Closed astronaut-panda[bot] closed 1 year ago
diff --git a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml
index d73fb97..131d909 100644
--- a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml
+++ b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clusterexternalsecrets.external-secrets.io.yaml
@@ -30,15 +30,12 @@ spec:
scope: Cluster
versions:
- additionalPrinterColumns:
- - jsonPath: .spec.secretStoreRef.name
+ - jsonPath: .spec.externalSecretSpec.secretStoreRef.name
name: Store
type: string
- - jsonPath: .spec.refreshInterval
+ - jsonPath: .spec.refreshTime
name: Refresh Interval
type: string
- - jsonPath: .status.conditions[?(@.type=="Ready")].reason
- name: Status
- type: string
- jsonPath: .status.conditions[?(@.type=="Ready")].status
name: Ready
type: string
diff --git a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml
index e04bd7c..7d835f7 100644
--- a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml
+++ b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-clustersecretstores.external-secrets.io.yaml
@@ -2274,6 +2274,78 @@ spec:
- auth
- url
type: object
+ delinea:
+ description: Delinea DevOps Secrets Vault https://docs.delinea.com/online-help/products/devops-secrets-vault/current
+ properties:
+ clientId:
+ description: ClientID is the non-secret part of the credential.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: The key of the entry in the Secret resource's
+ `data` field to be used. Some instances of this
+ field may be defaulted, in others it may be required.
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ type: string
+ namespace:
+ description: Namespace of the resource being referred
+ to. Ignored if referent is not cluster-scoped. cluster-scoped
+ defaults to the namespace of the referent.
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ clientSecret:
+ description: ClientSecret is the secret part of the credential.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: The key of the entry in the Secret resource's
+ `data` field to be used. Some instances of this
+ field may be defaulted, in others it may be required.
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ type: string
+ namespace:
+ description: Namespace of the resource being referred
+ to. Ignored if referent is not cluster-scoped. cluster-scoped
+ defaults to the namespace of the referent.
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ tenant:
+ description: Tenant is the chosen hostname / site name.
+ type: string
+ tld:
+ description: TLD is based on the server location that was
+ chosen during provisioning. If unset, defaults to "com".
+ type: string
+ urlTemplate:
+ description: URLTemplate If unset, defaults to "https://%s.secretsvaultcloud.%s/v1/%s%s".
+ type: string
+ required:
+ - clientId
+ - clientSecret
+ - tenant
+ type: object
doppler:
description: Doppler configures this store to sync secrets using
the Doppler provider
diff --git a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-secretstores.external-secrets.io.yaml b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-secretstores.external-secrets.io.yaml
index e2cb161..c18e96a 100644
--- a/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-secretstores.external-secrets.io.yaml
+++ b/clusters/platform/compiled/apiextensions.k8s.io-v1.CustomResourceDefinition-secretstores.external-secrets.io.yaml
@@ -2274,6 +2274,78 @@ spec:
- auth
- url
type: object
+ delinea:
+ description: Delinea DevOps Secrets Vault https://docs.delinea.com/online-help/products/devops-secrets-vault/current
+ properties:
+ clientId:
+ description: ClientID is the non-secret part of the credential.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: The key of the entry in the Secret resource's
+ `data` field to be used. Some instances of this
+ field may be defaulted, in others it may be required.
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ type: string
+ namespace:
+ description: Namespace of the resource being referred
+ to. Ignored if referent is not cluster-scoped. cluster-scoped
+ defaults to the namespace of the referent.
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ clientSecret:
+ description: ClientSecret is the secret part of the credential.
+ properties:
+ secretRef:
+ description: SecretRef references a key in a secret that
+ will be used as value.
+ properties:
+ key:
+ description: The key of the entry in the Secret resource's
+ `data` field to be used. Some instances of this
+ field may be defaulted, in others it may be required.
+ type: string
+ name:
+ description: The name of the Secret resource being
+ referred to.
+ type: string
+ namespace:
+ description: Namespace of the resource being referred
+ to. Ignored if referent is not cluster-scoped. cluster-scoped
+ defaults to the namespace of the referent.
+ type: string
+ type: object
+ value:
+ description: Value can be specified directly to set a
+ value without using a secret.
+ type: string
+ type: object
+ tenant:
+ description: Tenant is the chosen hostname / site name.
+ type: string
+ tld:
+ description: TLD is based on the server location that was
+ chosen during provisioning. If unset, defaults to "com".
+ type: string
+ urlTemplate:
+ description: URLTemplate If unset, defaults to "https://%s.secretsvaultcloud.%s/v1/%s%s".
+ type: string
+ required:
+ - clientId
+ - clientSecret
+ - tenant
+ type: object
doppler:
description: Doppler configures this store to sync secrets using
the Doppler provider
diff --git a/clusters/platform/compiled/apps-v1.Deployment-external-secrets-cert-controller.yaml b/clusters/platform/compiled/apps-v1.Deployment-external-secrets-cert-controller.yaml
index 6d8b744..fdfbe25 100644
--- a/clusters/platform/compiled/apps-v1.Deployment-external-secrets-cert-controller.yaml
+++ b/clusters/platform/compiled/apps-v1.Deployment-external-secrets-cert-controller.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets-cert-controller
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-cert-controller
namespace: security
spec:
@@ -31,7 +31,7 @@ spec:
- --service-namespace=security
- --secret-name=external-secrets-webhook
- --secret-namespace=security
- image: ghcr.io/external-secrets/external-secrets:v0.9.0
+ image: ghcr.io/external-secrets/external-secrets:v0.9.1
imagePullPolicy: IfNotPresent
name: cert-controller
ports:
diff --git a/clusters/platform/compiled/apps-v1.Deployment-external-secrets-webhook.yaml b/clusters/platform/compiled/apps-v1.Deployment-external-secrets-webhook.yaml
index cf69e19..715b97f 100644
--- a/clusters/platform/compiled/apps-v1.Deployment-external-secrets-webhook.yaml
+++ b/clusters/platform/compiled/apps-v1.Deployment-external-secrets-webhook.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets-webhook
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-webhook
namespace: security
spec:
@@ -32,7 +32,7 @@ spec:
- --check-interval=5m
- --metrics-addr=:8080
- --healthz-addr=:8081
- image: ghcr.io/external-secrets/external-secrets:v0.9.0
+ image: ghcr.io/external-secrets/external-secrets:v0.9.1
imagePullPolicy: IfNotPresent
name: webhook
ports:
diff --git a/clusters/platform/compiled/apps-v1.Deployment-external-secrets.yaml b/clusters/platform/compiled/apps-v1.Deployment-external-secrets.yaml
index 4ebf256..55acf2e 100644
--- a/clusters/platform/compiled/apps-v1.Deployment-external-secrets.yaml
+++ b/clusters/platform/compiled/apps-v1.Deployment-external-secrets.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets
namespace: security
spec:
@@ -26,7 +26,7 @@ spec:
containers:
- args:
- --concurrent=1
- image: ghcr.io/external-secrets/external-secrets:v0.9.0
+ image: ghcr.io/external-secrets/external-secrets:v0.9.1
imagePullPolicy: IfNotPresent
name: external-secrets
ports:
diff --git a/clusters/platform/compiled/apps-v1.Deployment-kube-state-metrics.yaml b/clusters/platform/compiled/apps-v1.Deployment-kube-state-metrics.yaml
index 83085ee..10d968e 100644
--- a/clusters/platform/compiled/apps-v1.Deployment-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/apps-v1.Deployment-kube-state-metrics.yaml
@@ -8,7 +8,7 @@ metadata:
app.kubernetes.io/name: kube-state-metrics
app.kubernetes.io/part-of: kube-state-metrics
app.kubernetes.io/version: 2.9.2
- helm.sh/chart: kube-state-metrics-5.8.1
+ helm.sh/chart: kube-state-metrics-5.8.2
name: kube-state-metrics
namespace: monitoring
spec:
@@ -26,7 +26,7 @@ spec:
app.kubernetes.io/name: kube-state-metrics
app.kubernetes.io/part-of: kube-state-metrics
app.kubernetes.io/version: 2.9.2
- helm.sh/chart: kube-state-metrics-5.8.1
+ helm.sh/chart: kube-state-metrics-5.8.2
spec:
containers:
- args:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-cert-controller.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-cert-controller.yaml
index aba2c89..d595e5b 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-cert-controller.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-cert-controller.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets-cert-controller
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-cert-controller
rules:
- apiGroups:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-controller.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-controller.yaml
index c071cfb..a15291f 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-controller.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-controller.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-controller
rules:
- apiGroups:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-edit.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-edit.yaml
index cb09558..7fa7518 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-edit.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-edit.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
name: external-secrets-edit
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-servicebindings.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-servicebindings.yaml
index 228b9a3..866de68 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-servicebindings.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-servicebindings.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
servicebinding.io/controller: "true"
name: external-secrets-servicebindings
rules:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-view.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-view.yaml
index 25e0274..1b31b72 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-view.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-external-secrets-view.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-view: "true"
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-kube-state-metrics.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-kube-state-metrics.yaml
index 78e6553..478bb4f 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRole-kube-state-metrics.yaml
@@ -8,7 +8,7 @@ metadata:
app.kubernetes.io/name: kube-state-metrics
app.kubernetes.io/part-of: kube-state-metrics
app.kubernetes.io/version: 2.9.2
- helm.sh/chart: kube-state-metrics-5.8.1
+ helm.sh/chart: kube-state-metrics-5.8.2
name: kube-state-metrics
rules:
- apiGroups:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-cert-controller.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-cert-controller.yaml
index 366981f..801ed8c 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-cert-controller.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-cert-controller.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets-cert-controller
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-cert-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-controller.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-controller.yaml
index 948ca28..76f036d 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-controller.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-external-secrets-controller.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-kube-state-metrics.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-kube-state-metrics.yaml
index 2622e76..4cff0a4 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.ClusterRoleBinding-kube-state-metrics.yaml
@@ -8,7 +8,7 @@ metadata:
app.kubernetes.io/name: kube-state-metrics
app.kubernetes.io/part-of: kube-state-metrics
app.kubernetes.io/version: 2.9.2
- helm.sh/chart: kube-state-metrics-5.8.1
+ helm.sh/chart: kube-state-metrics-5.8.2
name: kube-state-metrics
roleRef:
apiGroup: rbac.authorization.k8s.io
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.Role-external-secrets-leaderelection.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.Role-external-secrets-leaderelection.yaml
index 895377f..f10113f 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.Role-external-secrets-leaderelection.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.Role-external-secrets-leaderelection.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-leaderelection
namespace: security
rules:
diff --git a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.RoleBinding-external-secrets-leaderelection.yaml b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.RoleBinding-external-secrets-leaderelection.yaml
index 618a3a7..e69f6a4 100644
--- a/clusters/platform/compiled/rbac.authorization.k8s.io-v1.RoleBinding-external-secrets-leaderelection.yaml
+++ b/clusters/platform/compiled/rbac.authorization.k8s.io-v1.RoleBinding-external-secrets-leaderelection.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-leaderelection
namespace: security
roleRef:
diff --git a/clusters/platform/compiled/v1.Secret-external-secrets-webhook.yaml b/clusters/platform/compiled/v1.Secret-external-secrets-webhook.yaml
index b64f3a6..1b2e7ed 100644
--- a/clusters/platform/compiled/v1.Secret-external-secrets-webhook.yaml
+++ b/clusters/platform/compiled/v1.Secret-external-secrets-webhook.yaml
@@ -5,8 +5,8 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets-webhook
- app.kubernetes.io/version: v0.9.0
+ app.kubernetes.io/version: v0.9.1
external-secrets.io/component: webhook
- helm.sh/chart: external-secrets-0.9.0
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-webhook
namespace: security
diff --git a/clusters/platform/compiled/v1.Service-external-secrets-webhook.yaml b/clusters/platform/compiled/v1.Service-external-secrets-webhook.yaml
index c35f3a2..92e1d24 100644
--- a/clusters/platform/compiled/v1.Service-external-secrets-webhook.yaml
+++ b/clusters/platform/compiled/v1.Service-external-secrets-webhook.yaml
@@ -5,9 +5,9 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets-webhook
- app.kubernetes.io/version: v0.9.0
+ app.kubernetes.io/version: v0.9.1
external-secrets.io/component: webhook
- helm.sh/chart: external-secrets-0.9.0
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-webhook
namespace: security
spec:
diff --git a/clusters/platform/compiled/v1.Service-kube-state-metrics.yaml b/clusters/platform/compiled/v1.Service-kube-state-metrics.yaml
index 86a752e..e35a3b5 100644
--- a/clusters/platform/compiled/v1.Service-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/v1.Service-kube-state-metrics.yaml
@@ -10,7 +10,7 @@ metadata:
app.kubernetes.io/name: kube-state-metrics
app.kubernetes.io/part-of: kube-state-metrics
app.kubernetes.io/version: 2.9.2
- helm.sh/chart: kube-state-metrics-5.8.1
+ helm.sh/chart: kube-state-metrics-5.8.2
name: kube-state-metrics
namespace: monitoring
spec:
diff --git a/clusters/platform/compiled/v1.ServiceAccount-external-secrets-cert-controller.yaml b/clusters/platform/compiled/v1.ServiceAccount-external-secrets-cert-controller.yaml
index e6b64d5..5a12553 100644
--- a/clusters/platform/compiled/v1.ServiceAccount-external-secrets-cert-controller.yaml
+++ b/clusters/platform/compiled/v1.ServiceAccount-external-secrets-cert-controller.yaml
@@ -5,7 +5,7 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets-cert-controller
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-cert-controller
namespace: security
diff --git a/clusters/platform/compiled/v1.ServiceAccount-external-secrets-webhook.yaml b/clusters/platform/compiled/v1.ServiceAccount-external-secrets-webhook.yaml
index 2ea1614..9867aa4 100644
--- a/clusters/platform/compiled/v1.ServiceAccount-external-secrets-webhook.yaml
+++ b/clusters/platform/compiled/v1.ServiceAccount-external-secrets-webhook.yaml
@@ -5,7 +5,7 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets-webhook
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets-webhook
namespace: security
diff --git a/clusters/platform/compiled/v1.ServiceAccount-external-secrets.yaml b/clusters/platform/compiled/v1.ServiceAccount-external-secrets.yaml
index 1cc9b91..7e52eb7 100644
--- a/clusters/platform/compiled/v1.ServiceAccount-external-secrets.yaml
+++ b/clusters/platform/compiled/v1.ServiceAccount-external-secrets.yaml
@@ -5,7 +5,7 @@ metadata:
app.kubernetes.io/instance: external-secrets
app.kubernetes.io/managed-by: Helmraiser
app.kubernetes.io/name: external-secrets
- app.kubernetes.io/version: v0.9.0
- helm.sh/chart: external-secrets-0.9.0
+ app.kubernetes.io/version: v0.9.1
+ helm.sh/chart: external-secrets-0.9.1
name: external-secrets
namespace: security
diff --git a/clusters/platform/compiled/v1.ServiceAccount-kube-state-metrics.yaml b/clusters/platform/compiled/v1.ServiceAccount-kube-state-metrics.yaml
index 0e3b541..0f37441 100644
--- a/clusters/platform/compiled/v1.ServiceAccount-kube-state-metrics.yaml
+++ b/clusters/platform/compiled/v1.ServiceAccount-kube-state-metrics.yaml
@@ -9,6 +9,6 @@ metadata:
app.kubernetes.io/name: kube-state-metrics
app.kubernetes.io/part-of: kube-state-metrics
app.kubernetes.io/version: 2.9.2
- helm.sh/chart: kube-state-metrics-5.8.1
+ helm.sh/chart: kube-state-metrics-5.8.2
name: kube-state-metrics
namespace: monitoring
This PR contains the following updates:
0.9.0
->0.9.1
5.8.1
->5.8.2
Release Notes
external-secrets/external-secrets (external-secrets)
### [`v0.9.1`](https://togithub.com/external-secrets/external-secrets/releases/tag/v0.9.1) [Compare Source](https://togithub.com/external-secrets/external-secrets/compare/v0.9.0...v0.9.1) Image: `ghcr.io/external-secrets/external-secrets:v0.9.1` Image: `ghcr.io/external-secrets/external-secrets:v0.9.1-ubi` Image: `ghcr.io/external-secrets/external-secrets:v0.9.1-ubi-boringssl` ##### What's Changed - fix: run helm release on release branch as well by [@moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2444](https://togithub.com/external-secrets/external-secrets/pull/2444) - chore: bump helm chart by [@moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2442](https://togithub.com/external-secrets/external-secrets/pull/2442) - Update docs/api/metrics.md by [@shuheiktgw](https://togithub.com/shuheiktgw) in [https://github.com/external-secrets/external-secrets/pull/2445](https://togithub.com/external-secrets/external-secrets/pull/2445) - chore: update dependencies by [@eso-service-account-app](https://togithub.com/eso-service-account-app) in [https://github.com/external-secrets/external-secrets/pull/2448](https://togithub.com/external-secrets/external-secrets/pull/2448) - fix Error exposing secret in the logs by [@jordiprats](https://togithub.com/jordiprats) in [https://github.com/external-secrets/external-secrets/pull/2431](https://togithub.com/external-secrets/external-secrets/pull/2431) - Fix ClusterExternalSecret printcolumns by [@shuheiktgw](https://togithub.com/shuheiktgw) in [https://github.com/external-secrets/external-secrets/pull/2451](https://togithub.com/external-secrets/external-secrets/pull/2451) - docs: refer to support table for deletionPolicy support by [@moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2454](https://togithub.com/external-secrets/external-secrets/pull/2454) - Add more context to error handling for parsing certs in order for log format to display properly by [@DusanNikolic11](https://togithub.com/DusanNikolic11) in [https://github.com/external-secrets/external-secrets/pull/2428](https://togithub.com/external-secrets/external-secrets/pull/2428) - Add IBM provider metadata to secret labels and/or annotations by [@vsroy](https://togithub.com/vsroy) in [https://github.com/external-secrets/external-secrets/pull/2429](https://togithub.com/external-secrets/external-secrets/pull/2429) - feat: add [@shuheiktgw](https://togithub.com/shuheiktgw) as maintainer :tada: by [@moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2459](https://togithub.com/external-secrets/external-secrets/pull/2459) - fix: add delinea env vars for e2e tests by [@moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2469](https://togithub.com/external-secrets/external-secrets/pull/2469) - chore: update dependencies by [@eso-service-account-app](https://togithub.com/eso-service-account-app) in [https://github.com/external-secrets/external-secrets/pull/2463](https://togithub.com/external-secrets/external-secrets/pull/2463) - Remove unused values from helm chart by [@alexanderwoehler](https://togithub.com/alexanderwoehler) in [https://github.com/external-secrets/external-secrets/pull/2470](https://togithub.com/external-secrets/external-secrets/pull/2470) - fix: vault deletionPolicy by [@moolen](https://togithub.com/moolen) in [https://github.com/external-secrets/external-secrets/pull/2455](https://togithub.com/external-secrets/external-secrets/pull/2455) - Add support for Delinea DevOps Secrets Vault by [@michaelsauter](https://togithub.com/michaelsauter) in [https://github.com/external-secrets/external-secrets/pull/2415](https://togithub.com/external-secrets/external-secrets/pull/2415) - Update documentation to add CyberArk Conjur provider by [@bnasslahsen](https://togithub.com/bnasslahsen) in [https://github.com/external-secrets/external-secrets/pull/2473](https://togithub.com/external-secrets/external-secrets/pull/2473) ##### New Contributors - [@jordiprats](https://togithub.com/jordiprats) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2431](https://togithub.com/external-secrets/external-secrets/pull/2431) - [@DusanNikolic11](https://togithub.com/DusanNikolic11) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2428](https://togithub.com/external-secrets/external-secrets/pull/2428) - [@vsroy](https://togithub.com/vsroy) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2429](https://togithub.com/external-secrets/external-secrets/pull/2429) - [@alexanderwoehler](https://togithub.com/alexanderwoehler) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2470](https://togithub.com/external-secrets/external-secrets/pull/2470) - [@bnasslahsen](https://togithub.com/bnasslahsen) made their first contribution in [https://github.com/external-secrets/external-secrets/pull/2473](https://togithub.com/external-secrets/external-secrets/pull/2473) **Full Changelog**: https://github.com/external-secrets/external-secrets/compare/v0.9.0...v0.9.1prometheus-community/helm-charts (kube-state-metrics)
### [`v5.8.2`](https://togithub.com/prometheus-community/helm-charts/releases/tag/kube-state-metrics-5.8.2) [Compare Source](https://togithub.com/prometheus-community/helm-charts/compare/kube-state-metrics-5.8.1...kube-state-metrics-5.8.2) Install kube-state-metrics to generate and expose cluster-level metricsConfiguration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.