Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(container): update image external-secrets ( 0.12.1 → 0.13.0 ) #5029

Merged
merged 1 commit into from
Jan 21, 2025

Conversation

repo-jeeves[bot]
Copy link
Contributor

@repo-jeeves repo-jeeves bot commented Jan 21, 2025

This PR contains the following updates:

Package Update Change
external-secrets minor 0.12.1 -> 0.13.0

Release Notes

external-secrets/external-secrets (external-secrets)

v0.13.0

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v0.13.0
Image: ghcr.io/external-secrets/external-secrets:v0.13.0-ubi
Image: ghcr.io/external-secrets/external-secrets:v0.13.0-ubi-boringssl

BREAKING CHANGES

https://github.com/external-secrets/external-secrets/pull/4262 introduces a breaking change in the METADATA structure for the AWS PARAMETER STORE.

What's Changed

New Contributors

Full Changelog: external-secrets/external-secrets@v0.12.1...v0.13.0

@repo-jeeves repo-jeeves bot added renovate/container Issue relates to a Renovate container update type/minor Issue relates to a minor version bump cluster/staging Changes made in the staging cluster size/XS Marks a PR that changes 0-9 lines, ignoring generated files labels Jan 21, 2025
| datasource | package                                          | from   | to     |
| ---------- | ------------------------------------------------ | ------ | ------ |
| docker     | ghcr.io/external-secrets/charts/external-secrets | 0.12.1 | 0.13.0 |
@repo-jeeves repo-jeeves bot force-pushed the renovate/staging-external-secrets-0.x branch from 8f736ab to 5d3e8cd Compare January 21, 2025 09:13
@repo-jeeves
Copy link
Contributor Author

repo-jeeves bot commented Jan 21, 2025

--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-cert-controller

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-cert-controller

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.12.1
+        image: ghcr.io/external-secrets/external-secrets:v0.13.0
         imagePullPolicy: IfNotPresent
         args:
         - certcontroller
         - --crd-requeue-interval=5m
         - --service-name=external-secrets-webhook
         - --service-namespace=external-secrets
--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.12.1
+        image: ghcr.io/external-secrets/external-secrets:v0.13.0
         imagePullPolicy: IfNotPresent
         args:
         - --concurrent=1
         - --metrics-addr=:8080
         - --loglevel=info
         - --zap-time-encoding=epoch
--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-webhook

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-webhook

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.12.1
+        image: ghcr.io/external-secrets/external-secrets:v0.13.0
         imagePullPolicy: IfNotPresent
         args:
         - webhook
         - --port=10250
         - --dns-name=external-secrets-webhook.external-secrets.svc
         - --cert-dir=/tmp/certs

@repo-jeeves
Copy link
Contributor Author

repo-jeeves bot commented Jan 21, 2025

--- kubernetes/staging/apps/external-secrets/external-secrets/app Kustomization: external-secrets/external-secrets HelmRelease: external-secrets/external-secrets

+++ kubernetes/staging/apps/external-secrets/external-secrets/app Kustomization: external-secrets/external-secrets HelmRelease: external-secrets/external-secrets

@@ -14,13 +14,13 @@

       chart: external-secrets
       interval: 15m
       sourceRef:
         kind: HelmRepository
         name: external-secrets-charts
         namespace: flux-system
-      version: 0.12.1
+      version: 0.13.0
   dependsOn:
   - name: onepassword-connect
     namespace: external-secrets
   install:
     createNamespace: true
     remediation:

@repo-jeeves
Copy link
Contributor Author

repo-jeeves bot commented Jan 21, 2025

🦙 MegaLinter status: ✅ SUCCESS

Descriptor Linter Files Fixed Errors Elapsed time
✅ COPYPASTE jscpd yes no 1.03s
✅ REPOSITORY git_diff yes no 0.06s
✅ REPOSITORY secretlint yes no 2.83s
✅ YAML prettier 1 0 0.35s
✅ YAML yamllint 1 0 0.34s

See detailed report in MegaLinter reports
Set VALIDATE_ALL_CODEBASE: true in mega-linter.yml to validate all sources, not only the diff

MegaLinter is graciously provided by OX Security

@szinn szinn merged commit 531890a into main Jan 21, 2025
13 checks passed
@szinn szinn deleted the renovate/staging-external-secrets-0.x branch January 21, 2025 11:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cluster/staging Changes made in the staging cluster renovate/container Issue relates to a Renovate container update size/XS Marks a PR that changes 0-9 lines, ignoring generated files type/minor Issue relates to a minor version bump
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant