Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Helm release external-secrets to v0.10.0 #391

Merged
merged 1 commit into from
Aug 7, 2024

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Aug 3, 2024

Mend Renovate

This PR contains the following updates:

Package Update Change
external-secrets minor 0.9.20 -> 0.10.0

Release Notes

external-secrets/external-secrets (external-secrets)

v0.10.0

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v0.10.0
Image: ghcr.io/external-secrets/external-secrets:v0.10.0-ubi
Image: ghcr.io/external-secrets/external-secrets:v0.10.0-ubi-boringssl

What's Changed
New Contributors

Full Changelog: external-secrets/external-secrets@v0.9.20...v0.10.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link
Contributor

github-actions bot commented Aug 3, 2024

Changes Rendered Chart
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml	2024-08-03 11:25:41.066141962 +0000
@@ -5,12 +5,12 @@
 metadata:
   name: release-name-external-secrets-cert-controller
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
@@ -20,12 +20,12 @@
       app.kubernetes.io/instance: release-name
   template:
     metadata:
       labels:
-        helm.sh/chart: external-secrets-0.9.20
+        helm.sh/chart: external-secrets-0.10.0
         app.kubernetes.io/name: external-secrets-cert-controller
         app.kubernetes.io/instance: release-name
-        app.kubernetes.io/version: "v0.9.20"
+        app.kubernetes.io/version: "v0.10.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       serviceAccountName: external-secrets-cert-controller
       automountServiceAccountToken: true
@@ -41,9 +41,9 @@
             runAsNonRoot: true
             runAsUser: 1000
             seccompProfile:
               type: RuntimeDefault
-          image: ghcr.io/external-secrets/external-secrets:v0.9.20
+          image: ghcr.io/external-secrets/external-secrets:v0.10.0
           imagePullPolicy: IfNotPresent
           args:
           - certcontroller
           - --crd-requeue-interval=5m
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml	2024-08-03 11:25:41.066141962 +0000
@@ -4,12 +4,12 @@
 kind: ClusterRole
 metadata:
   name: release-name-external-secrets-cert-controller
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "apiextensions.k8s.io"
@@ -71,12 +71,12 @@
 kind: ClusterRoleBinding
 metadata:
   name: release-name-external-secrets-cert-controller
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml	2024-08-03 11:26:03.390299025 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml	2024-08-03 11:25:41.062141934 +0000
@@ -5,9 +5,9 @@
 metadata:
   name: external-secrets-cert-controller
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/clustersecretstore.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/clustersecretstore.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/clustersecretstore.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/clustersecretstore.yaml	2024-08-03 11:25:41.062141934 +0000
@@ -1956,8 +1956,11 @@
                           type: object
                         externalID:
                           description: AWS External ID set on assumed IAM roles
                           type: string
+                        prefix:
+                          description: Prefix adds a prefix to all retrieved values.
+                          type: string
                         region:
                           description: AWS Region to be used for the provider
                           type: string
                         role:
@@ -3378,9 +3381,9 @@
                                   type: string
                               type: object
                           type: object
                         apiUrl:
-                          default: https://api.pulumi.com
+                          default: https://api.pulumi.com/api/preview
                           description: APIURL is the URL of the Pulumi API.
                           type: string
                         environment:
                           description: |-
@@ -3464,8 +3467,71 @@
                         - projectId
                         - region
                         - secretKey
                       type: object
+                    secretserver:
+                      description: |-
+                        SecretServer configures this store to sync secrets using SecretServer provider
+                        https://docs.delinea.com/online-help/secret-server/start.htm
+                      properties:
+                        password:
+                          description: Password is the secret server account password.
+                          properties:
+                            secretRef:
+                              description: SecretRef references a key in a secret that will be used as value.
+                              properties:
+                                key:
+                                  description: |-
+                                    The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
+                                    defaulted, in others it may be required.
+                                  type: string
+                                name:
+                                  description: The name of the Secret resource being referred to.
+                                  type: string
+                                namespace:
+                                  description: |-
+                                    Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
+                                    to the namespace of the referent.
+                                  type: string
+                              type: object
+                            value:
+                              description: Value can be specified directly to set a value without using a secret.
+                              type: string
+                          type: object
+                        serverURL:
+                          description: |-
+                            ServerURL
+                            URL to your secret server installation
+                          type: string
+                        username:
+                          description: Username is the secret server account username.
+                          properties:
+                            secretRef:
+                              description: SecretRef references a key in a secret that will be used as value.
+                              properties:
+                                key:
+                                  description: |-
+                                    The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
+                                    defaulted, in others it may be required.
+                                  type: string
+                                name:
+                                  description: The name of the Secret resource being referred to.
+                                  type: string
+                                namespace:
+                                  description: |-
+                                    Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
+                                    to the namespace of the referent.
+                                  type: string
+                              type: object
+                            value:
+                              description: Value can be specified directly to set a value without using a secret.
+                              type: string
+                          type: object
+                      required:
+                        - password
+                        - serverURL
+                        - username
+                      type: object
                     senhasegura:
                       description: Senhasegura configures this store to sync secrets using senhasegura provider
                       properties:
                         auth:
@@ -4028,8 +4094,13 @@
                             leader instead of simply retrying within a loop. This can increase performance if
                             the option is enabled serverside.
                             https://www.vaultproject.io/docs/configuration/replication#allow_forwarding_via_header
                           type: boolean
+                        headers:
+                          additionalProperties:
+                            type: string
+                          description: Headers to be added in Vault request
+                          type: object
                         namespace:
                           description: |-
                             Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows
                             Vault environments to support Secure Multi-tenancy. e.g: "ns1".
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/secretstore.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/secretstore.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/secretstore.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/secretstore.yaml	2024-08-03 11:25:41.062141934 +0000
@@ -1956,8 +1956,11 @@
                           type: object
                         externalID:
                           description: AWS External ID set on assumed IAM roles
                           type: string
+                        prefix:
+                          description: Prefix adds a prefix to all retrieved values.
+                          type: string
                         region:
                           description: AWS Region to be used for the provider
                           type: string
                         role:
@@ -3378,9 +3381,9 @@
                                   type: string
                               type: object
                           type: object
                         apiUrl:
-                          default: https://api.pulumi.com
+                          default: https://api.pulumi.com/api/preview
                           description: APIURL is the URL of the Pulumi API.
                           type: string
                         environment:
                           description: |-
@@ -3464,8 +3467,71 @@
                         - projectId
                         - region
                         - secretKey
                       type: object
+                    secretserver:
+                      description: |-
+                        SecretServer configures this store to sync secrets using SecretServer provider
+                        https://docs.delinea.com/online-help/secret-server/start.htm
+                      properties:
+                        password:
+                          description: Password is the secret server account password.
+                          properties:
+                            secretRef:
+                              description: SecretRef references a key in a secret that will be used as value.
+                              properties:
+                                key:
+                                  description: |-
+                                    The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
+                                    defaulted, in others it may be required.
+                                  type: string
+                                name:
+                                  description: The name of the Secret resource being referred to.
+                                  type: string
+                                namespace:
+                                  description: |-
+                                    Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
+                                    to the namespace of the referent.
+                                  type: string
+                              type: object
+                            value:
+                              description: Value can be specified directly to set a value without using a secret.
+                              type: string
+                          type: object
+                        serverURL:
+                          description: |-
+                            ServerURL
+                            URL to your secret server installation
+                          type: string
+                        username:
+                          description: Username is the secret server account username.
+                          properties:
+                            secretRef:
+                              description: SecretRef references a key in a secret that will be used as value.
+                              properties:
+                                key:
+                                  description: |-
+                                    The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
+                                    defaulted, in others it may be required.
+                                  type: string
+                                name:
+                                  description: The name of the Secret resource being referred to.
+                                  type: string
+                                namespace:
+                                  description: |-
+                                    Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
+                                    to the namespace of the referent.
+                                  type: string
+                              type: object
+                            value:
+                              description: Value can be specified directly to set a value without using a secret.
+                              type: string
+                          type: object
+                      required:
+                        - password
+                        - serverURL
+                        - username
+                      type: object
                     senhasegura:
                       description: Senhasegura configures this store to sync secrets using senhasegura provider
                       properties:
                         auth:
@@ -4028,8 +4094,13 @@
                             leader instead of simply retrying within a loop. This can increase performance if
                             the option is enabled serverside.
                             https://www.vaultproject.io/docs/configuration/replication#allow_forwarding_via_header
                           type: boolean
+                        headers:
+                          additionalProperties:
+                            type: string
+                          description: Headers to be added in Vault request
+                          type: object
                         namespace:
                           description: |-
                             Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows
                             Vault environments to support Secure Multi-tenancy. e.g: "ns1".
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/vaultdynamicsecret.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/vaultdynamicsecret.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/vaultdynamicsecret.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/vaultdynamicsecret.yaml	2024-08-03 11:25:41.062141934 +0000
@@ -575,8 +575,13 @@
                         leader instead of simply retrying within a loop. This can increase performance if
                         the option is enabled serverside.
                         https://www.vaultproject.io/docs/configuration/replication#allow_forwarding_via_header
                       type: boolean
+                    headers:
+                      additionalProperties:
+                        type: string
+                      description: Headers to be added in Vault request
+                      type: object
                     namespace:
                       description: |-
                         Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows
                         Vault environments to support Secure Multi-tenancy. e.g: "ns1".
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/deployment.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/deployment.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/deployment.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/deployment.yaml	2024-08-03 11:25:41.066141962 +0000
@@ -5,12 +5,12 @@
 metadata:
   name: release-name-external-secrets
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
@@ -20,12 +20,12 @@
       app.kubernetes.io/instance: release-name
   template:
     metadata:
       labels:
-        helm.sh/chart: external-secrets-0.9.20
+        helm.sh/chart: external-secrets-0.10.0
         app.kubernetes.io/name: external-secrets
         app.kubernetes.io/instance: release-name
-        app.kubernetes.io/version: "v0.9.20"
+        app.kubernetes.io/version: "v0.10.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       serviceAccountName: release-name-external-secrets
       automountServiceAccountToken: true
@@ -41,9 +41,9 @@
             runAsNonRoot: true
             runAsUser: 1000
             seccompProfile:
               type: RuntimeDefault
-          image: ghcr.io/external-secrets/external-secrets:v0.9.20
+          image: ghcr.io/external-secrets/external-secrets:v0.10.0
           imagePullPolicy: IfNotPresent
           args:
           - --concurrent=1
           - --metrics-addr=:8080
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/rbac.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/rbac.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/rbac.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/rbac.yaml	2024-08-03 11:25:41.066141962 +0000
@@ -4,12 +4,12 @@
 kind: ClusterRole
 metadata:
   name: release-name-external-secrets-controller
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "external-secrets.io"
@@ -116,12 +116,12 @@
 kind: ClusterRole
 metadata:
   name: release-name-external-secrets-view
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
     rbac.authorization.k8s.io/aggregate-to-view: "true"
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
@@ -158,12 +158,12 @@
 kind: ClusterRole
 metadata:
   name: release-name-external-secrets-edit
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
 rules:
@@ -204,12 +204,12 @@
 metadata:
   name: release-name-external-secrets-servicebindings
   labels:
     servicebinding.io/controller: "true"
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "external-secrets.io"
@@ -225,12 +225,12 @@
 kind: ClusterRoleBinding
 metadata:
   name: release-name-external-secrets-controller
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -246,12 +246,12 @@
 metadata:
   name: release-name-external-secrets-leaderelection
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - ""
@@ -285,12 +285,12 @@
 metadata:
