Skip to content

feat(helm): update chart external-secrets ( 1.2.1 ➔ 1.3.2 )#3160

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/external-secrets-1.x
Open

feat(helm): update chart external-secrets ( 1.2.1 ➔ 1.3.2 )#3160
renovate[bot] wants to merge 1 commit intomainfrom
renovate/external-secrets-1.x

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jan 23, 2026

This PR contains the following updates:

Package Update Change
external-secrets minor 1.2.11.3.2

Release Notes

external-secrets/external-secrets (external-secrets)

v1.3.2

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v1.3.2
Image: ghcr.io/external-secrets/external-secrets:v1.3.2-ubi
Image: ghcr.io/external-secrets/external-secrets:v1.3.2-ubi-boringssl

What's Changed
General
Dependencies
New Contributors

Full Changelog: external-secrets/external-secrets@v1.3.1...v1.3.2

v1.3.1

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v1.3.1
Image: ghcr.io/external-secrets/external-secrets:v1.3.1-ubi
Image: ghcr.io/external-secrets/external-secrets:v1.3.1-ubi-boringssl

For a Full release please referre to https://github.com/external-secrets/external-secrets/releases/tag/v1.3.0. This is a fix build for the docker publish flow.

What's Changed

General

Full Changelog: external-secrets/external-secrets@v1.3.0...v1.3.1


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions
Copy link

github-actions bot commented Jan 23, 2026

civo-mgmt-0 - kustomization

--- k8s/base/external-secrets/external-secrets Kustomization: flux-system/external-secrets-external-secrets HelmRelease: external-secrets/external-secrets

+++ k8s/base/external-secrets/external-secrets Kustomization: flux-system/external-secrets-external-secrets HelmRelease: external-secrets/external-secrets

@@ -13,13 +13,13 @@

       chart: external-secrets
       interval: 15m
       sourceRef:
         kind: HelmRepository
         name: external-secrets
         namespace: flux-system
-      version: 1.2.1
+      version: 1.3.2
   install:
     crds: CreateReplace
     createNamespace: true
     remediation:
       retries: 3
   interval: 15m

@github-actions
Copy link

github-actions bot commented Jan 23, 2026

civo-mgmt-0 - helmrelease

--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-cert-controller

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-cert-controller

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v1.2.1
+        image: ghcr.io/external-secrets/external-secrets:v1.3.2
         imagePullPolicy: IfNotPresent
         args:
         - certcontroller
         - --crd-requeue-interval=5m
         - --service-name=external-secrets-webhook
         - --service-namespace=external-secrets
@@ -52,13 +52,16 @@

         - --zap-time-encoding=epoch
         - --enable-partial-cache=true
         ports:
         - containerPort: 8080
           protocol: TCP
           name: metrics
+        - containerPort: 8081
+          protocol: TCP
+          name: ready
         readinessProbe:
           httpGet:
-            port: 8081
+            port: ready
             path: /readyz
           initialDelaySeconds: 20
           periodSeconds: 5
 
--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v1.2.1
+        image: ghcr.io/external-secrets/external-secrets:v1.3.2
         imagePullPolicy: IfNotPresent
         args:
         - --concurrent=1
         - --metrics-addr=:8080
         - --loglevel=info
         - --zap-time-encoding=epoch
--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-webhook

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-webhook

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v1.2.1
+        image: ghcr.io/external-secrets/external-secrets:v1.3.2
         imagePullPolicy: IfNotPresent
         args:
         - webhook
         - --port=10250
         - --dns-name=external-secrets-webhook.external-secrets.svc
         - --cert-dir=/tmp/certs
@@ -53,15 +53,18 @@

         - containerPort: 8080
           protocol: TCP
           name: metrics
         - containerPort: 10250
           protocol: TCP
           name: webhook
+        - containerPort: 8081
+          protocol: TCP
+          name: ready
         readinessProbe:
           httpGet:
-            port: 8081
+            port: ready
             path: /readyz
           initialDelaySeconds: 20
           periodSeconds: 5
         volumeMounts:
         - name: certs
           mountPath: /tmp/certs

@github-actions
Copy link

github-actions bot commented Jan 23, 2026

qgr1-cluster-0 - helmrelease

--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-cert-controller

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-cert-controller

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v1.2.1
+        image: ghcr.io/external-secrets/external-secrets:v1.3.2
         imagePullPolicy: IfNotPresent
         args:
         - certcontroller
         - --crd-requeue-interval=5m
         - --service-name=external-secrets-webhook
         - --service-namespace=external-secrets
@@ -52,13 +52,16 @@

         - --zap-time-encoding=epoch
         - --enable-partial-cache=true
         ports:
         - containerPort: 8080
           protocol: TCP
           name: metrics
+        - containerPort: 8081
+          protocol: TCP
+          name: ready
         readinessProbe:
           httpGet:
-            port: 8081
+            port: ready
             path: /readyz
           initialDelaySeconds: 20
           periodSeconds: 5
 
--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v1.2.1
+        image: ghcr.io/external-secrets/external-secrets:v1.3.2
         imagePullPolicy: IfNotPresent
         args:
         - --concurrent=1
         - --metrics-addr=:8080
         - --loglevel=info
         - --zap-time-encoding=epoch
--- HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-webhook

+++ HelmRelease: external-secrets/external-secrets Deployment: external-secrets/external-secrets-webhook

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v1.2.1
+        image: ghcr.io/external-secrets/external-secrets:v1.3.2
         imagePullPolicy: IfNotPresent
         args:
         - webhook
         - --port=10250
         - --dns-name=external-secrets-webhook.external-secrets.svc
         - --cert-dir=/tmp/certs
@@ -53,15 +53,18 @@

         - containerPort: 8080
           protocol: TCP
           name: metrics
         - containerPort: 10250
           protocol: TCP
           name: webhook
+        - containerPort: 8081
+          protocol: TCP
+          name: ready
         readinessProbe:
           httpGet:
-            port: 8081
+            port: ready
             path: /readyz
           initialDelaySeconds: 20
           periodSeconds: 5
         volumeMounts:
         - name: certs
           mountPath: /tmp/certs

@github-actions
Copy link

github-actions bot commented Jan 23, 2026

qgr1-cluster-0 - kustomization

--- k8s/base/external-secrets/external-secrets Kustomization: flux-system/external-secrets-external-secrets HelmRelease: external-secrets/external-secrets

+++ k8s/base/external-secrets/external-secrets Kustomization: flux-system/external-secrets-external-secrets HelmRelease: external-secrets/external-secrets

@@ -13,13 +13,13 @@

       chart: external-secrets
       interval: 15m
       sourceRef:
         kind: HelmRepository
         name: external-secrets
         namespace: flux-system
-      version: 1.2.1
+      version: 1.3.2
   install:
     crds: CreateReplace
     createNamespace: true
     remediation:
       retries: 3
   interval: 15m

@renovate renovate bot force-pushed the renovate/external-secrets-1.x branch from 6b636e4 to 8d6b9ed Compare February 2, 2026 20:11
@renovate renovate bot changed the title feat(helm): update chart external-secrets ( 1.2.1 ➔ 1.3.1 ) feat(helm): update chart external-secrets ( 1.2.1 ➔ 1.3.2 ) Feb 4, 2026
@renovate renovate bot force-pushed the renovate/external-secrets-1.x branch from 8d6b9ed to 723a1f8 Compare February 4, 2026 00:56
@renovate renovate bot force-pushed the renovate/external-secrets-1.x branch from 723a1f8 to c2e1f04 Compare March 9, 2026 17:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants