Skip to content

Conversation

@pipelines-github-app
Copy link
Contributor

This PR contains the following updates:

Package Update Change
external-secrets major 0.20.4 -> 1.0.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

external-secrets/external-secrets (external-secrets)

v1.0.0

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v1.0.0
Image: ghcr.io/external-secrets/external-secrets:v1.0.0-ubi
Image: ghcr.io/external-secrets/external-secrets:v1.0.0-ubi-boringssl

What's Changed

General
Dependencies

New Contributors

Full Changelog: external-secrets/external-secrets@v0.20.4...v1.0.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@pipelines-github-app pipelines-github-app bot added app/external-secrets Changes made to External Secrets application env/genmachine Changes made in the Talos cluster renovate/helm Changes related to Helm Chart update type/major labels Nov 8, 2025
@pipelines-github-app
Copy link
Contributor Author

pipelines-github-app bot commented Nov 8, 2025

--- main/external-secrets_gitops_manifests_external-secrets_genmachine_manifest_main.yaml	2025-11-15 03:36:12.331129685 +0000
+++ pr/external-secrets_gitops_manifests_external-secrets_genmachine_manifest_pr.yaml	2025-11-15 03:36:11.340124705 +0000
@@ -1,71 +1,71 @@
 ---
 # Source: external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: external-secrets-cert-controller
   namespace: default
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 ---
 # Source: external-secrets/charts/external-secrets/templates/serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: external-secrets
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 ---
 # Source: external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: external-secrets-webhook
   namespace: default
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 ---
 # Source: external-secrets/templates/clusterSecretStore.yaml
 apiVersion: v1
 kind: ServiceAccount
 metadata:
   name: eso-auth
   namespace: external-secrets
 ---
 # Source: external-secrets/charts/external-secrets/templates/webhook-secret.yaml
 apiVersion: v1
 kind: Secret
 metadata:
   name: external-secrets-webhook
   namespace: default
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
     external-secrets.io/component: webhook
 ---
 # Source: external-secrets/templates/clusterSecretStore.yaml
 apiVersion: v1
 kind: Secret
 type: kubernetes.io/service-account-token
 metadata:
   name: eso-auth
   namespace: external-secrets
@@ -875,20 +875,39 @@
                             DeletionPolicy defines rules on how to delete the resulting Secret.
                             Defaults to "Retain"
                           enum:
                             - Delete
                             - Merge
                             - Retain
                           type: string
                         immutable:
                           description: Immutable defines if the final secret will be immutable
                           type: boolean
+                        manifest:
+                          description: |-
+                            Manifest defines a custom Kubernetes resource to create instead of a Secret.
+                            When specified, ExternalSecret will create the resource type defined here
+                            (e.g., ConfigMap, Custom Resource) instead of a Secret.
+                            Warning: Using Generic target. Make sure access policies and encryption are properly configured.
+                          properties:
+                            apiVersion:
+                              description: APIVersion of the target resource (e.g., "v1" for ConfigMap, "argoproj.io/v1alpha1" for ArgoCD Application)
+                              minLength: 1
+                              type: string
+                            kind:
+                              description: Kind of the target resource (e.g., "ConfigMap", "Application")
+                              minLength: 1
+                              type: string
+                          required:
+                            - apiVersion
+                            - kind
+                          type: object
                         name:
                           description: |-
                             The name of the Secret resource to be managed.
                             Defaults to the .metadata.name of the ExternalSecret resource
                           maxLength: 253
                           minLength: 1
                           pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
                           type: string
                         template:
                           description: Template defines a blueprint for the created Secret resource.
@@ -1002,25 +1021,25 @@
                                         maxLength: 253
                                         minLength: 1
                                         pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
                                         type: string
                                     required:
                                       - items
                                       - name
                                     type: object
                                   target:
                                     default: Data
-                                    description: TemplateTarget specifies where the rendered templates should be applied.
-                                    enum:
-                                      - Data
-                                      - Annotations
-                                      - Labels
+                                    description: |-
+                                      Target specifies where to place the template result.
+                                      For Secret resources, common values are: "Data", "Annotations", "Labels".
+                                      For custom resources (when spec.target.manifest is set), this supports
+                                      nested paths like "spec.database.config" or "data".
                                     type: string
                                 type: object
                               type: array
                             type:
                               type: string
                           type: object
                       type: object
                   type: object
                 namespaceSelector:
                   description: |-
@@ -4470,25 +4489,25 @@
                                     maxLength: 253
                                     minLength: 1
                                     pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
                                     type: string
                                 required:
                                   - items
                                   - name
                                 type: object
                               target:
                                 default: Data
-                                description: TemplateTarget specifies where the rendered templates should be applied.
-                                enum:
-                                  - Data
-                                  - Annotations
-                                  - Labels
+                                description: |-
+                                  Target specifies where to place the template result.
+                                  For Secret resources, common values are: "Data", "Annotations", "Labels".
+                                  For custom resources (when spec.target.manifest is set), this supports
+                                  nested paths like "spec.database.config" or "data".
                                 type: string
                             type: object
                           type: array
                         type:
                           type: string
                       type: object
                     updatePolicy:
                       default: Replace
                       description: UpdatePolicy to handle Secrets in the provider.
                       enum:
@@ -14732,20 +14751,39 @@
                         DeletionPolicy defines rules on how to delete the resulting Secret.
                         Defaults to "Retain"
                       enum:
                         - Delete
                         - Merge
                         - Retain
                       type: string
                     immutable:
                       description: Immutable defines if the final secret will be immutable
                       type: boolean
+                    manifest:
+                      description: |-
+                        Manifest defines a custom Kubernetes resource to create instead of a Secret.
