Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(helm): update chart external-secrets ( 0.10.7 → 0.11.0 ) #7606

Merged
merged 1 commit into from
Dec 2, 2024

Conversation

lab-assistant[bot]
Copy link
Contributor

@lab-assistant lab-assistant bot commented Dec 2, 2024

This PR contains the following updates:

Package Update Change
external-secrets minor 0.10.7 -> 0.11.0

Release Notes

external-secrets/external-secrets (external-secrets)

v0.11.0

Compare Source

Kubernetes API load and significant decrease

A new way of reconciling external secrets has been added with pull request #​4086.

This significantly reduces the number of API calls that we make to the kubernetes API server.

  1. Memory usage might increase if you are not already using --enable-secrets-caching
    1. If you are using --enable-secrets-caching and want to decrease memory usage at the expense of slightly higher API usage, you can disable it and only enable --enable-managed-secrets-caching (which is the new default)
  2. In ALL cases (even when CreationPolicy is Merge), if a data key in the target Secret was created by the ExternalSecret, and it no longer exists in the template (or data/dataFrom), it will be removed from the target secret:
    1. This might cause some peoples secrets to be "cleaned of data keys" when updating to 0.11.
    2. Previously, the behaviour was undefined, and confusing because it was sort of broken when the template feature was added.
    3. The one exception is that ALL the data suddenly becomes empty and the DeletionPolicy is retain, in which case we will not even report and error, just change the SecretSynced message to explain that the secret was retained.
  3. When CreationPolicy is Owner, we now will NEVER retain any keys and fully calculate the "desired state" of the target secret each loop:
    1. This means that some peoples secrets might have keys removed when updating to 0.11.

Generators and ClusterGenerator

We added ClusterGenerators and Generator caching as well. This might create some problems in the way generators are defined now.

CRD Admission Restrictions

All of the CRDs now have proper kubebuilder markers for validation. This might surprise someone leaving out some data that was essentially actually required or expected in a certain format. This is now validated in #​4104.

Images

Image: ghcr.io/external-secrets/external-secrets:v0.11.0
Image: ghcr.io/external-secrets/external-secrets:v0.11.0-ubi
Image: ghcr.io/external-secrets/external-secrets:v0.11.0-ubi-boringssl

What's Changed

New Contributors

Full Changelog: external-secrets/external-secrets@v0.10.7...v0.11.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

| datasource | package          | from   | to     |
| ---------- | ---------------- | ------ | ------ |
| helm       | external-secrets | 0.10.7 | 0.11.0 |
@lab-assistant lab-assistant bot added renovate/helm type/minor Issue relates to a minor version bump area/kubernetes Issue relates to Kubernetes cluster/main Issue relates to the "main" cluster labels Dec 2, 2024
@lab-assistant
Copy link
Contributor Author

lab-assistant bot commented Dec 2, 2024

--- kubernetes/main/apps/security/external-secrets/app Kustomization: flux-system/external-secrets HelmRelease: security/external-secrets

+++ kubernetes/main/apps/security/external-secrets/app Kustomization: flux-system/external-secrets HelmRelease: security/external-secrets

@@ -14,13 +14,13 @@

       chart: external-secrets
       interval: 30m
       sourceRef:
         kind: HelmRepository
         name: external-secrets
         namespace: flux-system
-      version: 0.10.7
+      version: 0.11.0
   interval: 30m
   values:
     certController:
       image:
         repository: ghcr.io/external-secrets/external-secrets
       serviceMonitor:

@lab-assistant
Copy link
Contributor Author

lab-assistant bot commented Dec 2, 2024

--- HelmRelease: security/external-secrets ClusterRole: security/external-secrets-controller

+++ HelmRelease: security/external-secrets ClusterRole: security/external-secrets-controller

@@ -43,17 +43,20 @@

   - update
   - patch
 - apiGroups:
   - generators.external-secrets.io
   resources:
   - acraccesstokens
+  - clustergenerators
   - ecrauthorizationtokens
   - fakes
   - gcraccesstokens
   - githubaccesstokens
   - passwords
+  - stssessiontokens
+  - uuids
   - vaultdynamicsecrets
   - webhooks
   verbs:
   - get
   - list
   - watch
--- HelmRelease: security/external-secrets ClusterRole: security/external-secrets-view

+++ HelmRelease: security/external-secrets ClusterRole: security/external-secrets-view

@@ -23,12 +23,13 @@

   - watch
   - list
 - apiGroups:
   - generators.external-secrets.io
   resources:
   - acraccesstokens
+  - clustergenerators
   - ecrauthorizationtokens
   - fakes
   - gcraccesstokens
   - githubaccesstokens
   - passwords
   - vaultdynamicsecrets
--- HelmRelease: security/external-secrets ClusterRole: security/external-secrets-edit

+++ HelmRelease: security/external-secrets ClusterRole: security/external-secrets-edit

@@ -24,12 +24,13 @@

   - patch
   - update
 - apiGroups:
   - generators.external-secrets.io
   resources:
   - acraccesstokens
+  - clustergenerators
   - ecrauthorizationtokens
   - fakes
   - gcraccesstokens
   - githubaccesstokens
   - passwords
   - vaultdynamicsecrets
--- HelmRelease: security/external-secrets Deployment: security/external-secrets-cert-controller

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets-cert-controller

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.10.7
+        image: ghcr.io/external-secrets/external-secrets:v0.11.0
         imagePullPolicy: IfNotPresent
         args:
         - certcontroller
         - --crd-requeue-interval=5m
         - --service-name=external-secrets-webhook
         - --service-namespace=security
--- HelmRelease: security/external-secrets Deployment: security/external-secrets

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.10.7
+        image: ghcr.io/external-secrets/external-secrets:v0.11.0
         imagePullPolicy: IfNotPresent
         args:
         - --concurrent=1
         - --metrics-addr=:8080
         - --loglevel=info
         - --zap-time-encoding=epoch
--- HelmRelease: security/external-secrets Deployment: security/external-secrets-webhook

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets-webhook

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.10.7
+        image: ghcr.io/external-secrets/external-secrets:v0.11.0
         imagePullPolicy: IfNotPresent
         args:
         - webhook
         - --port=10250
         - --dns-name=external-secrets-webhook.security.svc
         - --cert-dir=/tmp/certs

@bjw-s bjw-s merged commit ba6477b into main Dec 2, 2024
14 checks passed
@bjw-s bjw-s deleted the renovate/main-external-secrets-0.x branch December 2, 2024 12:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/kubernetes Issue relates to Kubernetes cluster/main Issue relates to the "main" cluster renovate/helm type/minor Issue relates to a minor version bump
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant