From 3fffa2937d552c5b1d9816f0e58a782dc806da56 Mon Sep 17 00:00:00 2001 From: Martin Jackson Date: Mon, 16 Oct 2023 10:06:10 -0500 Subject: [PATCH] Update tests for new common --- ...mmon-acm-industrial-edge-hub.expected.yaml | 2 +- ...on-acm-medical-diagnosis-hub.expected.yaml | 2 +- tests/common-acm-normal.expected.yaml | 4 +- ...roup-industrial-edge-factory.expected.yaml | 54 +++-- ...tergroup-industrial-edge-hub.expected.yaml | 126 +++++++---- ...rgroup-medical-diagnosis-hub.expected.yaml | 196 +++++++++++++----- tests/common-clustergroup-naked.expected.yaml | 38 ++-- .../common-clustergroup-normal.expected.yaml | 73 ++++--- ...rets-industrial-edge-factory.expected.yaml | 114 +++++----- ...-secrets-industrial-edge-hub.expected.yaml | 114 +++++----- ...ecrets-medical-diagnosis-hub.expected.yaml | 114 +++++----- ...olang-external-secrets-naked.expected.yaml | 114 +++++----- ...lang-external-secrets-normal.expected.yaml | 114 +++++----- 13 files changed, 662 insertions(+), 403 deletions(-) diff --git a/tests/common-acm-industrial-edge-hub.expected.yaml b/tests/common-acm-industrial-edge-hub.expected.yaml index 444b833c..a474b4e3 100644 --- a/tests/common-acm-industrial-edge-hub.expected.yaml +++ b/tests/common-acm-industrial-edge-hub.expected.yaml @@ -234,7 +234,7 @@ spec: - name: global.clusterVersion value: '{{ printf "%d.%d" ((semver (lookup "operator.openshift.io/v1" "OpenShiftControllerManager" "" "cluster").status.version).Major) ((semver (lookup "operator.openshift.io/v1" "OpenShiftControllerManager" "" "cluster").status.version).Minor) }}' - name: global.clusterPlatform - value: + value: aws - name: clusterGroup.name value: factory - name: clusterGroup.isHubCluster diff --git a/tests/common-acm-medical-diagnosis-hub.expected.yaml b/tests/common-acm-medical-diagnosis-hub.expected.yaml index f79e013b..f54648fe 100644 --- a/tests/common-acm-medical-diagnosis-hub.expected.yaml +++ b/tests/common-acm-medical-diagnosis-hub.expected.yaml @@ -225,7 +225,7 @@ spec: - name: global.clusterVersion value: '{{ printf "%d.%d" ((semver (lookup "operator.openshift.io/v1" "OpenShiftControllerManager" "" "cluster").status.version).Major) ((semver (lookup "operator.openshift.io/v1" "OpenShiftControllerManager" "" "cluster").status.version).Minor) }}' - name: global.clusterPlatform - value: + value: aws - name: clusterGroup.name value: region-one - name: clusterGroup.isHubCluster diff --git a/tests/common-acm-normal.expected.yaml b/tests/common-acm-normal.expected.yaml index 900cc291..0429824d 100644 --- a/tests/common-acm-normal.expected.yaml +++ b/tests/common-acm-normal.expected.yaml @@ -628,7 +628,7 @@ spec: - name: global.clusterVersion value: '{{ printf "%d.%d" ((semver (lookup "operator.openshift.io/v1" "OpenShiftControllerManager" "" "cluster").status.version).Major) ((semver (lookup "operator.openshift.io/v1" "OpenShiftControllerManager" "" "cluster").status.version).Minor) }}' - name: global.clusterPlatform - value: + value: aws - name: clusterGroup.name value: acm-edge - name: clusterGroup.isHubCluster @@ -722,7 +722,7 @@ spec: - name: global.clusterVersion value: '{{ printf "%d.%d" ((semver (lookup "operator.openshift.io/v1" "OpenShiftControllerManager" "" "cluster").status.version).Major) ((semver (lookup "operator.openshift.io/v1" "OpenShiftControllerManager" "" "cluster").status.version).Minor) }}' - name: global.clusterPlatform - value: + value: aws - name: clusterGroup.name value: acm-provision-edge - name: clusterGroup.isHubCluster diff --git a/tests/common-clustergroup-industrial-edge-factory.expected.yaml b/tests/common-clustergroup-industrial-edge-factory.expected.yaml index 86e8d51d..7349d26b 100644 --- a/tests/common-clustergroup-industrial-edge-factory.expected.yaml +++ b/tests/common-clustergroup-industrial-edge-factory.expected.yaml @@ -115,6 +115,7 @@ data: - manuela-factory-ml-workspace projects: - factory + sharedValueFiles: [] subscriptions: - channel: stable name: opendatahub-operator @@ -138,6 +139,8 @@ data: cicd: namespace: devsecops-ci clusterDomain: region.example.com + clusterPlatform: aws + clusterVersion: "4.12" extraValueFiles: [] git: account: PLAINTEXT @@ -383,6 +386,8 @@ kind: Application metadata: name: stormshift namespace: mypattern-factory + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -408,6 +413,8 @@ kind: Application metadata: name: odh namespace: mypattern-factory + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -423,7 +430,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-factory.yaml" + - "/values-factory.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-factory.yaml" + - "/values-4.12-factory.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -436,9 +447,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -463,26 +474,27 @@ metadata: spec: # Adding health checks to argocd to prevent pvc resources # that aren't bound state from blocking deployments - resourceCustomizations: | - PersistentVolumeClaim: - health.lua: | - hs = {} - if obj.status ~= nil then - if obj.status.phase ~= nil then - if obj.status.phase == "Pending" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - elseif obj.status.phase == "Bound" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - end + resourceHealthChecks: + - kind: PersistentVolumeClaim + check: | + hs = {} + if obj.status ~= nil then + if obj.status.phase ~= nil then + if obj.status.phase == "Pending" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs + elseif obj.status.phase == "Bound" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs end end - hs.status = "Progressing" - hs.message = "Waiting for PVC" - return hs + end + hs.status = "Progressing" + hs.message = "Waiting for PVC" + return hs + applicationInstanceLabelKey: argocd.argoproj.io/instance # Not the greatest way to pass git/quay info to sub-applications, but it will do until # we can support helmChart with kustomize diff --git a/tests/common-clustergroup-industrial-edge-hub.expected.yaml b/tests/common-clustergroup-industrial-edge-hub.expected.yaml index 7787a1a6..c0d078aa 100644 --- a/tests/common-clustergroup-industrial-edge-hub.expected.yaml +++ b/tests/common-clustergroup-industrial-edge-hub.expected.yaml @@ -257,6 +257,7 @@ data: - production-datalake - golang-external-secrets - vault + sharedValueFiles: [] subscriptions: acm: channel: release-2.6 @@ -299,6 +300,8 @@ data: cicd: namespace: devsecops-ci clusterDomain: region.example.com + clusterPlatform: aws + clusterVersion: "4.12" extraValueFiles: [] git: account: PLAINTEXT @@ -683,6 +686,8 @@ kind: Application metadata: name: acm namespace: mypattern-datacenter + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -698,7 +703,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-datacenter.yaml" + - "/values-datacenter.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-datacenter.yaml" + - "/values-4.12-datacenter.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -711,9 +720,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -738,6 +747,8 @@ kind: Application metadata: name: odh namespace: mypattern-datacenter + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -753,7 +764,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-datacenter.yaml" + - "/values-datacenter.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-datacenter.yaml" + - "/values-4.12-datacenter.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -766,9 +781,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -784,6 +799,8 @@ kind: Application metadata: name: pipelines namespace: mypattern-datacenter + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -799,7 +816,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-datacenter.yaml" + - "/values-datacenter.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-datacenter.yaml" + - "/values-4.12-datacenter.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -812,9 +833,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -830,6 +851,8 @@ kind: Application metadata: name: production-data-lake namespace: mypattern-datacenter + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -845,7 +868,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-datacenter.yaml" + - "/values-datacenter.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-datacenter.yaml" + - "/values-4.12-datacenter.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -858,9 +885,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -906,6 +933,8 @@ kind: Application metadata: name: external-secrets namespace: mypattern-datacenter + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -921,7 +950,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-datacenter.yaml" + - "/values-datacenter.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-datacenter.yaml" + - "/values-4.12-datacenter.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -934,9 +967,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -952,6 +985,8 @@ kind: Application metadata: name: golang-external-secrets namespace: mypattern-datacenter + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -967,7 +1002,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-datacenter.yaml" + - "/values-datacenter.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-datacenter.yaml" + - "/values-4.12-datacenter.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -980,9 +1019,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -998,6 +1037,8 @@ kind: Application metadata: name: manuela-test namespace: mypattern-datacenter + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -1023,6 +1064,8 @@ kind: Application metadata: name: vault namespace: mypattern-datacenter + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -1038,7 +1081,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-datacenter.yaml" + - "/values-datacenter.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-datacenter.yaml" + - "/values-4.12-datacenter.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -1051,9 +1098,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -1096,26 +1143,27 @@ metadata: spec: # Adding health checks to argocd to prevent pvc resources # that aren't bound state from blocking deployments - resourceCustomizations: | - PersistentVolumeClaim: - health.lua: | - hs = {} - if obj.status ~= nil then - if obj.status.phase ~= nil then - if obj.status.phase == "Pending" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - elseif obj.status.phase == "Bound" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - end + resourceHealthChecks: + - kind: PersistentVolumeClaim + check: | + hs = {} + if obj.status ~= nil then + if obj.status.phase ~= nil then + if obj.status.phase == "Pending" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs + elseif obj.status.phase == "Bound" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs end end - hs.status = "Progressing" - hs.message = "Waiting for PVC" - return hs + end + hs.status = "Progressing" + hs.message = "Waiting for PVC" + return hs + applicationInstanceLabelKey: argocd.argoproj.io/instance # Not the greatest way to pass git/quay info to sub-applications, but it will do until # we can support helmChart with kustomize diff --git a/tests/common-clustergroup-medical-diagnosis-hub.expected.yaml b/tests/common-clustergroup-medical-diagnosis-hub.expected.yaml index 035b7149..1b14514b 100644 --- a/tests/common-clustergroup-medical-diagnosis-hub.expected.yaml +++ b/tests/common-clustergroup-medical-diagnosis-hub.expected.yaml @@ -260,6 +260,7 @@ data: projects: - hub - medical-diagnosis + sharedValueFiles: [] subscriptions: amq-streams: channel: stable @@ -286,6 +287,8 @@ data: cicd: namespace: devsecops-ci clusterDomain: region.example.com + clusterPlatform: aws + clusterVersion: "4.12" extraValueFiles: [] git: account: PLAINTEXT @@ -628,6 +631,8 @@ kind: Application metadata: name: golang-external-secrets namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -643,7 +648,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -656,9 +665,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -674,6 +683,8 @@ kind: Application metadata: name: kafdrop namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -689,7 +700,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -702,9 +717,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -720,6 +735,8 @@ kind: Application metadata: name: kafka namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -735,7 +752,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -748,9 +769,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -766,6 +787,8 @@ kind: Application metadata: name: odh namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -781,7 +804,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -794,9 +821,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -812,6 +839,8 @@ kind: Application metadata: name: odf namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -827,7 +856,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -840,9 +873,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -858,6 +891,8 @@ kind: Application metadata: name: serverless namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -873,7 +908,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -886,9 +925,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -904,6 +943,8 @@ kind: Application metadata: name: xraylab-service-account namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -919,7 +960,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -932,9 +977,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -950,6 +995,8 @@ kind: Application metadata: name: vault namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -965,7 +1012,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -978,9 +1029,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -1014,6 +1065,8 @@ kind: Application metadata: name: xraylab-database namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -1029,7 +1082,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -1042,9 +1099,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -1060,6 +1117,8 @@ kind: Application metadata: name: xraylab-grafana-dashboards namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -1075,7 +1134,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -1088,9 +1151,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -1106,6 +1169,8 @@ kind: Application metadata: name: xraylab-image-generator namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -1121,7 +1186,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -1134,9 +1203,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -1161,6 +1230,8 @@ kind: Application metadata: name: xraylab-image-server namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -1176,7 +1247,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -1189,9 +1264,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -1216,6 +1291,8 @@ kind: Application metadata: name: xraylab-init namespace: mypattern-hub + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -1231,7 +1308,11 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-hub.yaml" + - "/values-hub.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-hub.yaml" + - "/values-4.12-hub.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -1244,9 +1325,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -1271,26 +1352,27 @@ metadata: spec: # Adding health checks to argocd to prevent pvc resources # that aren't bound state from blocking deployments - resourceCustomizations: | - PersistentVolumeClaim: - health.lua: | - hs = {} - if obj.status ~= nil then - if obj.status.phase ~= nil then - if obj.status.phase == "Pending" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - elseif obj.status.phase == "Bound" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - end + resourceHealthChecks: + - kind: PersistentVolumeClaim + check: | + hs = {} + if obj.status ~= nil then + if obj.status.phase ~= nil then + if obj.status.phase == "Pending" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs + elseif obj.status.phase == "Bound" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs end end - hs.status = "Progressing" - hs.message = "Waiting for PVC" - return hs + end + hs.status = "Progressing" + hs.message = "Waiting for PVC" + return hs + applicationInstanceLabelKey: argocd.argoproj.io/instance # Not the greatest way to pass git/quay info to sub-applications, but it will do until # we can support helmChart with kustomize diff --git a/tests/common-clustergroup-naked.expected.yaml b/tests/common-clustergroup-naked.expected.yaml index 9499eb5d..75359902 100644 --- a/tests/common-clustergroup-naked.expected.yaml +++ b/tests/common-clustergroup-naked.expected.yaml @@ -61,6 +61,7 @@ data: name: example namespaces: [] projects: [] + sharedValueFiles: [] subscriptions: {} targetCluster: in-cluster enabled: all @@ -270,26 +271,27 @@ metadata: spec: # Adding health checks to argocd to prevent pvc resources # that aren't bound state from blocking deployments - resourceCustomizations: | - PersistentVolumeClaim: - health.lua: | - hs = {} - if obj.status ~= nil then - if obj.status.phase ~= nil then - if obj.status.phase == "Pending" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - elseif obj.status.phase == "Bound" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - end + resourceHealthChecks: + - kind: PersistentVolumeClaim + check: | + hs = {} + if obj.status ~= nil then + if obj.status.phase ~= nil then + if obj.status.phase == "Pending" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs + elseif obj.status.phase == "Bound" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs end end - hs.status = "Progressing" - hs.message = "Waiting for PVC" - return hs + end + hs.status = "Progressing" + hs.message = "Waiting for PVC" + return hs + applicationInstanceLabelKey: argocd.argoproj.io/instance # Not the greatest way to pass git/quay info to sub-applications, but it will do until # we can support helmChart with kustomize diff --git a/tests/common-clustergroup-normal.expected.yaml b/tests/common-clustergroup-normal.expected.yaml index 7770d9ca..0f4e676b 100644 --- a/tests/common-clustergroup-normal.expected.yaml +++ b/tests/common-clustergroup-normal.expected.yaml @@ -81,6 +81,8 @@ data: path: common/acm project: datacenter pipe: + extraValueFiles: + - /values/4.12/aws.yaml name: pipelines namespace: application-ci path: charts/datacenter/pipelines @@ -175,6 +177,9 @@ data: - excludes-ci projects: - datacenter + sharedValueFiles: + - /values/aws.yaml + - /values/4.12.yaml subscriptions: acm: channel: release-2.4 @@ -195,6 +200,8 @@ data: cicd: namespace: devsecops-ci clusterDomain: region.example.com + clusterPlatform: aws + clusterVersion: "4.12" extraValueFiles: [] git: account: PLAINTEXT @@ -538,6 +545,8 @@ kind: Application metadata: name: acm namespace: mypattern-example + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -553,7 +562,13 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-example.yaml" + - "/values-example.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-example.yaml" + - "/values-4.12-example.yaml" + - "/values/aws.yaml" + - "/values/4.12.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -566,9 +581,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -593,6 +608,8 @@ kind: Application metadata: name: pipelines namespace: mypattern-example + labels: + validatedpatterns.io/pattern: mypattern finalizers: - resources-finalizer.argocd.argoproj.io/foreground spec: @@ -608,7 +625,14 @@ spec: ignoreMissingValueFiles: true valueFiles: - "/values-global.yaml" - - "/values-example.yaml" + - "/values-example.yaml" + - "/values-aws.yaml" + - "/values-aws-4.12.yaml" + - "/values-aws-example.yaml" + - "/values-4.12-example.yaml" + - "/values/aws.yaml" + - "/values/4.12.yaml" + - "/values/4.12/aws.yaml" parameters: - name: global.repoURL value: $ARGOCD_APP_SOURCE_REPO_URL @@ -621,9 +645,9 @@ spec: - name: global.clusterDomain value: region.example.com - name: global.clusterVersion - value: "" + value: "4.12" - name: global.clusterPlatform - value: "" + value: "aws" - name: global.hubClusterDomain value: apps.hub.example.com - name: global.localClusterDomain @@ -888,26 +912,27 @@ metadata: spec: # Adding health checks to argocd to prevent pvc resources # that aren't bound state from blocking deployments - resourceCustomizations: | - PersistentVolumeClaim: - health.lua: | - hs = {} - if obj.status ~= nil then - if obj.status.phase ~= nil then - if obj.status.phase == "Pending" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - elseif obj.status.phase == "Bound" then - hs.status = "Healthy" - hs.message = obj.status.phase - return hs - end + resourceHealthChecks: + - kind: PersistentVolumeClaim + check: | + hs = {} + if obj.status ~= nil then + if obj.status.phase ~= nil then + if obj.status.phase == "Pending" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs + elseif obj.status.phase == "Bound" then + hs.status = "Healthy" + hs.message = obj.status.phase + return hs end end - hs.status = "Progressing" - hs.message = "Waiting for PVC" - return hs + end + hs.status = "Progressing" + hs.message = "Waiting for PVC" + return hs + applicationInstanceLabelKey: argocd.argoproj.io/instance # Not the greatest way to pass git/quay info to sub-applications, but it will do until # we can support helmChart with kustomize diff --git a/tests/common-golang-external-secrets-industrial-edge-factory.expected.yaml b/tests/common-golang-external-secrets-industrial-edge-factory.expected.yaml index ce2f17c3..1f2e2925 100644 --- a/tests/common-golang-external-secrets-industrial-edge-factory.expected.yaml +++ b/tests/common-golang-external-secrets-industrial-edge-factory.expected.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/serviceaccount.yaml @@ -19,10 +19,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml @@ -32,10 +32,10 @@ metadata: name: external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-secret.yaml @@ -45,10 +45,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook --- @@ -67,7 +67,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: acraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -208,7 +208,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clusterexternalsecrets.external-secrets.io spec: group: external-secrets.io @@ -632,6 +632,9 @@ spec: - type type: object type: array + externalSecretName: + description: ExternalSecretName is the name of the ExternalSecrets created by the ClusterExternalSecret + type: string failedNamespaces: description: Failed namespaces are the namespaces that failed to apply an ExternalSecret items: @@ -674,7 +677,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clustersecretstores.external-secrets.io spec: group: external-secrets.io @@ -3550,7 +3553,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: ecrauthorizationtokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -3678,7 +3681,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: externalsecrets.external-secrets.io spec: group: external-secrets.io @@ -4315,7 +4318,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: fakes.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4376,7 +4379,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: gcraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4484,7 +4487,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: passwords.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4562,7 +4565,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: pushsecrets.external-secrets.io spec: group: external-secrets.io @@ -4623,6 +4626,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4751,6 +4757,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4782,7 +4791,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: secretstores.external-secrets.io spec: group: external-secrets.io @@ -7658,7 +7667,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: vaultdynamicsecrets.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -8115,10 +8124,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8182,10 +8191,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8291,10 +8300,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-view labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -8331,10 +8340,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-edit labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" @@ -8375,10 +8384,10 @@ metadata: name: common-golang-external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8396,10 +8405,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8416,10 +8425,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8452,10 +8461,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8491,10 +8500,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8512,10 +8521,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: @@ -8536,10 +8545,10 @@ metadata: name: common-golang-external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8551,8 +8560,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller automountServiceAccountToken: true @@ -8566,7 +8578,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - certcontroller @@ -8596,10 +8608,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8611,8 +8623,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: common-golang-external-secrets automountServiceAccountToken: true @@ -8626,7 +8641,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - --concurrent=1 @@ -8642,10 +8657,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8657,8 +8672,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: hostNetwork: false serviceAccountName: external-secrets-webhook @@ -8672,7 +8690,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - webhook diff --git a/tests/common-golang-external-secrets-industrial-edge-hub.expected.yaml b/tests/common-golang-external-secrets-industrial-edge-hub.expected.yaml index c106cd42..7b2b7171 100644 --- a/tests/common-golang-external-secrets-industrial-edge-hub.expected.yaml +++ b/tests/common-golang-external-secrets-industrial-edge-hub.expected.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/serviceaccount.yaml @@ -19,10 +19,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml @@ -32,10 +32,10 @@ metadata: name: external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-secret.yaml @@ -45,10 +45,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook --- @@ -67,7 +67,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: acraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -208,7 +208,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clusterexternalsecrets.external-secrets.io spec: group: external-secrets.io @@ -632,6 +632,9 @@ spec: - type type: object type: array + externalSecretName: + description: ExternalSecretName is the name of the ExternalSecrets created by the ClusterExternalSecret + type: string failedNamespaces: description: Failed namespaces are the namespaces that failed to apply an ExternalSecret items: @@ -674,7 +677,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clustersecretstores.external-secrets.io spec: group: external-secrets.io @@ -3550,7 +3553,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: ecrauthorizationtokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -3678,7 +3681,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: externalsecrets.external-secrets.io spec: group: external-secrets.io @@ -4315,7 +4318,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: fakes.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4376,7 +4379,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: gcraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4484,7 +4487,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: passwords.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4562,7 +4565,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: pushsecrets.external-secrets.io spec: group: external-secrets.io @@ -4623,6 +4626,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4751,6 +4757,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4782,7 +4791,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: secretstores.external-secrets.io spec: group: external-secrets.io @@ -7658,7 +7667,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: vaultdynamicsecrets.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -8115,10 +8124,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8182,10 +8191,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8291,10 +8300,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-view labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -8331,10 +8340,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-edit labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" @@ -8375,10 +8384,10 @@ metadata: name: common-golang-external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8396,10 +8405,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8416,10 +8425,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8452,10 +8461,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8491,10 +8500,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8512,10 +8521,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: @@ -8536,10 +8545,10 @@ metadata: name: common-golang-external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8551,8 +8560,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller automountServiceAccountToken: true @@ -8566,7 +8578,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - certcontroller @@ -8596,10 +8608,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8611,8 +8623,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: common-golang-external-secrets automountServiceAccountToken: true @@ -8626,7 +8641,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - --concurrent=1 @@ -8642,10 +8657,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8657,8 +8672,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: hostNetwork: false serviceAccountName: external-secrets-webhook @@ -8672,7 +8690,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - webhook diff --git a/tests/common-golang-external-secrets-medical-diagnosis-hub.expected.yaml b/tests/common-golang-external-secrets-medical-diagnosis-hub.expected.yaml index c106cd42..7b2b7171 100644 --- a/tests/common-golang-external-secrets-medical-diagnosis-hub.expected.yaml +++ b/tests/common-golang-external-secrets-medical-diagnosis-hub.expected.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/serviceaccount.yaml @@ -19,10 +19,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml @@ -32,10 +32,10 @@ metadata: name: external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-secret.yaml @@ -45,10 +45,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook --- @@ -67,7 +67,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: acraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -208,7 +208,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clusterexternalsecrets.external-secrets.io spec: group: external-secrets.io @@ -632,6 +632,9 @@ spec: - type type: object type: array + externalSecretName: + description: ExternalSecretName is the name of the ExternalSecrets created by the ClusterExternalSecret + type: string failedNamespaces: description: Failed namespaces are the namespaces that failed to apply an ExternalSecret items: @@ -674,7 +677,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clustersecretstores.external-secrets.io spec: group: external-secrets.io @@ -3550,7 +3553,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: ecrauthorizationtokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -3678,7 +3681,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: externalsecrets.external-secrets.io spec: group: external-secrets.io @@ -4315,7 +4318,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: fakes.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4376,7 +4379,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: gcraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4484,7 +4487,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: passwords.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4562,7 +4565,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: pushsecrets.external-secrets.io spec: group: external-secrets.io @@ -4623,6 +4626,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4751,6 +4757,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4782,7 +4791,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: secretstores.external-secrets.io spec: group: external-secrets.io @@ -7658,7 +7667,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: vaultdynamicsecrets.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -8115,10 +8124,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8182,10 +8191,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8291,10 +8300,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-view labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -8331,10 +8340,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-edit labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" @@ -8375,10 +8384,10 @@ metadata: name: common-golang-external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8396,10 +8405,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8416,10 +8425,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8452,10 +8461,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8491,10 +8500,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8512,10 +8521,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: @@ -8536,10 +8545,10 @@ metadata: name: common-golang-external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8551,8 +8560,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller automountServiceAccountToken: true @@ -8566,7 +8578,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - certcontroller @@ -8596,10 +8608,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8611,8 +8623,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: common-golang-external-secrets automountServiceAccountToken: true @@ -8626,7 +8641,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - --concurrent=1 @@ -8642,10 +8657,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8657,8 +8672,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: hostNetwork: false serviceAccountName: external-secrets-webhook @@ -8672,7 +8690,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - webhook diff --git a/tests/common-golang-external-secrets-naked.expected.yaml b/tests/common-golang-external-secrets-naked.expected.yaml index 01cb5e98..0e02057e 100644 --- a/tests/common-golang-external-secrets-naked.expected.yaml +++ b/tests/common-golang-external-secrets-naked.expected.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/serviceaccount.yaml @@ -19,10 +19,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml @@ -32,10 +32,10 @@ metadata: name: external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-secret.yaml @@ -45,10 +45,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook --- @@ -67,7 +67,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: acraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -208,7 +208,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clusterexternalsecrets.external-secrets.io spec: group: external-secrets.io @@ -632,6 +632,9 @@ spec: - type type: object type: array + externalSecretName: + description: ExternalSecretName is the name of the ExternalSecrets created by the ClusterExternalSecret + type: string failedNamespaces: description: Failed namespaces are the namespaces that failed to apply an ExternalSecret items: @@ -674,7 +677,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clustersecretstores.external-secrets.io spec: group: external-secrets.io @@ -3550,7 +3553,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: ecrauthorizationtokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -3678,7 +3681,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: externalsecrets.external-secrets.io spec: group: external-secrets.io @@ -4315,7 +4318,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: fakes.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4376,7 +4379,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: gcraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4484,7 +4487,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: passwords.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4562,7 +4565,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: pushsecrets.external-secrets.io spec: group: external-secrets.io @@ -4623,6 +4626,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4751,6 +4757,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4782,7 +4791,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: secretstores.external-secrets.io spec: group: external-secrets.io @@ -7658,7 +7667,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: vaultdynamicsecrets.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -8115,10 +8124,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8182,10 +8191,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8291,10 +8300,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-view labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -8331,10 +8340,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-edit labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" @@ -8375,10 +8384,10 @@ metadata: name: common-golang-external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8396,10 +8405,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8416,10 +8425,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8452,10 +8461,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8491,10 +8500,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8512,10 +8521,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: @@ -8536,10 +8545,10 @@ metadata: name: common-golang-external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8551,8 +8560,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller automountServiceAccountToken: true @@ -8566,7 +8578,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - certcontroller @@ -8596,10 +8608,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8611,8 +8623,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: common-golang-external-secrets automountServiceAccountToken: true @@ -8626,7 +8641,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - --concurrent=1 @@ -8642,10 +8657,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8657,8 +8672,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: hostNetwork: false serviceAccountName: external-secrets-webhook @@ -8672,7 +8690,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - webhook diff --git a/tests/common-golang-external-secrets-normal.expected.yaml b/tests/common-golang-external-secrets-normal.expected.yaml index c106cd42..7b2b7171 100644 --- a/tests/common-golang-external-secrets-normal.expected.yaml +++ b/tests/common-golang-external-secrets-normal.expected.yaml @@ -6,10 +6,10 @@ metadata: name: external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/serviceaccount.yaml @@ -19,10 +19,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml @@ -32,10 +32,10 @@ metadata: name: external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm --- # Source: golang-external-secrets/charts/external-secrets/templates/webhook-secret.yaml @@ -45,10 +45,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook --- @@ -67,7 +67,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: acraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -208,7 +208,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clusterexternalsecrets.external-secrets.io spec: group: external-secrets.io @@ -632,6 +632,9 @@ spec: - type type: object type: array + externalSecretName: + description: ExternalSecretName is the name of the ExternalSecrets created by the ClusterExternalSecret + type: string failedNamespaces: description: Failed namespaces are the namespaces that failed to apply an ExternalSecret items: @@ -674,7 +677,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: clustersecretstores.external-secrets.io spec: group: external-secrets.io @@ -3550,7 +3553,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: ecrauthorizationtokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -3678,7 +3681,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: externalsecrets.external-secrets.io spec: group: external-secrets.io @@ -4315,7 +4318,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: fakes.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4376,7 +4379,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: gcraccesstokens.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4484,7 +4487,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: passwords.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -4562,7 +4565,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: pushsecrets.external-secrets.io spec: group: external-secrets.io @@ -4623,6 +4626,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4751,6 +4757,9 @@ spec: - remoteRef - secretKey type: object + metadata: + description: Metadata is metadata attached to the secret. The structure of metadata is provider specific, please look it up in the provider documentation. + x-kubernetes-preserve-unknown-fields: true required: - match type: object @@ -4782,7 +4791,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: secretstores.external-secrets.io spec: group: external-secrets.io @@ -7658,7 +7667,7 @@ apiVersion: apiextensions.k8s.io/v1 kind: CustomResourceDefinition metadata: annotations: - controller-gen.kubebuilder.io/version: v0.12.1 + controller-gen.kubebuilder.io/version: v0.13.0 name: vaultdynamicsecrets.generators.external-secrets.io spec: group: generators.external-secrets.io @@ -8115,10 +8124,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8182,10 +8191,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8291,10 +8300,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-view labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-view: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" @@ -8331,10 +8340,10 @@ kind: ClusterRole metadata: name: common-golang-external-secrets-edit labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true" @@ -8375,10 +8384,10 @@ metadata: name: common-golang-external-secrets-servicebindings labels: servicebinding.io/controller: "true" - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8396,10 +8405,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-cert-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8416,10 +8425,10 @@ kind: ClusterRoleBinding metadata: name: common-golang-external-secrets-controller labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8452,10 +8461,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm rules: - apiGroups: @@ -8491,10 +8500,10 @@ metadata: name: common-golang-external-secrets-leaderelection namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm roleRef: apiGroup: rbac.authorization.k8s.io @@ -8512,10 +8521,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm external-secrets.io/component: webhook spec: @@ -8536,10 +8545,10 @@ metadata: name: common-golang-external-secrets-cert-controller namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8551,8 +8560,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: external-secrets-cert-controller automountServiceAccountToken: true @@ -8566,7 +8578,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - certcontroller @@ -8596,10 +8608,10 @@ metadata: name: common-golang-external-secrets namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8611,8 +8623,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: serviceAccountName: common-golang-external-secrets automountServiceAccountToken: true @@ -8626,7 +8641,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - --concurrent=1 @@ -8642,10 +8657,10 @@ metadata: name: common-golang-external-secrets-webhook namespace: "default" labels: - helm.sh/chart: external-secrets-0.9.4 + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets - app.kubernetes.io/version: "v0.9.4" + app.kubernetes.io/version: "v0.9.5" app.kubernetes.io/managed-by: Helm spec: replicas: 1 @@ -8657,8 +8672,11 @@ spec: template: metadata: labels: + helm.sh/chart: external-secrets-0.9.5 app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/instance: common-golang-external-secrets + app.kubernetes.io/version: "v0.9.5" + app.kubernetes.io/managed-by: Helm spec: hostNetwork: false serviceAccountName: external-secrets-webhook @@ -8672,7 +8690,7 @@ spec: - ALL readOnlyRootFilesystem: true runAsNonRoot: true - image: "ghcr.io/external-secrets/external-secrets:v0.9.4-ubi" + image: "ghcr.io/external-secrets/external-secrets:v0.9.5-ubi" imagePullPolicy: IfNotPresent args: - webhook