From fa90395f932da07eeb4e13542f8252759cb59725 Mon Sep 17 00:00:00 2001 From: Alex Ellwein Date: Sun, 19 Feb 2023 11:58:43 +0100 Subject: [PATCH] chore: prepare release --- Makefile | 2 +- charts/cert-manager-webhook-netcup-1.0.13.tgz | Bin 0 -> 4418 bytes charts/index.yaml | 50 ++++++++++++++---- deploy/cert-manager-webhook-netcup/Chart.yaml | 38 ++----------- .../cert-manager-webhook-netcup/values.yaml | 2 +- 5 files changed, 46 insertions(+), 46 deletions(-) create mode 100644 charts/cert-manager-webhook-netcup-1.0.13.tgz diff --git a/Makefile b/Makefile index 84b3074..2040238 100644 --- a/Makefile +++ b/Makefile @@ -2,7 +2,7 @@ OS ?= $(shell go env GOOS) ARCH ?= $(shell go env GOARCH) IMAGE_NAME := "elvino76/cert-manager-webhook-netcup" -IMAGE_TAG := "1.0.12" +IMAGE_TAG := "1.0.13" OUT := $(shell pwd)/_out diff --git a/charts/cert-manager-webhook-netcup-1.0.13.tgz b/charts/cert-manager-webhook-netcup-1.0.13.tgz new file mode 100644 index 0000000000000000000000000000000000000000..0678eb79bcae77df49802e9cbf55cac1c531e9a2 GIT binary patch literal 4418 zcmV-I5xwpoiwG0|00000|0w_~VMtOiV@ORlOnEsqVl!4SWK%V1T2nbTPgYhoO;>Dc zVQyr3R8em|NM&qo0PH<~bKAC({TrWRPrf%vd?qE?j?>Y++&rJ-=6SAhJ#pGMZ#tbC zB3C485MTjNj+*v9`wak+B56sMe>^+Q6K0}FB(T_BEOr;bVjZC}K}H2lPz6^wPNlpI z1e&PG`$s8NCY;fXe|4`i7z_pn`}^+y!C=t+f4D!~`)atq_iBHCFxWlV{c12g*gtsn z6%6jz?RurqhN`ay_wK7p+@GXSA*7*(NufssfGWc#G%{&14w>vnDHRFo5&TX700OvV zA|3&aV~pJsfEab8SZ*PVpf@hE9AeB-#3&+$y4PwrVIP+?Eb>Ir7$K3IiX@aO>3{4C zG+-nQ!dKzIe#w|&2{i~uKO6_UgWcU=fB0&5ueShkDGX&opJP-gW@g{#F*TNuo>2uZ zXuw&7LgNSya~h=>?1qEul`_g4SX2#`2%6bu96!P_=U2!?Ng!sF@exptA4BwS{+8Hh zVI(s`bM^x&?Wms)3C;8R=P(?E!#&bs&>{RCc?OZ4k}#19?8Jp~;zBubK}$YG<=!72 zy*q|Cr{{yAZNxc>1PQ>DQ8;zeo21ero*I+uQNN!sM`a|lJ}t5BuTTzzMHa29wW3#{ zhfru#mis7-1J;Dm{*h5_Q1!V?r27bSk&sKAT}c(|5ecAKn*($0#7vY!?KEkX@}oWJr$p%tkVBe$_v!@Hvl*2|K0ulmtFn;YHx3&{~x1l!G{## zt&&B4N;8BM6#~;xXpF7OWiblFCNr4HLO~?6oQfGp1>-_9fm%Z$m;sYgL$)ANNR4fn zGF{ErkZi#>QUQLXSr?UrXiNr&XBEoEEGmE%dAO_Lqd{jtVXs?=;vx!DMw<-eCMgO2Hm2ea~gGYApy{+ zrYyq4D3XORr`OaaAuOW_S|AE@shN>#HUi{RCgiJwmBsBjI4OMzMxdeJHUiCNMk!rh9(4D+Y$7v<<1Mv&m?EjYy>BhQ)$i=Y7~Yzo&Vhw zm0~fv%9DcgYY$0Dxuwj^avZ@CFRUp#IkV8EG9%dE-y@_J0bBFaAC8WHSkw#3`D{Kc zAf##1661sx+%!ap3P&tQ>STv$pc*JdQs{`uLOak=Dp`cicw6zZhBWjNMY)#1gq>X) zwG}xL`Tv#Cpb7y}0E#J7Qe-HMhAU=L;LI3~4t9;o4(K9EZTIh(V3)-hLpYgOF@#vc z6%{Q?8qEsfsWlF{iR4^fF_Adv+-iaypz$w-cJDLWfxrm0rfRn1=vSD@a^^&Z;xia4 z>Uc9TsNmV0+0VifXvU0V{T4u!7b6%B2AThvVdjK!xcl`xRucGYfqK3AM93J=kz-_} z8rhL0Msif88w@}GL2_TONZbL%$uPrv(cd>)#Q=1zUwVE^6s zmi^xy3=aky`~Mhaz48A!MV_P5p~>&y3f?gOdj|*I@gELeZN~pm%BN5LZJ4rb1R4!Y z7)NUoUuTvrQHmqj?*H)zv9-wY$K2Vm6uom}ZL?M8ZkLFZ^#W`Cm_X>QkgU+Q??Etc z;p}DTH=LXw8vfuHA5H5Gzk^YQh~Qw)eP!8sF`2NB&ezr`4pK!c@sI$_9T4OF4GSKg^{ z7XJBoR=J6`u66dTS$z?blL;u~)|Pu9)n-Mxx_8f*@t$wxDmj0_B41*AD|T0I(40$b zQggWLBh_`5R#pn+4q)AHU`^HtJ3wg1MLR9lpbG;(=qZ}4!UdETS{Vc1pN1M{|SD#{ywJ> zLhrwN(EGV}+j+Mhej54YoFxKdzkaJgH8HhyG)qJeo-+~gB3@h2!xwN@#FUig=x{kw z5q$!5j!+pkVOBeR1~|DDlt^wss%m7oepKu%kQ2L}JniZ{%yKiUHI7?zhHh1Q4f&Cq zB&~|`RdDBpp$S~qDh*(Ny9F?Z&T<{{(Dr{l|BvRZTr}ThH}IzOpWXd~uK)M)V0YvH zJw|CBL(rTlOqe!)B^+LUtwSdJ(;@MvH-~2@=Uxg(hK9z}&}xfm1k)kqc}j=jr%$y+ z*IQLqput-)w?YT&ca7lFCs<1>lp4W90dEu6Z(SO~x_Rk)IRI@-Usgy_F+-D1jgoX< zsdH=wt(`N=G$ww*$OI7$CQ4=_=yf}Dn{x2SAN_U7Sfq0;O+8}WN{fYKw?}&M0JxuL zib=)H>>U#AoDG9XYnAl2&;3}4Q72|ba1q}N5bq01}IHg+SI@neq3T&BL{4VWh` z>*@a(b1r8YiaUh^+@SyW2YY*6{eLicxzYcRQQG=H*K=+ErXKSJ+WyWu;ES;VmD06q zB^FWL(!1ruBUuRJA?j+o*+I{!iPCQythgUDZltH0$z|`2;k1Rf5VaZuF|4)5pBPqEr9sY)7%d*lPV zgbExs6UOm%-*9dJg^@A~tLBPLslnh9XPp+8IBT>(G41x{8TI!4ci*4=e0uoqxb+&q z#RM$zF@A?%3u!uR&80He2=bk{;E@jedi2ifbGUYeTuCD%$w%>^xe+ zaVtVyj%T+1neWZ;?psUMcY@DGU{rxEa_hsn2FMU|-flb-Fl* zUY|GK6LRAqa}K__DkIGuRz&;(s5d1VKQy zpgtz6Hrz2TqpEhA;ZJ3J7f?`A8aO(13cJ*(Fp-LEfo;u1G7m}hs<&BFw}M~0J16x5 z#3OKz#mDs%hEnI>xDC|m%ftQ4H zmG||l1E=wZ_ttm|r*$l}8zKuZxcjcxU7Ln0&R`xKW~ispW=Z+kmG#ztYD}ZMF927s z|AxDR?)}f*!QS3*v;KRG(z%A{?bUf}PkwX!v%vKDb@N+A%L@^eTacs5n09e=M!MZo z_xebR2}|D5yxQQl?uC6Z4=5#DP=?vKyG-SUh7@UxDu`&%a7OB@Msu)C11*fqs9}-2 zol;%JD&q(nfva^dVat1QbDS0?m5TkgH~{3m!Uc94hI34k4DXW{Af_vfeh;5UBXdajDNw%lupOI z!=AsYy-)+(-ru=n@Q0sPH3^WQDVJ)6NrM^Ik}Es%wJ5HWo? z`SjON1D{ghixSU*V@GuAqsU-I^jz!Av#S1V`G$&kMS=U2J z{_iuEy$03c-0krU?=2lt+sYlyQ~hlIG%o`qIZlyB&haYu3G`wS;7prF`zvaqwDCJZ zb6@dzaGUg{O3A|+qz7Q^XK%eeBZ2&KjnI>eWSh137Rt(KHu6t|*JJyZh~k2_;+|6Z zu;$b6FfUw`E}cp@*ruiSr{_B>Q)gX^@R@IRciobDFWI(Q5ahGJB#5YExOxei-u#!d zTfMsu!GmjrJB`ExEU+I0-OpO}KlN7RraVDeZ~y-um;ctd|2H@oUd#V*u*v`RC}q|D z|7PQV#hJ6u9My1MsySj`cxa8#_n-{fUQpk@XoTugm7qDh7T>)n?7baD-@ajTA0Dq{ z(o+lUraWj_rT@bedBzeU72d0l8}$F+`3HZT=s}u!{ z3&ySM4mpi3X@a^wb<{=fR2%3NIfsPHvA@yAM6zSG2Q_Sp?gmTaITbP40)dJ1wc&ZL z(4_B;lL$pU;g{NVed}#R$R=N9PbTrAe4D(|4a9 zeG-m;Q+@YYJxG(j{iuHGsp!uEjcIgQ2)Yvk`JxVtU|G&FL*cU~xNyosBXN`eN1u^;4(00Vs!D8% z#S82FOj%qew$_rn;LIPZ4A;S6Na`%CdMPUXSVp?v+PLr2D8qg%^kCS35fbvfrU{ZD zaG{~!lmVX}kHDwIWD&F=?6}OCtsJ%W9f?M0hu;O*X$F7ze7c1;GD8KT$i}F4;PC7O zE^+2ELfP**)%r@R7$!_<6B6=IS-2Fcu>@v-v&%*<&K+?1H+}A=^6*<>Wc;N~m&n#X z%`z(D5g`{B7dj=E#TX;QE5tpnJ{*=sHTnK&Alhe|flF@@aAr_Z{<@+k@btX?tEDpN zJpJ!(E1I+55@)afT7L0w%Z_8J)3Kx~Uf8VSk8fN3S^~h*OAcMSQAcYPgVPutH?p32 z7Z*NS^Wvg^aZzQ6EuVm#5KEdfnkg;Qn$`o+mJxVPHBhaK4C9@Oy-btHifjzM7KeLo z=(&ts@D3C6otw4`-+ST5ZH%v#IvJ90s z52cMb0h+ly_L=4P%`cFN1h|8iE&8#$i~+Pcw|7s)il*6U>gvKi={S_Q;1 zwEceT|11Tmd;HP=eG1rx^3_kz!~VA?N5`k<$1eyWe?}j4Q#NH&o~HbN00030|7Zq= I=KyK|05|xitN;K2 literal 0 HcmV?d00001 diff --git a/charts/index.yaml b/charts/index.yaml index 4128d98..8b1760f 100644 --- a/charts/index.yaml +++ b/charts/index.yaml @@ -1,6 +1,36 @@ apiVersion: v1 entries: cert-manager-webhook-netcup: + - annotations: + artifacthub.io/changes: | + - kind: added + description: "bump dependencies" + - kind: fixed + description: "upgrade golang.org/x/net to 0.7.0 to mitigate CVE-2022-41723" + artifacthub.io/containsSecurityUpdates: "true" + artifacthub.io/license: Apache-2.0 + artifacthub.io/maintainers: | + - name: Alex Ellwein + email: alex.ellwein@gmail.com + apiVersion: v1 + appVersion: 1.0.13 + created: "2023-02-19T11:57:53.986508+01:00" + description: A Helm chart for cert manager webhook solver for ACME DNS01 challenge + via Netcup + digest: aacbab905a72529e0843ef24105ad3084ed3848711d2b65210d3dfc134e83df6 + home: https://github.com/aellwein/cert-manager-webhook-netcup + icon: https://raw.githubusercontent.com/cert-manager/cert-manager/master/logo/logo.png + keywords: + - cert-manager + - webhook + - letsencrypt + - netcup + - ACME + - DNS01 + name: cert-manager-webhook-netcup + urls: + - cert-manager-webhook-netcup-1.0.13.tgz + version: 1.0.13 - annotations: artifacthub.io/changes: | - kind: added @@ -44,7 +74,7 @@ entries: email: alex.ellwein@gmail.com apiVersion: v1 appVersion: 1.0.12 - created: "2023-02-15T19:09:20.78169+01:00" + created: "2023-02-19T11:57:53.986233+01:00" description: A Helm chart for cert manager webhook solver for ACME DNS01 challenge via Netcup digest: bede761557c38f373c3923f9d9128f77c8fc32d2b1d79f1fda4cb548c031f62d @@ -71,7 +101,7 @@ entries: email: alex.ellwein@gmail.com apiVersion: v1 appVersion: 1.0.11 - created: "2023-02-15T19:09:20.781347+01:00" + created: "2023-02-19T11:57:53.985726+01:00" description: A Helm chart for cert manager webhook solver for ACME DNS01 challenge via Netcup digest: aa66de90af78012c0521d3ec48265746ee97f26640248e4b68328331c4ce6f2d @@ -99,7 +129,7 @@ entries: email: alex.ellwein@gmail.com apiVersion: v1 appVersion: 1.0.10 - created: "2023-02-15T19:09:20.78103+01:00" + created: "2023-02-19T11:57:53.985361+01:00" description: A Helm chart for cert manager webhook solver for ACME DNS01 challenge via Netcup digest: f6ec08186bf14c204eef0971e9c84545b5a8bb3d455d7cdcca488ddc71830695 @@ -128,7 +158,7 @@ entries: email: alex.ellwein@gmail.com apiVersion: v1 appVersion: 1.0.9 - created: "2023-02-15T19:09:20.78365+01:00" + created: "2023-02-19T11:57:53.989143+01:00" description: A Helm chart for cert manager webhook solver for ACME DNS01 challenge via Netcup digest: d3b6eab27e21af3ae6fb5473e4b0e5db8d75c95bf5ee9b7f1b2e25e98b488bd3 @@ -147,7 +177,7 @@ entries: version: 1.0.9 - apiVersion: v1 appVersion: 1.0.8 - created: "2023-02-15T19:09:20.783344+01:00" + created: "2023-02-19T11:57:53.988778+01:00" description: Allow cert-manager to solve DNS challenges using Netcup DNS API digest: 4b1c49ef9ab1c57428cff35824dd7cb13f187af74fa7dcd560dd788aa0dce892 name: cert-manager-webhook-netcup @@ -156,7 +186,7 @@ entries: version: 1.0.8 - apiVersion: v1 appVersion: 1.0.7 - created: "2023-02-15T19:09:20.782575+01:00" + created: "2023-02-19T11:57:53.98849+01:00" description: Allow cert-manager to solve DNS challenges using Netcup DNS API digest: 0d262079f7326e41020df239298f5106bebaf9d797a9ce61550caa6457237a69 name: cert-manager-webhook-netcup @@ -165,7 +195,7 @@ entries: version: 1.0.7 - apiVersion: v1 appVersion: 1.0.6 - created: "2023-02-15T19:09:20.782372+01:00" + created: "2023-02-19T11:57:53.987454+01:00" description: Allow cert-manager to solve DNS challenges using Netcup DNS API digest: f1eb0f11758d480a6fa187a54cdca8669b1ccdb75f022b53d84253723827b7c7 name: cert-manager-webhook-netcup @@ -174,7 +204,7 @@ entries: version: 1.0.6 - apiVersion: v1 appVersion: 1.0.5 - created: "2023-02-15T19:09:20.78215+01:00" + created: "2023-02-19T11:57:53.987202+01:00" description: Allow cert-manager to solve DNS challenges using Netcup DNS API digest: 24df7547c2509b06972440c318a22e7e62c0c00c55a796b2c71b70c2e6a1f9bf name: cert-manager-webhook-netcup @@ -183,11 +213,11 @@ entries: version: 1.0.5 - apiVersion: v1 appVersion: 1.0.3 - created: "2023-02-15T19:09:20.781924+01:00" + created: "2023-02-19T11:57:53.986855+01:00" description: Allow cert-manager to solve DNS challenges using Netcup DNS API digest: 03f7f124bb6d76a606a9ed598466b1f4aa422c4406bde52cfff1202a209cd9fd name: cert-manager-webhook-netcup urls: - cert-manager-webhook-netcup-1.0.3.tgz version: 1.0.3 -generated: "2023-02-15T19:09:20.780621+01:00" +generated: "2023-02-19T11:57:53.984858+01:00" diff --git a/deploy/cert-manager-webhook-netcup/Chart.yaml b/deploy/cert-manager-webhook-netcup/Chart.yaml index 3785fc6..453c429 100644 --- a/deploy/cert-manager-webhook-netcup/Chart.yaml +++ b/deploy/cert-manager-webhook-netcup/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v1 -appVersion: "1.0.12" -version: 1.0.12 +appVersion: "1.0.13" +version: 1.0.13 description: A Helm chart for cert manager webhook solver for ACME DNS01 challenge via Netcup name: cert-manager-webhook-netcup home: https://github.com/aellwein/cert-manager-webhook-netcup @@ -20,36 +20,6 @@ annotations: artifacthub.io/containsSecurityUpdates: "true" artifacthub.io/changes: | - kind: added - description: "Use updated base Docker image (alpine 3.17.2) to mitigate CVEs in openssl and libcrypto3" + description: "bump dependencies" - kind: fixed - description: "openssl CVE-2023-0286" - - kind: fixed - description: "openssl CVE-2022-4304" - - kind: fixed - description: "openssl CVE-2022-4203" - - kind: fixed - description: "openssl CVE-2023-0215" - - kind: fixed - description: "openssl CVE-2022-4450" - - kind: fixed - description: "openssl CVE-2023-0216" - - kind: fixed - description: "openssl CVE-2023-0217" - - kind: fixed - description: "openssl CVE-2023-0401" - - kind: fixed - description: "libcrypto3 CVE-2023-0286" - - kind: fixed - description: "libcrypto3 CVE-2022-4203" - - kind: fixed - description: "libcrypto3 CVE-2022-4304" - - kind: fixed - description: "libcrypto3 CVE-2022-4450" - - kind: fixed - description: "libcrypto3 CVE-2023-0215" - - kind: fixed - description: "libcrypto3 CVE-2023-0216" - - kind: fixed - description: "libcrypto3 CVE-2023-0217" - - kind: fixed - description: "libcrypto3 CVE-2023-0401" + description: "upgrade golang.org/x/net to 0.7.0 to mitigate CVE-2022-41723" diff --git a/deploy/cert-manager-webhook-netcup/values.yaml b/deploy/cert-manager-webhook-netcup/values.yaml index 08e2f98..4179bc7 100644 --- a/deploy/cert-manager-webhook-netcup/values.yaml +++ b/deploy/cert-manager-webhook-netcup/values.yaml @@ -15,7 +15,7 @@ certManager: image: repository: elvino76/cert-manager-webhook-netcup - tag: 1.0.12 + tag: 1.0.13 # sha hash can be used to specify image version, instead of tag hash: "" pullPolicy: IfNotPresent