diff --git a/components/build-service/base/external-secrets/pipelines-as-code-secret.yaml b/components/build-service/base/external-secrets/pipelines-as-code-secret.yaml index 4663435f005..09fbae5873c 100644 --- a/components/build-service/base/external-secrets/pipelines-as-code-secret.yaml +++ b/components/build-service/base/external-secrets/pipelines-as-code-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/pipeline-service/github-app + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore diff --git a/components/build-templates/staging/e2e-quay-push-secret.yaml b/components/build-templates/staging/e2e-quay-push-secret.yaml index 5581b80e764..3b850b0762f 100644 --- a/components/build-templates/staging/e2e-quay-push-secret.yaml +++ b/components/build-templates/staging/e2e-quay-push-secret.yaml @@ -9,7 +9,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/build/tekton-ci/quay-push-secret + metadataPolicy: None refreshInterval: 15m secretStoreRef: kind: ClusterSecretStore diff --git a/components/ci-helper-app/staging/external-secrets/ci-helper-app-secrets.yaml b/components/ci-helper-app/staging/external-secrets/ci-helper-app-secrets.yaml index 257db9c2874..b578569c4fd 100644 --- a/components/ci-helper-app/staging/external-secrets/ci-helper-app-secrets.yaml +++ b/components/ci-helper-app/staging/external-secrets/ci-helper-app-secrets.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/qe/ci-helper-app-secrets + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/cluster-as-a-service/staging/external-secrets.yaml b/components/cluster-as-a-service/staging/external-secrets.yaml index 1310588379c..260ecc7f2da 100644 --- a/components/cluster-as-a-service/staging/external-secrets.yaml +++ b/components/cluster-as-a-service/staging/external-secrets.yaml @@ -7,10 +7,16 @@ metadata: hypershift.openshift.io/safe-to-delete-with-cluster: "false" spec: dataFrom: - - extract: - key: staging/eaas/stage-eaas-serviceaccount - - extract: - key: staging/eaas/konflux-eaas-stage + - extract: + conversionStrategy: Default + decodingStrategy: None + key: staging/eaas/stage-eaas-serviceaccount + metadataPolicy: None + - extract: + conversionStrategy: Default + decodingStrategy: None + key: staging/eaas/konflux-eaas-stage + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore @@ -28,7 +34,6 @@ spec: pull-secret: "{{ .ocp_pull_secret }}" ssh-privatekey: unused ssh-publickey: unused - --- apiVersion: external-secrets.io/v1beta1 kind: ExternalSecret @@ -37,8 +42,11 @@ metadata: namespace: local-cluster spec: dataFrom: - - extract: - key: staging/eaas/stage-eaas-bucket-s3 + - extract: + conversionStrategy: Default + decodingStrategy: None + key: staging/eaas/stage-eaas-bucket-s3 + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore diff --git a/components/cost-management/base/external-service-account-secret.yaml b/components/cost-management/base/external-service-account-secret.yaml index 3f21dcdd372..766b34a1134 100644 --- a/components/cost-management/base/external-service-account-secret.yaml +++ b/components/cost-management/base/external-service-account-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/crossplane-control-plane/staging/provider-config.yaml b/components/crossplane-control-plane/staging/provider-config.yaml index b4470fef35e..d7fe6c4884a 100644 --- a/components/crossplane-control-plane/staging/provider-config.yaml +++ b/components/crossplane-control-plane/staging/provider-config.yaml @@ -12,7 +12,6 @@ spec: namespace: crossplane-system name: eaas-cluster key: kubeconfig - --- apiVersion: external-secrets.io/v1beta1 kind: ExternalSecret @@ -25,7 +24,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/eaas/eaas-stage-kubeconfig + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/crossplane-control-plane/staging/testplatform-provider-config.yaml b/components/crossplane-control-plane/staging/testplatform-provider-config.yaml index e8ed3e26761..9c8b51e2492 100644 --- a/components/crossplane-control-plane/staging/testplatform-provider-config.yaml +++ b/components/crossplane-control-plane/staging/testplatform-provider-config.yaml @@ -24,7 +24,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: production/openshift-ci/appci-cluster + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/dora-metrics/base/external-secrets/exporters-secrets.yaml b/components/dora-metrics/base/external-secrets/exporters-secrets.yaml index 5a1cfe481d5..d978796d959 100644 --- a/components/dora-metrics/base/external-secrets/exporters-secrets.yaml +++ b/components/dora-metrics/base/external-secrets/exporters-secrets.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/qe/exporters-secret + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/has/base/external-secrets/has-github-token.yaml b/components/has/base/external-secrets/has-github-token.yaml index ffb3309fa77..48e27005bdf 100644 --- a/components/has/base/external-secrets/has-github-token.yaml +++ b/components/has/base/external-secrets/has-github-token.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/has/github-token + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/image-controller/base/external-secrets/quaytoken.yaml b/components/image-controller/base/external-secrets/quaytoken.yaml index 23b841429e6..c1897fd7d52 100644 --- a/components/image-controller/base/external-secrets/quaytoken.yaml +++ b/components/image-controller/base/external-secrets/quaytoken.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/build/image-controller + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore diff --git a/components/integration/base/external-secrets/pipelines-as-code-secret.yaml b/components/integration/base/external-secrets/pipelines-as-code-secret.yaml index 4663435f005..09fbae5873c 100644 --- a/components/integration/base/external-secrets/pipelines-as-code-secret.yaml +++ b/components/integration/base/external-secrets/pipelines-as-code-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/pipeline-service/github-app + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-ci/base/external-secrets/clair-in-ci-db-github-token.yaml b/components/konflux-ci/base/external-secrets/clair-in-ci-db-github-token.yaml index 47d9a88c781..e8af3c09719 100644 --- a/components/konflux-ci/base/external-secrets/clair-in-ci-db-github-token.yaml +++ b/components/konflux-ci/base/external-secrets/clair-in-ci-db-github-token.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "production/integration-service/tekton-ci/clair-in-ci-db-github-token" + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-ci/base/external-secrets/github-secret.yaml b/components/konflux-ci/base/external-secrets/github-secret.yaml index 4644ab0f73e..ce460fe22c5 100644 --- a/components/konflux-ci/base/external-secrets/github-secret.yaml +++ b/components/konflux-ci/base/external-secrets/github-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "production/build/tekton-ci/github-read-only" + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-ci/base/external-secrets/infra-deployments-pr-creator.yaml b/components/konflux-ci/base/external-secrets/infra-deployments-pr-creator.yaml index c5ac1dc1d21..a66ce505e91 100644 --- a/components/konflux-ci/base/external-secrets/infra-deployments-pr-creator.yaml +++ b/components/konflux-ci/base/external-secrets/infra-deployments-pr-creator.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/build/tekton-ci/infra-deployments-pr-creator + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-ci/base/external-secrets/konflux-ci-repo-creator.yaml b/components/konflux-ci/base/external-secrets/konflux-ci-repo-creator.yaml index 2a857f8bb87..aba5d189452 100644 --- a/components/konflux-ci/base/external-secrets/konflux-ci-repo-creator.yaml +++ b/components/konflux-ci/base/external-secrets/konflux-ci-repo-creator.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: production/build/tekton-ci/konflux-ci-repo-creator + metadataPolicy: None refreshInterval: 15m secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-ci/base/external-secrets/quay-push-secret-konflux-ci.yaml b/components/konflux-ci/base/external-secrets/quay-push-secret-konflux-ci.yaml index 2d67489cfbf..cd803212352 100644 --- a/components/konflux-ci/base/external-secrets/quay-push-secret-konflux-ci.yaml +++ b/components/konflux-ci/base/external-secrets/quay-push-secret-konflux-ci.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/build/tekton-ci/quay-push-secret-konflux-ci + metadataPolicy: None refreshInterval: 15m secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-ci/base/external-secrets/registry-redhat-io-pull-secret.yaml b/components/konflux-ci/base/external-secrets/registry-redhat-io-pull-secret.yaml index 6dcf1cc18a7..aabaa96dc59 100644 --- a/components/konflux-ci/base/external-secrets/registry-redhat-io-pull-secret.yaml +++ b/components/konflux-ci/base/external-secrets/registry-redhat-io-pull-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: production/build/tekton-ci/registry-redhat-io-pull-secret + metadataPolicy: None refreshInterval: 15m secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-ci/base/external-secrets/slack-webhook-notification-secret.yaml b/components/konflux-ci/base/external-secrets/slack-webhook-notification-secret.yaml index 5a7b755ed4d..c69cd84f603 100644 --- a/components/konflux-ci/base/external-secrets/slack-webhook-notification-secret.yaml +++ b/components/konflux-ci/base/external-secrets/slack-webhook-notification-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "production/build/tekton-ci/slack-webhook-notification-secret" + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-ci/base/external-secrets/snyk-shared-token.yaml b/components/konflux-ci/base/external-secrets/snyk-shared-token.yaml index 3f9621f5280..a14f820dca8 100644 --- a/components/konflux-ci/base/external-secrets/snyk-shared-token.yaml +++ b/components/konflux-ci/base/external-secrets/snyk-shared-token.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "staging/build/tekton-ci/snyk-shared-secret" # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/konflux-kite/base/external-secrets/database-secret.yaml b/components/konflux-kite/base/external-secrets/database-secret.yaml index a959efac296..fbb328f0a01 100644 --- a/components/konflux-kite/base/external-secrets/database-secret.yaml +++ b/components/konflux-kite/base/external-secrets/database-secret.yaml @@ -8,8 +8,11 @@ metadata: namespace: konflux-kite spec: dataFrom: - - extract: - key: "" # will be added by a patch specific to each cluster + - extract: + conversionStrategy: Default + decodingStrategy: None + key: "" # will be added by a patch specific to each cluster + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/kubearchive/staging/base/external-secret.yaml b/components/kubearchive/staging/base/external-secret.yaml index a4c449dafc6..99bc6480f45 100644 --- a/components/kubearchive/staging/base/external-secret.yaml +++ b/components/kubearchive/staging/base/external-secret.yaml @@ -10,7 +10,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/kubearchive/logging + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/kubearchive/staging/stone-stage-p01/database-secret.yaml b/components/kubearchive/staging/stone-stage-p01/database-secret.yaml index 7394e6d193d..233d841664c 100644 --- a/components/kubearchive/staging/stone-stage-p01/database-secret.yaml +++ b/components/kubearchive/staging/stone-stage-p01/database-secret.yaml @@ -9,7 +9,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: integrations-output/external-resources/appsres09ue1/stone-stage-p01/stone-stage-p01-kube-archive-rds + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/kubearchive/staging/stone-stg-rh01/database-secret.yaml b/components/kubearchive/staging/stone-stg-rh01/database-secret.yaml index fc34833a336..5134c1d32a0 100644 --- a/components/kubearchive/staging/stone-stg-rh01/database-secret.yaml +++ b/components/kubearchive/staging/stone-stg-rh01/database-secret.yaml @@ -9,7 +9,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: integrations-output/external-resources/appsres09ue1/stonesoup-infra-stage/kube-archive-staging-rds + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/mintmaker/base/external-secrets/pipelines-as-code-secret.yaml b/components/mintmaker/base/external-secrets/pipelines-as-code-secret.yaml index 4663435f005..09fbae5873c 100644 --- a/components/mintmaker/base/external-secrets/pipelines-as-code-secret.yaml +++ b/components/mintmaker/base/external-secrets/pipelines-as-code-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/pipeline-service/github-app + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore diff --git a/components/monitoring/kanary/staging/stone-stage-p01/external-secrets/kanary-db-credentials.yaml b/components/monitoring/kanary/staging/stone-stage-p01/external-secrets/kanary-db-credentials.yaml index 4b1dae8c9c1..f34e37f0bc0 100644 --- a/components/monitoring/kanary/staging/stone-stage-p01/external-secrets/kanary-db-credentials.yaml +++ b/components/monitoring/kanary/staging/stone-stage-p01/external-secrets/kanary-db-credentials.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: # will be added by the overlays + metadataPolicy: None refreshInterval: 15m secretStoreRef: kind: ClusterSecretStore diff --git a/components/monitoring/logging/base/external-secrets/splunk-log-forwarder-external-secrets.yaml b/components/monitoring/logging/base/external-secrets/splunk-log-forwarder-external-secrets.yaml index b241727c6cf..5a61aa51fcf 100644 --- a/components/monitoring/logging/base/external-secrets/splunk-log-forwarder-external-secrets.yaml +++ b/components/monitoring/logging/base/external-secrets/splunk-log-forwarder-external-secrets.yaml @@ -7,8 +7,11 @@ metadata: argocd.argoproj.io/sync-wave: "-1" spec: dataFrom: - - extract: - key: "" # will be added by the overlays + - extract: + conversionStrategy: Default + decodingStrategy: None + key: "" # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: name: appsre-stonesoup-vault @@ -26,8 +29,11 @@ metadata: argocd.argoproj.io/sync-wave: "-1" spec: dataFrom: - - extract: - key: "" # will be added by the overlays + - extract: + conversionStrategy: Default + decodingStrategy: None + key: "" # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: name: appsre-stonesoup-vault diff --git a/components/monitoring/logging/staging/base/dynatrace-operator/dynakube-secret.yaml b/components/monitoring/logging/staging/base/dynatrace-operator/dynakube-secret.yaml index 575a3aa713b..71917fde1e0 100644 --- a/components/monitoring/logging/staging/base/dynatrace-operator/dynakube-secret.yaml +++ b/components/monitoring/logging/staging/base/dynatrace-operator/dynakube-secret.yaml @@ -20,4 +20,7 @@ spec: deletionPolicy: Delete dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/monitoring/logging/dynatrace + metadataPolicy: None diff --git a/components/monitoring/prometheus/base/external-secrets/rhobs.yaml b/components/monitoring/prometheus/base/external-secrets/rhobs.yaml index 7e1319568f3..73f3a949b27 100644 --- a/components/monitoring/prometheus/base/external-secrets/rhobs.yaml +++ b/components/monitoring/prometheus/base/external-secrets/rhobs.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/multi-platform-controller/staging-downstream/external-secrets.yaml b/components/multi-platform-controller/staging-downstream/external-secrets.yaml index 4d410e7be47..690908e4e36 100644 --- a/components/multi-platform-controller/staging-downstream/external-secrets.yaml +++ b/components/multi-platform-controller/staging-downstream/external-secrets.yaml @@ -11,7 +11,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/infrastructure/multi-platform-controller/stone-stage-p01/aws-account + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore @@ -34,7 +37,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/infrastructure/multi-platform-controller/stone-stage-p01/aws-ssh-key + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore @@ -57,7 +63,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/infrastructure/multi-platform-controller/stone-stage-p01/ibm-ppc64le-ssh-key + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore @@ -80,7 +89,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/infrastructure/multi-platform-controller/stone-stage-p01/ibm-s390x-ssh-key + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/multi-platform-controller/staging/external-secrets.yaml b/components/multi-platform-controller/staging/external-secrets.yaml index df1331873fb..223dd563f99 100644 --- a/components/multi-platform-controller/staging/external-secrets.yaml +++ b/components/multi-platform-controller/staging/external-secrets.yaml @@ -12,7 +12,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/infrastructure/multi-platform-controller/stone-stg-rh01/aws-account + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore @@ -35,7 +38,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/infrastructure/multi-platform-controller/stone-stg-rh01/aws-ssh-key + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore @@ -58,7 +64,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/infrastructure/multi-platform-controller/stone-stg-rh01/ibm-ppc64le-ssh-key + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore @@ -81,7 +90,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/infrastructure/multi-platform-controller/stone-stg-rh01/ibm-s390x-ssh-key + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/notification-controller/base/external-secrets/aws-sns-secret.yaml b/components/notification-controller/base/external-secrets/aws-sns-secret.yaml index 656f834fc58..63087d33006 100644 --- a/components/notification-controller/base/external-secrets/aws-sns-secret.yaml +++ b/components/notification-controller/base/external-secrets/aws-sns-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: # will be added by the overlays + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore diff --git a/components/pipeline-service/base/external-secrets/openshift-pipelines/chains-signing-secrets.yaml b/components/pipeline-service/base/external-secrets/openshift-pipelines/chains-signing-secrets.yaml index fb9e6cc8cf3..8b463c00022 100644 --- a/components/pipeline-service/base/external-secrets/openshift-pipelines/chains-signing-secrets.yaml +++ b/components/pipeline-service/base/external-secrets/openshift-pipelines/chains-signing-secrets.yaml @@ -9,7 +9,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "" # will be added by the overlays + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore diff --git a/components/pipeline-service/base/external-secrets/tekton-logging/tekton-results-s3.yaml b/components/pipeline-service/base/external-secrets/tekton-logging/tekton-results-s3.yaml index f1707461bd3..55f1bbb0073 100644 --- a/components/pipeline-service/base/external-secrets/tekton-logging/tekton-results-s3.yaml +++ b/components/pipeline-service/base/external-secrets/tekton-logging/tekton-results-s3.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "" # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/pipeline-service/base/external-secrets/tekton-results/tekton-results-database.yaml b/components/pipeline-service/base/external-secrets/tekton-results/tekton-results-database.yaml index f21076bf490..19bf25b2884 100644 --- a/components/pipeline-service/base/external-secrets/tekton-results/tekton-results-database.yaml +++ b/components/pipeline-service/base/external-secrets/tekton-results/tekton-results-database.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "" # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/pipeline-service/base/external-secrets/tekton-results/tekton-results-s3.yaml b/components/pipeline-service/base/external-secrets/tekton-results/tekton-results-s3.yaml index f1707461bd3..55f1bbb0073 100644 --- a/components/pipeline-service/base/external-secrets/tekton-results/tekton-results-s3.yaml +++ b/components/pipeline-service/base/external-secrets/tekton-results/tekton-results-s3.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "" # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/pipeline-service/staging/base/pipelines-as-code-secret.yaml b/components/pipeline-service/staging/base/pipelines-as-code-secret.yaml index 3609d953ce1..b99f08bbcf9 100644 --- a/components/pipeline-service/staging/base/pipelines-as-code-secret.yaml +++ b/components/pipeline-service/staging/base/pipelines-as-code-secret.yaml @@ -9,7 +9,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/pipeline-service/github-app + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore diff --git a/components/quality-dashboard/staging/external-secrets/quality-dashboard-secrets.yaml b/components/quality-dashboard/staging/external-secrets/quality-dashboard-secrets.yaml index ed8a09ec71e..a84f3964217 100644 --- a/components/quality-dashboard/staging/external-secrets/quality-dashboard-secrets.yaml +++ b/components/quality-dashboard/staging/external-secrets/quality-dashboard-secrets.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/qe/quality-dashboard-secrets + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/release/staging/external-secrets/release-monitor-secret.yaml b/components/release/staging/external-secrets/release-monitor-secret.yaml index 5790336a695..b0968e13190 100644 --- a/components/release/staging/external-secrets/release-monitor-secret.yaml +++ b/components/release/staging/external-secrets/release-monitor-secret.yaml @@ -9,7 +9,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/release/monitor + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/tekton-ci/base/external-secrets/clair-in-ci-db-github-token.yaml b/components/tekton-ci/base/external-secrets/clair-in-ci-db-github-token.yaml index 47d9a88c781..e8af3c09719 100644 --- a/components/tekton-ci/base/external-secrets/clair-in-ci-db-github-token.yaml +++ b/components/tekton-ci/base/external-secrets/clair-in-ci-db-github-token.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "production/integration-service/tekton-ci/clair-in-ci-db-github-token" + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/tekton-ci/base/external-secrets/github-secret.yaml b/components/tekton-ci/base/external-secrets/github-secret.yaml index 4644ab0f73e..ce460fe22c5 100644 --- a/components/tekton-ci/base/external-secrets/github-secret.yaml +++ b/components/tekton-ci/base/external-secrets/github-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "production/build/tekton-ci/github-read-only" + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/tekton-ci/base/external-secrets/infra-deployments-pr-creator.yaml b/components/tekton-ci/base/external-secrets/infra-deployments-pr-creator.yaml index c5ac1dc1d21..a66ce505e91 100644 --- a/components/tekton-ci/base/external-secrets/infra-deployments-pr-creator.yaml +++ b/components/tekton-ci/base/external-secrets/infra-deployments-pr-creator.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/build/tekton-ci/infra-deployments-pr-creator + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/tekton-ci/base/external-secrets/quay-push-secret.yaml b/components/tekton-ci/base/external-secrets/quay-push-secret.yaml index 6f1237e11bd..7be6d111155 100644 --- a/components/tekton-ci/base/external-secrets/quay-push-secret.yaml +++ b/components/tekton-ci/base/external-secrets/quay-push-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/build/tekton-ci/quay-push-secret + metadataPolicy: None refreshInterval: 15m secretStoreRef: kind: ClusterSecretStore diff --git a/components/tekton-ci/base/external-secrets/registry-redhat-io-pull-secret.yaml b/components/tekton-ci/base/external-secrets/registry-redhat-io-pull-secret.yaml index 6dcf1cc18a7..aabaa96dc59 100644 --- a/components/tekton-ci/base/external-secrets/registry-redhat-io-pull-secret.yaml +++ b/components/tekton-ci/base/external-secrets/registry-redhat-io-pull-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: production/build/tekton-ci/registry-redhat-io-pull-secret + metadataPolicy: None refreshInterval: 15m secretStoreRef: kind: ClusterSecretStore diff --git a/components/tekton-ci/base/external-secrets/slack-webhook-notification-secret.yaml b/components/tekton-ci/base/external-secrets/slack-webhook-notification-secret.yaml index 5a7b755ed4d..c69cd84f603 100644 --- a/components/tekton-ci/base/external-secrets/slack-webhook-notification-secret.yaml +++ b/components/tekton-ci/base/external-secrets/slack-webhook-notification-secret.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "production/build/tekton-ci/slack-webhook-notification-secret" + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/tekton-ci/base/external-secrets/snyk-shared-token.yaml b/components/tekton-ci/base/external-secrets/snyk-shared-token.yaml index 3f9621f5280..a14f820dca8 100644 --- a/components/tekton-ci/base/external-secrets/snyk-shared-token.yaml +++ b/components/tekton-ci/base/external-secrets/snyk-shared-token.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: "staging/build/tekton-ci/snyk-shared-secret" # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/tracing/otel-collector/base/external-secrets/signalfx-api-key.yaml b/components/tracing/otel-collector/base/external-secrets/signalfx-api-key.yaml index 04eb8414790..86083c6a6d1 100644 --- a/components/tracing/otel-collector/base/external-secrets/signalfx-api-key.yaml +++ b/components/tracing/otel-collector/base/external-secrets/signalfx-api-key.yaml @@ -8,7 +8,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: # will be added by the overlays + metadataPolicy: None refreshInterval: 1h secretStoreRef: kind: ClusterSecretStore diff --git a/components/vector-kubearchive-log-collector/staging/base/loki-secret.yaml b/components/vector-kubearchive-log-collector/staging/base/loki-secret.yaml index c385e64373c..5d3fd6c264f 100644 --- a/components/vector-kubearchive-log-collector/staging/base/loki-secret.yaml +++ b/components/vector-kubearchive-log-collector/staging/base/loki-secret.yaml @@ -10,7 +10,10 @@ metadata: spec: dataFrom: - extract: + conversionStrategy: Default + decodingStrategy: None key: staging/kubearchive/loki + metadataPolicy: None refreshInterval: 5m secretStoreRef: kind: ClusterSecretStore