Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kubeseal for openSUSE:Factory checked in at 2025-12-18 18:37:11 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kubeseal (Old) and /work/SRC/openSUSE:Factory/.kubeseal.new.1928 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kubeseal" Thu Dec 18 18:37:11 2025 rev:42 rq:1323526 version:0.34.0 Changes: -------- --- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes 2025-11-10 19:21:17.874304108 +0100 +++ /work/SRC/openSUSE:Factory/.kubeseal.new.1928/kubeseal.changes 2025-12-18 18:37:47.785604041 +0100 @@ -1,0 +2,24 @@ +Thu Dec 18 13:38:33 UTC 2025 - Johannes Kastl <[email protected]> + +- Update to version 0.34.0: + * Release notes 0.34.0 (#1855) + * Add kseal to README (#1852) + * Bump golang version to the latest available 1.24 (#1854) + * Bump k8s.io/code-generator from 0.34.2 to 0.34.3 (#1850) + * Bump k8s.io/client-go from 0.34.2 to 0.34.3 (#1848) + * Bump github.com/onsi/ginkgo/v2 from 2.27.2 to 2.27.3 (#1843) + * Bump distroless/static from `87bce11` to `4b2a093` in /docker + (#1846) + * Bump github.com/onsi/gomega from 1.38.2 to 1.38.3 (#1844) + * Bump golang.org/x/crypto from 0.45.0 to 0.46.0 (#1845) + * Make controllers kubeclient QPS & Burst configurable. (#1834) + * use default method to watch for key secrets (#1831) + * Bump golang.org/x/crypto from 0.44.0 to 0.45.0 in the + go_modules group across 1 directory (#1840) + * Bump k8s.io/code-generator from 0.34.1 to 0.34.2 (#1839) + * Bump golang.org/x/crypto from 0.43.0 to 0.44.0 (#1835) + * Bump k8s.io/client-go from 0.34.1 to 0.34.2 (#1837) + * Release carvel package 2.17.9 (#1830) + * Release chart 2.17.9 (#1829) + +------------------------------------------------------------------- Old: ---- kubeseal-0.33.1.obscpio New: ---- kubeseal-0.34.0.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ kubeseal.spec ++++++ --- /var/tmp/diff_new_pack.DdXVxl/_old 2025-12-18 18:37:50.409714283 +0100 +++ /var/tmp/diff_new_pack.DdXVxl/_new 2025-12-18 18:37:50.421714786 +0100 @@ -17,7 +17,7 @@ Name: kubeseal -Version: 0.33.1 +Version: 0.34.0 Release: 0 Summary: CLI for encrypting secrets to SealedSecrets License: Apache-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.DdXVxl/_old 2025-12-18 18:37:50.793730415 +0100 +++ /var/tmp/diff_new_pack.DdXVxl/_new 2025-12-18 18:37:50.841732432 +0100 @@ -3,7 +3,7 @@ <param name="url">https://github.com/bitnami-labs/sealed-secrets</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v0.33.1</param> + <param name="revision">v0.34.0</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> <param name="changesgenerate">enable</param> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.DdXVxl/_old 2025-12-18 18:37:51.037740666 +0100 +++ /var/tmp/diff_new_pack.DdXVxl/_new 2025-12-18 18:37:51.085742683 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/bitnami-labs/sealed-secrets</param> - <param name="changesrevision">1e1ac9ecbc280ff4f9e15504bde2bda8d79906b2</param></service></servicedata> + <param name="changesrevision">fd30a3eb590170d99e5d62df254d097a2c131144</param></service></servicedata> (No newline at EOF) ++++++ kubeseal-0.33.1.obscpio -> kubeseal-0.34.0.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/README.md new/kubeseal-0.34.0/README.md --- old/kubeseal-0.33.1/README.md 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/README.md 2025-12-18 13:53:43.000000000 +0100 @@ -851,6 +851,7 @@ ### Related projects +- `kseal` A Kubeseal Companion: [https://github.com/eznix86/kseal](https://github.com/eznix86/kseal) - `kubeseal-convert`: [https://github.com/EladLeev/kubeseal-convert](https://github.com/EladLeev/kubeseal-convert) - Visual Studio Code extension: [https://marketplace.visualstudio.com/items?itemName=codecontemplator.kubeseal](https://marketplace.visualstudio.com/items?itemName=codecontemplator.kubeseal) - WebSeal: generates secrets in the browser: [https://socialgouv.github.io/webseal](https://socialgouv.github.io/webseal) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/RELEASE-NOTES.md new/kubeseal-0.34.0/RELEASE-NOTES.md --- old/kubeseal-0.33.1/RELEASE-NOTES.md 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/RELEASE-NOTES.md 2025-12-18 13:53:43.000000000 +0100 @@ -4,6 +4,23 @@ [](https://github.com/bitnami-labs/sealed-secrets/releases/latest) +## v0.34.0 + +- Add kseal to README ([#1852)](https://github.com/bitnami-labs/sealed-secrets/pull/1852)) +- Bump golang version to the latest available 1.24 ([#1854](https://github.com/bitnami-labs/sealed-secrets/pull/1854)) +- Bump k8s.io/code-generator from 0.34.2 to 0.34.3 ([#1850](https://github.com/bitnami-labs/sealed-secrets/pull/1850)) +- Bump k8s.io/client-go from 0.34.2 to 0.34.3 ([#1848](https://github.com/bitnami-labs/sealed-secrets/pull/1848)) +- Bump github.com/onsi/ginkgo/v2 from 2.27.2 to 2.27.3 ([#1843](https://github.com/bitnami-labs/sealed-secrets/pull/1843)) +- Bump distroless/static from `87bce11` to `4b2a093` in /docker ([#1846](https://github.com/bitnami-labs/sealed-secrets/pull/1846)) +- Bump github.com/onsi/gomega from 1.38.2 to 1.38.3 ([#1844](https://github.com/bitnami-labs/sealed-secrets/pull/1844)) +- Bump golang.org/x/crypto from 0.45.0 to 0.46.0 ([#1845](https://github.com/bitnami-labs/sealed-secrets/pull/1845)) +- Make controllers kubeclient QPS & Burst configurable. ([#1834](https://github.com/bitnami-labs/sealed-secrets/pull/1834)) +- use default method to watch for key secrets ([#1831](https://github.com/bitnami-labs/sealed-secrets/pull/1831)) +- Bump golang.org/x/crypto from 0.44.0 to 0.45.0 in the go_modules group across 1 directory ([#1840](https://github.com/bitnami-labs/sealed-secrets/pull/1840)) +- Bump k8s.io/code-generator from 0.34.1 to 0.34.2 ([#1839](https://github.com/bitnami-labs/sealed-secrets/pull/1839)) +- Bump golang.org/x/crypto from 0.43.0 to 0.44.0 ([#1835](https://github.com/bitnami-labs/sealed-secrets/pull/1835)) +- Bump k8s.io/client-go from 0.34.1 to 0.34.2 ([#1837](https://github.com/bitnami-labs/sealed-secrets/pull/1837)) + ## v0.33.1 - Release done to fix missing helm chart code. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/carvel/package.yaml new/kubeseal-0.34.0/carvel/package.yaml --- old/kubeseal-0.33.1/carvel/package.yaml 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/carvel/package.yaml 2025-12-18 13:53:43.000000000 +0100 @@ -1,10 +1,10 @@ apiVersion: data.packaging.carvel.dev/v1alpha1 kind: Package metadata: - name: "sealedsecrets.bitnami.com.2.17.8" + name: "sealedsecrets.bitnami.com.2.17.9" spec: refName: "sealedsecrets.bitnami.com" - version: "2.17.8" + version: "2.17.9" valuesSchema: openAPIv3: title: Chart Values @@ -424,7 +424,7 @@ spec: fetch: - imgpkgBundle: - image: ghcr.io/bitnami-labs/sealed-secrets-carvel@sha256:4a253923c67fcd5f72c72663a9c1cc79aaa1ba63b01bcb7f34c3109704427a19 + image: ghcr.io/bitnami-labs/sealed-secrets-carvel@sha256:1e9854b7d7eec3d51776ebeb09cff9fcda88530a38e62c11fdfcec7cdd7633d2 template: - helmTemplate: path: sealed-secrets diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/cmd/controller/main.go new/kubeseal-0.34.0/cmd/controller/main.go --- old/kubeseal-0.33.1/cmd/controller/main.go 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/cmd/controller/main.go 2025-12-18 13:53:43.000000000 +0100 @@ -63,6 +63,9 @@ _ = fs.MarkDeprecated("rotate-period", "please use key-renew-period instead") fs.IntVar(&f.MaxRetries, "max-unseal-retries", 5, "Max unseal retries.") + + fs.Float32Var(&f.KubeClientQPS, "kubeclient-qps", 5, "Kubeclient QPS (negative value disables ratelimiting)") + fs.IntVar(&f.KubeClientBurst, "kubeclient-burst", 10, "Kubeclient Burst") } func bindFlags(f *controller.Flags, fs *flag.FlagSet, gofs *goflag.FlagSet) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/docker/controller.Dockerfile new/kubeseal-0.34.0/docker/controller.Dockerfile --- old/kubeseal-0.33.1/docker/controller.Dockerfile 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/docker/controller.Dockerfile 2025-12-18 13:53:43.000000000 +0100 @@ -1,4 +1,4 @@ -FROM gcr.io/distroless/static@sha256:87bce11be0af225e4ca761c40babb06d6d559f5767fbf7dc3c47f0f1a466b92c +FROM gcr.io/distroless/static@sha256:4b2a093ef4649bccd586625090a3c668b254cfe180dee54f4c94f3e9bd7e381e LABEL maintainer "Sealed Secrets <[email protected]>" USER 1001 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/docker/kubeseal.Dockerfile new/kubeseal-0.34.0/docker/kubeseal.Dockerfile --- old/kubeseal-0.33.1/docker/kubeseal.Dockerfile 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/docker/kubeseal.Dockerfile 2025-12-18 13:53:43.000000000 +0100 @@ -1,4 +1,4 @@ -FROM gcr.io/distroless/static@sha256:87bce11be0af225e4ca761c40babb06d6d559f5767fbf7dc3c47f0f1a466b92c +FROM gcr.io/distroless/static@sha256:4b2a093ef4649bccd586625090a3c668b254cfe180dee54f4c94f3e9bd7e381e LABEL maintainer "Sealed Secrets <[email protected]>" USER 1001 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/go.mod new/kubeseal-0.34.0/go.mod --- old/kubeseal-0.33.1/go.mod 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/go.mod 2025-12-18 13:53:43.000000000 +0100 @@ -1,6 +1,6 @@ module github.com/bitnami-labs/sealed-secrets -go 1.25.4 +go 1.25.5 require ( github.com/Masterminds/sprig/v3 v3.3.0 @@ -8,18 +8,18 @@ github.com/google/renameio v0.1.0 github.com/mattn/go-isatty v0.0.20 github.com/mkmik/multierror v0.4.0 - github.com/onsi/ginkgo/v2 v2.27.2 - github.com/onsi/gomega v1.38.2 + github.com/onsi/ginkgo/v2 v2.27.3 + github.com/onsi/gomega v1.38.3 github.com/prometheus/client_golang v1.23.2 github.com/prometheus/client_model v0.6.2 github.com/spf13/pflag v1.0.10 github.com/throttled/throttled v2.2.5+incompatible - golang.org/x/crypto v0.43.0 + golang.org/x/crypto v0.46.0 gopkg.in/yaml.v2 v2.4.0 - k8s.io/api v0.34.1 - k8s.io/apimachinery v0.34.1 - k8s.io/client-go v0.34.1 - k8s.io/code-generator v0.34.1 + k8s.io/api v0.34.3 + k8s.io/apimachinery v0.34.3 + k8s.io/client-go v0.34.3 + k8s.io/code-generator v0.34.3 k8s.io/klog v1.0.0 k8s.io/klog/v2 v2.130.1 k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 @@ -63,15 +63,15 @@ github.com/x448/float16 v0.8.4 // indirect go.yaml.in/yaml/v2 v2.4.2 // indirect go.yaml.in/yaml/v3 v3.0.4 // indirect - golang.org/x/mod v0.28.0 // indirect - golang.org/x/net v0.45.0 // indirect + golang.org/x/mod v0.30.0 // indirect + golang.org/x/net v0.47.0 // indirect golang.org/x/oauth2 v0.30.0 // indirect - golang.org/x/sync v0.17.0 // indirect - golang.org/x/sys v0.37.0 // indirect - golang.org/x/term v0.36.0 // indirect - golang.org/x/text v0.30.0 // indirect + golang.org/x/sync v0.19.0 // indirect + golang.org/x/sys v0.39.0 // indirect + golang.org/x/term v0.38.0 // indirect + golang.org/x/text v0.32.0 // indirect golang.org/x/time v0.9.0 // indirect - golang.org/x/tools v0.37.0 // indirect + golang.org/x/tools v0.39.0 // indirect golang.org/x/tools/go/packages/packagestest v0.1.1-deprecated // indirect google.golang.org/protobuf v1.36.8 // indirect gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/go.sum new/kubeseal-0.34.0/go.sum --- old/kubeseal-0.33.1/go.sum 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/go.sum 2025-12-18 13:53:43.000000000 +0100 @@ -96,10 +96,10 @@ github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk= github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA= github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= -github.com/onsi/ginkgo/v2 v2.27.2 h1:LzwLj0b89qtIy6SSASkzlNvX6WktqurSHwkk2ipF/Ns= -github.com/onsi/ginkgo/v2 v2.27.2/go.mod h1:ArE1D/XhNXBXCBkKOLkbsb2c81dQHCRcF5zwn/ykDRo= -github.com/onsi/gomega v1.38.2 h1:eZCjf2xjZAqe+LeWvKb5weQ+NcPwX84kqJ0cZNxok2A= -github.com/onsi/gomega v1.38.2/go.mod h1:W2MJcYxRGV63b418Ai34Ud0hEdTVXq9NW9+Sx6uXf3k= +github.com/onsi/ginkgo/v2 v2.27.3 h1:ICsZJ8JoYafeXFFlFAG75a7CxMsJHwgKwtO+82SE9L8= +github.com/onsi/ginkgo/v2 v2.27.3/go.mod h1:ArE1D/XhNXBXCBkKOLkbsb2c81dQHCRcF5zwn/ykDRo= +github.com/onsi/gomega v1.38.3 h1:eTX+W6dobAYfFeGC2PV6RwXRu/MyT+cQguijutvkpSM= +github.com/onsi/gomega v1.38.3/go.mod h1:ZCU1pkQcXDO5Sl9/VVEGlDyp+zm0m1cmeG5TOzLgdh4= github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= @@ -149,45 +149,45 @@ golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= -golang.org/x/crypto v0.43.0 h1:dduJYIi3A3KOfdGOHX8AVZ/jGiyPa3IbBozJ5kNuE04= -golang.org/x/crypto v0.43.0/go.mod h1:BFbav4mRNlXJL4wNeejLpWxB7wMbc79PdRGhWKncxR0= +golang.org/x/crypto v0.46.0 h1:cKRW/pmt1pKAfetfu+RCEvjvZkA9RimPbh7bhFjGVBU= +golang.org/x/crypto v0.46.0/go.mod h1:Evb/oLKmMraqjZ2iQTwDwvCtJkczlDuTmdJXoZVzqU0= golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= -golang.org/x/mod v0.28.0 h1:gQBtGhjxykdjY9YhZpSlZIsbnaE2+PgjfLWUQTnoZ1U= -golang.org/x/mod v0.28.0/go.mod h1:yfB/L0NOf/kmEbXjzCPOx1iK1fRutOydrCMsqRhEBxI= +golang.org/x/mod v0.30.0 h1:fDEXFVZ/fmCKProc/yAXXUijritrDzahmwwefnjoPFk= +golang.org/x/mod v0.30.0/go.mod h1:lAsf5O2EvJeSFMiBxXDki7sCgAxEUcZHXoXMKT4GJKc= golang.org/x/net v0.0.0-20190404232315-eb5bcb51f2a3/go.mod h1:t9HGtf8HONx5eT2rtn7q6eTqICYqUVnKs3thJo3Qplg= golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU= -golang.org/x/net v0.45.0 h1:RLBg5JKixCy82FtLJpeNlVM0nrSqpCRYzVU1n8kj0tM= -golang.org/x/net v0.45.0/go.mod h1:ECOoLqd5U3Lhyeyo/QDCEVQ4sNgYsqvCZ722XogGieY= +golang.org/x/net v0.47.0 h1:Mx+4dIFzqraBXUugkia1OOvlD6LemFo1ALMHjrXDOhY= +golang.org/x/net v0.47.0/go.mod h1:/jNxtkgq5yWUGYkaZGqo27cfGZ1c5Nen03aYrrKpVRU= golang.org/x/oauth2 v0.30.0 h1:dnDm7JmhM45NNpd8FDDeLhK6FwqbOf4MLCM9zb1BOHI= golang.org/x/oauth2 v0.30.0/go.mod h1:B++QgG3ZKulg6sRPGD/mqlHQs5rB3Ml9erfeDY7xKlU= golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= -golang.org/x/sync v0.17.0 h1:l60nONMj9l5drqw6jlhIELNv9I0A4OFgRsG9k2oT9Ug= -golang.org/x/sync v0.17.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI= +golang.org/x/sync v0.19.0 h1:vV+1eWNmZ5geRlYjzm2adRgW2/mcpevXNg50YZtPCE4= +golang.org/x/sync v0.19.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190412213103-97732733099d/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.37.0 h1:fdNQudmxPjkdUTPnLn5mdQv7Zwvbvpaxqs831goi9kQ= -golang.org/x/sys v0.37.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks= -golang.org/x/term v0.36.0 h1:zMPR+aF8gfksFprF/Nc/rd1wRS1EI6nDBGyWAvDzx2Q= -golang.org/x/term v0.36.0/go.mod h1:Qu394IJq6V6dCBRgwqshf3mPF85AqzYEzofzRdZkWss= +golang.org/x/sys v0.39.0 h1:CvCKL8MeisomCi6qNZ+wbb0DN9E5AATixKsvNtMoMFk= +golang.org/x/sys v0.39.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks= +golang.org/x/term v0.38.0 h1:PQ5pkm/rLO6HnxFR7N2lJHOZX6Kez5Y1gDSJla6jo7Q= +golang.org/x/term v0.38.0/go.mod h1:bSEAKrOT1W+VSu9TSCMtoGEOUcKxOKgl3LE5QEF/xVg= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= -golang.org/x/text v0.30.0 h1:yznKA/E9zq54KzlzBEAWn1NXSQ8DIp/NYMy88xJjl4k= -golang.org/x/text v0.30.0/go.mod h1:yDdHFIX9t+tORqspjENWgzaCVXgk0yYnYuSZ8UzzBVM= +golang.org/x/text v0.32.0 h1:ZD01bjUt1FQ9WJ0ClOL5vxgxOI/sVCNgX1YtKwcY0mU= +golang.org/x/text v0.32.0/go.mod h1:o/rUWzghvpD5TXrTIBuJU77MTaN0ljMWE47kxGJQ7jY= golang.org/x/time v0.9.0 h1:EsRrnYcQiGH+5FfbgvV4AP7qEZstoyrHB0DzarOQ4ZY= golang.org/x/time v0.9.0/go.mod h1:3BpzKBy/shNhVucY/MWOyx10tF3SFh9QdLuxbVysPQM= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= golang.org/x/tools v0.0.0-20191119224855-298f0cb1881e/go.mod h1:b+2E5dAYhXwXZwtnZ6UAqBI28+e2cm9otk0dWdXHAEo= golang.org/x/tools v0.0.0-20200619180055-7c47624df98f/go.mod h1:EkVYQZoAsY45+roYkvgYkIh4xh/qjgUK9TdY2XT94GE= golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA= -golang.org/x/tools v0.37.0 h1:DVSRzp7FwePZW356yEAChSdNcQo6Nsp+fex1SUW09lE= -golang.org/x/tools v0.37.0/go.mod h1:MBN5QPQtLMHVdvsbtarmTNukZDdgwdwlO5qGacAzF0w= +golang.org/x/tools v0.39.0 h1:ik4ho21kwuQln40uelmciQPp9SipgNDdrafrYA4TmQQ= +golang.org/x/tools v0.39.0/go.mod h1:JnefbkDPyD8UU2kI5fuf8ZX4/yUeh9W877ZeBONxUqQ= golang.org/x/tools/go/expect v0.1.0-deprecated h1:jY2C5HGYR5lqex3gEniOQL0r7Dq5+VGVgY1nudX5lXY= golang.org/x/tools/go/expect v0.1.0-deprecated/go.mod h1:eihoPOH+FgIqa3FpoTwguz/bVUSGBlGQU67vpBeOrBY= golang.org/x/tools/go/packages/packagestest v0.1.1-deprecated h1:1h2MnaIAIXISqTFKdENegdpAgUXz6NrPEsbIeWaBRvM= @@ -209,14 +209,14 @@ gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ= gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA= gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= -k8s.io/api v0.34.1 h1:jC+153630BMdlFukegoEL8E/yT7aLyQkIVuwhmwDgJM= -k8s.io/api v0.34.1/go.mod h1:SB80FxFtXn5/gwzCoN6QCtPD7Vbu5w2n1S0J5gFfTYk= -k8s.io/apimachinery v0.34.1 h1:dTlxFls/eikpJxmAC7MVE8oOeP1zryV7iRyIjB0gky4= -k8s.io/apimachinery v0.34.1/go.mod h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw= -k8s.io/client-go v0.34.1 h1:ZUPJKgXsnKwVwmKKdPfw4tB58+7/Ik3CrjOEhsiZ7mY= -k8s.io/client-go v0.34.1/go.mod h1:kA8v0FP+tk6sZA0yKLRG67LWjqufAoSHA2xVGKw9Of8= -k8s.io/code-generator v0.34.1 h1:WpphT26E+j7tEgIUfFr5WfbJrktCGzB3JoJH9149xYc= -k8s.io/code-generator v0.34.1/go.mod h1:DeWjekbDnJWRwpw3s0Jat87c+e0TgkxoR4ar608yqvg= +k8s.io/api v0.34.3 h1:D12sTP257/jSH2vHV2EDYrb16bS7ULlHpdNdNhEw2S4= +k8s.io/api v0.34.3/go.mod h1:PyVQBF886Q5RSQZOim7DybQjAbVs8g7gwJNhGtY5MBk= +k8s.io/apimachinery v0.34.3 h1:/TB+SFEiQvN9HPldtlWOTp0hWbJ+fjU+wkxysf/aQnE= +k8s.io/apimachinery v0.34.3/go.mod h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw= +k8s.io/client-go v0.34.3 h1:wtYtpzy/OPNYf7WyNBTj3iUA0XaBHVqhv4Iv3tbrF5A= +k8s.io/client-go v0.34.3/go.mod h1:OxxeYagaP9Kdf78UrKLa3YZixMCfP6bgPwPwNBQBzpM= +k8s.io/code-generator v0.34.3 h1:6ipJKsJZZ9q21BO8I2jEj4OLN3y8/1n4aihKN0xKmQk= +k8s.io/code-generator v0.34.3/go.mod h1:oW73UPYpGLsbRN8Ozkhd6ZzkF8hzFCiYmvEuWZDroI4= k8s.io/gengo/v2 v2.0.0-20250604051438-85fd79dbfd9f h1:SLb+kxmzfA87x4E4brQzB33VBbT2+x7Zq9ROIHmGn9Q= k8s.io/gengo/v2 v2.0.0-20250604051438-85fd79dbfd9f/go.mod h1:EJykeLsmFC60UQbYJezXkEsG2FLrt0GPNkU5iK5GWxU= k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/helm/sealed-secrets/Chart.yaml new/kubeseal-0.34.0/helm/sealed-secrets/Chart.yaml --- old/kubeseal-0.33.1/helm/sealed-secrets/Chart.yaml 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/helm/sealed-secrets/Chart.yaml 2025-12-18 13:53:43.000000000 +0100 @@ -1,7 +1,7 @@ annotations: category: DeveloperTools apiVersion: v2 -appVersion: 0.33.0 +appVersion: 0.33.1 description: Helm chart for the sealed-secrets controller. home: https://github.com/bitnami-labs/sealed-secrets icon: https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png @@ -14,6 +14,6 @@ url: https://github.com/bitnami-labs/sealed-secrets name: sealed-secrets type: application -version: 2.17.8 +version: 2.17.9 sources: - https://github.com/bitnami-labs/sealed-secrets diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/helm/sealed-secrets/README.md new/kubeseal-0.34.0/helm/sealed-secrets/README.md --- old/kubeseal-0.33.1/helm/sealed-secrets/README.md 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/helm/sealed-secrets/README.md 2025-12-18 13:53:43.000000000 +0100 @@ -86,7 +86,7 @@ | ------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------ | ----------------------------------- | | `image.registry` | Sealed Secrets image registry | `docker.io` | | `image.repository` | Sealed Secrets image repository | `bitnami/sealed-secrets-controller` | -| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `0.33.0` | +| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `0.33.1` | | `image.pullPolicy` | Sealed Secrets image pull policy | `IfNotPresent` | | `image.pullSecrets` | Sealed Secrets image pull secrets | `[]` | | `revisionHistoryLimit` | Number of old history to retain to allow rollback (If not set, default Kubernetes value is set to 10) | `""` | @@ -107,6 +107,8 @@ | `logFormat` | Specifies log format (text,json) | `""` | | `maxRetries` | Number of maximum retries | `""` | | `watchForSecrets` | Specifies whether the Sealed Secrets controller will watch for new secrets | `false` | +| `kubeClientQPS` | Kubeclient QPS (negative value disables ratelimiting) | `""` | +| `kubeClientBurst` | Kubeclient Burst | `""` | | `command` | Override default container command | `[]` | | `args` | Override default container args | `[]` | | `livenessProbe.enabled` | Enable livenessProbe on Sealed Secret containers | `true` | @@ -184,25 +186,22 @@ ### Other Parameters -| Name | Description | Value | -| ------------------------------ | -------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------- | -| `serviceAccount.annotations` | Annotations for Sealed Secret service account | `{}` | -| `serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | -| `serviceAccount.labels` | Extra labels to be added to the ServiceAccount | `{}` | -| `serviceAccount.name` | The name of the ServiceAccount to use. | `""` | -| `rbac.create` | Specifies whether RBAC resources should be created | `true` | -| `rbac.clusterRole` | Specifies whether the Cluster Role resource should be created | `true` | -| `rbac.clusterRoleName` | Specifies the name for the Cluster Role resource | `secrets-unsealer` | -| `rbac.namespacedRoles` | Specifies whether the namespaced Roles should be created (in each of the specified additionalNamespaces) | `false` | -| `rbac.namespacedRolesName` | Specifies the name for the namespaced Role resource | `secrets-unsealer` | -| `rbac.labels` | Extra labels to be added to RBAC resources | `{}` | -| `rbac.pspEnabled` | PodSecurityPolicy | `false` | -| `rbac.serviceProxier.create` | Specifies whether to create the "proxier" role, to allow external users to access the SealedSecret API | `true` | -| `rbac.serviceProxier.bind` | Specifies whether to create a RoleBinding for the "proxier" role | `true` | -| `rbac.serviceProxier.subjects` | Specifies the RBAC subjects to grant the "proxier" role to, in the created RoleBinding | `- apiGroup: rbac.authorization.k8s.io - kind: Group - name: system:authenticated -` | +| Name | Description | Value | +| ------------------------------ | -------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------- | +| `serviceAccount.annotations` | Annotations for Sealed Secret service account | `{}` | +| `serviceAccount.create` | Specifies whether a ServiceAccount should be created | `true` | +| `serviceAccount.labels` | Extra labels to be added to the ServiceAccount | `{}` | +| `serviceAccount.name` | The name of the ServiceAccount to use. | `""` | +| `rbac.create` | Specifies whether RBAC resources should be created | `true` | +| `rbac.clusterRole` | Specifies whether the Cluster Role resource should be created | `true` | +| `rbac.clusterRoleName` | Specifies the name for the Cluster Role resource | `secrets-unsealer` | +| `rbac.namespacedRoles` | Specifies whether the namespaced Roles should be created (in each of the specified additionalNamespaces) | `false` | +| `rbac.namespacedRolesName` | Specifies the name for the namespaced Role resource | `secrets-unsealer` | +| `rbac.labels` | Extra labels to be added to RBAC resources | `{}` | +| `rbac.pspEnabled` | PodSecurityPolicy | `false` | +| `rbac.serviceProxier.create` | Specifies whether to create the "proxier" role, to allow external users to access the SealedSecret API | `true` | +| `rbac.serviceProxier.bind` | Specifies whether to create a RoleBinding for the "proxier" role | `true` | +| `rbac.serviceProxier.subjects` | Specifies the RBAC subjects to grant the "proxier" role to, in the created RoleBinding | <pre><code>- apiGroup: rbac.authorization.k8s.io<br> kind: Group<br> name: system:authenticated</code></pre> | ### Metrics parameters diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/helm/sealed-secrets/templates/deployment.yaml new/kubeseal-0.34.0/helm/sealed-secrets/templates/deployment.yaml --- old/kubeseal-0.33.1/helm/sealed-secrets/templates/deployment.yaml 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/helm/sealed-secrets/templates/deployment.yaml 2025-12-18 13:53:43.000000000 +0100 @@ -152,6 +152,14 @@ {{- if .Values.watchForSecrets }} - --watch-for-secrets {{- end }} + {{- if .Values.kubeClientQPS }} + - --kubeclient-qps + - {{ .Values.kubeClientQPS | quote }} + {{- end }} + {{- if .Values.kubeClientBurst }} + - --kubeclient-burst + - {{ .Values.kubeClientBurst | quote }} + {{- end }} {{- end }} image: {{ printf "%s/%s:%s" .Values.image.registry .Values.image.repository .Values.image.tag }} imagePullPolicy: {{ .Values.image.pullPolicy }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/helm/sealed-secrets/values.yaml new/kubeseal-0.34.0/helm/sealed-secrets/values.yaml --- old/kubeseal-0.33.1/helm/sealed-secrets/values.yaml 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/helm/sealed-secrets/values.yaml 2025-12-18 13:53:43.000000000 +0100 @@ -39,7 +39,7 @@ image: registry: docker.io repository: bitnami/sealed-secrets-controller - tag: 0.33.0 + tag: 0.33.1 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images @@ -118,6 +118,12 @@ ## @param watchForSecrets Specifies whether the Sealed Secrets controller will watch for new secrets ## watchForSecrets: false +## @param kubeClientQPS Kubeclient QPS (negative value disables ratelimiting) +## +kubeClientQPS: "" +## @param kubeClientBurst Kubeclient Burst +## +kubeClientBurst: "" ## @param command Override default container command ## command: [] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/pkg/controller/controller.go new/kubeseal-0.34.0/pkg/controller/controller.go --- old/kubeseal-0.33.1/pkg/controller/controller.go 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/pkg/controller/controller.go 2025-12-18 13:53:43.000000000 +0100 @@ -67,6 +67,7 @@ queue workqueue.TypedRateLimitingInterface[string] ssInformer cache.SharedIndexInformer sInformer cache.SharedIndexInformer + kInformer cache.SharedIndexInformer sclient v1.SecretsGetter ssclient ssv1alpha1client.SealedSecretsGetter recorder record.EventRecorder @@ -77,7 +78,16 @@ } // NewController returns the main sealed-secrets controller loop. -func NewController(clientset kubernetes.Interface, ssclientset ssclientset.Interface, ssinformer ssinformer.SharedInformerFactory, sinformer informers.SharedInformerFactory, keyRegistry *KeyRegistry, maxRetriesConfig int) (*Controller, error) { +func NewController( + clientset kubernetes.Interface, + ssclientset ssclientset.Interface, + ssinformer ssinformer.SharedInformerFactory, + sinformer informers.SharedInformerFactory, + kinformer informers.SharedInformerFactory, + keyRegistry *KeyRegistry, + maxRetriesConfig int, + keyOrderPriority string, +) (*Controller, error) { queue := workqueue.NewTypedRateLimitingQueue(workqueue.DefaultTypedControllerRateLimiter[string]()) utilruntime.Must(ssscheme.AddToScheme(scheme.Scheme)) @@ -102,11 +112,20 @@ } } + var kInformer cache.SharedIndexInformer + if kinformer != nil { + kInformer, err = watchKeySecrets(kinformer, keyRegistry, keyOrderPriority) + if err != nil { + return nil, err + } + } + maxRetries = maxRetriesConfig return &Controller{ ssInformer: ssInformer, sInformer: sInformer, + kInformer: kInformer, queue: queue, sclient: clientset.CoreV1(), ssclient: ssclientset.BitnamiV1alpha1(), @@ -115,6 +134,23 @@ }, nil } +func watchKeySecrets(kinformer informers.SharedInformerFactory, registry *KeyRegistry, keyOrderPriority string) (cache.SharedIndexInformer, error) { + kInformer := kinformer.Core().V1().Secrets().Informer() + _, err := kInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{ + AddFunc: func(obj interface{}) { + err := registryNewKeyWithSecret(obj.(*corev1.Secret), registry, keyOrderPriority) + if err != nil { + slog.Error("failed to register key", "error", err) + return + } + }, + }) + if err != nil { + return nil, fmt.Errorf("could not add event handler to secrets informer: %w", err) + } + return kInformer, nil +} + func watchSealedSecrets(ssinformer ssinformer.SharedInformerFactory, queue workqueue.TypedRateLimitingInterface[string]) (cache.SharedIndexInformer, error) { ssInformer := ssinformer.Bitnami().V1alpha1().SealedSecrets().Informer() _, err := ssInformer.AddEventHandler(cache.ResourceEventHandlerFuncs{ @@ -237,6 +273,9 @@ if c.sInformer != nil { go c.sInformer.Run(stopCh) } + if c.kInformer != nil { + go c.kInformer.Run(stopCh) + } if !cache.WaitForCacheSync(stopCh, c.HasSynced) { utilruntime.HandleError(fmt.Errorf("timed out waiting for caches to sync")) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/pkg/controller/main.go new/kubeseal-0.34.0/pkg/controller/main.go --- old/kubeseal-0.33.1/pkg/controller/main.go 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/pkg/controller/main.go 2025-12-18 13:53:43.000000000 +0100 @@ -13,8 +13,6 @@ "syscall" "time" - "k8s.io/apimachinery/pkg/watch" - v1 "k8s.io/api/core/v1" "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" @@ -60,6 +58,8 @@ PrivateKeyLabels string MaxRetries int WatchForSecrets bool + KubeClientQPS float32 + KubeClientBurst int } func initKeyPrefix(keyPrefix string) (string, error) { @@ -124,37 +124,6 @@ return cert.NotBefore } -func watchKeyRegistry(ctx context.Context, client kubernetes.Interface, keyRegistry *KeyRegistry, namespace, keyOrderPriority string) error { - watcher, err := client.CoreV1().Secrets(namespace).Watch(ctx, metav1.ListOptions{ - LabelSelector: keySelector.String(), - }) - if err != nil { - return err - } - - for event := range watcher.ResultChan() { - secret := event.Object.(*v1.Secret) - if secret == nil { - continue - } - - switch event.Type { - case watch.Added: - err = registryNewKeyWithSecret(secret, keyRegistry, keyOrderPriority) - if err != nil { - return err - } - case watch.Modified: - case watch.Deleted: - case watch.Error: - case watch.Bookmark: - default: - slog.Info("Unexpected watch event", "type", event.Type) - } - } - return nil -} - func myNamespace() string { if ns := os.Getenv("POD_NAMESPACE"); ns != "" { return ns @@ -210,6 +179,9 @@ return err } + config.QPS = f.KubeClientQPS + config.Burst = f.KubeClientBurst + clientset, err := kubernetes.NewForConfig(config) if err != nil { return err @@ -274,13 +246,6 @@ go controller.Run(stop) - if f.WatchForSecrets { - go func() { - err := watchKeyRegistry(ctx, clientset, keyRegistry, myNs, f.KeyOrderPriority) - slog.Error("Watch fo secrets", "err", err) - }() - } - if f.AdditionalNamespaces != "" { addNS := removeDuplicates(strings.Split(f.AdditionalNamespaces, ",")) @@ -331,16 +296,26 @@ return nil } -func prepareController(clientset kubernetes.Interface, namespace string, tweakopts func(*metav1.ListOptions), f *Flags, ssclientset versioned.Interface, keyRegistry *KeyRegistry) (*Controller, error) { +func prepareController( + clientset kubernetes.Interface, + namespace string, + tweakopts func(*metav1.ListOptions), + f *Flags, + ssclientset versioned.Interface, + keyRegistry *KeyRegistry, +) (*Controller, error) { + kinformer := initSecretInformerFactory(clientset, namespace, func(options *metav1.ListOptions) { + options.LabelSelector = keySelector.String() + }, f.WatchForSecrets) sinformer := initSecretInformerFactory(clientset, namespace, tweakopts, f.SkipRecreate) ssinformer := ssinformers.NewFilteredSharedInformerFactory(ssclientset, 0, namespace, tweakopts) - controller, err := NewController(clientset, ssclientset, ssinformer, sinformer, keyRegistry, f.MaxRetries) + controller, err := NewController(clientset, ssclientset, ssinformer, sinformer, kinformer, keyRegistry, f.MaxRetries, f.KeyOrderPriority) return controller, err } -func initSecretInformerFactory(clientset kubernetes.Interface, ns string, tweakopts func(*metav1.ListOptions), skipRecreate bool) informers.SharedInformerFactory { - if skipRecreate { +func initSecretInformerFactory(clientset kubernetes.Interface, ns string, tweakopts func(*metav1.ListOptions), enabled bool) informers.SharedInformerFactory { + if enabled { return nil } - return informers.NewFilteredSharedInformerFactory(clientset, 0, ns, tweakopts) + return informers.NewSharedInformerFactoryWithOptions(clientset, 0, informers.WithNamespace(ns), informers.WithTweakListOptions(tweakopts)) } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/kubeseal-0.33.1/versions.env new/kubeseal-0.34.0/versions.env --- old/kubeseal-0.33.1/versions.env 2025-11-06 17:30:11.000000000 +0100 +++ new/kubeseal-0.34.0/versions.env 2025-12-18 13:53:43.000000000 +0100 @@ -1,2 +1,2 @@ -GO_VERSION=1.25.4 +GO_VERSION=1.25.5 GO_VERSION_LIST="[\"$GO_VERSION\"]" ++++++ kubeseal.obsinfo ++++++ --- /var/tmp/diff_new_pack.DdXVxl/_old 2025-12-18 18:37:52.705810744 +0100 +++ /var/tmp/diff_new_pack.DdXVxl/_new 2025-12-18 18:37:52.713811081 +0100 @@ -1,5 +1,5 @@ name: kubeseal -version: 0.33.1 -mtime: 1762446611 -commit: 1e1ac9ecbc280ff4f9e15504bde2bda8d79906b2 +version: 0.34.0 +mtime: 1766062423 +commit: fd30a3eb590170d99e5d62df254d097a2c131144 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz /work/SRC/openSUSE:Factory/.kubeseal.new.1928/vendor.tar.gz differ: char 13, line 1