   name: release-name-external-secrets-leaderelection
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: Role
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/serviceaccount.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/serviceaccount.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/serviceaccount.yaml	2024-08-03 11:26:03.390299025 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/serviceaccount.yaml	2024-08-03 11:25:41.062141934 +0000
@@ -5,9 +5,9 @@
 metadata:
   name: release-name-external-secrets
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-deployment.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-deployment.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-deployment.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-deployment.yaml	2024-08-03 11:25:41.066141962 +0000
@@ -5,12 +5,12 @@
 metadata:
   name: release-name-external-secrets-webhook
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
@@ -20,12 +20,12 @@
       app.kubernetes.io/instance: release-name
   template:
     metadata:
       labels:
-        helm.sh/chart: external-secrets-0.9.20
+        helm.sh/chart: external-secrets-0.10.0
         app.kubernetes.io/name: external-secrets-webhook
         app.kubernetes.io/instance: release-name
-        app.kubernetes.io/version: "v0.9.20"
+        app.kubernetes.io/version: "v0.10.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       hostNetwork: false
       serviceAccountName: external-secrets-webhook
@@ -41,9 +41,9 @@
             runAsNonRoot: true
             runAsUser: 1000
             seccompProfile:
               type: RuntimeDefault
-          image: ghcr.io/external-secrets/external-secrets:v0.9.20
+          image: ghcr.io/external-secrets/external-secrets:v0.10.0
           imagePullPolicy: IfNotPresent
           args:
           - webhook
           - --port=10250
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-secret.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-secret.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-secret.yaml	2024-08-03 11:26:03.390299025 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-secret.yaml	2024-08-03 11:25:41.062141934 +0000
@@ -5,10 +5,10 @@
 metadata:
   name: release-name-external-secrets-webhook
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
     external-secrets.io/component: webhook
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-service.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-service.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-service.yaml	2024-08-03 11:26:03.394299052 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-service.yaml	2024-08-03 11:25:41.066141962 +0000
@@ -5,12 +5,12 @@
 metadata:
   name: release-name-external-secrets-webhook
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
     external-secrets.io/component: webhook
 spec:
   type: ClusterIP
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml	2024-08-03 11:26:03.390299025 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml	2024-08-03 11:25:41.062141934 +0000
@@ -5,9 +5,9 @@
 metadata:
   name: external-secrets-webhook
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
diff -U 4 -r out/target/minio/values-k3d.yaml/sx-minio/charts/minio/templates/deployment.yaml out/pr/minio/values-k3d.yaml/sx-minio/charts/minio/templates/deployment.yaml
--- out/target/minio/values-k3d.yaml/sx-minio/charts/minio/templates/deployment.yaml	2024-08-03 11:26:14.634376001 +0000
+++ out/pr/minio/values-k3d.yaml/sx-minio/charts/minio/templates/deployment.yaml	2024-08-03 11:25:53.686231445 +0000
@@ -26,9 +26,9 @@
       labels:
         app: minio
         release: release-name
       annotations:
-        checksum/secrets: ab928b885a6414815d87291128458d9f272e4c4085543ea4df4f3e447b34b89f
+        checksum/secrets: 0c1d400ea0c3b8e978c0d3b5be1dbeedbbc05e32daf9f70a3b51fcc6e5962e14
         checksum/config: 6f6ba6a5a03406ec3288fab141f3dad876958d6c6c4bb7e2dfa88eea2e4e7eb0
     spec:
       securityContext:
         runAsUser: 1000
diff -U 4 -r out/target/minio/values-k3d.yaml/sx-minio/charts/minio/templates/secrets.yaml out/pr/minio/values-k3d.yaml/sx-minio/charts/minio/templates/secrets.yaml
--- out/target/minio/values-k3d.yaml/sx-minio/charts/minio/templates/secrets.yaml	2024-08-03 11:26:14.634376001 +0000
+++ out/pr/minio/values-k3d.yaml/sx-minio/charts/minio/templates/secrets.yaml	2024-08-03 11:25:53.686231445 +0000
@@ -10,6 +10,6 @@
     release: release-name
     heritage: Helm
 type: Opaque
 data:
-  rootUser: "S1BKTldlbTM0Y3NQWXJ1OGpnMzA="
-  rootPassword: "ZnppN3ZtY3M0UGJKVTRHckg4cElWRTEwOWFZQ2xOaW05NnlaZFRwZw=="
+  rootUser: "dVowczI3emloSG5DUXZqbXF6eXE="
+  rootPassword: "WVBIRWpPWDd0dk1IVlBweFlMZVl5ajRFc3NWSzJaOHdNUkNYR3BXdQ=="
diff -U 4 -r out/target/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/deployment.yaml out/pr/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/deployment.yaml
--- out/target/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/deployment.yaml	2024-08-03 11:26:14.566375536 +0000
+++ out/pr/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/deployment.yaml	2024-08-03 11:25:53.622230983 +0000
@@ -26,9 +26,9 @@
       labels:
         app: minio
         release: release-name
       annotations:
-        checksum/secrets: 0b486480bc3afab00f8e82cdec17e41e3c1a6fa7ebb61caeb555b52671e26c5c
+        checksum/secrets: aa24ab36735b47763dfd238b6f76ea90f24ab0d6d80b5b47336a496eea405895
         checksum/config: bb3c204fc9f407a1117889047b975299e35b5b6de86215c265d8bce96350c79b
     spec:
       securityContext:
         runAsUser: 1000
diff -U 4 -r out/target/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/secrets.yaml out/pr/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/secrets.yaml
--- out/target/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/secrets.yaml	2024-08-03 11:26:14.566375536 +0000
+++ out/pr/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/secrets.yaml	2024-08-03 11:25:53.622230983 +0000
@@ -10,6 +10,6 @@
     release: release-name
     heritage: Helm
 type: Opaque
 data:
-  rootUser: "UmZENGp6b1NpUHFYTWM3ZWQ5ZUs="
-  rootPassword: "UVBqMVVjbGpPbzJHYUh1cGR3dGRyTkdKNjFac1dYaDhvM2dUZ1FhYg=="
+  rootUser: "eFF6aGoyZ0lmM2VQSGlQdHlJQmw="
+  rootPassword: "N1YyZ2ZSWEgxa2U4QjUzOUtUNWdrYWVhT243Wng4OVM2cXVRUndCbA=="

Copy link
Contributor

github-actions bot commented Aug 3, 2024

Changes Default Values

@jkleinlercher jkleinlercher force-pushed the renovate/external-secrets-0.x branch from 9cae676 to b27bac0 Compare August 6, 2024 15:19
Copy link
Contributor

github-actions bot commented Aug 6, 2024

Changes Default Values

Copy link
Contributor

github-actions bot commented Aug 6, 2024

Changes Rendered Chart
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml	2024-08-06 15:19:52.666696685 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-deployment.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -5,12 +5,12 @@
 metadata:
   name: release-name-external-secrets-cert-controller
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
@@ -20,12 +20,12 @@
       app.kubernetes.io/instance: release-name
   template:
     metadata:
       labels:
-        helm.sh/chart: external-secrets-0.9.20
+        helm.sh/chart: external-secrets-0.10.0
         app.kubernetes.io/name: external-secrets-cert-controller
         app.kubernetes.io/instance: release-name
-        app.kubernetes.io/version: "v0.9.20"
+        app.kubernetes.io/version: "v0.10.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       serviceAccountName: external-secrets-cert-controller
       automountServiceAccountToken: true
@@ -41,9 +41,9 @@
             runAsNonRoot: true
             runAsUser: 1000
             seccompProfile:
               type: RuntimeDefault
-          image: ghcr.io/external-secrets/external-secrets:v0.9.20
+          image: ghcr.io/external-secrets/external-secrets:v0.10.0
           imagePullPolicy: IfNotPresent
           args:
           - certcontroller
           - --crd-requeue-interval=5m
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-rbac.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -4,12 +4,12 @@
 kind: ClusterRole
 metadata:
   name: release-name-external-secrets-cert-controller
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "apiextensions.k8s.io"
@@ -71,12 +71,12 @@
 kind: ClusterRoleBinding
 metadata:
   name: release-name-external-secrets-cert-controller
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/cert-controller-serviceaccount.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -5,9 +5,9 @@
 metadata:
   name: external-secrets-cert-controller
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-cert-controller
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/clustersecretstore.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/clustersecretstore.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/clustersecretstore.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/clustersecretstore.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -1956,8 +1956,11 @@
                           type: object
                         externalID:
                           description: AWS External ID set on assumed IAM roles
                           type: string
+                        prefix:
+                          description: Prefix adds a prefix to all retrieved values.
+                          type: string
                         region:
                           description: AWS Region to be used for the provider
                           type: string
                         role:
@@ -3378,9 +3381,9 @@
                                   type: string
                               type: object
                           type: object
                         apiUrl:
-                          default: https://api.pulumi.com
+                          default: https://api.pulumi.com/api/preview
                           description: APIURL is the URL of the Pulumi API.
                           type: string
                         environment:
                           description: |-
@@ -3464,8 +3467,71 @@
                         - projectId
                         - region
                         - secretKey
                       type: object
+                    secretserver:
+                      description: |-
+                        SecretServer configures this store to sync secrets using SecretServer provider
+                        https://docs.delinea.com/online-help/secret-server/start.htm
+                      properties:
+                        password:
+                          description: Password is the secret server account password.
+                          properties:
+                            secretRef:
+                              description: SecretRef references a key in a secret that will be used as value.
+                              properties:
+                                key:
+                                  description: |-
+                                    The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
+                                    defaulted, in others it may be required.
+                                  type: string
+                                name:
+                                  description: The name of the Secret resource being referred to.
+                                  type: string
+                                namespace:
+                                  description: |-
+                                    Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
+                                    to the namespace of the referent.
+                                  type: string
+                              type: object
+                            value:
+                              description: Value can be specified directly to set a value without using a secret.
+                              type: string
+                          type: object
+                        serverURL:
+                          description: |-
+                            ServerURL
+                            URL to your secret server installation
+                          type: string
+                        username:
+                          description: Username is the secret server account username.
+                          properties:
+                            secretRef:
+                              description: SecretRef references a key in a secret that will be used as value.
+                              properties:
+                                key:
+                                  description: |-
+                                    The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
+                                    defaulted, in others it may be required.
+                                  type: string
+                                name:
+                                  description: The name of the Secret resource being referred to.
+                                  type: string
+                                namespace:
+                                  description: |-
+                                    Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
+                                    to the namespace of the referent.
+                                  type: string
+                              type: object
+                            value:
+                              description: Value can be specified directly to set a value without using a secret.
+                              type: string
+                          type: object
+                      required:
+                        - password
+                        - serverURL
+                        - username
+                      type: object
                     senhasegura:
                       description: Senhasegura configures this store to sync secrets using senhasegura provider
                       properties:
                         auth:
@@ -4028,8 +4094,13 @@
                             leader instead of simply retrying within a loop. This can increase performance if
                             the option is enabled serverside.
                             https://www.vaultproject.io/docs/configuration/replication#allow_forwarding_via_header
                           type: boolean
+                        headers:
+                          additionalProperties:
+                            type: string
+                          description: Headers to be added in Vault request
+                          type: object
                         namespace:
                           description: |-
                             Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows
                             Vault environments to support Secure Multi-tenancy. e.g: "ns1".
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/secretstore.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/secretstore.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/secretstore.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/secretstore.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -1956,8 +1956,11 @@
                           type: object
                         externalID:
                           description: AWS External ID set on assumed IAM roles
                           type: string
+                        prefix:
+                          description: Prefix adds a prefix to all retrieved values.
+                          type: string
                         region:
                           description: AWS Region to be used for the provider
                           type: string
                         role:
@@ -3378,9 +3381,9 @@
                                   type: string
                               type: object
                           type: object
                         apiUrl:
-                          default: https://api.pulumi.com
+                          default: https://api.pulumi.com/api/preview
                           description: APIURL is the URL of the Pulumi API.
                           type: string
                         environment:
                           description: |-
@@ -3464,8 +3467,71 @@
                         - projectId
                         - region
                         - secretKey
                       type: object
+                    secretserver:
+                      description: |-
+                        SecretServer configures this store to sync secrets using SecretServer provider
+                        https://docs.delinea.com/online-help/secret-server/start.htm
+                      properties:
+                        password:
+                          description: Password is the secret server account password.
+                          properties:
+                            secretRef:
+                              description: SecretRef references a key in a secret that will be used as value.
+                              properties:
+                                key:
+                                  description: |-
+                                    The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
+                                    defaulted, in others it may be required.
+                                  type: string
+                                name:
+                                  description: The name of the Secret resource being referred to.
+                                  type: string
+                                namespace:
+                                  description: |-
+                                    Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
+                                    to the namespace of the referent.
+                                  type: string
+                              type: object
+                            value:
+                              description: Value can be specified directly to set a value without using a secret.
+                              type: string
+                          type: object
+                        serverURL:
+                          description: |-
+                            ServerURL
+                            URL to your secret server installation
+                          type: string
+                        username:
+                          description: Username is the secret server account username.
+                          properties:
+                            secretRef:
+                              description: SecretRef references a key in a secret that will be used as value.
+                              properties:
+                                key:
+                                  description: |-
+                                    The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be
+                                    defaulted, in others it may be required.
+                                  type: string
+                                name:
+                                  description: The name of the Secret resource being referred to.
+                                  type: string
+                                namespace:
+                                  description: |-
+                                    Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults
+                                    to the namespace of the referent.
+                                  type: string
+                              type: object
+                            value:
+                              description: Value can be specified directly to set a value without using a secret.
+                              type: string
+                          type: object
+                      required:
+                        - password
+                        - serverURL
+                        - username
+                      type: object
                     senhasegura:
                       description: Senhasegura configures this store to sync secrets using senhasegura provider
                       properties:
                         auth:
@@ -4028,8 +4094,13 @@
                             leader instead of simply retrying within a loop. This can increase performance if
                             the option is enabled serverside.
                             https://www.vaultproject.io/docs/configuration/replication#allow_forwarding_via_header
                           type: boolean
+                        headers:
+                          additionalProperties:
+                            type: string
+                          description: Headers to be added in Vault request
+                          type: object
                         namespace:
                           description: |-
                             Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows
                             Vault environments to support Secure Multi-tenancy. e.g: "ns1".
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/vaultdynamicsecret.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/vaultdynamicsecret.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/vaultdynamicsecret.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/crds/vaultdynamicsecret.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -575,8 +575,13 @@
                         leader instead of simply retrying within a loop. This can increase performance if
                         the option is enabled serverside.
                         https://www.vaultproject.io/docs/configuration/replication#allow_forwarding_via_header
                       type: boolean
+                    headers:
+                      additionalProperties:
+                        type: string
+                      description: Headers to be added in Vault request
+                      type: object
                     namespace:
                       description: |-
                         Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows
                         Vault environments to support Secure Multi-tenancy. e.g: "ns1".
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/deployment.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/deployment.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/deployment.yaml	2024-08-06 15:19:52.666696685 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/deployment.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -5,12 +5,12 @@
 metadata:
   name: release-name-external-secrets
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
@@ -20,12 +20,12 @@
       app.kubernetes.io/instance: release-name
   template:
     metadata:
       labels:
-        helm.sh/chart: external-secrets-0.9.20
+        helm.sh/chart: external-secrets-0.10.0
         app.kubernetes.io/name: external-secrets
         app.kubernetes.io/instance: release-name
-        app.kubernetes.io/version: "v0.9.20"
+        app.kubernetes.io/version: "v0.10.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       serviceAccountName: release-name-external-secrets
       automountServiceAccountToken: true
@@ -41,9 +41,9 @@
             runAsNonRoot: true
             runAsUser: 1000
             seccompProfile:
               type: RuntimeDefault
-          image: ghcr.io/external-secrets/external-secrets:v0.9.20
+          image: ghcr.io/external-secrets/external-secrets:v0.10.0
           imagePullPolicy: IfNotPresent
           args:
           - --concurrent=1
           - --metrics-addr=:8080
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/rbac.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/rbac.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/rbac.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/rbac.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -4,12 +4,12 @@
 kind: ClusterRole
 metadata:
   name: release-name-external-secrets-controller
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "external-secrets.io"
@@ -116,12 +116,12 @@
 kind: ClusterRole
 metadata:
   name: release-name-external-secrets-view
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
     rbac.authorization.k8s.io/aggregate-to-view: "true"
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
@@ -158,12 +158,12 @@
 kind: ClusterRole
 metadata:
   name: release-name-external-secrets-edit
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
 rules:
@@ -204,12 +204,12 @@
 metadata:
   name: release-name-external-secrets-servicebindings
   labels:
     servicebinding.io/controller: "true"
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - "external-secrets.io"
@@ -225,12 +225,12 @@
 kind: ClusterRoleBinding
 metadata:
   name: release-name-external-secrets-controller
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -246,12 +246,12 @@
 metadata:
   name: release-name-external-secrets-leaderelection
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 rules:
   - apiGroups:
     - ""
@@ -285,12 +285,12 @@
 metadata:
   name: release-name-external-secrets-leaderelection
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: Role
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/serviceaccount.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/serviceaccount.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/serviceaccount.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/serviceaccount.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -5,9 +5,9 @@
 metadata:
   name: release-name-external-secrets
