Skip to content

chore(deps-bump): auto bumped helm dependencies #135

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 8 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions charts/argocd/Chart.lock
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
dependencies:
- name: argo-cd
repository: https://argoproj.github.io/argo-helm
version: 8.0.1
digest: sha256:ba6c49d64851ea12a80e5c30e96ce38ebff712aa90678955595479f613e12089
generated: "2025-05-14T10:23:53.65818767Z"
version: 8.1.1
digest: sha256:c1fecb6c8c8fac4b7a57f34c74155a69cf21bc1b7ec048d0a8eb286c92e0393d
generated: "2025-06-25T10:25:58.37409303Z"
4 changes: 2 additions & 2 deletions charts/argocd/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,11 @@ apiVersion: v2
name: argocd
description: A Helm chart for Kubernetes
type: application
version: 0.1.3
version: 0.1.4
appVersion: "2.14.4"
dependencies:
- name: argo-cd
version: 8.0.1
version: 8.1.1
repository: "https://argoproj.github.io/argo-helm"
alias: argocd
maintainers:
Expand Down
28 changes: 20 additions & 8 deletions charts/argocd/README.md

Large diffs are not rendered by default.

Binary file removed charts/argocd/charts/argo-cd-8.0.1.tgz
Binary file not shown.
Binary file added charts/argocd/charts/argo-cd-8.1.1.tgz
Binary file not shown.
46 changes: 40 additions & 6 deletions charts/argocd/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -98,6 +98,9 @@ argocd:
# -- Annotations for the all deployed Deployments
deploymentAnnotations: {}

# -- Labels for the all deployed Deployments
deploymentLabels: {}

# -- Annotations for the all deployed pods
podAnnotations: {}

Expand Down Expand Up @@ -438,6 +441,8 @@ argocd:
server.enable.gzip: true
# -- Enable proxy extension feature. (proxy extension is in Alpha phase)
server.enable.proxy.extension: false
# -- Enable the hydrator feature (hydrator is in Alpha phase)
hydrator.enabled: false
# -- Set X-Frame-Options header in HTTP responses to value. To disable, set to "".
server.x.frame.options: sameorigin

Expand Down Expand Up @@ -906,6 +911,9 @@ argocd:
# -- Annotations for the application controller Deployment
deploymentAnnotations: {}

# -- Labels for the application controller Deployment
deploymentLabels: {}

# -- Annotations to be added to application controller pods
podAnnotations: {}

Expand Down Expand Up @@ -1172,7 +1180,7 @@ argocd:
# -- Dex image repository
repository: ghcr.io/dexidp/dex
# -- Dex image tag
tag: v2.42.1
tag: v2.43.1
# -- Dex imagePullPolicy
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy: ""
Expand Down Expand Up @@ -1254,6 +1262,9 @@ argocd:
# -- Annotations to be added to the Dex server Deployment
deploymentAnnotations: {}

# -- Labels for the Dex server Deployment
deploymentLabels: {}

# -- Annotations to be added to the Dex server pods
podAnnotations: {}

Expand Down Expand Up @@ -1435,7 +1446,7 @@ argocd:
## Redis image
image:
# -- Redis repository
repository: public.ecr.aws/docker/library/redis
repository: ecr-public.aws.com/docker/library/redis
# -- Redis tag
## Do not upgrade to >= 7.4.0, otherwise you are no longer using an open source version of Redis
tag: 7.2.8-alpine
Expand All @@ -1454,7 +1465,7 @@ argocd:
# -- Repository to use for the redis-exporter
repository: ghcr.io/oliver006/redis_exporter
# -- Tag to use for the redis-exporter
tag: v1.71.0
tag: v1.74.0
# -- Image pull policy for the redis-exporter
# @default -- `""` (defaults to global.image.imagePullPolicy)
imagePullPolicy: ""
Expand Down Expand Up @@ -1575,6 +1586,9 @@ argocd:
# -- Annotations to be added to the Redis server Deployment
deploymentAnnotations: {}

# -- Labels for the Redis server Deployment
deploymentLabels: {}

# -- Annotations to be added to the Redis server pods
podAnnotations: {}

Expand Down Expand Up @@ -1722,7 +1736,7 @@ argocd:
## Redis image
image:
# -- Redis repository
repository: public.ecr.aws/docker/library/redis
repository: ecr-public.aws.com/docker/library/redis
# -- Redis tag
## Do not upgrade to >= 7.4.0, otherwise you are no longer using an open source version of Redis
tag: 7.2.8-alpine
Expand Down Expand Up @@ -1754,6 +1768,9 @@ argocd:
# -- Custom labels for the haproxy pod. This is relevant for Argo CD CLI.
labels:
app.kubernetes.io/name: argocd-redis-ha-haproxy
image:
# -- HAProxy Image Repository
repository: ecr-public.aws.com/docker/library/haproxy
metrics:
# -- HAProxy enable prometheus metric scraping
enabled: true
Expand Down Expand Up @@ -1818,8 +1835,8 @@ argocd:
password: ""
# -- External Redis server port
port: 6379
# -- The name of an existing secret with Redis (must contain key `redis-password`) and Sentinel credentials.
# When it's set, the `externalRedis.password` parameter is ignored
# -- The name of an existing secret with Redis (must contain key `redis-password`. And should contain `redis-username` if username is not `default`) and Sentinel credentials.
# When it's set, the `externalRedis.username` and `externalRedis.password` parameters are ignored
existingSecret: ""
# -- External Redis Secret annotations
secretAnnotations: {}
Expand Down Expand Up @@ -2107,6 +2124,9 @@ argocd:
# -- Annotations to be added to server Deployment
deploymentAnnotations: {}

# -- Labels for the server Deployment
deploymentLabels: {}

# -- Annotations to be added to server pods
podAnnotations: {}

Expand Down Expand Up @@ -2755,6 +2775,9 @@ argocd:
# -- Annotations to be added to repo server Deployment
deploymentAnnotations: {}

# -- Labels for the repo server Deployment
deploymentLabels: {}

# -- Annotations to be added to repo server pods
podAnnotations: {}

Expand Down Expand Up @@ -2885,6 +2908,8 @@ argocd:
port: 8081
# -- Repo server service port name
portName: tcp-repo-server
# -- Traffic distribution preference for the repo server service. If the field is not set, the implementation will apply its default routing strategy.
trafficDistribution: ""

## Repo server metrics service configuration
metrics:
Expand Down Expand Up @@ -3125,6 +3150,9 @@ argocd:
# -- Annotations to be added to ApplicationSet controller Deployment
deploymentAnnotations: {}

# -- Labels for the ApplicationSet controller Deployment
deploymentLabels: {}

# -- Annotations for the ApplicationSet controller pods
podAnnotations: {}

Expand Down Expand Up @@ -3507,6 +3535,9 @@ argocd:
# -- Annotations to be applied to the notifications controller Deployment
deploymentAnnotations: {}

# -- Labels for the notifications controller Deployment
deploymentLabels: {}

# -- Annotations to be applied to the notifications controller Pods
podAnnotations: {}

Expand Down Expand Up @@ -3990,6 +4021,9 @@ argocd:
# -- Annotations to be added to commit server Deployment
deploymentAnnotations: {}

# -- Labels for the commit server Deployment
deploymentLabels: {}

# -- Annotations for the commit server pods
podAnnotations: {}

Expand Down
6 changes: 3 additions & 3 deletions charts/cert-manager/Chart.lock
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
dependencies:
- name: cert-manager
repository: https://charts.jetstack.io
version: v1.17.2
version: v1.18.1
- name: gcp-workload-identity
repository: https://edixos.github.io/ekp-helm
version: 0.1.1
- name: gcp-iam-policy-members
repository: https://edixos.github.io/ekp-helm
version: 0.1.2
digest: sha256:332d9476ee0ae270e6ab49c0a8474c4a9ded472b0198920ab2f457119509c2f8
generated: "2025-05-07T10:23:12.154607043Z"
digest: sha256:30904c0a6cb69e7fd6a4b395e5180eca8e673bf619bc54acacc767a32b2f606a
generated: "2025-06-25T10:24:06.060524723Z"
4 changes: 2 additions & 2 deletions charts/cert-manager/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: v2
name: cert-manager
description: A Helm chart for cert-manager
type: application
version: 0.1.3
version: 0.1.4
appVersion: "1.17.1"
maintainers:
- name: wiemaouadi
Expand All @@ -13,7 +13,7 @@ maintainers:
url: https://github.com/smileisak
dependencies:
- name: cert-manager
version: "v1.17.2"
version: "v1.18.1"
repository: "https://charts.jetstack.io"
alias: certmanager
- name: gcp-workload-identity
Expand Down
9 changes: 5 additions & 4 deletions charts/cert-manager/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# cert-manager

![Version: 0.1.3](https://img.shields.io/badge/Version-0.1.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.17.1](https://img.shields.io/badge/AppVersion-1.17.1-informational?style=flat-square)
![Version: 0.1.4](https://img.shields.io/badge/Version-0.1.4-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 1.17.1](https://img.shields.io/badge/AppVersion-1.17.1-informational?style=flat-square)

## Prerequisites

Expand All @@ -11,7 +11,7 @@

| Repository | Name | Version |
|------------|------|---------|
| https://charts.jetstack.io | certmanager(cert-manager) | v1.17.2 |
| https://charts.jetstack.io | certmanager(cert-manager) | v1.18.1 |
| https://edixos.github.io/ekp-helm | iamPolicyMembers(gcp-iam-policy-members) | 0.1.2 |
| https://edixos.github.io/ekp-helm | workloadIdentity(gcp-workload-identity) | 0.1.1 |

Expand Down Expand Up @@ -89,6 +89,7 @@ A Helm chart for cert-manager
| certmanager.global.priorityClassName | string | `""` | |
| certmanager.global.rbac.aggregateClusterRoles | bool | `true` | |
| certmanager.global.rbac.create | bool | `true` | |
| certmanager.global.rbac.disableHTTPChallengesRole | bool | `false` | |
| certmanager.hostAliases | list | `[]` | |
| certmanager.image.pullPolicy | string | `"IfNotPresent"` | |
| certmanager.image.repository | string | `"quay.io/jetstack/cert-manager-controller"` | |
Expand Down Expand Up @@ -124,7 +125,7 @@ A Helm chart for cert-manager
| certmanager.prometheus.servicemonitor.path | string | `"/metrics"` | |
| certmanager.prometheus.servicemonitor.prometheusInstance | string | `"default"` | |
| certmanager.prometheus.servicemonitor.scrapeTimeout | string | `"30s"` | |
| certmanager.prometheus.servicemonitor.targetPort | int | `9402` | |
| certmanager.prometheus.servicemonitor.targetPort | string | `"http-metrics"` | |
| certmanager.replicaCount | int | `1` | |
| certmanager.resources | object | `{}` | |
| certmanager.securityContext.runAsNonRoot | bool | `true` | |
Expand Down Expand Up @@ -273,7 +274,7 @@ spec:

source:
repoURL: "https://edixos.github.io/ekp-helm"
targetRevision: "0.1.3"
targetRevision: "0.1.4"
chart: cert-manager
path: ''
helm:
Expand Down
Binary file removed charts/cert-manager/charts/cert-manager-v1.17.2.tgz
Binary file not shown.
Binary file not shown.
34 changes: 20 additions & 14 deletions charts/cert-manager/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,9 @@ certmanager:
create: true
# Aggregate ClusterRoles to Kubernetes default user-facing roles. For more information, see [User-facing roles](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles)
aggregateClusterRoles: true
# To use HTTP-01 ACME challenges, cert-manager needs extra permissions to create pods.
# If you want to avoid this added permission and disable HTTP-01 set this value.
disableHTTPChallengesRole: false

podSecurityPolicy:
# Create PodSecurityPolicy for cert-manager.
Expand Down Expand Up @@ -134,14 +137,14 @@ certmanager:
enabled: false

# This configures the minimum available pods for disruptions. It can either be set to
# an integer (e.g. 1) or a percentage value (e.g. 25%).
# an integer (e.g., 1) or a percentage value (e.g., 25%).
# It cannot be used if `maxUnavailable` is set.
# +docs:property
# +docs:type=unknown
# minAvailable: 1

# This configures the maximum unavailable pods for disruptions. It can either be set to
# an integer (e.g. 1) or a percentage value (e.g. 25%).
# an integer (e.g., 1) or a percentage value (e.g., 25%).
# it cannot be used if `minAvailable` is set.
# +docs:property
# +docs:type=unknown
Expand Down Expand Up @@ -193,7 +196,7 @@ certmanager:
# Override the "cert-manager.name" value, which is used to annotate some of
# the resources that are created by this Chart (using "app.kubernetes.io/name").
# NOTE: There are some inconsistencies in the Helm chart when it comes to
# these annotations (some resources use eg. "cainjector.name" which resolves
# these annotations (some resources use, e.g., "cainjector.name" which resolves
# to the value "cainjector").
# +docs:property
# nameOverride: "my-cert-manager"
Expand Down Expand Up @@ -248,10 +251,10 @@ certmanager:
# kubernetesAPIBurst: 9000
# numberOfConcurrentWorkers: 200
# enableGatewayAPI: true
# # Feature gates as of v1.17.0. Listed with their default values.
# # Feature gates as of v1.18.1. Listed with their default values.
# # See https://cert-manager.io/docs/cli/controller/
# featureGates:
# AdditionalCertificateOutputFormats: true # BETA - default=true
# AdditionalCertificateOutputFormats: true # GA - default=true
# AllAlpha: false # ALPHA - default=false
# AllBeta: false # BETA - default=false
# ExperimentalCertificateSigningRequestControllers: false # ALPHA - default=false
Expand All @@ -263,8 +266,10 @@ certmanager:
# ServerSideApply: false # ALPHA - default=false
# StableCertificateRequestName: true # BETA - default=true
# UseCertificateRequestBasicConstraints: false # ALPHA - default=false
# UseDomainQualifiedFinalizer: true # BETA - default=false
# UseDomainQualifiedFinalizer: true # GA - default=true
# ValidateCAA: false # ALPHA - default=false
# DefaultPrivateKeyRotationPolicyAlways: true # BETA - default=true
# ACMEHTTP01IngressPathTypeExact: true # BETA - default=true
# # Configure the metrics server for TLS
# # See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
# metricsTLSConfig:
Expand Down Expand Up @@ -295,7 +300,7 @@ certmanager:
# referencing these signer names will be auto-approved by cert-manager. Defaults to just
# approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty
# array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval,
# because eg. you are using approver-policy, you can enable 'disableAutoApproval'.
# because, e.g., you are using approver-policy, you can enable 'disableAutoApproval'.
# ref: https://cert-manager.io/docs/concepts/certificaterequest/#approval
# +docs:property
approveSignerNames:
Expand Down Expand Up @@ -519,7 +524,7 @@ certmanager:
# ServiceMonitor resource.
# Otherwise, 'prometheus.io' annotations are added to the cert-manager and
# cert-manager-webhook Deployments.
# Note that you can not enable both PodMonitor and ServiceMonitor as they are
# Note that you cannot enable both PodMonitor and ServiceMonitor as they are
# mutually exclusive. Enabling both will result in an error.
enabled: true

Expand All @@ -539,7 +544,8 @@ certmanager:

# The target port to set on the ServiceMonitor. This must match the port that the
# cert-manager controller is listening on for metrics.
targetPort: 9402
# +docs:type=string,integer
targetPort: http-metrics

# The path to scrape for metrics.
path: /metrics
Expand Down Expand Up @@ -573,7 +579,7 @@ certmanager:
# +docs:property
endpointAdditionalProperties: {}

# Note that you can not enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
# Note that you cannot enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
podmonitor:
# Create a PodMonitor to add cert-manager to Prometheus.
enabled: false
Expand Down Expand Up @@ -723,14 +729,14 @@ certmanager:
enabled: false

# This property configures the minimum available pods for disruptions. Can either be set to
# an integer (e.g. 1) or a percentage value (e.g. 25%).
# an integer (e.g., 1) or a percentage value (e.g., 25%).
# It cannot be used if `maxUnavailable` is set.
# +docs:property
# +docs:type=unknown
# minAvailable: 1

# This property configures the maximum unavailable pods for disruptions. Can either be set to
# an integer (e.g. 1) or a percentage value (e.g. 25%).
# an integer (e.g., 1) or a percentage value (e.g., 25%).
# It cannot be used if `minAvailable` is set.
# +docs:property
# +docs:type=unknown
Expand Down Expand Up @@ -1090,14 +1096,14 @@ certmanager:
enabled: false

# `minAvailable` configures the minimum available pods for disruptions. It can either be set to
# an integer (e.g. 1) or a percentage value (e.g. 25%).
# an integer (e.g., 1) or a percentage value (e.g., 25%).
# Cannot be used if `maxUnavailable` is set.
# +docs:property
# +docs:type=unknown
# minAvailable: 1

# `maxUnavailable` configures the maximum unavailable pods for disruptions. It can either be set to
# an integer (e.g. 1) or a percentage value (e.g. 25%).
# an integer (e.g., 1) or a percentage value (e.g., 25%).
# Cannot be used if `minAvailable` is set.
# +docs:property
# +docs:type=unknown
Expand Down
Loading