Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kubeseal for openSUSE:Factory 
checked in at 2022-06-05 00:45:44
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kubeseal (Old)
 and      /work/SRC/openSUSE:Factory/.kubeseal.new.1548 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kubeseal"

Sun Jun  5 00:45:44 2022 rev:4 rq:980799 version:0.18.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes        2022-04-26 
20:17:56.692773486 +0200
+++ /work/SRC/openSUSE:Factory/.kubeseal.new.1548/kubeseal.changes      
2022-06-05 00:45:47.700382529 +0200
@@ -1,0 +2,26 @@
+Sat Jun 04 18:56:53 UTC 2022 - ka...@b1-systems.de
+
+- Update to version 0.18.0:
+  * New v0.18.0 release (#855)
+  * Update golang target version to latest release 1.18.3 (#854)
+  * Add capability to watch multiple namespaces (#572)
+  * Update gopkg.in/yaml.v3 to v3.0.0 (#852)
+  * Publish images in GHCR (#851)
+  * Remove operator links (#845)
+  * Indent controller installation instructions (#844)
+  * Made gosec a step of the CI (#798)
+  * Update resourcenames in the controller.jsonnet to align it with the helm 
rbac rules (#838)
+  * fix: rbac permission (#828)
+  * Fix gosec warnings (#837)
+  * Cosign signature setup for release and docker image in CI (#810)
+  * Remove race condition in merge (#789)
+  * Gosec g304 (#795)
+  * Update the vmware-image-builder action with the latest release (#834)
+  * Add runtimeClassName as configurable value (#832)
+  * Fix make generate and set up temporally an specific code-generator version 
(#817)
+  * #791 Check if kubeseal encrypts using an expired certificate (#818)
+  * Bump prometheus/client_golang dependency to avoid CVE-2022-21698 and 
crypto dependency to avoid CVE-2022-27191 (#831)
+  * Chart: update registry and bump version (#825)
+  * Bump goreleaser to v1.7.0 (#826)
+
+-------------------------------------------------------------------

Old:
----
  sealed-secrets-0.17.5.tar.gz

New:
----
  sealed-secrets-0.18.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ kubeseal.spec ++++++
--- /var/tmp/diff_new_pack.yQL9K0/_old  2022-06-05 00:45:48.552383250 +0200
+++ /var/tmp/diff_new_pack.yQL9K0/_new  2022-06-05 00:45:48.560383258 +0200
@@ -21,7 +21,7 @@
 %define archive_name sealed-secrets
 
 Name:           kubeseal
-Version:        0.17.5
+Version:        0.18.0
 Release:        0
 Summary:        CLI for encrypting secrets to SealedSecrets
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.yQL9K0/_old  2022-06-05 00:45:48.600383291 +0200
+++ /var/tmp/diff_new_pack.yQL9K0/_new  2022-06-05 00:45:48.604383295 +0200
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/bitnami-labs/sealed-secrets</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.17.5</param>
+    <param name="revision">v0.18.0</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>
@@ -16,7 +16,7 @@
     <param name="compression">gz</param>
   </service>
   <service name="go_modules" mode="disabled">
-    <param name="archive">sealed-secrets-0.17.5.tar.gz</param>
+    <param name="archive">sealed-secrets-0.18.0.tar.gz</param>
   </service>
 </services>
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.yQL9K0/_old  2022-06-05 00:45:48.624383311 +0200
+++ /var/tmp/diff_new_pack.yQL9K0/_new  2022-06-05 00:45:48.628383315 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/bitnami-labs/sealed-secrets</param>
-              <param 
name="changesrevision">e3ec8c0bd83b708b524f74dbea30c94c3a6c59e2</param></service></servicedata>
+              <param 
name="changesrevision">20afb24ae9d8cbc7d064473d18a86d1a006a268c</param></service></servicedata>
 (No newline at EOF)
 

++++++ sealed-secrets-0.17.5.tar.gz -> sealed-secrets-0.18.0.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/.github/workflows/ci.yml 
new/sealed-secrets-0.18.0/.github/workflows/ci.yml
--- old/sealed-secrets-0.17.5/.github/workflows/ci.yml  2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/.github/workflows/ci.yml  2022-06-02 
17:57:36.000000000 +0200
@@ -15,7 +15,7 @@
     runs-on: ubuntu-latest
     strategy:
       matrix:
-        go: ["1.17.8", "1.18.0"]
+        go: ["1.17.11", "1.18.3"]
         os: [ubuntu-latest]
         golangci-lint: ["1.44.2"]
     steps:
@@ -35,12 +35,37 @@
     - name: Run linter
       run: make lint
 
+  gosec:
+    name: Run gosec
+    runs-on: ubuntu-latest
+    strategy:
+      matrix:
+        go: ["1.17.11", "1.18.3"]
+        os: [ubuntu-latest]
+        gosec: ["2.11.0"]
+    steps:
+    - name: Set up Go 1.x
+      uses: actions/setup-go@v2
+      with:
+        go-version: ${{ matrix.go }}
+      id: go
+
+    - name: Check out code into the Go module directory
+      uses: actions/checkout@v2
+
+    - name: Install dependencies
+      run: |
+        go install github.com/securego/gosec/v2/cmd/gosec@v${{ matrix.gosec }}
+
+    - name: Run gosec
+      run: make lint-gosec
+
   test:
     name: Build
     runs-on: ${{ matrix.os }}
     strategy:
       matrix:
-        go: ["1.17.8", "1.18.0"]
+        go: ["1.17.11", "1.18.3"]
         os: [macos-latest, windows-latest, ubuntu-latest]
     steps:
 
@@ -65,7 +90,7 @@
       uses: actions/checkout@v2
 
     - name: Install Cosign
-      uses: sigstore/cosign-installer@v2.1.0
+      uses: sigstore/cosign-installer@v2.3.0
 
     - name: Distroless verify
       run: |
@@ -85,7 +110,7 @@
     - name: Set up Go 1.x
       uses: actions/setup-go@v2
       with:
-        go-version: 1.17.8
+        go-version: 1.18.3
       id: go
 
     - name: Docker build
@@ -125,7 +150,7 @@
     - name: Set up Go 1.x
       uses: actions/setup-go@v2
       with:
-        go-version: 1.17.8
+        go-version: 1.18.3
       id: go
 
     - name: Set up Ginkgo
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.17.5/.github/workflows/helm-vib.yaml 
new/sealed-secrets-0.18.0/.github/workflows/helm-vib.yaml
--- old/sealed-secrets-0.17.5/.github/workflows/helm-vib.yaml   2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/.github/workflows/helm-vib.yaml   2022-06-02 
17:57:36.000000000 +0200
@@ -26,7 +26,7 @@
         with:
           ref: ${{github.event.pull_request.head.ref}}
           repository: ${{github.event.pull_request.head.repo.full_name}}
-      - uses: vmware-labs/vmware-image-builder-action@main
+      - uses: vmware-labs/vmware-image-builder-action@0.2.0
 
   # verify chart in multiple target platforms
   vib-k8s-verify:
@@ -45,7 +45,7 @@
         with:
           ref: ${{ github.event.pull_request.head.ref }}
           repository: ${{ github.event.pull_request.head.repo.full_name }}
-      - uses: vmware-labs/vmware-image-builder-action@main
+      - uses: vmware-labs/vmware-image-builder-action@0.2.0
         with:
           pipeline: vib-platform-verify.json
         env:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/.github/workflows/release.yaml 
new/sealed-secrets-0.18.0/.github/workflows/release.yaml
--- old/sealed-secrets-0.17.5/.github/workflows/release.yaml    2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/.github/workflows/release.yaml    2022-06-02 
17:57:36.000000000 +0200
@@ -10,7 +10,8 @@
   build:
     runs-on: ubuntu-latest
     env:
-      image_name: docker.io/bitnami/sealed-secrets-controller
+      dockerhub_image_name: docker.io/bitnami/sealed-secrets-controller
+      ghcr_image_name: ghcr.io/bitnami-labs/sealed-secrets-controller
     steps:
       # Checkout and set env
       - name: Checkout
@@ -18,7 +19,7 @@
       - name: Set up Go
         uses: actions/setup-go@v2
         with:
-          go-version: 1.17.8
+          go-version: 1.18.3
       - name: Setup kubecfg
         run: |
           mkdir -p ~/bin
@@ -33,7 +34,7 @@
       - name: K8s manifests
         run: |
           export PATH=~/bin:$PATH
-          make CONTROLLER_IMAGE=${{ env.image_name }}:${{ github.ref_name }} 
controller.yaml controller-norbac.yaml
+          make CONTROLLER_IMAGE=${{ env.dockerhub_image_name }}:${{ 
github.ref_name }} controller.yaml controller-norbac.yaml
 
       # Setup env for multi-arch builds
       - name: Set up QEMU
@@ -44,6 +45,14 @@
       - name: Set up Docker Buildx
         uses: docker/setup-buildx-action@v1
 
+      # Setup Cosign
+      - name: Install Cosign
+        uses: sigstore/cosign-installer@v2.3.0
+      - name: Write Cosign key
+        run: echo "$COSIGN_KEY" > /tmp/cosign.key
+        env:
+          COSIGN_KEY: ${{ secrets.COSIGN_KEY }}
+
       # Build & Release binaries
       - name: Run GoReleaser
         uses: goreleaser/goreleaser-action@v2
@@ -53,6 +62,7 @@
           args: release --rm-dist
         env:
           GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
+          COSIGN_PASSWORD: ${{ secrets.COSIGN_PASSWORD }}
 
       # Build & Publish multi-arch image
       - name: Login to Docker Hub
@@ -60,6 +70,19 @@
         with:
           username: ${{ secrets.DOCKERHUB_USERNAME }}
           password: ${{ secrets.DOCKERHUB_PASSWORD }}
+      - name: Login to GHRC
+        uses: docker/login-action@f054a8b539a109f9f41c372932f1ae047eff08c9
+        with:
+          registry: ghcr.io
+          username: ${{ github.actor }}
+          password: ${{ secrets.GITHUB_TOKEN }}
+      - name: Extract metadata (tags, labels) for Docker
+        id: meta
+        uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38
+        with:
+          images: |
+            ${{ env.dockerhub_image_name }}
+            ${{ env.ghcr_image_name }}
       - name: Build and push
         id: docker_build
         uses: docker/build-push-action@v2
@@ -67,5 +90,11 @@
           context: .
           platforms: linux/amd64,linux/arm64,linux/arm
           push: true
-          tags: ${{ env.image_name }}:latest,${{ env.image_name }}:${{ 
github.ref_name }}
-
+          tags: ${{ steps.meta.outputs.tags }}
+      - name: Sign image with a key in GHCR
+        run: |
+          echo -n "$COSIGN_PASSWORD" | cosign sign --key /tmp/cosign.key 
$TAG_CURRENT
+        env:
+          COSIGN_PASSWORD: ${{ secrets.COSIGN_PASSWORD }}
+          TAG_CURRENT: ${{ steps.meta.outputs.tags }}
+          COSIGN_REPOSITORY: ${{ env.ghcr_image_name }}/signs
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/.gitignore 
new/sealed-secrets-0.18.0/.gitignore
--- old/sealed-secrets-0.17.5/.gitignore        2022-04-20 17:20:34.000000000 
+0200
+++ new/sealed-secrets-0.18.0/.gitignore        2022-06-02 17:57:36.000000000 
+0200
@@ -34,3 +34,6 @@
 
 # GoReleaser output dir
 dist/
+
+# Vendor folder
+vendor/
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/.goreleaser.yml 
new/sealed-secrets-0.18.0/.goreleaser.yml
--- old/sealed-secrets-0.17.5/.goreleaser.yml   2022-04-20 17:20:34.000000000 
+0200
+++ new/sealed-secrets-0.18.0/.goreleaser.yml   2022-06-02 17:57:36.000000000 
+0200
@@ -40,6 +40,16 @@
       - '^helm:'
       - '^integration:'
       - '^vendor_jsonnet:'
+signs:
+  - cmd: cosign
+    stdin: '{{ .Env.COSIGN_PASSWORD }}'
+    output: true
+    artifacts: all
+    args:
+      - 'sign-blob'
+      - '--key=/tmp/cosign.key'
+      - '--output-signature=${signature}'
+      - '${artifact}'
 release:
   name_template: "{{ .ProjectName }}-v{{ .Version }}"
   header: |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/Makefile 
new/sealed-secrets-0.18.0/Makefile
--- old/sealed-secrets-0.17.5/Makefile  2022-04-20 17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/Makefile  2022-06-02 17:57:36.000000000 +0200
@@ -42,7 +42,7 @@
 all: controller kubeseal
 
 generate: $(GO_FILES)
-       $(GO) generate $(GO_PACKAGES)
+       $(GO) mod vendor && $(GO) generate $(GO_PACKAGES)
 
 controller: $(GO_FILES)
        $(GO) build -o $@ $(GO_FLAGS) -ldflags "$(GO_LD_FLAGS)" ./cmd/controller
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/README.md 
new/sealed-secrets-0.18.0/README.md
--- old/sealed-secrets-0.17.5/README.md 2022-04-20 17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/README.md 2022-06-02 17:57:36.000000000 +0200
@@ -26,9 +26,8 @@
   - [Scopes](#scopes)
 - [Installation](#installation)
   - [Controller](#controller)
-  - [Kustomize](#kustomize)
-  - [Helm Chart](#helm-chart)
-  - [Operator Framework](#operator-framework)
+    - [Kustomize](#kustomize)
+    - [Helm Chart](#helm-chart)
   - [Homebrew](#homebrew)
   - [MacPorts](#macports)
   - [Installation from source](#installation-from-source)
@@ -55,6 +54,9 @@
   - [How do I update parts of JSON/YAML/TOML/.. file encrypted with sealed 
secrets?](#how-do-i-update-parts-of-jsonyamltoml-file-encrypted-with-sealed-secrets)
   - [Can I bring my own (pre-generated) 
certificates?](#can-i-bring-my-own-pre-generated-certificates)
   - [How to use kubeseal if the controller is not running within the 
`kube-system` 
namespace?](#how-to-use-kubeseal-if-the-controller-is-not-running-within-the-kube-system-namespace)
+  - [How to verify the images?](#how-to-verify-the-images)
+  - [How to use one controller for a subset of 
namespaces](#How-to-use-one-controller-for-a-subset-of-namespaces)
+
 - [Community](#community)
   - [Related projects](#related-projects)
 
@@ -257,7 +259,7 @@
 and be ready for operation.  If it does not, check the controller
 logs.
 
-### Kustomize
+#### Kustomize
 
 The official controller manifest installation mechanism is just a YAML file.
 
@@ -265,7 +267,7 @@
 
 `kubectl` has native support for that, see [kustomize](https://kustomize.io/).
 
-### Helm Chart
+#### Helm Chart
 
 The Sealed Secrets helm chart is now official supported and hosted in this 
GitHub repo.
 
@@ -297,12 +299,6 @@
 
 Alternatively, you can override `fullnameOverride` on the helm chart install.
 
-### Operator Framework
-
-Install Sealed Secrets as Kubernetes Operator via the Operator Lifecycle 
Manager of your cluster. The `Sealed Secrets Operator (Helm)` is published at 
[OperatorHub.io](https://operatorhub.io/operator/sealed-secrets-operator-helm) 
for Kubernetes, as community operator in OpenShift's integrated OperatorHub or 
at the [GitHub 
repository](https://github.com/disposab1e/sealed-secrets-operator-helm) of the 
project.
-
-NOTE: the sealed secrets operator is an independently maintained project, so 
please contact the maintainers directly for support, help or 
[documentation](https://sealed-secrets-operator-helm.readthedocs.io/en/latest/).
-
 ### Homebrew
 
 The `kubeseal` client is also available on 
[homebrew](https://formulae.brew.sh/formula/kubeseal):
@@ -637,6 +633,27 @@
 kubeseal <mysecret.json >mysealedsecret.json
 ```
 
+### How to verify the images?
+
+Our images are being signed using 
[cosign](https://github.com/sigstore/cosign). The signatures have been saved in 
our [GitHub Container 
Registry](https://github.com/bitnami-labs/sealed-secrets/pkgs/container/sealed-secrets/signs).
+
+It is pretty simple to verify the images:
+
+```bash
+# export the COSIGN_VARIABLE setting up the GitHub container registry signs 
path
+export COSIGN_REPOSITORY=ghcr.io/bitnami-labs/sealed-secrets-controller/signs
+
+# verify the image uploaded in GHCR
+cosign verify --key .github/workflows/cosign.pub 
ghcr.io/bitnami-labs/sealed-secrets-controller:latest
+
+# verify the image uploaded in Dockerhub
+cosign verify --key .github/workflows/cosign.pub 
docker.io/bitnami/sealed-secrets-controller:latest
+```
+
+### How to use one controller for a subset of namespaces
+
+If you want to use one controller for more than one namespace, but not all 
namespaces, you can provide additional namespaces using the command line flag 
`--additional-namespaces=<namespace1>,<namespace2>,<...>`. Make sure you 
provide appropriate roles and rolebindings in the target namespaces, so the 
controller can manage the secrets in there.
+
 ## Community
 
 - [#sealed-secrets on Kubernetes 
Slack](https://kubernetes.slack.com/messages/sealed-secrets)
@@ -648,3 +665,4 @@
 - Visual Studio Code extension: 
https://marketplace.visualstudio.com/items?itemName=codecontemplator.kubeseal
 - WebSeal: generates secrets in the browser : 
https://socialgouv.github.io/webseal
 - HybridEncrypt TypeScript implementation : 
https://github.com/SocialGouv/aes-gcm-rsa-oaep
+- [DEPRACATED] Sealed Secrets Operator: 
https://github.com/disposab1e/sealed-secrets-operator-helm
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/RELEASE-NOTES.md 
new/sealed-secrets-0.18.0/RELEASE-NOTES.md
--- old/sealed-secrets-0.17.5/RELEASE-NOTES.md  2022-04-20 17:20:34.000000000 
+0200
+++ new/sealed-secrets-0.18.0/RELEASE-NOTES.md  2022-06-02 17:57:36.000000000 
+0200
@@ -4,6 +4,15 @@
 
 
[![](https://img.shields.io/github/release/bitnami-labs/sealed-secrets.svg)](https://github.com/bitnami-labs/sealed-secrets/releases/latest)
 
+## v0.18.0
+
+### Changelog
+
+- Add capability to watch multiple namespaces 
([#572](https://github.com/bitnami-labs/sealed-secrets/pull/572))
+- Bump `gopkg.in/yaml.v3` to avoid CVE-2022-28948 
([#852](https://github.com/bitnami-labs/sealed-secrets/pull/852))
+- Bump `prometheus/client_golang` and `crypto` dependencies to avoid 
CVE-2022-21698 and CVE-2022-27191 
([#831](https://github.com/bitnami-labs/sealed-secrets/pull/831))
+- Sign container images with cosign 
([#810](https://github.com/bitnami-labs/sealed-secrets/pull/810) and 
[#851](https://github.com/bitnami-labs/sealed-secrets/pull/851))
+
 ## v0.17.5
 
 ### Changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/cmd/controller/funcs.go 
new/sealed-secrets-0.18.0/cmd/controller/funcs.go
--- old/sealed-secrets-0.17.5/cmd/controller/funcs.go   2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/cmd/controller/funcs.go   2022-06-02 
17:57:36.000000000 +0200
@@ -45,3 +45,15 @@
        }
        return name, nil
 }
+
+func removeDuplicates(strSlice []string) []string {
+       allKeys := make(map[string]bool)
+       list := []string{}
+       for _, item := range strSlice {
+               if _, value := allKeys[item]; !value {
+                       allKeys[item] = true
+                       list = append(list, item)
+               }
+       }
+       return list
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/cmd/controller/main.go 
new/sealed-secrets-0.18.0/cmd/controller/main.go
--- old/sealed-secrets-0.17.5/cmd/controller/main.go    2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/cmd/controller/main.go    2022-06-02 
17:57:36.000000000 +0200
@@ -39,16 +39,17 @@
 )
 
 var (
-       keyPrefix      = flag.String("key-prefix", "sealed-secrets-key", 
"Prefix used to name keys.")
-       keySize        = flag.Int("key-size", 4096, "Size of encryption key.")
-       validFor       = flag.Duration("key-ttl", 10*365*24*time.Hour, 
"Duration that certificate is valid for.")
-       myCN           = flag.String("my-cn", "", "Common name to be used as 
issuer/subject DN in generated certificate.")
-       printVersion   = flag.Bool("version", false, "Print version information 
and exit")
-       keyRenewPeriod = flag.Duration("key-renew-period", 
defaultKeyRenewPeriod, "New key generation period (automatic rotation disabled 
if 0)")
-       acceptV1Data   = flag.Bool("accept-deprecated-v1-data", true, "Accept 
deprecated V1 data field.")
-       keyCutoffTime  = flag.String("key-cutoff-time", "", "Create a new key 
if latest one is older than this cutoff time. RFC1123 format with numeric 
timezone expected.")
-       namespaceAll   = flag.Bool("all-namespaces", true, "Scan all namespaces 
or only the current namespace (default=true).")
-       labelSelector  = flag.String("label-selector", "", "Label selector 
which can be used to filter sealed secrets.")
+       keyPrefix            = flag.String("key-prefix", "sealed-secrets-key", 
"Prefix used to name keys.")
+       keySize              = flag.Int("key-size", 4096, "Size of encryption 
key.")
+       validFor             = flag.Duration("key-ttl", 10*365*24*time.Hour, 
"Duration that certificate is valid for.")
+       myCN                 = flag.String("my-cn", "", "Common name to be used 
as issuer/subject DN in generated certificate.")
+       printVersion         = flag.Bool("version", false, "Print version 
information and exit")
+       keyRenewPeriod       = flag.Duration("key-renew-period", 
defaultKeyRenewPeriod, "New key generation period (automatic rotation disabled 
if 0)")
+       acceptV1Data         = flag.Bool("accept-deprecated-v1-data", true, 
"Accept deprecated V1 data field.")
+       keyCutoffTime        = flag.String("key-cutoff-time", "", "Create a new 
key if latest one is older than this cutoff time. RFC1123 format with numeric 
timezone expected.")
+       namespaceAll         = flag.Bool("all-namespaces", true, "Scan all 
namespaces or only the current namespace (default=true).")
+       additionalNamespaces = flag.String("additional-namespaces", "", 
"Comma-separated list of additional namespaces to be scanned.")
+       labelSelector        = flag.String("label-selector", "", "Label 
selector which can be used to filter sealed secrets.")
 
        oldGCBehavior = flag.Bool("old-gc-behaviour", false, "Revert to old GC 
behavior where the controller deletes secrets instead of delegating that to k8s 
itself.")
 
@@ -210,8 +211,9 @@
        initKeyGenSignalListener(trigger)
 
        namespace := v1.NamespaceAll
-       if !*namespaceAll {
+       if !*namespaceAll || *additionalNamespaces != "" {
                namespace = myNamespace()
+               log.Printf("Starting informer for namespace: %s\n", namespace)
        }
 
        var tweakopts func(*metav1.ListOptions) = nil
@@ -231,6 +233,31 @@
 
        go controller.Run(stop)
 
+       if *additionalNamespaces != "" {
+               addNS := removeDuplicates(strings.Split(*additionalNamespaces, 
","))
+
+               var inf ssinformers.SharedInformerFactory
+               var ctlr *Controller
+
+               for _, ns := range addNS {
+                       if _, err := clientset.CoreV1().Namespaces().Get(ctx, 
ns, metav1.GetOptions{}); err != nil {
+                               if errors.IsNotFound(err) {
+                                       log.Printf("Warning: namespace '%s' 
doesn't exist\n", ns)
+                                       continue
+                               }
+                               return err
+                       }
+                       if ns != namespace {
+                               inf = 
ssinformers.NewFilteredSharedInformerFactory(ssclientset, 0, ns, tweakopts)
+                               ctlr = NewController(clientset, ssclientset, 
inf, keyRegistry)
+                               ctlr.oldGCBehavior = *oldGCBehavior
+                               ctlr.updateStatus = *updateStatus
+                               log.Printf("Starting informer for namespace: 
%s\n", ns)
+                               go ctlr.Run(stop)
+                       }
+               }
+       }
+
        cp := func() ([]*x509.Certificate, error) {
                cert, err := keyRegistry.getCert()
                if err != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/cmd/kubeseal/main.go 
new/sealed-secrets-0.18.0/cmd/kubeseal/main.go
--- old/sealed-secrets-0.17.5/cmd/kubeseal/main.go      2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/cmd/kubeseal/main.go      2022-06-02 
17:57:36.000000000 +0200
@@ -17,6 +17,7 @@
        "os"
        "path/filepath"
        "strings"
+       "time"
 
        "github.com/google/renameio"
        "github.com/mattn/go-isatty"
@@ -129,6 +130,10 @@
                return nil, fmt.Errorf("Expected RSA public key but found %v", 
certs[0].PublicKey)
        }
 
+       if time.Now().After(certs[0].NotAfter) {
+               return nil, fmt.Errorf("failed to encrypt using an expired 
certificate on %v", certs[0].NotBefore.Format("January 2, 2006"))
+       }
+
        return cert, nil
 }
 
@@ -193,6 +198,7 @@
        if ok, err := isFilename(filenameOrURI); err != nil {
                return nil, err
        } else if ok {
+               // #nosec G304 -- should open user provided file
                return os.Open(filenameOrURI)
        }
        return openCertURI(filenameOrURI)
@@ -429,7 +435,15 @@
 }
 
 func sealMergingInto(in io.Reader, filename string, codecs 
runtimeserializer.CodecFactory, pubKey *rsa.PublicKey, scope 
ssv1alpha1.SealingScope, allowEmptyData bool) error {
-       b, err := ioutil.ReadFile(filename)
+       // #nosec G304 -- should open user provided file
+       f, err := os.OpenFile(filename, os.O_RDWR, 0)
+       if err != nil {
+               return err
+       }
+       // #nosec G307 -- we are explicitly managing a potential error from 
f.Close() at the end of the function
+       defer f.Close()
+
+       b, err := io.ReadAll(f)
        if err != nil {
                return err
        }
@@ -468,13 +482,21 @@
        if err := sealedSecretOutput(&out, codecs, orig); err != nil {
                return err
        }
-       // On windows the permission bits are used also when truncating 
existing files
-       // (see https://github.com/golang/go/issues/38225)
-       // Thus we need to set some reasonable permissions.
-       // The actual permissions will be filtered by the user's umask.
-       // We still drop any permissions to the other group because despite the 
sealed secret
-       // being encrypted, we still don't know how the end users feel about it.
-       return ioutil.WriteFile(filename, out.Bytes(), 0660)
+
+       if err := f.Truncate(0); err != nil {
+               return err
+       }
+       if _, err := f.Seek(0, 0); err != nil {
+               return err
+       }
+       if _, err := io.Copy(f, &out); err != nil {
+               return err
+       }
+       // we explicitly call f.Close() to return a pontential error when 
closing the file that wouldn't be returned in the deferred f.Close()
+       if err := f.Close(); err != nil {
+               return err
+       }
+       return nil
 }
 
 func encryptSecretItem(w io.Writer, secretName, ns string, data []byte, scope 
ssv1alpha1.SealingScope, pubKey *rsa.PublicKey) error {
@@ -500,6 +522,7 @@
 }
 
 func readPrivKeysFromFile(filename string) ([]*rsa.PrivateKey, error) {
+       // #nosec G304 -- should open user provided file
        b, err := ioutil.ReadFile(filename)
        if err != nil {
                return nil, err
@@ -622,6 +645,7 @@
 
        var input io.Reader = os.Stdin
        if inputFileName != "" {
+               // #nosec G304 -- should open user provided file
                f, err := os.Open(inputFileName)
                if err != nil {
                        return nil
@@ -724,6 +748,7 @@
                        }
 
                        _, filename := parseFromFile(fromFile[0])
+                       // #nosec G304 -- should open user provided file
                        data, err = ioutil.ReadFile(filename)
                } else {
                        if isatty.IsTerminal(os.Stdin.Fd()) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/controller.jsonnet 
new/sealed-secrets-0.18.0/controller.jsonnet
--- old/sealed-secrets-0.17.5/controller.jsonnet        2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/controller.jsonnet        2022-06-02 
17:57:36.000000000 +0200
@@ -71,6 +71,7 @@
         ],
         resourceNames: [
           'http:sealed-secrets-controller:',  // kubeseal uses 
net.JoinSchemeNamePort when crafting proxy subresource URLs
+          'http:sealed-secrets-controller:http',
           'sealed-secrets-controller',  // but often services are referred by 
name only, let's not make it unnecessarily cryptic
         ],
         verbs: [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/go.mod 
new/sealed-secrets-0.18.0/go.mod
--- old/sealed-secrets-0.17.5/go.mod    2022-04-20 17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/go.mod    2022-06-02 17:57:36.000000000 +0200
@@ -11,15 +11,15 @@
        github.com/mkmik/multierror v0.3.0
        github.com/onsi/ginkgo v1.16.5
        github.com/onsi/gomega v1.18.1
-       github.com/prometheus/client_golang v1.11.0
+       github.com/prometheus/client_golang v1.12.1
        github.com/spf13/pflag v1.0.5
        github.com/throttled/throttled v2.2.5+incompatible
-       golang.org/x/crypto v0.0.0-20211215153901-e495a2d5b3d3
+       golang.org/x/crypto v0.0.0-20220411220226-7b82a4e95df4
        gopkg.in/yaml.v2 v2.4.0
        k8s.io/api v0.23.4
        k8s.io/apimachinery v0.23.4
        k8s.io/client-go v0.23.4
-       k8s.io/code-generator v0.23.4
+       k8s.io/code-generator v0.15.12
        k8s.io/klog v1.0.0
        k8s.io/klog/v2 v2.40.1
 )
@@ -32,19 +32,13 @@
        github.com/Azure/go-autorest/autorest/date v0.3.0 // indirect
        github.com/Azure/go-autorest/logger v0.2.1 // indirect
        github.com/Azure/go-autorest/tracing v0.6.0 // indirect
-       github.com/PuerkitoBio/purell v1.1.1 // indirect
-       github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578 // 
indirect
        github.com/beorn7/perks v1.0.1 // indirect
-       github.com/cespare/xxhash/v2 v2.1.1 // indirect
+       github.com/cespare/xxhash/v2 v2.1.2 // indirect
        github.com/davecgh/go-spew v1.1.1 // indirect
-       github.com/emicklei/go-restful v2.9.5+incompatible // indirect
        github.com/evanphx/json-patch v4.12.0+incompatible // indirect
        github.com/form3tech-oss/jwt-go v3.2.3+incompatible // indirect
        github.com/fsnotify/fsnotify v1.4.9 // indirect
        github.com/go-logr/logr v1.2.0 // indirect
-       github.com/go-openapi/jsonpointer v0.19.5 // indirect
-       github.com/go-openapi/jsonreference v0.19.5 // indirect
-       github.com/go-openapi/swag v0.19.14 // indirect
        github.com/gogo/protobuf v1.3.2 // indirect
        github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // 
indirect
        github.com/golang/protobuf v1.5.2 // indirect
@@ -53,31 +47,30 @@
        github.com/googleapis/gnostic v0.5.5 // indirect
        github.com/hashicorp/golang-lru v0.5.1 // indirect
        github.com/imdario/mergo v0.3.5 // indirect
-       github.com/josharian/intern v1.0.0 // indirect
        github.com/json-iterator/go v1.1.12 // indirect
-       github.com/mailru/easyjson v0.7.6 // indirect
        github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect
        github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // 
indirect
        github.com/modern-go/reflect2 v1.0.2 // indirect
        github.com/nxadm/tail v1.4.8 // indirect
        github.com/pkg/errors v0.9.1 // indirect
        github.com/prometheus/client_model v0.2.0 // indirect
-       github.com/prometheus/common v0.26.0 // indirect
-       github.com/prometheus/procfs v0.6.0 // indirect
+       github.com/prometheus/common v0.32.1 // indirect
+       github.com/prometheus/procfs v0.7.3 // indirect
        golang.org/x/mod v0.4.2 // indirect
        golang.org/x/net v0.0.0-20211209124913-491a49abca63 // indirect
        golang.org/x/oauth2 v0.0.0-20210819190943-2bc19b11175f // indirect
-       golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e // indirect
+       golang.org/x/sys v0.0.0-20220114195835-da31bd327af9 // indirect
        golang.org/x/term v0.0.0-20210615171337-6886f2dfbf5b // indirect
        golang.org/x/text v0.3.7 // indirect
        golang.org/x/time v0.0.0-20210723032227-1f47c861a9ac // indirect
        golang.org/x/tools v0.1.6-0.20210820212750-d4cc65f0b2ff // indirect
        golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1 // indirect
+       gonum.org/v1/gonum v0.0.0-20190331200053-3d26580ed485 // indirect
        google.golang.org/appengine v1.6.7 // indirect
        google.golang.org/protobuf v1.27.1 // indirect
        gopkg.in/inf.v0 v0.9.1 // indirect
        gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 // indirect
-       gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b // indirect
+       gopkg.in/yaml.v3 v3.0.0 // indirect
        k8s.io/gengo v0.0.0-20210813121822-485abfe95c7c // indirect
        k8s.io/kube-openapi v0.0.0-20211115234752-e816edb12b65 // indirect
        k8s.io/utils v0.0.0-20211116205334-6203023598ed // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/go.sum 
new/sealed-secrets-0.18.0/go.sum
--- old/sealed-secrets-0.17.5/go.sum    2022-04-20 17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/go.sum    2022-06-02 17:57:36.000000000 +0200
@@ -54,9 +54,7 @@
 github.com/BurntSushi/toml v0.3.1/go.mod 
h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU=
 github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod 
h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo=
 github.com/NYTimes/gziphandler v0.0.0-20170623195520-56545f4a5d46/go.mod 
h1:3wb06e3pkSAbeQ52E9H9iFoQsEEwGN64994WTCIhntQ=
-github.com/PuerkitoBio/purell v1.1.1 
h1:WEQqlqaGbrPkxLJWfBwQmfEAE1Z7ONdDLqrN38tNFfI=
 github.com/PuerkitoBio/purell v1.1.1/go.mod 
h1:c11w/QuzBsJSee3cPx9rAFu61PvFxuPbtSwDGJws/X0=
-github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578 
h1:d+Bc7a5rLufV/sSk/8dngufqelfh6jnri85riMAaF/M=
 github.com/PuerkitoBio/urlesc v0.0.0-20170810143723-de5bf2ad4578/go.mod 
h1:uGdkoq3SwY9Y+13GIhn11/XLaGBb4BfwItxLd5jeuXE=
 github.com/alecthomas/template v0.0.0-20160405071501-a0175ee3bccc/go.mod 
h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
 github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod 
h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc=
@@ -73,8 +71,9 @@
 github.com/bitnami-labs/pflagenv v0.0.0-20190702160147-b4d9f048d98f 
h1:FiYyJvRfqfM1kSqYZ+OCRIBi7udnR0wMa2HStMGvFic=
 github.com/bitnami-labs/pflagenv v0.0.0-20190702160147-b4d9f048d98f/go.mod 
h1:Lw3ejf6HTt4DqBIAXlkOIvFjnpj8Zq+zD/UtH29ILFA=
 github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod 
h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU=
-github.com/cespare/xxhash/v2 v2.1.1 
h1:6MnRN8NT7+YBpUIWxHtefFZOKTAPgGjpQSxqLNn0+qY=
 github.com/cespare/xxhash/v2 v2.1.1/go.mod 
h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
+github.com/cespare/xxhash/v2 v2.1.2 
h1:YRXhKfTDauu4ajMg1TPgFO5jnlC2HCbmLXMcTG5cbYE=
+github.com/cespare/xxhash/v2 v2.1.2/go.mod 
h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
 github.com/chzyer/logex v1.1.10/go.mod 
h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI=
 github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod 
h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI=
 github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod 
h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
@@ -89,8 +88,6 @@
 github.com/docopt/docopt-go v0.0.0-20180111231733-ee0de3bc6815/go.mod 
h1:WwZ+bS3ebgob9U8Nd0kOddGdZWjyMGR8Wziv+TBNwSE=
 github.com/elazarl/goproxy v0.0.0-20180725130230-947c36da3153/go.mod 
h1:/Zj4wYkgs4iZTTu3o/KG3Itv/qCCa8VVMlb3i9OVuzc=
 github.com/emicklei/go-restful v0.0.0-20170410110728-ff4f55a20633/go.mod 
h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs=
-github.com/emicklei/go-restful v2.9.5+incompatible 
h1:spTtZBk5DYEvbxMVutUuTyh1Ao2r4iyvLdACqsl/Ljk=
-github.com/emicklei/go-restful v2.9.5+incompatible/go.mod 
h1:otzb+WCGbkyDHkqmQmT5YD2WR4BBwUdeQoFo8l/7tVs=
 github.com/envoyproxy/go-control-plane v0.9.0/go.mod 
h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
 github.com/envoyproxy/go-control-plane 
v0.9.1-0.20191026205805-5f8ba28d4473/go.mod 
h1:YTl/9mNaCwkRvm6d1a2C3ymFceY/DCBVvsKhRF0iEA4=
 github.com/envoyproxy/go-control-plane v0.9.4/go.mod 
h1:6rpuAdCZL397s3pYoYcLgu1mIlRU8Am5FuJP05cCM98=
@@ -121,16 +118,12 @@
 github.com/go-logr/logr v1.2.0 h1:QK40JKJyMdUDz+h+xvCsru/bJhvG0UxvePV0ufL/AcE=
 github.com/go-logr/logr v1.2.0/go.mod 
h1:jdQByPbusPIv2/zmleS9BjJVeZ6kBagPoEUsqbVz/1A=
 github.com/go-openapi/jsonpointer v0.19.3/go.mod 
h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
-github.com/go-openapi/jsonpointer v0.19.5 
h1:gZr+CIYByUqjcgeLXnQu2gHYQC9o73G2XUeOFYEICuY=
 github.com/go-openapi/jsonpointer v0.19.5/go.mod 
h1:Pl9vOtqEWErmShwVjC8pYs9cog34VGT37dQOVbmoatg=
 github.com/go-openapi/jsonreference v0.19.3/go.mod 
h1:rjx6GuL8TTa9VaixXglHmQmIL98+wF9xc8zWvFonSJ8=
-github.com/go-openapi/jsonreference v0.19.5 
h1:1WJP/wi4OjB4iV8KVbH73rQaoialJrqv8gitZLxGLtM=
-github.com/go-openapi/jsonreference v0.19.5/go.mod 
h1:RdybgQwPxbL4UEjuAruzK1x3nE69AqPYEJeo/TWfEeg=
 github.com/go-openapi/swag v0.19.5/go.mod 
h1:POnQmlKehdgb5mhVOsnJFsivZCEZ/vjK9gh66Z9tfKk=
-github.com/go-openapi/swag v0.19.14 
h1:gm3vOOXfiuw5i9p5N9xJvfjvuofpyvLA9Wr6QfK5Fng=
-github.com/go-openapi/swag v0.19.14/go.mod 
h1:QYRuS/SOXUCsnplDa677K7+DxSOj6IPNl/eQntq43wQ=
 github.com/go-stack/stack v1.8.0/go.mod 
h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
 github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0/go.mod 
h1:fyg7847qk6SyHyPtNmDHnmrv/HOrqktSC+C9fM+CJOE=
+github.com/gogo/protobuf v0.0.0-20171007142547-342cbe0a0415/go.mod 
h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
 github.com/gogo/protobuf v1.1.1/go.mod 
h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
 github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
 github.com/gogo/protobuf v1.3.2/go.mod 
h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
@@ -202,8 +195,8 @@
 github.com/google/pprof v0.0.0-20210122040257-d980be63207e/go.mod 
h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
 github.com/google/pprof v0.0.0-20210226084205-cbba55b83ad5/go.mod 
h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
 github.com/google/pprof v0.0.0-20210407192527-94a9f03dee38/go.mod 
h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE=
-github.com/google/renameio v0.1.0/go.mod 
h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
 github.com/google/renameio v0.1.0 
h1:GOZbcHa3HfsPKPlmyPyN2KEohoMXOhdMbHrvbpl2QaA=
+github.com/google/renameio v0.1.0/go.mod 
h1:KWCgfxg9yswjAJkECMjeO8J8rahYeXnNhOm40UhjYkI=
 github.com/google/uuid v1.1.2 h1:EVhdT+1Kseyi1/pUmXKaFxYsDNy9RQYkMWRH68J/W7Y=
 github.com/google/uuid v1.1.2/go.mod 
h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
 github.com/googleapis/gax-go/v2 v2.0.4/go.mod 
h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg=
@@ -222,8 +215,6 @@
 github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod 
h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc=
 github.com/imdario/mergo v0.3.5 h1:JboBksRwiiAJWvIYJVo46AfV+IAIKZpfrSzVKj42R4Q=
 github.com/imdario/mergo v0.3.5/go.mod 
h1:2EnlNZ0deacrJVfApfmtdGgDfMuh/nq6Ok1EcJh5FfA=
-github.com/josharian/intern v1.0.0 
h1:vlS4z54oSdjm0bgjRigI+G1HpF+tI+9rE5LLzOg8HmY=
-github.com/josharian/intern v1.0.0/go.mod 
h1:5DoeVV0s6jJacbCEi61lwdGj/aVlrQvzHFFd8Hwg//Y=
 github.com/jpillora/backoff v1.0.0/go.mod 
h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4=
 github.com/json-iterator/go v1.1.6/go.mod 
h1:+SdeFBvtyEkXs7REEP0seUULqWtbJapLOCVDaaPEHmU=
 github.com/json-iterator/go v1.1.10/go.mod 
h1:KdQUCv79m/52Kvf8AW2vK1V8akMuk1QjK/uOdHXbAo4=
@@ -247,8 +238,6 @@
 github.com/kr/text v0.2.0/go.mod 
h1:eLer722TekiGuMkidMxC/pM04lWEeraHUUmBw8l2grE=
 github.com/mailru/easyjson v0.0.0-20190614124828-94de47d64c63/go.mod 
h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
 github.com/mailru/easyjson v0.0.0-20190626092158-b2ccc519800e/go.mod 
h1:C1wdFJiN94OJF2b5HbByQZoLdCWB1Yqtg26g4irojpc=
-github.com/mailru/easyjson v0.7.6 
h1:8yTIVnZgCoiM1TgqoeTl+LfU5Jg6/xL3QhGQnimLYnA=
-github.com/mailru/easyjson v0.7.6/go.mod 
h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
 github.com/mattn/go-isatty v0.0.14 
h1:yVuAays6BHfxijgZPzw+3Zlu5yQgKGP2/hcQbHb7S9Y=
 github.com/mattn/go-isatty v0.0.14/go.mod 
h1:7GGIvUiUoEMVVmxf/4nioHXj79iQHKdU27kJ6hsGG94=
 github.com/matttproud/golang_protobuf_extensions v1.0.1 
h1:4hp9jkHxhMHkqkrB3Ix0jegS5sx/RkqARlsWZ6pIwiU=
@@ -298,8 +287,9 @@
 github.com/prometheus/client_golang v0.9.1/go.mod 
h1:7SWBe2y4D6OKWSNQJUaRYU/AaXPKyh/dDVn+NZz0KFw=
 github.com/prometheus/client_golang v1.0.0/go.mod 
h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo=
 github.com/prometheus/client_golang v1.7.1/go.mod 
h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M=
-github.com/prometheus/client_golang v1.11.0 
h1:HNkLOAEQMIDv/K+04rukrLx6ch7msSRwf3/SASFAGtQ=
 github.com/prometheus/client_golang v1.11.0/go.mod 
h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0=
+github.com/prometheus/client_golang v1.12.1 
h1:ZiaPsmm9uiBeaSMRznKsCDNtPCS0T3JVDGF+06gjBzk=
+github.com/prometheus/client_golang v1.12.1/go.mod 
h1:3Z9XVyYiZYEO+YQWt3RD2R3jrbd179Rt297l4aS6nDY=
 github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod 
h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo=
 github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod 
h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
 github.com/prometheus/client_model v0.0.0-20190812154241-14fe0d1b01d4/go.mod 
h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
@@ -307,19 +297,23 @@
 github.com/prometheus/client_model v0.2.0/go.mod 
h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA=
 github.com/prometheus/common v0.4.1/go.mod 
h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4=
 github.com/prometheus/common v0.10.0/go.mod 
h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo=
-github.com/prometheus/common v0.26.0 
h1:iMAkS2TDoNWnKM+Kopnx/8tnEStIfpYA0ur0xQzzhMQ=
 github.com/prometheus/common v0.26.0/go.mod 
h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc=
+github.com/prometheus/common v0.32.1 
h1:hWIdL3N2HoUx3B8j3YN9mWor0qhY/NlEKZEaXxuIRh4=
+github.com/prometheus/common v0.32.1/go.mod 
h1:vu+V0TpY+O6vW9J44gczi3Ap/oXXR10b+M/gUGO4Hls=
 github.com/prometheus/procfs v0.0.0-20181005140218-185b4288413d/go.mod 
h1:c3At6R/oaqEKCNdg8wHV1ftS6bRYblBhIjjI8uT2IGk=
 github.com/prometheus/procfs v0.0.2/go.mod 
h1:TjEm7ze935MbeOT/UhFTIMYKhuLP4wbCsTZCD3I8kEA=
 github.com/prometheus/procfs v0.1.3/go.mod 
h1:lV6e/gmhEcM9IjHGsFOCxxuZ+z1YqCvr4OA4YeYWdaU=
-github.com/prometheus/procfs v0.6.0 
h1:mxy4L2jP6qMonqmq+aTtOx1ifVWUgG/TAmntgbh3xv4=
 github.com/prometheus/procfs v0.6.0/go.mod 
h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
+github.com/prometheus/procfs v0.7.3 
h1:4jVXhlkAyzOScmCkXBTOLRLTz8EeU+eyjrwB/EPq0VU=
+github.com/prometheus/procfs v0.7.3/go.mod 
h1:cz+aTbrPOrUb4q7XlbU9ygM+/jj0fzG6c1xBZuNvfVA=
+github.com/remyoudompheng/bigfft v0.0.0-20170806203942-52369c62f446/go.mod 
h1:uYEyJGbgTkfkS4+E/PavXkNJcbFIpEtjt2B0KDQ5+9M=
 github.com/rogpeppe/go-internal v1.3.0/go.mod 
h1:M8bDsm7K2OlrFYOpmOWEs/qY81heoFRclV5y23lUDJ4=
 github.com/sirupsen/logrus v1.2.0/go.mod 
h1:LxeOpSwHxABJmUn/MG1IvRgCAasNZTLOkJPxbbu5VWo=
 github.com/sirupsen/logrus v1.4.2/go.mod 
h1:tLMulIdttU9McNUspp0xgXVQah82FyeX6MwdIuYE2rE=
 github.com/sirupsen/logrus v1.6.0/go.mod 
h1:7uNnSEd1DgxDLC74fIahvMZmmYsHGZGEOFrfsX/uA88=
 github.com/spf13/afero v1.2.2/go.mod 
h1:9ZxEEn6pIJ8Rxe320qSDBk6AsU0r9pR7Q4OcevTdifk=
 github.com/spf13/pflag v0.0.0-20171106142849-4c012f6dcd95/go.mod 
h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
+github.com/spf13/pflag v1.0.1/go.mod 
h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
 github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
 github.com/spf13/pflag v1.0.5/go.mod 
h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
 github.com/stoewer/go-strcase v1.2.0/go.mod 
h1:IBiWB2sKIp3wVVQ3Y035++gc+knqhUQag1KpM8ahLw8=
@@ -355,10 +349,12 @@
 golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod 
h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
 golang.org/x/crypto v0.0.0-20201002170205-7f63de1d35b0/go.mod 
h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
 golang.org/x/crypto v0.0.0-20210817164053-32db794688a5/go.mod 
h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
-golang.org/x/crypto v0.0.0-20211215153901-e495a2d5b3d3 
h1:0es+/5331RGQPcXlMfP+WrnIIS6dNnNRe0WB02W0F4M=
-golang.org/x/crypto v0.0.0-20211215153901-e495a2d5b3d3/go.mod 
h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
+golang.org/x/crypto v0.0.0-20220411220226-7b82a4e95df4 
h1:kUhD7nTDoI3fVd9G4ORWrbV5NY0liEs/Jg2pv5f+bBA=
+golang.org/x/crypto v0.0.0-20220411220226-7b82a4e95df4/go.mod 
h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
 golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod 
h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190125153040-c74c464bbbf2/go.mod 
h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
 golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod 
h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
+golang.org/x/exp v0.0.0-20190312203227-4b39c73a6495/go.mod 
h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
 golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod 
h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
 golang.org/x/exp v0.0.0-20190829153037-c13cbed26979/go.mod 
h1:86+5VVa7VpoJ4kLfm080zCjGlMRFzhUhsZKEZO7MGek=
 golang.org/x/exp v0.0.0-20191030013958-a1ab85dbe136/go.mod 
h1:JXzH8nQsPlswgeRAPE3MuO9GYsAcnJvJ4vnMwN/5qkY=
@@ -366,6 +362,7 @@
 golang.org/x/exp v0.0.0-20191227195350-da58074b4299/go.mod 
h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
 golang.org/x/exp v0.0.0-20200119233911-0405dc783f0a/go.mod 
h1:2RIsYlXP63K8oxa1u096TMicItID8zy7Y6sNkU49FU4=
 golang.org/x/exp v0.0.0-20200207192155-f17229e696bd/go.mod 
h1:J/WKrq2StrnmMY6+EHIKF9dgMWnmCNThgcyBT1FY9mM=
+golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6 
h1:QE6XYQK6naiK1EPAe1g/ILLxN5RBoH5xkJk3CqlMI/Y=
 golang.org/x/exp v0.0.0-20200224162631-6cc2880d07d6/go.mod 
h1:3jZMyOhIsHpP37uCMkUooju7aAi5cS1Q23tOzKc+0MU=
 golang.org/x/image v0.0.0-20190227222117-0694c2d4d067/go.mod 
h1:kZ7UVZpmo3dzQBMxlp+ypCbDeSB+sBbTgSJuh5dn5js=
 golang.org/x/image v0.0.0-20190802002840-cff245a6509b/go.mod 
h1:FeLwcggjj3mMvU+oOTbSwawSJRM1uh48EjtB4UJZlP0=
@@ -432,6 +429,7 @@
 golang.org/x/net v0.0.0-20210316092652-d523dce5a7f4/go.mod 
h1:RBQZq4jEuRlivfhVLdyRGr576XBO4/greRjx4P4O3yc=
 golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod 
h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM=
 golang.org/x/net v0.0.0-20210428140749-89ef3d95e781/go.mod 
h1:OJAsFXCWl8Ukc7SiCT/9KSuxbyM7479/AVlXFRxuMCk=
+golang.org/x/net v0.0.0-20210525063256-abc453219eb5/go.mod 
h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
 golang.org/x/net v0.0.0-20210805182204-aaa1db679c0d/go.mod 
h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
 golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod 
h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
 golang.org/x/net v0.0.0-20211209124913-491a49abca63 
h1:iocB37TsdFuN6IBRZ+ry36wrkoV51/tl5vOWqkcPGvY=
@@ -447,6 +445,7 @@
 golang.org/x/oauth2 v0.0.0-20210218202405-ba52d332ba99/go.mod 
h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
 golang.org/x/oauth2 v0.0.0-20210220000619-9bb904979d93/go.mod 
h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
 golang.org/x/oauth2 v0.0.0-20210313182246-cd4f82c27b84/go.mod 
h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
+golang.org/x/oauth2 v0.0.0-20210514164344-f6687ab2804c/go.mod 
h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
 golang.org/x/oauth2 v0.0.0-20210819190943-2bc19b11175f 
h1:Qmd2pbz05z7z6lm0DrgQVVPuBm92jqujBKMHMOlOQEw=
 golang.org/x/oauth2 v0.0.0-20210819190943-2bc19b11175f/go.mod 
h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A=
 golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod 
h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
@@ -516,8 +515,9 @@
 golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/sys v0.0.0-20210809222454-d867a43fc93e/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/sys v0.0.0-20210831042530-f4d43177bf5e/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e 
h1:fLOSk5Q00efkSvAm+4xcoXD+RRmLmmulPn5I3Y9F2EM=
 golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.0.0-20220114195835-da31bd327af9 
h1:XfKQ4OlFl8okEOr5UvAqFRVj8pY/4yfcXrddB8qAbU0=
+golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod 
h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
 golang.org/x/term v0.0.0-20210615171337-6886f2dfbf5b 
h1:9zKuko04nR4gjZ4+DNjHqRlAJqbJETHwiNKDqTfOjfE=
 golang.org/x/term v0.0.0-20210615171337-6886f2dfbf5b/go.mod 
h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
@@ -538,10 +538,12 @@
 golang.org/x/time v0.0.0-20210723032227-1f47c861a9ac/go.mod 
h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
 golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod 
h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
 golang.org/x/tools v0.0.0-20190114222345-bf090417da8b/go.mod 
h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
+golang.org/x/tools v0.0.0-20190206041539-40960b6deb8e/go.mod 
h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
 golang.org/x/tools v0.0.0-20190226205152-f727befe758c/go.mod 
h1:9Yl7xja0Znq3iFh3HoIrodX9oNMXvdceNzlUR8zjMvY=
 golang.org/x/tools v0.0.0-20190311212946-11955173bddd/go.mod 
h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
 golang.org/x/tools v0.0.0-20190312151545-0bb0c0a6e846/go.mod 
h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
 golang.org/x/tools v0.0.0-20190312170243-e65039ee4138/go.mod 
h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
+golang.org/x/tools v0.0.0-20190328211700-ab21143f2384/go.mod 
h1:LCzVGOaR6xXOjkQ3onu1FJEFr0SW1gC7cKk1uF8kGRs=
 golang.org/x/tools v0.0.0-20190425150028-36563e24a262/go.mod 
h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
 golang.org/x/tools v0.0.0-20190506145303-2d16b83fe98c/go.mod 
h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
 golang.org/x/tools v0.0.0-20190524140312-2c0ae7006135/go.mod 
h1:RgjU9mgBXZiqYHBnxXauZ1Gv1EHHAz9KjViQ78xBX0Q=
@@ -594,6 +596,11 @@
 golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
 golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1 
h1:go1bK/D/BFZV2I8cIQd1NKEZ+0owSTG1fDTci4IqFcE=
 golang.org/x/xerrors v0.0.0-20200804184101-5ec99f83aff1/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
+gonum.org/v1/gonum v0.0.0-20190331200053-3d26580ed485 
h1:OB/uP/Puiu5vS5QMRPrXCDWUPb+kt8f1KW8oQzFejQw=
+gonum.org/v1/gonum v0.0.0-20190331200053-3d26580ed485/go.mod 
h1:2ltnJ7xHfj0zHS40VVPYEAAMTa3ZGguvHGBSJeRWqE0=
+gonum.org/v1/netlib v0.0.0-20190313105609-8cb42192e0e0/go.mod 
h1:wa6Ws7BG/ESfp6dHfk7C6KdzKA7wR7u/rKwOGE66zvw=
+gonum.org/v1/netlib v0.0.0-20190331212654-76723241ea4e 
h1:jRyg0XfpwWlhEV8mDfdNGBeSJM2fuyh9Yjrnd8kF2Ts=
+gonum.org/v1/netlib v0.0.0-20190331212654-76723241ea4e/go.mod 
h1:kS+toOQn6AQKjmKJ7gzohV1XkqsFehRA2FbsbkopSuQ=
 google.golang.org/api v0.4.0/go.mod 
h1:8k5glujaEP+g9n7WNsDg8QP6cUVNI86fCNMcbazEtwE=
 google.golang.org/api v0.7.0/go.mod 
h1:WtwebWUNSVBH/HAw79HIFXZNqEvBhG+Ra+ax0hx3E3M=
 google.golang.org/api v0.8.0/go.mod 
h1:o4eAsZoiT+ibD93RtjEohWalFOjRDx6CVaqeizhEnKg=
@@ -717,8 +724,9 @@
 gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
 gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod 
h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
 gopkg.in/yaml.v3 v3.0.0-20200615113413-eeeca48fe776/go.mod 
h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b 
h1:h8qDotaEPuJATrMmW04NCwg7v22aHH28wwpauUhK9Oo=
 gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b/go.mod 
h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
+gopkg.in/yaml.v3 v3.0.0 h1:hjy8E9ON/egN1tAYqKb61G10WtihqetD4sz2H+8nIeA=
+gopkg.in/yaml.v3 v3.0.0/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
 honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod 
h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
 honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod 
h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
 honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod 
h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
@@ -732,10 +740,12 @@
 k8s.io/apimachinery v0.23.4/go.mod 
h1:BEuFMMBaIbcOqVIJqNZJXGFTP4W6AycEpb5+m/97hrM=
 k8s.io/client-go v0.23.4 h1:YVWvPeerA2gpUudLelvsolzH7c2sFoXXR5wM/sWqNFU=
 k8s.io/client-go v0.23.4/go.mod h1:PKnIL4pqLuvYUK1WU7RLTMYKPiIh7MYShLshtRY9cj0=
-k8s.io/code-generator v0.23.4 h1:MmDMH74oo8YD4r+KdUzd/VVmXUeXf5u0owLI9wZWP5Y=
-k8s.io/code-generator v0.23.4/go.mod 
h1:S0Q1JVA+kSzTI1oUvbKAxZY/DYbA/ZUb4Uknog12ETk=
+k8s.io/code-generator v0.15.12 h1:gT9pzUFkbaGsyyI88mD2rbYPTqiJ58vHJkzrQemMFgo=
+k8s.io/code-generator v0.15.12/go.mod 
h1:G8bQwmHm2eafm5bgtX67XDZQ8CWKSGu9DekI+yN4Y5I=
+k8s.io/gengo v0.0.0-20190116091435-f8a0810f38af/go.mod 
h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0=
 k8s.io/gengo v0.0.0-20210813121822-485abfe95c7c 
h1:GohjlNKauSai7gN4wsJkeZ3WAJx4Sh+oT/b5IYn5suA=
 k8s.io/gengo v0.0.0-20210813121822-485abfe95c7c/go.mod 
h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
+k8s.io/klog v0.3.1/go.mod h1:Gq+BEi5rUBO/HRz0bTSXDUcqjScdoY3a9IHpCEIOOfk=
 k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8=
 k8s.io/klog v1.0.0/go.mod h1:4Bi6QPql/J/LkTDqv7R/cd3hPo4k2DG6Ptcz060Ez5I=
 k8s.io/klog/v2 v2.0.0/go.mod h1:PBfzABfn139FHAV07az/IF9Wp1bkk3vpT2XSJ76fSDE=
@@ -748,6 +758,11 @@
 k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod 
h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
 k8s.io/utils v0.0.0-20211116205334-6203023598ed 
h1:ck1fRPWPJWsMd8ZRFsWc6mh/zHp5fZ/shhbrgPUxDAE=
 k8s.io/utils v0.0.0-20211116205334-6203023598ed/go.mod 
h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
+modernc.org/cc v1.0.0/go.mod h1:1Sk4//wdnYJiUIxnW8ddKpaOJCF37yAdqYnkxUpaYxw=
+modernc.org/golex v1.0.0/go.mod h1:b/QX9oBD/LhixY6NDh+IdGv17hgB+51fET1i2kPSmvk=
+modernc.org/mathutil v1.0.0/go.mod 
h1:wU0vUrJsVWBZ4P6e7xtFJEhFSNsfRLJ8H458uRjg03k=
+modernc.org/strutil v1.0.0/go.mod 
h1:lstksw84oURvj9y3tn8lGvRxyRC1S2+g5uuIzNfIOBs=
+modernc.org/xc v1.0.0/go.mod h1:mRNCo0bvLjGhHO9WsyuKVU4q0ceiDDDoEeWDJHrNx8I=
 rsc.io/binaryregexp v0.2.0/go.mod 
h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8=
 rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0=
 rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/helm/sealed-secrets/Chart.yaml 
new/sealed-secrets-0.18.0/helm/sealed-secrets/Chart.yaml
--- old/sealed-secrets-0.17.5/helm/sealed-secrets/Chart.yaml    2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/helm/sealed-secrets/Chart.yaml    2022-06-02 
17:57:36.000000000 +0200
@@ -1,7 +1,7 @@
 annotations:
   category: DeveloperTools
 apiVersion: v2
-appVersion: v0.17.4
+appVersion: v0.17.5
 description: Helm chart for the sealed-secrets controller.
 home: https://github.com/bitnami-labs/sealed-secrets
 icon: 
https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png
@@ -16,4 +16,4 @@
     email: mmikuli...@gmail.com
 name: sealed-secrets
 type: application
-version: 2.1.5
+version: 2.1.8
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.17.5/helm/sealed-secrets/README.md 
new/sealed-secrets-0.18.0/helm/sealed-secrets/README.md
--- old/sealed-secrets-0.17.5/helm/sealed-secrets/README.md     2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/helm/sealed-secrets/README.md     2022-06-02 
17:57:36.000000000 +0200
@@ -83,9 +83,9 @@
 
 | Name                                              | Description              
                                                            | Value             
                  |
 | ------------------------------------------------- | 
------------------------------------------------------------------------------------
 | ----------------------------------- |
-| `image.registry`                                  | Sealed Secrets image 
registry                                                        | `quay.io`     
                      |
+| `image.registry`                                  | Sealed Secrets image 
registry                                                        | `docker.io`   
                        |
 | `image.repository`                                | Sealed Secrets image 
repository                                                      | 
`bitnami/sealed-secrets-controller` |
-| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                            | `v0.17.4`         
                  |
+| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                            | `v0.17.5`         
                  |
 | `image.pullPolicy`                                | Sealed Secrets image 
pull policy                                                     | 
`IfNotPresent`                      |
 | `image.pullSecrets`                               | Sealed Secrets image 
pull secrets                                                    | `[]`          
                      |
 | `createController`                                | Specifies whether the 
Sealed Secrets controller should be created                    | `true`         
                     |
@@ -126,6 +126,7 @@
 | `podLabels`                                       | Extra labels for Sealed 
Secret pods                                                  | `{}`             
                   |
 | `podAnnotations`                                  | Annotations for Sealed 
Secret pods                                                   | `{}`            
                    |
 | `priorityClassName`                               | Sealed Secret pods' 
priorityClassName                                                | `""`         
                       |
+| `runtimeClassName`                                | Sealed Secret pods' 
runtimeClassName                                                 | `""`         
                       |
 | `affinity`                                        | Affinity for Sealed 
Secret pods assignment                                           | `{}`         
                       |
 | `nodeSelector`                                    | Node labels for Sealed 
Secret pods assignment                                        | `{}`            
                    |
 | `tolerations`                                     | Tolerations for Sealed 
Secret pods assignment                                        | `[]`            
                    |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.17.5/helm/sealed-secrets/templates/deployment.yaml 
new/sealed-secrets-0.18.0/helm/sealed-secrets/templates/deployment.yaml
--- old/sealed-secrets-0.17.5/helm/sealed-secrets/templates/deployment.yaml     
2022-04-20 17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/helm/sealed-secrets/templates/deployment.yaml     
2022-06-02 17:57:36.000000000 +0200
@@ -36,6 +36,9 @@
       {{- if .Values.priorityClassName }}
       priorityClassName: {{ .Values.priorityClassName | quote }}
       {{- end }}
+      {{- if .Values.runtimeClassName }}
+      runtimeClassName: {{ .Values.runtimeClassName | quote }}
+      {{- end }}
       {{- if .Values.podSecurityContext.enabled }}
       securityContext: {{- omit .Values.podSecurityContext "enabled" | toYaml 
| nindent 8 }}
       {{- end }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.17.5/helm/sealed-secrets/templates/role.yaml 
new/sealed-secrets-0.18.0/helm/sealed-secrets/templates/role.yaml
--- old/sealed-secrets-0.17.5/helm/sealed-secrets/templates/role.yaml   
2022-04-20 17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/helm/sealed-secrets/templates/role.yaml   
2022-06-02 17:57:36.000000000 +0200
@@ -37,6 +37,8 @@
 rules:
   - apiGroups:
       - ""
+    resourceNames:
+      - {{ include "sealed-secrets.fullname" . }}
     resources:
       - services
     verbs:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.17.5/helm/sealed-secrets/values.yaml 
new/sealed-secrets-0.18.0/helm/sealed-secrets/values.yaml
--- old/sealed-secrets-0.17.5/helm/sealed-secrets/values.yaml   2022-04-20 
17:20:34.000000000 +0200
+++ new/sealed-secrets-0.18.0/helm/sealed-secrets/values.yaml   2022-06-02 
17:57:36.000000000 +0200
@@ -19,7 +19,7 @@
 ## @section Sealed Secrets Parameters
 
 ## Sealed Secrets image
-## ref: https://quay.io/repository/bitnami/sealed-secrets-controller?tab=tags
+## ref: https://hub.docker.com/r/bitnami/sealed-secrets-controller/tags
 ## @param image.registry Sealed Secrets image registry
 ## @param image.repository Sealed Secrets image repository
 ## @param image.tag Sealed Secrets image tag (immutable tags are recommended)
@@ -27,9 +27,9 @@
 ## @param image.pullSecrets [array]  Sealed Secrets image pull secrets
 ##
 image:
-  registry: quay.io
+  registry: docker.io
   repository: bitnami/sealed-secrets-controller
-  tag: v0.17.4
+  tag: v0.17.5
   ## Specify a imagePullPolicy
   ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
   ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
@@ -155,6 +155,9 @@
 ## @param priorityClassName Sealed Secret pods' priorityClassName
 ##
 priorityClassName: ""
+## @param runtimeClassName Sealed Secret pods' runtimeClassName
+##
+runtimeClassName: ""
 ## @param affinity [object] Affinity for Sealed Secret pods assignment
 ## ref: 
https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
 ##

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.kubeseal.new.1548/vendor.tar.gz differ: char 5, 
line 1

Reply via email to