-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(charts)!: Update Helm release vault-secrets-operator to 2.6.1 #2256
base: main
Are you sure you want to change the base?
Conversation
Path: @@ -213,7 +213,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.20.0"
imagePullPolicy: IfNotPresent
command:
- /manager |
0069117
to
5798d59
Compare
Path: @@ -213,7 +213,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.20.1"
imagePullPolicy: IfNotPresent
command:
- /manager |
5798d59
to
bada240
Compare
Path: @@ -213,7 +213,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.21.0"
imagePullPolicy: IfNotPresent
command:
- /manager |
bada240
to
065df8a
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.21.0"
imagePullPolicy: IfNotPresent
command:
- /manager |
065df8a
to
5538098
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.22.0"
imagePullPolicy: IfNotPresent
command:
- /manager |
5538098
to
83e523b
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.22.1"
imagePullPolicy: IfNotPresent
command:
- /manager |
83e523b
to
95c9075
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.23.0"
imagePullPolicy: IfNotPresent
command:
- /manager |
95c9075
to
3ec0838
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.23.1"
imagePullPolicy: IfNotPresent
command:
- /manager |
3ec0838
to
96feef2
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.23.2"
imagePullPolicy: IfNotPresent
command:
- /manager |
96feef2
to
b9b8c0a
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.24.0"
imagePullPolicy: IfNotPresent
command:
- /manager |
b9b8c0a
to
8c75b90
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.24.1"
imagePullPolicy: IfNotPresent
command:
- /manager |
8c75b90
to
f09832e
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.24.2"
imagePullPolicy: IfNotPresent
command:
- /manager |
f09832e
to
b27f70d
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.24.3"
imagePullPolicy: IfNotPresent
command:
- /manager |
b27f70d
to
af530e5
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.24.4"
imagePullPolicy: IfNotPresent
command:
- /manager |
af530e5
to
d2188fb
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ricoberger/vault-secrets-operator:v1.24.6"
imagePullPolicy: IfNotPresent
command:
- /manager |
d2188fb
to
8901058
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ghcr.io/ricoberger/vault-secrets-operator:v1.25.0"
imagePullPolicy: IfNotPresent
command:
- /manager |
Signed-off-by: Danny Froberg <[email protected]>
8901058
to
e9645cc
Compare
Path: @@ -9,6 +9,20 @@
app.kubernetes.io/instance: vault-secrets-operator
app.kubernetes.io/managed-by: Helm
---
+# Source: vault-secrets-operator/templates/secret.yaml
+apiVersion: v1
+kind: Secret
+metadata:
+ name: vault-secrets-operator
+ namespace: default
+ labels:
+ app.kubernetes.io/name: vault-secrets-operator
+ app.kubernetes.io/instance: vault-secrets-operator
+ app.kubernetes.io/managed-by: Helm
+ annotations:
+ kubernetes.io/service-account.name: vault-secrets-operator
+type: kubernetes.io/service-account-token
+---
# Source: vault-secrets-operator/templates/cluster-role.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
@@ -213,7 +227,7 @@
containers:
- name: vault-secrets-operator
securityContext: {}
- image: "ricoberger/vault-secrets-operator:1.19.6"
+ image: "ghcr.io/ricoberger/vault-secrets-operator:v1.25.1"
imagePullPolicy: IfNotPresent
command:
- /manager |
This PR contains the following updates:
1.19.6
->2.6.1
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
ricoberger/vault-secrets-operator (vault-secrets-operator)
v1.19.8
: Version 1.19.8 / 2022-11-15Compare Source
v1.19.7
: Version 1.19.7 / 2022-11-07Compare Source
vault.namespaces
value in Helm chart as a list by @danduta (#174)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.