Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package rancher-cli for openSUSE:Factory checked in at 2026-01-30 18:28:22 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/rancher-cli (Old) and /work/SRC/openSUSE:Factory/.rancher-cli.new.1995 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "rancher-cli" Fri Jan 30 18:28:22 2026 rev:26 rq:1329980 version:2.13.2 Changes: -------- --- /work/SRC/openSUSE:Factory/rancher-cli/rancher-cli.changes 2025-12-20 21:48:28.860128682 +0100 +++ /work/SRC/openSUSE:Factory/.rancher-cli.new.1995/rancher-cli.changes 2026-01-30 18:28:39.853615549 +0100 @@ -1,0 +2,11 @@ +Fri Jan 30 08:38:28 UTC 2026 - Johannes Kastl <[email protected]> + +- Update to version 2.13.2: + * Update Rancher refs to (#540) + * [v2.13] Fix release GHA workflow (#537) + * [v2.13] Prerelease dependency bumps for v2.13.2 (#533) + * [v2.13] Fix login command (#525) + * [v2.13] Use staticcheck linter (#523) + * [v2.13] Bump Go toolchain to 1.24.11 (#524) + +------------------------------------------------------------------- Old: ---- rancher-cli-2.13.1.obscpio New: ---- rancher-cli-2.13.2.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ rancher-cli.spec ++++++ --- /var/tmp/diff_new_pack.mtLsjp/_old 2026-01-30 18:28:42.401722548 +0100 +++ /var/tmp/diff_new_pack.mtLsjp/_new 2026-01-30 18:28:42.401722548 +0100 @@ -1,7 +1,7 @@ # # spec file for package rancher-cli # -# Copyright (c) 2025 SUSE LLC and contributors +# Copyright (c) 2026 SUSE LLC and contributors # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,14 +17,14 @@ Name: rancher-cli -Version: 2.13.1 +Version: 2.13.2 Release: 0 Summary: Rancher CLI License: Apache-2.0 URL: https://github.com/rancher/cli Source: %{name}-%{version}.tar.gz Source1: vendor.tar.gz -BuildRequires: go1.24 >= 1.24.6 +BuildRequires: golang(API) >= 1.24 %description The Rancher Command Line Interface (CLI) is a unified tool for interacting with ++++++ _service ++++++ --- /var/tmp/diff_new_pack.mtLsjp/_old 2026-01-30 18:28:42.441724227 +0100 +++ /var/tmp/diff_new_pack.mtLsjp/_new 2026-01-30 18:28:42.445724396 +0100 @@ -3,7 +3,7 @@ <param name="url">https://github.com/rancher/cli</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v2.13.1</param> + <param name="revision">v2.13.2</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> <param name="changesgenerate">enable</param> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.mtLsjp/_old 2026-01-30 18:28:42.465725235 +0100 +++ /var/tmp/diff_new_pack.mtLsjp/_new 2026-01-30 18:28:42.469725403 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/rancher/cli</param> - <param name="changesrevision">4584728f78deafc7480186114387078edfe4edc9</param></service></servicedata> + <param name="changesrevision">0c8b6f6bd26fb6beec8678f18664f472f72c9bd8</param></service></servicedata> (No newline at EOF) ++++++ rancher-cli-2.13.1.obscpio -> rancher-cli-2.13.2.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/.golangci.json new/rancher-cli-2.13.2/.golangci.json --- old/rancher-cli-2.13.1/.golangci.json 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/.golangci.json 2026-01-29 15:22:36.000000000 +0100 @@ -1,10 +1,17 @@ { - "linters": { - "enable": [ - "gofmt" - ] - }, - "run": { - "timeout": "10m" - } -} \ No newline at end of file + "formatters": { + "enable": [ + "gofmt" + ] + }, + "linters": { + "default": "none", + "enable": [ + "govet", + "ineffassign", + "staticcheck", + "unused" + ] + }, + "version": "2" +} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/cliclient/cliclient.go new/rancher-cli-2.13.2/cliclient/cliclient.go --- old/rancher-cli-2.13.1/cliclient/cliclient.go 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/cliclient/cliclient.go 2026-01-29 15:22:36.000000000 +0100 @@ -162,11 +162,11 @@ func (mc *MasterClient) ByID(resource *ntypes.Resource, respObject interface{}) error { if strings.HasPrefix(resource.Type, "cluster.x-k8s.io") { return mc.CAPIClient.ByID(resource.Type, resource.ID, &respObject) - } else if _, ok := mc.ManagementClient.APIBaseClient.Types[resource.Type]; ok { + } else if _, ok := mc.ManagementClient.Types[resource.Type]; ok { return mc.ManagementClient.ByID(resource.Type, resource.ID, &respObject) - } else if _, ok := mc.ProjectClient.APIBaseClient.Types[resource.Type]; ok { + } else if _, ok := mc.ProjectClient.Types[resource.Type]; ok { return mc.ProjectClient.ByID(resource.Type, resource.ID, &respObject) - } else if _, ok := mc.ClusterClient.APIBaseClient.Types[resource.Type]; ok { + } else if _, ok := mc.ClusterClient.Types[resource.Type]; ok { return mc.ClusterClient.ByID(resource.Type, resource.ID, &respObject) } return fmt.Errorf("MasterClient - unknown resource type %v", resource.Type) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/cluster.go new/rancher-cli-2.13.2/cmd/cluster.go --- old/rancher-cli-2.13.1/cmd/cluster.go 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/cmd/cluster.go 2026-01-29 15:22:36.000000000 +0100 @@ -742,7 +742,7 @@ // parseResourceString returns GB for Ki and Mi and CPU cores from 'm' func parseResourceString(mem string) string { if strings.HasSuffix(mem, "Ki") { - num, err := strconv.ParseFloat(strings.Replace(mem, "Ki", "", -1), 64) + num, err := strconv.ParseFloat(strings.ReplaceAll(mem, "Ki", ""), 64) if err != nil { return mem } @@ -750,7 +750,7 @@ return strings.TrimSuffix(fmt.Sprintf("%.2f", num), ".0") } if strings.HasSuffix(mem, "Mi") { - num, err := strconv.ParseFloat(strings.Replace(mem, "Mi", "", -1), 64) + num, err := strconv.ParseFloat(strings.ReplaceAll(mem, "Mi", ""), 64) if err != nil { return mem } @@ -758,7 +758,7 @@ return strings.TrimSuffix(fmt.Sprintf("%.2f", num), ".0") } if strings.HasSuffix(mem, "m") { - num, err := strconv.ParseFloat(strings.Replace(mem, "m", "", -1), 64) + num, err := strconv.ParseFloat(strings.ReplaceAll(mem, "m", ""), 64) if err != nil { return mem } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/common.go new/rancher-cli-2.13.2/cmd/common.go --- old/rancher-cli-2.13.1/cmd/common.go 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/cmd/common.go 2026-01-29 15:22:36.000000000 +0100 @@ -261,7 +261,7 @@ func verifyCert(caCert []byte) (string, error) { // replace the escaped version of the line break - caCert = bytes.Replace(caCert, []byte(`\n`), []byte("\n"), -1) + caCert = bytes.ReplaceAll(caCert, []byte(`\n`), []byte("\n")) block, _ := pem.Decode(caCert) @@ -322,28 +322,28 @@ // GetResourceType maps an incoming resource type to a valid one from the schema func GetResourceType(c *cliclient.MasterClient, resource string) (string, error) { if c.ManagementClient != nil { - for key := range c.ManagementClient.APIBaseClient.Types { + for key := range c.ManagementClient.Types { if strings.EqualFold(key, resource) { return key, nil } } } if c.ProjectClient != nil { - for key := range c.ProjectClient.APIBaseClient.Types { + for key := range c.ProjectClient.Types { if strings.EqualFold(key, resource) { return key, nil } } } if c.ClusterClient != nil { - for key := range c.ClusterClient.APIBaseClient.Types { + for key := range c.ClusterClient.Types { if strings.EqualFold(key, resource) { return key, nil } } } if c.CAPIClient != nil { - for key := range c.CAPIClient.APIBaseClient.Types { + for key := range c.CAPIClient.Types { lowerKey := strings.ToLower(key) if strings.HasPrefix(lowerKey, "cluster.x-k8s.io") && lowerKey == strings.ToLower(resource) { return key, nil @@ -370,17 +370,17 @@ } } if c.ManagementClient != nil { - if _, ok := c.ManagementClient.APIBaseClient.Types[rt]; ok { + if _, ok := c.ManagementClient.Types[rt]; ok { schemaClient = c.ManagementClient } } if c.ProjectClient != nil { - if _, ok := c.ProjectClient.APIBaseClient.Types[rt]; ok { + if _, ok := c.ProjectClient.Types[rt]; ok { schemaClient = c.ProjectClient } } if c.ClusterClient != nil { - if _, ok := c.ClusterClient.APIBaseClient.Types[rt]; ok { + if _, ok := c.ClusterClient.Types[rt]; ok { schemaClient = c.ClusterClient } } @@ -415,7 +415,7 @@ for _, data := range collection.Data { ids = append(ids, data.ID) } - return nil, fmt.Errorf("Multiple resources of type %s found for name %s: %v", schemaType, name, ids) + return nil, fmt.Errorf("multiple resources of type %s found for name %s: %v", schemaType, name, ids) } // No matches for this schemaType, try the next one @@ -424,7 +424,7 @@ } if byName != nil { - return nil, fmt.Errorf("Multiple resources named %s: %s:%s, %s:%s", name, collection.Data[0].Type, + return nil, fmt.Errorf("multiple resources named %s: %s:%s, %s:%s", name, collection.Data[0].Type, collection.Data[0].ID, byName.Type, byName.ID) } @@ -433,7 +433,7 @@ } if byName == nil { - return nil, fmt.Errorf("Not found: %s", name) + return nil, fmt.Errorf("not found: %s", name) } return byName, nil @@ -546,7 +546,7 @@ parts := SplitOnColon(id) return parts[0], parts[1], nil } - return "", "", fmt.Errorf("Unable to extract clusterid and projectid from [%s]", id) + return "", "", fmt.Errorf("unable to extract clusterid and projectid from [%s]", id) } // Return a JSON blob of the file at path diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/kubectl_token.go new/rancher-cli-2.13.2/cmd/kubectl_token.go --- old/rancher-cli-2.13.1/cmd/kubectl_token.go 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/cmd/kubectl_token.go 2026-01-29 15:22:36.000000000 +0100 @@ -241,7 +241,7 @@ return cred, nil } ts := cred.Status.ExpirationTimestamp - if ts != nil && ts.Time.Before(time.Now()) { + if ts != nil && ts.Before(time.Now()) { cf, err := loadConfig(ctx) if err != nil { return nil, err diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/kubectl_token_test.go new/rancher-cli-2.13.2/cmd/kubectl_token_test.go --- old/rancher-cli-2.13.1/cmd/kubectl_token_test.go 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/cmd/kubectl_token_test.go 2026-01-29 15:22:36.000000000 +0100 @@ -165,5 +165,5 @@ expirationTimestamp := cfg.Servers["rancher.example.com"].KubeCredentials["dev-server"].Status.ExpirationTimestamp require.NotNil(t, expirationTimestamp) - assert.True(t, expirationTimestamp.Time.Equal(expires.Time)) + assert.True(t, expirationTimestamp.Equal(expires.Time)) } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/login.go new/rancher-cli-2.13.2/cmd/login.go --- old/rancher-cli-2.13.1/cmd/login.go 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/cmd/login.go 2026-01-29 15:22:36.000000000 +0100 @@ -2,23 +2,17 @@ import ( "bufio" - "crypto/tls" - "encoding/json" "errors" "fmt" - "io" - "net/http" "net/url" "os" "strconv" "strings" - "github.com/sirupsen/logrus" - - "github.com/grantae/certinfo" "github.com/rancher/cli/cliclient" "github.com/rancher/cli/config" managementClient "github.com/rancher/rancher/pkg/client/generated/management/v3" + "github.com/sirupsen/logrus" "github.com/urfave/cli" ) @@ -57,10 +51,6 @@ Name: "name", Usage: "Name of the Server", }, - cli.BoolFlag{ - Name: "skip-verify", - Usage: "Skip verification of the CACerts presented by the Server", - }, }, } } @@ -85,7 +75,7 @@ // Validate the url and drop the path u, err := url.ParseRequestURI(ctx.Args().First()) if err != nil { - return fmt.Errorf("Failed to parse SERVERURL (%s), make sure it is a valid HTTPS URL (e.g. https://rancher.yourdomain.com or https://1.1.1.1). Error: %s", ctx.Args().First(), err) + return fmt.Errorf("failed to parse SERVERURL (%s), make sure it is a valid HTTPS URL (e.g. https://rancher.yourdomain.com or https://1.1.1.1). Error: %s", ctx.Args().First(), err) } u.Path = "" @@ -115,16 +105,7 @@ c, err := cliclient.NewManagementClient(serverConfig) if err != nil { - if _, ok := err.