Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@robottoms-up
Copy link
Contributor

@robottoms-up robottoms-up bot commented Nov 7, 2025

This PR contains the following updates:

Package Update Change
ghcr.io/external-secrets/charts/external-secrets major 0.20.4 -> 1.0.0

Release Notes

external-secrets/external-secrets (ghcr.io/external-secrets/charts/external-secrets)

v1.0.0

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v1.0.0
Image: ghcr.io/external-secrets/external-secrets:v1.0.0-ubi
Image: ghcr.io/external-secrets/external-secrets:v1.0.0-ubi-boringssl

What's Changed
General
Dependencies
New Contributors

Full Changelog: external-secrets/external-secrets@v0.20.4...v1.0.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@robottoms-up
Copy link
Contributor Author

robottoms-up bot commented Nov 7, 2025

--- kubernetes/homelab/apps/base/external-secrets/app Kustomization: base/external-secrets OCIRepository: base/external-secrets

+++ kubernetes/homelab/apps/base/external-secrets/app Kustomization: base/external-secrets OCIRepository: base/external-secrets

@@ -11,9 +11,9 @@

 spec:
   interval: 15m
   layerSelector:
     mediaType: application/vnd.cncf.helm.chart.content.v1.tar+gzip
     operation: copy
   ref:
-    tag: 0.20.4
+    tag: 1.0.0
   url: oci://ghcr.io/external-secrets/charts/external-secrets
 

@robottoms-up
Copy link
Contributor Author

robottoms-up bot commented Nov 7, 2025

--- HelmRelease: base/external-secrets Deployment: base/external-secrets-cert-controller

+++ HelmRelease: base/external-secrets Deployment: base/external-secrets-cert-controller

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.20.4
+        image: ghcr.io/external-secrets/external-secrets:v1.0.0
         imagePullPolicy: IfNotPresent
         args:
         - certcontroller
         - --crd-requeue-interval=5m
         - --service-name=external-secrets-webhook
         - --service-namespace=base
--- HelmRelease: base/external-secrets Deployment: base/external-secrets

+++ HelmRelease: base/external-secrets Deployment: base/external-secrets

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.20.4
+        image: ghcr.io/external-secrets/external-secrets:v1.0.0
         imagePullPolicy: IfNotPresent
         args:
         - --enable-leader-election=true
         - --concurrent=1
         - --metrics-addr=:8080
         - --loglevel=info
--- HelmRelease: base/external-secrets Deployment: base/external-secrets-webhook

+++ HelmRelease: base/external-secrets Deployment: base/external-secrets-webhook

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.20.4
+        image: ghcr.io/external-secrets/external-secrets:v1.0.0
         imagePullPolicy: IfNotPresent
         args:
         - webhook
         - --port=10250
         - --dns-name=external-secrets-webhook.base.svc
         - --cert-dir=/tmp/certs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant