Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kubeseal for openSUSE:Factory checked in at 2023-02-16 16:55:55 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kubeseal (Old) and /work/SRC/openSUSE:Factory/.kubeseal.new.22824 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kubeseal" Thu Feb 16 16:55:55 2023 rev:13 rq:1065995 version:0.19.5 Changes: -------- --- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes 2023-01-17 17:35:31.717255856 +0100 +++ /work/SRC/openSUSE:Factory/.kubeseal.new.22824/kubeseal.changes 2023-02-16 16:56:08.530770243 +0100 @@ -1,0 +2,19 @@ +Wed Feb 15 16:42:50 UTC 2023 - ka...@b1-systems.de + +- Update to version 0.19.5: + * Release version v0.19.5 (#1109) + * Bump golang.org/x/crypto from 0.5.0 to 0.6.0 (#1108) + * Include OpenShift VIB (#1107) + * Add workflow for Carvel package release (#1104) + * Bump k8s.io/code-generator from 0.26.0 to 0.26.1 (#1102) + * Bump github.com/onsi/gomega from 1.25.0 to 1.26.0 (#1103) + * Bump github.com/onsi/ginkgo/v2 from 2.7.0 to 2.8.0 (#1101) + * Add carvel package (#1100) + * Generate values table (#1099) + * Bump k8s.io/client-go from 0.26.0 to 0.26.1 (#1096) + * Bump github.com/onsi/gomega from 1.24.2 to 1.25.0 (#1095) + * Bump k8s.io/klog/v2 from 2.80.1 to 2.90.0 (#1094) + * Bump k8s.io/apimachinery from 0.26.0 to 0.26.1 (#1093) + * Release Helm Chart 2.7.3 to use release 0.19.4 (#1089) + +------------------------------------------------------------------- Old: ---- sealed-secrets-0.19.4.tar.gz New: ---- sealed-secrets-0.19.5.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ kubeseal.spec ++++++ --- /var/tmp/diff_new_pack.XQ2UHX/_old 2023-02-16 16:56:09.398773711 +0100 +++ /var/tmp/diff_new_pack.XQ2UHX/_new 2023-02-16 16:56:09.406773743 +0100 @@ -21,7 +21,7 @@ %define archive_name sealed-secrets Name: kubeseal -Version: 0.19.4 +Version: 0.19.5 Release: 0 Summary: CLI for encrypting secrets to SealedSecrets License: Apache-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.XQ2UHX/_old 2023-02-16 16:56:09.446773904 +0100 +++ /var/tmp/diff_new_pack.XQ2UHX/_new 2023-02-16 16:56:09.450773919 +0100 @@ -3,7 +3,7 @@ <param name="url">https://github.com/bitnami-labs/sealed-secrets</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v0.19.4</param> + <param name="revision">v0.19.5</param> <param name="versionformat">@PARENT_TAG@</param> <param name="changesgenerate">enable</param> <param name="versionrewrite-pattern">v(.*)</param> @@ -16,7 +16,7 @@ <param name="compression">gz</param> </service> <service name="go_modules" mode="disabled"> - <param name="archive">sealed-secrets-0.19.4.tar.gz</param> + <param name="archive">sealed-secrets-0.19.5.tar.gz</param> </service> </services> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.XQ2UHX/_old 2023-02-16 16:56:09.482774047 +0100 +++ /var/tmp/diff_new_pack.XQ2UHX/_new 2023-02-16 16:56:09.486774063 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/bitnami-labs/sealed-secrets</param> - <param name="changesrevision">ebca01121cbbc8faf4d39043e1ac89f0b0dd5cd1</param></service></servicedata> + <param name="changesrevision">d74823e8258c0e1028023c3d80de46b553f8e27e</param></service></servicedata> (No newline at EOF) ++++++ sealed-secrets-0.19.4.tar.gz -> sealed-secrets-0.19.5.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/.github/workflows/helm-release.yaml new/sealed-secrets-0.19.5/.github/workflows/helm-release.yaml --- old/sealed-secrets-0.19.4/.github/workflows/helm-release.yaml 2023-01-16 13:33:53.000000000 +0100 +++ new/sealed-secrets-0.19.5/.github/workflows/helm-release.yaml 2023-02-15 13:34:44.000000000 +0100 @@ -1,4 +1,4 @@ -name: Release Helm Chart +name: Release Helm Chart and Carvel package on: push: @@ -34,3 +34,47 @@ env: CR_TOKEN: "${{ secrets.GITHUB_TOKEN }}" CR_RELEASE_NAME_TEMPLATE: "helm-v{{ .Version }}" + + - name: Install Carvel + uses: carvel-dev/setup-action@v1.3.0 + with: + only: kbld, imgpkg + token: ${{ secrets.GITHUB_TOKEN }} + + - name: Install yq + run: | + mkdir -p ~/bin + wget https://github.com/mikefarah/yq/releases/download/v4.30.8/yq_linux_amd64 -O ~/bin/yq + chmod +x ~/bin/yq + + - name: Get chart version + run: | + export PATH=~/bin:$PATH + echo "chart_version=$(yq .version < ./helm/sealed-secrets/Chart.yaml)" >> $GITHUB_ENV + + - name: Create imglock file + working-directory: ./helm + run: | + mkdir -p .imgpkg + kbld -f <(helm template sealed-secrets) --imgpkg-lock-output .imgpkg/images.yml + + - name: Push imgpkg bundle + working-directory: ./helm + env: + IMGPKG_REGISTRY_HOSTNAME: ghcr.io + IMGPKG_REGISTRY_USERNAME: ${{ github.actor }} + IMGPKG_REGISTRY_PASSWORD: ${{ secrets.GITHUB_TOKEN }} + run: | + imgpkg push -b ghcr.io/${{ github.repository_owner }}/sealed-secrets-carvel:${{ env.chart_version }} -f . + + - name: Update package.yaml + run: | + yq -i '.spec.version = "${{ env.chart_version }}"' carvel/package.yaml + yq -i '.metadata.name = "sealedsecrets.bitnami.com.${{ env.chart_version }}"' carvel/package.yaml + yq -i '.spec.template.spec.fetch.0.imgpkgBundle.image = "ghcr.io/${{ github.repository_owner }}/sealed-secrets-carvel:${{ env.chart_version }}"' carvel/package.yaml + + - name: Commit package.yaml + run: | + git add ./carvel/package.yaml + git commit -s -m 'Update package to version ${{ env.chart_version }}' + git push diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/.github/workflows/helm-vib.yaml new/sealed-secrets-0.19.5/.github/workflows/helm-vib.yaml --- old/sealed-secrets-0.19.4/.github/workflows/helm-vib.yaml 2023-01-16 13:33:53.000000000 +0100 +++ new/sealed-secrets-0.19.5/.github/workflows/helm-vib.yaml 2023-02-15 13:34:44.000000000 +0100 @@ -38,6 +38,10 @@ include: - target-platform: gke target-platform-id: 91d398a2-25c4-4cda-8732-75a3cfc179a1 + target-pipeline: vib-platform-verify.json + - target-platform: openshift + target-platform-id: ebac9e0d-3931-4515-ba54-e6adada1f174 + target-pipeline: vib-platform-verify-openshift.json fail-fast: false name: Verify chart in ${{ matrix.target-platform}} steps: @@ -47,6 +51,6 @@ repository: ${{ github.event.pull_request.head.repo.full_name }} - uses: vmware-labs/vmware-image-builder-action@0.4.7 with: - pipeline: vib-platform-verify.json + pipeline: ${{ matrix.target-pipeline }} env: TARGET_PLATFORM: ${{ matrix.target-platform-id }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/.vib/vib-platform-verify-openshift.json new/sealed-secrets-0.19.5/.vib/vib-platform-verify-openshift.json --- old/sealed-secrets-0.19.4/.vib/vib-platform-verify-openshift.json 1970-01-01 01:00:00.000000000 +0100 +++ new/sealed-secrets-0.19.5/.vib/vib-platform-verify-openshift.json 2023-02-15 13:34:44.000000000 +0100 @@ -0,0 +1,37 @@ +{ + "phases": { + "package": { + "context": { + "resources": { + "url": "{SHA_ARCHIVE}", + "path": "/helm/sealed-secrets" + } + }, + "actions": [ + { + "action_id": "helm-package" + } + ] + }, + "verify": { + "context": { + "resources": { + "url": "{SHA_ARCHIVE}", + "path": "/.vib/" + }, + "runtime_parameters": "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", + "target_platform": { + "target_platform_id": "{TARGET_PLATFORM}" + } + }, + "actions": [ + { + "action_id": "health-check", + "params": { + "endpoint": "lb-sealed-secrets-http" + } + } + ] + } + } +} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/RELEASE-NOTES.md new/sealed-secrets-0.19.5/RELEASE-NOTES.md --- old/sealed-secrets-0.19.4/RELEASE-NOTES.md 2023-01-16 13:33:53.000000000 +0100 +++ new/sealed-secrets-0.19.5/RELEASE-NOTES.md 2023-02-15 13:34:44.000000000 +0100 @@ -4,6 +4,21 @@ [](https://github.com/bitnami-labs/sealed-secrets/releases/latest) +## v0.19.5 + +### Changelog + +- Automated controller test on Openshift platforms (using ([VMware Image Builder](https://tanzu.vmware.com/image-builder)) ([#1107](https://github.com/bitnami-labs/sealed-secrets/pull/1107)). +- We now generate a Carvel package distrinbution of the controller ([#1104](https://github.com/bitnami-labs/sealed-secrets/pull/1104)). +- Bump golang.org/x/crypto from 0.5.0 to 0.6.0 ([#1108](https://github.com/bitnami-labs/sealed-secrets/pull/1108)). +- Bump github.com/onsi/gomega from 1.25.0 to 1.26.0 ([#1103](https://github.com/bitnami-labs/sealed-secrets/pull/1103)). +- Bump k8s.io/code-generator from 0.26.0 to 0.26.1 ([#1102](https://github.com/bitnami-labs/sealed-secrets/pull/1102)). +- Bump github.com/onsi/ginkgo/v2 from 2.7.0 to 2.8.0 ([#1101](https://github.com/bitnami-labs/sealed-secrets/pull/1101)). +- Bump k8s.io/api from 0.26.0 to 0.26.1 ([#1097](https://github.com/bitnami-labs/sealed-secrets/pull/1097)). +- Bump k8s.io/client-go from 0.26.0 to 0.26.1 ([#1096](https://github.com/bitnami-labs/sealed-secrets/pull/1096)). +- Bump k8s.io/klog/v2 from 2.80.1 to 2.90.0 ([#1094](https://github.com/bitnami-labs/sealed-secrets/pull/1094)). +- Bump k8s.io/apimachinery from 0.26.0 to 0.26.1 ([#1093](https://github.com/bitnami-labs/sealed-secrets/pull/1093)). + ## v0.19.4 ### Changelog diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/carvel/package.yaml new/sealed-secrets-0.19.5/carvel/package.yaml --- old/sealed-secrets-0.19.4/carvel/package.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/sealed-secrets-0.19.5/carvel/package.yaml 2023-02-15 13:34:44.000000000 +0100 @@ -0,0 +1,433 @@ +apiVersion: data.packaging.carvel.dev/v1alpha1 +kind: Package +metadata: + name: "sealedsecrets.bitnami.com.2.7.3" +spec: + refName: "sealedsecrets.bitnami.com" + version: "2.7.3" + valuesSchema: + openAPIv3: + title: Chart Values + type: object + properties: + kubeVersion: + type: string + description: Override Kubernetes version + default: "" + nameOverride: + type: string + description: String to partially override sealed-secrets.fullname + default: "" + fullnameOverride: + type: string + description: String to fully override sealed-secrets.fullname + default: "" + namespace: + type: string + description: Namespace where to deploy the Sealed Secrets controller + default: "" + extraDeploy: + type: array + description: Array of extra objects to deploy with the release + default: [] + items: {} + image: + type: object + properties: + registry: + type: string + description: Sealed Secrets image registry + default: docker.io + repository: + type: string + description: Sealed Secrets image repository + default: bitnami/sealed-secrets-controller + tag: + type: string + description: Sealed Secrets image tag (immutable tags are recommended) + default: v0.19.4 + pullPolicy: + type: string + description: Sealed Secrets image pull policy + default: IfNotPresent + pullSecrets: + type: array + description: Sealed Secrets image pull secrets + default: [] + items: {} + createController: + type: boolean + description: Specifies whether the Sealed Secrets controller should be created + default: true + secretName: + type: string + description: The name of an existing TLS secret containing the key used to encrypt secrets + default: sealed-secrets-key + updateStatus: + type: boolean + description: Specifies whether the Sealed Secrets controller should update the status subresource + default: true + keyrenewperiod: + type: string + description: Specifies key renewal period. Default 30 days + default: "" + rateLimit: + type: string + description: Number of allowed sustained request per second for verify endpoint + default: "" + rateLimitBurst: + type: string + description: Number of requests allowed to exceed the rate limit per second for verify endpoint + default: "" + additionalNamespaces: + type: array + description: List of namespaces used to manage the Sealed Secrets + default: [] + items: {} + command: + type: array + description: Override default container command + default: [] + items: {} + args: + type: array + description: Override default container args + default: [] + items: {} + livenessProbe: + type: object + properties: + enabled: + type: boolean + description: Enable livenessProbe on Sealed Secret containers + default: true + initialDelaySeconds: + type: number + description: Initial delay seconds for livenessProbe + default: 0 + periodSeconds: + type: number + description: Period seconds for livenessProbe + default: 10 + timeoutSeconds: + type: number + description: Timeout seconds for livenessProbe + default: 1 + failureThreshold: + type: number + description: Failure threshold for livenessProbe + default: 3 + successThreshold: + type: number + description: Success threshold for livenessProbe + default: 1 + readinessProbe: + type: object + properties: + enabled: + type: boolean + description: Enable readinessProbe on Sealed Secret containers + default: true + initialDelaySeconds: + type: number + description: Initial delay seconds for readinessProbe + default: 0 + periodSeconds: + type: number + description: Period seconds for readinessProbe + default: 10 + timeoutSeconds: + type: number + description: Timeout seconds for readinessProbe + default: 1 + failureThreshold: + type: number + description: Failure threshold for readinessProbe + default: 3 + successThreshold: + type: number + description: Success threshold for readinessProbe + default: 1 + startupProbe: + type: object + properties: + enabled: + type: boolean + description: Enable startupProbe on Sealed Secret containers + default: false + initialDelaySeconds: + type: number + description: Initial delay seconds for startupProbe + default: 0 + periodSeconds: + type: number + description: Period seconds for startupProbe + default: 10 + timeoutSeconds: + type: number + description: Timeout seconds for startupProbe + default: 1 + failureThreshold: + type: number + description: Failure threshold for startupProbe + default: 3 + successThreshold: + type: number + description: Success threshold for startupProbe + default: 1 + customLivenessProbe: + type: object + description: Custom livenessProbe that overrides the default one + default: {} + customReadinessProbe: + type: object + description: Custom readinessProbe that overrides the default one + default: {} + customStartupProbe: + type: object + description: Custom startupProbe that overrides the default one + default: {} + podSecurityContext: + type: object + properties: + enabled: + type: boolean + description: Enabled Sealed Secret pods' Security Context + default: true + fsGroup: + type: number + description: Set Sealed Secret pod's Security Context fsGroup + default: 65534 + containerSecurityContext: + type: object + properties: + enabled: + type: boolean + description: Enabled Sealed Secret containers' Security Context + default: true + readOnlyRootFilesystem: + type: boolean + description: Whether the Sealed Secret container has a read-only root filesystem + default: true + runAsNonRoot: + type: boolean + description: Indicates that the Sealed Secret container must run as a non-root user + default: true + runAsUser: + type: number + description: Set Sealed Secret containers' Security Context runAsUser + default: 1001 + automountServiceAccountToken: + type: string + description: whether to automatically mount the service account API-token to a particular pod + default: "" + priorityClassName: + type: string + description: Sealed Secret pods' priorityClassName + default: "" + runtimeClassName: + type: string + description: Sealed Secret pods' runtimeClassName + default: "" + tolerations: + type: array + description: Tolerations for Sealed Secret pods assignment + default: [] + items: {} + hostNetwork: + type: boolean + description: Sealed Secrets pods' hostNetwork + default: false + dnsPolicy: + type: string + description: Sealed Secrets pods' dnsPolicy + default: "" + service: + type: object + properties: + type: + type: string + description: Sealed Secret service type + default: ClusterIP + port: + type: number + description: Sealed Secret service HTTP port + default: 8080 + nodePort: + type: string + description: Node port for HTTP + default: "" + ingress: + type: object + properties: + enabled: + type: boolean + description: Enable ingress record generation for Sealed Secret + default: false + pathType: + type: string + description: Ingress path type + default: ImplementationSpecific + apiVersion: + type: string + description: Force Ingress API version (automatically detected if not set) + default: "" + ingressClassName: + type: string + description: IngressClass that will be be used to implement the Ingress + default: "" + hostname: + type: string + description: Default host for the ingress record + default: sealed-secrets.local + path: + type: string + description: Default path for the ingress record + default: /v1/cert.pem + tls: + type: boolean + description: Enable TLS configuration for the host defined at `ingress.hostname` parameter + default: false + selfSigned: + type: boolean + description: Create a TLS secret for this ingress record using self-signed certificates generated by Helm + default: false + extraHosts: + type: array + description: An array with additional hostname(s) to be covered with the ingress record + default: [] + items: {} + extraPaths: + type: array + description: An array with additional arbitrary paths that may need to be added to the ingress under the main host + default: [] + items: {} + extraTls: + type: array + description: TLS configuration for additional hostname(s) to be covered with this ingress record + default: [] + items: {} + secrets: + type: array + description: Custom TLS certificates as secrets + default: [] + items: {} + networkPolicy: + type: object + properties: + enabled: + type: boolean + description: Specifies whether a NetworkPolicy should be created + default: false + serviceAccount: + type: object + properties: + create: + type: boolean + description: Specifies whether a ServiceAccount should be created + default: true + labels: + type: object + description: Extra labels to be added to the ServiceAccount + default: {} + name: + type: string + description: The name of the ServiceAccount to use. + default: "" + automountServiceAccountToken: + type: string + description: Specifies, whether to mount the service account API-token + default: "" + rbac: + type: object + properties: + create: + type: boolean + description: Specifies whether RBAC resources should be created + default: true + clusterRole: + type: boolean + description: Specifies whether the Cluster Role resource should be created + default: true + labels: + type: object + description: Extra labels to be added to RBAC resources + default: {} + pspEnabled: + type: boolean + description: PodSecurityPolicy + default: false + metrics: + type: object + properties: + serviceMonitor: + type: object + properties: + enabled: + type: boolean + description: Specify if a ServiceMonitor will be deployed for Prometheus Operator + default: false + namespace: + type: string + description: Namespace where Prometheus Operator is running in + default: "" + labels: + type: object + description: Extra labels for the ServiceMonitor + default: {} + annotations: + type: object + description: Extra annotations for the ServiceMonitor + default: {} + interval: + type: string + description: How frequently to scrape metrics + default: "" + scrapeTimeout: + type: string + description: Timeout after which the scrape is ended + default: "" + honorLabels: + type: boolean + description: Specify if ServiceMonitor endPoints will honor labels + default: true + metricRelabelings: + type: array + description: Specify additional relabeling of metrics + default: [] + items: {} + relabelings: + type: array + description: Specify general relabeling + default: [] + items: {} + dashboards: + type: object + properties: + create: + type: boolean + description: Specifies whether a ConfigMap with a Grafana dashboard configuration should be created + default: false + labels: + type: object + description: Extra labels to be added to the Grafana dashboard ConfigMap + default: {} + namespace: + type: string + description: Namespace where Grafana dashboard ConfigMap is deployed + default: "" + template: + spec: + fetch: + - imgpkgBundle: + image: ghcr.io/bitnami-labs/sealed-secrets-carvel@sha256:cd484bc9c0416ad1eb5048e4a7bdb33ab0300fd883e4564e1f7e4bb7c6f94318 + template: + - helmTemplate: + path: sealed-secrets + - kbld: + paths: + - "-" + - .imgpkg/images.yml + deploy: + - kapp: {} + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/go.mod new/sealed-secrets-0.19.5/go.mod --- old/sealed-secrets-0.19.4/go.mod 2023-01-16 13:33:53.000000000 +0100 +++ new/sealed-secrets-0.19.5/go.mod 2023-02-15 13:34:44.000000000 +0100 @@ -7,19 +7,19 @@ github.com/google/renameio v0.1.0 github.com/mattn/go-isatty v0.0.17 github.com/mkmik/multierror v0.3.0 - github.com/onsi/ginkgo/v2 v2.7.0 - github.com/onsi/gomega v1.24.2 + github.com/onsi/ginkgo/v2 v2.8.0 + github.com/onsi/gomega v1.26.0 github.com/prometheus/client_golang v1.14.0 github.com/spf13/pflag v1.0.5 github.com/throttled/throttled v2.2.5+incompatible - golang.org/x/crypto v0.5.0 + golang.org/x/crypto v0.6.0 gopkg.in/yaml.v2 v2.4.0 - k8s.io/api v0.26.0 - k8s.io/apimachinery v0.26.0 - k8s.io/client-go v0.26.0 - k8s.io/code-generator v0.26.0 + k8s.io/api v0.26.1 + k8s.io/apimachinery v0.26.1 + k8s.io/client-go v0.26.1 + k8s.io/code-generator v0.26.1 k8s.io/klog v1.0.0 - k8s.io/klog/v2 v2.80.1 + k8s.io/klog/v2 v2.90.0 ) require ( @@ -52,13 +52,13 @@ github.com/prometheus/common v0.37.0 // indirect github.com/prometheus/procfs v0.8.0 // indirect golang.org/x/mod v0.7.0 // indirect - golang.org/x/net v0.5.0 // indirect + golang.org/x/net v0.6.0 // indirect golang.org/x/oauth2 v0.0.0-20220223155221-ee480838109b // indirect - golang.org/x/sys v0.4.0 // indirect - golang.org/x/term v0.4.0 // indirect - golang.org/x/text v0.6.0 // indirect + golang.org/x/sys v0.5.0 // indirect + golang.org/x/term v0.5.0 // indirect + golang.org/x/text v0.7.0 // indirect golang.org/x/time v0.0.0-20220210224613-90d013bbcef8 // indirect - golang.org/x/tools v0.4.0 // indirect + golang.org/x/tools v0.5.0 // indirect google.golang.org/appengine v1.6.7 // indirect google.golang.org/protobuf v1.28.1 // indirect gopkg.in/inf.v0 v0.9.1 // indirect diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/go.sum new/sealed-secrets-0.19.5/go.sum --- old/sealed-secrets-0.19.4/go.sum 2023-01-16 13:33:53.000000000 +0100 +++ new/sealed-secrets-0.19.5/go.sum 2023-02-15 13:34:44.000000000 +0100 @@ -221,10 +221,10 @@ github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U= github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e h1:fD57ERR4JtEqsWbfPhv4DMiApHyliiK5xCTNVSPiaAs= github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno= -github.com/onsi/ginkgo/v2 v2.7.0 h1:/XxtEV3I3Eif/HobnVx9YmJgk8ENdRsuUmM+fLCFNow= -github.com/onsi/ginkgo/v2 v2.7.0/go.mod h1:yjiuMwPokqY1XauOgju45q3sJt6VzQ/Fict1LFVcsAo= -github.com/onsi/gomega v1.24.2 h1:J/tulyYK6JwBldPViHJReihxxZ+22FHs0piGjQAvoUE= -github.com/onsi/gomega v1.24.2/go.mod h1:gs3J10IS7Z7r7eXRoNJIrNqU4ToQukCJhFtKrWgHWnk= +github.com/onsi/ginkgo/v2 v2.8.0 h1:pAM+oBNPrpXRs+E/8spkeGx9QgekbRVyr74EUvRVOUI= +github.com/onsi/ginkgo/v2 v2.8.0/go.mod h1:6JsQiECmxCa3V5st74AL/AmsV482EDdVrGaVW6z3oYU= +github.com/onsi/gomega v1.26.0 h1:03cDLK28U6hWvCAns6NeydX3zIm4SF3ci69ulidS32Q= +github.com/onsi/gomega v1.26.0/go.mod h1:r+zV744Re+DiYCIPRlYOTxn0YkOLcAnW8k1xXdMPGhM= github.com/pkg/errors v0.8.0/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.8.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= @@ -295,8 +295,8 @@ golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= -golang.org/x/crypto v0.5.0 h1:U/0M97KRkSFvyD/3FSmdP5W5swImpNgle/EHFhOsQPE= -golang.org/x/crypto v0.5.0/go.mod h1:NK/OQwhpMQP3MwtdjgLlYHnH9ebylxKWv3e0fK+mkQU= +golang.org/x/crypto v0.6.0 h1:qfktjS5LUO+fFKeJXZ+ikTRijMmljikvG68fpMMruSc= +golang.org/x/crypto v0.6.0/go.mod h1:OFC/31mSvZgRz0V1QTNCzfAI1aIRzbiufJtkMIlEp58= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= @@ -363,8 +363,8 @@ golang.org/x/net v0.0.0-20210805182204-aaa1db679c0d/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk= golang.org/x/net v0.0.0-20220225172249-27dd8689420f/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk= -golang.org/x/net v0.5.0 h1:GyT4nK/YDHSqa1c4753ouYCDajOYKTja9Xb/OHtgvSw= -golang.org/x/net v0.5.0/go.mod h1:DivGGAXEgPSlEBzxGzZI+ZLohi+xUj054jfeKui00ws= +golang.org/x/net v0.6.0 h1:L4ZwwTvKW9gr0ZMS1yrHD9GZhIuVjOBBnaKH+SPQK0Q= +golang.org/x/net v0.6.0/go.mod h1:2Tu9+aMcznHK/AK1HMvgo6xiTLG5rD5rZLDS+rp2Bjs= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= @@ -383,7 +383,6 @@ golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20201207232520-09787c993a3a/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.1.0 h1:wsuoTGHzEhffawBOhz5CYhcrV4IdKZbEyZjBMuTp12o= golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20180905080454-ebe1bf3edb33/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20181116152217-5ac8a444bdc5/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= @@ -426,12 +425,12 @@ golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.4.0 h1:Zr2JFtRQNX3BCZ8YtxRE9hNJYC8J6I1MVbMg6owUp18= -golang.org/x/sys v0.4.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.5.0 h1:MUK/U/4lj1t1oPg0HfuXDN/Z1wv31ZJ/YcPiGccS4DU= +golang.org/x/sys v0.5.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= -golang.org/x/term v0.4.0 h1:O7UWfv5+A2qiuulQk30kVinPoMtoIPeVaKLEgLpVkvg= -golang.org/x/term v0.4.0/go.mod h1:9P2UbLfCdcvo3p/nzKvsmas4TnlujnuoV9hGgYzW1lQ= +golang.org/x/term v0.5.0 h1:n2a8QNdAb0sZNpU9R1ALUXBbY+w51fCQDN+7EdxNBsY= +golang.org/x/term v0.5.0/go.mod h1:jMB1sMXY+tzblOD4FWmEbocvup2/aLOaQEp7JmGp78k= golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= @@ -440,8 +439,8 @@ golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ= -golang.org/x/text v0.6.0 h1:3XmdazWV+ubf7QgHSTWeykHOci5oeekaGJBLkrkaw4k= -golang.org/x/text v0.6.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= +golang.org/x/text v0.7.0 h1:4BRB4x83lYWy72KwLD/qYDuTu7q9PjSagHvijDw7cLo= +golang.org/x/text v0.7.0/go.mod h1:mrYo+phRRbMaCq/xk9113O4dZlRixOauAjOtrjsXDZ8= golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= @@ -490,8 +489,8 @@ golang.org/x/tools v0.0.0-20200804011535-6c149bb5ef0d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA= golang.org/x/tools v0.0.0-20200825202427-b303f430e36d/go.mod h1:njjCfa9FT2d7l9Bc6FUM5FLjQPp3cFF28FI3qnDFljA= golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA= -golang.org/x/tools v0.4.0 h1:7mTAgkunk3fr4GAloyyCasadO6h9zSsQZbwvcaIciV4= -golang.org/x/tools v0.4.0/go.mod h1:UE5sM2OK9E/d67R0ANs2xJizIymRP5gJU295PvKXxjQ= +golang.org/x/tools v0.5.0 h1:+bSpV5HIeWkuvgaMfI3UmKRThoTA5ODJTUd8T17NO+4= +golang.org/x/tools v0.5.0/go.mod h1:N+Kgy78s5I24c24dU8OfWNEotWjutIs8SnJvn5IDq+k= golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= @@ -610,21 +609,21 @@ honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= -k8s.io/api v0.26.0 h1:IpPlZnxBpV1xl7TGk/X6lFtpgjgntCg8PJ+qrPHAC7I= -k8s.io/api v0.26.0/go.mod h1:k6HDTaIFC8yn1i6pSClSqIwLABIcLV9l5Q4EcngKnQg= -k8s.io/apimachinery v0.26.0 h1:1feANjElT7MvPqp0JT6F3Ss6TWDwmcjLypwoPpEf7zg= -k8s.io/apimachinery v0.26.0/go.mod h1:tnPmbONNJ7ByJNz9+n9kMjNP8ON+1qoAIIC70lztu74= -k8s.io/client-go v0.26.0 h1:lT1D3OfO+wIi9UFolCrifbjUUgu7CpLca0AD8ghRLI8= -k8s.io/client-go v0.26.0/go.mod h1:I2Sh57A79EQsDmn7F7ASpmru1cceh3ocVT9KlX2jEZg= -k8s.io/code-generator v0.26.0 h1:ZDY+7Gic9p/lACgD1G72gQg2CvNGeAYZTPIncv+iALM= -k8s.io/code-generator v0.26.0/go.mod h1:OMoJ5Dqx1wgaQzKgc+ZWaZPfGjdRq/Y3WubFrZmeI3I= +k8s.io/api v0.26.1 h1:f+SWYiPd/GsiWwVRz+NbFyCgvv75Pk9NK6dlkZgpCRQ= +k8s.io/api v0.26.1/go.mod h1:xd/GBNgR0f707+ATNyPmQ1oyKSgndzXij81FzWGsejg= +k8s.io/apimachinery v0.26.1 h1:8EZ/eGJL+hY/MYCNwhmDzVqq2lPl3N3Bo8rvweJwXUQ= +k8s.io/apimachinery v0.26.1/go.mod h1:tnPmbONNJ7ByJNz9+n9kMjNP8ON+1qoAIIC70lztu74= +k8s.io/client-go v0.26.1 h1:87CXzYJnAMGaa/IDDfRdhTzxk/wzGZ+/HUQpqgVSZXU= +k8s.io/client-go v0.26.1/go.mod h1:IWNSglg+rQ3OcvDkhY6+QLeasV4OYHDjdqeWkDQZwGE= +k8s.io/code-generator v0.26.1 h1:dusFDsnNSKlMFYhzIM0jAO1OlnTN5WYwQQ+Ai12IIlo= +k8s.io/code-generator v0.26.1/go.mod h1:OMoJ5Dqx1wgaQzKgc+ZWaZPfGjdRq/Y3WubFrZmeI3I= k8s.io/gengo v0.0.0-20220902162205-c0856e24416d h1:U9tB195lKdzwqicbJvyJeOXV7Klv+wNAWENRnXEGi08= k8s.io/gengo v0.0.0-20220902162205-c0856e24416d/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E= k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8= k8s.io/klog v1.0.0/go.mod h1:4Bi6QPql/J/LkTDqv7R/cd3hPo4k2DG6Ptcz060Ez5I= k8s.io/klog/v2 v2.2.0/go.mod h1:Od+F08eJP+W3HUb4pSrPpgp9DGU4GzlpG/TmITuYh/Y= -k8s.io/klog/v2 v2.80.1 h1:atnLQ121W371wYYFawwYx1aEY2eUfs4l3J72wtgAwV4= -k8s.io/klog/v2 v2.80.1/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0= +k8s.io/klog/v2 v2.90.0 h1:VkTxIV/FjRXn1fgNNcKGM8cfmL1Z33ZjXRTVxKCoF5M= +k8s.io/klog/v2 v2.90.0/go.mod h1:y1WjHnz7Dj687irZUWR/WLkLc5N1YHtjLdmgWjndZn0= k8s.io/kube-openapi v0.0.0-20221012153701-172d655c2280 h1:+70TFaan3hfJzs+7VK2o+OGxg8HsuBr/5f6tVAjDu6E= k8s.io/kube-openapi v0.0.0-20221012153701-172d655c2280/go.mod h1:+Axhij7bCpeqhklhUTe3xmOn6bWxolyZEeyaFpjGtl4= k8s.io/utils v0.0.0-20221107191617-1a15be271d1d h1:0Smp/HP1OH4Rvhe+4B8nWGERtlqAGSftbSbbmm45oFs= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/helm/sealed-secrets/Chart.yaml new/sealed-secrets-0.19.5/helm/sealed-secrets/Chart.yaml --- old/sealed-secrets-0.19.4/helm/sealed-secrets/Chart.yaml 2023-01-16 13:33:53.000000000 +0100 +++ new/sealed-secrets-0.19.5/helm/sealed-secrets/Chart.yaml 2023-02-15 13:34:44.000000000 +0100 @@ -1,7 +1,7 @@ annotations: category: DeveloperTools apiVersion: v2 -appVersion: v0.19.3 +appVersion: v0.19.4 description: Helm chart for the sealed-secrets controller. home: https://github.com/bitnami-labs/sealed-secrets icon: https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png @@ -14,4 +14,4 @@ url: https://github.com/bitnami-labs/sealed-secrets name: sealed-secrets type: application -version: 2.7.2 +version: 2.7.3 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/helm/sealed-secrets/README.md new/sealed-secrets-0.19.5/helm/sealed-secrets/README.md --- old/sealed-secrets-0.19.4/helm/sealed-secrets/README.md 2023-01-16 13:33:53.000000000 +0100 +++ new/sealed-secrets-0.19.5/helm/sealed-secrets/README.md 2023-02-15 13:34:44.000000000 +0100 @@ -70,14 +70,14 @@ ### Common parameters -| Name | Description | Value | -| ------------------ | ------------------------------------------------------- | ----- | -| `kubeVersion` | Override Kubernetes version | `""` | -| `nameOverride` | String to partially override sealed-secrets.fullname | `""` | -| `fullnameOverride` | String to fully override sealed-secrets.fullname | `""` | -| `namespace` | Namespace where to deploy the Sealed Secrets controller | `""` | -| `extraDeploy` | Array of extra objects to deploy with the release | `[]` | -| `commonAnnotations`| Annotations to add to all deployed resources | `[]` | +| Name | Description | Value | +| ------------------- | ------------------------------------------------------- | ----- | +| `kubeVersion` | Override Kubernetes version | `""` | +| `nameOverride` | String to partially override sealed-secrets.fullname | `""` | +| `fullnameOverride` | String to fully override sealed-secrets.fullname | `""` | +| `namespace` | Namespace where to deploy the Sealed Secrets controller | `""` | +| `extraDeploy` | Array of extra objects to deploy with the release | `[]` | +| `commonAnnotations` | Annotations to add to all deployed resources | `{}` | ### Sealed Secrets Parameters @@ -86,7 +86,7 @@ | ------------------------------------------------- | ------------------------------------------------------------------------------------ | ----------------------------------- | | `image.registry` | Sealed Secrets image registry | `docker.io` | | `image.repository` | Sealed Secrets image repository | `bitnami/sealed-secrets-controller` | -| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `v0.19.3` | +| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `v0.19.4` | | `image.pullPolicy` | Sealed Secrets image pull policy | `IfNotPresent` | | `image.pullSecrets` | Sealed Secrets image pull secrets | `[]` | | `createController` | Specifies whether the Sealed Secrets controller should be created | `true` | @@ -96,8 +96,6 @@ | `rateLimit` | Number of allowed sustained request per second for verify endpoint | `""` | | `rateLimitBurst` | Number of requests allowed to exceed the rate limit per second for verify endpoint | `""` | | `additionalNamespaces` | List of namespaces used to manage the Sealed Secrets | `[]` | -| `additionalVolumes` | Extra volumes to be added to the controller deployment | `[]` | -| `additionalVolumeMounts` | Extra volumeMounts to be added to the controller deployment's container | `[]` | | `command` | Override default container command | `[]` | | `args` | Override default container args | `[]` | | `livenessProbe.enabled` | Enable livenessProbe on Sealed Secret containers | `true` | @@ -129,7 +127,7 @@ | `containerSecurityContext.readOnlyRootFilesystem` | Whether the Sealed Secret container has a read-only root filesystem | `true` | | `containerSecurityContext.runAsNonRoot` | Indicates that the Sealed Secret container must run as a non-root user | `true` | | `containerSecurityContext.runAsUser` | Set Sealed Secret containers' Security Context runAsUser | `1001` | -| `automountServiceAccountToken` | Whether to automatically mount the service account API-token to a particular pod | `""` | +| `automountServiceAccountToken` | whether to automatically mount the service account API-token to a particular pod | `""` | | `podLabels` | Extra labels for Sealed Secret pods | `{}` | | `podAnnotations` | Annotations for Sealed Secret pods | `{}` | | `priorityClassName` | Sealed Secret pods' priorityClassName | `""` | @@ -137,8 +135,10 @@ | `affinity` | Affinity for Sealed Secret pods assignment | `{}` | | `nodeSelector` | Node labels for Sealed Secret pods assignment | `{}` | | `tolerations` | Tolerations for Sealed Secret pods assignment | `[]` | -| `hostNetwork` | Run Sealed Secret pods in the host network of the node where the pod is deployed | `false` | -| `dnsPolicy` | Sealed Secret pods' dnsPolicy | `""` | +| `additionalVolumes` | Extra Volumes for the Sealed Secrets Controller Deployment | `{}` | +| `additionalVolumeMounts` | Extra volumeMounts for the Sealed Secrets Controller container | `{}` | +| `hostNetwork` | Sealed Secrets pods' hostNetwork | `false` | +| `dnsPolicy` | Sealed Secrets pods' dnsPolicy | `""` | ### Traffic Exposure Parameters @@ -169,7 +169,7 @@ | Name | Description | Value | | --------------------------------------------- | ------------------------------------------------------------- | ------- | -| `serviceAccount.annotations` | Extra labels to be added to the ServiceAccount | `{}` | +| `serviceAccount.annotations` | Annotations for Sealed Secret service account | `{}` | | `serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | | `serviceAccount.labels` | Extra labels to be added to the ServiceAccount | `{}` | | `serviceAccount.name` | The name of the ServiceAccount to use. | `""` | @@ -189,8 +189,8 @@ | `metrics.serviceMonitor.labels` | Extra labels for the ServiceMonitor | `{}` | | `metrics.serviceMonitor.annotations` | Extra annotations for the ServiceMonitor | `{}` | | `metrics.serviceMonitor.interval` | How frequently to scrape metrics | `""` | -| `metrics.serviceMonitor.honorLabels` | Specify if ServiceMonitor endPoints will honor labels | `true` | | `metrics.serviceMonitor.scrapeTimeout` | Timeout after which the scrape is ended | `""` | +| `metrics.serviceMonitor.honorLabels` | Specify if ServiceMonitor endPoints will honor labels | `true` | | `metrics.serviceMonitor.metricRelabelings` | Specify additional relabeling of metrics | `[]` | | `metrics.serviceMonitor.relabelings` | Specify general relabeling | `[]` | | `metrics.dashboards.create` | Specifies whether a ConfigMap with a Grafana dashboard configuration should be created | `false` | diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.19.4/helm/sealed-secrets/values.yaml new/sealed-secrets-0.19.5/helm/sealed-secrets/values.yaml --- old/sealed-secrets-0.19.4/helm/sealed-secrets/values.yaml 2023-01-16 13:33:53.000000000 +0100 +++ new/sealed-secrets-0.19.5/helm/sealed-secrets/values.yaml 2023-02-15 13:34:44.000000000 +0100 @@ -33,7 +33,7 @@ image: registry: docker.io repository: bitnami/sealed-secrets-controller - tag: v0.19.3 + tag: v0.19.4 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -252,7 +252,7 @@ ## kubernetes.io/ingress.class: nginx ## cert-manager.io/cluster-issuer: cluster-issuer-name ## - annotations: + annotations: {} ## @param ingress.tls Enable TLS configuration for the host defined at `ingress.hostname` parameter ## TLS certificates will be retrieved from a TLS secret with name: `{{- printf "%s-tls" .Values.ingress.hostname }}` ## You can: ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz /work/SRC/openSUSE:Factory/.kubeseal.new.22824/vendor.tar.gz differ: char 5, line 1