040
- --zap-time-encoding=epoch
4141
- --enable-partial-cache=true
42-
image: oci.external-secrets.io/external-secrets/external-secrets:v0.18.0
42+
image: ghcr.io/external-secrets/external-secrets:v2.0.0
4343
imagePullPolicy: IfNotPresent
4444
name: cert-controller
4545
ports:
4646
- containerPort: 8080
4747
name: metrics
4848
protocol: TCP
49+
- containerPort: 8081
50+
name: ready
51+
protocol: TCP
4952
readinessProbe:
5053
httpGet:
5154
path: /readyz
52-
port: 8081
55+
port: ready
5356
initialDelaySeconds: 20
5457
periodSeconds: 5
5558
securityContext:

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/cert-controller-rbac.yaml

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ metadata:
55
app.kubernetes.io/instance: external-secrets
66
app.kubernetes.io/managed-by: Helm
77
app.kubernetes.io/name: external-secrets-cert-controller
8-
app.kubernetes.io/version: v0.18.0
9-
helm.sh/chart: external-secrets-0.18.0
8+
app.kubernetes.io/version: v2.0.0
9+
helm.sh/chart: external-secrets-2.0.0
1010
name: external-secrets-cert-controller
1111
rules:
1212
- apiGroups:
@@ -45,6 +45,14 @@ rules:
4545
- list
4646
- get
4747
- watch
48+
- apiGroups:
49+
- discovery.k8s.io
50+
resources:
51+
- endpointslices
52+
verbs:
53+
- list
54+
- get
55+
- watch
4856
- apiGroups:
4957
- ''
5058
resources:
@@ -79,8 +87,8 @@ metadata:
7987
app.kubernetes.io/instance: external-secrets
8088
app.kubernetes.io/managed-by: Helm
8189
app.kubernetes.io/name: external-secrets-cert-controller
82-
app.kubernetes.io/version: v0.18.0
83-
helm.sh/chart: external-secrets-0.18.0
90+
app.kubernetes.io/version: v2.0.0
91+
helm.sh/chart: external-secrets-2.0.0
8492
name: external-secrets-cert-controller
8593
roleRef:
8694
apiGroup: rbac.authorization.k8s.io

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/cert-controller-serviceaccount.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
app.kubernetes.io/instance: external-secrets
66
app.kubernetes.io/managed-by: Helm
77
app.kubernetes.io/name: external-secrets-cert-controller
8-
app.kubernetes.io/version: v0.18.0
9-
helm.sh/chart: external-secrets-0.18.0
8+
app.kubernetes.io/version: v2.0.0
9+
helm.sh/chart: external-secrets-2.0.0
1010
name: external-secrets-cert-controller
1111
namespace: syn-external-secrets-operator

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/crds/acraccesstoken.yaml

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ apiVersion: apiextensions.k8s.io/v1
22
kind: CustomResourceDefinition
33
metadata:
44
annotations:
5-
controller-gen.kubebuilder.io/version: v0.18.0
5+
controller-gen.kubebuilder.io/version: v0.19.0
66
labels:
77
external-secrets.io/component: controller
88
name: acraccesstokens.generators.external-secrets.io
@@ -55,6 +55,8 @@ spec:
5555
see: https://github.com/Azure/acr/blob/main/docs/AAD-OAuth.md#overview
5656
properties:
5757
auth:
58+
description: ACRAuth defines the authentication methods for Azure
59+
Container Registry.
5860
properties:
5961
managedIdentity:
6062
description: ManagedIdentity uses Azure Managed Identity to
@@ -71,8 +73,8 @@ spec:
7173
properties:
7274
secretRef:
7375
description: |-
74-
Configuration used to authenticate with Azure using static
75-
credentials stored in a Kind=Secret.
76+
AzureACRServicePrincipalAuthSecretRef defines the secret references for Azure Service Principal authentication.
77+
It uses static credentials stored in a Kind=Secret.
7678
properties:
7779
clientId:
7880
description: The Azure clientId of the service principle
@@ -175,14 +177,15 @@ spec:
175177
default: PublicCloud
176178
description: |-
177179
EnvironmentType specifies the Azure cloud environment endpoints to use for
178-
connecting and authenticating with Azure. By default it points to the public cloud AAD endpoint.
180+
connecting and authenticating with Azure. By default, it points to the public cloud AAD endpoint.
179181
The following endpoints are available, also see here: https://github.com/Azure/go-autorest/blob/main/autorest/azure/environments.go#L152
180182
PublicCloud, USGovernmentCloud, ChinaCloud, GermanCloud
181183
enum:
182184
- PublicCloud
183185
- USGovernmentCloud
184186
- ChinaCloud
185187
- GermanCloud
188+
- AzureStackCloud
186189
type: string
187190
registry:
188191
description: |-
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
apiVersion: apiextensions.k8s.io/v1
2+
kind: CustomResourceDefinition
3+
metadata:
4+
annotations:
5+
controller-gen.kubebuilder.io/version: v0.19.0
6+
labels:
7+
external-secrets.io/component: controller
8+
name: cloudsmithaccesstokens.generators.external-secrets.io
9+
spec:
10+
group: generators.external-secrets.io
11+
names:
12+
categories:
13+
- external-secrets
14+
- external-secrets-generators
15+
kind: CloudsmithAccessToken
16+
listKind: CloudsmithAccessTokenList
17+
plural: cloudsmithaccesstokens
18+
singular: cloudsmithaccesstoken
19+
scope: Namespaced
20+
versions:
21+
- name: v1alpha1
22+
schema:
23+
openAPIV3Schema:
24+
description: CloudsmithAccessToken generates Cloudsmith access token using
25+
OIDC authentication
26+
properties:
27+
apiVersion:
28+
description: |-
29+
APIVersion defines the versioned schema of this representation of an object.
30+
Servers should convert recognized schemas to the latest internal value, and
31+
may reject unrecognized values.
32+
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
33+
type: string
34+
kind:
35+
description: |-
36+
Kind is a string value representing the REST resource this object represents.
37+
Servers may infer this from the endpoint the client submits requests to.
38+
Cannot be updated.
39+
In CamelCase.
40+
More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
41+
type: string
42+
metadata:
43+
type: object
44+
spec:
45+
description: CloudsmithAccessTokenSpec defines the configuration for
46+
generating a Cloudsmith access token using OIDC authentication.
47+
properties:
48+
apiUrl:
49+
description: APIURL configures the Cloudsmith API URL. Defaults
50+
to https://api.cloudsmith.io.
51+
type: string
52+
orgSlug:
53+
description: OrgSlug is the organization slug in Cloudsmith
54+
type: string
55+
serviceAccountRef:
56+
description: Name of the service account you are federating with
57+
properties:
58+
audiences:
59+
description: |-
60+
Audience specifies the `aud` claim for the service account token
61+
If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
62+
then this audiences will be appended to the list
63+
items:
64+
type: string
65+
type: array
66+
name:
67+
description: The name of the ServiceAccount resource being referred
68+
to.
69+
maxLength: 253
70+
minLength: 1
71+
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
72+
type: string
73+
namespace:
74+
description: |-
75+
Namespace of the resource being referred to.
76+
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
77+
maxLength: 63
78+
minLength: 1
79+
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
80+
type: string
81+
required:
82+
- name
83+
type: object
84+
serviceSlug:
85+
description: ServiceSlug is the service slug in Cloudsmith for OIDC
86+
authentication
87+
type: string
88+
required:
89+
- orgSlug
90+
- serviceAccountRef
91+
- serviceSlug
92+
type: object
93+
type: object
94+
served: true
95+
storage: true
96+
subresources:
97+
status: {}

0 commit comments

Comments
 (0)