Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update all non-major dependencies #327

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

locmai
Copy link
Owner

@locmai locmai commented Jan 1, 2025

This PR contains the following updates:

Package Type Update Change
alpine final minor 3.20 -> 3.21
argo-cd patch 7.7.6 -> 7.7.11
cassandra (source) minor 12.0.5 -> 12.1.0
cloudflare (source) required_provider minor ~> 4.47.0 -> ~> 4.49.0
coroot patch 0.16.3 -> 0.16.11
external-secrets minor 0.10.7 -> 0.12.1
ingress-nginx minor 4.11.3 -> 4.12.0
kubernetes (source) required_provider minor ~> 2.34.0 -> ~> 2.35.0
opentelemetry-collector (source) minor 0.110.3 -> 0.111.0
six minor ==1.16.0 -> ==1.17.0

Release Notes

argoproj/argo-helm (argo-cd)

v7.7.11

Compare Source

A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.

What's Changed

New Contributors

Full Changelog: argoproj/argo-helm@argo-workflows-0.45.2...argo-cd-7.7.11

v7.7.10

Compare Source

A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.

What's Changed

Full Changelog: argoproj/argo-helm@argo-cd-7.7.9...argo-cd-7.7.10

v7.7.9

Compare Source

A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.

What's Changed

New Contributors

Full Changelog: argoproj/argo-helm@argo-cd-7.7.8...argo-cd-7.7.9

v7.7.8

Compare Source

A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.

What's Changed

Full Changelog: argoproj/argo-helm@argo-workflows-0.45.1...argo-cd-7.7.8

v7.7.7

Compare Source

A Helm chart for Argo CD, a declarative, GitOps continuous delivery tool for Kubernetes.

What's Changed

New Contributors

Full Changelog: argoproj/argo-helm@argo-cd-7.7.6...argo-cd-7.7.7

bitnami/charts (cassandra)

v12.1.0

  • [bitnami/cassandra] Detect non-standard images (#​30866)
cloudflare/terraform-provider-cloudflare (cloudflare)

v4.49.1

Compare Source

Functionally the same as v4.49.0 but retagged to fix the Terraform Registry having a bad checksum due to a failed build asset being used.

v4.49.0

Compare Source

NOTES:

  • resource/cloudflare_teams_location: remove unusable policy_ids attribute (#​4817)

FEATURES:

  • New Resource: cloudflare_content_scanning_expression (#​4734)
  • New Resource: cloudflare_content_scanning (#​4719)

ENHANCEMENTS:

  • resource/access_application: support multi-valued + Access service token authentication for SCIM provisioning to Access applications (#​4743)

BUG FIXES:

  • resource/cloudflare_ruleset: handle when disable_stale_while_updating is an empty object but not nil (#​4814)

DEPENDENCIES:

  • provider: bump github.com/cloudflare/cloudflare-go from 0.111.0 to 0.112.0 (#​4803)
  • provider: bump github.com/hashicorp/terraform-plugin-framework-validators from 0.15.0 to 0.16.0 (#​4762)
  • provider: bump golang.org/x/crypto from 0.21.0 to 0.31.0 in /tools (#​4755)
  • provider: bump golang.org/x/crypto from 0.30.0 to 0.31.0 (#​4756)
  • provider: bump golang.org/x/net from 0.32.0 to 0.33.0 (#​4802)

v4.48.0

Compare Source

NOTES:

FEATURES:

  • New Resource: cloudflare_leaked_credential_check (#​4674)
  • New Resource: cloudflare_leaked_credential_check_rule (#​4676)
  • New Resource: cloudflare_snippet (#​4565)
  • New Resource: cloudflare_snippet_rules (#​4565)

ENHANCEMENTS:

  • resource/access_application: add support for destinations and domain_type (#​4661)
  • resource/access_identity_provider: document scim_config fields (#​4721)
  • resource/cloudflare_access_policy: adds support for Access infrastructure allow_email_alias connection rule flag (#​4665)
  • resource/cloudflare_ruleset: improve diffs when only some rules are changed (#​4697)
  • resource/cloudflare_teams_list: use PUT call to update list items (#​4737)
  • resource/cloudflare_zero_trust_access_policy: adds support for Access infrastructure allow_email_alias connection rule flag (#​4665)

BUG FIXES:

  • resource/cloudflare_authenticated_origin_pulls: Fix issue where resources are disabled instead of being destroyed on tf destroy (#​4649)
  • resource/cloudflare_leaked_credential_check_rule: Fix bug in update method (#​4741)

DEPENDENCIES:

  • provider: bump github.com/cloudflare/cloudflare-go from 0.110.0 to 0.111.0 (#​4709)
  • provider: bump golang.org/x/net from 0.31.0 to 0.32.0 (#​4718)
coroot/helm-charts (coroot)

v0.16.11

Compare Source

A monitoring and troubleshooting tool for microservice architectures.

v0.16.10

Compare Source

A monitoring and troubleshooting tool for microservice architectures.

v0.16.9

Compare Source

A monitoring and troubleshooting tool for microservice architectures.

v0.16.8

Compare Source

A monitoring and troubleshooting tool for microservice architectures.

v0.16.7

Compare Source

A monitoring and troubleshooting tool for microservice architectures.

v0.16.6

Compare Source

A monitoring and troubleshooting tool for microservice architectures.

v0.16.5

Compare Source

A monitoring and troubleshooting tool for microservice architectures.

v0.16.4

Compare Source

A monitoring and troubleshooting tool for microservice architectures.

external-secrets/external-secrets (external-secrets)

v0.12.1

Compare Source

RELEASE VERSION

My apologies, when creating the release, 0.12.0 failed. The branch and tag however, have been created and I was unable to delete them. Thus, the version has been increased to 0.12.1 after the fix and now that's the current version. I hand updated the release notes to include everyone into the changes.

BREAKING CHANGES

The following breaking changes have been introduced into this release:

  • Permission update for AWS provider adding BulkFetch when getting multiple secrets ( significant API reduce but comes with adding a permission for bulk endpoint )
  • fixed a typo for a generator in the json tag where before it was ecrRAuthorizationTokenSpec with an extra R
  • We standardized the GCP Secrets Manager Metadata structure for PushSecrets ( be aware that existing manifests will stop working until updated to the standardized version ) for more info see https://github.com/external-secrets/external-secrets/pull/4210
Images

Image: ghcr.io/external-secrets/external-secrets:v0.12.1
Image: ghcr.io/external-secrets/external-secrets:v0.12.1-ubi
Image: ghcr.io/external-secrets/external-secrets:v0.12.1-ubi-boringssl

What's Changed

Full Changelog: external-secrets/external-secrets@v0.11.0...v0.12.1

v0.11.0

Compare Source

Deprecation of OLM Releases

As of 0.11.0 is the last release available for OLM until further notice. Depending on the way this goes, we might still have OLM support (ideally with a properly built operator for that), but for sure in a different support scheme as to not overload maintainers anymore.
Also a valid note - you can still use 0.11.0 OLM release and the newest ESO images, you just need to set image.tag appropriately in your setup.

Kubernetes API load and significant decrease

A new way of reconciling external secrets has been added with pull request #​4086.

This significantly reduces the number of API calls that we make to the kubernetes API server.

  1. Memory usage might increase if you are not already using --enable-secrets-caching
    1. If you are using --enable-secrets-caching and want to decrease memory usage at the expense of slightly higher API usage, you can disable it and only enable --enable-managed-secrets-caching (which is the new default)
  2. In ALL cases (even when CreationPolicy is Merge), if a data key in the target Secret was created by the ExternalSecret, and it no longer exists in the template (or data/dataFrom), it will be removed from the target secret:
    1. This might cause some peoples secrets to be "cleaned of data keys" when updating to 0.11.
    2. Previously, the behaviour was undefined, and confusing because it was sort of broken when the template feature was added.
    3. The one exception is that ALL the data suddenly becomes empty and the DeletionPolicy is retain, in which case we will not even report and error, just change the SecretSynced message to explain that the secret was retained.
  3. When CreationPolicy is Owner, we now will NEVER retain any keys and fully calculate the "desired state" of the target secret each loop:
    1. This means that some peoples secrets might have keys removed when updating to 0.11.
Generators and ClusterGenerator

We added ClusterGenerators and Generator caching as well. This might create some problems in the way generators are defined now.

CRD Admission Restrictions

All of the CRDs now have proper kubebuilder markers for validation. This might surprise someone leaving out some data that was essentially actually required or expected in a certain format. This is now validated in #​4104.

Images

Image: ghcr.io/external-secrets/external-secrets:v0.11.0
Image: ghcr.io/external-secrets/external-secrets:v0.11.0-ubi
Image: ghcr.io/external-secrets/external-secrets:v0.11.0-ubi-boringssl

What's Changed
New Contributors

Full Changelog: external-secrets/external-secrets@v0.10.7...v0.11.0

hashicorp/terraform-provider-kubernetes (kubernetes)

v2.35.1

Compare Source

BUG FIXES:

  • resource/kubernetes_job_v1: revert the changes introduced in v2.34.0, where ttl_seconds_after_finished was set to 0. [GH-2650]
  • resource/kubernetes_daemon_set_v1: fix issue where fields spec.strategy.rolling_update.max_surge and spec.strategy.rolling_update.max_unavailable were not being validated correctly. [GH-2653]

v2.35.0

Compare Source

FEATURES:

  • resources_kubernetes_daemon_set_v1 : Added max_surge argument for to rolling_update block. [GH-2630]
open-telemetry/opentelemetry-helm-charts (opentelemetry-collector)

v0.111.0

Compare Source

OpenTelemetry Collector Helm chart for Kubernetes

What's Changed
New Contributors

Full Changelog: open-telemetry/opentelemetry-helm-charts@opentelemetry-operator-0.75.1...opentelemetry-collector-0.111.0

v0.110.7

Compare Source

OpenTelemetry Collector Helm chart for Kubernetes

What's Changed
New Contributors

Full Changelog: open-telemetry/opentelemetry-helm-charts@opentelemetry-collector-0.110.6...opentelemetry-collector-0.110.7

v0.110.6

Compare Source

OpenTelemetry Collector Helm chart for Kubernetes

What's Changed
New Contributors

Full Changelog: open-telemetry/opentelemetry-helm-charts@opentelemetry-operator-0.75.0...opentelemetry-collector-0.110.6

v0.110.5

Compare Source

OpenTelemetry Collector Helm chart for Kubernetes

What's Changed
New Contributors

Full Changelog: open-telemetry/opentelemetry-helm-charts@opentelemetry-collector-0.110.4...opentelemetry-collector-0.110.5

v0.110.4

Compare Source

OpenTelemetry Collector Helm chart for Kubernetes

What's Changed

Full Changelog: open-telemetry/opentelemetry-helm-charts@opentelemetry-demo-0.33.7...opentelemetry-collector-0.110.4

benjaminp/six (six)

v1.17.0

Compare Source

  • Pull request #​388: Remove URLopener and FancyURLopener classes from
    urllib.request when running on Python 3.14 or greater.

  • Pull request #​365, issue #​283: six.moves.UserDict now points to
    UserDict.IterableUserDict instead of UserDict.UserDict on Python 2.


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


This PR has been generated by Renovate Bot.


This change is Reviewable

@locmai locmai self-assigned this Jan 1, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants