Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(helm): update chart external-secrets ( 0.9.19 → 0.9.20 ) #3946

Merged
merged 1 commit into from
Jul 7, 2024

Conversation

repo-jeeves[bot]
Copy link
Contributor

@repo-jeeves repo-jeeves bot commented Jul 6, 2024

This PR contains the following updates:

Package Update Change
external-secrets patch 0.9.19 -> 0.9.20

Release Notes

external-secrets/external-secrets (external-secrets)

v0.9.20

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v0.9.20
Image: ghcr.io/external-secrets/external-secrets:v0.9.20-ubi
Image: ghcr.io/external-secrets/external-secrets:v0.9.20-ubi-boringssl

What's Changed

New Contributors

Full Changelog: external-secrets/external-secrets@v0.9.19...v0.9.20

| datasource | package          | from   | to     |
| ---------- | ---------------- | ------ | ------ |
| helm       | external-secrets | 0.9.19 | 0.9.20 |
@repo-jeeves repo-jeeves bot added renovate/helm Issue relates to a Renovate helm update type/patch Issue relates to a patch version bump cluster/staging Changes made in the staging cluster size/XS Marks a PR that changes 0-9 lines, ignoring generated files labels Jul 6, 2024
@repo-jeeves
Copy link
Contributor Author

repo-jeeves bot commented Jul 6, 2024

--- HelmRelease: security/external-secrets ClusterRole: security/external-secrets-controller

+++ HelmRelease: security/external-secrets ClusterRole: security/external-secrets-controller

@@ -36,12 +36,13 @@

   - clusterexternalsecrets/status
   - clusterexternalsecrets/finalizers
   - pushsecrets
   - pushsecrets/status
   - pushsecrets/finalizers
   verbs:
+  - get
   - update
   - patch
 - apiGroups:
   - generators.external-secrets.io
   resources:
   - acraccesstokens
--- HelmRelease: security/external-secrets Deployment: security/external-secrets-cert-controller

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets-cert-controller

@@ -34,23 +34,26 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.9.19
+        image: ghcr.io/external-secrets/external-secrets:v0.9.20
         imagePullPolicy: IfNotPresent
         args:
         - certcontroller
         - --crd-requeue-interval=5m
         - --service-name=external-secrets-webhook
         - --service-namespace=security
         - --secret-name=external-secrets-webhook
         - --secret-namespace=security
         - --metrics-addr=:8080
         - --healthz-addr=:8081
+        - --loglevel=info
+        - --zap-time-encoding=epoch
+        - --enable-partial-cache=true
         ports:
         - containerPort: 8080
           protocol: TCP
           name: metrics
         readinessProbe:
           httpGet:
--- HelmRelease: security/external-secrets Deployment: security/external-secrets

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets

@@ -34,18 +34,20 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.9.19
+        image: ghcr.io/external-secrets/external-secrets:v0.9.20
         imagePullPolicy: IfNotPresent
         args:
         - --enable-leader-election=true
         - --concurrent=1
         - --metrics-addr=:8080
+        - --loglevel=info
+        - --zap-time-encoding=epoch
         ports:
         - containerPort: 8080
           protocol: TCP
           name: metrics
       dnsPolicy: ClusterFirst
 
--- HelmRelease: security/external-secrets Deployment: security/external-secrets-webhook

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets-webhook

@@ -34,22 +34,24 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.9.19
+        image: ghcr.io/external-secrets/external-secrets:v0.9.20
         imagePullPolicy: IfNotPresent
         args:
         - webhook
         - --port=10250
         - --dns-name=external-secrets-webhook.security.svc
         - --cert-dir=/tmp/certs
         - --check-interval=5m
         - --metrics-addr=:8080
         - --healthz-addr=:8081
+        - --loglevel=info
+        - --zap-time-encoding=epoch
         ports:
         - containerPort: 8080
           protocol: TCP
           name: metrics
         - containerPort: 10250
           protocol: TCP

@repo-jeeves
Copy link
Contributor Author

repo-jeeves bot commented Jul 6, 2024

--- kubernetes/staging/apps/security/external-secrets/app Kustomization: flux-system/security-external-secrets HelmRelease: security/external-secrets

+++ kubernetes/staging/apps/security/external-secrets/app Kustomization: flux-system/security-external-secrets HelmRelease: security/external-secrets

@@ -13,13 +13,13 @@

       chart: external-secrets
       interval: 15m
       sourceRef:
         kind: HelmRepository
         name: external-secrets-charts
         namespace: flux-system
-      version: 0.9.19
+      version: 0.9.20
   install:
     createNamespace: true
     remediation:
       retries: 3
   interval: 15m
   maxHistory: 3

@repo-jeeves
Copy link
Contributor Author

repo-jeeves bot commented Jul 6, 2024

🦙 MegaLinter status: ✅ SUCCESS

Descriptor Linter Files Fixed Errors Elapsed time
✅ COPYPASTE jscpd yes no 1.12s
✅ REPOSITORY git_diff yes no 0.04s
✅ REPOSITORY secretlint yes no 2.74s
✅ YAML prettier 1 0 0.46s
✅ YAML yamllint 1 0 0.3s

See detailed report in MegaLinter reports
Set VALIDATE_ALL_CODEBASE: true in mega-linter.yml to validate all sources, not only the diff

MegaLinter is graciously provided by OX Security

@szinn szinn merged commit a9a0d09 into main Jul 7, 2024
16 checks passed
@szinn szinn deleted the renovate/staging-external-secrets-0.x branch July 7, 2024 21:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cluster/staging Changes made in the staging cluster renovate/helm Issue relates to a Renovate helm update size/XS Marks a PR that changes 0-9 lines, ignoring generated files type/patch Issue relates to a patch version bump
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant