Skip to content

Commit 83c1cc2

Browse files
chore(deps): update helm release external-secrets to v1
1 parent 700ad4f commit 83c1cc2

10 files changed

+431
-12
lines changed

docs/examples/src/charts/charts.k

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ charts: helm.Charts = {
4444
chart = "external-secrets"
4545
repoURL = "https://charts.external-secrets.io/"
4646
schemaGenerator = "AUTO"
47-
targetRevision = "0.20.4"
47+
targetRevision = "1.1.0"
4848
crdGenerator = "TEMPLATE"
4949
values: {
5050
installCRDs = True

docs/examples/src/charts/external_secrets/api/v1/external_secrets_io_v1_external_secret.k

Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -435,6 +435,8 @@ schema ExternalSecretsIoV1ExternalSecretSpecTarget:
435435
Defaults to "Retain"
436436
immutable : bool, default is Undefined, optional
437437
Immutable defines if the final secret will be immutable
438+
manifest : ExternalSecretsIoV1ExternalSecretSpecTargetManifest, default is Undefined, optional
439+
manifest
438440
name : str, default is Undefined, optional
439441
The name of the Secret resource to be managed.
440442
Defaults to the .metadata.name of the ExternalSecret resource
@@ -444,6 +446,7 @@ schema ExternalSecretsIoV1ExternalSecretSpecTarget:
444446
creationPolicy?: "Owner" | "Orphan" | "Merge" | "None" = "Owner"
445447
deletionPolicy?: "Delete" | "Merge" | "Retain" = "Retain"
446448
immutable?: bool
449+
manifest?: ExternalSecretsIoV1ExternalSecretSpecTargetManifest
447450
name?: str
448451
template?: ExternalSecretsIoV1ExternalSecretSpecTargetTemplate
449452

@@ -452,6 +455,28 @@ schema ExternalSecretsIoV1ExternalSecretSpecTarget:
452455
len(name) >= 1 if name
453456
_regex_match(str(name), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$") if name
454457

458+
schema ExternalSecretsIoV1ExternalSecretSpecTargetManifest:
459+
r"""
460+
Manifest defines a custom Kubernetes resource to create instead of a Secret.
461+
When specified, ExternalSecret will create the resource type defined here
462+
(e.g., ConfigMap, Custom Resource) instead of a Secret.
463+
Warning: Using Generic target. Make sure access policies and encryption are properly configured.
464+
465+
Attributes
466+
----------
467+
apiVersion : str, default is Undefined, required
468+
APIVersion of the target resource (e.g., "v1" for ConfigMap, "argoproj.io/v1alpha1" for ArgoCD Application)
469+
kind : str, default is Undefined, required
470+
Kind of the target resource (e.g., "ConfigMap", "Application")
471+
"""
472+
apiVersion: str
473+
474+
kind: str
475+
476+
check:
477+
len(apiVersion) >= 1
478+
len(kind) >= 1
479+
455480
schema ExternalSecretsIoV1ExternalSecretSpecTargetTemplate:
456481
r"""
457482
Template defines a blueprint for the created Secret resource.
@@ -511,12 +536,15 @@ schema ExternalSecretsIoV1ExternalSecretSpecTargetTemplateTemplateFromItems0:
511536
secret : ExternalSecretsIoV1ExternalSecretSpecTargetTemplateTemplateFromItems0Secret, default is Undefined, optional
512537
secret
513538
target : str, default is "Data", optional
514-
TemplateTarget specifies where the rendered templates should be applied.
539+
Target specifies where to place the template result.
540+
For Secret resources, common values are: "Data", "Annotations", "Labels".
541+
For custom resources (when spec.target.manifest is set), this supports
542+
nested paths like "spec.database.config" or "data".
515543
"""
516544
configMap?: ExternalSecretsIoV1ExternalSecretSpecTargetTemplateTemplateFromItems0ConfigMap
517545
literal?: str
518546
secret?: ExternalSecretsIoV1ExternalSecretSpecTargetTemplateTemplateFromItems0Secret
519-
target?: "Data" | "Annotations" | "Labels" = "Data"
547+
target?: str = "Data"
520548

521549
schema ExternalSecretsIoV1ExternalSecretSpecTargetTemplateTemplateFromItems0ConfigMap:
522550
r"""

docs/examples/src/charts/external_secrets/api/v1/external_secrets_io_v1_secret_store.k

Lines changed: 200 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2809,9 +2809,12 @@ schema ExternalSecretsIoV1SecretStoreSpecProviderIbmAuthSecretRef:
28092809

28102810
Attributes
28112811
----------
2812+
iamEndpoint : str, default is Undefined, optional
2813+
The IAM endpoint used to obain a token
28122814
secretApiKeySecretRef : ExternalSecretsIoV1SecretStoreSpecProviderIbmAuthSecretRefSecretAPIKeySecretRef, default is Undefined, optional
28132815
secret Api key secret ref
28142816
"""
2817+
iamEndpoint?: str
28152818
secretApiKeySecretRef?: ExternalSecretsIoV1SecretStoreSpecProviderIbmAuthSecretRefSecretAPIKeySecretRef
28162819

28172820
schema ExternalSecretsIoV1SecretStoreSpecProviderIbmAuthSecretRefSecretAPIKeySecretRef:
@@ -5021,6 +5024,12 @@ schema ExternalSecretsIoV1SecretStoreSpecProviderSecretserver:
50215024

50225025
Attributes
50235026
----------
5027+
caBundle : str, default is Undefined, optional
5028+
PEM/base64 encoded CA bundle used to validate Secret ServerURL. Only used
5029+
if the ServerURL URL is using HTTPS protocol. If not set the system root certificates
5030+
are used to validate the TLS connection.
5031+
caProvider : ExternalSecretsIoV1SecretStoreSpecProviderSecretserverCaProvider, default is Undefined, optional
5032+
ca provider
50245033
domain : str, default is Undefined, optional
50255034
Domain is the secret server domain.
50265035
password : ExternalSecretsIoV1SecretStoreSpecProviderSecretserverPassword, default is Undefined, required
@@ -5031,13 +5040,48 @@ schema ExternalSecretsIoV1SecretStoreSpecProviderSecretserver:
50315040
username : ExternalSecretsIoV1SecretStoreSpecProviderSecretserverUsername, default is Undefined, required
50325041
username
50335042
"""
5043+
caBundle?: str
5044+
caProvider?: ExternalSecretsIoV1SecretStoreSpecProviderSecretserverCaProvider
50345045
domain?: str
50355046
password: ExternalSecretsIoV1SecretStoreSpecProviderSecretserverPassword
50365047

50375048
serverURL: str
50385049

50395050
username: ExternalSecretsIoV1SecretStoreSpecProviderSecretserverUsername
50405051

5052+
schema ExternalSecretsIoV1SecretStoreSpecProviderSecretserverCaProvider:
5053+
r"""
5054+
The provider for the CA bundle to use to validate Secret ServerURL certificate.
5055+
5056+
Attributes
5057+
----------
5058+
key : str, default is Undefined, optional
5059+
The key where the CA certificate can be found in the Secret or ConfigMap.
5060+
name : str, default is Undefined, required
5061+
The name of the object located at the provider type.
5062+
namespace : str, default is Undefined, optional
5063+
The namespace the Provider type is in.
5064+
Can only be defined when used in a ClusterSecretStore.
5065+
$type : str, default is Undefined, required
5066+
The type of provider to use such as "Secret", or "ConfigMap".
5067+
"""
5068+
key?: str
5069+
name: str
5070+
5071+
namespace?: str
5072+
$type: "Secret" | "ConfigMap"
5073+
5074+
check:
5075+
len(key) <= 253 if key
5076+
len(key) >= 1 if key
5077+
_regex_match(str(key), r"^[-._a-zA-Z0-9]+$") if key
5078+
len(name) <= 253
5079+
len(name) >= 1
5080+
_regex_match(str(name), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$")
5081+
len(namespace) <= 63 if namespace
5082+
len(namespace) >= 1 if namespace
5083+
_regex_match(str(namespace), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?$") if namespace
5084+
50415085
schema ExternalSecretsIoV1SecretStoreSpecProviderSecretserverPassword:
50425086
r"""
50435087
Password is the secret server account password.
@@ -5264,6 +5308,8 @@ schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuth:
52645308
app role
52655309
cert : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthCert, default is Undefined, optional
52665310
cert
5311+
gcp : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcp, default is Undefined, optional
5312+
gcp
52675313
iam : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthIam, default is Undefined, optional
52685314
iam
52695315
jwt : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthJwt, default is Undefined, optional
@@ -5285,6 +5331,7 @@ schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuth:
52855331
"""
52865332
appRole?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthAppRole
52875333
cert?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthCert
5334+
gcp?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcp
52885335
iam?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthIam
52895336
jwt?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthJwt
52905337
kubernetes?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthKubernetes
@@ -5464,6 +5511,159 @@ schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthCertSecretRef:
54645511
len(namespace) >= 1 if namespace
54655512
_regex_match(str(namespace), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?$") if namespace
54665513

5514+
schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcp:
5515+
r"""
5516+
Gcp authenticates with Vault using Google Cloud Platform authentication method
5517+
GCP authentication method
5518+
5519+
Attributes
5520+
----------
5521+
location : str, default is Undefined, optional
5522+
Location optionally defines a location/region for the secret
5523+
path : str, default is "gcp", optional
5524+
Path where the GCP auth method is enabled in Vault, e.g: "gcp"
5525+
projectID : str, default is Undefined, optional
5526+
Project ID of the Google Cloud Platform project
5527+
role : str, default is Undefined, required
5528+
Vault Role. In Vault, a role describes an identity with a set of permissions, groups, or policies you want to attach to a user of the secrets engine.
5529+
secretRef : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpSecretRef, default is Undefined, optional
5530+
secret ref
5531+
serviceAccountRef : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpServiceAccountRef, default is Undefined, optional
5532+
service account ref
5533+
workloadIdentity : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpWorkloadIdentity, default is Undefined, optional
5534+
workload identity
5535+
"""
5536+
location?: str
5537+
path?: str = "gcp"
5538+
projectID?: str
5539+
role: str
5540+
5541+
secretRef?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpSecretRef
5542+
serviceAccountRef?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpServiceAccountRef
5543+
workloadIdentity?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpWorkloadIdentity
5544+
5545+
schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpSecretRef:
5546+
r"""
5547+
Specify credentials in a Secret object
5548+
5549+
Attributes
5550+
----------
5551+
secretAccessKeySecretRef : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpSecretRefSecretAccessKeySecretRef, default is Undefined, optional
5552+
secret access key secret ref
5553+
"""
5554+
secretAccessKeySecretRef?: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpSecretRefSecretAccessKeySecretRef
5555+
5556+
schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpSecretRefSecretAccessKeySecretRef:
5557+
r"""
5558+
The SecretAccessKey is used for authentication
5559+
5560+
Attributes
5561+
----------
5562+
key : str, default is Undefined, optional
5563+
A key in the referenced Secret.
5564+
Some instances of this field may be defaulted, in others it may be required.
5565+
name : str, default is Undefined, optional
5566+
The name of the Secret resource being referred to.
5567+
namespace : str, default is Undefined, optional
5568+
The namespace of the Secret resource being referred to.
5569+
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
5570+
"""
5571+
key?: str
5572+
name?: str
5573+
namespace?: str
5574+
5575+
check:
5576+
len(key) <= 253 if key
5577+
len(key) >= 1 if key
5578+
_regex_match(str(key), r"^[-._a-zA-Z0-9]+$") if key
5579+
len(name) <= 253 if name
5580+
len(name) >= 1 if name
5581+
_regex_match(str(name), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$") if name
5582+
len(namespace) <= 63 if namespace
5583+
len(namespace) >= 1 if namespace
5584+
_regex_match(str(namespace), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?$") if namespace
5585+
5586+
schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpServiceAccountRef:
5587+
r"""
5588+
ServiceAccountRef to a service account for impersonation
5589+
5590+
Attributes
5591+
----------
5592+
audiences : [str], default is Undefined, optional
5593+
Audience specifies the `aud` claim for the service account token
5594+
If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
5595+
then this audiences will be appended to the list
5596+
name : str, default is Undefined, required
5597+
The name of the ServiceAccount resource being referred to.
5598+
namespace : str, default is Undefined, optional
5599+
Namespace of the resource being referred to.
5600+
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
5601+
"""
5602+
audiences?: [str]
5603+
name: str
5604+
5605+
namespace?: str
5606+
5607+
check:
5608+
len(name) <= 253
5609+
len(name) >= 1
5610+
_regex_match(str(name), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$")
5611+
len(namespace) <= 63 if namespace
5612+
len(namespace) >= 1 if namespace
5613+
_regex_match(str(namespace), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?$") if namespace
5614+
5615+
schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpWorkloadIdentity:
5616+
r"""
5617+
Specify a service account with Workload Identity
5618+
5619+
Attributes
5620+
----------
5621+
clusterLocation : str, default is Undefined, optional
5622+
ClusterLocation is the location of the cluster
5623+
If not specified, it fetches information from the metadata server
5624+
clusterName : str, default is Undefined, optional
5625+
ClusterName is the name of the cluster
5626+
If not specified, it fetches information from the metadata server
5627+
clusterProjectID : str, default is Undefined, optional
5628+
ClusterProjectID is the project ID of the cluster
5629+
If not specified, it fetches information from the metadata server
5630+
serviceAccountRef : ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpWorkloadIdentityServiceAccountRef, default is Undefined, required
5631+
service account ref
5632+
"""
5633+
clusterLocation?: str
5634+
clusterName?: str
5635+
clusterProjectID?: str
5636+
serviceAccountRef: ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpWorkloadIdentityServiceAccountRef
5637+
5638+
schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthGcpWorkloadIdentityServiceAccountRef:
5639+
r"""
5640+
ServiceAccountSelector is a reference to a ServiceAccount resource.
5641+
5642+
Attributes
5643+
----------
5644+
audiences : [str], default is Undefined, optional
5645+
Audience specifies the `aud` claim for the service account token
5646+
If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
5647+
then this audiences will be appended to the list
5648+
name : str, default is Undefined, required
5649+
The name of the ServiceAccount resource being referred to.
5650+
namespace : str, default is Undefined, optional
5651+
Namespace of the resource being referred to.
5652+
Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
5653+
"""
5654+
audiences?: [str]
5655+
name: str
5656+
5657+
namespace?: str
5658+
5659+
check:
5660+
len(name) <= 253
5661+
len(name) >= 1
5662+
_regex_match(str(name), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$")
5663+
len(namespace) <= 63 if namespace
5664+
len(namespace) >= 1 if namespace
5665+
_regex_match(str(namespace), r"^[a-z0-9]([-a-z0-9]*[a-z0-9])?$") if namespace
5666+
54675667
schema ExternalSecretsIoV1SecretStoreSpecProviderVaultAuthIam:
54685668
r"""
54695669
Iam authenticates with vault by passing a special AWS request signed with AWS IAM credentials

docs/examples/src/charts/external_secrets/api/v1alpha1/external_secrets_io_v1alpha1_cluster_push_secret.k

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -416,12 +416,15 @@ schema ExternalSecretsIoV1alpha1ClusterPushSecretSpecPushSecretSpecTemplateTempl
416416
secret : ExternalSecretsIoV1alpha1ClusterPushSecretSpecPushSecretSpecTemplateTemplateFromItems0Secret, default is Undefined, optional
417417
secret
418418
target : str, default is "Data", optional
419-
TemplateTarget specifies where the rendered templates should be applied.
419+
Target specifies where to place the template result.
420+
For Secret resources, common values are: "Data", "Annotations", "Labels".
421+
For custom resources (when spec.target.manifest is set), this supports
422+
nested paths like "spec.database.config" or "data".
420423
"""
421424
configMap?: ExternalSecretsIoV1alpha1ClusterPushSecretSpecPushSecretSpecTemplateTemplateFromItems0ConfigMap
422425
literal?: str
423426
secret?: ExternalSecretsIoV1alpha1ClusterPushSecretSpecPushSecretSpecTemplateTemplateFromItems0Secret
424-
target?: "Data" | "Annotations" | "Labels" = "Data"
427+
target?: str = "Data"
425428

426429
schema ExternalSecretsIoV1alpha1ClusterPushSecretSpecPushSecretSpecTemplateTemplateFromItems0ConfigMap:
427430
r"""

docs/examples/src/charts/external_secrets/api/v1alpha1/external_secrets_io_v1alpha1_push_secret.k

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -330,12 +330,15 @@ schema ExternalSecretsIoV1alpha1PushSecretSpecTemplateTemplateFromItems0:
330330
secret : ExternalSecretsIoV1alpha1PushSecretSpecTemplateTemplateFromItems0Secret, default is Undefined, optional
331331
secret
332332
target : str, default is "Data", optional
333-
TemplateTarget specifies where the rendered templates should be applied.
333+
Target specifies where to place the template result.
334+
For Secret resources, common values are: "Data", "Annotations", "Labels".
335+
For custom resources (when spec.target.manifest is set), this supports
336+
nested paths like "spec.database.config" or "data".
334337
"""
335338
configMap?: ExternalSecretsIoV1alpha1PushSecretSpecTemplateTemplateFromItems0ConfigMap
336339
literal?: str
337340
secret?: ExternalSecretsIoV1alpha1PushSecretSpecTemplateTemplateFromItems0Secret
338-
target?: "Data" | "Annotations" | "Labels" = "Data"
341+
target?: str = "Data"
339342

340343
schema ExternalSecretsIoV1alpha1PushSecretSpecTemplateTemplateFromItems0ConfigMap:
341344
r"""

docs/examples/src/charts/external_secrets/api/v1alpha1/generators_external_secrets_io_v1alpha1_ssh_key.k

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,16 @@ schema GeneratorsExternalSecretsIoV1alpha1SSHKeySpec:
3636
comment : str, default is Undefined, optional
3737
Comment specifies an optional comment for the SSH key
3838
keySize : int, default is Undefined, optional
39-
KeySize specifies the key size for RSA keys (default: 2048)
39+
KeySize specifies the key size for RSA keys (default: 2048) and ECDSA keys (default: 256).
4040
For RSA keys: 2048, 3072, 4096
41+
For ECDSA keys: 256, 384, 521
4142
Ignored for ed25519 keys
4243
keyType : str, default is "rsa", optional
43-
KeyType specifies the SSH key type (rsa, ed25519)
44+
KeyType specifies the SSH key type (rsa, ecdsa, ed25519)
4445
"""
4546
comment?: str
4647
keySize?: int
47-
keyType?: "rsa" | "ed25519" = "rsa"
48+
keyType?: "rsa" | "ecdsa" | "ed25519" = "rsa"
4849

4950
check:
5051
keySize <= 8192 if keySize not in [None, Undefined]

0 commit comments

Comments
 (0)