Skip to content

Commit 60a4bd2

Browse files
authored
Build: upgrade controller-gen to 0.16.3 (#944)
Update chart upgrade tests to properly handle annotations/label changes
1 parent e497f09 commit 60a4bd2

22 files changed

+77
-544
lines changed

Makefile

+1-1
Original file line numberDiff line numberDiff line change
@@ -499,7 +499,7 @@ ENVTEST ?= $(LOCALBIN)/setup-envtest
499499

500500
## Tool Versions
501501
KUSTOMIZE_VERSION ?= v4.5.7
502-
CONTROLLER_TOOLS_VERSION ?= v0.14.0
502+
CONTROLLER_TOOLS_VERSION ?= v0.16.3
503503

504504
KUSTOMIZE_INSTALL_SCRIPT ?= "./hack/install_kustomize.sh"
505505
.PHONY: kustomize

chart/crds/secrets.hashicorp.com_hcpauths.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: hcpauths.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com

chart/crds/secrets.hashicorp.com_hcpvaultsecretsapps.yaml

+1-4
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: hcpvaultsecretsapps.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com
@@ -225,7 +225,6 @@ spec:
225225
with a timestamp value of when the trigger was executed.
226226
E.g. vso.secrets.hashicorp.com/restartedAt: "2023-03-23T13:39:31Z"
227227
228-
229228
Supported resources: Deployment, DaemonSet, StatefulSet, argo.Rollout
230229
properties:
231230
kind:
@@ -302,12 +301,10 @@ spec:
302301
description: |-
303302
SecretMAC used when deciding whether new Vault secret data should be synced.
304303
305-
306304
The controller will compare the "new" HCP Vault Secrets App data to this value
307305
using HMAC, if they are different, then the data will be synced to the
308306
Destination.
309307
310-
311308
The SecretMac is also used to detect drift in the Destination Secret's Data.
312309
If drift is detected the data will be synced to the Destination.
313310
type: string

chart/crds/secrets.hashicorp.com_secrettransformations.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: secrettransformations.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com

chart/crds/secrets.hashicorp.com_vaultauthglobals.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: vaultauthglobals.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com

chart/crds/secrets.hashicorp.com_vaultauths.yaml

+4-24
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: vaultauths.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com
@@ -252,7 +252,6 @@ spec:
252252
as the default if Name is not set. The 'allow-default-globals' option must be
253253
set on the operator's '-global-vault-auth-options' flag
254254
255-
256255
The default VaultAuthGlobal search is conditional.
257256
When a ref Namespace is set, the search for the default
258257
VaultAuthGlobal resource is constrained to that namespace.
@@ -271,15 +270,12 @@ spec:
271270
Headers configures the merge strategy for HTTP headers that are included in
272271
all Vault requests. Choices are `union`, `replace`, or `none`.
273272
274-
275273
If `union` is set, the headers from the VaultAuthGlobal and VaultAuth
276274
resources are merged. The headers from the VaultAuth always take precedence.
277275
278-
279276
If `replace` is set, the first set of non-empty headers taken in order from:
280277
VaultAuth, VaultAuthGlobal auth method, VaultGlobal default headers.
281278
282-
283279
If `none` is set, the headers from the
284280
VaultAuthGlobal resource are ignored and only the headers from the VaultAuth
285281
resource are used. The default is `none`.
@@ -293,16 +289,13 @@ spec:
293289
Params configures the merge strategy for HTTP parameters that are included in
294290
all Vault requests. Choices are `union`, `replace`, or `none`.
295291
296-
297292
If `union` is set, the parameters from the VaultAuthGlobal and VaultAuth
298293
resources are merged. The parameters from the VaultAuth always take
299294
precedence.
300295
301-
302296
If `replace` is set, the first set of non-empty parameters taken in order from:
303297
VaultAuth, VaultAuthGlobal auth method, VaultGlobal default parameters.
304298
305-
306299
If `none` is set, the parameters from the VaultAuthGlobal resource are ignored
307300
and only the parameters from the VaultAuth resource are used. The default is
308301
`none`.
@@ -336,16 +329,8 @@ spec:
336329
properties:
337330
conditions:
338331
items:
339-
description: "Condition contains details for one aspect of the current
340-
state of this API Resource.\n---\nThis struct is intended for
341-
direct use as an array at the field path .status.conditions. For
342-
example,\n\n\n\ttype FooStatus struct{\n\t // Represents the
343-
observations of a foo's current state.\n\t // Known .status.conditions.type
344-
are: \"Available\", \"Progressing\", and \"Degraded\"\n\t //
345-
+patchMergeKey=type\n\t // +patchStrategy=merge\n\t // +listType=map\n\t
346-
\ // +listMapKey=type\n\t Conditions []metav1.Condition `json:\"conditions,omitempty\"
347-
patchStrategy:\"merge\" patchMergeKey:\"type\" protobuf:\"bytes,1,rep,name=conditions\"`\n\n\n\t
348-
\ // other fields\n\t}"
332+
description: Condition contains details for one aspect of the current
333+
state of this API Resource.
349334
properties:
350335
lastTransitionTime:
351336
description: |-
@@ -386,12 +371,7 @@ spec:
386371
- Unknown
387372
type: string
388373
type:
389-
description: |-
390-
type of condition in CamelCase or in foo.example.com/CamelCase.
391-
---
392-
Many .condition.type values are consistent across resources like Available, but because arbitrary conditions can be
393-
useful (see .node.status.conditions), the ability to deconflict is important.
394-
The regex it matches is (dns1123SubdomainFmt/)?(qualifiedNameFmt)
374+
description: type of condition in CamelCase or in foo.example.com/CamelCase.
395375
maxLength: 316
396376
pattern: ^([a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*/)?(([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9])$
397377
type: string

chart/crds/secrets.hashicorp.com_vaultconnections.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: vaultconnections.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com

chart/crds/secrets.hashicorp.com_vaultdynamicsecrets.yaml

+1-4
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: vaultdynamicsecrets.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com
@@ -272,7 +272,6 @@ spec:
272272
with a timestamp value of when the trigger was executed.
273273
E.g. vso.secrets.hashicorp.com/restartedAt: "2023-03-23T13:39:31Z"
274274
275-
276275
Supported resources: Deployment, DaemonSet, StatefulSet, argo.Rollout
277276
properties:
278277
kind:
@@ -345,11 +344,9 @@ spec:
345344
description: |-
346345
SecretMAC used when deciding whether new Vault secret data should be synced.
347346
348-
349347
The controller will compare the "new" Vault secret data to this value using HMAC,
350348
if they are different, then the data will be synced to the Destination.
351349
352-
353350
The SecretMac is also used to detect drift in the Destination Secret's Data.
354351
If drift is detected the data will be synced to the Destination.
355352
SecretMAC will only be stored when VaultDynamicSecretSpec.AllowStaticCreds is true.

chart/crds/secrets.hashicorp.com_vaultpkisecrets.yaml

+1-4
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: vaultpkisecrets.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com
@@ -289,7 +289,6 @@ spec:
289289
with a timestamp value of when the trigger was executed.
290290
E.g. vso.secrets.hashicorp.com/restartedAt: "2023-03-23T13:39:31Z"
291291
292-
293292
Supported resources: Deployment, DaemonSet, StatefulSet, argo.Rollout
294293
properties:
295294
kind:
@@ -364,11 +363,9 @@ spec:
364363
description: |-
365364
SecretMAC used when deciding whether new Vault secret data should be synced.
366365
367-
368366
The controller will compare the "new" Vault secret data to this value using HMAC,
369367
if they are different, then the data will be synced to the Destination.
370368
371-
372369
The SecretMac is also used to detect drift in the Destination Secret's Data.
373370
If drift is detected the data will be synced to the Destination.
374371
type: string

chart/crds/secrets.hashicorp.com_vaultstaticsecrets.yaml

+1-4
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ apiVersion: apiextensions.k8s.io/v1
66
kind: CustomResourceDefinition
77
metadata:
88
annotations:
9-
controller-gen.kubebuilder.io/version: v0.14.0
9+
controller-gen.kubebuilder.io/version: v0.16.3
1010
name: vaultstaticsecrets.secrets.hashicorp.com
1111
spec:
1212
group: secrets.hashicorp.com
@@ -233,7 +233,6 @@ spec:
233233
with a timestamp value of when the trigger was executed.
234234
E.g. vso.secrets.hashicorp.com/restartedAt: "2023-03-23T13:39:31Z"
235235
236-
237236
Supported resources: Deployment, DaemonSet, StatefulSet, argo.Rollout
238237
properties:
239238
kind:
@@ -298,11 +297,9 @@ spec:
298297
description: |-
299298
SecretMAC used when deciding whether new Vault secret data should be synced.
300299
301-
302300
The controller will compare the "new" Vault secret data to this value using HMAC,
303301
if they are different, then the data will be synced to the Destination.
304302
305-
306303
The SecretMac is also used to detect drift in the Destination Secret's Data.
307304
If drift is detected the data will be synced to the Destination.
308305
type: string

0 commit comments

Comments
 (0)