Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kubeseal for openSUSE:Factory checked in at 2023-09-07 21:13:27 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kubeseal (Old) and /work/SRC/openSUSE:Factory/.kubeseal.new.1766 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kubeseal" Thu Sep 7 21:13:27 2023 rev:21 rq:1109441 version:0.23.1 Changes: -------- --- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes 2023-07-18 22:07:35.226808788 +0200 +++ /work/SRC/openSUSE:Factory/.kubeseal.new.1766/kubeseal.changes 2023-09-07 21:14:48.945755366 +0200 @@ -1,0 +2,18 @@ +Thu Sep 07 07:24:51 UTC 2023 - [email protected] + +- Update to version 0.23.1: + * Release notes for v0.23.1 (#1291) + * Bump golang.org/x/crypto from 0.11.0 to 0.12.0 (#1287) + * feat: allow changing the default revisionHistoryLimit (#1286) + * Introduce KUBESEAL_VERSION for Linux installation (#1275) + * securityContext adjusted (#1261) + * Bump k8s.io/code-generator from 0.27.3 to 0.27.4 (#1278) + * Bump k8s.io/client-go from 0.27.3 to 0.27.4 (#1277) + * Bump github.com/onsi/gomega from 1.27.8 to 1.27.10 (#1279) + * Bump k8s.io/api from 0.27.3 to 0.27.4 (#1281) + * Release carvel package v2.11.0 (#1273) + * Create an Install Sealed Secrets tutorial for Sealed Secrets + public documentation (#1270) + * Release chart 2.11.0 (#1272) + +------------------------------------------------------------------- Old: ---- sealed-secrets-0.23.0.obscpio New: ---- sealed-secrets-0.23.1.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ kubeseal.spec ++++++ --- /var/tmp/diff_new_pack.tUO87G/_old 2023-09-07 21:14:50.401807416 +0200 +++ /var/tmp/diff_new_pack.tUO87G/_new 2023-09-07 21:14:50.405807559 +0200 @@ -21,7 +21,7 @@ %define archive_name sealed-secrets Name: kubeseal -Version: 0.23.0 +Version: 0.23.1 Release: 0 Summary: CLI for encrypting secrets to SealedSecrets License: Apache-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.tUO87G/_old 2023-09-07 21:14:50.433808561 +0200 +++ /var/tmp/diff_new_pack.tUO87G/_new 2023-09-07 21:14:50.437808703 +0200 @@ -1,14 +1,14 @@ <services> - <service name="obs_scm" mode="disabled"> + <service name="obs_scm" mode="manual"> <param name="url">https://github.com/bitnami-labs/sealed-secrets</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v0.23.0</param> + <param name="revision">v0.23.1</param> <param name="versionformat">@PARENT_TAG@</param> <param name="changesgenerate">enable</param> <param name="versionrewrite-pattern">v(.*)</param> </service> - <service name="set_version" mode="disabled"> + <service name="set_version" mode="manual"> <param name="basename">sealed-secrets</param> </service> <service name="tar" mode="buildtime"/> @@ -16,8 +16,8 @@ <param name="file">*.tar</param> <param name="compression">gz</param> </service> - <service name="go_modules" mode="disabled"> - <param name="archive">sealed-secrets-0.23.0.obscpio</param> + <service name="go_modules" mode="manual"> + <param name="archive">sealed-secrets-0.23.1.obscpio</param> </service> </services> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.tUO87G/_old 2023-09-07 21:14:50.453809275 +0200 +++ /var/tmp/diff_new_pack.tUO87G/_new 2023-09-07 21:14:50.457809418 +0200 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/bitnami-labs/sealed-secrets</param> - <param name="changesrevision">ad430d5c2bb7cf8ac53024b49930ddd0ef34390f</param></service></servicedata> + <param name="changesrevision">daa514e978924ee31007b6213783b7e4623a08c1</param></service></servicedata> (No newline at EOF) ++++++ sealed-secrets-0.23.0.obscpio -> sealed-secrets-0.23.1.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/README.md new/sealed-secrets-0.23.1/README.md --- old/sealed-secrets-0.23.0/README.md 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/README.md 2023-08-17 14:19:21.000000000 +0200 @@ -379,8 +379,9 @@ The `kubeseal` client can be installed on Linux, using the below commands: ```bash -wget https://github.com/bitnami-labs/sealed-secrets/releases/download/<release-tag>/kubeseal-<version>-linux-amd64.tar.gz -tar -xvzf kubeseal-<version>-linux-amd64.tar.gz kubeseal +KUBESEAL_VERSION='' # Set this to, for example, KUBESEAL_VERSION='0.23.0' +wget "https://github.com/bitnami-labs/sealed-secrets/releases/download/v${KUBESEAL_VERSION:?}/kubeseal-${KUBESEAL_VERSION:?}-linux-amd64.tar.gz" +tar -xvzf kubeseal-${KUBESEAL_VERSION:?}-linux-amd64.tar.gz kubeseal sudo install -m 755 kubeseal /usr/local/bin/kubeseal ``` diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/RELEASE-NOTES.md new/sealed-secrets-0.23.1/RELEASE-NOTES.md --- old/sealed-secrets-0.23.0/RELEASE-NOTES.md 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/RELEASE-NOTES.md 2023-08-17 14:19:21.000000000 +0200 @@ -4,6 +4,18 @@ [](https://github.com/bitnami-labs/sealed-secrets/releases/latest) +## v0.23.1 + +### Changelog + +- securityContext adjusted ([#1261](https://github.com/bitnami-labs/sealed-secrets/pull/1261)) +- allow changing the default revisionHistoryLimit ([#1286](https://github.com/bitnami-labs/sealed-secrets/pull/1286)) +- Bump k8s.io/client-go from 0.27.3 to 0.27.4 ([#1277](https://github.com/bitnami-labs/sealed-secrets/pull/1277)) +- Bump k8s.io/code-generator from 0.27.3 to 0.27.4 ([#1278](https://github.com/bitnami-labs/sealed-secrets/pull/1278)) +- Bump github.com/onsi/gomega from 1.27.8 to 1.27.10 ([#1279](https://github.com/bitnami-labs/sealed-secrets/pull/1279)) +- Bump k8s.io/api from 0.27.3 to 0.27.4 ([#1281](https://github.com/bitnami-labs/sealed-secrets/pull/1281)) +- Bump golang.org/x/crypto from 0.11.0 to 0.12.0 ([#1287](https://github.com/bitnami-labs/sealed-secrets/pull/1287) + ## v0.23.0 ### Changelog diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/carvel/package.yaml new/sealed-secrets-0.23.1/carvel/package.yaml --- old/sealed-secrets-0.23.0/carvel/package.yaml 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/carvel/package.yaml 2023-08-17 14:19:21.000000000 +0200 @@ -1,10 +1,10 @@ apiVersion: data.packaging.carvel.dev/v1alpha1 kind: Package metadata: - name: "sealedsecrets.bitnami.com.2.10.0" + name: "sealedsecrets.bitnami.com.2.11.0" spec: refName: "sealedsecrets.bitnami.com" - version: "2.10.0" + version: "2.11.0" valuesSchema: openAPIv3: title: Chart Values @@ -45,7 +45,7 @@ tag: type: string description: Sealed Secrets image tag (immutable tags are recommended) - default: v0.22.0 + default: v0.23.0 pullPolicy: type: string description: Sealed Secrets image pull policy @@ -424,7 +424,7 @@ spec: fetch: - imgpkgBundle: - image: ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-0c818925ba10ba03f1d7e8b26fa331e42610f957b6891338e2a59e814ec853b5.imgpkg + image: ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-2fcd014eab7877bba7ec295e928a19ef18ab4d9643bb2dea07a8f9e92ac94e1e.imgpkg template: - helmTemplate: path: sealed-secrets diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/controller-norbac.jsonnet new/sealed-secrets-0.23.1/controller-norbac.jsonnet --- old/sealed-secrets-0.23.0/controller-norbac.jsonnet 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/controller-norbac.jsonnet 2023-08-17 14:19:21.000000000 +0200 @@ -40,6 +40,11 @@ spec+: { securityContext+: { fsGroup: 65534, + runAsNonRoot: true, + runAsUser: 1001, + seccompProfile+: { + type: 'RuntimeDefault', + } }, containers_+: { controller: kube.Container('sealed-secrets-controller') { @@ -54,9 +59,11 @@ http: { containerPort: 8080 }, }, securityContext+: { + allowPrivilegeEscalation: false, + capabilities+: { + drop: [ 'ALL' ], + }, readOnlyRootFilesystem: true, - runAsNonRoot: true, - runAsUser: 1001, }, volumeMounts_+: { tmp: { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/go.mod new/sealed-secrets-0.23.1/go.mod --- old/sealed-secrets-0.23.0/go.mod 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/go.mod 2023-08-17 14:19:21.000000000 +0200 @@ -8,16 +8,16 @@ github.com/mattn/go-isatty v0.0.19 github.com/mkmik/multierror v0.3.0 github.com/onsi/ginkgo/v2 v2.11.0 - github.com/onsi/gomega v1.27.8 + github.com/onsi/gomega v1.27.10 github.com/prometheus/client_golang v1.16.0 github.com/spf13/pflag v1.0.5 github.com/throttled/throttled v2.2.5+incompatible - golang.org/x/crypto v0.11.0 + golang.org/x/crypto v0.12.0 gopkg.in/yaml.v2 v2.4.0 - k8s.io/api v0.27.3 - k8s.io/apimachinery v0.27.3 - k8s.io/client-go v0.27.3 - k8s.io/code-generator v0.27.3 + k8s.io/api v0.27.4 + k8s.io/apimachinery v0.27.4 + k8s.io/client-go v0.27.4 + k8s.io/code-generator v0.27.4 k8s.io/klog v1.0.0 k8s.io/klog/v2 v2.100.1 ) @@ -55,11 +55,11 @@ github.com/prometheus/common v0.42.0 // indirect github.com/prometheus/procfs v0.10.1 // indirect golang.org/x/mod v0.10.0 // indirect - golang.org/x/net v0.10.0 // indirect + golang.org/x/net v0.12.0 // indirect golang.org/x/oauth2 v0.5.0 // indirect - golang.org/x/sys v0.10.0 // indirect - golang.org/x/term v0.10.0 // indirect - golang.org/x/text v0.11.0 // indirect + golang.org/x/sys v0.11.0 // indirect + golang.org/x/term v0.11.0 // indirect + golang.org/x/text v0.12.0 // indirect golang.org/x/time v0.0.0-20220210224613-90d013bbcef8 // indirect golang.org/x/tools v0.9.3 // indirect google.golang.org/appengine v1.6.7 // indirect diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/go.sum new/sealed-secrets-0.23.1/go.sum --- old/sealed-secrets-0.23.0/go.sum 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/go.sum 2023-08-17 14:19:21.000000000 +0200 @@ -128,8 +128,8 @@ github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= github.com/onsi/ginkgo/v2 v2.11.0 h1:WgqUCUt/lT6yXoQ8Wef0fsNn5cAuMK7+KT9UFRz2tcU= github.com/onsi/ginkgo/v2 v2.11.0/go.mod h1:ZhrRA5XmEE3x3rhlzamx/JJvujdZoJ2uvgI7kR0iZvM= -github.com/onsi/gomega v1.27.8 h1:gegWiwZjBsf2DgiSbf5hpokZ98JVDMcWkUiigk6/KXc= -github.com/onsi/gomega v1.27.8/go.mod h1:2J8vzI/s+2shY9XHRApDkdgPo1TKT7P2u6fXeJKFnNQ= +github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI= +github.com/onsi/gomega v1.27.10/go.mod h1:RsS8tutOdbdgzbPtzzATp12yT7kM5I5aElG3evPbQ0M= github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= @@ -144,7 +144,7 @@ github.com/prometheus/procfs v0.10.1 h1:kYK1Va/YMlutzCGazswoHKo//tZVlFpKYh+PymziUAg= github.com/prometheus/procfs v0.10.1/go.mod h1:nwNm2aOCAYw8uTR/9bWRREkZFxAUcWzPHWJq+XBB/FM= github.com/rogpeppe/fastuuid v1.2.0/go.mod h1:jVj6XXZzXRy/MSR5jhDC/2q6DgLz+nrA6LYCDYWNEvQ= -github.com/rogpeppe/go-internal v1.10.0 h1:TMyTOH3F/DB16zRVcYyreMH6GnZZrwQVAoYjRBZyWFQ= +github.com/rogpeppe/go-internal v1.11.0 h1:cWPaGQEPrBb5/AsnsZesgZZ9yb1OQ+GOISoDNXVBh4M= github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA= github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA= github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= @@ -170,8 +170,8 @@ golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= -golang.org/x/crypto v0.11.0 h1:6Ewdq3tDic1mg5xRO4milcWCfMVQhI4NkqWWvqejpuA= -golang.org/x/crypto v0.11.0/go.mod h1:xgJhtzW8F9jGdVFWZESrid1U1bjeNy4zgy5cRr/CIio= +golang.org/x/crypto v0.12.0 h1:tFM/ta59kqch6LlvYnPa0yx5a83cL2nHflFhYKvv9Yk= +golang.org/x/crypto v0.12.0/go.mod h1:NF0Gs7EO5K4qLn+Ylc+fih8BSTeIjAP05siRnAh98yw= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU= @@ -193,8 +193,8 @@ golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU= golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM= golang.org/x/net v0.0.0-20210805182204-aaa1db679c0d/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= -golang.org/x/net v0.10.0 h1:X2//UzNDwYmtCLn7To6G58Wr6f5ahEAQgKNzv9Y951M= -golang.org/x/net v0.10.0/go.mod h1:0qNGK6F8kojg2nk9dLZ2mShWaEBan6FAoqfSigmmuDg= +golang.org/x/net v0.12.0 h1:cfawfvKITfUsFCeJIHJrbSxpeu/E81khclypR0GVT50= +golang.org/x/net v0.12.0/go.mod h1:zEVYFnQC7m/vmpQFELhcD1EWkZlX69l4oqgmer6hfKA= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20200107190931-bf48bf16ab8d/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.5.0 h1:HuArIo48skDwlrvM3sEdHXElYslAMsf3KwRkkW4MC4s= @@ -216,18 +216,18 @@ golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.10.0 h1:SqMFp9UcQJZa+pmYuAKjd9xq1f0j5rLcDIk0mj4qAsA= -golang.org/x/sys v0.10.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.11.0 h1:eG7RXZHdqOJ1i+0lgLgCpSXAp6M3LYlAo6osgSi0xOM= +golang.org/x/sys v0.11.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= -golang.org/x/term v0.10.0 h1:3R7pNqamzBraeqj/Tj8qt1aQ2HpmlC+Cx/qL/7hn4/c= -golang.org/x/term v0.10.0/go.mod h1:lpqdcUyK/oCiQxvxVrppt5ggO2KCZ5QblwqPnfZ6d5o= +golang.org/x/term v0.11.0 h1:F9tnn/DA/Im8nCwm+fX+1/eBwi4qFjRT++MhtVC4ZX0= +golang.org/x/term v0.11.0/go.mod h1:zC9APTIj3jG3FdV/Ons+XE1riIZXG4aZ4GTHiPZJPIU= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk= golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= -golang.org/x/text v0.11.0 h1:LAntKIrcmeSKERyiOh0XMV39LXS8IE9UL2yP7+f5ij4= -golang.org/x/text v0.11.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= +golang.org/x/text v0.12.0 h1:k+n5B8goJNdU7hSvEtMUz3d1Q6D/XW4COJSJR6fN0mc= +golang.org/x/text v0.12.0/go.mod h1:TvPlkZtksWOMsz7fbANvkp4WM8x/WCo/om8BMLbz+aE= golang.org/x/time v0.0.0-20220210224613-90d013bbcef8 h1:vVKdlvoWBphwdxWKrFZEuM0kGgGLxUOYcY4U/2Vjg44= golang.org/x/time v0.0.0-20220210224613-90d013bbcef8/go.mod h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= @@ -292,14 +292,14 @@ gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -k8s.io/api v0.27.3 h1:yR6oQXXnUEBWEWcvPWS0jQL575KoAboQPfJAuKNrw5Y= -k8s.io/api v0.27.3/go.mod h1:C4BNvZnQOF7JA/0Xed2S+aUyJSfTGkGFxLXz9MnpIpg= -k8s.io/apimachinery v0.27.3 h1:Ubye8oBufD04l9QnNtW05idcOe9Z3GQN8+7PqmuVcUM= -k8s.io/apimachinery v0.27.3/go.mod h1:XNfZ6xklnMCOGGFNqXG7bUrQCoR04dh/E7FprV6pb+E= -k8s.io/client-go v0.27.3 h1:7dnEGHZEJld3lYwxvLl7WoehK6lAq7GvgjxpA3nv1E8= -k8s.io/client-go v0.27.3/go.mod h1:2MBEKuTo6V1lbKy3z1euEGnhPfGZLKTS9tiJ2xodM48= -k8s.io/code-generator v0.27.3 h1:JRhRQkzKdQhHmv9s5f7vuqveL8qukAQ2IqaHm6MFspM= -k8s.io/code-generator v0.27.3/go.mod h1:DPung1sI5vBgn4AGKtlPRQAyagj/ir/4jI55ipZHVww= +k8s.io/api v0.27.4 h1:0pCo/AN9hONazBKlNUdhQymmnfLRbSZjd5H5H3f0bSs= +k8s.io/api v0.27.4/go.mod h1:O3smaaX15NfxjzILfiln1D8Z3+gEYpjEpiNA/1EVK1Y= +k8s.io/apimachinery v0.27.4 h1:CdxflD4AF61yewuid0fLl6bM4a3q04jWel0IlP+aYjs= +k8s.io/apimachinery v0.27.4/go.mod h1:XNfZ6xklnMCOGGFNqXG7bUrQCoR04dh/E7FprV6pb+E= +k8s.io/client-go v0.27.4 h1:vj2YTtSJ6J4KxaC88P4pMPEQECWMY8gqPqsTgUKzvjk= +k8s.io/client-go v0.27.4/go.mod h1:ragcly7lUlN0SRPk5/ZkGnDjPknzb37TICq07WhI6Xc= +k8s.io/code-generator v0.27.4 h1:bw2xFEBnthhCSC7Bt6FFHhPTfWX21IJ30GXxOzywsFE= +k8s.io/code-generator v0.27.4/go.mod h1:DPung1sI5vBgn4AGKtlPRQAyagj/ir/4jI55ipZHVww= k8s.io/gengo v0.0.0-20220902162205-c0856e24416d h1:U9tB195lKdzwqicbJvyJeOXV7Klv+wNAWENRnXEGi08= k8s.io/gengo v0.0.0-20220902162205-c0856e24416d/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E= k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/helm/sealed-secrets/Chart.yaml new/sealed-secrets-0.23.1/helm/sealed-secrets/Chart.yaml --- old/sealed-secrets-0.23.0/helm/sealed-secrets/Chart.yaml 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/helm/sealed-secrets/Chart.yaml 2023-08-17 14:19:21.000000000 +0200 @@ -1,7 +1,7 @@ annotations: category: DeveloperTools apiVersion: v2 -appVersion: v0.22.0 +appVersion: v0.23.0 description: Helm chart for the sealed-secrets controller. home: https://github.com/bitnami-labs/sealed-secrets icon: https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png @@ -14,4 +14,4 @@ url: https://github.com/bitnami-labs/sealed-secrets name: sealed-secrets type: application -version: 2.10.0 +version: 2.11.0 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/helm/sealed-secrets/README.md new/sealed-secrets-0.23.1/helm/sealed-secrets/README.md --- old/sealed-secrets-0.23.0/helm/sealed-secrets/README.md 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/helm/sealed-secrets/README.md 2023-08-17 14:19:21.000000000 +0200 @@ -85,9 +85,10 @@ | ------------------------------------------------- | -------------------------------------------------------------------------------------- | ----------------------------------- | | `image.registry` | Sealed Secrets image registry | `docker.io` | | `image.repository` | Sealed Secrets image repository | `bitnami/sealed-secrets-controller` | -| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `v0.22.0` | +| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `v0.23.0` | | `image.pullPolicy` | Sealed Secrets image pull policy | `IfNotPresent` | | `image.pullSecrets` | Sealed Secrets image pull secrets | `[]` | +| `revisionHistoryLimit` | Number of old history to retain to allow rollback. Default 10 | `""` | | `createController` | Specifies whether the Sealed Secrets controller should be created | `true` | | `secretName` | The name of an existing TLS secret containing the key used to encrypt secrets | `sealed-secrets-key` | | `updateStatus` | Specifies whether the Sealed Secrets controller should update the status subresource | `true` | @@ -95,9 +96,9 @@ | `keyrenewperiod` | Specifies key renewal period. Default 30 days | `""` | | `rateLimit` | Number of allowed sustained request per second for verify endpoint | `""` | | `rateLimitBurst` | Number of requests allowed to exceed the rate limit per second for verify endpoint | `""` | -| `additionalNamespaces` | List of namespaces used to manage the Sealed Secrets | `[]` +| `additionalNamespaces` | List of namespaces used to manage the Sealed Secrets | `[]` | | `privateKeyAnnotations` | Map of annotations to be set on the sealing keypairs | `{}` | -| `privateKeyLabels` | Map of labels to be set on the sealing keypairs | `{}` | +| `privateKeyLabels` | Map of labels to be set on the sealing keypairs | `{}` | | `logInfoStdout` | Specifies whether the Sealed Secrets controller will log info to stdout | `false` | | `command` | Override default container command | `[]` | | `args` | Override default container args | `[]` | @@ -145,45 +146,45 @@ ### Traffic Exposure Parameters -| Name | Description | Value | -| -------------------------- | -------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | -| `service.type` | Sealed Secret service type | `ClusterIP` | -| `service.port` | Sealed Secret service HTTP port | `8080` | -| `service.nodePort` | Node port for HTTP | `""` | -| `service.annotations` | Additional custom annotations for Sealed Secret service | `{}` | -| `ingress.enabled` | Enable ingress record generation for Sealed Secret | `false` | -| `ingress.pathType` | Ingress path type | `ImplementationSpecific` | -| `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | -| `ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress | `""` | -| `ingress.hostname` | Default host for the ingress record | `sealed-secrets.local` | -| `ingress.path` | Default path for the ingress record | `/v1/cert.pem` | -| `ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | -| `ingress.tls` | Enable TLS configuration for the host defined at `ingress.hostname` parameter | `false` | -| `ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | -| `ingress.extraHosts` | An array with additional hostname(s) to be covered with the ingress record | `[]` | -| `ingress.extraPaths` | An array with additional arbitrary paths that may need to be added to the ingress under the main host | `[]` | -| `ingress.extraTls` | TLS configuration for additional hostname(s) to be covered with this ingress record | `[]` | -| `ingress.secrets` | Custom TLS certificates as secrets | `[]` | -| `networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `false` | -| `networkPolicy.egress.enabled` | Specifies wheter a egress is set in the NetworkPolicy | `false` | -| `networkPolicy.egress.kubeapiCidr` | Specifies the kubeapiCidr, which is the only egress allowed. If not set, kubeapiCidr will be found using Helm lookup | `""` | -| `networkPolicy.egress.kubeapiPort` | Specifies the kubeapiPort, which is the only egress allowed. If not set, kubeapiPort will be found using Helm lookup | `""` | +| Name | Description | Value | +| ---------------------------------- | -------------------------------------------------------------------------------------------------------------------------------- | ------------------------ | +| `service.type` | Sealed Secret service type | `ClusterIP` | +| `service.port` | Sealed Secret service HTTP port | `8080` | +| `service.nodePort` | Node port for HTTP | `""` | +| `service.annotations` | Additional custom annotations for Sealed Secret service | `{}` | +| `ingress.enabled` | Enable ingress record generation for Sealed Secret | `false` | +| `ingress.pathType` | Ingress path type | `ImplementationSpecific` | +| `ingress.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` | +| `ingress.ingressClassName` | IngressClass that will be be used to implement the Ingress | `""` | +| `ingress.hostname` | Default host for the ingress record | `sealed-secrets.local` | +| `ingress.path` | Default path for the ingress record | `/v1/cert.pem` | +| `ingress.annotations` | Additional annotations for the Ingress resource. To enable certificate autogeneration, place here your cert-manager annotations. | `{}` | +| `ingress.tls` | Enable TLS configuration for the host defined at `ingress.hostname` parameter | `false` | +| `ingress.selfSigned` | Create a TLS secret for this ingress record using self-signed certificates generated by Helm | `false` | +| `ingress.extraHosts` | An array with additional hostname(s) to be covered with the ingress record | `[]` | +| `ingress.extraPaths` | An array with additional arbitrary paths that may need to be added to the ingress under the main host | `[]` | +| `ingress.extraTls` | TLS configuration for additional hostname(s) to be covered with this ingress record | `[]` | +| `ingress.secrets` | Custom TLS certificates as secrets | `[]` | +| `networkPolicy.enabled` | Specifies whether a NetworkPolicy should be created | `false` | +| `networkPolicy.egress.enabled` | Specifies wheter a egress is set in the NetworkPolicy | `false` | +| `networkPolicy.egress.kubeapiCidr` | Specifies the kubeapiCidr, which is the only egress allowed. If not set, kubeapiCidr will be found using Helm lookup | `""` | +| `networkPolicy.egress.kubeapiPort` | Specifies the kubeapiPort, which is the only egress allowed. If not set, kubeapiPort will be found using Helm lookup | `""` | ### Other Parameters -| Name | Description | Value | -| ---------------------------- | ------------------------------------------------------------- | ------------------ | -| `serviceAccount.annotations` | Annotations for Sealed Secret service account | `{}` | -| `serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `serviceAccount.labels` | Extra labels to be added to the ServiceAccount | `{}` | -| `serviceAccount.name` | The name of the ServiceAccount to use. | `""` | -| `rbac.create` | Specifies whether RBAC resources should be created | `true` | -| `rbac.clusterRole` | Specifies whether the Cluster Role resource should be created | `true` | -| `rbac.clusterRoleName` | Specifies the name for the Cluster Role resource | `secrets-unsealer` | +| Name | Description | Value | +| ---------------------------- | -------------------------------------------------------------------------------------------------------- | ------------------ | +| `serviceAccount.annotations` | Annotations for Sealed Secret service account | `{}` | +| `serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `serviceAccount.labels` | Extra labels to be added to the ServiceAccount | `{}` | +| `serviceAccount.name` | The name of the ServiceAccount to use. | `""` | +| `rbac.create` | Specifies whether RBAC resources should be created | `true` | +| `rbac.clusterRole` | Specifies whether the Cluster Role resource should be created | `true` | +| `rbac.clusterRoleName` | Specifies the name for the Cluster Role resource | `secrets-unsealer` | | `rbac.namespacedRoles` | Specifies whether the namespaced Roles should be created (in each of the specified additionalNamespaces) | `false` | -| `rbac.namespacedRolesName` | Specifies the name for the namesapced Role resource | `secrets-unsealer` | -| `rbac.labels` | Extra labels to be added to RBAC resources | `{}` | -| `rbac.pspEnabled` | PodSecurityPolicy | `false` | +| `rbac.namespacedRolesName` | Specifies the name for the namesapced Role resource | `secrets-unsealer` | +| `rbac.labels` | Extra labels to be added to RBAC resources | `{}` | +| `rbac.pspEnabled` | PodSecurityPolicy | `false` | ### Metrics parameters diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/helm/sealed-secrets/templates/deployment.yaml new/sealed-secrets-0.23.1/helm/sealed-secrets/templates/deployment.yaml --- old/sealed-secrets-0.23.0/helm/sealed-secrets/templates/deployment.yaml 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/helm/sealed-secrets/templates/deployment.yaml 2023-08-17 14:19:21.000000000 +0200 @@ -10,6 +10,9 @@ {{- end }} spec: replicas: 1 + {{- if .Values.revisionHistoryLimit }} + revisionHistoryLimit: {{ .Values.revisionHistoryLimit }} + {{- end }} selector: matchLabels: {{- include "sealed-secrets.matchLabels" . | nindent 6 }} template: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/helm/sealed-secrets/values.yaml new/sealed-secrets-0.23.1/helm/sealed-secrets/values.yaml --- old/sealed-secrets-0.23.0/helm/sealed-secrets/values.yaml 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/helm/sealed-secrets/values.yaml 2023-08-17 14:19:21.000000000 +0200 @@ -12,6 +12,7 @@ ## @param namespace Namespace where to deploy the Sealed Secrets controller ## namespace: "" + ## @param extraDeploy [array] Array of extra objects to deploy with the release ## extraDeploy: [] @@ -33,7 +34,7 @@ image: registry: docker.io repository: bitnami/sealed-secrets-controller - tag: v0.22.0 + tag: v0.23.0 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -47,6 +48,9 @@ ## - myRegistryKeySecretName ## pullSecrets: [] +## @param revisionHistoryLimit Number of old history to retain to allow rollback (If not set, default Kubernetes value is set to 10) +## e.g: +revisionHistoryLimit: "" ## @param createController Specifies whether the Sealed Secrets controller should be created ## createController: true diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/site/content/docs/latest/tutorials/README.md new/sealed-secrets-0.23.1/site/content/docs/latest/tutorials/README.md --- old/sealed-secrets-0.23.0/site/content/docs/latest/tutorials/README.md 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/site/content/docs/latest/tutorials/README.md 2023-08-17 14:19:21.000000000 +0200 @@ -7,6 +7,7 @@ | Tutorial | Description | |-----------------------------------------|------------------------------------------------------------------------------------------------------------------------------| | [Getting started](./getting-started.md) | This guide walks you through the process of deploying Sealed Secrets for your cluster and installing an example Sealed Secrets. | +| [Sealed Secrets controller installation](./install-sealed-secrets.md) | Here we cover the different alternatives to install the Sealed Secrets controller, with special notes for environments with restricted permissions. | Alternatively, if you have a specific goal, but are already familiar with Sealed Secrets, take a look at our [How-to guides](../howto/README.md). These have more in-depth detail and can be applied to a broader set of features. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/site/content/docs/latest/tutorials/install-sealed-secrets.md new/sealed-secrets-0.23.1/site/content/docs/latest/tutorials/install-sealed-secrets.md --- old/sealed-secrets-0.23.0/site/content/docs/latest/tutorials/install-sealed-secrets.md 1970-01-01 01:00:00.000000000 +0100 +++ new/sealed-secrets-0.23.1/site/content/docs/latest/tutorials/install-sealed-secrets.md 2023-08-17 14:19:21.000000000 +0200 @@ -0,0 +1,109 @@ +# Sealed Secrets controller installation + +<!-- START doctoc generated TOC please keep comment here to allow auto update --> +<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE --> + +- [Assumptions and prerequisites](#assumptions-and-prerequisites) +- [Installing from Manifests](#installing-from-manifests) + - [Installing in a GKE cluster](#installing-in-a-gke-cluster) +- [Installing the Helm Chart](#installing-the-helm-chart) + - [Installing in an Openshift cluster](#installing-in-an-openshift-cluster) +- [Installing the Carvel package](#installing-the-carvel-package) + +<!-- END doctoc generated TOC please keep comment here to allow auto update --> + +## Assumptions and prerequisites + +- You have access to an existing Kubernetes cluster (v1.16+). +- You have [`kubectl`](https://kubernetes.io/docs/tasks/tools/) command-line interface installed and configured to talk to your Kubernetes cluster. +- For the Helm installation, you have the [`helm`](https://helm.sh/docs/intro/install/) (v3.1.0+) command-line interface installed and configured to talk to your Kubernetes cluster. +- For the Carvel installation, you have the [`kapp`](https://carvel.dev/kapp/docs/latest/install/) command-line interface installed and configured to talk to your Kubernetes cluster. + +The controller can be deployed using three different methods: direct yaml manifest installation, helm chart or carvel package. + +## Installing from Manifests + +Sealed secrets controller manifests are available from the [releases page](https://github.com/bitnami-labs/sealed-secrets/releases). You can choose the most convenient deployment for your cluster: + +- `controller.yaml` Is a full manifest description of all the components required for the Sealed Secrets controller to operate. This includes Cluster role permissions and CRD definitions. +- `controller-norbac.yaml` Is a restricted version of the manifest descriptor. This version does not include CRDs nor Cluster roles. + +To install the controller simply type: + +```console +$ kubectl apply -f https://github.com/bitnami-labs/sealed-secrets/releases/download/{{VERSION}}/controller.yaml + +role.rbac.authorization.k8s.io/sealed-secrets-service-proxier created +rolebinding.rbac.authorization.k8s.io/sealed-secrets-controller created +clusterrolebinding.rbac.authorization.k8s.io/sealed-secrets-controller created +serviceaccount/sealed-secrets-controller created +deployment.apps/sealed-secrets-controller created +customresourcedefinition.apiextensions.k8s.io/sealedsecrets.bitnami.com configured +rolebinding.rbac.authorization.k8s.io/sealed-secrets-service-proxier created +service/sealed-secrets-controller created +role.rbac.authorization.k8s.io/sealed-secrets-key-admin created +clusterrole.rbac.authorization.k8s.io/secrets-unsealer configured +``` + +Where `{{VERSION}}` is the Sealed Secrets latest version (i.e `v0.22.0`). + +Once you deploy the manifest it will create the SealedSecret resource and install the controller into `kube-system` namespace, create a service account and necessary RBAC roles. + +After a few moments, the controller will start, generate a key pair, and be ready for operation. If it does not, check the controller logs. + +### Installing in a GKE cluster + +Installing the controller on GKE clusters without admin rights might be problematic. For that, a `ClusterRoleBinding` will be needed to deploy the controller in the final command. Replace `{{your-email}}` with a valid email, and then deploy the cluster role binding: + +```bash +USER_EMAIL={{your-email}} +kubectl create clusterrolebinding $USER-cluster-admin-binding --clusterrole=cluster-admin --user=$USER_EMAIL +``` + +Please refer to the [GKE how-to](../howto/) for additional instructions on that platform. + +## Installing the Helm Chart + +The Sealed Secrets [Helm chart](https://helm.sh/) is officially supported and hosted in this GitHub repository. +```shell +helm repo add sealed-secrets https://bitnami-labs.github.io/sealed-secrets +helm install sealed-secrets-controller sealed-secrets/sealed-secrets \ +--set namespace=kube-system \ +``` + +> The `kubeseal` CLI assumes that the controller is installed within the `kube-system` namespace by default with a deployment named `sealed-secrets-controller`. The above installation defines the same configuration to avoid unnecessary friction while using kubeseal. + +### Installing in an Openshift cluster + +Openshift installations will require some minor adjustments to comply with the standard Container Security Context restrictions: + +```yaml +containerSecurityContext: + enabled: true + readOnlyRootFilesystem: true + runAsNonRoot: true + runAsUser: null +podSecurityContext: +``` + +## Installing the Carvel package + +It is also possible to install Sealed Secrets as a [Carvel package](https://carvel.dev/kapp-controller/docs/v0.46.0/packaging/). To do so, you'll need to install `kapp-controller` in the target cluster and then deploy the needed `Package` and `PackageInstall` manifests. + +```console +$ kapp deploy -a kc -f https://github.com/vmware-tanzu/carvel-kapp-controller/releases/latest/download/release.yml + +$ kapp deploy -a sealed-secrets-carvel -f https://raw.githubusercontent.com/bitnami-labs/sealed-secrets/main/carvel/package.yaml +Changes + +Namespace Name Kind Conds. Age Op Op st. Wait to Rs Ri +default sealedsecrets.bitnami.com.2.10.0 Package - - create - reconcile - - +... +Succeeded + +$ kubectl get Package +NAME PACKAGEMETADATA NAME VERSION AGE +sealedsecrets.bitnami.com.2.10.0 sealedsecrets.bitnami.com 2.10.0 18s +``` + +Once the Package is available, it'll be necessary to execute the PackageInstall action, following the [carvel documentation](https://carvel.dev/kapp-controller/docs/v0.35.0/packaging-tutorial/#installing-a-package). diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.23.0/site/data/docs/latest-toc.yml new/sealed-secrets-0.23.1/site/data/docs/latest-toc.yml --- old/sealed-secrets-0.23.0/site/data/docs/latest-toc.yml 2023-07-17 12:49:49.000000000 +0200 +++ new/sealed-secrets-0.23.1/site/data/docs/latest-toc.yml 2023-08-17 14:19:21.000000000 +0200 @@ -11,7 +11,8 @@ subfolderitems: - url: /tutorials/getting-started page: Get Started with Sealed Secrets - + - url: /tutorials/install-sealed-secrets + page: Sealed Secrets controller installation - title: How-to guides subfolderitems: - url: /howto/validate-sealed-secrets ++++++ sealed-secrets.obsinfo ++++++ --- /var/tmp/diff_new_pack.tUO87G/_old 2023-09-07 21:14:50.789821286 +0200 +++ /var/tmp/diff_new_pack.tUO87G/_new 2023-09-07 21:14:50.789821286 +0200 @@ -1,5 +1,5 @@ name: sealed-secrets -version: 0.23.0 -mtime: 1689590989 -commit: ad430d5c2bb7cf8ac53024b49930ddd0ef34390f +version: 0.23.1 +mtime: 1692274761 +commit: daa514e978924ee31007b6213783b7e4623a08c1 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz /work/SRC/openSUSE:Factory/.kubeseal.new.1766/vendor.tar.gz differ: char 5, line 1