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-deployment.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-deployment.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-deployment.yaml	2024-08-06 15:19:52.666696685 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-deployment.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -5,12 +5,12 @@
 metadata:
   name: release-name-external-secrets-webhook
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
 spec:
   replicas: 1
   revisionHistoryLimit: 10
@@ -20,12 +20,12 @@
       app.kubernetes.io/instance: release-name
   template:
     metadata:
       labels:
-        helm.sh/chart: external-secrets-0.9.20
+        helm.sh/chart: external-secrets-0.10.0
         app.kubernetes.io/name: external-secrets-webhook
         app.kubernetes.io/instance: release-name
-        app.kubernetes.io/version: "v0.9.20"
+        app.kubernetes.io/version: "v0.10.0"
         app.kubernetes.io/managed-by: Helm
     spec:
       hostNetwork: false
       serviceAccountName: external-secrets-webhook
@@ -41,9 +41,9 @@
             runAsNonRoot: true
             runAsUser: 1000
             seccompProfile:
               type: RuntimeDefault
-          image: ghcr.io/external-secrets/external-secrets:v0.9.20
+          image: ghcr.io/external-secrets/external-secrets:v0.10.0
           imagePullPolicy: IfNotPresent
           args:
           - webhook
           - --port=10250
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-secret.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-secret.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-secret.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-secret.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -5,10 +5,10 @@
 metadata:
   name: release-name-external-secrets-webhook
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
     external-secrets.io/component: webhook
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-service.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-service.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-service.yaml	2024-08-06 15:19:52.666696685 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-service.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -5,12 +5,12 @@
 metadata:
   name: release-name-external-secrets-webhook
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
     external-secrets.io/component: webhook
 spec:
   type: ClusterIP
diff -U 4 -r out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml
--- out/target/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml	2024-08-06 15:19:52.662696687 +0000
+++ out/pr/external-secrets/values-k3d.yaml/sx-external-secrets/charts/external-secrets/templates/webhook-serviceaccount.yaml	2024-08-06 15:19:29.910707215 +0000
@@ -5,9 +5,9 @@
 metadata:
   name: external-secrets-webhook
   namespace: default
   labels:
-    helm.sh/chart: external-secrets-0.9.20
+    helm.sh/chart: external-secrets-0.10.0
     app.kubernetes.io/name: external-secrets-webhook
     app.kubernetes.io/instance: release-name
-    app.kubernetes.io/version: "v0.9.20"
+    app.kubernetes.io/version: "v0.10.0"
     app.kubernetes.io/managed-by: Helm
diff -U 4 -r out/target/minio/values-k3d.yaml/sx-minio/charts/minio/templates/deployment.yaml out/pr/minio/values-k3d.yaml/sx-minio/charts/minio/templates/deployment.yaml
--- out/target/minio/values-k3d.yaml/sx-minio/charts/minio/templates/deployment.yaml	2024-08-06 15:20:04.110690806 +0000
+++ out/pr/minio/values-k3d.yaml/sx-minio/charts/minio/templates/deployment.yaml	2024-08-06 15:19:42.510706165 +0000
@@ -26,9 +26,9 @@
       labels:
         app: minio
         release: release-name
       annotations:
-        checksum/secrets: 7082f19880b73ebbfc01f3560a9a8abc37fbe52cfa5cb431985d880d049072f7
+        checksum/secrets: 5631ea3b82f85919d2465a19b57058f48c1de179c76f4305f3ce1fe20184da84
         checksum/config: 6f6ba6a5a03406ec3288fab141f3dad876958d6c6c4bb7e2dfa88eea2e4e7eb0
     spec:
       securityContext:
         runAsUser: 1000
diff -U 4 -r out/target/minio/values-k3d.yaml/sx-minio/charts/minio/templates/secrets.yaml out/pr/minio/values-k3d.yaml/sx-minio/charts/minio/templates/secrets.yaml
--- out/target/minio/values-k3d.yaml/sx-minio/charts/minio/templates/secrets.yaml	2024-08-06 15:20:04.106690808 +0000
+++ out/pr/minio/values-k3d.yaml/sx-minio/charts/minio/templates/secrets.yaml	2024-08-06 15:19:42.510706165 +0000
@@ -10,6 +10,6 @@
     release: release-name
     heritage: Helm
 type: Opaque
 data:
-  rootUser: "QjdFcGVqcFZRMWZGcHZGS1pLY3Y="
-  rootPassword: "aGpPQWZobGFWdTdtelVrTEt3RmJ5NXcwaHVqQTQ4amVKc0g1M2oyVw=="
+  rootUser: "eWNidFB5U1RmNG1zR3VKWUVhQ3M="
+  rootPassword: "NXZxQXZzVkFQbktDVTRTV3hhcUdSanYycUlUbUtZSXVxSFRWWHU4YQ=="
diff -U 4 -r out/target/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/deployment.yaml out/pr/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/deployment.yaml
--- out/target/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/deployment.yaml	2024-08-06 15:20:04.042690849 +0000
+++ out/pr/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/deployment.yaml	2024-08-06 15:19:42.446706187 +0000
@@ -26,9 +26,9 @@
       labels:
         app: minio
         release: release-name
       annotations:
-        checksum/secrets: fa20ee925fefd59bc780e1ed6b791cec2b62c0744678de9bfb32146f03b3a3f5
+        checksum/secrets: a4fe27cf997ecffc49d5df0cf13963ec69bf958ef00d789f8a418039868d2166
         checksum/config: bb3c204fc9f407a1117889047b975299e35b5b6de86215c265d8bce96350c79b
     spec:
       securityContext:
         runAsUser: 1000
diff -U 4 -r out/target/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/secrets.yaml out/pr/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/secrets.yaml
--- out/target/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/secrets.yaml	2024-08-06 15:20:04.042690849 +0000
+++ out/pr/minio/values-uibklab.yaml/sx-minio/charts/minio/templates/secrets.yaml	2024-08-06 15:19:42.442706189 +0000
@@ -10,6 +10,6 @@
     release: release-name
     heritage: Helm
 type: Opaque
 data:
-  rootUser: "NHlrN082YTRSY2RRYkphdWhEeGk="
-  rootPassword: "SjBCc0dXYkNnNkVVVktROUc4emk0eW9oRlI2dXhYMU5QYTAwT2pQUQ=="
+  rootUser: "SVB0RGNyVVQ4blBqV01OekdkSGk="
+  rootPassword: "SDFuZEhjUFhOcnBxZ0tvdGY1akNwVjJJSUJZYW5LUGl5aTdJNEhEaQ=="

@phac008 phac008 merged commit d3e0e93 into main Aug 7, 2024
8 checks passed
@renovate renovate bot deleted the renovate/external-secrets-0.x branch August 7, 2024 13:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant