Skip to content

Commit b623f64

Browse files
committed
Update Helm release external-secrets to v0.19.1
Signed-off-by: Renovate Bot <[email protected]>
1 parent adbf41b commit b623f64

39 files changed

+3001
-175
lines changed

class/defaults.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ parameters:
1313
charts:
1414
external-secrets:
1515
source: https://charts.external-secrets.io
16-
version: 0.18.0
16+
version: 0.19.1
1717

1818
helm_values:
1919
image:

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/cert-controller-deployment.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ metadata:
55
app.kubernetes.io/instance: external-secrets
66
app.kubernetes.io/managed-by: Helm
77
app.kubernetes.io/name: external-secrets-cert-controller
8-
app.kubernetes.io/version: v0.18.0
9-
helm.sh/chart: external-secrets-0.18.0
8+
app.kubernetes.io/version: v0.19.1
9+
helm.sh/chart: external-secrets-0.19.1
1010
name: external-secrets-cert-controller
1111
namespace: syn-external-secrets-operator
1212
spec:
@@ -22,8 +22,8 @@ spec:
2222
app.kubernetes.io/instance: external-secrets
2323
app.kubernetes.io/managed-by: Helm
2424
app.kubernetes.io/name: external-secrets-cert-controller
25-
app.kubernetes.io/version: v0.18.0
26-
helm.sh/chart: external-secrets-0.18.0
25+
app.kubernetes.io/version: v0.19.1
26+
helm.sh/chart: external-secrets-0.19.1
2727
spec:
2828
automountServiceAccountToken: true
2929
containers:
@@ -39,7 +39,7 @@ spec:
3939
- --loglevel=info
4040
- --zap-time-encoding=epoch
4141
- --enable-partial-cache=true
42-
image: oci.external-secrets.io/external-secrets/external-secrets:v0.18.0
42+
image: oci.external-secrets.io/external-secrets/external-secrets:v0.19.1
4343
imagePullPolicy: IfNotPresent
4444
name: cert-controller
4545
ports:

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/cert-controller-rbac.yaml

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ metadata:
55
app.kubernetes.io/instance: external-secrets
66
app.kubernetes.io/managed-by: Helm
77
app.kubernetes.io/name: external-secrets-cert-controller
8-
app.kubernetes.io/version: v0.18.0
9-
helm.sh/chart: external-secrets-0.18.0
8+
app.kubernetes.io/version: v0.19.1
9+
helm.sh/chart: external-secrets-0.19.1
1010
name: external-secrets-cert-controller
1111
rules:
1212
- apiGroups:
@@ -45,6 +45,14 @@ rules:
4545
- list
4646
- get
4747
- watch
48+
- apiGroups:
49+
- discovery.k8s.io
50+
resources:
51+
- endpointslices
52+
verbs:
53+
- list
54+
- get
55+
- watch
4856
- apiGroups:
4957
- ''
5058
resources:
@@ -79,8 +87,8 @@ metadata:
7987
app.kubernetes.io/instance: external-secrets
8088
app.kubernetes.io/managed-by: Helm
8189
app.kubernetes.io/name: external-secrets-cert-controller
82-
app.kubernetes.io/version: v0.18.0
83-
helm.sh/chart: external-secrets-0.18.0
90+
app.kubernetes.io/version: v0.19.1
91+
helm.sh/chart: external-secrets-0.19.1
8492
name: external-secrets-cert-controller
8593
roleRef:
8694
apiGroup: rbac.authorization.k8s.io

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/cert-controller-serviceaccount.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
app.kubernetes.io/instance: external-secrets
66
app.kubernetes.io/managed-by: Helm
77
app.kubernetes.io/name: external-secrets-cert-controller
8-
app.kubernetes.io/version: v0.18.0
9-
helm.sh/chart: external-secrets-0.18.0
8+
app.kubernetes.io/version: v0.19.1
9+
helm.sh/chart: external-secrets-0.19.1
1010
name: external-secrets-cert-controller
1111
namespace: syn-external-secrets-operator

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/crds/clusterexternalsecret.yaml

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,7 @@ spec:
170170
- GithubAccessToken
171171
- QuayAccessToken
172172
- Password
173+
- SSHKey
173174
- STSSessionToken
174175
- UUID
175176
- VaultDynamicSecret
@@ -306,7 +307,37 @@ spec:
306307
Used to rewrite secret Keys after getting them from the secret Provider
307308
Multiple Rewrite operations can be provided. They are applied in a layered order (first to last)
308309
items:
310+
maxProperties: 1
311+
minProperties: 1
309312
properties:
313+
merge:
314+
description: |-
315+
Used to merge key/values in one single Secret
316+
The resulting key will contain all values from the specified secrets
317+
properties:
318+
conflictPolicy:
319+
default: Error
320+
description: Used to define the policy to use
321+
in conflict resolution.
322+
type: string
323+
into:
324+
default: ''
325+
description: |-
326+
Used to define the target key of the merge operation.
327+
Required if strategy is JSON. Ignored otherwise.
328+
type: string
329+
priority:
330+
description: Used to define key priority in
331+
conflict resolution.
332+
items:
333+
type: string
334+
type: array
335+
strategy:
336+
default: Extract
337+
description: Used to define the strategy to
338+
use in the merge operation.
339+
type: string
340+
type: object
310341
regexp:
311342
description: |-
312343
Used to rewrite with regular expressions.
@@ -371,6 +402,7 @@ spec:
371402
- GithubAccessToken
372403
- QuayAccessToken
373404
- Password
405+
- SSHKey
374406
- STSSessionToken
375407
- UUID
376408
- VaultDynamicSecret
@@ -938,6 +970,7 @@ spec:
938970
- GithubAccessToken
939971
- QuayAccessToken
940972
- Password
973+
- SSHKey
941974
- STSSessionToken
942975
- UUID
943976
- VaultDynamicSecret
@@ -1073,6 +1106,8 @@ spec:
10731106
Used to rewrite secret Keys after getting them from the secret Provider
10741107
Multiple Rewrite operations can be provided. They are applied in a layered order (first to last)
10751108
items:
1109+
maxProperties: 1
1110+
minProperties: 1
10761111
properties:
10771112
regexp:
10781113
description: |-
@@ -1138,6 +1173,7 @@ spec:
11381173
- GithubAccessToken
11391174
- QuayAccessToken
11401175
- Password
1176+
- SSHKey
11411177
- STSSessionToken
11421178
- UUID
11431179
- VaultDynamicSecret

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/crds/clustergenerator.yaml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -753,6 +753,30 @@ spec:
753753
- robotAccount
754754
- serviceAccountRef
755755
type: object
756+
sshKeySpec:
757+
description: SSHKeySpec controls the behavior of the ssh key
758+
generator.
759+
properties:
760+
comment:
761+
description: Comment specifies an optional comment for the
762+
SSH key
763+
type: string
764+
keySize:
765+
description: |-
766+
KeySize specifies the key size for RSA keys (default: 2048)
767+
For RSA keys: 2048, 3072, 4096
768+
Ignored for ed25519 keys
769+
maximum: 8192
770+
minimum: 256
771+
type: integer
772+
keyType:
773+
default: rsa
774+
description: KeyType specifies the SSH key type (rsa, ed25519)
775+
enum:
776+
- rsa
777+
- ed25519
778+
type: string
779+
type: object
756780
stsSessionTokenSpec:
757781
properties:
758782
auth:
@@ -1956,6 +1980,7 @@ spec:
19561980
- GithubAccessToken
19571981
- QuayAccessToken
19581982
- Password
1983+
- SSHKey
19591984
- STSSessionToken
19601985
- UUID
19611986
- VaultDynamicSecret

tests/golden/defaults/external-secrets-operator/external-secrets-operator/10_helm_chart/external-secrets/templates/crds/clusterpushsecret.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -270,6 +270,7 @@ spec:
270270
- GithubAccessToken
271271
- QuayAccessToken
272272
- Password
273+
- SSHKey
273274
- STSSessionToken
274275
- UUID
275276
- VaultDynamicSecret

0 commit comments

Comments
 (0)