Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update chart external-secrets to 0.13.0 #219

Merged
merged 1 commit into from
Jan 21, 2025

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jan 21, 2025

This PR contains the following updates:

Package Update Change
external-secrets minor 0.12.1 -> 0.13.0

Release Notes

external-secrets/external-secrets (external-secrets)

v0.13.0

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v0.13.0
Image: ghcr.io/external-secrets/external-secrets:v0.13.0-ubi
Image: ghcr.io/external-secrets/external-secrets:v0.13.0-ubi-boringssl

What's Changed

New Contributors

Full Changelog: external-secrets/external-secrets@v0.12.1...v0.13.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link
Contributor

ArgoCD Diff Results

Diff for external-secrets:

===== /Service external-secrets/external-secrets-webhook ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
14c14
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== /ServiceAccount external-secrets/external-secrets ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== /ServiceAccount external-secrets/external-secrets-cert-controller ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== /ServiceAccount external-secrets/external-secrets-webhook ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== admissionregistration.k8s.io/ValidatingWebhookConfiguration /externalsecret-validate ======
12c12
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
15c15
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== admissionregistration.k8s.io/ValidatingWebhookConfiguration /secretstore-validate ======
12c12
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
15c15
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== apiextensions.k8s.io/CustomResourceDefinition /acraccesstokens.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /clusterexternalsecrets.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1
262a263
>                                   - QuayAccessToken
457a459
>                                   - QuayAccessToken

===== apiextensions.k8s.io/CustomResourceDefinition /clustergenerators.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1
652a653,696
>                   quayAccessTokenSpec:
>                     properties:
>                       robotAccount:
>                         description: Name of the robot account you are federating
>                           with
>                         type: string
>                       serviceAccountRef:
>                         description: Name of the service account you are federating
>                           with
>                         properties:
>                           audiences:
>                             description: |-
>                               Audience specifies the `aud` claim for the service account token
>                               If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
>                               then this audiences will be appended to the list
>                             items:
>                               type: string
>                             type: array
>                           name:
>                             description: The name of the ServiceAccount resource being
>                               referred to.
>                             maxLength: 253
>                             minLength: 1
>                             pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
>                             type: string
>                           namespace:
>                             description: |-
>                               Namespace of the resource being referred to.
>                               Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
>                             maxLength: 63
>                             minLength: 1
>                             pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
>                             type: string
>                         required:
>                         - name
>                         type: object
>                       url:
>                         description: URL configures the Quay instance URL. Defaults
>                           to quay.io.
>                         type: string
>                     required:
>                     - robotAccount
>                     - serviceAccountRef
>                     type: object
821a866,870
>                       allowEmptyResponse:
>                         default: false
>                         description: Do not fail if no secrets are found. Useful for
>                           requests where no data is expected.
>                         type: boolean
1776a1826
>                 - QuayAccessToken

===== apiextensions.k8s.io/CustomResourceDefinition /clustersecretstores.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /ecrauthorizationtokens.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /externalsecrets.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1
563a564
>                               - QuayAccessToken
757a759
>                               - QuayAccessToken

===== apiextensions.k8s.io/CustomResourceDefinition /fakes.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /gcraccesstokens.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /githubaccesstokens.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /passwords.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /pushsecrets.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1
283a284
>                         - QuayAccessToken

===== apiextensions.k8s.io/CustomResourceDefinition /secretstores.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /stssessiontokens.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /uuids.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apiextensions.k8s.io/CustomResourceDefinition /vaultdynamicsecrets.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1
136a137,141
>               allowEmptyResponse:
>                 default: false
>                 description: Do not fail if no secrets are found. Useful for requests
>                   where no data is expected.
>                 type: boolean

===== apiextensions.k8s.io/CustomResourceDefinition /webhooks.generators.external-secrets.io ======
5c5
<     controller-gen.kubebuilder.io/version: v0.16.5
---
>     controller-gen.kubebuilder.io/version: v0.17.1

===== apps/Deployment external-secrets/external-secrets ======
13c13
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
15c15
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0
166,167c166,167
<         app.kubernetes.io/version: v0.12.1
<         helm.sh/chart: external-secrets-0.12.1
---
>         app.kubernetes.io/version: v0.13.0
>         helm.sh/chart: external-secrets-0.13.0
176c176
<         image: ghcr.io/external-secrets/external-secrets:v0.12.1
---
>         image: ghcr.io/external-secrets/external-secrets:v0.13.0

===== apps/Deployment external-secrets/external-secrets-cert-controller ======
13c13
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
15c15
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0
178,179c178,179
<         app.kubernetes.io/version: v0.12.1
<         helm.sh/chart: external-secrets-0.12.1
---
>         app.kubernetes.io/version: v0.13.0
>         helm.sh/chart: external-secrets-0.13.0
195c195
<         image: oci.external-secrets.io/external-secrets/external-secrets:v0.12.1
---
>         image: oci.external-secrets.io/external-secrets/external-secrets:v0.13.0

===== apps/Deployment external-secrets/external-secrets-webhook ======
13c13
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
15c15
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0
199,200c199,200
<         app.kubernetes.io/version: v0.12.1
<         helm.sh/chart: external-secrets-0.12.1
---
>         app.kubernetes.io/version: v0.13.0
>         helm.sh/chart: external-secrets-0.13.0
214c214
<         image: oci.external-secrets.io/external-secrets/external-secrets:v0.12.1
---
>         image: oci.external-secrets.io/external-secrets/external-secrets:v0.13.0

===== rbac.authorization.k8s.io/ClusterRole /external-secrets-cert-controller ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== rbac.authorization.k8s.io/ClusterRole /external-secrets-controller ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0
96a97
>   - quayaccesstokens

===== rbac.authorization.k8s.io/ClusterRole /external-secrets-edit ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0
79a80
>   - quayaccesstokens

===== rbac.authorization.k8s.io/ClusterRole /external-secrets-servicebindings ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== rbac.authorization.k8s.io/ClusterRole /external-secrets-view ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0
79a80
>   - quayaccesstokens

===== rbac.authorization.k8s.io/ClusterRoleBinding /external-secrets-cert-controller ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== rbac.authorization.k8s.io/ClusterRoleBinding /external-secrets-controller ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== rbac.authorization.k8s.io/Role external-secrets/external-secrets-leaderelection ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== rbac.authorization.k8s.io/RoleBinding external-secrets/external-secrets-leaderelection ======
11c11
<     app.kubernetes.io/version: v0.12.1
---
>     app.kubernetes.io/version: v0.13.0
13c13
<     helm.sh/chart: external-secrets-0.12.1
---
>     helm.sh/chart: external-secrets-0.13.0

===== apiextensions.k8s.io/CustomResourceDefinition /quayaccesstokens.generators.external-secrets.io ======
0a1,99
> apiVersion: apiextensions.k8s.io/v1
> kind: CustomResourceDefinition
> metadata:
>   annotations:
>     controller-gen.kubebuilder.io/version: v0.17.1
>   labels:
>     external-secrets.io/component: controller
>   name: quayaccesstokens.generators.external-secrets.io
> spec:
>   conversion:
>     strategy: Webhook
>     webhook:
>       clientConfig:
>         service:
>           name: external-secrets-webhook
>           namespace: external-secrets
>           path: /convert
>       conversionReviewVersions:
>       - v1
>   group: generators.external-secrets.io
>   names:
>     categories:
>     - external-secrets
>     - external-secrets-generators
>     kind: QuayAccessToken
>     listKind: QuayAccessTokenList
>     plural: quayaccesstokens
>     singular: quayaccesstoken
>   scope: Namespaced
>   versions:
>   - name: v1alpha1
>     schema:
>       openAPIV3Schema:
>         description: QuayAccessToken generates Quay oauth token for pulling/pushing
>           images
>         properties:
>           apiVersion:
>             description: |-
>               APIVersion defines the versioned schema of this representation of an object.
>               Servers should convert recognized schemas to the latest internal value, and
>               may reject unrecognized values.
>               More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
>             type: string
>           kind:
>             description: |-
>               Kind is a string value representing the REST resource this object represents.
>               Servers may infer this from the endpoint the client submits requests to.
>               Cannot be updated.
>               In CamelCase.
>               More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
>             type: string
>           metadata:
>             type: object
>           spec:
>             properties:
>               robotAccount:
>                 description: Name of the robot account you are federating with
>                 type: string
>               serviceAccountRef:
>                 description: Name of the service account you are federating with
>                 properties:
>                   audiences:
>                     description: |-
>                       Audience specifies the `aud` claim for the service account token
>                       If the service account uses a well-known annotation for e.g. IRSA or GCP Workload Identity
>                       then this audiences will be appended to the list
>                     items:
>                       type: string
>                     type: array
>                   name:
>                     description: The name of the ServiceAccount resource being referred
>                       to.
>                     maxLength: 253
>                     minLength: 1
>                     pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
>                     type: string
>                   namespace:
>                     description: |-
>                       Namespace of the resource being referred to.
>                       Ignored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent.
>                     maxLength: 63
>                     minLength: 1
>                     pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?$
>                     type: string
>                 required:
>                 - name
>                 type: object
>               url:
>                 description: URL configures the Quay instance URL. Defaults to quay.io.
>                 type: string
>             required:
>             - robotAccount
>             - serviceAccountRef
>             type: object
>         type: object
>     served: true
>     storage: true
>     subresources:
>       status: {}

@cterence cterence merged commit c45f9d7 into main Jan 21, 2025
2 checks passed
@renovate renovate bot deleted the renovate/external-secrets-0.x branch January 21, 2025 18:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant