Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kubeseal for openSUSE:Factory 
checked in at 2023-02-16 16:55:55
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kubeseal (Old)
 and      /work/SRC/openSUSE:Factory/.kubeseal.new.22824 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kubeseal"

Thu Feb 16 16:55:55 2023 rev:13 rq:1065995 version:0.19.5

Changes:
--------
--- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes        2023-01-17 
17:35:31.717255856 +0100
+++ /work/SRC/openSUSE:Factory/.kubeseal.new.22824/kubeseal.changes     
2023-02-16 16:56:08.530770243 +0100
@@ -1,0 +2,19 @@
+Wed Feb 15 16:42:50 UTC 2023 - ka...@b1-systems.de
+
+- Update to version 0.19.5:
+  * Release version v0.19.5 (#1109)
+  * Bump golang.org/x/crypto from 0.5.0 to 0.6.0 (#1108)
+  * Include OpenShift VIB (#1107)
+  * Add workflow for Carvel package release (#1104)
+  * Bump k8s.io/code-generator from 0.26.0 to 0.26.1 (#1102)
+  * Bump github.com/onsi/gomega from 1.25.0 to 1.26.0 (#1103)
+  * Bump github.com/onsi/ginkgo/v2 from 2.7.0 to 2.8.0 (#1101)
+  * Add carvel package (#1100)
+  * Generate values table (#1099)
+  * Bump k8s.io/client-go from 0.26.0 to 0.26.1 (#1096)
+  * Bump github.com/onsi/gomega from 1.24.2 to 1.25.0 (#1095)
+  * Bump k8s.io/klog/v2 from 2.80.1 to 2.90.0 (#1094)
+  * Bump k8s.io/apimachinery from 0.26.0 to 0.26.1 (#1093)
+  * Release Helm Chart 2.7.3 to use release 0.19.4 (#1089)
+
+-------------------------------------------------------------------

Old:
----
  sealed-secrets-0.19.4.tar.gz

New:
----
  sealed-secrets-0.19.5.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ kubeseal.spec ++++++
--- /var/tmp/diff_new_pack.XQ2UHX/_old  2023-02-16 16:56:09.398773711 +0100
+++ /var/tmp/diff_new_pack.XQ2UHX/_new  2023-02-16 16:56:09.406773743 +0100
@@ -21,7 +21,7 @@
 %define archive_name sealed-secrets
 
 Name:           kubeseal
-Version:        0.19.4
+Version:        0.19.5
 Release:        0
 Summary:        CLI for encrypting secrets to SealedSecrets
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.XQ2UHX/_old  2023-02-16 16:56:09.446773904 +0100
+++ /var/tmp/diff_new_pack.XQ2UHX/_new  2023-02-16 16:56:09.450773919 +0100
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/bitnami-labs/sealed-secrets</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.19.4</param>
+    <param name="revision">v0.19.5</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>
@@ -16,7 +16,7 @@
     <param name="compression">gz</param>
   </service>
   <service name="go_modules" mode="disabled">
-    <param name="archive">sealed-secrets-0.19.4.tar.gz</param>
+    <param name="archive">sealed-secrets-0.19.5.tar.gz</param>
   </service>
 </services>
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.XQ2UHX/_old  2023-02-16 16:56:09.482774047 +0100
+++ /var/tmp/diff_new_pack.XQ2UHX/_new  2023-02-16 16:56:09.486774063 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/bitnami-labs/sealed-secrets</param>
-              <param 
name="changesrevision">ebca01121cbbc8faf4d39043e1ac89f0b0dd5cd1</param></service></servicedata>
+              <param 
name="changesrevision">d74823e8258c0e1028023c3d80de46b553f8e27e</param></service></servicedata>
 (No newline at EOF)
 

++++++ sealed-secrets-0.19.4.tar.gz -> sealed-secrets-0.19.5.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.19.4/.github/workflows/helm-release.yaml 
new/sealed-secrets-0.19.5/.github/workflows/helm-release.yaml
--- old/sealed-secrets-0.19.4/.github/workflows/helm-release.yaml       
2023-01-16 13:33:53.000000000 +0100
+++ new/sealed-secrets-0.19.5/.github/workflows/helm-release.yaml       
2023-02-15 13:34:44.000000000 +0100
@@ -1,4 +1,4 @@
-name: Release Helm Chart
+name: Release Helm Chart and Carvel package
 
 on:
   push:
@@ -34,3 +34,47 @@
         env:
           CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}"
           CR_RELEASE_NAME_TEMPLATE: "helm-v{{ .Version }}"
+
+      - name: Install Carvel
+        uses: carvel-dev/setup-action@v1.3.0
+        with:
+          only: kbld, imgpkg
+          token: ${{ secrets.GITHUB_TOKEN }}
+
+      - name: Install yq
+        run: |
+          mkdir -p ~/bin
+          wget 
https://github.com/mikefarah/yq/releases/download/v4.30.8/yq_linux_amd64 -O 
~/bin/yq
+          chmod +x ~/bin/yq
+
+      - name: Get chart version
+        run: |
+          export PATH=~/bin:$PATH
+          echo "chart_version=$(yq .version < 
./helm/sealed-secrets/Chart.yaml)" >> $GITHUB_ENV
+
+      - name: Create imglock file
+        working-directory: ./helm
+        run: |
+          mkdir -p .imgpkg
+          kbld -f <(helm template sealed-secrets) --imgpkg-lock-output 
.imgpkg/images.yml
+
+      - name: Push imgpkg bundle
+        working-directory: ./helm
+        env:
+          IMGPKG_REGISTRY_HOSTNAME: ghcr.io
+          IMGPKG_REGISTRY_USERNAME: ${{ github.actor }}
+          IMGPKG_REGISTRY_PASSWORD: ${{ secrets.GITHUB_TOKEN }}
+        run: |
+          imgpkg push -b ghcr.io/${{ github.repository_owner 
}}/sealed-secrets-carvel:${{ env.chart_version }} -f .
+
+      - name: Update package.yaml
+        run: |
+          yq -i '.spec.version = "${{ env.chart_version }}"' 
carvel/package.yaml
+          yq -i '.metadata.name = "sealedsecrets.bitnami.com.${{ 
env.chart_version }}"' carvel/package.yaml
+          yq -i '.spec.template.spec.fetch.0.imgpkgBundle.image = "ghcr.io/${{ 
github.repository_owner }}/sealed-secrets-carvel:${{ env.chart_version }}"' 
carvel/package.yaml
+
+      - name: Commit package.yaml
+        run: |
+          git add ./carvel/package.yaml
+          git commit -s -m 'Update package to version ${{ env.chart_version }}'
+          git push
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.19.4/.github/workflows/helm-vib.yaml 
new/sealed-secrets-0.19.5/.github/workflows/helm-vib.yaml
--- old/sealed-secrets-0.19.4/.github/workflows/helm-vib.yaml   2023-01-16 
13:33:53.000000000 +0100
+++ new/sealed-secrets-0.19.5/.github/workflows/helm-vib.yaml   2023-02-15 
13:34:44.000000000 +0100
@@ -38,6 +38,10 @@
        include:
          - target-platform: gke
            target-platform-id: 91d398a2-25c4-4cda-8732-75a3cfc179a1
+           target-pipeline: vib-platform-verify.json
+         - target-platform: openshift
+           target-platform-id: ebac9e0d-3931-4515-ba54-e6adada1f174
+           target-pipeline: vib-platform-verify-openshift.json
       fail-fast: false
     name: Verify chart in ${{ matrix.target-platform}}
     steps:
@@ -47,6 +51,6 @@
           repository: ${{ github.event.pull_request.head.repo.full_name }}
       - uses: vmware-labs/vmware-image-builder-action@0.4.7
         with:
-          pipeline: vib-platform-verify.json
+          pipeline: ${{ matrix.target-pipeline }}
         env:
           TARGET_PLATFORM: ${{ matrix.target-platform-id }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.19.4/.vib/vib-platform-verify-openshift.json 
new/sealed-secrets-0.19.5/.vib/vib-platform-verify-openshift.json
--- old/sealed-secrets-0.19.4/.vib/vib-platform-verify-openshift.json   
1970-01-01 01:00:00.000000000 +0100
+++ new/sealed-secrets-0.19.5/.vib/vib-platform-verify-openshift.json   
2023-02-15 13:34:44.000000000 +0100
@@ -0,0 +1,37 @@
+{
+  "phases": {
+    "package": {
+      "context": {
+        "resources": {
+          "url": "{SHA_ARCHIVE}",
+          "path": "/helm/sealed-secrets"
+        }
+      },
+      "actions": [
+        {
+          "action_id": "helm-package"
+        }
+      ]
+    },
+    "verify": {
+      "context": {
+        "resources": {
+          "url": "{SHA_ARCHIVE}",
+          "path": "/.vib/"
+        },
+        "runtime_parameters": 
"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",
+        "target_platform": {
+          "target_platform_id": "{TARGET_PLATFORM}"
+        }
+      },
+      "actions": [
+        {
+          "action_id": "health-check",
+          "params": {
+            "endpoint": "lb-sealed-secrets-http"
+          }
+        }
+      ]
+    }
+  }
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.19.4/RELEASE-NOTES.md 
new/sealed-secrets-0.19.5/RELEASE-NOTES.md
--- old/sealed-secrets-0.19.4/RELEASE-NOTES.md  2023-01-16 13:33:53.000000000 
+0100
+++ new/sealed-secrets-0.19.5/RELEASE-NOTES.md  2023-02-15 13:34:44.000000000 
+0100
@@ -4,6 +4,21 @@
 
 
[![](https://img.shields.io/github/release/bitnami-labs/sealed-secrets.svg)](https://github.com/bitnami-labs/sealed-secrets/releases/latest)
 
+## v0.19.5
+
+### Changelog
+
+- Automated controller test on Openshift platforms (using ([VMware Image 
Builder](https://tanzu.vmware.com/image-builder)) 
([#1107](https://github.com/bitnami-labs/sealed-secrets/pull/1107)).
+- We now generate a Carvel package distrinbution of the controller 
([#1104](https://github.com/bitnami-labs/sealed-secrets/pull/1104)).
+- Bump golang.org/x/crypto from 0.5.0 to 0.6.0 
([#1108](https://github.com/bitnami-labs/sealed-secrets/pull/1108)).
+- Bump github.com/onsi/gomega from 1.25.0 to 1.26.0 
([#1103](https://github.com/bitnami-labs/sealed-secrets/pull/1103)).
+- Bump k8s.io/code-generator from 0.26.0 to 0.26.1 
([#1102](https://github.com/bitnami-labs/sealed-secrets/pull/1102)).
+- Bump github.com/onsi/ginkgo/v2 from 2.7.0 to 2.8.0 
([#1101](https://github.com/bitnami-labs/sealed-secrets/pull/1101)).
+- Bump k8s.io/api from 0.26.0 to 0.26.1 
([#1097](https://github.com/bitnami-labs/sealed-secrets/pull/1097)).
+- Bump k8s.io/client-go from 0.26.0 to 0.26.1  
([#1096](https://github.com/bitnami-labs/sealed-secrets/pull/1096)).
+- Bump k8s.io/klog/v2 from 2.80.1 to 2.90.0 
([#1094](https://github.com/bitnami-labs/sealed-secrets/pull/1094)).
+- Bump k8s.io/apimachinery from 0.26.0 to 0.26.1 
([#1093](https://github.com/bitnami-labs/sealed-secrets/pull/1093)).
+
 ## v0.19.4
 
 ### Changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.19.4/carvel/package.yaml 
new/sealed-secrets-0.19.5/carvel/package.yaml
--- old/sealed-secrets-0.19.4/carvel/package.yaml       1970-01-01 
01:00:00.000000000 +0100
+++ new/sealed-secrets-0.19.5/carvel/package.yaml       2023-02-15 
13:34:44.000000000 +0100
@@ -0,0 +1,433 @@
+apiVersion: data.packaging.carvel.dev/v1alpha1
+kind: Package
+metadata:
+  name: "sealedsecrets.bitnami.com.2.7.3"
+spec:
+  refName: "sealedsecrets.bitnami.com"
+  version: "2.7.3"
+  valuesSchema:
+    openAPIv3:
+      title: Chart Values
+      type: object
+      properties:
+        kubeVersion:
+          type: string
+          description: Override Kubernetes version
+          default: ""
+        nameOverride:
+          type: string
+          description: String to partially override sealed-secrets.fullname
+          default: ""
+        fullnameOverride:
+          type: string
+          description: String to fully override sealed-secrets.fullname
+          default: ""
+        namespace:
+          type: string
+          description: Namespace where to deploy the Sealed Secrets controller
+          default: ""
+        extraDeploy:
+          type: array
+          description: Array of extra objects to deploy with the release
+          default: []
+          items: {}
+        image:
+          type: object
+          properties:
+            registry:
+              type: string
+              description: Sealed Secrets image registry
+              default: docker.io
+            repository:
+              type: string
+              description: Sealed Secrets image repository
+              default: bitnami/sealed-secrets-controller
+            tag:
+              type: string
+              description: Sealed Secrets image tag (immutable tags are 
recommended)
+              default: v0.19.4
+            pullPolicy:
+              type: string
+              description: Sealed Secrets image pull policy
+              default: IfNotPresent
+            pullSecrets:
+              type: array
+              description: Sealed Secrets image pull secrets
+              default: []
+              items: {}
+        createController:
+          type: boolean
+          description: Specifies whether the Sealed Secrets controller should 
be created
+          default: true
+        secretName:
+          type: string
+          description: The name of an existing TLS secret containing the key 
used to encrypt secrets
+          default: sealed-secrets-key
+        updateStatus:
+          type: boolean
+          description: Specifies whether the Sealed Secrets controller should 
update the status subresource
+          default: true
+        keyrenewperiod:
+          type: string
+          description: Specifies key renewal period. Default 30 days
+          default: ""
+        rateLimit:
+          type: string
+          description: Number of allowed sustained request per second for 
verify endpoint
+          default: ""
+        rateLimitBurst:
+          type: string
+          description: Number of requests allowed to exceed the rate limit per 
second for verify endpoint
+          default: ""
+        additionalNamespaces:
+          type: array
+          description: List of namespaces used to manage the Sealed Secrets
+          default: []
+          items: {}
+        command:
+          type: array
+          description: Override default container command
+          default: []
+          items: {}
+        args:
+          type: array
+          description: Override default container args
+          default: []
+          items: {}
+        livenessProbe:
+          type: object
+          properties:
+            enabled:
+              type: boolean
+              description: Enable livenessProbe on Sealed Secret containers
+              default: true
+            initialDelaySeconds:
+              type: number
+              description: Initial delay seconds for livenessProbe
+              default: 0
+            periodSeconds:
+              type: number
+              description: Period seconds for livenessProbe
+              default: 10
+            timeoutSeconds:
+              type: number
+              description: Timeout seconds for livenessProbe
+              default: 1
+            failureThreshold:
+              type: number
+              description: Failure threshold for livenessProbe
+              default: 3
+            successThreshold:
+              type: number
+              description: Success threshold for livenessProbe
+              default: 1
+        readinessProbe:
+          type: object
+          properties:
+            enabled:
+              type: boolean
+              description: Enable readinessProbe on Sealed Secret containers
+              default: true
+            initialDelaySeconds:
+              type: number
+              description: Initial delay seconds for readinessProbe
+              default: 0
+            periodSeconds:
+              type: number
+              description: Period seconds for readinessProbe
+              default: 10
+            timeoutSeconds:
+              type: number
+              description: Timeout seconds for readinessProbe
+              default: 1
+            failureThreshold:
+              type: number
+              description: Failure threshold for readinessProbe
+              default: 3
+            successThreshold:
+              type: number
+              description: Success threshold for readinessProbe
+              default: 1
+        startupProbe:
+          type: object
+          properties:
+            enabled:
+              type: boolean
+              description: Enable startupProbe on Sealed Secret containers
+              default: false
+            initialDelaySeconds:
+              type: number
+              description: Initial delay seconds for startupProbe
+              default: 0
+            periodSeconds:
+              type: number
+              description: Period seconds for startupProbe
+              default: 10
+            timeoutSeconds:
+              type: number
+              description: Timeout seconds for startupProbe
+              default: 1
+            failureThreshold:
+              type: number
+              description: Failure threshold for startupProbe
+              default: 3
+            successThreshold:
+              type: number
+              description: Success threshold for startupProbe
+              default: 1
+        customLivenessProbe:
+          type: object
+          description: Custom livenessProbe that overrides the default one
+          default: {}
+        customReadinessProbe:
+          type: object
+          description: Custom readinessProbe that overrides the default one
+          default: {}
+        customStartupProbe:
+          type: object
+          description: Custom startupProbe that overrides the default one
+          default: {}
+        podSecurityContext:
+          type: object
+          properties:
+            enabled:
+              type: boolean
+              description: Enabled Sealed Secret pods' Security Context
+              default: true
+            fsGroup:
+              type: number
+              description: Set Sealed Secret pod's Security Context fsGroup
+              default: 65534
+        containerSecurityContext:
+          type: object
+          properties:
+            enabled:
+              type: boolean
+              description: Enabled Sealed Secret containers' Security Context
+              default: true
+            readOnlyRootFilesystem:
+              type: boolean
+              description: Whether the Sealed Secret container has a read-only 
root filesystem
+              default: true
+            runAsNonRoot:
+              type: boolean
+              description: Indicates that the Sealed Secret container must run 
as a non-root user
+              default: true
+            runAsUser:
+              type: number
+              description: Set Sealed Secret containers' Security Context 
runAsUser
+              default: 1001
+        automountServiceAccountToken:
+          type: string
+          description: whether to automatically mount the service account 
API-token to a particular pod
+          default: ""
+        priorityClassName:
+          type: string
+          description: Sealed Secret pods' priorityClassName
+          default: ""
+        runtimeClassName:
+          type: string
+          description: Sealed Secret pods' runtimeClassName
+          default: ""
+        tolerations:
+          type: array
+          description: Tolerations for Sealed Secret pods assignment
+          default: []
+          items: {}
+        hostNetwork:
+          type: boolean
+          description: Sealed Secrets pods' hostNetwork
+          default: false
+        dnsPolicy:
+          type: string
+          description: Sealed Secrets pods' dnsPolicy
+          default: ""
+        service:
+          type: object
+          properties:
+            type:
+              type: string
+              description: Sealed Secret service type
+              default: ClusterIP
+            port:
+              type: number
+              description: Sealed Secret service HTTP port
+              default: 8080
+            nodePort:
+              type: string
+              description: Node port for HTTP
+              default: ""
+        ingress:
+          type: object
+          properties:
+            enabled:
+              type: boolean
+              description: Enable ingress record generation for Sealed Secret
+              default: false
+            pathType:
+              type: string
+              description: Ingress path type
+              default: ImplementationSpecific
+            apiVersion:
+              type: string
+              description: Force Ingress API version (automatically detected 
if not set)
+              default: ""
+            ingressClassName:
+              type: string
+              description: IngressClass that will be be used to implement the 
Ingress
+              default: ""
+            hostname:
+              type: string
+              description: Default host for the ingress record
+              default: sealed-secrets.local
+            path:
+              type: string
+              description: Default path for the ingress record
+              default: /v1/cert.pem
+            tls:
+              type: boolean
+              description: Enable TLS configuration for the host defined at 
`ingress.hostname` parameter
+              default: false
+            selfSigned:
+              type: boolean
+              description: Create a TLS secret for this ingress record using 
self-signed certificates generated by Helm
+              default: false
+            extraHosts:
+              type: array
+              description: An array with additional hostname(s) to be covered 
with the ingress record
+              default: []
+              items: {}
+            extraPaths:
+              type: array
+              description: An array with additional arbitrary paths that may 
need to be added to the ingress under the main host
+              default: []
+              items: {}
+            extraTls:
+              type: array
+              description: TLS configuration for additional hostname(s) to be 
covered with this ingress record
+              default: []
+              items: {}
+            secrets:
+              type: array
+              description: Custom TLS certificates as secrets
+              default: []
+              items: {}
+        networkPolicy:
+          type: object
+          properties:
+            enabled:
+              type: boolean
+              description: Specifies whether a NetworkPolicy should be created
+              default: false
+        serviceAccount:
+          type: object
+          properties:
+            create:
+              type: boolean
+              description: Specifies whether a ServiceAccount should be created
+              default: true
+            labels:
+              type: object
+              description: Extra labels to be added to the ServiceAccount
+              default: {}
+            name:
+              type: string
+              description: The name of the ServiceAccount to use.
+              default: ""
+            automountServiceAccountToken:
+              type: string
+              description: Specifies, whether to mount the service account 
API-token
+              default: ""
+        rbac:
+          type: object
+          properties:
+            create:
+              type: boolean
+              description: Specifies whether RBAC resources should be created
+              default: true
+            clusterRole:
+              type: boolean
+              description: Specifies whether the Cluster Role resource should 
be created
+              default: true
+            labels:
+              type: object
+              description: Extra labels to be added to RBAC resources
+              default: {}
+            pspEnabled:
+              type: boolean
+              description: PodSecurityPolicy
+              default: false
+        metrics:
+          type: object
+          properties:
+            serviceMonitor:
+              type: object
+              properties:
+                enabled:
+                  type: boolean
+                  description: Specify if a ServiceMonitor will be deployed 
for Prometheus Operator
+                  default: false
+                namespace:
+                  type: string
+                  description: Namespace where Prometheus Operator is running 
in
+                  default: ""
+                labels:
+                  type: object
+                  description: Extra labels for the ServiceMonitor
+                  default: {}
+                annotations:
+                  type: object
+                  description: Extra annotations for the ServiceMonitor
+                  default: {}
+                interval:
+                  type: string
+                  description: How frequently to scrape metrics
+                  default: ""
+                scrapeTimeout:
+                  type: string
+                  description: Timeout after which the scrape is ended
+                  default: ""
+                honorLabels:
+                  type: boolean
+                  description: Specify if ServiceMonitor endPoints will honor 
labels
+                  default: true
+                metricRelabelings:
+                  type: array
+                  description: Specify additional relabeling of metrics
+                  default: []
+                  items: {}
+                relabelings:
+                  type: array
+                  description: Specify general relabeling
+                  default: []
+                  items: {}
+            dashboards:
+              type: object
+              properties:
+                create:
+                  type: boolean
+                  description: Specifies whether a ConfigMap with a Grafana 
dashboard configuration should be created
+                  default: false
+                labels:
+                  type: object
+                  description: Extra labels to be added to the Grafana 
dashboard ConfigMap
+                  default: {}
+                namespace:
+                  type: string
+                  description: Namespace where Grafana dashboard ConfigMap is 
deployed
+                  default: ""
+  template:
+    spec:
+      fetch:
+      - imgpkgBundle:
+          image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel@sha256:cd484bc9c0416ad1eb5048e4a7bdb33ab0300fd883e4564e1f7e4bb7c6f94318
+      template:
+      - helmTemplate:
+          path: sealed-secrets
+      - kbld:
+          paths:
+          - "-"
+          - .imgpkg/images.yml
+      deploy:
+      - kapp: {}
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.19.4/go.mod 
new/sealed-secrets-0.19.5/go.mod
--- old/sealed-secrets-0.19.4/go.mod    2023-01-16 13:33:53.000000000 +0100
+++ new/sealed-secrets-0.19.5/go.mod    2023-02-15 13:34:44.000000000 +0100
@@ -7,19 +7,19 @@
        github.com/google/renameio v0.1.0
        github.com/mattn/go-isatty v0.0.17
        github.com/mkmik/multierror v0.3.0
-       github.com/onsi/ginkgo/v2 v2.7.0
-       github.com/onsi/gomega v1.24.2
+       github.com/onsi/ginkgo/v2 v2.8.0
+       github.com/onsi/gomega v1.26.0
        github.com/prometheus/client_golang v1.14.0
        github.com/spf13/pflag v1.0.5
        github.com/throttled/throttled v2.2.5+incompatible
-       golang.org/x/crypto v0.5.0
+       golang.org/x/crypto v0.6.0
        gopkg.in/yaml.v2 v2.4.0
-       k8s.io/api v0.26.0
-       k8s.io/apimachinery v0.26.0
-       k8s.io/client-go v0.26.0
-       k8s.io/code-generator v0.26.0
+       k8s.io/api v0.26.1
+       k8s.io/apimachinery v0.26.1
+       k8s.io/client-go v0.26.1
+       k8s.io/code-generator v0.26.1
        k8s.io/klog v1.0.0
-       k8s.io/klog/v2 v2.80.1
+       k8s.io/klog/v2 v2.90.0
 )
 
 require (
@@ -52,13 +52,13 @@
        github.com/prometheus/common v0.37.0 // indirect
        github.com/prometheus/procfs v0.8.0 // indirect
        golang.org/x/mod v0.7.0 // indirect
-       golang.org/x/net v0.5.0 // indirect
+       golang.org/x/net v0.6.0 // indirect
        golang.org/x/oauth2 v0.0.0-20220223155221-ee480838109b // indirect
-       golang.org/x/sys v0.4.0 // indirect
-       golang.org/x/term v0.4.0 // indirect
-       golang.org/x/text v0.6.0 // indirect
+       golang.org/x/sys v0.5.0 // indirect
+       golang.org/x/term v0.5.0 // indirect
+       golang.org/x/text v0.7.0 // indirect
        golang.org/x/time v0.0.0-20220210224613-90d013bbcef8 // indirect
-       golang.org/x/tools v0.4.0 // indirect
+       golang.org/x/tools v0.5.0 // indirect
        google.golang.org/appengine v1.6.7 // indirect
        google.golang.org/protobuf v1.28.1 // indirect
        gopkg.in/inf.v0 v0.9.1 // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.19.4/go.sum 
new/sealed-secrets-0.19.5/go.sum
--- old/sealed-secrets-0.19.4/go.sum    2023-01-16 13:33:53.000000000 +0100
+++ new/sealed-secrets-0.19.5/go.sum    2023-02-15 13:34:44.000000000 +0100
@@ -221,10 +221,10 @@
 github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod 
h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
 github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e 
h1:fD57ERR4JtEqsWbfPhv4DMiApHyliiK5xCTNVSPiaAs=
 github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod 
h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
-github.com/onsi/ginkgo/v2 v2.7.0 
h1:/XxtEV3I3Eif/HobnVx9YmJgk8ENdRsuUmM+fLCFNow=
-github.com/onsi/ginkgo/v2 v2.7.0/go.mod 
h1:yjiuMwPokqY1XauOgju45q3sJt6VzQ/Fict1LFVcsAo=
-github.com/onsi/gomega v1.24.2 h1:J/tulyYK6JwBldPViHJReihxxZ+22FHs0piGjQAvoUE=
-github.com/onsi/gomega v1.24.2/go.mod 
h1:gs3J10IS7Z7r7eXRoNJIrNqU4ToQukCJhFtKrWgHWnk=
+github.com/onsi/ginkgo/v2 v2.8.0 
h1:pAM+oBNPrpXRs+E/8spkeGx9QgekbRVyr74EUvRVOUI=
+github.com/onsi/ginkgo/v2 v2.8.0/go.mod 
h1:6JsQiECmxCa3V5st74AL/AmsV482EDdVrGaVW6z3oYU=
+github.com/onsi/gomega v1.26.0 h1:03cDLK28U6hWvCAns6NeydX3zIm4SF3ci69ulidS32Q=
+github.com/onsi/gomega v1.26.0/go.mod 
h1:r+zV744Re+DiYCIPRlYOTxn0YkOLcAnW8k1xXdMPGhM=
 github.com/pkg/errors v0.8.0/go.mod 
h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
 github.com/pkg/errors v0.8.1/go.mod 
h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
 github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
@@ -295,8 +295,8 @@
 golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod 
h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
 golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod 
h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
 golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod 
h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.5.0 h1:U/0M97KRkSFvyD/3FSmdP5W5swImpNgle/EHFhOsQPE=
-golang.org/x/crypto v0.5.0/go.mod 
h1:NK/OQwhpMQP3MwtdjgLlYHnH9ebylxKWv3e0fK+mkQU=
+golang.org/x/crypto v0.6.0 h1:qfktjS5LUO+fFKeJXZ+ikTRijMmljikvG68fpMMruSc=
+golang.org/x/crypto v0.6.0/go.mod 
h1:OFC/31mSvZgRz0V1QTNCzfAI1aIRzbiufJtkMIlEp58=
 golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod 
h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
 golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod 
h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
 golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod 
h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
@@ -363,8 +363,8 @@
 golang.org/x/net v0.0.0-20210805182204-aaa1db679c0d/go.mod 
h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
 golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod 
h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
 golang.org/x/net v0.0.0-20220225172249-27dd8689420f/go.mod 
h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
-golang.org/x/net v0.5.0 h1:GyT4nK/YDHSqa1c4753ouYCDajOYKTja9Xb/OHtgvSw=
-golang.org/x/net v0.5.0/go.mod h1:DivGGAXEgPSlEBzxGzZI+ZLohi+xUj054jfeKui00ws=
+golang.org/x/net v0.6.0 h1:L4ZwwTvKW9gr0ZMS1yrHD9GZhIuVjOBBnaKH+SPQK0Q=
+golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs=
 golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod 
h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
 golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod 
h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
 golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod 
h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
@@ -383,7 +383,6 @@
 golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208/go.mod 
h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
 golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod 
h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
 golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod 
h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.1.0 h1:wsuoTGHzEhffawBOhz5CYhcrV4IdKZbEyZjBMuTp12o=
 golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod 
h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
 golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod 
h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
 golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod 
h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
@@ -426,12 +425,12 @@
 golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.4.0 h1:Zr2JFtRQNX3BCZ8YtxRE9hNJYC8J6I1MVbMg6owUp18=
-golang.org/x/sys v0.4.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.5.0 h1:MUK/U/4lj1t1oPg0HfuXDN/Z1wv31ZJ/YcPiGccS4DU=
+golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod 
h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
 golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod 
h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
-golang.org/x/term v0.4.0 h1:O7UWfv5+A2qiuulQk30kVinPoMtoIPeVaKLEgLpVkvg=
-golang.org/x/term v0.4.0/go.mod h1:9P2UbLfCdcvo3p/nzKvsmas4TnlujnuoV9hGgYzW1lQ=
+golang.org/x/term v0.5.0 h1:n2a8QNdAb0sZNpU9R1ALUXBbY+w51fCQDN+7EdxNBsY=
+golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k=
 golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod 
h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
 golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
 golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod 
h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
@@ -440,8 +439,8 @@
 golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
 golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
 golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
-golang.org/x/text v0.6.0 h1:3XmdazWV+ubf7QgHSTWeykHOci5oeekaGJBLkrkaw4k=
-golang.org/x/text v0.6.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
+golang.org/x/text v0.7.0 h1:4BRB4x83lYWy72KwLD/qYDuTu7q9PjSagHvijDw7cLo=
+golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8=
 golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod 
h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
 golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod 
h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
 golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod 
h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
@@ -490,8 +489,8 @@
 golang.org/x/tools v0.0.0-20200804011535-6c149bb5ef0d/go.mod 
h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
 golang.org/x/tools v0.0.0-20200825202427-b303f430e36d/go.mod 
h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA=
 golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod 
h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.4.0 h1:7mTAgkunk3fr4GAloyyCasadO6h9zSsQZbwvcaIciV4=
-golang.org/x/tools v0.4.0/go.mod 
h1:UE5sM2OK9E/d67R0ANs2xJizIymRP5gJU295PvKXxjQ=
+golang.org/x/tools v0.5.0 h1:+bSpV5HIeWkuvgaMfI3UmKRThoTA5ODJTUd8T17NO+4=
+golang.org/x/tools v0.5.0/go.mod 
h1:N+Kgy78s5I24c24dU8OfWNEotWjutIs8SnJvn5IDq+k=
 golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
 golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
 golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
@@ -610,21 +609,21 @@
 honnef.co/go/tools v0.0.1-2019.2.3/go.mod 
h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
 honnef.co/go/tools v0.0.1-2020.1.3/go.mod 
h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
 honnef.co/go/tools v0.0.1-2020.1.4/go.mod 
h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
-k8s.io/api v0.26.0 h1:IpPlZnxBpV1xl7TGk/X6lFtpgjgntCg8PJ+qrPHAC7I=
-k8s.io/api v0.26.0/go.mod h1:k6HDTaIFC8yn1i6pSClSqIwLABIcLV9l5Q4EcngKnQg=
-k8s.io/apimachinery v0.26.0 h1:1feANjElT7MvPqp0JT6F3Ss6TWDwmcjLypwoPpEf7zg=
-k8s.io/apimachinery v0.26.0/go.mod 
h1:tnPmbONNJ7ByJNz9+n9kMjNP8ON+1qoAIIC70lztu74=
-k8s.io/client-go v0.26.0 h1:lT1D3OfO+wIi9UFolCrifbjUUgu7CpLca0AD8ghRLI8=
-k8s.io/client-go v0.26.0/go.mod h1:I2Sh57A79EQsDmn7F7ASpmru1cceh3ocVT9KlX2jEZg=
-k8s.io/code-generator v0.26.0 h1:ZDY+7Gic9p/lACgD1G72gQg2CvNGeAYZTPIncv+iALM=
-k8s.io/code-generator v0.26.0/go.mod 
h1:OMoJ5Dqx1wgaQzKgc+ZWaZPfGjdRq/Y3WubFrZmeI3I=
+k8s.io/api v0.26.1 h1:f+SWYiPd/GsiWwVRz+NbFyCgvv75Pk9NK6dlkZgpCRQ=
+k8s.io/api v0.26.1/go.mod h1:xd/GBNgR0f707+ATNyPmQ1oyKSgndzXij81FzWGsejg=
+k8s.io/apimachinery v0.26.1 h1:8EZ/eGJL+hY/MYCNwhmDzVqq2lPl3N3Bo8rvweJwXUQ=
+k8s.io/apimachinery v0.26.1/go.mod 
h1:tnPmbONNJ7ByJNz9+n9kMjNP8ON+1qoAIIC70lztu74=
+k8s.io/client-go v0.26.1 h1:87CXzYJnAMGaa/IDDfRdhTzxk/wzGZ+/HUQpqgVSZXU=
+k8s.io/client-go v0.26.1/go.mod h1:IWNSglg+rQ3OcvDkhY6+QLeasV4OYHDjdqeWkDQZwGE=
+k8s.io/code-generator v0.26.1 h1:dusFDsnNSKlMFYhzIM0jAO1OlnTN5WYwQQ+Ai12IIlo=
+k8s.io/code-generator v0.26.1/go.mod 
h1:OMoJ5Dqx1wgaQzKgc+ZWaZPfGjdRq/Y3WubFrZmeI3I=
 k8s.io/gengo v0.0.0-20220902162205-c0856e24416d 
h1:U9tB195lKdzwqicbJvyJeOXV7Klv+wNAWENRnXEGi08=
 k8s.io/gengo v0.0.0-20220902162205-c0856e24416d/go.mod 
h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
 k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8=
 k8s.io/klog v1.0.0/go.mod h1:4Bi6QPql/J/LkTDqv7R/cd3hPo4k2DG6Ptcz060Ez5I=
 k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y=
-k8s.io/klog/v2 v2.80.1 h1:atnLQ121W371wYYFawwYx1aEY2eUfs4l3J72wtgAwV4=
-k8s.io/klog/v2 v2.80.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
+k8s.io/klog/v2 v2.90.0 h1:VkTxIV/FjRXn1fgNNcKGM8cfmL1Z33ZjXRTVxKCoF5M=
+k8s.io/klog/v2 v2.90.0/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0=
 k8s.io/kube-openapi v0.0.0-20221012153701-172d655c2280 
h1:+70TFaan3hfJzs+7VK2o+OGxg8HsuBr/5f6tVAjDu6E=
 k8s.io/kube-openapi v0.0.0-20221012153701-172d655c2280/go.mod 
h1:+Axhij7bCpeqhklhUTe3xmOn6bWxolyZEeyaFpjGtl4=
 k8s.io/utils v0.0.0-20221107191617-1a15be271d1d 
h1:0Smp/HP1OH4Rvhe+4B8nWGERtlqAGSftbSbbmm45oFs=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.19.4/helm/sealed-secrets/Chart.yaml 
new/sealed-secrets-0.19.5/helm/sealed-secrets/Chart.yaml
--- old/sealed-secrets-0.19.4/helm/sealed-secrets/Chart.yaml    2023-01-16 
13:33:53.000000000 +0100
+++ new/sealed-secrets-0.19.5/helm/sealed-secrets/Chart.yaml    2023-02-15 
13:34:44.000000000 +0100
@@ -1,7 +1,7 @@
 annotations:
   category: DeveloperTools
 apiVersion: v2
-appVersion: v0.19.3
+appVersion: v0.19.4
 description: Helm chart for the sealed-secrets controller.
 home: https://github.com/bitnami-labs/sealed-secrets
 icon: 
https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png
@@ -14,4 +14,4 @@
     url: https://github.com/bitnami-labs/sealed-secrets
 name: sealed-secrets
 type: application
-version: 2.7.2
+version: 2.7.3
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.19.4/helm/sealed-secrets/README.md 
new/sealed-secrets-0.19.5/helm/sealed-secrets/README.md
--- old/sealed-secrets-0.19.4/helm/sealed-secrets/README.md     2023-01-16 
13:33:53.000000000 +0100
+++ new/sealed-secrets-0.19.5/helm/sealed-secrets/README.md     2023-02-15 
13:34:44.000000000 +0100
@@ -70,14 +70,14 @@
 
 ### Common parameters
 
-| Name               | Description                                             
| Value |
-| ------------------ | ------------------------------------------------------- 
| ----- |
-| `kubeVersion`      | Override Kubernetes version                             
| `""`  |
-| `nameOverride`     | String to partially override sealed-secrets.fullname    
| `""`  |
-| `fullnameOverride` | String to fully override sealed-secrets.fullname        
| `""`  |
-| `namespace`        | Namespace where to deploy the Sealed Secrets controller 
| `""`  |
-| `extraDeploy`      | Array of extra objects to deploy with the release       
| `[]`  |
-| `commonAnnotations`| Annotations to add to all deployed resources            
| `[]`  |
+| Name                | Description                                            
 | Value |
+| ------------------- | 
------------------------------------------------------- | ----- |
+| `kubeVersion`       | Override Kubernetes version                            
 | `""`  |
+| `nameOverride`      | String to partially override sealed-secrets.fullname   
 | `""`  |
+| `fullnameOverride`  | String to fully override sealed-secrets.fullname       
 | `""`  |
+| `namespace`         | Namespace where to deploy the Sealed Secrets 
controller | `""`  |
+| `extraDeploy`       | Array of extra objects to deploy with the release      
 | `[]`  |
+| `commonAnnotations` | Annotations to add to all deployed resources           
 | `{}`  |
 
 
 ### Sealed Secrets Parameters
@@ -86,7 +86,7 @@
 | ------------------------------------------------- | 
------------------------------------------------------------------------------------
 | ----------------------------------- |
 | `image.registry`                                  | Sealed Secrets image 
registry                                                        | `docker.io`   
                      |
 | `image.repository`                                | Sealed Secrets image 
repository                                                      | 
`bitnami/sealed-secrets-controller` |
-| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                            | `v0.19.3`         
                  |
+| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                            | `v0.19.4`         
                  |
 | `image.pullPolicy`                                | Sealed Secrets image 
pull policy                                                     | 
`IfNotPresent`                      |
 | `image.pullSecrets`                               | Sealed Secrets image 
pull secrets                                                    | `[]`          
                      |
 | `createController`                                | Specifies whether the 
Sealed Secrets controller should be created                    | `true`         
                     |
@@ -96,8 +96,6 @@
 | `rateLimit`                                       | Number of allowed 
sustained request per second for verify endpoint                   | `""`       
                         |
 | `rateLimitBurst`                                  | Number of requests 
allowed to exceed the rate limit per second for verify endpoint   | `""`        
                        |
 | `additionalNamespaces`                            | List of namespaces used 
to manage the Sealed Secrets                                 | `[]`             
                   |
-| `additionalVolumes`                               | Extra volumes to be 
added to the controller deployment                               | `[]`         
                       |
-| `additionalVolumeMounts`                          | Extra volumeMounts to be 
added to the controller deployment's container              | `[]`              
                  |
 | `command`                                         | Override default 
container command                                                   | `[]`      
                          |
 | `args`                                            | Override default 
container args                                                      | `[]`      
                          |
 | `livenessProbe.enabled`                           | Enable livenessProbe on 
Sealed Secret containers                                     | `true`           
                   |
@@ -129,7 +127,7 @@
 | `containerSecurityContext.readOnlyRootFilesystem` | Whether the Sealed 
Secret container has a read-only root filesystem                  | `true`      
                        |
 | `containerSecurityContext.runAsNonRoot`           | Indicates that the 
Sealed Secret container must run as a non-root user               | `true`      
                        |
 | `containerSecurityContext.runAsUser`              | Set Sealed Secret 
containers' Security Context runAsUser                             | `1001`     
                         |
-| `automountServiceAccountToken`                    | Whether to automatically 
mount the service account API-token to a particular pod     | `""`              
                  |
+| `automountServiceAccountToken`                    | whether to automatically 
mount the service account API-token to a particular pod     | `""`              
                  |
 | `podLabels`                                       | Extra labels for Sealed 
Secret pods                                                  | `{}`             
                   |
 | `podAnnotations`                                  | Annotations for Sealed 
Secret pods                                                   | `{}`            
                    |
 | `priorityClassName`                               | Sealed Secret pods' 
priorityClassName                                                | `""`         
                       |
@@ -137,8 +135,10 @@
 | `affinity`                                        | Affinity for Sealed 
Secret pods assignment                                           | `{}`         
                       |
 | `nodeSelector`                                    | Node labels for Sealed 
Secret pods assignment                                        | `{}`            
                    |
 | `tolerations`                                     | Tolerations for Sealed 
Secret pods assignment                                        | `[]`            
                    |
-| `hostNetwork`                                     | Run Sealed Secret pods 
in the host network of the node where the pod is deployed     | `false`         
                    |
-| `dnsPolicy`                                       | Sealed Secret pods' 
dnsPolicy                                                        | `""`         
                       |
+| `additionalVolumes`                               | Extra Volumes for the 
Sealed Secrets Controller Deployment                           | `{}`           
                     |
+| `additionalVolumeMounts`                          | Extra volumeMounts for 
the Sealed Secrets Controller container                       | `{}`            
                    |
+| `hostNetwork`                                     | Sealed Secrets pods' 
hostNetwork                                                     | `false`       
                      |
+| `dnsPolicy`                                       | Sealed Secrets pods' 
dnsPolicy                                                       | `""`          
                      |
 
 
 ### Traffic Exposure Parameters
@@ -169,7 +169,7 @@
 
 | Name                                          | Description                  
                                 | Value   |
 | --------------------------------------------- | 
------------------------------------------------------------- | ------- |
-| `serviceAccount.annotations`                  | Extra labels to be added to 
the ServiceAccount                | `{}`    |
+| `serviceAccount.annotations`                  | Annotations for Sealed 
Secret service account                 | `{}`    |
 | `serviceAccount.create`                       | Specifies whether a 
ServiceAccount should be created          | `true`  |
 | `serviceAccount.labels`                       | Extra labels to be added to 
the ServiceAccount                | `{}`    |
 | `serviceAccount.name`                         | The name of the 
ServiceAccount to use.                        | `""`    |
@@ -189,8 +189,8 @@
 | `metrics.serviceMonitor.labels`            | Extra labels for the 
ServiceMonitor                                                    | `{}`    |
 | `metrics.serviceMonitor.annotations`       | Extra annotations for the 
ServiceMonitor                                               | `{}`    |
 | `metrics.serviceMonitor.interval`          | How frequently to scrape 
metrics                                                       | `""`    |
-| `metrics.serviceMonitor.honorLabels`       | Specify if ServiceMonitor 
endPoints will honor labels                                  | `true`  |
 | `metrics.serviceMonitor.scrapeTimeout`     | Timeout after which the scrape 
is ended                                                | `""`    |
+| `metrics.serviceMonitor.honorLabels`       | Specify if ServiceMonitor 
endPoints will honor labels                                  | `true`  |
 | `metrics.serviceMonitor.metricRelabelings` | Specify additional relabeling 
of metrics                                               | `[]`    |
 | `metrics.serviceMonitor.relabelings`       | Specify general relabeling      
                                                       | `[]`    |
 | `metrics.dashboards.create`                | Specifies whether a ConfigMap 
with a Grafana dashboard configuration should be created | `false` |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.19.4/helm/sealed-secrets/values.yaml 
new/sealed-secrets-0.19.5/helm/sealed-secrets/values.yaml
--- old/sealed-secrets-0.19.4/helm/sealed-secrets/values.yaml   2023-01-16 
13:33:53.000000000 +0100
+++ new/sealed-secrets-0.19.5/helm/sealed-secrets/values.yaml   2023-02-15 
13:34:44.000000000 +0100
@@ -33,7 +33,7 @@
 image:
   registry: docker.io
   repository: bitnami/sealed-secrets-controller
-  tag: v0.19.3
+  tag: v0.19.4
   ## Specify a imagePullPolicy
   ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
   ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
@@ -252,7 +252,7 @@
   ##   kubernetes.io/ingress.class: nginx
   ##   cert-manager.io/cluster-issuer: cluster-issuer-name
   ##
-  annotations:
+  annotations: {}
   ## @param ingress.tls Enable TLS configuration for the host defined at 
`ingress.hostname` parameter
   ## TLS certificates will be retrieved from a TLS secret with name: `{{- 
printf "%s-tls" .Values.ingress.hostname }}`
   ## You can:

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.kubeseal.new.22824/vendor.tar.gz differ: char 5, 
line 1

Reply via email to