Roger 2 years ago
parent
commit
5bec6360a8

+ 2 - 2
deploy/charts/external-secrets/Chart.yaml

@@ -2,8 +2,8 @@ apiVersion: v2
 name: external-secrets
 name: external-secrets
 description: External secret management for Kubernetes
 description: External secret management for Kubernetes
 type: application
 type: application
-version: "0.9.13"
-appVersion: "v0.9.13"
+version: "0.9.14"
+appVersion: "v0.9.14"
 kubeVersion: ">= 1.19.0-0"
 kubeVersion: ">= 1.19.0-0"
 keywords:
 keywords:
   - kubernetes-external-secrets
   - kubernetes-external-secrets

+ 1 - 1
deploy/charts/external-secrets/README.md

@@ -4,7 +4,7 @@
 
 
 [//]: # (README.md generated by gotmpl. DO NOT EDIT.)
 [//]: # (README.md generated by gotmpl. DO NOT EDIT.)
 
 
-![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.13](https://img.shields.io/badge/Version-0.9.13-informational?style=flat-square)
+![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.14](https://img.shields.io/badge/Version-0.9.14-informational?style=flat-square)
 
 
 External secret management for Kubernetes
 External secret management for Kubernetes
 
 

+ 5 - 5
deploy/charts/external-secrets/tests/__snapshot__/cert_controller_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-cert-controller
         app.kubernetes.io/name: external-secrets-cert-controller
-        app.kubernetes.io/version: v0.9.13
-        helm.sh/chart: external-secrets-0.9.13
+        app.kubernetes.io/version: v0.9.14
+        helm.sh/chart: external-secrets-0.9.14
       name: RELEASE-NAME-external-secrets-cert-controller
       name: RELEASE-NAME-external-secrets-cert-controller
       namespace: NAMESPACE
       namespace: NAMESPACE
     spec:
     spec:
@@ -24,8 +24,8 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets-cert-controller
             app.kubernetes.io/name: external-secrets-cert-controller
-            app.kubernetes.io/version: v0.9.13
-            helm.sh/chart: external-secrets-0.9.13
+            app.kubernetes.io/version: v0.9.14
+            helm.sh/chart: external-secrets-0.9.14
         spec:
         spec:
           automountServiceAccountToken: true
           automountServiceAccountToken: true
           containers:
           containers:
@@ -38,7 +38,7 @@ should match snapshot of default values:
                 - --secret-namespace=NAMESPACE
                 - --secret-namespace=NAMESPACE
                 - --metrics-addr=:8080
                 - --metrics-addr=:8080
                 - --healthz-addr=:8081
                 - --healthz-addr=:8081
-              image: ghcr.io/external-secrets/external-secrets:v0.9.13
+              image: ghcr.io/external-secrets/external-secrets:v0.9.14
               imagePullPolicy: IfNotPresent
               imagePullPolicy: IfNotPresent
               name: cert-controller
               name: cert-controller
               ports:
               ports:

+ 5 - 5
deploy/charts/external-secrets/tests/__snapshot__/controller_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets
         app.kubernetes.io/name: external-secrets
-        app.kubernetes.io/version: v0.9.13
-        helm.sh/chart: external-secrets-0.9.13
+        app.kubernetes.io/version: v0.9.14
+        helm.sh/chart: external-secrets-0.9.14
       name: RELEASE-NAME-external-secrets
       name: RELEASE-NAME-external-secrets
       namespace: NAMESPACE
       namespace: NAMESPACE
     spec:
     spec:
@@ -24,15 +24,15 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets
             app.kubernetes.io/name: external-secrets
-            app.kubernetes.io/version: v0.9.13
-            helm.sh/chart: external-secrets-0.9.13
+            app.kubernetes.io/version: v0.9.14
+            helm.sh/chart: external-secrets-0.9.14
         spec:
         spec:
           automountServiceAccountToken: true
           automountServiceAccountToken: true
           containers:
           containers:
             - args:
             - args:
                 - --concurrent=1
                 - --concurrent=1
                 - --metrics-addr=:8080
                 - --metrics-addr=:8080
-              image: ghcr.io/external-secrets/external-secrets:v0.9.13
+              image: ghcr.io/external-secrets/external-secrets:v0.9.14
               imagePullPolicy: IfNotPresent
               imagePullPolicy: IfNotPresent
               name: external-secrets
               name: external-secrets
               ports:
               ports:

+ 8 - 0
deploy/charts/external-secrets/tests/__snapshot__/crds_test.yaml.snap

@@ -3657,6 +3657,14 @@ should match snapshot of default values:
                                     - path
                                     - path
                                     - username
                                     - username
                                   type: object
                                   type: object
+                                namespace:
+                                  description: |-
+                                    Name of the vault namespace to authenticate to. This can be different than the namespace your secret is in.
+                                    Namespaces is a set of features within Vault Enterprise that allows
+                                    Vault environments to support Secure Multi-tenancy. e.g: "ns1".
+                                    More about namespaces can be found here https://www.vaultproject.io/docs/enterprise/namespaces
+                                    This will default to Vault.Namespace field if set, or empty otherwise
+                                  type: string
                                 tokenSecretRef:
                                 tokenSecretRef:
                                   description: TokenSecretRef authenticates with Vault by presenting a token.
                                   description: TokenSecretRef authenticates with Vault by presenting a token.
                                   properties:
                                   properties:

+ 7 - 7
deploy/charts/external-secrets/tests/__snapshot__/webhook_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-webhook
         app.kubernetes.io/name: external-secrets-webhook
-        app.kubernetes.io/version: v0.9.13
-        helm.sh/chart: external-secrets-0.9.13
+        app.kubernetes.io/version: v0.9.14
+        helm.sh/chart: external-secrets-0.9.14
       name: RELEASE-NAME-external-secrets-webhook
       name: RELEASE-NAME-external-secrets-webhook
       namespace: NAMESPACE
       namespace: NAMESPACE
     spec:
     spec:
@@ -24,8 +24,8 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets-webhook
             app.kubernetes.io/name: external-secrets-webhook
-            app.kubernetes.io/version: v0.9.13
-            helm.sh/chart: external-secrets-0.9.13
+            app.kubernetes.io/version: v0.9.14
+            helm.sh/chart: external-secrets-0.9.14
         spec:
         spec:
           automountServiceAccountToken: true
           automountServiceAccountToken: true
           containers:
           containers:
@@ -37,7 +37,7 @@ should match snapshot of default values:
                 - --check-interval=5m
                 - --check-interval=5m
                 - --metrics-addr=:8080
                 - --metrics-addr=:8080
                 - --healthz-addr=:8081
                 - --healthz-addr=:8081
-              image: ghcr.io/external-secrets/external-secrets:v0.9.13
+              image: ghcr.io/external-secrets/external-secrets:v0.9.14
               imagePullPolicy: IfNotPresent
               imagePullPolicy: IfNotPresent
               name: webhook
               name: webhook
               ports:
               ports:
@@ -81,8 +81,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-webhook
         app.kubernetes.io/name: external-secrets-webhook
-        app.kubernetes.io/version: v0.9.13
+        app.kubernetes.io/version: v0.9.14
         external-secrets.io/component: webhook
         external-secrets.io/component: webhook
-        helm.sh/chart: external-secrets-0.9.13
+        helm.sh/chart: external-secrets-0.9.14
       name: RELEASE-NAME-external-secrets-webhook
       name: RELEASE-NAME-external-secrets-webhook
       namespace: NAMESPACE
       namespace: NAMESPACE