From c15b8df903c151989d1f8656c03e8092723edc4e Mon Sep 17 00:00:00 2001 From: "renovate-brenix[bot]" <191061145+renovate-brenix[bot]@users.noreply.github.com> Date: Tue, 24 Dec 2024 16:24:00 +0000 Subject: [PATCH 1/2] =?UTF-8?q?chore(deps):=20update=20chart=20external-se?= =?UTF-8?q?crets=20=E2=86=92=200.12.1?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- components/external-secrets/component.cue | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/components/external-secrets/component.cue b/components/external-secrets/component.cue index 1c6613ed..006434f8 100644 --- a/components/external-secrets/component.cue +++ b/components/external-secrets/component.cue @@ -8,7 +8,7 @@ Component: #Helm & { EnableHooks: true Chart: { name: "external-secrets" - version: "0.11.0" + version: "0.12.1" repository: { name: "external-secrets" url: "https://charts.external-secrets.io" From 90523ce38445b8330f250f4b5705fea87bff0766 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Tue, 24 Dec 2024 16:24:24 +0000 Subject: [PATCH 2/2] chore(manifests): rendered output for commit 4713a0bf3f9e65b2ad6b0bf4470bdb49070c57d6 [skip ci] --- .../external-secrets.gen.yaml | 106 ++++++++++-------- 1 file changed, 58 insertions(+), 48 deletions(-) diff --git a/deploy/components/external-secrets/external-secrets.gen.yaml b/deploy/components/external-secrets/external-secrets.gen.yaml index cc1fa133..3359f78f 100644 --- a/deploy/components/external-secrets/external-secrets.gen.yaml +++ b/deploy/components/external-secrets/external-secrets.gen.yaml @@ -1221,7 +1221,7 @@ spec: - auth - registry type: object - ecrRAuthorizationTokenSpec: + ecrAuthorizationTokenSpec: properties: auth: description: Auth defines how to authenticate with AWS @@ -1359,6 +1359,11 @@ spec: You can assume a role before making calls to the desired AWS service. type: string + scope: + description: |- + Scope specifies the ECR service scope. + Valid options are private and public. + type: string required: - region type: object @@ -9044,6 +9049,11 @@ spec: You can assume a role before making calls to the desired AWS service. type: string + scope: + description: |- + Scope specifies the ECR service scope. + Valid options are private and public. + type: string required: - region type: object @@ -18384,8 +18394,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets namespace: security --- @@ -18396,8 +18406,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-cert-controller namespace: security --- @@ -18408,8 +18418,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-webhook namespace: security --- @@ -18420,8 +18430,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-leaderelection namespace: security rules: @@ -18458,8 +18468,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-cert-controller rules: - apiGroups: @@ -18532,8 +18542,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-controller rules: - apiGroups: @@ -18646,8 +18656,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 rbac.authorization.k8s.io/aggregate-to-admin: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" name: external-secrets-edit @@ -18691,8 +18701,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 servicebinding.io/controller: "true" name: external-secrets-servicebindings rules: @@ -18712,8 +18722,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 rbac.authorization.k8s.io/aggregate-to-admin: "true" rbac.authorization.k8s.io/aggregate-to-edit: "true" rbac.authorization.k8s.io/aggregate-to-view: "true" @@ -18754,8 +18764,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-leaderelection namespace: security roleRef: @@ -18774,8 +18784,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-cert-controller roleRef: apiGroup: rbac.authorization.k8s.io @@ -18793,8 +18803,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-controller roleRef: apiGroup: rbac.authorization.k8s.io @@ -18812,9 +18822,9 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/version: v0.11.0 + app.kubernetes.io/version: v0.12.1 external-secrets.io/component: webhook - helm.sh/chart: external-secrets-0.11.0 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-webhook namespace: security --- @@ -18825,9 +18835,9 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/version: v0.11.0 + app.kubernetes.io/version: v0.12.1 external-secrets.io/component: webhook - helm.sh/chart: external-secrets-0.11.0 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-webhook namespace: security spec: @@ -18848,8 +18858,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets namespace: security spec: @@ -18865,8 +18875,8 @@ spec: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 spec: automountServiceAccountToken: true containers: @@ -18875,7 +18885,7 @@ spec: - --metrics-addr=:8080 - --loglevel=info - --zap-time-encoding=epoch - image: oci.external-secrets.io/external-secrets/external-secrets:v0.11.0 + image: oci.external-secrets.io/external-secrets/external-secrets:v0.12.1 imagePullPolicy: IfNotPresent name: external-secrets ports: @@ -18903,8 +18913,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-cert-controller namespace: security spec: @@ -18920,8 +18930,8 @@ spec: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-cert-controller - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 spec: automountServiceAccountToken: true containers: @@ -18937,7 +18947,7 @@ spec: - --loglevel=info - --zap-time-encoding=epoch - --enable-partial-cache=true - image: oci.external-secrets.io/external-secrets/external-secrets:v0.11.0 + image: oci.external-secrets.io/external-secrets/external-secrets:v0.12.1 imagePullPolicy: IfNotPresent name: cert-controller ports: @@ -18970,8 +18980,8 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 name: external-secrets-webhook namespace: security spec: @@ -18987,8 +18997,8 @@ spec: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/version: v0.11.0 - helm.sh/chart: external-secrets-0.11.0 + app.kubernetes.io/version: v0.12.1 + helm.sh/chart: external-secrets-0.12.1 spec: automountServiceAccountToken: true containers: @@ -19002,7 +19012,7 @@ spec: - --healthz-addr=:8081 - --loglevel=info - --zap-time-encoding=epoch - image: oci.external-secrets.io/external-secrets/external-secrets:v0.11.0 + image: oci.external-secrets.io/external-secrets/external-secrets:v0.12.1 imagePullPolicy: IfNotPresent name: webhook ports: @@ -19064,9 +19074,9 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/version: v0.11.0 + app.kubernetes.io/version: v0.12.1 external-secrets.io/component: webhook - helm.sh/chart: external-secrets-0.11.0 + helm.sh/chart: external-secrets-0.12.1 name: externalsecret-validate webhooks: - admissionReviewVersions: @@ -19101,9 +19111,9 @@ metadata: app.kubernetes.io/instance: external-secrets app.kubernetes.io/managed-by: Helm app.kubernetes.io/name: external-secrets-webhook - app.kubernetes.io/version: v0.11.0 + app.kubernetes.io/version: v0.12.1 external-secrets.io/component: webhook - helm.sh/chart: external-secrets-0.11.0 + helm.sh/chart: external-secrets-0.12.1 name: secretstore-validate webhooks: - admissionReviewVersions: