@@ -302,20 +302,31 @@ func (r *Reconciler) updateImageInStatus(esc *operatorv1alpha1.ExternalSecretsCo
302302
303303// argument list for external-secrets deployment resource
304304func updateContainerSpec (deployment * appsv1.Deployment , esc * operatorv1alpha1.ExternalSecretsConfig , image , logLevel string ) {
305- namespace := getOperatingNamespace (esc )
305+ var (
306+ enableClusterStoreArgFmt = "--enable-cluster-store-reconciler=%s"
307+ enableClusterExternalSecretsArgFmt = "--enable-cluster-external-secret-reconciler=%s"
308+ )
309+
306310 args := []string {
307311 "--concurrent=1" ,
308312 "--metrics-addr=:8080" ,
309313 fmt .Sprintf ("--loglevel=%s" , logLevel ),
310314 "--zap-time-encoding=epoch" ,
311315 "--enable-leader-election=true" ,
312- "--enable-cluster-store-reconciler=true" ,
313- "--enable-cluster-external-secret-reconciler=true" ,
314316 "--enable-push-secret-reconciler=true" ,
315317 }
316318
319+ // when spec.appConfig.operatingNamespace is configured, which is for restricting the
320+ // external-secrets custom resource reconcile scope to specified namespace, the reconciliation
321+ // of cluster scoped custom resources must also be disabled.
322+ namespace := getOperatingNamespace (esc )
317323 if namespace != "" {
318- args = append (args , fmt .Sprintf ("--namespace=%s" , namespace ))
324+ args = append (args , fmt .Sprintf ("--namespace=%s" , namespace ),
325+ fmt .Sprintf (enableClusterStoreArgFmt , "false" ),
326+ fmt .Sprintf (enableClusterExternalSecretsArgFmt , "false" ))
327+ } else {
328+ args = append (args , fmt .Sprintf (enableClusterStoreArgFmt , "true" ),
329+ fmt .Sprintf (enableClusterExternalSecretsArgFmt , "true" ))
319330 }
320331
321332 for i , container := range deployment .Spec .Template .Spec .Containers {
0 commit comments