1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00

bump 0.9.9 (#2872)

Signed-off-by: rogertuma <tumaroger@gmail.com>
This commit is contained in:
Roger 2023-11-13 16:05:17 -03:00 committed by GitHub
parent beabdb2f28
commit 80f780a8fa
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
6 changed files with 66 additions and 20 deletions

View file

@ -2,8 +2,8 @@ apiVersion: v2
name: external-secrets
description: External secret management for Kubernetes
type: application
version: "0.9.8"
appVersion: "v0.9.8"
version: "0.9.9"
appVersion: "v0.9.9"
kubeVersion: ">= 1.19.0-0"
keywords:
- kubernetes-external-secrets

View file

@ -4,7 +4,7 @@
[//]: # (README.md generated by gotmpl. DO NOT EDIT.)
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.8](https://img.shields.io/badge/Version-0.9.8-informational?style=flat-square)
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.9](https://img.shields.io/badge/Version-0.9.9-informational?style=flat-square)
External secret management for Kubernetes

View file

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.8
app.kubernetes.io/version: v0.9.9
helm.sh/chart: external-secrets-0.9.9
name: RELEASE-NAME-external-secrets-cert-controller
namespace: NAMESPACE
spec:
@ -24,8 +24,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.8
app.kubernetes.io/version: v0.9.9
helm.sh/chart: external-secrets-0.9.9
spec:
automountServiceAccountToken: true
containers:
@ -38,7 +38,7 @@ should match snapshot of default values:
- --secret-namespace=NAMESPACE
- --metrics-addr=:8080
- --healthz-addr=:8081
image: ghcr.io/external-secrets/external-secrets:v0.9.8
image: ghcr.io/external-secrets/external-secrets:v0.9.9
imagePullPolicy: IfNotPresent
name: cert-controller
ports:

View file

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets
app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.8
app.kubernetes.io/version: v0.9.9
helm.sh/chart: external-secrets-0.9.9
name: RELEASE-NAME-external-secrets
namespace: NAMESPACE
spec:
@ -24,14 +24,14 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets
app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.8
app.kubernetes.io/version: v0.9.9
helm.sh/chart: external-secrets-0.9.9
spec:
automountServiceAccountToken: true
containers:
- args:
- --concurrent=1
image: ghcr.io/external-secrets/external-secrets:v0.9.8
image: ghcr.io/external-secrets/external-secrets:v0.9.9
imagePullPolicy: IfNotPresent
name: external-secrets
ports:

View file

@ -708,12 +708,35 @@ should match snapshot of default values:
- tenancy
- user
type: object
compartment:
description: Compartment is the vault compartment OCID. Required for PushSecret
type: string
encryptionKey:
description: EncryptionKey is the OCID of the encryption key within the vault. Required for PushSecret
type: string
principalType:
description: The type of principal to use for authentication. If left blank, the Auth struct will determine the principal type. This optional field must be specified if using workload identity.
type: string
region:
description: Region is the region where vault is located.
type: string
serviceAccountRef:
description: ServiceAccountRef specified the service account that should be used when authenticating with WorkloadIdentity.
properties:
audiences:
description: Audience specifies the `aud` claim for the service account token If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity then this audiences will be appended to the list
items:
type: string
type: array
name:
description: The name of the ServiceAccount resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
required:
- name
type: object
vault:
description: Vault is the vault's OCID of the specific vault where secret is located.
type: string
@ -2229,12 +2252,35 @@ should match snapshot of default values:
- tenancy
- user
type: object
compartment:
description: Compartment is the vault compartment OCID. Required for PushSecret
type: string
encryptionKey:
description: EncryptionKey is the OCID of the encryption key within the vault. Required for PushSecret
type: string
principalType:
description: The type of principal to use for authentication. If left blank, the Auth struct will determine the principal type. This optional field must be specified if using workload identity.
type: string
region:
description: Region is the region where vault is located.
type: string
serviceAccountRef:
description: ServiceAccountRef specified the service account that should be used when authenticating with WorkloadIdentity.
properties:
audiences:
description: Audience specifies the `aud` claim for the service account token If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity then this audiences will be appended to the list
items:
type: string
type: array
name:
description: The name of the ServiceAccount resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
required:
- name
type: object
vault:
description: Vault is the vault's OCID of the specific vault where secret is located.
type: string

View file

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.8
app.kubernetes.io/version: v0.9.9
helm.sh/chart: external-secrets-0.9.9
name: RELEASE-NAME-external-secrets-webhook
namespace: NAMESPACE
spec:
@ -24,8 +24,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.8
helm.sh/chart: external-secrets-0.9.8
app.kubernetes.io/version: v0.9.9
helm.sh/chart: external-secrets-0.9.9
spec:
automountServiceAccountToken: true
containers:
@ -37,7 +37,7 @@ should match snapshot of default values:
- --check-interval=5m
- --metrics-addr=:8080
- --healthz-addr=:8081
image: ghcr.io/external-secrets/external-secrets:v0.9.8
image: ghcr.io/external-secrets/external-secrets:v0.9.9
imagePullPolicy: IfNotPresent
name: webhook
ports:
@ -81,8 +81,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.8
app.kubernetes.io/version: v0.9.9
external-secrets.io/component: webhook
helm.sh/chart: external-secrets-0.9.8
helm.sh/chart: external-secrets-0.9.9
name: RELEASE-NAME-external-secrets-webhook
namespace: NAMESPACE