Browse Source

chore: update helm charts v0.20.1 (#5352)

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>

On-behalf-of: Gergely Brautigam <gergely.brautigam@sap.com>
Gergely Brautigam 6 months ago
parent
commit
29141ffe9e

+ 2 - 2
deploy/charts/external-secrets/Chart.yaml

@@ -2,8 +2,8 @@ apiVersion: v2
 name: external-secrets
 name: external-secrets
 description: External secrets management for Kubernetes
 description: External secrets management for Kubernetes
 type: application
 type: application
-version: "0.19.2"
-appVersion: "v0.19.2"
+version: "0.20.1"
+appVersion: "v0.20.1"
 kubeVersion: ">= 1.19.0-0"
 kubeVersion: ">= 1.19.0-0"
 keywords:
 keywords:
   - kubernetes-external-secrets
   - kubernetes-external-secrets

+ 1 - 1
deploy/charts/external-secrets/README.md

@@ -4,7 +4,7 @@
 
 
 [//]: # (README.md generated by gotmpl. DO NOT EDIT.)
 [//]: # (README.md generated by gotmpl. DO NOT EDIT.)
 
 
-![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.19.2](https://img.shields.io/badge/Version-0.19.2-informational?style=flat-square)
+![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.20.1](https://img.shields.io/badge/Version-0.20.1-informational?style=flat-square)
 
 
 External secrets management for Kubernetes
 External secrets management for Kubernetes
 
 

+ 4 - 4
deploy/charts/external-secrets/tests/__snapshot__/cert_controller_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-cert-controller
         app.kubernetes.io/name: external-secrets-cert-controller
-        app.kubernetes.io/version: v0.19.2
-        helm.sh/chart: external-secrets-0.19.2
+        app.kubernetes.io/version: v0.20.1
+        helm.sh/chart: external-secrets-0.20.1
       name: RELEASE-NAME-external-secrets-cert-controller
       name: RELEASE-NAME-external-secrets-cert-controller
       namespace: NAMESPACE
       namespace: NAMESPACE
     spec:
     spec:
@@ -24,8 +24,8 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets-cert-controller
             app.kubernetes.io/name: external-secrets-cert-controller
-            app.kubernetes.io/version: v0.19.2
-            helm.sh/chart: external-secrets-0.19.2
+            app.kubernetes.io/version: v0.20.1
+            helm.sh/chart: external-secrets-0.20.1
         spec:
         spec:
           automountServiceAccountToken: true
           automountServiceAccountToken: true
           containers:
           containers:

+ 4 - 4
deploy/charts/external-secrets/tests/__snapshot__/controller_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets
         app.kubernetes.io/name: external-secrets
-        app.kubernetes.io/version: v0.19.2
-        helm.sh/chart: external-secrets-0.19.2
+        app.kubernetes.io/version: v0.20.1
+        helm.sh/chart: external-secrets-0.20.1
       name: RELEASE-NAME-external-secrets
       name: RELEASE-NAME-external-secrets
       namespace: NAMESPACE
       namespace: NAMESPACE
     spec:
     spec:
@@ -24,8 +24,8 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets
             app.kubernetes.io/name: external-secrets
-            app.kubernetes.io/version: v0.19.2
-            helm.sh/chart: external-secrets-0.19.2
+            app.kubernetes.io/version: v0.20.1
+            helm.sh/chart: external-secrets-0.20.1
         spec:
         spec:
           automountServiceAccountToken: true
           automountServiceAccountToken: true
           containers:
           containers:

+ 6 - 6
deploy/charts/external-secrets/tests/__snapshot__/webhook_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-webhook
         app.kubernetes.io/name: external-secrets-webhook
-        app.kubernetes.io/version: v0.19.2
-        helm.sh/chart: external-secrets-0.19.2
+        app.kubernetes.io/version: v0.20.1
+        helm.sh/chart: external-secrets-0.20.1
       name: RELEASE-NAME-external-secrets-webhook
       name: RELEASE-NAME-external-secrets-webhook
       namespace: NAMESPACE
       namespace: NAMESPACE
     spec:
     spec:
@@ -24,8 +24,8 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets-webhook
             app.kubernetes.io/name: external-secrets-webhook
-            app.kubernetes.io/version: v0.19.2
-            helm.sh/chart: external-secrets-0.19.2
+            app.kubernetes.io/version: v0.20.1
+            helm.sh/chart: external-secrets-0.20.1
         spec:
         spec:
           automountServiceAccountToken: true
           automountServiceAccountToken: true
           containers:
           containers:
@@ -83,8 +83,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-webhook
         app.kubernetes.io/name: external-secrets-webhook
-        app.kubernetes.io/version: v0.19.2
+        app.kubernetes.io/version: v0.20.1
         external-secrets.io/component: webhook
         external-secrets.io/component: webhook
-        helm.sh/chart: external-secrets-0.19.2
+        helm.sh/chart: external-secrets-0.20.1
       name: RELEASE-NAME-external-secrets-webhook
       name: RELEASE-NAME-external-secrets-webhook
       namespace: NAMESPACE
       namespace: NAMESPACE

+ 2 - 2
tests/__snapshot__/clusterexternalsecret-v1.yaml

@@ -19,7 +19,7 @@ spec:
       sourceRef:
       sourceRef:
         generatorRef:
         generatorRef:
           apiVersion: external-secrets.io/v1
           apiVersion: external-secrets.io/v1
-          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "CloudsmithAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
           name: string
           name: string
         storeRef:
         storeRef:
           kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
           kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
@@ -53,7 +53,7 @@ spec:
       sourceRef:
       sourceRef:
         generatorRef:
         generatorRef:
           apiVersion: external-secrets.io/v1
           apiVersion: external-secrets.io/v1
-          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "CloudsmithAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
           name: string
           name: string
         storeRef:
         storeRef:
           kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
           kind: "SecretStore" # "SecretStore", "ClusterSecretStore"

+ 9 - 1
tests/__snapshot__/clustergenerator-v1alpha1.yaml

@@ -26,6 +26,14 @@ spec:
       registry: string
       registry: string
       scope: string
       scope: string
       tenantId: string
       tenantId: string
+    cloudsmithAccessTokenSpec:
+      apiUrl: string
+      orgSlug: string
+      serviceAccountRef:
+        audiences: [] # minItems 0 of type string
+        name: string
+        namespace: string
+      serviceSlug: string
     ecrAuthorizationTokenSpec:
     ecrAuthorizationTokenSpec:
       auth:
       auth:
         jwt:
         jwt:
@@ -318,4 +326,4 @@ spec:
           name: string
           name: string
       timeout: string
       timeout: string
       url: string
       url: string
-  kind: "ACRAccessToken" # "ACRAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
+  kind: "ACRAccessToken" # "ACRAccessToken", "CloudsmithAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"

+ 23 - 0
tests/__snapshot__/clustersecretstore-v1.yaml

@@ -115,6 +115,11 @@ spec:
           name: string
           name: string
           namespace: string
           namespace: string
       authType: "ServicePrincipal"
       authType: "ServicePrincipal"
+      customCloudConfig:
+        activeDirectoryEndpoint: string
+        keyVaultDNSSuffix: string
+        keyVaultEndpoint: string
+        resourceManagerEndpoint: string
       environmentType: "PublicCloud"
       environmentType: "PublicCloud"
       identityId: string
       identityId: string
       serviceAccountRef:
       serviceAccountRef:
@@ -122,6 +127,7 @@ spec:
         name: string
         name: string
         namespace: string
         namespace: string
       tenantId: string
       tenantId: string
+      useAzureSDK: false
       vaultUrl: string
       vaultUrl: string
     beyondtrust:
     beyondtrust:
       auth:
       auth:
@@ -615,6 +621,7 @@ spec:
           namespace: string
           namespace: string
         value: string
         value: string
     secretserver:
     secretserver:
+      domain: string
       password:
       password:
         secretRef:
         secretRef:
           key: string
           key: string
@@ -753,6 +760,22 @@ spec:
           name: string
           name: string
           namespace: string
           namespace: string
       version: "v2"
       version: "v2"
+    volcengine:
+      auth:
+        secretRef:
+          accessKeyID:
+            key: string
+            name: string
+            namespace: string
+          secretAccessKey:
+            key: string
+            name: string
+            namespace: string
+          token:
+            key: string
+            name: string
+            namespace: string
+      region: string
     webhook:
     webhook:
       auth:
       auth:
         ntlm:
         ntlm:

+ 2 - 2
tests/__snapshot__/externalsecret-v1.yaml

@@ -14,7 +14,7 @@ spec:
     sourceRef:
     sourceRef:
       generatorRef:
       generatorRef:
         apiVersion: external-secrets.io/v1
         apiVersion: external-secrets.io/v1
-        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "CloudsmithAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
         name: string
         name: string
       storeRef:
       storeRef:
         kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
         kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
@@ -48,7 +48,7 @@ spec:
     sourceRef:
     sourceRef:
       generatorRef:
       generatorRef:
         apiVersion: external-secrets.io/v1
         apiVersion: external-secrets.io/v1
-        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "CloudsmithAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
         name: string
         name: string
       storeRef:
       storeRef:
         kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
         kind: "SecretStore" # "SecretStore", "ClusterSecretStore"

+ 1 - 1
tests/__snapshot__/pushsecret-v1alpha1.yaml

@@ -24,7 +24,7 @@ spec:
   selector:
   selector:
     generatorRef:
     generatorRef:
       apiVersion: external-secrets.io/v1alpha1
       apiVersion: external-secrets.io/v1alpha1
-      kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+      kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "CloudsmithAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
       name: string
       name: string
     secret:
     secret:
       name: string
       name: string

+ 23 - 0
tests/__snapshot__/secretstore-v1.yaml

@@ -115,6 +115,11 @@ spec:
           name: string
           name: string
           namespace: string
           namespace: string
       authType: "ServicePrincipal"
       authType: "ServicePrincipal"
+      customCloudConfig:
+        activeDirectoryEndpoint: string
+        keyVaultDNSSuffix: string
+        keyVaultEndpoint: string
+        resourceManagerEndpoint: string
       environmentType: "PublicCloud"
       environmentType: "PublicCloud"
       identityId: string
       identityId: string
       serviceAccountRef:
       serviceAccountRef:
@@ -122,6 +127,7 @@ spec:
         name: string
         name: string
         namespace: string
         namespace: string
       tenantId: string
       tenantId: string
+      useAzureSDK: false
       vaultUrl: string
       vaultUrl: string
     beyondtrust:
     beyondtrust:
       auth:
       auth:
@@ -615,6 +621,7 @@ spec:
           namespace: string
           namespace: string
         value: string
         value: string
     secretserver:
     secretserver:
+      domain: string
       password:
       password:
         secretRef:
         secretRef:
           key: string
           key: string
@@ -753,6 +760,22 @@ spec:
           name: string
           name: string
           namespace: string
           namespace: string
       version: "v2"
       version: "v2"
+    volcengine:
+      auth:
+        secretRef:
+          accessKeyID:
+            key: string
+            name: string
+            namespace: string
+          secretAccessKey:
+            key: string
+            name: string
+            namespace: string
+          token:
+            key: string
+            name: string
+            namespace: string
+      region: string
     webhook:
     webhook:
       auth:
       auth:
         ntlm:
         ntlm: