Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kubeseal for openSUSE:Factory 
checked in at 2025-12-18 18:37:11
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kubeseal (Old)
 and      /work/SRC/openSUSE:Factory/.kubeseal.new.1928 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kubeseal"

Thu Dec 18 18:37:11 2025 rev:42 rq:1323526 version:0.34.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes        2025-11-10 
19:21:17.874304108 +0100
+++ /work/SRC/openSUSE:Factory/.kubeseal.new.1928/kubeseal.changes      
2025-12-18 18:37:47.785604041 +0100
@@ -1,0 +2,24 @@
+Thu Dec 18 13:38:33 UTC 2025 - Johannes Kastl 
<[email protected]>
+
+- Update to version 0.34.0:
+  * Release notes 0.34.0 (#1855)
+  * Add kseal to README (#1852)
+  * Bump golang version to the latest available 1.24 (#1854)
+  * Bump k8s.io/code-generator from 0.34.2 to 0.34.3 (#1850)
+  * Bump k8s.io/client-go from 0.34.2 to 0.34.3 (#1848)
+  * Bump github.com/onsi/ginkgo/v2 from 2.27.2 to 2.27.3 (#1843)
+  * Bump distroless/static from `87bce11` to `4b2a093` in /docker
+    (#1846)
+  * Bump github.com/onsi/gomega from 1.38.2 to 1.38.3 (#1844)
+  * Bump golang.org/x/crypto from 0.45.0 to 0.46.0 (#1845)
+  * Make controllers kubeclient QPS & Burst configurable. (#1834)
+  * use default method to watch for key secrets (#1831)
+  * Bump golang.org/x/crypto from 0.44.0 to 0.45.0 in the
+    go_modules group across 1 directory (#1840)
+  * Bump k8s.io/code-generator from 0.34.1 to 0.34.2 (#1839)
+  * Bump golang.org/x/crypto from 0.43.0 to 0.44.0 (#1835)
+  * Bump k8s.io/client-go from 0.34.1 to 0.34.2 (#1837)
+  * Release carvel package 2.17.9 (#1830)
+  * Release chart 2.17.9 (#1829)
+
+-------------------------------------------------------------------

Old:
----
  kubeseal-0.33.1.obscpio

New:
----
  kubeseal-0.34.0.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ kubeseal.spec ++++++
--- /var/tmp/diff_new_pack.DdXVxl/_old  2025-12-18 18:37:50.409714283 +0100
+++ /var/tmp/diff_new_pack.DdXVxl/_new  2025-12-18 18:37:50.421714786 +0100
@@ -17,7 +17,7 @@
 
 
 Name:           kubeseal
-Version:        0.33.1
+Version:        0.34.0
 Release:        0
 Summary:        CLI for encrypting secrets to SealedSecrets
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.DdXVxl/_old  2025-12-18 18:37:50.793730415 +0100
+++ /var/tmp/diff_new_pack.DdXVxl/_new  2025-12-18 18:37:50.841732432 +0100
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/bitnami-labs/sealed-secrets</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.33.1</param>
+    <param name="revision">v0.34.0</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="versionrewrite-pattern">v(.*)</param>
     <param name="changesgenerate">enable</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.DdXVxl/_old  2025-12-18 18:37:51.037740666 +0100
+++ /var/tmp/diff_new_pack.DdXVxl/_new  2025-12-18 18:37:51.085742683 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/bitnami-labs/sealed-secrets</param>
-              <param 
name="changesrevision">1e1ac9ecbc280ff4f9e15504bde2bda8d79906b2</param></service></servicedata>
+              <param 
name="changesrevision">fd30a3eb590170d99e5d62df254d097a2c131144</param></service></servicedata>
 (No newline at EOF)
 

++++++ kubeseal-0.33.1.obscpio -> kubeseal-0.34.0.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/README.md 
new/kubeseal-0.34.0/README.md
--- old/kubeseal-0.33.1/README.md       2025-11-06 17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/README.md       2025-12-18 13:53:43.000000000 +0100
@@ -851,6 +851,7 @@
 
 ### Related projects
 
+- `kseal` A Kubeseal Companion: 
[https://github.com/eznix86/kseal](https://github.com/eznix86/kseal)
 - `kubeseal-convert`: 
[https://github.com/EladLeev/kubeseal-convert](https://github.com/EladLeev/kubeseal-convert)
 - Visual Studio Code extension: 
[https://marketplace.visualstudio.com/items?itemName=codecontemplator.kubeseal](https://marketplace.visualstudio.com/items?itemName=codecontemplator.kubeseal)
 - WebSeal: generates secrets in the browser: 
[https://socialgouv.github.io/webseal](https://socialgouv.github.io/webseal)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/RELEASE-NOTES.md 
new/kubeseal-0.34.0/RELEASE-NOTES.md
--- old/kubeseal-0.33.1/RELEASE-NOTES.md        2025-11-06 17:30:11.000000000 
+0100
+++ new/kubeseal-0.34.0/RELEASE-NOTES.md        2025-12-18 13:53:43.000000000 
+0100
@@ -4,6 +4,23 @@
 
 
[![](https://img.shields.io/github/release/bitnami-labs/sealed-secrets.svg)](https://github.com/bitnami-labs/sealed-secrets/releases/latest)
 
+## v0.34.0
+
+- Add kseal to README 
([#1852)](https://github.com/bitnami-labs/sealed-secrets/pull/1852))
+- Bump golang version to the latest available 1.24 
([#1854](https://github.com/bitnami-labs/sealed-secrets/pull/1854))
+- Bump k8s.io/code-generator from 0.34.2 to 0.34.3 
([#1850](https://github.com/bitnami-labs/sealed-secrets/pull/1850))
+- Bump k8s.io/client-go from 0.34.2 to 0.34.3 
([#1848](https://github.com/bitnami-labs/sealed-secrets/pull/1848))
+- Bump github.com/onsi/ginkgo/v2 from 2.27.2 to 2.27.3 
([#1843](https://github.com/bitnami-labs/sealed-secrets/pull/1843))
+- Bump distroless/static from `87bce11` to `4b2a093` in /docker 
([#1846](https://github.com/bitnami-labs/sealed-secrets/pull/1846))
+- Bump github.com/onsi/gomega from 1.38.2 to 1.38.3 
([#1844](https://github.com/bitnami-labs/sealed-secrets/pull/1844))
+- Bump golang.org/x/crypto from 0.45.0 to 0.46.0 
([#1845](https://github.com/bitnami-labs/sealed-secrets/pull/1845))
+- Make controllers kubeclient QPS & Burst configurable. 
([#1834](https://github.com/bitnami-labs/sealed-secrets/pull/1834))
+- use default method to watch for key secrets 
([#1831](https://github.com/bitnami-labs/sealed-secrets/pull/1831))
+- Bump golang.org/x/crypto from 0.44.0 to 0.45.0 in the go_modules group 
across 1 directory 
([#1840](https://github.com/bitnami-labs/sealed-secrets/pull/1840))
+- Bump k8s.io/code-generator from 0.34.1 to 0.34.2 
([#1839](https://github.com/bitnami-labs/sealed-secrets/pull/1839))
+- Bump golang.org/x/crypto from 0.43.0 to 0.44.0 
([#1835](https://github.com/bitnami-labs/sealed-secrets/pull/1835))
+- Bump k8s.io/client-go from 0.34.1 to 0.34.2 
([#1837](https://github.com/bitnami-labs/sealed-secrets/pull/1837))
+
 ## v0.33.1
 
 - Release done to fix missing helm chart code.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/carvel/package.yaml 
new/kubeseal-0.34.0/carvel/package.yaml
--- old/kubeseal-0.33.1/carvel/package.yaml     2025-11-06 17:30:11.000000000 
+0100
+++ new/kubeseal-0.34.0/carvel/package.yaml     2025-12-18 13:53:43.000000000 
+0100
@@ -1,10 +1,10 @@
 apiVersion: data.packaging.carvel.dev/v1alpha1
 kind: Package
 metadata:
-  name: "sealedsecrets.bitnami.com.2.17.8"
+  name: "sealedsecrets.bitnami.com.2.17.9"
 spec:
   refName: "sealedsecrets.bitnami.com"
-  version: "2.17.8"
+  version: "2.17.9"
   valuesSchema:
     openAPIv3:
       title: Chart Values
@@ -424,7 +424,7 @@
     spec:
       fetch:
         - imgpkgBundle:
-            image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel@sha256:4a253923c67fcd5f72c72663a9c1cc79aaa1ba63b01bcb7f34c3109704427a19
+            image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel@sha256:1e9854b7d7eec3d51776ebeb09cff9fcda88530a38e62c11fdfcec7cdd7633d2
       template:
         - helmTemplate:
             path: sealed-secrets
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/cmd/controller/main.go 
new/kubeseal-0.34.0/cmd/controller/main.go
--- old/kubeseal-0.33.1/cmd/controller/main.go  2025-11-06 17:30:11.000000000 
+0100
+++ new/kubeseal-0.34.0/cmd/controller/main.go  2025-12-18 13:53:43.000000000 
+0100
@@ -63,6 +63,9 @@
        _ = fs.MarkDeprecated("rotate-period", "please use key-renew-period 
instead")
 
        fs.IntVar(&f.MaxRetries, "max-unseal-retries", 5, "Max unseal retries.")
+
+       fs.Float32Var(&f.KubeClientQPS, "kubeclient-qps", 5, "Kubeclient QPS 
(negative value disables ratelimiting)")
+       fs.IntVar(&f.KubeClientBurst, "kubeclient-burst", 10, "Kubeclient 
Burst")
 }
 
 func bindFlags(f *controller.Flags, fs *flag.FlagSet, gofs *goflag.FlagSet) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/docker/controller.Dockerfile 
new/kubeseal-0.34.0/docker/controller.Dockerfile
--- old/kubeseal-0.33.1/docker/controller.Dockerfile    2025-11-06 
17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/docker/controller.Dockerfile    2025-12-18 
13:53:43.000000000 +0100
@@ -1,4 +1,4 @@
-FROM 
gcr.io/distroless/static@sha256:87bce11be0af225e4ca761c40babb06d6d559f5767fbf7dc3c47f0f1a466b92c
+FROM 
gcr.io/distroless/static@sha256:4b2a093ef4649bccd586625090a3c668b254cfe180dee54f4c94f3e9bd7e381e
 LABEL maintainer "Sealed Secrets <[email protected]>"
 
 USER 1001
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/docker/kubeseal.Dockerfile 
new/kubeseal-0.34.0/docker/kubeseal.Dockerfile
--- old/kubeseal-0.33.1/docker/kubeseal.Dockerfile      2025-11-06 
17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/docker/kubeseal.Dockerfile      2025-12-18 
13:53:43.000000000 +0100
@@ -1,4 +1,4 @@
-FROM 
gcr.io/distroless/static@sha256:87bce11be0af225e4ca761c40babb06d6d559f5767fbf7dc3c47f0f1a466b92c
+FROM 
gcr.io/distroless/static@sha256:4b2a093ef4649bccd586625090a3c668b254cfe180dee54f4c94f3e9bd7e381e
 LABEL maintainer "Sealed Secrets <[email protected]>"
 
 USER 1001
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/go.mod new/kubeseal-0.34.0/go.mod
--- old/kubeseal-0.33.1/go.mod  2025-11-06 17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/go.mod  2025-12-18 13:53:43.000000000 +0100
@@ -1,6 +1,6 @@
 module github.com/bitnami-labs/sealed-secrets
 
-go 1.25.4
+go 1.25.5
 
 require (
        github.com/Masterminds/sprig/v3 v3.3.0
@@ -8,18 +8,18 @@
        github.com/google/renameio v0.1.0
        github.com/mattn/go-isatty v0.0.20
        github.com/mkmik/multierror v0.4.0
-       github.com/onsi/ginkgo/v2 v2.27.2
-       github.com/onsi/gomega v1.38.2
+       github.com/onsi/ginkgo/v2 v2.27.3
+       github.com/onsi/gomega v1.38.3
        github.com/prometheus/client_golang v1.23.2
        github.com/prometheus/client_model v0.6.2
        github.com/spf13/pflag v1.0.10
        github.com/throttled/throttled v2.2.5+incompatible
-       golang.org/x/crypto v0.43.0
+       golang.org/x/crypto v0.46.0
        gopkg.in/yaml.v2 v2.4.0
-       k8s.io/api v0.34.1
-       k8s.io/apimachinery v0.34.1
-       k8s.io/client-go v0.34.1
-       k8s.io/code-generator v0.34.1
+       k8s.io/api v0.34.3
+       k8s.io/apimachinery v0.34.3
+       k8s.io/client-go v0.34.3
+       k8s.io/code-generator v0.34.3
        k8s.io/klog v1.0.0
        k8s.io/klog/v2 v2.130.1
        k8s.io/utils v0.0.0-20250604170112-4c0f3b243397
@@ -63,15 +63,15 @@
        github.com/x448/float16 v0.8.4 // indirect
        go.yaml.in/yaml/v2 v2.4.2 // indirect
        go.yaml.in/yaml/v3 v3.0.4 // indirect
-       golang.org/x/mod v0.28.0 // indirect
-       golang.org/x/net v0.45.0 // indirect
+       golang.org/x/mod v0.30.0 // indirect
+       golang.org/x/net v0.47.0 // indirect
        golang.org/x/oauth2 v0.30.0 // indirect
-       golang.org/x/sync v0.17.0 // indirect
-       golang.org/x/sys v0.37.0 // indirect
-       golang.org/x/term v0.36.0 // indirect
-       golang.org/x/text v0.30.0 // indirect
+       golang.org/x/sync v0.19.0 // indirect
+       golang.org/x/sys v0.39.0 // indirect
+       golang.org/x/term v0.38.0 // indirect
+       golang.org/x/text v0.32.0 // indirect
        golang.org/x/time v0.9.0 // indirect
-       golang.org/x/tools v0.37.0 // indirect
+       golang.org/x/tools v0.39.0 // indirect
        golang.org/x/tools/go/packages/packagestest v0.1.1-deprecated // 
indirect
        google.golang.org/protobuf v1.36.8 // indirect
        gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/go.sum new/kubeseal-0.34.0/go.sum
--- old/kubeseal-0.33.1/go.sum  2025-11-06 17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/go.sum  2025-12-18 13:53:43.000000000 +0100
@@ -96,10 +96,10 @@
 github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee/go.mod 
h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
 github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 
h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
 github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod 
h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
-github.com/onsi/ginkgo/v2 v2.27.2 
h1:LzwLj0b89qtIy6SSASkzlNvX6WktqurSHwkk2ipF/Ns=
-github.com/onsi/ginkgo/v2 v2.27.2/go.mod 
h1:ArE1D/XhNXBXCBkKOLkbsb2c81dQHCRcF5zwn/ykDRo=
-github.com/onsi/gomega v1.38.2 h1:eZCjf2xjZAqe+LeWvKb5weQ+NcPwX84kqJ0cZNxok2A=
-github.com/onsi/gomega v1.38.2/go.mod 
h1:W2MJcYxRGV63b418Ai34Ud0hEdTVXq9NW9+Sx6uXf3k=
+github.com/onsi/ginkgo/v2 v2.27.3 
h1:ICsZJ8JoYafeXFFlFAG75a7CxMsJHwgKwtO+82SE9L8=
+github.com/onsi/ginkgo/v2 v2.27.3/go.mod 
h1:ArE1D/XhNXBXCBkKOLkbsb2c81dQHCRcF5zwn/ykDRo=
+github.com/onsi/gomega v1.38.3 h1:eTX+W6dobAYfFeGC2PV6RwXRu/MyT+cQguijutvkpSM=
+github.com/onsi/gomega v1.38.3/go.mod 
h1:ZCU1pkQcXDO5Sl9/VVEGlDyp+zm0m1cmeG5TOzLgdh4=
 github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
 github.com/pkg/errors v0.9.1/go.mod 
h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
 github.com/pmezard/go-difflib v1.0.0 
h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
@@ -149,45 +149,45 @@
 golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod 
h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
 golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod 
h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
 golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod 
h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.43.0 h1:dduJYIi3A3KOfdGOHX8AVZ/jGiyPa3IbBozJ5kNuE04=
-golang.org/x/crypto v0.43.0/go.mod 
h1:BFbav4mRNlXJL4wNeejLpWxB7wMbc79PdRGhWKncxR0=
+golang.org/x/crypto v0.46.0 h1:cKRW/pmt1pKAfetfu+RCEvjvZkA9RimPbh7bhFjGVBU=
+golang.org/x/crypto v0.46.0/go.mod 
h1:Evb/oLKmMraqjZ2iQTwDwvCtJkczlDuTmdJXoZVzqU0=
 golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
 golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
-golang.org/x/mod v0.28.0 h1:gQBtGhjxykdjY9YhZpSlZIsbnaE2+PgjfLWUQTnoZ1U=
-golang.org/x/mod v0.28.0/go.mod h1:yfB/L0NOf/kmEbXjzCPOx1iK1fRutOydrCMsqRhEBxI=
+golang.org/x/mod v0.30.0 h1:fDEXFVZ/fmCKProc/yAXXUijritrDzahmwwefnjoPFk=
+golang.org/x/mod v0.30.0/go.mod h1:lAsf5O2EvJeSFMiBxXDki7sCgAxEUcZHXoXMKT4GJKc=
 golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod 
h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg=
 golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod 
h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
 golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod 
h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
 golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod 
h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.45.0 h1:RLBg5JKixCy82FtLJpeNlVM0nrSqpCRYzVU1n8kj0tM=
-golang.org/x/net v0.45.0/go.mod h1:ECOoLqd5U3Lhyeyo/QDCEVQ4sNgYsqvCZ722XogGieY=
+golang.org/x/net v0.47.0 h1:Mx+4dIFzqraBXUugkia1OOvlD6LemFo1ALMHjrXDOhY=
+golang.org/x/net v0.47.0/go.mod h1:/jNxtkgq5yWUGYkaZGqo27cfGZ1c5Nen03aYrrKpVRU=
 golang.org/x/oauth2 v0.30.0 h1:dnDm7JmhM45NNpd8FDDeLhK6FwqbOf4MLCM9zb1BOHI=
 golang.org/x/oauth2 v0.30.0/go.mod 
h1:B++QgG3ZKulg6sRPGD/mqlHQs5rB3Ml9erfeDY7xKlU=
 golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod 
h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
 golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod 
h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
 golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod 
h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
-golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug=
-golang.org/x/sync v0.17.0/go.mod 
h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
+golang.org/x/sync v0.19.0 h1:vV+1eWNmZ5geRlYjzm2adRgW2/mcpevXNg50YZtPCE4=
+golang.org/x/sync v0.19.0/go.mod 
h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
 golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod 
h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
 golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod 
h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
 golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod 
h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
 golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.37.0 h1:fdNQudmxPjkdUTPnLn5mdQv7Zwvbvpaxqs831goi9kQ=
-golang.org/x/sys v0.37.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
-golang.org/x/term v0.36.0 h1:zMPR+aF8gfksFprF/Nc/rd1wRS1EI6nDBGyWAvDzx2Q=
-golang.org/x/term v0.36.0/go.mod 
h1:Qu394IJq6V6dCBRgwqshf3mPF85AqzYEzofzRdZkWss=
+golang.org/x/sys v0.39.0 h1:CvCKL8MeisomCi6qNZ+wbb0DN9E5AATixKsvNtMoMFk=
+golang.org/x/sys v0.39.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
+golang.org/x/term v0.38.0 h1:PQ5pkm/rLO6HnxFR7N2lJHOZX6Kez5Y1gDSJla6jo7Q=
+golang.org/x/term v0.38.0/go.mod 
h1:bSEAKrOT1W+VSu9TSCMtoGEOUcKxOKgl3LE5QEF/xVg=
 golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
 golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
-golang.org/x/text v0.30.0 h1:yznKA/E9zq54KzlzBEAWn1NXSQ8DIp/NYMy88xJjl4k=
-golang.org/x/text v0.30.0/go.mod 
h1:yDdHFIX9t+tORqspjENWgzaCVXgk0yYnYuSZ8UzzBVM=
+golang.org/x/text v0.32.0 h1:ZD01bjUt1FQ9WJ0ClOL5vxgxOI/sVCNgX1YtKwcY0mU=
+golang.org/x/text v0.32.0/go.mod 
h1:o/rUWzghvpD5TXrTIBuJU77MTaN0ljMWE47kxGJQ7jY=
 golang.org/x/time v0.9.0 h1:EsRrnYcQiGH+5FfbgvV4AP7qEZstoyrHB0DzarOQ4ZY=
 golang.org/x/time v0.9.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM=
 golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod 
h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
 golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod 
h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo=
 golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod 
h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE=
 golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod 
h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA=
-golang.org/x/tools v0.37.0 h1:DVSRzp7FwePZW356yEAChSdNcQo6Nsp+fex1SUW09lE=
-golang.org/x/tools v0.37.0/go.mod 
h1:MBN5QPQtLMHVdvsbtarmTNukZDdgwdwlO5qGacAzF0w=
+golang.org/x/tools v0.39.0 h1:ik4ho21kwuQln40uelmciQPp9SipgNDdrafrYA4TmQQ=
+golang.org/x/tools v0.39.0/go.mod 
h1:JnefbkDPyD8UU2kI5fuf8ZX4/yUeh9W877ZeBONxUqQ=
 golang.org/x/tools/go/expect v0.1.0-deprecated 
h1:jY2C5HGYR5lqex3gEniOQL0r7Dq5+VGVgY1nudX5lXY=
 golang.org/x/tools/go/expect v0.1.0-deprecated/go.mod 
h1:eihoPOH+FgIqa3FpoTwguz/bVUSGBlGQU67vpBeOrBY=
 golang.org/x/tools/go/packages/packagestest v0.1.1-deprecated 
h1:1h2MnaIAIXISqTFKdENegdpAgUXz6NrPEsbIeWaBRvM=
@@ -209,14 +209,14 @@
 gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ=
 gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
 gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.34.1 h1:jC+153630BMdlFukegoEL8E/yT7aLyQkIVuwhmwDgJM=
-k8s.io/api v0.34.1/go.mod h1:SB80FxFtXn5/gwzCoN6QCtPD7Vbu5w2n1S0J5gFfTYk=
-k8s.io/apimachinery v0.34.1 h1:dTlxFls/eikpJxmAC7MVE8oOeP1zryV7iRyIjB0gky4=
-k8s.io/apimachinery v0.34.1/go.mod 
h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw=
-k8s.io/client-go v0.34.1 h1:ZUPJKgXsnKwVwmKKdPfw4tB58+7/Ik3CrjOEhsiZ7mY=
-k8s.io/client-go v0.34.1/go.mod h1:kA8v0FP+tk6sZA0yKLRG67LWjqufAoSHA2xVGKw9Of8=
-k8s.io/code-generator v0.34.1 h1:WpphT26E+j7tEgIUfFr5WfbJrktCGzB3JoJH9149xYc=
-k8s.io/code-generator v0.34.1/go.mod 
h1:DeWjekbDnJWRwpw3s0Jat87c+e0TgkxoR4ar608yqvg=
+k8s.io/api v0.34.3 h1:D12sTP257/jSH2vHV2EDYrb16bS7ULlHpdNdNhEw2S4=
+k8s.io/api v0.34.3/go.mod h1:PyVQBF886Q5RSQZOim7DybQjAbVs8g7gwJNhGtY5MBk=
+k8s.io/apimachinery v0.34.3 h1:/TB+SFEiQvN9HPldtlWOTp0hWbJ+fjU+wkxysf/aQnE=
+k8s.io/apimachinery v0.34.3/go.mod 
h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw=
+k8s.io/client-go v0.34.3 h1:wtYtpzy/OPNYf7WyNBTj3iUA0XaBHVqhv4Iv3tbrF5A=
+k8s.io/client-go v0.34.3/go.mod h1:OxxeYagaP9Kdf78UrKLa3YZixMCfP6bgPwPwNBQBzpM=
+k8s.io/code-generator v0.34.3 h1:6ipJKsJZZ9q21BO8I2jEj4OLN3y8/1n4aihKN0xKmQk=
+k8s.io/code-generator v0.34.3/go.mod 
h1:oW73UPYpGLsbRN8Ozkhd6ZzkF8hzFCiYmvEuWZDroI4=
 k8s.io/gengo/v2 v2.0.0-20250604051438-85fd79dbfd9f 
h1:SLb+kxmzfA87x4E4brQzB33VBbT2+x7Zq9ROIHmGn9Q=
 k8s.io/gengo/v2 v2.0.0-20250604051438-85fd79dbfd9f/go.mod 
h1:EJykeLsmFC60UQbYJezXkEsG2FLrt0GPNkU5iK5GWxU=
 k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/helm/sealed-secrets/Chart.yaml 
new/kubeseal-0.34.0/helm/sealed-secrets/Chart.yaml
--- old/kubeseal-0.33.1/helm/sealed-secrets/Chart.yaml  2025-11-06 
17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/helm/sealed-secrets/Chart.yaml  2025-12-18 
13:53:43.000000000 +0100
@@ -1,7 +1,7 @@
 annotations:
   category: DeveloperTools
 apiVersion: v2
-appVersion: 0.33.0
+appVersion: 0.33.1
 description: Helm chart for the sealed-secrets controller.
 home: https://github.com/bitnami-labs/sealed-secrets
 icon: 
https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png
@@ -14,6 +14,6 @@
     url: https://github.com/bitnami-labs/sealed-secrets
 name: sealed-secrets
 type: application
-version: 2.17.8
+version: 2.17.9
 sources:
   - https://github.com/bitnami-labs/sealed-secrets
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/helm/sealed-secrets/README.md 
new/kubeseal-0.34.0/helm/sealed-secrets/README.md
--- old/kubeseal-0.33.1/helm/sealed-secrets/README.md   2025-11-06 
17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/helm/sealed-secrets/README.md   2025-12-18 
13:53:43.000000000 +0100
@@ -86,7 +86,7 @@
 | ------------------------------------------------- | 
------------------------------------------------------------------------------------------------------------------
 | ----------------------------------- |
 | `image.registry`                                  | Sealed Secrets image 
registry                                                                        
              | `docker.io`                         |
 | `image.repository`                                | Sealed Secrets image 
repository                                                                      
              | `bitnami/sealed-secrets-controller` |
-| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                                                
          | `0.33.0`                            |
+| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                                                
          | `0.33.1`                            |
 | `image.pullPolicy`                                | Sealed Secrets image 
pull policy                                                                     
              | `IfNotPresent`                      |
 | `image.pullSecrets`                               | Sealed Secrets image 
pull secrets                                                                    
              | `[]`                                |
 | `revisionHistoryLimit`                            | Number of old history to 
retain to allow rollback (If not set, default Kubernetes value is set to 10)    
          | `""`                                |
@@ -107,6 +107,8 @@
 | `logFormat`                                       | Specifies log format 
(text,json)                                                                     
              | `""`                                |
 | `maxRetries`                                      | Number of maximum 
retries                                                                         
                 | `""`                                |
 | `watchForSecrets`                                 | Specifies whether the 
Sealed Secrets controller will watch for new secrets                            
             | `false`                             |
+| `kubeClientQPS`                                   | Kubeclient QPS (negative 
value disables ratelimiting)                                                    
          | `""`                                |
+| `kubeClientBurst`                                 | Kubeclient Burst         
                                                                                
          | `""`                                |
 | `command`                                         | Override default 
container command                                                               
                  | `[]`                                |
 | `args`                                            | Override default 
container args                                                                  
                  | `[]`                                |
 | `livenessProbe.enabled`                           | Enable livenessProbe on 
Sealed Secret containers                                                        
           | `true`                              |
@@ -184,25 +186,22 @@
 
 ### Other Parameters
 
-| Name                           | Description                                 
                                                             | Value            
                                                                   |
-| ------------------------------ | 
--------------------------------------------------------------------------------------------------------
 | 
-----------------------------------------------------------------------------------
 |
-| `serviceAccount.annotations`   | Annotations for Sealed Secret service 
account                                                            | `{}`       
                                                                         |
-| `serviceAccount.create`        | Specifies whether a ServiceAccount should 
be created                                                     | `true`         
                                                                     |
-| `serviceAccount.labels`        | Extra labels to be added to the 
ServiceAccount                                                           | `{}` 
                                                                               |
-| `serviceAccount.name`          | The name of the ServiceAccount to use.      
                                                             | `""`             
                                                                   |
-| `rbac.create`                  | Specifies whether RBAC resources should be 
created                                                       | `true`          
                                                                    |
-| `rbac.clusterRole`             | Specifies whether the Cluster Role resource 
should be created                                            | `true`           
                                                                   |
-| `rbac.clusterRoleName`         | Specifies the name for the Cluster Role 
resource                                                         | 
`secrets-unsealer`                                                              
    |
-| `rbac.namespacedRoles`         | Specifies whether the namespaced Roles 
should be created (in each of the specified additionalNamespaces) | `false`     
                                                                        |
-| `rbac.namespacedRolesName`     | Specifies the name for the namespaced Role 
resource                                                      | 
`secrets-unsealer`                                                              
    |
-| `rbac.labels`                  | Extra labels to be added to RBAC resources  
                                                             | `{}`             
                                                                   |
-| `rbac.pspEnabled`              | PodSecurityPolicy                           
                                                             | `false`          
                                                                   |
-| `rbac.serviceProxier.create`   | Specifies whether to create the "proxier" 
role, to allow external users to access the SealedSecret API   | `true`         
                                                                     |
-| `rbac.serviceProxier.bind`     | Specifies whether to create a RoleBinding 
for the "proxier" role                                         | `true`         
                                                                     |
-| `rbac.serviceProxier.subjects` | Specifies the RBAC subjects to grant the 
"proxier" role to, in the created RoleBinding                   | `- apiGroup: 
rbac.authorization.k8s.io
-  kind: Group
-  name: system:authenticated
-` |
+| Name                           | Description                                 
                                                             | Value            
                                                                        |
+| ------------------------------ | 
--------------------------------------------------------------------------------------------------------
 | 
----------------------------------------------------------------------------------------
 |
+| `serviceAccount.annotations`   | Annotations for Sealed Secret service 
account                                                            | `{}`       
                                                                              |
+| `serviceAccount.create`        | Specifies whether a ServiceAccount should 
be created                                                     | `true`         
                                                                          |
+| `serviceAccount.labels`        | Extra labels to be added to the 
ServiceAccount                                                           | `{}` 
                                                                                
    |
+| `serviceAccount.name`          | The name of the ServiceAccount to use.      
                                                             | `""`             
                                                                        |
+| `rbac.create`                  | Specifies whether RBAC resources should be 
created                                                       | `true`          
                                                                         |
+| `rbac.clusterRole`             | Specifies whether the Cluster Role resource 
should be created                                            | `true`           
                                                                        |
+| `rbac.clusterRoleName`         | Specifies the name for the Cluster Role 
resource                                                         | 
`secrets-unsealer`                                                              
         |
+| `rbac.namespacedRoles`         | Specifies whether the namespaced Roles 
should be created (in each of the specified additionalNamespaces) | `false`     
                                                                             |
+| `rbac.namespacedRolesName`     | Specifies the name for the namespaced Role 
resource                                                      | 
`secrets-unsealer`                                                              
         |
+| `rbac.labels`                  | Extra labels to be added to RBAC resources  
                                                             | `{}`             
                                                                        |
+| `rbac.pspEnabled`              | PodSecurityPolicy                           
                                                             | `false`          
                                                                        |
+| `rbac.serviceProxier.create`   | Specifies whether to create the "proxier" 
role, to allow external users to access the SealedSecret API   | `true`         
                                                                          |
+| `rbac.serviceProxier.bind`     | Specifies whether to create a RoleBinding 
for the "proxier" role                                         | `true`         
                                                                          |
+| `rbac.serviceProxier.subjects` | Specifies the RBAC subjects to grant the 
"proxier" role to, in the created RoleBinding                   | <pre><code>- 
apiGroup: rbac.authorization.k8s.io<br>  kind: Group<br>  name: 
system:authenticated</code></pre> |
 
 ### Metrics parameters
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/kubeseal-0.33.1/helm/sealed-secrets/templates/deployment.yaml 
new/kubeseal-0.34.0/helm/sealed-secrets/templates/deployment.yaml
--- old/kubeseal-0.33.1/helm/sealed-secrets/templates/deployment.yaml   
2025-11-06 17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/helm/sealed-secrets/templates/deployment.yaml   
2025-12-18 13:53:43.000000000 +0100
@@ -152,6 +152,14 @@
             {{- if .Values.watchForSecrets }}
             - --watch-for-secrets
             {{- end }}
+            {{- if .Values.kubeClientQPS }}
+            - --kubeclient-qps
+            - {{ .Values.kubeClientQPS | quote }}
+            {{- end }}
+            {{- if .Values.kubeClientBurst }}
+            - --kubeclient-burst
+            - {{ .Values.kubeClientBurst | quote }}
+            {{- end }}
           {{- end }}
           image: {{ printf "%s/%s:%s" .Values.image.registry 
.Values.image.repository .Values.image.tag }}
           imagePullPolicy: {{ .Values.image.pullPolicy }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/helm/sealed-secrets/values.yaml 
new/kubeseal-0.34.0/helm/sealed-secrets/values.yaml
--- old/kubeseal-0.33.1/helm/sealed-secrets/values.yaml 2025-11-06 
17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/helm/sealed-secrets/values.yaml 2025-12-18 
13:53:43.000000000 +0100
@@ -39,7 +39,7 @@
 image:
   registry: docker.io
   repository: bitnami/sealed-secrets-controller
-  tag: 0.33.0
+  tag: 0.33.1
   ## Specify a imagePullPolicy
   ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
   ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
@@ -118,6 +118,12 @@
 ## @param watchForSecrets Specifies whether the Sealed Secrets controller will 
watch for new secrets
 ##
 watchForSecrets: false
+## @param kubeClientQPS Kubeclient QPS (negative value disables ratelimiting)
+##
+kubeClientQPS: ""
+## @param kubeClientBurst Kubeclient Burst
+##
+kubeClientBurst: ""
 ## @param command Override default container command
 ##
 command: []
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/pkg/controller/controller.go 
new/kubeseal-0.34.0/pkg/controller/controller.go
--- old/kubeseal-0.33.1/pkg/controller/controller.go    2025-11-06 
17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/pkg/controller/controller.go    2025-12-18 
13:53:43.000000000 +0100
@@ -67,6 +67,7 @@
        queue       workqueue.TypedRateLimitingInterface[string]
        ssInformer  cache.SharedIndexInformer
        sInformer   cache.SharedIndexInformer
+       kInformer   cache.SharedIndexInformer
        sclient     v1.SecretsGetter
        ssclient    ssv1alpha1client.SealedSecretsGetter
        recorder    record.EventRecorder
@@ -77,7 +78,16 @@
 }
 
 // NewController returns the main sealed-secrets controller loop.
-func NewController(clientset kubernetes.Interface, ssclientset 
ssclientset.Interface, ssinformer ssinformer.SharedInformerFactory, sinformer 
informers.SharedInformerFactory, keyRegistry *KeyRegistry, maxRetriesConfig 
int) (*Controller, error) {
+func NewController(
+       clientset kubernetes.Interface,
+       ssclientset ssclientset.Interface,
+       ssinformer ssinformer.SharedInformerFactory,
+       sinformer informers.SharedInformerFactory,
+       kinformer informers.SharedInformerFactory,
+       keyRegistry *KeyRegistry,
+       maxRetriesConfig int,
+       keyOrderPriority string,
+) (*Controller, error) {
        queue := 
workqueue.NewTypedRateLimitingQueue(workqueue.DefaultTypedControllerRateLimiter[string]())
 
        utilruntime.Must(ssscheme.AddToScheme(scheme.Scheme))
@@ -102,11 +112,20 @@
                }
        }
 
+       var kInformer cache.SharedIndexInformer
+       if kinformer != nil {
+               kInformer, err = watchKeySecrets(kinformer, keyRegistry, 
keyOrderPriority)
+               if err != nil {
+                       return nil, err
+               }
+       }
+
        maxRetries = maxRetriesConfig
 
        return &Controller{
                ssInformer:  ssInformer,
                sInformer:   sInformer,
+               kInformer:   kInformer,
                queue:       queue,
                sclient:     clientset.CoreV1(),
                ssclient:    ssclientset.BitnamiV1alpha1(),
@@ -115,6 +134,23 @@
        }, nil
 }
 
+func watchKeySecrets(kinformer informers.SharedInformerFactory, registry 
*KeyRegistry, keyOrderPriority string) (cache.SharedIndexInformer, error) {
+       kInformer := kinformer.Core().V1().Secrets().Informer()
+       _, err := kInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{
+               AddFunc: func(obj interface{}) {
+                       err := registryNewKeyWithSecret(obj.(*corev1.Secret), 
registry, keyOrderPriority)
+                       if err != nil {
+                               slog.Error("failed to register key", "error", 
err)
+                               return
+                       }
+               },
+       })
+       if err != nil {
+               return nil, fmt.Errorf("could not add event handler to secrets 
informer: %w", err)
+       }
+       return kInformer, nil
+}
+
 func watchSealedSecrets(ssinformer ssinformer.SharedInformerFactory, queue 
workqueue.TypedRateLimitingInterface[string]) (cache.SharedIndexInformer, 
error) {
        ssInformer := ssinformer.Bitnami().V1alpha1().SealedSecrets().Informer()
        _, err := ssInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{
@@ -237,6 +273,9 @@
        if c.sInformer != nil {
                go c.sInformer.Run(stopCh)
        }
+       if c.kInformer != nil {
+               go c.kInformer.Run(stopCh)
+       }
 
        if !cache.WaitForCacheSync(stopCh, c.HasSynced) {
                utilruntime.HandleError(fmt.Errorf("timed out waiting for 
caches to sync"))
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/pkg/controller/main.go 
new/kubeseal-0.34.0/pkg/controller/main.go
--- old/kubeseal-0.33.1/pkg/controller/main.go  2025-11-06 17:30:11.000000000 
+0100
+++ new/kubeseal-0.34.0/pkg/controller/main.go  2025-12-18 13:53:43.000000000 
+0100
@@ -13,8 +13,6 @@
        "syscall"
        "time"
 
-       "k8s.io/apimachinery/pkg/watch"
-
        v1 "k8s.io/api/core/v1"
        "k8s.io/apimachinery/pkg/api/errors"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@@ -60,6 +58,8 @@
        PrivateKeyLabels      string
        MaxRetries            int
        WatchForSecrets       bool
+       KubeClientQPS         float32
+       KubeClientBurst       int
 }
 
 func initKeyPrefix(keyPrefix string) (string, error) {
@@ -124,37 +124,6 @@
        return cert.NotBefore
 }
 
-func watchKeyRegistry(ctx context.Context, client kubernetes.Interface, 
keyRegistry *KeyRegistry, namespace, keyOrderPriority string) error {
-       watcher, err := client.CoreV1().Secrets(namespace).Watch(ctx, 
metav1.ListOptions{
-               LabelSelector: keySelector.String(),
-       })
-       if err != nil {
-               return err
-       }
-
-       for event := range watcher.ResultChan() {
-               secret := event.Object.(*v1.Secret)
-               if secret == nil {
-                       continue
-               }
-
-               switch event.Type {
-               case watch.Added:
-                       err = registryNewKeyWithSecret(secret, keyRegistry, 
keyOrderPriority)
-                       if err != nil {
-                               return err
-                       }
-               case watch.Modified:
-               case watch.Deleted:
-               case watch.Error:
-               case watch.Bookmark:
-               default:
-                       slog.Info("Unexpected watch event", "type", event.Type)
-               }
-       }
-       return nil
-}
-
 func myNamespace() string {
        if ns := os.Getenv("POD_NAMESPACE"); ns != "" {
                return ns
@@ -210,6 +179,9 @@
                return err
        }
 
+       config.QPS = f.KubeClientQPS
+       config.Burst = f.KubeClientBurst
+
        clientset, err := kubernetes.NewForConfig(config)
        if err != nil {
                return err
@@ -274,13 +246,6 @@
 
        go controller.Run(stop)
 
-       if f.WatchForSecrets {
-               go func() {
-                       err := watchKeyRegistry(ctx, clientset, keyRegistry, 
myNs, f.KeyOrderPriority)
-                       slog.Error("Watch fo secrets", "err", err)
-               }()
-       }
-
        if f.AdditionalNamespaces != "" {
                addNS := removeDuplicates(strings.Split(f.AdditionalNamespaces, 
","))
 
@@ -331,16 +296,26 @@
        return nil
 }
 
-func prepareController(clientset kubernetes.Interface, namespace string, 
tweakopts func(*metav1.ListOptions), f *Flags, ssclientset versioned.Interface, 
keyRegistry *KeyRegistry) (*Controller, error) {
+func prepareController(
+       clientset kubernetes.Interface,
+       namespace string,
+       tweakopts func(*metav1.ListOptions),
+       f *Flags,
+       ssclientset versioned.Interface,
+       keyRegistry *KeyRegistry,
+) (*Controller, error) {
+       kinformer := initSecretInformerFactory(clientset, namespace, 
func(options *metav1.ListOptions) {
+               options.LabelSelector = keySelector.String()
+       }, f.WatchForSecrets)
        sinformer := initSecretInformerFactory(clientset, namespace, tweakopts, 
f.SkipRecreate)
        ssinformer := ssinformers.NewFilteredSharedInformerFactory(ssclientset, 
0, namespace, tweakopts)
-       controller, err := NewController(clientset, ssclientset, ssinformer, 
sinformer, keyRegistry, f.MaxRetries)
+       controller, err := NewController(clientset, ssclientset, ssinformer, 
sinformer, kinformer, keyRegistry, f.MaxRetries, f.KeyOrderPriority)
        return controller, err
 }
 
-func initSecretInformerFactory(clientset kubernetes.Interface, ns string, 
tweakopts func(*metav1.ListOptions), skipRecreate bool) 
informers.SharedInformerFactory {
-       if skipRecreate {
+func initSecretInformerFactory(clientset kubernetes.Interface, ns string, 
tweakopts func(*metav1.ListOptions), enabled bool) 
informers.SharedInformerFactory {
+       if enabled {
                return nil
        }
-       return informers.NewFilteredSharedInformerFactory(clientset, 0, ns, 
tweakopts)
+       return informers.NewSharedInformerFactoryWithOptions(clientset, 0, 
informers.WithNamespace(ns), informers.WithTweakListOptions(tweakopts))
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/kubeseal-0.33.1/versions.env 
new/kubeseal-0.34.0/versions.env
--- old/kubeseal-0.33.1/versions.env    2025-11-06 17:30:11.000000000 +0100
+++ new/kubeseal-0.34.0/versions.env    2025-12-18 13:53:43.000000000 +0100
@@ -1,2 +1,2 @@
-GO_VERSION=1.25.4
+GO_VERSION=1.25.5
 GO_VERSION_LIST="[\"$GO_VERSION\"]"

++++++ kubeseal.obsinfo ++++++
--- /var/tmp/diff_new_pack.DdXVxl/_old  2025-12-18 18:37:52.705810744 +0100
+++ /var/tmp/diff_new_pack.DdXVxl/_new  2025-12-18 18:37:52.713811081 +0100
@@ -1,5 +1,5 @@
 name: kubeseal
-version: 0.33.1
-mtime: 1762446611
-commit: 1e1ac9ecbc280ff4f9e15504bde2bda8d79906b2
+version: 0.34.0
+mtime: 1766062423
+commit: fd30a3eb590170d99e5d62df254d097a2c131144
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.kubeseal.new.1928/vendor.tar.gz differ: char 13, 
line 1

Reply via email to