+                        When specified, ExternalSecret will create the resource type defined here
+                        (e.g., ConfigMap, Custom Resource) instead of a Secret.
+                        Warning: Using Generic target. Make sure access policies and encryption are properly configured.
+                      properties:
+                        apiVersion:
+                          description: APIVersion of the target resource (e.g., "v1" for ConfigMap, "argoproj.io/v1alpha1" for ArgoCD Application)
+                          minLength: 1
+                          type: string
+                        kind:
+                          description: Kind of the target resource (e.g., "ConfigMap", "Application")
+                          minLength: 1
+                          type: string
+                      required:
+                        - apiVersion
+                        - kind
+                      type: object
                     name:
                       description: |-
                         The name of the Secret resource to be managed.
                         Defaults to the .metadata.name of the ExternalSecret resource
                       maxLength: 253
                       minLength: 1
                       pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
                       type: string
                     template:
                       description: Template defines a blueprint for the created Secret resource.
@@ -14859,25 +14897,25 @@
                                     maxLength: 253
                                     minLength: 1
                                     pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
                                     type: string
                                 required:
                                   - items
                                   - name
                                 type: object
                               target:
                                 default: Data
-                                description: TemplateTarget specifies where the rendered templates should be applied.
-                                enum:
-                                  - Data
-                                  - Annotations
-                                  - Labels
+                                description: |-
+                                  Target specifies where to place the template result.
+                                  For Secret resources, common values are: "Data", "Annotations", "Labels".
+                                  For custom resources (when spec.target.manifest is set), this supports
+                                  nested paths like "spec.database.config" or "data".
                                 type: string
                             type: object
                           type: array
                         type:
                           type: string
                       type: object
                   type: object
               type: object
             status:
               description: ExternalSecretStatus defines the observed state of ExternalSecret.
@@ -16811,25 +16849,25 @@
                                 maxLength: 253
                                 minLength: 1
                                 pattern: ^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$
                                 type: string
                             required:
                               - items
                               - name
                             type: object
                           target:
                             default: Data
-                            description: TemplateTarget specifies where the rendered templates should be applied.
-                            enum:
-                              - Data
-                              - Annotations
-                              - Labels
+                            description: |-
+                              Target specifies where to place the template result.
+                              For Secret resources, common values are: "Data", "Annotations", "Labels".
+                              For custom resources (when spec.target.manifest is set), this supports
+                              nested paths like "spec.database.config" or "data".
                             type: string
                         type: object
                       type: array
                     type:
                       type: string
                   type: object
                 updatePolicy:
                   default: Replace
                   description: UpdatePolicy to handle Secrets in the provider.
                   enum:
@@ -27939,24 +27977,24 @@
       subresources:
         status: {}
 ---
 # Source: external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: external-secrets-cert-controller
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "apiextensions.k8s.io"
     resources:
     - "customresourcedefinitions"
     verbs:
     - "get"
     - "list"
     - "watch"
@@ -28022,24 +28060,24 @@
     - "create"
     - "update"
     - "patch"
 ---
 # Source: external-secrets/charts/external-secrets/templates/rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: external-secrets-controller
   labels:
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "external-secrets.io"
     resources:
     - "secretstores"
     - "clustersecretstores"
     - "externalsecrets"
     - "clusterexternalsecrets"
     - "pushsecrets"
@@ -28174,24 +28212,24 @@
     - "create"
     - "update"
     - "delete"
 ---
 # Source: external-secrets/charts/external-secrets/templates/rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: external-secrets-view
   labels:
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
     rbac.authorization.k8s.io/aggregate-to-view: "true"
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
 rules:
   - apiGroups:
       - "external-secrets.io"
     resources:
       - "externalsecrets"
       - "secretstores"
@@ -28225,24 +28263,24 @@
       - "get"
       - "watch"
       - "list"
 ---
 # Source: external-secrets/charts/external-secrets/templates/rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: external-secrets-edit
   labels:
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
 rules:
   - apiGroups:
       - "external-secrets.io"
     resources:
       - "externalsecrets"
       - "secretstores"
       - "clustersecretstores"
@@ -28280,67 +28318,67 @@
       - "patch"
       - "update"
 ---
 # Source: external-secrets/charts/external-secrets/templates/rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRole
 metadata:
   name: external-secrets-servicebindings
   labels:
     servicebinding.io/controller: "true"
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "external-secrets.io"
     resources:
     - "externalsecrets"
     - "pushsecrets"
     verbs:
     - "get"
     - "list"
     - "watch"
 ---
 # Source: external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   name: external-secrets-cert-controller
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
   name: external-secrets-cert-controller
 subjects:
   - name: external-secrets-cert-controller
     namespace: default
     kind: ServiceAccount
 ---
 # Source: external-secrets/charts/external-secrets/templates/rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: ClusterRoleBinding
 metadata:
   name: external-secrets-controller
   labels:
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
   name: external-secrets-controller
 subjects:
   - name: external-secrets
     namespace: default
     kind: ServiceAccount
 ---
@@ -28358,24 +28396,24 @@
     name: eso-auth
     namespace: external-secrets
 ---
 # Source: external-secrets/charts/external-secrets/templates/rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: Role
 metadata:
   name: external-secrets-leaderelection
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - ""
     resources:
     - "configmaps"
     resourceNames:
     - "external-secrets-controller"
     verbs:
     - "get"
@@ -28397,46 +28435,46 @@
     - "update"
     - "patch"
 ---
 # Source: external-secrets/charts/external-secrets/templates/rbac.yaml
 apiVersion: rbac.authorization.k8s.io/v1
 kind: RoleBinding
 metadata:
   name: external-secrets-leaderelection
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: Role
   name: external-secrets-leaderelection
 subjects:
   - kind: ServiceAccount
     name: external-secrets
     namespace: default
 ---
 # Source: external-secrets/charts/external-secrets/templates/webhook-service.yaml
 apiVersion: v1
 kind: Service
 metadata:
   name: external-secrets-webhook
   namespace: default
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
     external-secrets.io/component: webhook
   
 spec:
   type: ClusterIP
   ports:
   - port: 443
     targetPort: webhook
     protocol: TCP
     name: webhook
@@ -28445,58 +28483,58 @@
     app.kubernetes.io/instance: external-secrets
 ---
 # Source: external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml
 apiVersion: apps/v1
 kind: Deployment
 metadata:
   name: external-secrets-cert-controller
   namespace: default
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
   selector:
     matchLabels:
       app.kubernetes.io/name: external-secrets-cert-controller
       app.kubernetes.io/instance: external-secrets
   template:
     metadata:
       labels:
         
-        helm.sh/chart: external-secrets-0.20.4
+        helm.sh/chart: external-secrets-1.0.0
         app.kubernetes.io/name: external-secrets-cert-controller
         app.kubernetes.io/instance: external-secrets
-        app.kubernetes.io/version: "v0.20.4"
+        app.kubernetes.io/version: "v1.0.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       serviceAccountName: external-secrets-cert-controller
       automountServiceAccountToken: true
       hostNetwork: false
       containers:
         - name: cert-controller
           securityContext:
             allowPrivilegeEscalation: false
             capabilities:
               drop:
               - ALL
             readOnlyRootFilesystem: true
             runAsNonRoot: true
             runAsUser: 1000
             seccompProfile:
               type: RuntimeDefault
-          image: oci.external-secrets.io/external-secrets/external-secrets:v0.20.4
+          image: oci.external-secrets.io/external-secrets/external-secrets:v1.0.0
           imagePullPolicy: IfNotPresent
           args:
           - certcontroller
           - --crd-requeue-interval=5m
           - --service-name=external-secrets-webhook
           - --service-namespace=default
           - --secret-name=external-secrets-webhook
           - --secret-namespace=default
           - --metrics-addr=:8080
           - --healthz-addr=:8081
@@ -28514,39 +28552,39 @@
             initialDelaySeconds: 20
             periodSeconds: 5
 ---
 # Source: external-secrets/charts/external-secrets/templates/deployment.yaml
 apiVersion: apps/v1
 kind: Deployment
 metadata:
   name: external-secrets
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
   selector:
     matchLabels:
       app.kubernetes.io/name: external-secrets
       app.kubernetes.io/instance: external-secrets
   template:
     metadata:
       labels:
-        helm.sh/chart: external-secrets-0.20.4
+        helm.sh/chart: external-secrets-1.0.0
         app.kubernetes.io/name: external-secrets
         app.kubernetes.io/instance: external-secrets
-        app.kubernetes.io/version: "v0.20.4"
+        app.kubernetes.io/version: "v1.0.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       serviceAccountName: external-secrets
       automountServiceAccountToken: true
       hostNetwork: false
       containers:
         - name: external-secrets
           securityContext:
             allowPrivilegeEscalation: false
             capabilities:
@@ -28571,58 +28609,58 @@
       dnsPolicy: ClusterFirst
 ---
 # Source: external-secrets/charts/external-secrets/templates/webhook-deployment.yaml
 apiVersion: apps/v1
 kind: Deployment
 metadata:
   name: external-secrets-webhook
   namespace: default
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
   selector:
     matchLabels:
       app.kubernetes.io/name: external-secrets-webhook
       app.kubernetes.io/instance: external-secrets
   template:
     metadata:
       labels:
         
-        helm.sh/chart: external-secrets-0.20.4
+        helm.sh/chart: external-secrets-1.0.0
         app.kubernetes.io/name: external-secrets-webhook
         app.kubernetes.io/instance: external-secrets
-        app.kubernetes.io/version: "v0.20.4"
+        app.kubernetes.io/version: "v1.0.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       hostNetwork: false
       serviceAccountName: external-secrets-webhook
       automountServiceAccountToken: true
       containers:
         - name: webhook
           securityContext:
             allowPrivilegeEscalation: false
             capabilities:
               drop:
               - ALL
             readOnlyRootFilesystem: true
             runAsNonRoot: true
             runAsUser: 1000
             seccompProfile:
               type: RuntimeDefault
-          image: oci.external-secrets.io/external-secrets/external-secrets:v0.20.4
+          image: oci.external-secrets.io/external-secrets/external-secrets:v1.0.0
           imagePullPolicy: IfNotPresent
           args:
           - webhook
           - --port=10250
           - --dns-name=external-secrets-webhook.default.svc
           - --cert-dir=/tmp/certs
           - --check-interval=5m
           - --metrics-addr=:8080
           - --healthz-addr=:8081
           - --loglevel=info
@@ -28677,24 +28715,24 @@
             key: token
             namespace: external-secrets
 ---
 # Source: external-secrets/charts/external-secrets/templates/validatingwebhook.yaml
 apiVersion: admissionregistration.k8s.io/v1
 kind: ValidatingWebhookConfiguration
 metadata:
   name: secretstore-validate
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
     external-secrets.io/component: webhook
 webhooks:
 - name: "validate.secretstore.external-secrets.io"
   rules:
   - apiGroups:   ["external-secrets.io"]
     apiVersions: ["v1"]
     operations:  ["CREATE", "UPDATE", "DELETE"]
     resources:   ["secretstores"]
     scope:       "Namespaced"
@@ -28723,24 +28761,24 @@
   sideEffects: None
   timeoutSeconds: 5
 ---
 # Source: external-secrets/charts/external-secrets/templates/validatingwebhook.yaml
 apiVersion: admissionregistration.k8s.io/v1
 kind: ValidatingWebhookConfiguration
 metadata:
   name: externalsecret-validate
   labels:
     
-    helm.sh/chart: external-secrets-0.20.4
+    helm.sh/chart: external-secrets-1.0.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: external-secrets
-    app.kubernetes.io/version: "v0.20.4"
+    app.kubernetes.io/version: "v1.0.0"
     app.kubernetes.io/managed-by: Helm
     external-secrets.io/component: webhook
 webhooks:
 - name: "validate.externalsecret.external-secrets.io"
   rules:
   - apiGroups:   ["external-secrets.io"]
     apiVersions: ["v1"]
     operations:  ["CREATE", "UPDATE", "DELETE"]
     resources:   ["externalsecrets"]
     scope:       "Namespaced"
 

@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-1-external-secrets-genmachine branch 8 times, most recently from 342afb6 to 9507715 Compare November 14, 2025 03:41
| datasource | package          | from   | to    |
| ---------- | ---------------- | ------ | ----- |
| helm       | external-secrets | 0.20.4 | 1.0.0 |


Co-authored-by: renovate[bot] <[email protected]>
@pipelines-github-app pipelines-github-app bot force-pushed the renovate/major-1-external-secrets-genmachine branch from 9507715 to d8879a6 Compare November 15, 2025 03:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

app/external-secrets Changes made to External Secrets application env/genmachine Changes made in the Talos cluster renovate/helm Changes related to Helm Chart update type/major

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant