Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kubeseal for openSUSE:Factory 
checked in at 2023-04-17 18:15:27
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kubeseal (Old)
 and      /work/SRC/openSUSE:Factory/.kubeseal.new.2023 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kubeseal"

Mon Apr 17 18:15:27 2023 rev:16 rq:1079947 version:0.20.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes        2023-03-21 
17:44:22.310646359 +0100
+++ /work/SRC/openSUSE:Factory/.kubeseal.new.2023/kubeseal.changes      
2023-04-17 18:15:28.382197084 +0200
@@ -1,0 +2,24 @@
+Mon Apr 17 13:30:45 UTC 2023 - ka...@b1-systems.de
+
+- Update to version 0.20.3:
+  * Release version v0.20.3 (#1178)
+  * Generate embedded ObjectMeta in CRD (#1177)
+  * Sign images using Cosign v2 (#1176)
+  * Bump golang.org/x/crypto from 0.7.0 to 0.8.0 (#1175)
+  * ReProcess only on spec changes (#1174)
+  * Upgrade sealed secrets to Go 1.20 (#1173)
+  * Feature/updatereadme (#1172)
+  * Bump github.com/onsi/gomega from 1.27.5 to 1.27.6 (#1169)
+  * order certs by notBefore date (#1153)
+  * Feature/updatevib (#1165)
+  * Bump github.com/mattn/go-isatty from 0.0.17 to 0.0.18 (#1167)
+  * Bump github.com/onsi/gomega from 1.27.4 to 1.27.5 (#1168)
+  * Update vib action (#1164)
+  * Verify chart with secret recreation disabled (#1163)
+  * Remove automountServiceAccountToken parameter (#1162)
+  * Bump k8s.io/code-generator from 0.26.2 to 0.26.3 (#1159)
+  * Bump k8s.io/client-go from 0.26.2 to 0.26.3 (#1157)
+  * Release Carvel package 2.8.1 (#1156)
+  * Release chart v2.8.1 (#1155)
+
+-------------------------------------------------------------------

Old:
----
  sealed-secrets-0.20.2.obscpio

New:
----
  sealed-secrets-0.20.3.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ kubeseal.spec ++++++
--- /var/tmp/diff_new_pack.4BLGJg/_old  2023-04-17 18:15:29.430203201 +0200
+++ /var/tmp/diff_new_pack.4BLGJg/_new  2023-04-17 18:15:29.434203225 +0200
@@ -21,7 +21,7 @@
 %define archive_name sealed-secrets
 
 Name:           kubeseal
-Version:        0.20.2
+Version:        0.20.3
 Release:        0
 Summary:        CLI for encrypting secrets to SealedSecrets
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.4BLGJg/_old  2023-04-17 18:15:29.470203434 +0200
+++ /var/tmp/diff_new_pack.4BLGJg/_new  2023-04-17 18:15:29.474203458 +0200
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/bitnami-labs/sealed-secrets</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.20.2</param>
+    <param name="revision">v0.20.3</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>
@@ -17,7 +17,7 @@
     <param name="compression">gz</param>
   </service>
   <service name="go_modules" mode="disabled">
-    <param name="archive">sealed-secrets-0.20.2.obscpio</param>
+    <param name="archive">sealed-secrets-0.20.3.obscpio</param>
   </service>
 </services>
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.4BLGJg/_old  2023-04-17 18:15:29.542203855 +0200
+++ /var/tmp/diff_new_pack.4BLGJg/_new  2023-04-17 18:15:29.546203878 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/bitnami-labs/sealed-secrets</param>
-              <param 
name="changesrevision">8de5579df4a683d95135275938d9000d4407da8b</param></service></servicedata>
+              <param 
name="changesrevision">36da266068a225040d1ed8e60b41277d8126b17a</param></service></servicedata>
 (No newline at EOF)
 

++++++ sealed-secrets-0.20.2.obscpio -> sealed-secrets-0.20.3.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/.github/workflows/ci.yml 
new/sealed-secrets-0.20.3/.github/workflows/ci.yml
--- old/sealed-secrets-0.20.2/.github/workflows/ci.yml  2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/.github/workflows/ci.yml  2023-04-17 
12:37:45.000000000 +0200
@@ -38,7 +38,7 @@
       matrix:
         go: ${{ fromJSON(needs.load-versions.outputs.go_version_list) }}
         os: [ubuntu-latest]
-        golangci-lint: ["1.49.0"]
+        golangci-lint: ["1.52.2"]
     steps:
     - name: Set up Go 1.x
       uses: actions/setup-go@v3.3.1
@@ -64,7 +64,7 @@
       matrix:
         go: ${{ fromJSON(needs.load-versions.outputs.go_version_list) }}
         os: [ubuntu-latest]
-        gosec: ["2.12.0"]
+        gosec: ["2.15.0"]
     steps:
     - name: Set up Go 1.x
       uses: actions/setup-go@v3.3.1
@@ -128,18 +128,13 @@
       uses: actions/checkout@v3.1.0
 
     - name: Install Cosign
-      uses: sigstore/cosign-installer@v2.7.0
+      uses: sigstore/cosign-installer@v3.0.2
 
     - name: Distroless verify
       run: |
         diff <(grep FROM docker/kubeseal.Dockerfile | awk '{print $2}') \
              <(grep FROM docker/controller.Dockerfile | awk '{print $2}')
-        cosign verify --key /dev/stdin "$(grep FROM 
docker/controller.Dockerfile | awk '{print $2}')" <<EOF
-        -----BEGIN PUBLIC KEY-----
-        MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEWZzVzkb8A+DbgDpaJId/bOmV8n7Q
-        OqxYbK0Iro6GzSmOzxkn+N2AKawLyXi84WSwJQBK//psATakCgAQKkNTAA==
-        -----END PUBLIC KEY-----
-        EOF
+        cosign verify "$(grep FROM docker/controller.Dockerfile | awk '{print 
$2}')" --certificate-oidc-issuer https://accounts.google.com  
--certificate-identity keyl...@distroless.iam.gserviceaccount.com
 
     - name: Setup kubecfg
       run: |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.20.2/.github/workflows/helm-vib-lint.yaml 
new/sealed-secrets-0.20.3/.github/workflows/helm-vib-lint.yaml
--- old/sealed-secrets-0.20.2/.github/workflows/helm-vib-lint.yaml      
2023-03-20 15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/.github/workflows/helm-vib-lint.yaml      
2023-04-17 12:37:45.000000000 +0200
@@ -23,4 +23,4 @@
         with:
           ref: ${{github.event.pull_request.head.ref}}
           repository: ${{github.event.pull_request.head.repo.full_name}}
-      - uses: vmware-labs/vmware-image-builder-action@0.4.7
+      - uses: vmware-labs/vmware-image-builder-action@v0.6.0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.20.2/.github/workflows/helm-vib.yaml 
new/sealed-secrets-0.20.3/.github/workflows/helm-vib.yaml
--- old/sealed-secrets-0.20.2/.github/workflows/helm-vib.yaml   2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/.github/workflows/helm-vib.yaml   2023-04-17 
12:37:45.000000000 +0200
@@ -20,20 +20,26 @@
     strategy:
       matrix:
        include:
-         - target-platform: gke
+         - name: GKE
+           target-platform: gke
            target-platform-id: 91d398a2-25c4-4cda-8732-75a3cfc179a1
            target-pipeline: vib-platform-verify.json
-         - target-platform: openshift
+         - name: GKE Skip Recreate
+           target-platform: gke
+           target-platform-id: 91d398a2-25c4-4cda-8732-75a3cfc179a1
+           target-pipeline: vib-platform-verify-skip-recreate.json
+         - name: Openshift
+           target-platform: openshift
            target-platform-id: ebac9e0d-3931-4515-ba54-e6adada1f174
            target-pipeline: vib-platform-verify-openshift.json
       fail-fast: false
-    name: Verify chart in ${{ matrix.target-platform}}
+    name: Verify chart (${{ matrix.name }})
     steps:
       - uses: actions/checkout@v3.1.0
         with:
           ref: ${{ github.event.pull_request.head.ref }}
           repository: ${{ github.event.pull_request.head.repo.full_name }}
-      - uses: vmware-labs/vmware-image-builder-action@0.4.7
+      - uses: vmware-labs/vmware-image-builder-action@v0.6.0
         with:
           pipeline: ${{ matrix.target-pipeline }}
         env:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/.github/workflows/release.yaml 
new/sealed-secrets-0.20.3/.github/workflows/release.yaml
--- old/sealed-secrets-0.20.2/.github/workflows/release.yaml    2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/.github/workflows/release.yaml    2023-04-17 
12:37:45.000000000 +0200
@@ -60,7 +60,7 @@
 
       # Setup Cosign
       - name: Install Cosign
-        uses: sigstore/cosign-installer@v2.7.0
+        uses: sigstore/cosign-installer@v3.0.2
       - name: Write Cosign key
         run: echo "$COSIGN_KEY" > /tmp/cosign.key
         env:
@@ -134,7 +134,7 @@
           tags: ${{ steps.meta_kubeseal.outputs.tags }}
       - name: Sign controller image with a key in GHCR
         run: |
-          echo -n "$COSIGN_PASSWORD" | cosign sign --key /tmp/cosign.key 
$TAG_CURRENT
+          echo -n "$COSIGN_PASSWORD" | cosign sign --key /tmp/cosign.key --yes 
$TAG_CURRENT
         env:
           COSIGN_PASSWORD: ${{ secrets.COSIGN_PASSWORD }}
           TAG_CURRENT: ${{ steps.meta_controller.outputs.tags }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.20.2/.vib/vib-platform-verify-skip-recreate.json 
new/sealed-secrets-0.20.3/.vib/vib-platform-verify-skip-recreate.json
--- old/sealed-secrets-0.20.2/.vib/vib-platform-verify-skip-recreate.json       
1970-01-01 01:00:00.000000000 +0100
+++ new/sealed-secrets-0.20.3/.vib/vib-platform-verify-skip-recreate.json       
2023-04-17 12:37:45.000000000 +0200
@@ -0,0 +1,37 @@
+{
+  "phases": {
+    "package": {
+      "context": {
+        "resources": {
+          "url": "{SHA_ARCHIVE}",
+          "path": "/helm/sealed-secrets"
+        }
+      },
+      "actions": [
+        {
+          "action_id": "helm-package"
+        }
+      ]
+    },
+    "verify": {
+      "context": {
+        "resources": {
+          "url": "{SHA_ARCHIVE}",
+          "path": "/.vib/"
+        },
+        "runtime_parameters": 
"IyMgQ3JlYXRlIFNlYWxlZCBTZWNyZXRzIGNvbnRyb2xsZXIgc2hvdWxkIGJlIGNyZWF0ZWQKY3JlYXRlQ29udHJvbGxlcjogdHJ1ZQojIyBTZWNyZXQgY29udGFpbmluZyB0aGUga2V5IHVzZWQgdG8gZW5jcnlwdCBzZWNyZXRzCnNlY3JldE5hbWU6ICJzZWFsZWQtc2VjcmV0cy1rZXkiCiMjIFJlbmV3IGtleXMgZXZlcnkgd2VlawprZXlyZW5ld3BlcmlvZDogIjE2OGgiCiMgU2tpcCBzZWNyZXQgcmVjcmVhdGlvbgpza2lwUmVjcmVhdGU6IHRydWUKc2VydmljZToKICB0eXBlOiBMb2FkQmFsYW5jZXIKICBwb3J0OiA4MAo=",
+        "target_platform": {
+          "target_platform_id": "{TARGET_PLATFORM}"
+        }
+      },
+      "actions": [
+        {
+          "action_id": "health-check",
+          "params": {
+            "endpoint": "lb-sealed-secrets-http"
+          }
+        }
+      ]
+    }
+  }
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/Makefile 
new/sealed-secrets-0.20.3/Makefile
--- old/sealed-secrets-0.20.2/Makefile  2023-03-20 15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/Makefile  2023-04-17 12:37:45.000000000 +0200
@@ -55,7 +55,7 @@
        cp -r gentmp/github.com/bitnami-labs/sealed-secrets/pkg . && rm -rf 
gentmp/
 
 manifests:
-       $(CONTROLLER_GEN) crd paths="./pkg/apis/..." output:stdout | tail -n +2 
> helm/sealed-secrets/crds/bitnami.com_sealedsecrets.yaml
+       $(CONTROLLER_GEN) crd:generateEmbeddedObjectMeta=true 
paths="./pkg/apis/..." output:stdout | tail -n +2 > 
helm/sealed-secrets/crds/bitnami.com_sealedsecrets.yaml
        yq '.spec.versions[0].schema' < 
helm/sealed-secrets/crds/bitnami.com_sealedsecrets.yaml > schema-v1alpha1.yaml
 
 controller: $(GO_FILES)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/README.md 
new/sealed-secrets-0.20.3/README.md
--- old/sealed-secrets-0.20.2/README.md 2023-03-20 15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/README.md 2023-04-17 12:37:45.000000000 +0200
@@ -5,7 +5,7 @@
 
[![](https://img.shields.io/homebrew/v/kubeseal)](https://formulae.brew.sh/formula/kubeseal)
 [![Build 
Status](https://github.com/bitnami-labs/sealed-secrets/actions/workflows/ci.yml/badge.svg)](https://github.com/bitnami-labs/sealed-secrets/actions/workflows/ci.yml)
 
[![](https://img.shields.io/github/v/release/bitnami-labs/sealed-secrets?include_prereleases&label=helm&sort=semver)](https://github.com/bitnami-labs/sealed-secrets/releases)
-[![Verification 
Status](https://github.com/bitnami-labs/sealed-secrets/actions/workflows/helm-vib.yaml/badge.svg)](https://github.com/bitnami-labs/sealed-secrets/actions/workflows/helm-vib.yaml)
+[![Download 
Status](https://img.shields.io/docker/pulls/bitnami/sealed-secrets-controller.svg)](https://hub.docker.com/r/bitnami/sealed-secrets-controller)
 [![Go Report 
Card](https://goreportcard.com/badge/github.com/bitnami-labs/sealed-secrets)](https://goreportcard.com/report/github.com/bitnami-labs/sealed-secrets)
 
![Downloads](https://img.shields.io/github/downloads/bitnami-labs/sealed-secrets/total.svg)
 
@@ -716,6 +716,8 @@
 
 Our images are being signed using 
[cosign](https://github.com/sigstore/cosign). The signatures have been saved in 
our [GitHub Container 
Registry](https://ghcr.io/bitnami-labs/sealed-secrets-controller/signs).
 
+> Images up to and including v0.20.2 were signed using Cosign v1. Newer images 
are signed with Cosign v2.
+
 It is pretty simple to verify the images:
 
 ```bash
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/RELEASE-NOTES.md 
new/sealed-secrets-0.20.3/RELEASE-NOTES.md
--- old/sealed-secrets-0.20.2/RELEASE-NOTES.md  2023-03-20 15:59:05.000000000 
+0100
+++ new/sealed-secrets-0.20.3/RELEASE-NOTES.md  2023-04-17 12:37:45.000000000 
+0200
@@ -4,6 +4,29 @@
 
 
[![](https://img.shields.io/github/release/bitnami-labs/sealed-secrets.svg)](https://github.com/bitnami-labs/sealed-secrets/releases/latest)
 
+## v0.20.3
+
+### Changelog
+
+- Generate embedded ObjectMeta in CRD 
([#1177](https://github.com/bitnami-labs/sealed-secrets/pull/1177))
+- Sign images using Cosign v2 
([#1176](https://github.com/bitnami-labs/sealed-secrets/pull/1176))
+- ReProcess only on spec changes 
([#1174](https://github.com/bitnami-labs/sealed-secrets/pull/1174))
+- Upgrade sealed secrets to Go 1.20 
([#1173](https://github.com/bitnami-labs/sealed-secrets/pull/1173))
+- Remove automountServiceAccountToken parameter 
([#1162](https://github.com/bitnami-labs/sealed-secrets/pull/1162))
+- Verify chart with secret recreation disabled 
([#1163](https://github.com/bitnami-labs/sealed-secrets/pull/1163))
+- Bump golang.org/x/crypto from 0.7.0 to 0.8.0 
([#1175](https://github.com/bitnami-labs/sealed-secrets/pull/1175))
+- Bump github.com/onsi/gomega from 1.27.5 to 1.27.6 
([#1169](https://github.com/bitnami-labs/sealed-secrets/pull/1169))
+- Bump github.com/onsi/gomega from 1.27.4 to 1.27.5 
([#1168](https://github.com/bitnami-labs/sealed-secrets/pull/1168))
+- Bump github.com/mattn/go-isatty from 0.0.17 to 0.0.18 
([#1167](https://github.com/bitnami-labs/sealed-secrets/pull/1167))
+- Bump github.com/onsi/ginkgo/v2 from 2.9.1 to 2.9.2 
([#1166](https://github.com/bitnami-labs/sealed-secrets/pull/1166))
+- Bump k8s.io/apimachinery from 0.26.2 to 0.26.3 
([#1160](https://github.com/bitnami-labs/sealed-secrets/pull/1160))
+- Bump k8s.io/code-generator from 0.26.2 to 0.26.3 
([#1159](https://github.com/bitnami-labs/sealed-secrets/pull/1159))
+- Bump k8s.io/api from 0.26.2 to 0.26.3 
([#1158](https://github.com/bitnami-labs/sealed-secrets/pull/1158))
+- Bump k8s.io/client-go from 0.26.2 to 0.26.3 
([#1157](https://github.com/bitnami-labs/sealed-secrets/pull/1157))
+- Update VIB release tag format 
([#1165](https://github.com/bitnami-labs/sealed-secrets/pull/1165))
+- Update VIB action 
([#1164](https://github.com/bitnami-labs/sealed-secrets/pull/1164))
+- Include dockerhub pull statistics in the project README 
([#1172](https://github.com/bitnami-labs/sealed-secrets/pull/1172))
+
 ## v0.20.2
 
 ### Changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/carvel/package.yaml 
new/sealed-secrets-0.20.3/carvel/package.yaml
--- old/sealed-secrets-0.20.2/carvel/package.yaml       2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/carvel/package.yaml       2023-04-17 
12:37:45.000000000 +0200
@@ -1,10 +1,10 @@
 apiVersion: data.packaging.carvel.dev/v1alpha1
 kind: Package
 metadata:
-  name: "sealedsecrets.bitnami.com.2.8.0"
+  name: "sealedsecrets.bitnami.com.2.8.1"
 spec:
   refName: "sealedsecrets.bitnami.com"
-  version: "2.8.0"
+  version: "2.8.1"
   valuesSchema:
     openAPIv3:
       title: Chart Values
@@ -45,7 +45,7 @@
             tag:
               type: string
               description: Sealed Secrets image tag (immutable tags are 
recommended)
-              default: v0.20.1
+              default: v0.20.2
             pullPolicy:
               type: string
               description: Sealed Secrets image pull policy
@@ -424,7 +424,7 @@
     spec:
       fetch:
       - imgpkgBundle:
-          image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-7756e673751ef59ce0c0e989e04b7986a4fa97f94edbc84ce7f55a5c5fd5ca88.imgpkg
+          image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-8b2a9f03252d659c687be0089e198bf289d5242d4efbcb2c915ca52ee860aea7.imgpkg
       template:
       - helmTemplate:
           path: sealed-secrets
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/cmd/kubeseal/main.go 
new/sealed-secrets-0.20.3/cmd/kubeseal/main.go
--- old/sealed-secrets-0.20.2/cmd/kubeseal/main.go      2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/cmd/kubeseal/main.go      2023-04-17 
12:37:45.000000000 +0200
@@ -189,6 +189,7 @@
        if err != nil {
                return err
        }
+       // #nosec: G307 -- this deferred close is fine because it is not on a 
writable file
        defer f.Close()
 
        if flags.dumpCert {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/go.mod 
new/sealed-secrets-0.20.3/go.mod
--- old/sealed-secrets-0.20.2/go.mod    2023-03-20 15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/go.mod    2023-04-17 12:37:45.000000000 +0200
@@ -1,23 +1,23 @@
 module github.com/bitnami-labs/sealed-secrets
 
-go 1.19
+go 1.20
 
 require (
        github.com/google/go-cmp v0.5.9
        github.com/google/renameio v0.1.0
-       github.com/mattn/go-isatty v0.0.17
+       github.com/mattn/go-isatty v0.0.18
        github.com/mkmik/multierror v0.3.0
-       github.com/onsi/ginkgo/v2 v2.9.1
-       github.com/onsi/gomega v1.27.4
+       github.com/onsi/ginkgo/v2 v2.9.2
+       github.com/onsi/gomega v1.27.6
        github.com/prometheus/client_golang v1.14.0
        github.com/spf13/pflag v1.0.5
        github.com/throttled/throttled v2.2.5+incompatible
-       golang.org/x/crypto v0.7.0
+       golang.org/x/crypto v0.8.0
        gopkg.in/yaml.v2 v2.4.0
-       k8s.io/api v0.26.2
-       k8s.io/apimachinery v0.26.2
-       k8s.io/client-go v0.26.2
-       k8s.io/code-generator v0.26.2
+       k8s.io/api v0.26.3
+       k8s.io/apimachinery v0.26.3
+       k8s.io/client-go v0.26.3
+       k8s.io/code-generator v0.26.3
        k8s.io/klog v1.0.0
        k8s.io/klog/v2 v2.90.1
 )
@@ -32,7 +32,7 @@
        github.com/go-openapi/jsonpointer v0.19.5 // indirect
        github.com/go-openapi/jsonreference v0.20.0 // indirect
        github.com/go-openapi/swag v0.21.1 // indirect
-       github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 // 
indirect
+       github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 // 
indirect
        github.com/gogo/protobuf v1.3.2 // indirect
        github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // 
indirect
        github.com/golang/protobuf v1.5.3 // indirect
@@ -54,11 +54,11 @@
        github.com/prometheus/common v0.37.0 // indirect
        github.com/prometheus/procfs v0.8.0 // indirect
        golang.org/x/mod v0.9.0 // indirect
-       golang.org/x/net v0.8.0 // indirect
+       golang.org/x/net v0.9.0 // indirect
        golang.org/x/oauth2 v0.0.0-20220223155221-ee480838109b // indirect
-       golang.org/x/sys v0.6.0 // indirect
-       golang.org/x/term v0.6.0 // indirect
-       golang.org/x/text v0.8.0 // indirect
+       golang.org/x/sys v0.7.0 // indirect
+       golang.org/x/term v0.7.0 // indirect
+       golang.org/x/text v0.9.0 // indirect
        golang.org/x/time v0.0.0-20220210224613-90d013bbcef8 // indirect
        golang.org/x/tools v0.7.0 // indirect
        google.golang.org/appengine v1.6.7 // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/go.sum 
new/sealed-secrets-0.20.3/go.sum
--- old/sealed-secrets-0.20.2/go.sum    2023-03-20 15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/go.sum    2023-04-17 12:37:45.000000000 +0200
@@ -99,8 +99,8 @@
 github.com/go-openapi/swag v0.21.1 
h1:wm0rhTb5z7qpJRHBdPOMuY4QjVUMbF6/kwoYeRAOrKU=
 github.com/go-openapi/swag v0.21.1/go.mod 
h1:QYRuS/SOXUCsnplDa677K7+DxSOj6IPNl/eQntq43wQ=
 github.com/go-stack/stack v1.8.0/go.mod 
h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY=
-github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0 
h1:p104kn46Q8WdvHunIJ9dAyjPVtrBPhSr3KT2yUst43I=
-github.com/go-task/slim-sprig v0.0.0-20210107165309-348f09dbbbc0/go.mod 
h1:fyg7847qk6SyHyPtNmDHnmrv/HOrqktSC+C9fM+CJOE=
+github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 
h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI=
+github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572/go.mod 
h1:9Pwr4B2jHnOSGXyyzV8ROjYa2ojvAY6HCGYYfMoC3Ls=
 github.com/gogo/protobuf v1.1.1/go.mod 
h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ=
 github.com/gogo/protobuf v1.3.2 h1:Ov1cvc58UF3b5XjBnZv7+opcTcQFZebYjWzi34vdm4Q=
 github.com/gogo/protobuf v1.3.2/go.mod 
h1:P1XiOD3dCwIKUDQYPy72D8LYyHL2YPYrpS2s69NZV8Q=
@@ -208,8 +208,8 @@
 github.com/mailru/easyjson v0.7.6/go.mod 
h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
 github.com/mailru/easyjson v0.7.7 
h1:UGYAvKxe3sBsEDzO8ZeWOSlIQfWFlxbzLZe7hwFURr0=
 github.com/mailru/easyjson v0.7.7/go.mod 
h1:xzfreul335JAWq5oZzymOObrkdz5UnU4kGfJJLY9Nlc=
-github.com/mattn/go-isatty v0.0.17 
h1:BTarxUcIeDqL27Mc+vyvdWYSL28zpIhv3RoTdsLMPng=
-github.com/mattn/go-isatty v0.0.17/go.mod 
h1:kYGgaQfpe5nmfYZH+SKPsOc2e4SrIfOl2e/yFXSvRLM=
+github.com/mattn/go-isatty v0.0.18 
h1:DOKFKCQ7FNG2L1rbrmstDN4QVRdS89Nkh85u68Uwp98=
+github.com/mattn/go-isatty v0.0.18/go.mod 
h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
 github.com/matttproud/golang_protobuf_extensions v1.0.1 
h1:4hp9jkHxhMHkqkrB3Ix0jegS5sx/RkqARlsWZ6pIwiU=
 github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod 
h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0=
 github.com/mkmik/multierror v0.3.0 
h1:FHr3n5BEVlzlTz8GRbuwimkL2zbdD2gTPcSh0wpRpUg=
@@ -227,10 +227,10 @@
 github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f/go.mod 
h1:qRWi+5nqEBWmkhHvq77mSJWrCKwh8bxhgT7d/eI7P4U=
 github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e 
h1:fD57ERR4JtEqsWbfPhv4DMiApHyliiK5xCTNVSPiaAs=
 github.com/niemeyer/pretty v0.0.0-20200227124842-a10e7caefd8e/go.mod 
h1:zD1mROLANZcx1PVRCS0qkT7pwLkGfwJo4zjcN/Tysno=
-github.com/onsi/ginkgo/v2 v2.9.1 
h1:zie5Ly042PD3bsCvsSOPvRnFwyo3rKe64TJlD6nu0mk=
-github.com/onsi/ginkgo/v2 v2.9.1/go.mod 
h1:FEcmzVcCHl+4o9bQZVab+4dC9+j+91t2FHSzmGAPfuo=
-github.com/onsi/gomega v1.27.4 h1:Z2AnStgsdSayCMDiCU42qIz+HLqEPcgiOCXjAU/w+8E=
-github.com/onsi/gomega v1.27.4/go.mod 
h1:riYq/GJKh8hhoM01HN6Vmuy93AarCXCBGpvFDK3q3fQ=
+github.com/onsi/ginkgo/v2 v2.9.2 
h1:BA2GMJOtfGAfagzYtrAlufIP0lq6QERkFmHLMLPwFSU=
+github.com/onsi/ginkgo/v2 v2.9.2/go.mod 
h1:WHcJJG2dIlcCqVfBAwUCrJxSPFb6v4azBwgxeMeDuts=
+github.com/onsi/gomega v1.27.6 h1:ENqfyGeS5AX/rlXDd/ETokDz93u0YufY1Pgxuy/PvWE=
+github.com/onsi/gomega v1.27.6/go.mod 
h1:PIQNjfQwkP3aQAH7lf7j87O/5FiNr+ZR8+ipb+qQlhg=
 github.com/pkg/errors v0.8.0/go.mod 
h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
 github.com/pkg/errors v0.8.1/go.mod 
h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
 github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
@@ -301,8 +301,8 @@
 golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod 
h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
 golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod 
h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
 golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod 
h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.7.0 h1:AvwMYaRytfdeVt3u6mLaxYtErKYjxA2OXjJ1HHq6t3A=
-golang.org/x/crypto v0.7.0/go.mod 
h1:pYwdfH91IfpZVANVyUOhSIPZaFoJGxTFbZhFTx+dXZU=
+golang.org/x/crypto v0.8.0 h1:pd9TJtTueMTVQXzk8E2XESSMQDj/U7OUu0PqJqPXQjQ=
+golang.org/x/crypto v0.8.0/go.mod 
h1:mRqEX+O9/h5TFCrQhkgjo2yKi0yYA+9ecGkdQoHrywE=
 golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod 
h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
 golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod 
h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA=
 golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod 
h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8=
@@ -369,8 +369,8 @@
 golang.org/x/net v0.0.0-20210805182204-aaa1db679c0d/go.mod 
h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
 golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod 
h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
 golang.org/x/net v0.0.0-20220225172249-27dd8689420f/go.mod 
h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk=
-golang.org/x/net v0.8.0 h1:Zrh2ngAOFYneWTAIAPethzeaQLuHwhuBkuV6ZiRnUaQ=
-golang.org/x/net v0.8.0/go.mod h1:QVkue5JL9kW//ek3r6jTKnTFis1tRmNAW2P1shuFdJc=
+golang.org/x/net v0.9.0 h1:aWJ/m6xSmxWBx+V0XRHTlrYrPG56jKsLdTFmsSsCzOM=
+golang.org/x/net v0.9.0/go.mod h1:d48xBJpPfHeWQsugry2m+kC02ZBRGRgulfHnEXEuWns=
 golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod 
h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U=
 golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod 
h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
 golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod 
h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw=
@@ -430,13 +430,13 @@
 golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/sys v0.0.0-20211216021012-1d35b9e2eb4e/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.0.0-20220811171246-fbc7d0a398ab/go.mod 
h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.6.0 h1:MVltZSvRTcU2ljQOhs94SXPftV6DCNnZViHeQps87pQ=
 golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/sys v0.7.0 h1:3jlCCIQZPdOYu1h8BkNvLz8Kgwtae2cagcG/VamtZRU=
+golang.org/x/sys v0.7.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
 golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod 
h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
 golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod 
h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
-golang.org/x/term v0.6.0 h1:clScbb1cHjoCkyRbWwBEUZ5H/tIFu5TAXIqaZD0Gcjw=
-golang.org/x/term v0.6.0/go.mod h1:m6U89DPEgQRMq3DNkDClhWw02AUbt2daBVO4cn4Hv9U=
+golang.org/x/term v0.7.0 h1:BEvjmm5fURWqcfbSKTdpkDXYBrUS1c0m8agp14W48vQ=
+golang.org/x/term v0.7.0/go.mod h1:P32HKFT3hSsZrRxla30E9HqToFYAQPCMs/zFMBUFqPY=
 golang.org/x/text v0.0.0-20170915032832-14c0d48ead0c/go.mod 
h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
 golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
 golang.org/x/text v0.3.1-0.20180807135948-17ff2d5776d2/go.mod 
h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
@@ -445,8 +445,8 @@
 golang.org/x/text v0.3.5/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
 golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
 golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
-golang.org/x/text v0.8.0 h1:57P1ETyNKtuIjB4SRd15iJxuhj8Gc416Y78H3qgMh68=
-golang.org/x/text v0.8.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
+golang.org/x/text v0.9.0 h1:2sjJmO8cDvYveuX97RDLsxlyUxLl+GHoLxBiRdHllBE=
+golang.org/x/text v0.9.0/go.mod h1:e1OnstbJyHTd6l/uOt8jFFHp6TRDWZR/bV3emEE/zU8=
 golang.org/x/time v0.0.0-20181108054448-85acf8d2951c/go.mod 
h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
 golang.org/x/time v0.0.0-20190308202827-9d24e82272b4/go.mod 
h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
 golang.org/x/time v0.0.0-20191024005414-555d28b269f0/go.mod 
h1:tRJNPiyCQ0inRvYxbN9jk5I+vvW/OXSQhTDSoE431IQ=
@@ -615,14 +615,14 @@
 honnef.co/go/tools v0.0.1-2019.2.3/go.mod 
h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg=
 honnef.co/go/tools v0.0.1-2020.1.3/go.mod 
h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
 honnef.co/go/tools v0.0.1-2020.1.4/go.mod 
h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k=
-k8s.io/api v0.26.2 h1:dM3cinp3PGB6asOySalOZxEG4CZ0IAdJsrYZXE/ovGQ=
-k8s.io/api v0.26.2/go.mod h1:1kjMQsFE+QHPfskEcVNgL3+Hp88B80uj0QtSOlj8itU=
-k8s.io/apimachinery v0.26.2 h1:da1u3D5wfR5u2RpLhE/ZtZS2P7QvDgLZTi9wrNZl/tQ=
-k8s.io/apimachinery v0.26.2/go.mod 
h1:ats7nN1LExKHvJ9TmwootT00Yz05MuYqPXEXaVeOy5I=
-k8s.io/client-go v0.26.2 h1:s1WkVujHX3kTp4Zn4yGNFK+dlDXy1bAAkIl+cFAiuYI=
-k8s.io/client-go v0.26.2/go.mod h1:u5EjOuSyBa09yqqyY7m3abZeovO/7D/WehVVlZ2qcqU=
-k8s.io/code-generator v0.26.2 h1:QMgN5oXUgQe27uMaqpbT0hg6ti+rvgCWaHEDMHVhox8=
-k8s.io/code-generator v0.26.2/go.mod 
h1:ryaiIKwfxEJEaywEzx3dhWOydpVctKYbqLajJf0O8dI=
+k8s.io/api v0.26.3 h1:emf74GIQMTik01Aum9dPP0gAypL8JTLl/lHa4V9RFSU=
+k8s.io/api v0.26.3/go.mod h1:PXsqwPMXBSBcL1lJ9CYDKy7kIReUydukS5JiRlxC3qE=
+k8s.io/apimachinery v0.26.3 h1:dQx6PNETJ7nODU3XPtrwkfuubs6w7sX0M8n61zHIV/k=
+k8s.io/apimachinery v0.26.3/go.mod 
h1:ats7nN1LExKHvJ9TmwootT00Yz05MuYqPXEXaVeOy5I=
+k8s.io/client-go v0.26.3 h1:k1UY+KXfkxV2ScEL3gilKcF7761xkYsSD6BC9szIu8s=
+k8s.io/client-go v0.26.3/go.mod h1:ZPNu9lm8/dbRIPAgteN30RSXea6vrCpFvq+MateTUuQ=
+k8s.io/code-generator v0.26.3 h1:DNYPsWoeFwmg4qFg97Z1cHSSv7KSG10mAEIFoZGTQM8=
+k8s.io/code-generator v0.26.3/go.mod 
h1:ryaiIKwfxEJEaywEzx3dhWOydpVctKYbqLajJf0O8dI=
 k8s.io/gengo v0.0.0-20220902162205-c0856e24416d 
h1:U9tB195lKdzwqicbJvyJeOXV7Klv+wNAWENRnXEGi08=
 k8s.io/gengo v0.0.0-20220902162205-c0856e24416d/go.mod 
h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
 k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/helm/sealed-secrets/Chart.yaml 
new/sealed-secrets-0.20.3/helm/sealed-secrets/Chart.yaml
--- old/sealed-secrets-0.20.2/helm/sealed-secrets/Chart.yaml    2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/helm/sealed-secrets/Chart.yaml    2023-04-17 
12:37:45.000000000 +0200
@@ -1,7 +1,7 @@
 annotations:
   category: DeveloperTools
 apiVersion: v2
-appVersion: v0.20.1
+appVersion: v0.20.2
 description: Helm chart for the sealed-secrets controller.
 home: https://github.com/bitnami-labs/sealed-secrets
 icon: 
https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png
@@ -14,4 +14,4 @@
     url: https://github.com/bitnami-labs/sealed-secrets
 name: sealed-secrets
 type: application
-version: 2.8.0
+version: 2.8.1
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/helm/sealed-secrets/README.md 
new/sealed-secrets-0.20.3/helm/sealed-secrets/README.md
--- old/sealed-secrets-0.20.2/helm/sealed-secrets/README.md     2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/helm/sealed-secrets/README.md     2023-04-17 
12:37:45.000000000 +0200
@@ -22,7 +22,7 @@
 - [Upgrading](#upgrading)
   - [To 2.0.0](#to-200)
 
-<!-- END doctoc generated TOC please keep comment here to allow auto update -->
+<!-- END doctoc generated TOC please keep comment here to allow auto-update -->
 
 ## TL;DR
 
@@ -37,7 +37,7 @@
 
 This chart bootstraps a [Sealed Secret 
Controller](https://github.com/bitnami-labs/sealed-secrets) Deployment in 
[Kubernetes](http://kubernetes.io) using the [Helm](https://helm.sh) package 
manager.
 
-Bitnami charts can be used with [Kubeapps](https://kubeapps.com/) for 
deployment and management of Helm Charts in clusters.
+Bitnami charts can be used with [Kubeapps](https://kubeapps.com/) for the 
deployment and management of Helm Charts in clusters.
 
 ## Prerequisites
 
@@ -85,7 +85,7 @@
 | ------------------------------------------------- | 
--------------------------------------------------------------------------------------
 | ----------------------------------- |
 | `image.registry`                                  | Sealed Secrets image 
registry                                                          | `docker.io` 
                        |
 | `image.repository`                                | Sealed Secrets image 
repository                                                        | 
`bitnami/sealed-secrets-controller` |
-| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                              | `v0.20.1`       
                    |
+| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                              | `v0.20.2`       
                    |
 | `image.pullPolicy`                                | Sealed Secrets image 
pull policy                                                       | 
`IfNotPresent`                      |
 | `image.pullSecrets`                               | Sealed Secrets image 
pull secrets                                                      | `[]`        
                        |
 | `createController`                                | Specifies whether the 
Sealed Secrets controller should be created                      | `true`       
                       |
@@ -128,7 +128,6 @@
 | `containerSecurityContext.runAsNonRoot`           | Indicates that the 
Sealed Secret container must run as a non-root user                 | `true`    
                          |
 | `containerSecurityContext.runAsUser`              | Set Sealed Secret 
containers' Security Context runAsUser                               | `1001`   
                           |
 | `containerSecurityContext.capabilities`           | Adds and removes POSIX 
capabilities from running containers (see `values.yaml`)        |               
                      |
-| `automountServiceAccountToken`                    | whether to automatically 
mount the service account API-token to a particular pod       | `true`          
                    |
 | `podLabels`                                       | Extra labels for Sealed 
Secret pods                                                    | `{}`           
                     |
 | `podAnnotations`                                  | Annotations for Sealed 
Secret pods                                                     | `{}`          
                      |
 | `priorityClassName`                               | Sealed Secret pods' 
priorityClassName                                                  | `""`       
                         |
@@ -166,18 +165,17 @@
 
 ### Other Parameters
 
-| Name                                          | Description                  
                                 | Value              |
-| --------------------------------------------- | 
------------------------------------------------------------- | 
------------------ |
-| `serviceAccount.annotations`                  | Annotations for Sealed 
Secret service account                 | `{}`               |
-| `serviceAccount.create`                       | Specifies whether a 
ServiceAccount should be created          | `true`             |
-| `serviceAccount.labels`                       | Extra labels to be added to 
the ServiceAccount                | `{}`               |
-| `serviceAccount.name`                         | The name of the 
ServiceAccount to use.                        | `""`               |
-| `serviceAccount.automountServiceAccountToken` | Specifies, whether to mount 
the service account API-token     | `true`             |
-| `rbac.create`                                 | Specifies whether RBAC 
resources should be created            | `true`             |
-| `rbac.clusterRole`                            | Specifies whether the 
Cluster Role resource should be created | `true`             |
-| `rbac.clusterRoleName`                        | Specifies the name for the 
Cluster Role resource              | `secrets-unsealer` |
-| `rbac.labels`                                 | Extra labels to be added to 
RBAC resources                    | `{}`               |
-| `rbac.pspEnabled`                             | PodSecurityPolicy            
                                 | `false`            |
+| Name                         | Description                                   
                | Value              |
+| ---------------------------- | 
------------------------------------------------------------- | 
------------------ |
+| `serviceAccount.annotations` | Annotations for Sealed Secret service account 
                | `{}`               |
+| `serviceAccount.create`      | Specifies whether a ServiceAccount should be 
created          | `true`             |
+| `serviceAccount.labels`      | Extra labels to be added to the 
ServiceAccount                | `{}`               |
+| `serviceAccount.name`        | The name of the ServiceAccount to use.        
                | `""`               |
+| `rbac.create`                | Specifies whether RBAC resources should be 
created            | `true`             |
+| `rbac.clusterRole`           | Specifies whether the Cluster Role resource 
should be created | `true`             |
+| `rbac.clusterRoleName`       | Specifies the name for the Cluster Role 
resource              | `secrets-unsealer` |
+| `rbac.labels`                | Extra labels to be added to RBAC resources    
                | `{}`               |
+| `rbac.pspEnabled`            | PodSecurityPolicy                             
                | `false`            |
 
 ### Metrics parameters
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.20.2/helm/sealed-secrets/crds/bitnami.com_sealedsecrets.yaml
 
new/sealed-secrets-0.20.3/helm/sealed-secrets/crds/bitnami.com_sealedsecrets.yaml
--- 
old/sealed-secrets-0.20.2/helm/sealed-secrets/crds/bitnami.com_sealedsecrets.yaml
   2023-03-20 15:59:05.000000000 +0100
+++ 
new/sealed-secrets-0.20.3/helm/sealed-secrets/crds/bitnami.com_sealedsecrets.yaml
   2023-04-17 12:37:45.000000000 +0200
@@ -2,7 +2,7 @@
 kind: CustomResourceDefinition
 metadata:
   annotations:
-    controller-gen.kubebuilder.io/version: v0.9.2
+    controller-gen.kubebuilder.io/version: v0.11.3
   creationTimestamp: null
   name: sealedsecrets.bitnami.com
 spec:
@@ -59,6 +59,23 @@
                   metadata:
                     description: 'Standard object''s metadata. More info: 
https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata'
                     nullable: true
+                    properties:
+                      annotations:
+                        additionalProperties:
+                          type: string
+                        type: object
+                      finalizers:
+                        items:
+                          type: string
+                        type: array
+                      labels:
+                        additionalProperties:
+                          type: string
+                        type: object
+                      name:
+                        type: string
+                      namespace:
+                        type: string
                     type: object
                     x-kubernetes-preserve-unknown-fields: true
                   type:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.20.2/helm/sealed-secrets/templates/deployment.yaml 
new/sealed-secrets-0.20.3/helm/sealed-secrets/templates/deployment.yaml
--- old/sealed-secrets-0.20.2/helm/sealed-secrets/templates/deployment.yaml     
2023-03-20 15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/helm/sealed-secrets/templates/deployment.yaml     
2023-04-17 12:37:45.000000000 +0200
@@ -46,7 +46,6 @@
       securityContext: {{- omit .Values.podSecurityContext "enabled" | toYaml 
| nindent 8 }}
       {{- end }}
       serviceAccountName: {{ include "sealed-secrets.serviceAccountName" . }}
-      automountServiceAccountToken: {{ .Values.automountServiceAccountToken }}
       {{- if .Values.hostNetwork }}
       hostNetwork: true
       {{- end }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.20.2/helm/sealed-secrets/templates/service-account.yaml 
new/sealed-secrets-0.20.3/helm/sealed-secrets/templates/service-account.yaml
--- 
old/sealed-secrets-0.20.2/helm/sealed-secrets/templates/service-account.yaml    
    2023-03-20 15:59:05.000000000 +0100
+++ 
new/sealed-secrets-0.20.3/helm/sealed-secrets/templates/service-account.yaml    
    2023-04-17 12:37:45.000000000 +0200
@@ -1,7 +1,6 @@
 {{ if .Values.serviceAccount.create }}
 apiVersion: v1
 kind: ServiceAccount
-automountServiceAccountToken: {{ 
.Values.serviceAccount.automountServiceAccountToken }}
 metadata:
   name: {{ include "sealed-secrets.serviceAccountName" . }}
   namespace: {{ include "sealed-secrets.namespace" . }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.20.2/helm/sealed-secrets/values.yaml 
new/sealed-secrets-0.20.3/helm/sealed-secrets/values.yaml
--- old/sealed-secrets-0.20.2/helm/sealed-secrets/values.yaml   2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/helm/sealed-secrets/values.yaml   2023-04-17 
12:37:45.000000000 +0200
@@ -33,7 +33,7 @@
 image:
   registry: docker.io
   repository: bitnami/sealed-secrets-controller
-  tag: v0.20.1
+  tag: v0.20.2
   ## Specify a imagePullPolicy
   ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
   ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
@@ -169,9 +169,6 @@
     drop:
       - ALL
 
-## @param automountServiceAccountToken whether to automatically mount the 
service account API-token to a particular pod
-automountServiceAccountToken: true
-
 ## @param podLabels [object] Extra labels for Sealed Secret pods
 ## ref: 
https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/
 ##
@@ -347,8 +344,6 @@
   ## If not set and create is true, a name is generated using the 
sealed-secrets.fullname template
   ##
   name: ""
-  ## @param serviceAccount.automountServiceAccountToken Specifies, whether to 
mount the service account API-token
-  automountServiceAccountToken: true
 ## RBAC configuration
 ##
 rbac:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.20.2/pkg/apis/sealedsecrets/v1alpha1/types.go 
new/sealed-secrets-0.20.3/pkg/apis/sealedsecrets/v1alpha1/types.go
--- old/sealed-secrets-0.20.2/pkg/apis/sealedsecrets/v1alpha1/types.go  
2023-03-20 15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/pkg/apis/sealedsecrets/v1alpha1/types.go  
2023-04-17 12:37:45.000000000 +0200
@@ -36,7 +36,7 @@
        // More info: 
https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata
        // +optional
        // +nullable
-       // +kubebuilder:validation:XPreserveUnknownFields
+       // +kubebuilder:pruning:PreserveUnknownFields
        metav1.ObjectMeta `json:"metadata,omitempty" 
protobuf:"bytes,1,opt,name=metadata"`
 
        // Used to facilitate programmatic handling of secret data.
@@ -61,7 +61,7 @@
        EncryptedData SealedSecretEncryptedData `json:"encryptedData"`
 }
 
-// +kubebuilder:validation:XPreserveUnknownFields
+// +kubebuilder:pruning:PreserveUnknownFields
 type SealedSecretEncryptedData map[string]string
 
 func (s *SealedSecretEncryptedData) UnmarshalJSON(data []byte) error {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/pkg/controller/controller.go 
new/sealed-secrets-0.20.3/pkg/controller/controller.go
--- old/sealed-secrets-0.20.2/pkg/controller/controller.go      2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/pkg/controller/controller.go      2023-04-17 
12:37:45.000000000 +0200
@@ -7,6 +7,7 @@
        "errors"
        "fmt"
        "log"
+       "reflect"
        "time"
 
        corev1 "k8s.io/api/core/v1"
@@ -109,9 +110,7 @@
 }
 
 func watchSealedSecrets(ssinformer ssinformer.SharedInformerFactory, queue 
workqueue.RateLimitingInterface) (cache.SharedIndexInformer, error) {
-       ssInformer := ssinformer.Bitnami().V1alpha1().
-               SealedSecrets().
-               Informer()
+       ssInformer := ssinformer.Bitnami().V1alpha1().SealedSecrets().Informer()
        _, err := ssInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{
                AddFunc: func(obj interface{}) {
                        key, err := cache.MetaNamespaceKeyFunc(obj)
@@ -122,7 +121,11 @@
                UpdateFunc: func(oldObj, newObj interface{}) {
                        key, err := cache.MetaNamespaceKeyFunc(newObj)
                        if err == nil {
-                               queue.Add(key)
+                               if sealedSecretChanged(oldObj, newObj) {
+                                       queue.Add(key)
+                               } else {
+                                       log.Printf("update suppressed, no 
changes in sealed secret spec of %v", key)
+                               }
                        }
                },
                DeleteFunc: func(obj interface{}) {
@@ -141,6 +144,18 @@
        return ssInformer, nil
 }
 
+func sealedSecretChanged(oldObj, newObj interface{}) bool {
+       oldSealedSecret, err := convertSealedSecret(oldObj)
+       if err != nil {
+               return true // any conversion error means we assume it might 
have changed
+       }
+       newSealedSecret, err := convertSealedSecret(newObj)
+       if err != nil {
+               return true
+       }
+       return !reflect.DeepEqual(oldSealedSecret.Spec, newSealedSecret.Spec)
+}
+
 func watchSecrets(sinformer informers.SharedInformerFactory, ssclientset 
ssclientset.Interface, queue workqueue.RateLimitingInterface) 
(cache.SharedIndexInformer, error) {
        sInformer := sinformer.Core().V1().Secrets().Informer()
        _, err := sInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/pkg/controller/keyregistry.go 
new/sealed-secrets-0.20.3/pkg/controller/keyregistry.go
--- old/sealed-secrets-0.20.2/pkg/controller/keyregistry.go     2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/pkg/controller/keyregistry.go     2023-04-17 
12:37:45.000000000 +0200
@@ -20,7 +20,7 @@
        private      *rsa.PrivateKey
        cert         *x509.Certificate
        fingerprint  string
-       creationTime time.Time
+       orderingTime time.Time
 }
 
 // A KeyRegistry manages the key pairs used to (un)seal secrets.
@@ -66,7 +66,7 @@
        return generatedName, nil
 }
 
-func (kr *KeyRegistry) registerNewKey(keyName string, privKey *rsa.PrivateKey, 
cert *x509.Certificate, creationTime time.Time) error {
+func (kr *KeyRegistry) registerNewKey(keyName string, privKey *rsa.PrivateKey, 
cert *x509.Certificate, orderingTime time.Time) error {
        fingerprint, err := crypto.PublicKeyFingerprint(&privKey.PublicKey)
        if err != nil {
                return err
@@ -76,11 +76,11 @@
                private:      privKey,
                cert:         cert,
                fingerprint:  fingerprint,
-               creationTime: creationTime,
+               orderingTime: orderingTime,
        }
        kr.keys[k.fingerprint] = k
 
-       if kr.mostRecentKey == nil || 
kr.mostRecentKey.creationTime.Before(creationTime) {
+       if kr.mostRecentKey == nil || 
kr.mostRecentKey.orderingTime.Before(orderingTime) {
                kr.mostRecentKey = k
        }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/pkg/controller/keys_test.go 
new/sealed-secrets-0.20.3/pkg/controller/keys_test.go
--- old/sealed-secrets-0.20.2/pkg/controller/keys_test.go       2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/pkg/controller/keys_test.go       2023-04-17 
12:37:45.000000000 +0200
@@ -28,6 +28,10 @@
        return crypto.SignKey(r, key, time.Hour, "testcn")
 }
 
+func signKeyWithNotBefore(r io.Reader, key *rsa.PrivateKey, notBefore 
time.Time) (*x509.Certificate, error) {
+       return crypto.SignKeyWithNotBefore(r, key, notBefore, time.Hour, 
"testcn")
+}
+
 func TestReadKey(t *testing.T) {
        rand := testRand()
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/pkg/controller/main.go 
new/sealed-secrets-0.20.3/pkg/controller/main.go
--- old/sealed-secrets-0.20.2/pkg/controller/main.go    2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/pkg/controller/main.go    2023-04-17 
12:37:45.000000000 +0200
@@ -82,8 +82,7 @@
                if err != nil {
                        log.Printf("Error reading key %s: %v", secret.Name, err)
                }
-               ct := secret.CreationTimestamp
-               if err := keyRegistry.registerNewKey(secret.Name, key, 
certs[0], ct.Time); err != nil {
+               if err := keyRegistry.registerNewKey(secret.Name, key, 
certs[0], certs[0].NotBefore); err != nil {
                        return nil, err
                }
                log.Printf("----- %s", secret.Name)
@@ -112,7 +111,7 @@
 func initKeyRenewal(ctx context.Context, registry *KeyRegistry, period, 
validFor time.Duration, cutoffTime time.Time, cn string) (func(), error) {
        // Create a new key if it's the first key,
        // or if it's older than cutoff time.
-       if len(registry.keys) == 0 || 
registry.mostRecentKey.creationTime.Before(cutoffTime) {
+       if len(registry.keys) == 0 || 
registry.mostRecentKey.orderingTime.Before(cutoffTime) {
                if _, err := registry.generateKey(ctx, validFor, cn); err != 
nil {
                        return nil, err
                }
@@ -130,7 +129,7 @@
 
        // If key rotation is enabled, we'll rotate the key when the most recent
        // key becomes stale (older than period).
-       mostRecentKeyAge := time.Since(registry.mostRecentKey.creationTime)
+       mostRecentKeyAge := time.Since(registry.mostRecentKey.orderingTime)
        initialDelay := period - mostRecentKeyAge
        if initialDelay < 0 {
                initialDelay = 0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/pkg/controller/main_test.go 
new/sealed-secrets-0.20.3/pkg/controller/main_test.go
--- old/sealed-secrets-0.20.2/pkg/controller/main_test.go       2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/pkg/controller/main_test.go       2023-04-17 
12:37:45.000000000 +0200
@@ -204,11 +204,6 @@
                t.Fatalf("Failed to generate test key: %v", err)
        }
 
-       cert, err := signKey(rand, key)
-       if err != nil {
-               t.Fatalf("signKey failed: %v", err)
-       }
-
        // we'll simulate the existence of a secret that is about to expire
        // by making it old enough so that it's just "staleness" short of using
        // the full rotation "period".
@@ -217,11 +212,17 @@
                staleness = 100 * time.Millisecond
                oldAge    = period - staleness
        )
+       notBefore := time.Now().Add(-oldAge)
+
+       cert, err := signKeyWithNotBefore(rand, key, notBefore)
+       if err != nil {
+               t.Fatalf("signKey failed: %v", err)
+       }
+
        client := fake.NewSimpleClientset()
        client.PrependReactor("create", "secrets", generateNameReactor)
 
-       _, err = writeKey(ctx, client, key, []*x509.Certificate{cert}, 
"namespace", SealedSecretsKeyLabel, "prefix",
-               
writeKeyWithCreationTime(metav1.NewTime(time.Now().Add(-oldAge))))
+       _, err = writeKey(ctx, client, key, []*x509.Certificate{cert}, 
"namespace", SealedSecretsKeyLabel, "prefix")
        if err != nil {
                t.Errorf("writeKey() failed with: %v", err)
        }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/pkg/crypto/keys.go 
new/sealed-secrets-0.20.3/pkg/crypto/keys.go
--- old/sealed-secrets-0.20.2/pkg/crypto/keys.go        2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/pkg/crypto/keys.go        2023-04-17 
12:37:45.000000000 +0200
@@ -29,7 +29,13 @@
        // TODO: use certificates API to get this signed by the cluster root CA
        // See https://kubernetes.io/docs/tasks/tls/managing-tls-in-a-cluster/
 
-       notBefore := time.Now()
+       return SignKeyWithNotBefore(r, key, time.Now(), validFor, cn)
+}
+
+// SignKeyWithNotBefore returns a signed certificate with custom notBefore.
+func SignKeyWithNotBefore(r io.Reader, key *rsa.PrivateKey, notBefore 
time.Time, validFor time.Duration, cn string) (*x509.Certificate, error) {
+       // TODO: use certificates API to get this signed by the cluster root CA
+       // See https://kubernetes.io/docs/tasks/tls/managing-tls-in-a-cluster/
 
        serialNo, err := rand.Int(r, new(big.Int).Lsh(big.NewInt(1), 128))
        if err != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/schema-v1alpha1.yaml 
new/sealed-secrets-0.20.3/schema-v1alpha1.yaml
--- old/sealed-secrets-0.20.2/schema-v1alpha1.yaml      2023-03-20 
15:59:05.000000000 +0100
+++ new/sealed-secrets-0.20.3/schema-v1alpha1.yaml      2023-04-17 
12:37:45.000000000 +0200
@@ -33,6 +33,23 @@
             metadata:
               description: 'Standard object''s metadata. More info: 
https://git.k8s.io/community/contributors/devel/api-conventions.md#metadata'
               nullable: true
+              properties:
+                annotations:
+                  additionalProperties:
+                    type: string
+                  type: object
+                finalizers:
+                  items:
+                    type: string
+                  type: array
+                labels:
+                  additionalProperties:
+                    type: string
+                  type: object
+                name:
+                  type: string
+                namespace:
+                  type: string
               type: object
               x-kubernetes-preserve-unknown-fields: true
             type:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.20.2/versions.env 
new/sealed-secrets-0.20.3/versions.env
--- old/sealed-secrets-0.20.2/versions.env      2023-03-20 15:59:05.000000000 
+0100
+++ new/sealed-secrets-0.20.3/versions.env      2023-04-17 12:37:45.000000000 
+0200
@@ -1,2 +1,2 @@
-GO_VERSION=1.19.4
+GO_VERSION=1.20.3
 GO_VERSION_LIST="[\"$GO_VERSION\"]"

++++++ sealed-secrets.obsinfo ++++++
--- /var/tmp/diff_new_pack.4BLGJg/_old  2023-04-17 18:15:29.842205606 +0200
+++ /var/tmp/diff_new_pack.4BLGJg/_new  2023-04-17 18:15:29.842205606 +0200
@@ -1,5 +1,5 @@
 name: sealed-secrets
-version: 0.20.2
-mtime: 1679324345
-commit: 8de5579df4a683d95135275938d9000d4407da8b
+version: 0.20.3
+mtime: 1681727865
+commit: 36da266068a225040d1ed8e60b41277d8126b17a
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.kubeseal.new.2023/vendor.tar.gz differ: char 5, 
line 1

Reply via email to