-
Notifications
You must be signed in to change notification settings - Fork 1
feat(helm)!: Update Chart external-secrets (0.20.4 → 1.0.0) #996
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
pipelines-github-app
wants to merge
1
commit into
main
Choose a base branch
from
renovate/major-1-external-secrets-genmachine
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
feat(helm)!: Update Chart external-secrets (0.20.4 → 1.0.0) #996
pipelines-github-app
wants to merge
1
commit into
main
from
renovate/major-1-external-secrets-genmachine
+1
−1
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Contributor
Author
--- main/external-secrets_gitops_manifests_external-secrets_genmachine_manifest_main.yaml 2025-11-15 03:36:12.331129685 +0000
+++ pr/external-secrets_gitops_manifests_external-secrets_genmachine_manifest_pr.yaml 2025-11-15 03:36:11.340124705 +0000
@@ -1,71 +1,71 @@
---
# Source: external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: external-secrets-cert-controller
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
---
# Source: external-secrets/charts/external-secrets/templates/serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: external-secrets
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
---
# Source: external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: external-secrets-webhook
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
---
# Source: external-secrets/templates/clusterSecretStore.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: eso-auth
namespace: external-secrets
---
# Source: external-secrets/charts/external-secrets/templates/webhook-secret.yaml
apiVersion: v1
kind: Secret
metadata:
name: external-secrets-webhook
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
---
# Source: external-secrets/templates/clusterSecretStore.yaml
apiVersion: v1
kind: Secret
type: kubernetes.io/service-account-token
metadata:
name: eso-auth
namespace: external-secrets
@@ -875,20 +875,39 @@
DeletionPolicy defines rules on how to delete the resulting Secret.
Defaults to "Retain"
enum:
- Delete
- Merge
- Retain
type: string
immutable:
description: Immutable defines if the final secret will be immutable
type: boolean
+ manifest:
+ description: |-
+ Manifest defines a custom Kubernetes resource to create instead of a Secret.
+ When specified, ExternalSecret will create the resource type defined here
+ (e.g., ConfigMap, Custom Resource) instead of a Secret.
+ Warning: Using Generic target. Make sure access policies and encryption are properly configured.
+ properties:
+ apiVersion:
+ description: APIVersion of the target resource (e.g., "v1" for ConfigMap, "argoproj.io/v1alpha1" for ArgoCD Application)
+ minLength: 1
+ type: string
+ kind:
+ description: Kind of the target resource (e.g., "ConfigMap", "Application")
+ minLength: 1
+ type: string
+ required:
+ - apiVersion
+ - kind
+ type: object
name:
description: |-
The name of the Secret resource to be managed.
Defaults to the .metadata.name of the ExternalSecret resource
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
template:
description: Template defines a blueprint for the created Secret resource.
@@ -1002,25 +1021,25 @@
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
required:
- items
- name
type: object
target:
default: Data
- description: TemplateTarget specifies where the rendered templates should be applied.
- enum:
- - Data
- - Annotations
- - Labels
+ description: |-
+ Target specifies where to place the template result.
+ For Secret resources, common values are: "Data", "Annotations", "Labels".
+ For custom resources (when spec.target.manifest is set), this supports
+ nested paths like "spec.database.config" or "data".
type: string
type: object
type: array
type:
type: string
type: object
type: object
type: object
namespaceSelector:
description: |-
@@ -4470,25 +4489,25 @@
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
required:
- items
- name
type: object
target:
default: Data
- description: TemplateTarget specifies where the rendered templates should be applied.
- enum:
- - Data
- - Annotations
- - Labels
+ description: |-
+ Target specifies where to place the template result.
+ For Secret resources, common values are: "Data", "Annotations", "Labels".
+ For custom resources (when spec.target.manifest is set), this supports
+ nested paths like "spec.database.config" or "data".
type: string
type: object
type: array
type:
type: string
type: object
updatePolicy:
default: Replace
description: UpdatePolicy to handle Secrets in the provider.
enum:
@@ -14732,20 +14751,39 @@
DeletionPolicy defines rules on how to delete the resulting Secret.
Defaults to "Retain"
enum:
- Delete
- Merge
- Retain
type: string
immutable:
description: Immutable defines if the final secret will be immutable
type: boolean
+ manifest:
+ description: |-
+ Manifest defines a custom Kubernetes resource to create instead of a Secret.
+ When specified, ExternalSecret will create the resource type defined here
+ (e.g., ConfigMap, Custom Resource) instead of a Secret.
+ Warning: Using Generic target. Make sure access policies and encryption are properly configured.
+ properties:
+ apiVersion:
+ description: APIVersion of the target resource (e.g., "v1" for ConfigMap, "argoproj.io/v1alpha1" for ArgoCD Application)
+ minLength: 1
+ type: string
+ kind:
+ description: Kind of the target resource (e.g., "ConfigMap", "Application")
+ minLength: 1
+ type: string
+ required:
+ - apiVersion
+ - kind
+ type: object
name:
description: |-
The name of the Secret resource to be managed.
Defaults to the .metadata.name of the ExternalSecret resource
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
template:
description: Template defines a blueprint for the created Secret resource.
@@ -14859,25 +14897,25 @@
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
required:
- items
- name
type: object
target:
default: Data
- description: TemplateTarget specifies where the rendered templates should be applied.
- enum:
- - Data
- - Annotations
- - Labels
+ description: |-
+ Target specifies where to place the template result.
+ For Secret resources, common values are: "Data", "Annotations", "Labels".
+ For custom resources (when spec.target.manifest is set), this supports
+ nested paths like "spec.database.config" or "data".
type: string
type: object
type: array
type:
type: string
type: object
type: object
type: object
status:
description: ExternalSecretStatus defines the observed state of ExternalSecret.
@@ -16811,25 +16849,25 @@
maxLength: 253
minLength: 1
pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
type: string
required:
- items
- name
type: object
target:
default: Data
- description: TemplateTarget specifies where the rendered templates should be applied.
- enum:
- - Data
- - Annotations
- - Labels
+ description: |-
+ Target specifies where to place the template result.
+ For Secret resources, common values are: "Data", "Annotations", "Labels".
+ For custom resources (when spec.target.manifest is set), this supports
+ nested paths like "spec.database.config" or "data".
type: string
type: object
type: array
type:
type: string
type: object
updatePolicy:
default: Replace
description: UpdatePolicy to handle Secrets in the provider.
enum:
@@ -27939,24 +27977,24 @@
subresources:
status: {}
---
# Source: external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: external-secrets-cert-controller
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:
- "apiextensions.k8s.io"
resources:
- "customresourcedefinitions"
verbs:
- "get"
- "list"
- "watch"
@@ -28022,24 +28060,24 @@
- "create"
- "update"
- "patch"
---
# Source: external-secrets/charts/external-secrets/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: external-secrets-controller
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:
- "external-secrets.io"
resources:
- "secretstores"
- "clustersecretstores"
- "externalsecrets"
- "clusterexternalsecrets"
- "pushsecrets"
@@ -28174,24 +28212,24 @@
- "create"
- "update"
- "delete"
---
# Source: external-secrets/charts/external-secrets/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: external-secrets-view
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
- apiGroups:
- "external-secrets.io"
resources:
- "externalsecrets"
- "secretstores"
@@ -28225,24 +28263,24 @@
- "get"
- "watch"
- "list"
---
# Source: external-secrets/charts/external-secrets/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: external-secrets-edit
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
- apiGroups:
- "external-secrets.io"
resources:
- "externalsecrets"
- "secretstores"
- "clustersecretstores"
@@ -28280,67 +28318,67 @@
- "patch"
- "update"
---
# Source: external-secrets/charts/external-secrets/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: external-secrets-servicebindings
labels:
servicebinding.io/controller: "true"
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:
- "external-secrets.io"
resources:
- "externalsecrets"
- "pushsecrets"
verbs:
- "get"
- "list"
- "watch"
---
# Source: external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: external-secrets-cert-controller
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: external-secrets-cert-controller
subjects:
- name: external-secrets-cert-controller
namespace: default
kind: ServiceAccount
---
# Source: external-secrets/charts/external-secrets/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: external-secrets-controller
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: external-secrets-controller
subjects:
- name: external-secrets
namespace: default
kind: ServiceAccount
---
@@ -28358,24 +28396,24 @@
name: eso-auth
namespace: external-secrets
---
# Source: external-secrets/charts/external-secrets/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: external-secrets-leaderelection
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
rules:
- apiGroups:
- ""
resources:
- "configmaps"
resourceNames:
- "external-secrets-controller"
verbs:
- "get"
@@ -28397,46 +28435,46 @@
- "update"
- "patch"
---
# Source: external-secrets/charts/external-secrets/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: external-secrets-leaderelection
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: external-secrets-leaderelection
subjects:
- kind: ServiceAccount
name: external-secrets
namespace: default
---
# Source: external-secrets/charts/external-secrets/templates/webhook-service.yaml
apiVersion: v1
kind: Service
metadata:
name: external-secrets-webhook
