From e1a0d5acba2c0cc083af6ac2823d9cf068008453 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 22 Jul 2024 21:48:14 -0600 Subject: [PATCH] chore(deps): update uds common support dependencies (#179) Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: Wayne Starr Co-authored-by: Wayne Starr --- .github/actions/setup/action.yaml | 9 +++++---- .vscode/settings.json | 6 +++--- README.md | 8 ++++---- tasks/setup.yaml | 4 ++-- 4 files changed, 14 insertions(+), 13 deletions(-) diff --git a/.github/actions/setup/action.yaml b/.github/actions/setup/action.yaml index 9ea7b153..a067aa18 100644 --- a/.github/actions/setup/action.yaml +++ b/.github/actions/setup/action.yaml @@ -11,7 +11,7 @@ inputs: udsCliVersion: description: The uds-cli version to install # renovate: datasource=github-tags depName=defenseunicorns/uds-cli versioning=semver - default: 0.13.0 + default: 0.13.1 chainguardIdentity: description: ID for Chainguard Identity to assume @@ -20,7 +20,8 @@ runs: steps: - name: Install k3d shell: bash - run: curl -s https://raw.githubusercontent.com/k3d-io/k3d/main/install.sh | TAG=v5.6.3 bash + # renovate: datasource=github-tags depName=k3d-io/k3d versioning=semver + run: curl -s https://raw.githubusercontent.com/k3d-io/k3d/main/install.sh | TAG=v5.7.2 bash - name: Set UDS CLI Arch id: setUdsCliArch @@ -32,10 +33,10 @@ runs: run: curl -o /usr/local/bin/uds -L https://github.com/defenseunicorns/uds-cli/releases/download/v${{ inputs.udsCliVersion }}/uds-cli_v${{ inputs.udsCliVersion }}_Linux_${{steps.setUdsCliArch.outputs.ARCH}} && chmod +x /usr/local/bin/uds - name: Install Lula - uses: defenseunicorns/lula-action/setup@69144c85bc2122af8cbba8a494085fd1190ba38a + uses: defenseunicorns/lula-action/setup@939e0a3d3a5f72321245a040207152dced5238f2 with: # renovate: datasource=github-tags depName=defenseunicorns/lula versioning=semver-coerced - version: v0.4.2 + version: v0.4.3 - name: Iron Bank Login if: ${{ inputs.registry1Username != '' }} diff --git a/.vscode/settings.json b/.vscode/settings.json index 47cdc773..c97e0975 100644 --- a/.vscode/settings.json +++ b/.vscode/settings.json @@ -8,15 +8,15 @@ ] }, "yaml.schemas": { - "https://raw.githubusercontent.com/defenseunicorns/uds-cli/v0.13.0/uds.schema.json": [ + "https://raw.githubusercontent.com/defenseunicorns/uds-cli/v0.13.1/uds.schema.json": [ "uds-bundle.yaml" ], - "https://raw.githubusercontent.com/defenseunicorns/uds-cli/v0.13.0/tasks.schema.json": [ + "https://raw.githubusercontent.com/defenseunicorns/uds-cli/v0.13.1/tasks.schema.json": [ "tasks.yaml", "tasks/**/*.yaml", "src/**/validate.yaml" ], - "https://raw.githubusercontent.com/defenseunicorns/zarf/v0.36.0/zarf.schema.json": [ + "https://raw.githubusercontent.com/defenseunicorns/zarf/v0.36.1/zarf.schema.json": [ "zarf.yaml" ] }, diff --git a/README.md b/README.md index 04d8b5a9..4379fd80 100644 --- a/README.md +++ b/README.md @@ -15,10 +15,10 @@ Pinning to a specific tag of a task (rather than `main`) with renovate watching ## Supported Tool Versions -- UDS CLI: 0.13.0 -- UDS Core: 0.24.0 -- K3D: 5.7.1 -- Lula: 0.4.2 +- UDS CLI: 0.13.1 +- UDS Core: 0.24.1 +- K3D: 5.7.2 +- Lula: 0.4.3 NOTE: Zarf is not required for tasks in this repo, the vendored zarf (`uds zarf`) included with UDS CLI is used instead to prevent version mismatches. diff --git a/tasks/setup.yaml b/tasks/setup.yaml index 6a3c99c1..dc6a8280 100644 --- a/tasks/setup.yaml +++ b/tasks/setup.yaml @@ -4,7 +4,7 @@ tasks: version: description: The version of k3d-core-slim-dev to deploy # renovate: datasource=github-tags depName=defenseunicorns/uds-core versioning=semver - default: 0.24.0 + default: 0.24.1 insecure_keycloak_admin: description: Automatically set a keycloak admin username / password default: "true" @@ -17,7 +17,7 @@ tasks: version: description: The version of k3d-core-demo to deploy # renovate: datasource=github-tags depName=defenseunicorns/uds-core versioning=semver - default: 0.24.0 + default: 0.24.1 insecure_keycloak_admin: description: Automatically set a keycloak admin username / password default: "true"