Skip to content

Commit

Permalink
chore: bump version 0.9.9
Browse files Browse the repository at this point in the history
Signed-off-by: rogertuma <tumaroger@gmail.com>
  • Loading branch information
rogertuma committed Nov 13, 2023
1 parent 30fd7d0 commit 4846b9c
Show file tree
Hide file tree
Showing 12 changed files with 245 additions and 20 deletions.
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# To re-generate a bundle for another specific version without changing the standard setup, you can:
# - use the VERSION as arg of the bundle target (e.g make bundle VERSION=0.0.2)
# - use environment variables to overwrite this value (e.g export VERSION=0.0.2)
VERSION ?= 0.9.8
VERSION ?= 0.9.9

# CHANNELS define the bundle channels used in the bundle.
# Add a new line here if you would like to change its default config. (E.g CHANNELS = "candidate,fast,stable")
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -375,7 +375,7 @@ metadata:
"kind": "ExternalSecret",
"metadata": {
"annotations": {
"acme.org/sha": "1234"
"acme.org/sha": 1234
},
"labels": {
"acme.org/owned-by": "q-team"
Expand Down Expand Up @@ -671,8 +671,8 @@ metadata:
capabilities: Deep Insights
categories: Security
certified: "false"
containerImage: ghcr.io/external-secrets/external-secrets-helm-operator:v0.9.8
createdAt: "2023-10-31T12:45:51Z"
containerImage: ghcr.io/external-secrets/external-secrets-helm-operator:v0.9.9
createdAt: "2023-11-13T19:16:18Z"
description: Operator to configure external-secrets helm-chart based operator
operatorframework.io/cluster-monitoring: "true"
operators.openshift.io/infrastructure-features: '["Disconnected"]'
Expand All @@ -682,7 +682,7 @@ metadata:
labels:
operatorframework.io/arch.amd64: supported
operatorframework.io/os.linux: supported
name: external-secrets-operator.v0.9.8
name: external-secrets-operator.v0.9.9
namespace: external-secrets
spec:
apiservicedefinitions: {}
Expand Down Expand Up @@ -968,7 +968,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: metadata.annotations['olm.targetNamespaces']
image: ghcr.io/external-secrets/external-secrets-helm-operator:v0.9.8
image: ghcr.io/external-secrets/external-secrets-helm-operator:v0.9.9
livenessProbe:
httpGet:
path: /healthz
Expand Down Expand Up @@ -1066,4 +1066,4 @@ spec:
provider:
name: External Secrets
url: https://external-secrets.io
version: 0.9.8
version: 0.9.9
Original file line number Diff line number Diff line change
Expand Up @@ -139,8 +139,9 @@ spec:
maxProperties: 1
properties:
generatorRef:
description: GeneratorRef points to a generator custom
resource in
description: "GeneratorRef points to a generator custom
resource. \n Deprecated: The generatorRef is not implemented
in .data[]. this will be removed with v1."
properties:
apiVersion:
default: generators.external-secrets.io/v1alpha1
Expand Down Expand Up @@ -314,7 +315,7 @@ spec:
properties:
generatorRef:
description: GeneratorRef points to a generator custom
resource in
resource.
properties:
apiVersion:
default: generators.external-secrets.io/v1alpha1
Expand Down
66 changes: 66 additions & 0 deletions bundle/manifests/external-secrets.io_clustersecretstores.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -954,6 +954,14 @@ spec:
- tenancy
- user
type: object
compartment:
description: Compartment is the vault compartment OCID. Required
for PushSecret
type: string
encryptionKey:
description: EncryptionKey is the OCID of the encryption key
within the vault. Required for PushSecret
type: string
principalType:
description: The type of principal to use for authentication.
If left blank, the Auth struct will determine the principal
Expand All @@ -963,6 +971,31 @@ spec:
region:
description: Region is the region where vault is located.
type: string
serviceAccountRef:
description: ServiceAccountRef specified the service account
that should be used when authenticating with WorkloadIdentity.
properties:
audiences:
description: Audience specifies the `aud` claim for the
service account token If the service account uses a
well-known annotation for e.g. IRSA or GCP Workload
Identity then this audiences will be appended to the
list
items:
type: string
type: array
name:
description: The name of the ServiceAccount resource being
referred to.
type: string
namespace:
description: Namespace of the resource being referred
to. Ignored if referent is not cluster-scoped. cluster-scoped
defaults to the namespace of the referent.
type: string
required:
- name
type: object
vault:
description: Vault is the vault's OCID of the specific vault
where secret is located.
Expand Down Expand Up @@ -3034,6 +3067,14 @@ spec:
- tenancy
- user
type: object
compartment:
description: Compartment is the vault compartment OCID. Required
for PushSecret
type: string
encryptionKey:
description: EncryptionKey is the OCID of the encryption key
within the vault. Required for PushSecret
type: string
principalType:
description: The type of principal to use for authentication.
If left blank, the Auth struct will determine the principal
Expand All @@ -3043,6 +3084,31 @@ spec:
region:
description: Region is the region where vault is located.
type: string
serviceAccountRef:
description: ServiceAccountRef specified the service account
that should be used when authenticating with WorkloadIdentity.
properties:
audiences:
description: Audience specifies the `aud` claim for the
service account token If the service account uses a
well-known annotation for e.g. IRSA or GCP Workload
Identity then this audiences will be appended to the
list
items:
type: string
type: array
name:
description: The name of the ServiceAccount resource being
referred to.
type: string
namespace:
description: Namespace of the resource being referred
to. Ignored if referent is not cluster-scoped. cluster-scoped
defaults to the namespace of the referent.
type: string
required:
- name
type: object
vault:
description: Vault is the vault's OCID of the specific vault
where secret is located.
Expand Down
8 changes: 4 additions & 4 deletions bundle/manifests/external-secrets.io_externalsecrets.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -388,8 +388,9 @@ spec:
maxProperties: 1
properties:
generatorRef:
description: GeneratorRef points to a generator custom resource
in
description: "GeneratorRef points to a generator custom
resource. \n Deprecated: The generatorRef is not implemented
in .data[]. this will be removed with v1."
properties:
apiVersion:
default: generators.external-secrets.io/v1alpha1
Expand Down Expand Up @@ -561,8 +562,7 @@ spec:
maxProperties: 1
properties:
generatorRef:
description: GeneratorRef points to a generator custom resource
in
description: GeneratorRef points to a generator custom resource.
properties:
apiVersion:
default: generators.external-secrets.io/v1alpha1
Expand Down
66 changes: 66 additions & 0 deletions bundle/manifests/external-secrets.io_secretstores.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -954,6 +954,14 @@ spec:
- tenancy
- user
type: object
compartment:
description: Compartment is the vault compartment OCID. Required
for PushSecret
type: string
encryptionKey:
description: EncryptionKey is the OCID of the encryption key
within the vault. Required for PushSecret
type: string
principalType:
description: The type of principal to use for authentication.
If left blank, the Auth struct will determine the principal
Expand All @@ -963,6 +971,31 @@ spec:
region:
description: Region is the region where vault is located.
type: string
serviceAccountRef:
description: ServiceAccountRef specified the service account
that should be used when authenticating with WorkloadIdentity.
properties:
audiences:
description: Audience specifies the `aud` claim for the
service account token If the service account uses a
well-known annotation for e.g. IRSA or GCP Workload
Identity then this audiences will be appended to the
list
items:
type: string
type: array
name:
description: The name of the ServiceAccount resource being
referred to.
type: string
namespace:
description: Namespace of the resource being referred
to. Ignored if referent is not cluster-scoped. cluster-scoped
defaults to the namespace of the referent.
type: string
required:
- name
type: object
vault:
description: Vault is the vault's OCID of the specific vault
where secret is located.
Expand Down Expand Up @@ -3034,6 +3067,14 @@ spec:
- tenancy
- user
type: object
compartment:
description: Compartment is the vault compartment OCID. Required
for PushSecret
type: string
encryptionKey:
description: EncryptionKey is the OCID of the encryption key
within the vault. Required for PushSecret
type: string
principalType:
description: The type of principal to use for authentication.
If left blank, the Auth struct will determine the principal
Expand All @@ -3043,6 +3084,31 @@ spec:
region:
description: Region is the region where vault is located.
type: string
serviceAccountRef:
description: ServiceAccountRef specified the service account
that should be used when authenticating with WorkloadIdentity.
properties:
audiences:
description: Audience specifies the `aud` claim for the
service account token If the service account uses a
well-known annotation for e.g. IRSA or GCP Workload
Identity then this audiences will be appended to the
list
items:
type: string
type: array
name:
description: The name of the ServiceAccount resource being
referred to.
type: string
namespace:
description: Namespace of the resource being referred
to. Ignored if referent is not cluster-scoped. cluster-scoped
defaults to the namespace of the referent.
type: string
required:
- name
type: object
vault:
description: Vault is the vault's OCID of the specific vault
where secret is located.
Expand Down
2 changes: 1 addition & 1 deletion config/manager/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,4 @@ kind: Kustomization
images:
- name: controller
newName: ghcr.io/external-secrets/external-secrets-helm-operator
newTag: v0.9.8
newTag: v0.9.9
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ metadata:
capabilities: Deep Insights
categories: Security
certified: "false"
containerImage: ghcr.io/external-secrets/external-secrets-helm-operator:v0.9.8
containerImage: ghcr.io/external-secrets/external-secrets-helm-operator:v0.9.9
createdAt: "2021-11-22 00:00:00"
description: Operator to configure external-secrets helm-chart based operator
operatorframework.io/cluster-monitoring: "true"
Expand Down
4 changes: 2 additions & 2 deletions config/manifests/crds/clusterexternalsecret.yml
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ spec:
maxProperties: 1
properties:
generatorRef:
description: GeneratorRef points to a generator custom resource in
description: "GeneratorRef points to a generator custom resource. \n Deprecated: The generatorRef is not implemented in .data[]. this will be removed with v1."
properties:
apiVersion:
default: generators.external-secrets.io/v1alpha1
Expand Down Expand Up @@ -256,7 +256,7 @@ spec:
maxProperties: 1
properties:
generatorRef:
description: GeneratorRef points to a generator custom resource in
description: GeneratorRef points to a generator custom resource.
properties:
apiVersion:
default: generators.external-secrets.io/v1alpha1
Expand Down
Loading

0 comments on commit 4846b9c

Please sign in to comment.