1
0
Fork 0
mirror of https://github.com/external-secrets/external-secrets.git synced 2024-12-14 11:57:59 +00:00

chore: bump helm chart (#2476)

Signed-off-by: Moritz Johner <beller.moritz@googlemail.com>
This commit is contained in:
Moritz Johner 2023-07-07 21:25:36 +02:00 committed by GitHub
parent 05e7328d29
commit 48d754db16
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
7 changed files with 74 additions and 17 deletions

View file

@ -2,8 +2,8 @@ apiVersion: v2
name: external-secrets name: external-secrets
description: External secret management for Kubernetes description: External secret management for Kubernetes
type: application type: application
version: "0.9.0" version: "0.9.1"
appVersion: "v0.9.0" appVersion: "v0.9.1"
kubeVersion: ">= 1.19.0-0" kubeVersion: ">= 1.19.0-0"
keywords: keywords:
- kubernetes-external-secrets - kubernetes-external-secrets

View file

@ -4,7 +4,7 @@
[//]: # (README.md generated by gotmpl. DO NOT EDIT.) [//]: # (README.md generated by gotmpl. DO NOT EDIT.)
![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.0](https://img.shields.io/badge/Version-0.9.0-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![Version: 0.9.1](https://img.shields.io/badge/Version-0.9.1-informational?style=flat-square)
External secret management for Kubernetes External secret management for Kubernetes

View file

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-cert-controller app.kubernetes.io/name: external-secrets-cert-controller
app.kubernetes.io/version: v0.9.0 app.kubernetes.io/version: v0.9.1
helm.sh/chart: external-secrets-0.9.0 helm.sh/chart: external-secrets-0.9.1
name: RELEASE-NAME-external-secrets-cert-controller name: RELEASE-NAME-external-secrets-cert-controller
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -33,7 +33,7 @@ should match snapshot of default values:
- --service-namespace=NAMESPACE - --service-namespace=NAMESPACE
- --secret-name=RELEASE-NAME-external-secrets-webhook - --secret-name=RELEASE-NAME-external-secrets-webhook
- --secret-namespace=NAMESPACE - --secret-namespace=NAMESPACE
image: ghcr.io/external-secrets/external-secrets:v0.9.0 image: ghcr.io/external-secrets/external-secrets:v0.9.1
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: cert-controller name: cert-controller
ports: ports:

View file

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets app.kubernetes.io/name: external-secrets
app.kubernetes.io/version: v0.9.0 app.kubernetes.io/version: v0.9.1
helm.sh/chart: external-secrets-0.9.0 helm.sh/chart: external-secrets-0.9.1
name: RELEASE-NAME-external-secrets name: RELEASE-NAME-external-secrets
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -28,7 +28,7 @@ should match snapshot of default values:
containers: containers:
- args: - args:
- --concurrent=1 - --concurrent=1
image: ghcr.io/external-secrets/external-secrets:v0.9.0 image: ghcr.io/external-secrets/external-secrets:v0.9.1
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: external-secrets name: external-secrets
ports: ports:

View file

@ -1656,6 +1656,63 @@ should match snapshot of default values:
- auth - auth
- url - url
type: object type: object
delinea:
description: Delinea DevOps Secrets Vault https://docs.delinea.com/online-help/products/devops-secrets-vault/current
properties:
clientId:
description: ClientID is the non-secret part of the credential.
properties:
secretRef:
description: SecretRef references a key in a secret that will be used as value.
properties:
key:
description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
type: string
name:
description: The name of the Secret resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
type: object
value:
description: Value can be specified directly to set a value without using a secret.
type: string
type: object
clientSecret:
description: ClientSecret is the secret part of the credential.
properties:
secretRef:
description: SecretRef references a key in a secret that will be used as value.
properties:
key:
description: The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.
type: string
name:
description: The name of the Secret resource being referred to.
type: string
namespace:
description: Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults to the namespace of the referent.
type: string
type: object
value:
description: Value can be specified directly to set a value without using a secret.
type: string
type: object
tenant:
description: Tenant is the chosen hostname / site name.
type: string
tld:
description: TLD is based on the server location that was chosen during provisioning. If unset, defaults to "com".
type: string
urlTemplate:
description: URLTemplate If unset, defaults to "https://%s.secretsvaultcloud.%s/v1/%s%s".
type: string
required:
- clientId
- clientSecret
- tenant
type: object
doppler: doppler:
description: Doppler configures this store to sync secrets using the Doppler provider description: Doppler configures this store to sync secrets using the Doppler provider
properties: properties:

View file

@ -7,8 +7,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.0 app.kubernetes.io/version: v0.9.1
helm.sh/chart: external-secrets-0.9.0 helm.sh/chart: external-secrets-0.9.1
name: RELEASE-NAME-external-secrets-webhook name: RELEASE-NAME-external-secrets-webhook
namespace: NAMESPACE namespace: NAMESPACE
spec: spec:
@ -34,7 +34,7 @@ should match snapshot of default values:
- --check-interval=5m - --check-interval=5m
- --metrics-addr=:8080 - --metrics-addr=:8080
- --healthz-addr=:8081 - --healthz-addr=:8081
image: ghcr.io/external-secrets/external-secrets:v0.9.0 image: ghcr.io/external-secrets/external-secrets:v0.9.1
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
name: webhook name: webhook
ports: ports:
@ -78,8 +78,8 @@ should match snapshot of default values:
app.kubernetes.io/instance: RELEASE-NAME app.kubernetes.io/instance: RELEASE-NAME
app.kubernetes.io/managed-by: Helm app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: external-secrets-webhook app.kubernetes.io/name: external-secrets-webhook
app.kubernetes.io/version: v0.9.0 app.kubernetes.io/version: v0.9.1
external-secrets.io/component: webhook external-secrets.io/component: webhook
helm.sh/chart: external-secrets-0.9.0 helm.sh/chart: external-secrets-0.9.1
name: RELEASE-NAME-external-secrets-webhook name: RELEASE-NAME-external-secrets-webhook
namespace: NAMESPACE namespace: NAMESPACE

View file

@ -5,15 +5,15 @@ The external-secrets project is released on a as-needed basis. Feel free to open
## Release ESO ## Release ESO
1. Run `Create Release` Action to create a new release, pass in the desired version number to release. 1. Run `Create Release` Action to create a new release, pass in the desired version number to release.
1. note: choose the right `branch` to execute the action: use `main` when creating a new release. Use `release-x.y` when you want to bump a LTS release. 1. choose the right `branch` to execute the action: use `main` when creating a new release. Use `release-x.y` when you want to bump a LTS release.
1. ⚠️ make sure that CI on the relevant branch has completed the docker build/push jobs. Otherwise an old image will be promoted.
1. GitHub Release, Changelog will be created by the `release.yml` workflow which also promotes the container image. 1. GitHub Release, Changelog will be created by the `release.yml` workflow which also promotes the container image.
1. update Helm Chart, see below 1. update Helm Chart, see below
1. update OLM bundle, see [helm-operator docs](https://github.com/external-secrets/external-secrets-helm-operator/blob/main/docs/release.md#operatorhubio) 1. update OLM bundle, see [helm-operator docs](https://github.com/external-secrets/external-secrets-helm-operator/blob/main/docs/release.md#operatorhubio)
## Release Helm Chart ## Release Helm Chart
1. Update `version` and/or `appVersion` in `Chart.yaml` and run `make helm.docs helm.update.appversion` 1. Update `version` and/or `appVersion` in `Chart.yaml` and run `make helm.docs helm.update.appversion helm.test.update helm.test`
1. If there is any CRD change, run `make helm.test.update` and `make helm.test`
1. push to branch and open pr 1. push to branch and open pr
1. run `/ok-to-test-managed` commands for all cloud providers 1. run `/ok-to-test-managed` commands for all cloud providers
1. merge PR if everyhing is green 1. merge PR if everyhing is green