panda-den / colorful-pandas

https://colorful-pandas.com
Other
0 stars 0 forks source link

Update Chartfile #248

Closed astronaut-panda[bot] closed 1 year ago

astronaut-panda[bot] commented 1 year ago

This PR contains the following updates:

Package Update Change
external-secrets patch 0.9.0 -> 0.9.1
kube-state-metrics (source) patch 5.8.1 -> 5.8.2

Release Notes

external-secrets/external-secrets (external-secrets) ### [`v0.9.1`](https://togithub.com/external-secrets/external-secrets/releases/tag/v0.9.1) [Compare Source](https://togithub.com/external-secrets/external-secrets/compare/v0.9.0...v0.9.1) Image: `ghcr.io/external-secrets/external-secrets:v0.9.1` Image: `ghcr.io/external-secrets/external-secrets:v0.9.1-ubi` Image: `ghcr.io/external-secrets/external-secrets:v0.9.1-ubi-boringssl` ##### What's Changed - fix: run helm release on release branch as well by [@​moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2444](https://togithub.com/external-secrets/external-secrets/pull/2444) - chore: bump helm chart by [@​moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2442](https://togithub.com/external-secrets/external-secrets/pull/2442) - Update docs/api/metrics.md by [@​shuheiktgw](https://togithub.com/shuheiktgw) in [https://github.com/external-secrets/external-secrets/pull/2445](https://togithub.com/external-secrets/external-secrets/pull/2445) - chore: update dependencies by [@​eso-service-account-app](https://togithub.com/eso-service-account-app) in [https://github.com/external-secrets/external-secrets/pull/2448](https://togithub.com/external-secrets/external-secrets/pull/2448) - fix Error exposing secret in the logs by [@​jordiprats](https://togithub.com/jordiprats) in [https://github.com/external-secrets/external-secrets/pull/2431](https://togithub.com/external-secrets/external-secrets/pull/2431) - Fix ClusterExternalSecret printcolumns by [@​shuheiktgw](https://togithub.com/shuheiktgw) in [https://github.com/external-secrets/external-secrets/pull/2451](https://togithub.com/external-secrets/external-secrets/pull/2451) - docs: refer to support table for deletionPolicy support by [@​moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2454](https://togithub.com/external-secrets/external-secrets/pull/2454) - Add more context to error handling for parsing certs in order for log format to display properly by [@​DusanNikolic11](https://togithub.com/DusanNikolic11) in [https://github.com/external-secrets/external-secrets/pull/2428](https://togithub.com/external-secrets/external-secrets/pull/2428) - Add IBM provider metadata to secret labels and/or annotations by [@​vsroy](https://togithub.com/vsroy) in [https://github.com/external-secrets/external-secrets/pull/2429](https://togithub.com/external-secrets/external-secrets/pull/2429) - feat: add [@​shuheiktgw](https://togithub.com/shuheiktgw) as maintainer :tada: by [@​moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2459](https://togithub.com/external-secrets/external-secrets/pull/2459) - fix: add delinea env vars for e2e tests by [@​moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2469](https://togithub.com/external-secrets/external-secrets/pull/2469) - chore: update dependencies by [@​eso-service-account-app](https://togithub.com/eso-service-account-app) in [https://github.com/external-secrets/external-secrets/pull/2463](https://togithub.com/external-secrets/external-secrets/pull/2463) - Remove unused values from helm chart by [@​alexanderwoehler](https://togithub.com/alexanderwoehler) in [https://github.com/external-secrets/external-secrets/pull/2470](https://togithub.com/external-secrets/external-secrets/pull/2470) - fix: vault deletionPolicy by [@​moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2455](https://togithub.com/external-secrets/external-secrets/pull/2455) - Add support for Delinea DevOps Secrets Vault by [@​michaelsauter](https://togithub.com/michaelsauter) in [https://github.com/external-secrets/external-secrets/pull/2415](https://togithub.com/external-secrets/external-secrets/pull/2415) - Update documentation to add CyberArk Conjur provider by [@​bnasslahsen](https://togithub.com/bnasslahsen) in [https://github.com/external-secrets/external-secrets/pull/2473](https://togithub.com/external-secrets/external-secrets/pull/2473) ##### New Contributors - [@​jordiprats](https://togithub.com/jordiprats) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2431](https://togithub.com/external-secrets/external-secrets/pull/2431) - [@​DusanNikolic11](https://togithub.com/DusanNikolic11) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2428](https://togithub.com/external-secrets/external-secrets/pull/2428) - [@​vsroy](https://togithub.com/vsroy) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2429](https://togithub.com/external-secrets/external-secrets/pull/2429) - [@​alexanderwoehler](https://togithub.com/alexanderwoehler) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2470](https://togithub.com/external-secrets/external-secrets/pull/2470) - [@​bnasslahsen](https://togithub.com/bnasslahsen) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2473](https://togithub.com/external-secrets/external-secrets/pull/2473) **Full Changelog**: https://github.com/external-secrets/external-secrets/compare/v0.9.0...v0.9.1
prometheus-community/helm-charts (kube-state-metrics) ### [`v5.8.2`](https://togithub.com/prometheus-community/helm-charts/releases/tag/kube-state-metrics-5.8.2) [Compare Source](https://togithub.com/prometheus-community/helm-charts/compare/kube-state-metrics-5.8.1...kube-state-metrics-5.8.2) Install kube-state-metrics to generate and expose cluster-level metrics

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.



This PR has been generated by Renovate Bot.

astronaut-panda[bot] commented 1 year ago

This pull request will change the compiled platform manifests as follows:

diff --git a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml
index d73fb97..131d909 100644
--- a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml
+++ b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml
@@ -30,15 +30,12 @@ spec:
   scope: Cluster
   versions:
   - additionalPrinterColumns:
-    - jsonPath: .spec.secretStoreRef.name
+    - jsonPath: .spec.externalSecretSpec.secretStoreRef.name
       name: Store
       type: string
-    - jsonPath: .spec.refreshInterval
+    - jsonPath: .spec.refreshTime
       name: Refresh Interval
       type: string
-    - jsonPath: .status.conditions[?(@.type=="Ready")].reason
-      name: Status
-      type: string
     - jsonPath: .status.conditions[?(@.type=="Ready")].status
       name: Ready
       type: string
diff --git a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml
index e04bd7c..7d835f7 100644
--- a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml
+++ b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml
@@ -2274,6 +2274,78 @@ spec:
                     - auth
                     - url
                     type: object
+                  delinea:
+                    description: Delinea DevOps Secrets Vault https://docs.delinea.com/online-help/products/devops-secrets-vault/current
+                    properties:
+                      clientId:
+                        description: ClientID is the non-secret part of the credential.
+                        properties:
+                          secretRef:
+                            description: SecretRef references a key in a secret that
+                              will be used as value.
+                            properties:
+                              key:
+                                description: The key of the entry in the Secret resource's
+                                  `data` field to be used. Some instances of this
+                                  field may be defaulted, in others it may be required.
+                                type: string
+                              name:
+                                description: The name of the Secret resource being
+                                  referred to.
+                                type: string
+                              namespace:
+                                description: Namespace of the resource being referred
+                                  to. Ignored if referent is not cluster-scoped. cluster-scoped
+                                  defaults to the namespace of the referent.
+                                type: string
+                            type: object
+                          value:
+                            description: Value can be specified directly to set a
+                              value without using a secret.
+                            type: string
+                        type: object
+                      clientSecret:
+                        description: ClientSecret is the secret part of the credential.
+                        properties:
+                          secretRef:
+                            description: SecretRef references a key in a secret that
+                              will be used as value.
+                            properties:
+                              key:
+                                description: The key of the entry in the Secret resource's
+                                  `data` field to be used. Some instances of this
+                                  field may be defaulted, in others it may be required.
+                                type: string
+                              name:
+                                description: The name of the Secret resource being
+                                  referred to.
+                                type: string
+                              namespace:
+                                description: Namespace of the resource being referred
+                                  to. Ignored if referent is not cluster-scoped. cluster-scoped
+                                  defaults to the namespace of the referent.
+                                type: string
+                            type: object
+                          value:
+                            description: Value can be specified directly to set a
+                              value without using a secret.
+                            type: string
+                        type: object
+                      tenant:
+                        description: Tenant is the chosen hostname / site name.
+                        type: string
+                      tld:
+                        description: TLD is based on the server location that was
+                          chosen during provisioning. If unset, defaults to "com".
+                        type: string
+                      urlTemplate:
+                        description: URLTemplate If unset, defaults to "https://%s.secretsvaultcloud.%s/v1/%s%s".
+                        type: string
+                    required:
+                    - clientId
+                    - clientSecret
+                    - tenant
+                    type: object
                   doppler:
                     description: Doppler configures this store to sync secrets using
                       the Doppler provider
diff --git a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-secretstores.external-secrets.io.yaml b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-secretstores.external-secrets.io.yaml
index e2cb161..c18e96a 100644
--- a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-secretstores.external-secrets.io.yaml
+++ b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-secretstores.external-secrets.io.yaml
@@ -2274,6 +2274,78 @@ spec:
                     - auth
                     - url
                     type: object
+                  delinea:
+                    description: Delinea DevOps Secrets Vault https://docs.delinea.com/online-help/products/devops-secrets-vault/current
+                    properties:
+                      clientId:
+                        description: ClientID is the non-secret part of the credential.
+                        properties:
+                          secretRef:
+                            description: SecretRef references a key in a secret that
+                              will be used as value.
+                            properties:
+                              key:
+                                description: The key of the entry in the Secret resource's
+                                  `data` field to be used. Some instances of this
+                                  field may be defaulted, in others it may be required.
+                                type: string
+                              name:
+                                description: The name of the Secret resource being
+                                  referred to.
+                                type: string
+                              namespace:
+                                description: Namespace of the resource being referred
+                                  to. Ignored if referent is not cluster-scoped. cluster-scoped
+                                  defaults to the namespace of the referent.
+                                type: string
+                            type: object
+                          value:
+                            description: Value can be specified directly to set a
+                              value without using a secret.
+                            type: string
+                        type: object
+                      clientSecret:
+                        description: ClientSecret is the secret part of the credential.
+                        properties:
+                          secretRef:
+                            description: SecretRef references a key in a secret that
+                              will be used as value.
+                            properties:
+                              key:
+                                description: The key of the entry in the Secret resource's
+                                  `data` field to be used. Some instances of this
+                                  field may be defaulted, in others it may be required.
+                                type: string
+                              name:
+                                description: The name of the Secret resource being
+                                  referred to.
+                                type: string
+                              namespace:
+                                description: Namespace of the resource being referred
+                                  to. Ignored if referent is not cluster-scoped. cluster-scoped
+                                  defaults to the namespace of the referent.
+                                type: string
+                            type: object
+                          value:
+                            description: Value can be specified directly to set a
+                              value without using a secret.
+                            type: string
+                        type: object
+                      tenant:
+                        description: Tenant is the chosen hostname / site name.
+                        type: string
+                      tld:
+                        description: TLD is based on the server location that was
+                          chosen during provisioning. If unset, defaults to "com".
+                        type: string
+                      urlTemplate:
+                        description: URLTemplate If unset, defaults to "https://%s.secretsvaultcloud.%s/v1/%s%s".
+                        type: string
+                    required:
+                    - clientId
+                    - clientSecret
+                    - tenant
+                    type: object
                   doppler:
                     description: Doppler configures this store to sync secrets using
                       the Doppler provider
diff --git a/clusters/platform/compiled/apps-v1.Deployment-external-secrets-cert-controller.yaml b/clusters/platform/compiled/apps-v1.Deployment-external-secrets-cert-controller.yaml
index 6d8b744..fdfbe25 100644
--- a/clusters/platform/compiled/apps-v1.Deployment-external-secrets-cert-controller.yaml
+++ b/clusters/platform/compiled/apps-v1.Deployment-external-secrets-cert-controller.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets-cert-controller
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-cert-controller
   namespace: security
 spec:
@@ -31,7 +31,7 @@ spec:
         - --service-namespace=security
         - --secret-name=external-secrets-webhook
         - --secret-namespace=security
-        image: ghcr.io/external-secrets/external-secrets:v0.9.0
+        image: ghcr.io/external-secrets/external-secrets:v0.9.1
         imagePullPolicy: IfNotPresent
         name: cert-controller
         ports:
diff --git a/clusters/platform/compiled/apps-v1.Deployment-external-secrets-webhook.yaml b/clusters/platform/compiled/apps-v1.Deployment-external-secrets-webhook.yaml
index cf69e19..715b97f 100644
--- a/clusters/platform/compiled/apps-v1.Deployment-external-secrets-webhook.yaml
+++ b/clusters/platform/compiled/apps-v1.Deployment-external-secrets-webhook.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets-webhook
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-webhook
   namespace: security
 spec:
@@ -32,7 +32,7 @@ spec:
         - --check-interval=5m
         - --metrics-addr=:8080
         - --healthz-addr=:8081
-        image: ghcr.io/external-secrets/external-secrets:v0.9.0
+        image: ghcr.io/external-secrets/external-secrets:v0.9.1
         imagePullPolicy: IfNotPresent
         name: webhook
         ports:
diff --git a/clusters/platform/compiled/apps-v1.Deployment-external-secrets.yaml b/clusters/platform/compiled/apps-v1.Deployment-external-secrets.yaml
index 4ebf256..55acf2e 100644
--- a/clusters/platform/compiled/apps-v1.Deployment-external-secrets.yaml
+++ b/clusters/platform/compiled/apps-v1.Deployment-external-secrets.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets
   namespace: security
 spec:
@@ -26,7 +26,7 @@ spec:
       containers:
       - args:
         - --concurrent=1
-        image: ghcr.io/external-secrets/external-secrets:v0.9.0
+        image: ghcr.io/external-secrets/external-secrets:v0.9.1
         imagePullPolicy: IfNotPresent
         name: external-secrets
         ports:
diff --git a/clusters/platform/compiled/apps-v1.Deployment-kube-state-metrics.yaml b/clusters/platform/compiled/apps-v1.Deployment-kube-state-metrics.yaml
index 83085ee..10d968e 100644
--- a/clusters/platform/compiled/apps-v1.Deployment-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/apps-v1.Deployment-kube-state-metrics.yaml
@@ -8,7 +8,7 @@ metadata:
     app.kubernetes.io/name: kube-state-metrics
     app.kubernetes.io/part-of: kube-state-metrics
     app.kubernetes.io/version: 2.9.2
-    helm.sh/chart: kube-state-metrics-5.8.1
+    helm.sh/chart: kube-state-metrics-5.8.2
   name: kube-state-metrics
   namespace: monitoring
 spec:
@@ -26,7 +26,7 @@ spec:
         app.kubernetes.io/name: kube-state-metrics
         app.kubernetes.io/part-of: kube-state-metrics
         app.kubernetes.io/version: 2.9.2
-        helm.sh/chart: kube-state-metrics-5.8.1
+        helm.sh/chart: kube-state-metrics-5.8.2
     spec:
       containers:
       - args:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-cert-controller.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-cert-controller.yaml
index aba2c89..d595e5b 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-cert-controller.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-cert-controller.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets-cert-controller
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-cert-controller
 rules:
 - apiGroups:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-controller.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-controller.yaml
index c071cfb..a15291f 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-controller.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-controller.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-controller
 rules:
 - apiGroups:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-edit.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-edit.yaml
index cb09558..7fa7518 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-edit.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-edit.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
   name: external-secrets-edit
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-servicebindings.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-servicebindings.yaml
index 228b9a3..866de68 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-servicebindings.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-servicebindings.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
     servicebinding.io/controller: "true"
   name: external-secrets-servicebindings
 rules:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-view.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-view.yaml
index 25e0274..1b31b72 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-view.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-view.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-view: "true"
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-kube-state-metrics.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-kube-state-metrics.yaml
index 78e6553..478bb4f 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-kube-state-metrics.yaml
@@ -8,7 +8,7 @@ metadata:
     app.kubernetes.io/name: kube-state-metrics
     app.kubernetes.io/part-of: kube-state-metrics
     app.kubernetes.io/version: 2.9.2
-    helm.sh/chart: kube-state-metrics-5.8.1
+    helm.sh/chart: kube-state-metrics-5.8.2
   name: kube-state-metrics
 rules:
 - apiGroups:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-cert-controller.yaml
index 366981f..801ed8c 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-cert-controller.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-cert-controller.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets-cert-controller
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-cert-controller
 roleRef:
   apiGroup: rbac.authorization.k8s.io
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-controller.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-controller.yaml
index 948ca28..76f036d 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-controller.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-controller.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-controller
 roleRef:
   apiGroup: rbac.authorization.k8s.io
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-kube-state-metrics.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-kube-state-metrics.yaml
index 2622e76..4cff0a4 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-kube-state-metrics.yaml
@@ -8,7 +8,7 @@ metadata:
     app.kubernetes.io/name: kube-state-metrics
     app.kubernetes.io/part-of: kube-state-metrics
     app.kubernetes.io/version: 2.9.2
-    helm.sh/chart: kube-state-metrics-5.8.1
+    helm.sh/chart: kube-state-metrics-5.8.2
   name: kube-state-metrics
 roleRef:
   apiGroup: rbac.authorization.k8s.io
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.Role-external-secrets-leaderelection.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.Role-external-secrets-leaderelection.yaml
index 895377f..f10113f 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.Role-external-secrets-leaderelection.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.Role-external-secrets-leaderelection.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-leaderelection
   namespace: security
 rules:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.RoleBinding-external-secrets-leaderelection.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.RoleBinding-external-secrets-leaderelection.yaml
index 618a3a7..e69f6a4 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.RoleBinding-external-secrets-leaderelection.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.RoleBinding-external-secrets-leaderelection.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-leaderelection
   namespace: security
 roleRef:
diff --git a/clusters/platform/compiled/v1.Secret-external-secrets-webhook.yaml b/clusters/platform/compiled/v1.Secret-external-secrets-webhook.yaml
index b64f3a6..1b2e7ed 100644
--- a/clusters/platform/compiled/v1.Secret-external-secrets-webhook.yaml
+++ b/clusters/platform/compiled/v1.Secret-external-secrets-webhook.yaml
@@ -5,8 +5,8 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets-webhook
-    app.kubernetes.io/version: v0.9.0
+    app.kubernetes.io/version: v0.9.1
     external-secrets.io/component: webhook
-    helm.sh/chart: external-secrets-0.9.0
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-webhook
   namespace: security
diff --git a/clusters/platform/compiled/v1.Service-external-secrets-webhook.yaml b/clusters/platform/compiled/v1.Service-external-secrets-webhook.yaml
index c35f3a2..92e1d24 100644
--- a/clusters/platform/compiled/v1.Service-external-secrets-webhook.yaml
+++ b/clusters/platform/compiled/v1.Service-external-secrets-webhook.yaml
@@ -5,9 +5,9 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets-webhook
-    app.kubernetes.io/version: v0.9.0
+    app.kubernetes.io/version: v0.9.1
     external-secrets.io/component: webhook
-    helm.sh/chart: external-secrets-0.9.0
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-webhook
   namespace: security
 spec:
diff --git a/clusters/platform/compiled/v1.Service-kube-state-metrics.yaml b/clusters/platform/compiled/v1.Service-kube-state-metrics.yaml
index 86a752e..e35a3b5 100644
--- a/clusters/platform/compiled/v1.Service-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/v1.Service-kube-state-metrics.yaml
@@ -10,7 +10,7 @@ metadata:
     app.kubernetes.io/name: kube-state-metrics
     app.kubernetes.io/part-of: kube-state-metrics
     app.kubernetes.io/version: 2.9.2
-    helm.sh/chart: kube-state-metrics-5.8.1
+    helm.sh/chart: kube-state-metrics-5.8.2
   name: kube-state-metrics
   namespace: monitoring
 spec:
diff --git a/clusters/platform/compiled/v1.ServiceAccount-external-secrets-cert-controller.yaml b/clusters/platform/compiled/v1.ServiceAccount-external-secrets-cert-controller.yaml
index e6b64d5..5a12553 100644
--- a/clusters/platform/compiled/v1.ServiceAccount-external-secrets-cert-controller.yaml
+++ b/clusters/platform/compiled/v1.ServiceAccount-external-secrets-cert-controller.yaml
@@ -5,7 +5,7 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets-cert-controller
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-cert-controller
   namespace: security
diff --git a/clusters/platform/compiled/v1.ServiceAccount-external-secrets-webhook.yaml b/clusters/platform/compiled/v1.ServiceAccount-external-secrets-webhook.yaml
index 2ea1614..9867aa4 100644
--- a/clusters/platform/compiled/v1.ServiceAccount-external-secrets-webhook.yaml
+++ b/clusters/platform/compiled/v1.ServiceAccount-external-secrets-webhook.yaml
@@ -5,7 +5,7 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets-webhook
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets-webhook
   namespace: security
diff --git a/clusters/platform/compiled/v1.ServiceAccount-external-secrets.yaml b/clusters/platform/compiled/v1.ServiceAccount-external-secrets.yaml
index 1cc9b91..7e52eb7 100644
--- a/clusters/platform/compiled/v1.ServiceAccount-external-secrets.yaml
+++ b/clusters/platform/compiled/v1.ServiceAccount-external-secrets.yaml
@@ -5,7 +5,7 @@ metadata:
     app.kubernetes.io/instance: external-secrets
     app.kubernetes.io/managed-by: Helmraiser
     app.kubernetes.io/name: external-secrets
-    app.kubernetes.io/version: v0.9.0
-    helm.sh/chart: external-secrets-0.9.0
+    app.kubernetes.io/version: v0.9.1
+    helm.sh/chart: external-secrets-0.9.1
   name: external-secrets
   namespace: security
diff --git a/clusters/platform/compiled/v1.ServiceAccount-kube-state-metrics.yaml b/clusters/platform/compiled/v1.ServiceAccount-kube-state-metrics.yaml
index 0e3b541..0f37441 100644
--- a/clusters/platform/compiled/v1.ServiceAccount-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/v1.ServiceAccount-kube-state-metrics.yaml
@@ -9,6 +9,6 @@ metadata:
     app.kubernetes.io/name: kube-state-metrics
     app.kubernetes.io/part-of: kube-state-metrics
     app.kubernetes.io/version: 2.9.2
-    helm.sh/chart: kube-state-metrics-5.8.1
+    helm.sh/chart: kube-state-metrics-5.8.2
   name: kube-state-metrics
   namespace: monitoring