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
spec:
type: ClusterIP
ports:
- port: 443
targetPort: webhook
protocol: TCP
name: webhook
@@ -28445,58 +28483,58 @@
app.kubernetes.io/instance: external-secrets
---
# Source: external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: external-secrets-cert-controller
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
revisionHistoryLimit: 10
selector:
matchLabels:
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
template:
metadata:
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets-cert-controller
automountServiceAccountToken: true
hostNetwork: false
containers:
- name: cert-controller
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsNonRoot: true
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
- image: oci.external-secrets.io/external-secrets/external-secrets:v0.20.4
+ image: oci.external-secrets.io/external-secrets/external-secrets:v1.0.0
imagePullPolicy: IfNotPresent
args:
- certcontroller
- --crd-requeue-interval=5m
- --service-name=external-secrets-webhook
- --service-namespace=default
- --secret-name=external-secrets-webhook
- --secret-namespace=default
- --metrics-addr=:8080
- --healthz-addr=:8081
@@ -28514,39 +28552,39 @@
initialDelaySeconds: 20
periodSeconds: 5
---
# Source: external-secrets/charts/external-secrets/templates/deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: external-secrets
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
revisionHistoryLimit: 10
selector:
matchLabels:
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
template:
metadata:
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
serviceAccountName: external-secrets
automountServiceAccountToken: true
hostNetwork: false
containers:
- name: external-secrets
securityContext:
allowPrivilegeEscalation: false
capabilities:
@@ -28571,58 +28609,58 @@
dnsPolicy: ClusterFirst
---
# Source: external-secrets/charts/external-secrets/templates/webhook-deployment.yaml
apiVersion: apps/v1
kind: Deployment
metadata:
name: external-secrets-webhook
namespace: default
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
replicas: 1
revisionHistoryLimit: 10
selector:
matchLabels:
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
template:
metadata:
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
spec:
hostNetwork: false
serviceAccountName: external-secrets-webhook
automountServiceAccountToken: true
containers:
- name: webhook
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsNonRoot: true
runAsUser: 1000
seccompProfile:
type: RuntimeDefault
- image: oci.external-secrets.io/external-secrets/external-secrets:v0.20.4
+ image: oci.external-secrets.io/external-secrets/external-secrets:v1.0.0
imagePullPolicy: IfNotPresent
args:
- webhook
- --port=10250
- --dns-name=external-secrets-webhook.default.svc
- --cert-dir=/tmp/certs
- --check-interval=5m
- --metrics-addr=:8080
- --healthz-addr=:8081
- --loglevel=info
@@ -28677,24 +28715,24 @@
key: token
namespace: external-secrets
---
# Source: external-secrets/charts/external-secrets/templates/validatingwebhook.yaml
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
name: secretstore-validate
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks:
- name: "validate.secretstore.external-secrets.io"
rules:
- apiGroups: ["external-secrets.io"]
apiVersions: ["v1"]
operations: ["CREATE", "UPDATE", "DELETE"]
resources: ["secretstores"]
scope: "Namespaced"
@@ -28723,24 +28761,24 @@
sideEffects: None
timeoutSeconds: 5
---
# Source: external-secrets/charts/external-secrets/templates/validatingwebhook.yaml
apiVersion: admissionregistration.k8s.io/v1
kind: ValidatingWebhookConfiguration
metadata:
name: externalsecret-validate
labels:
- helm.sh/chart: external-secrets-0.20.4
+ helm.sh/chart: external-secrets-1.0.0
app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/instance: external-secrets
- app.kubernetes.io/version: "v0.20.4"
+ app.kubernetes.io/version: "v1.0.0"
app.kubernetes.io/managed-by: Helm
external-secrets.io/component: webhook
webhooks:
- name: "validate.externalsecret.external-secrets.io"
rules:
- apiGroups: ["external-secrets.io"]
apiVersions: ["v1"]
operations: ["CREATE", "UPDATE", "DELETE"]
resources: ["externalsecrets"]
scope: "Namespaced"
|
342afb6 to
9507715
Compare
| datasource | package | from | to | | ---------- | ---------------- | ------ | ----- | | helm | external-secrets | 0.20.4 | 1.0.0 | Co-authored-by: renovate[bot] <[email protected]>
9507715 to
d8879a6
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
app/external-secrets
Changes made to External Secrets application
env/genmachine
Changes made in the Talos cluster
renovate/helm
Changes related to Helm Chart update
type/major
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.20.4->1.0.0Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
external-secrets/external-secrets (external-secrets)
v1.0.0Compare Source
Image:
ghcr.io/external-secrets/external-secrets:v1.0.0Image:
ghcr.io/external-secrets/external-secrets:v1.0.0-ubiImage:
ghcr.io/external-secrets/external-secrets:v1.0.0-ubi-boringsslWhat's Changed
General
Dependencies
4bcff63to4b7ce07in /hack/api-docs by @dependabot[bot] in #5507aee43c3toaee43c3by @dependabot[bot] in #5516c529327to982f6f0by @dependabot[bot] in #5510New Contributors
Full Changelog: external-secrets/external-secrets@v0.20.4...v1.0.0
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.