Browse Source

chore: release helm chart for v0.19.0 (#5093)

Signed-off-by: Gergely Brautigam <182850+Skarlso@users.noreply.github.com>
Gergely Brautigam 8 months ago
parent
commit
5c99f2ea9c

+ 2 - 2
deploy/charts/external-secrets/Chart.yaml

@@ -2,8 +2,8 @@ apiVersion: v2
 name: external-secrets
 description: External secrets management for Kubernetes
 type: application
-version: "0.18.2"
-appVersion: "v0.18.2"
+version: "0.19.0"
+appVersion: "v0.19.0"
 kubeVersion: ">= 1.19.0-0"
 keywords:
   - kubernetes-external-secrets

+ 1 - 1
deploy/charts/external-secrets/README.md

@@ -4,7 +4,7 @@
 
 [//]: # (README.md generated by gotmpl. DO NOT EDIT.)
 
-![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.18.2](https://img.shields.io/badge/Version-0.18.2-informational?style=flat-square)
+![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.19.0](https://img.shields.io/badge/Version-0.19.0-informational?style=flat-square)
 
 External secrets management for Kubernetes
 

+ 5 - 5
deploy/charts/external-secrets/tests/__snapshot__/cert_controller_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-cert-controller
-        app.kubernetes.io/version: v0.18.2
-        helm.sh/chart: external-secrets-0.18.2
+        app.kubernetes.io/version: v0.19.0
+        helm.sh/chart: external-secrets-0.19.0
       name: RELEASE-NAME-external-secrets-cert-controller
       namespace: NAMESPACE
     spec:
@@ -24,8 +24,8 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets-cert-controller
-            app.kubernetes.io/version: v0.18.2
-            helm.sh/chart: external-secrets-0.18.2
+            app.kubernetes.io/version: v0.19.0
+            helm.sh/chart: external-secrets-0.19.0
         spec:
           automountServiceAccountToken: true
           containers:
@@ -41,7 +41,7 @@ should match snapshot of default values:
                 - --loglevel=info
                 - --zap-time-encoding=epoch
                 - --enable-partial-cache=true
-              image: oci.external-secrets.io/external-secrets/external-secrets:v0.18.2
+              image: oci.external-secrets.io/external-secrets/external-secrets:v0.19.0
               imagePullPolicy: IfNotPresent
               name: cert-controller
               ports:

+ 5 - 5
deploy/charts/external-secrets/tests/__snapshot__/controller_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets
-        app.kubernetes.io/version: v0.18.2
-        helm.sh/chart: external-secrets-0.18.2
+        app.kubernetes.io/version: v0.19.0
+        helm.sh/chart: external-secrets-0.19.0
       name: RELEASE-NAME-external-secrets
       namespace: NAMESPACE
     spec:
@@ -24,8 +24,8 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets
-            app.kubernetes.io/version: v0.18.2
-            helm.sh/chart: external-secrets-0.18.2
+            app.kubernetes.io/version: v0.19.0
+            helm.sh/chart: external-secrets-0.19.0
         spec:
           automountServiceAccountToken: true
           containers:
@@ -34,7 +34,7 @@ should match snapshot of default values:
                 - --metrics-addr=:8080
                 - --loglevel=info
                 - --zap-time-encoding=epoch
-              image: oci.external-secrets.io/external-secrets/external-secrets:v0.18.2
+              image: oci.external-secrets.io/external-secrets/external-secrets:v0.19.0
               imagePullPolicy: IfNotPresent
               name: external-secrets
               ports:

+ 7 - 7
deploy/charts/external-secrets/tests/__snapshot__/webhook_test.yaml.snap

@@ -7,8 +7,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-webhook
-        app.kubernetes.io/version: v0.18.2
-        helm.sh/chart: external-secrets-0.18.2
+        app.kubernetes.io/version: v0.19.0
+        helm.sh/chart: external-secrets-0.19.0
       name: RELEASE-NAME-external-secrets-webhook
       namespace: NAMESPACE
     spec:
@@ -24,8 +24,8 @@ should match snapshot of default values:
             app.kubernetes.io/instance: RELEASE-NAME
             app.kubernetes.io/managed-by: Helm
             app.kubernetes.io/name: external-secrets-webhook
-            app.kubernetes.io/version: v0.18.2
-            helm.sh/chart: external-secrets-0.18.2
+            app.kubernetes.io/version: v0.19.0
+            helm.sh/chart: external-secrets-0.19.0
         spec:
           automountServiceAccountToken: true
           containers:
@@ -39,7 +39,7 @@ should match snapshot of default values:
                 - --healthz-addr=:8081
                 - --loglevel=info
                 - --zap-time-encoding=epoch
-              image: oci.external-secrets.io/external-secrets/external-secrets:v0.18.2
+              image: oci.external-secrets.io/external-secrets/external-secrets:v0.19.0
               imagePullPolicy: IfNotPresent
               name: webhook
               ports:
@@ -83,8 +83,8 @@ should match snapshot of default values:
         app.kubernetes.io/instance: RELEASE-NAME
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/name: external-secrets-webhook
-        app.kubernetes.io/version: v0.18.2
+        app.kubernetes.io/version: v0.19.0
         external-secrets.io/component: webhook
-        helm.sh/chart: external-secrets-0.18.2
+        helm.sh/chart: external-secrets-0.19.0
       name: RELEASE-NAME-external-secrets-webhook
       namespace: NAMESPACE

+ 2 - 2
tests/__snapshot__/clusterexternalsecret-v1.yaml

@@ -19,7 +19,7 @@ spec:
       sourceRef:
         generatorRef:
           apiVersion: external-secrets.io/v1
-          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
           name: string
         storeRef:
           kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
@@ -53,7 +53,7 @@ spec:
       sourceRef:
         generatorRef:
           apiVersion: external-secrets.io/v1
-          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
           name: string
         storeRef:
           kind: "SecretStore" # "SecretStore", "ClusterSecretStore"

+ 2 - 2
tests/__snapshot__/clusterexternalsecret-v1beta1.yaml

@@ -19,7 +19,7 @@ spec:
       sourceRef:
         generatorRef:
           apiVersion: external-secrets.io/v1beta1
-          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
+          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
           name: string
         storeRef:
           kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
@@ -48,7 +48,7 @@ spec:
       sourceRef:
         generatorRef:
           apiVersion: external-secrets.io/v1beta1
-          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
+          kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
           name: string
         storeRef:
           kind: "SecretStore" # "SecretStore", "ClusterSecretStore"

+ 5 - 1
tests/__snapshot__/clustergenerator-v1alpha1.yaml

@@ -117,6 +117,10 @@ spec:
         name: string
         namespace: string
       url: string
+    sshKeySpec:
+      comment: string
+      keySize: 256
+      keyType: "rsa"
     stsSessionTokenSpec:
       auth:
         jwt:
@@ -296,4 +300,4 @@ spec:
           name: string
       timeout: string
       url: string
-  kind: "ACRAccessToken" # "ACRAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
+  kind: "ACRAccessToken" # "ACRAccessToken", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"

+ 65 - 0
tests/__snapshot__/clustersecretstore-v1.yaml

@@ -350,6 +350,71 @@ spec:
             key: string
             name: string
             namespace: string
+        gcpIamAuthCredentials:
+          identityId:
+            key: string
+            name: string
+            namespace: string
+          serviceAccountKeyFilePath:
+            key: string
+            name: string
+            namespace: string
+        gcpIdTokenAuthCredentials:
+          identityId:
+            key: string
+            name: string
+            namespace: string
+        jwtAuthCredentials:
+          identityId:
+            key: string
+            name: string
+            namespace: string
+          jwt:
+            key: string
+            name: string
+            namespace: string
+        ldapAuthCredentials:
+          identityId:
+            key: string
+            name: string
+            namespace: string
+          ldapPassword:
+            key: string
+            name: string
+            namespace: string
+          ldapUsername:
+            key: string
+            name: string
+            namespace: string
+        ociAuthCredentials:
+          fingerprint:
+            key: string
+            name: string
+            namespace: string
+          identityId:
+            key: string
+            name: string
+            namespace: string
+          privateKey:
+            key: string
+            name: string
+            namespace: string
+          privateKeyPassphrase:
+            key: string
+            name: string
+            namespace: string
+          region:
+            key: string
+            name: string
+            namespace: string
+          tenancyId:
+            key: string
+            name: string
+            namespace: string
+          userId:
+            key: string
+            name: string
+            namespace: string
         universalAuthCredentials:
           clientId:
             key: string

+ 2 - 2
tests/__snapshot__/externalsecret-v1.yaml

@@ -14,7 +14,7 @@ spec:
     sourceRef:
       generatorRef:
         apiVersion: external-secrets.io/v1
-        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
         name: string
       storeRef:
         kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
@@ -48,7 +48,7 @@ spec:
     sourceRef:
       generatorRef:
         apiVersion: external-secrets.io/v1
-        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
         name: string
       storeRef:
         kind: "SecretStore" # "SecretStore", "ClusterSecretStore"

+ 2 - 2
tests/__snapshot__/externalsecret-v1beta1.yaml

@@ -14,7 +14,7 @@ spec:
     sourceRef:
       generatorRef:
         apiVersion: external-secrets.io/v1beta1
-        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
+        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
         name: string
       storeRef:
         kind: "SecretStore" # "SecretStore", "ClusterSecretStore"
@@ -43,7 +43,7 @@ spec:
     sourceRef:
       generatorRef:
         apiVersion: external-secrets.io/v1beta1
-        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
+        kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana"
         name: string
       storeRef:
         kind: "SecretStore" # "SecretStore", "ClusterSecretStore"

+ 1 - 1
tests/__snapshot__/pushsecret-v1alpha1.yaml

@@ -24,7 +24,7 @@ spec:
   selector:
     generatorRef:
       apiVersion: external-secrets.io/v1alpha1
-      kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
+      kind: "ACRAccessToken" # "ACRAccessToken", "ClusterGenerator", "ECRAuthorizationToken", "Fake", "GCRAccessToken", "GithubAccessToken", "QuayAccessToken", "Password", "SSHKey", "STSSessionToken", "UUID", "VaultDynamicSecret", "Webhook", "Grafana", "MFA"
       name: string
     secret:
       name: string

+ 65 - 0
tests/__snapshot__/secretstore-v1.yaml

@@ -350,6 +350,71 @@ spec:
             key: string
             name: string
             namespace: string
+        gcpIamAuthCredentials:
+          identityId:
+            key: string
+            name: string
+            namespace: string
+          serviceAccountKeyFilePath:
+            key: string
+            name: string
+            namespace: string
+        gcpIdTokenAuthCredentials:
+          identityId:
+            key: string
+            name: string
+            namespace: string
+        jwtAuthCredentials:
+          identityId:
+            key: string
+            name: string
+            namespace: string
+          jwt:
+            key: string
+            name: string
+            namespace: string
+        ldapAuthCredentials:
+          identityId:
+            key: string
+            name: string
+            namespace: string
+          ldapPassword:
+            key: string
+            name: string
+            namespace: string
+          ldapUsername:
+            key: string
+            name: string
+            namespace: string
+        ociAuthCredentials:
+          fingerprint:
+            key: string
+            name: string
+            namespace: string
+          identityId:
+            key: string
+            name: string
+            namespace: string
+          privateKey:
+            key: string
+            name: string
+            namespace: string
+          privateKeyPassphrase:
+            key: string
+            name: string
+            namespace: string
+          region:
+            key: string
+            name: string
+            namespace: string
+          tenancyId:
+            key: string
+            name: string
+            namespace: string
+          userId:
+            key: string
+            name: string
+            namespace: string
         universalAuthCredentials:
           clientId:
             key: string