(*url.Error); ok && strings.Contains(err.Error(), "certificate signed by unknown authority") { - // no cert was provided and it's most likely a self signed cert if - // we get here so grab the cacert and see if the user accepts the server - c, err = getCertFromServer(ctx, serverConfig) - if err != nil { - return err - } - } else { - return err - } + return err } proj, err := getProjectContext(ctx, c) @@ -152,12 +133,12 @@ // Check if given context is in valid format _, _, err := parseClusterAndProjectID(context) if err != nil { - return "", fmt.Errorf("Unable to parse context (%s). Please provide context as local:p-xxxxx, c-xxxxx:p-xxxxx, c-xxxxx:project-xxxxx, c-m-xxxxxxxx:p-xxxxx or c-m-xxxxxxxx:project-xxxxx", context) + return "", fmt.Errorf("unable to parse context (%s). Please provide context as local:p-xxxxx, c-xxxxx:p-xxxxx, c-xxxxx:project-xxxxx, c-m-xxxxxxxx:p-xxxxx or c-m-xxxxxxxx:project-xxxxx", context) } // Check if context exists _, err = Lookup(c, context, "project") if err != nil { - return "", fmt.Errorf("Unable to find context (%s). Make sure the context exists and you have permissions to use it. Error: %s", context, err) + return "", fmt.Errorf("unable to find context (%s). Make sure the context exists and you have permissions to use it. Error: %s", context, err) } return context, nil } @@ -252,94 +233,6 @@ return projectCollection.Data[selection].ID, nil } -func getCertFromServer(ctx *cli.Context, serverConfig *config.ServerConfig) (*cliclient.MasterClient, error) { - req, err := http.NewRequest("GET", serverConfig.URL+"/v3/settings/cacerts", nil) - if err != nil { - return nil, err - } - - req.SetBasicAuth(serverConfig.AccessKey, serverConfig.SecretKey) - - tlsConfig := &tls.Config{InsecureSkipVerify: true} - client, err := newHTTPClient(serverConfig, tlsConfig) - if err != nil { - return nil, err - } - - res, err := client.Do(req) - if err != nil { - return nil, err - } - - defer res.Body.Close() - - content, err := io.ReadAll(res.Body) - if err != nil { - return nil, err - } - - var certReponse *CACertResponse - err = json.Unmarshal(content, &certReponse) - if err != nil { - return nil, fmt.Errorf("Unable to parse response from %s/v3/settings/cacerts\nError: %s\nResponse:\n%s", serverConfig.URL, err, content) - } - - cert, err := verifyCert([]byte(certReponse.Value)) - if err != nil { - return nil, err - } - - // Get the server cert chain in a printable form - serverCerts, err := processServerChain(res) - if err != nil { - return nil, err - } - - if !ctx.Bool("skip-verify") { - if ok := verifyUserAcceptsCert(serverCerts, serverConfig.URL); !ok { - return nil, errors.New("CACert of server was not accepted, unable to login") - } - } - - serverConfig.CACerts = cert - - return cliclient.NewManagementClient(serverConfig) -} - -func verifyUserAcceptsCert(certs []string, url string) bool { - fmt.Printf("The authenticity of server '%s' can't be established.\n", url) - fmt.Printf("Cert chain is : %v \n", certs) - fmt.Print("Do you want to continue connecting (yes/no)? ") - - scanner := bufio.NewScanner(os.Stdin) - - for scanner.Scan() { - input := scanner.Text() - input = strings.ToLower(strings.TrimSpace(input)) - - if input == "yes" || input == "y" { - return true - } else if input == "no" || input == "n" { - return false - } - fmt.Printf("Please type 'yes' or 'no': ") - } - return false -} - -func processServerChain(res *http.Response) ([]string, error) { - var allCerts []string - - for _, cert := range res.TLS.PeerCertificates { - result, err := certinfo.CertificateText(cert) - if err != nil { - return allCerts, err - } - allCerts = append(allCerts, result) - } - return allCerts, nil -} - func loginContext(ctx *cli.Context) error { c, err := GetClient(ctx) if err != nil { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/wait.go new/rancher-cli-2.13.2/cmd/wait.go --- old/rancher-cli-2.13.1/cmd/wait.go 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/cmd/wait.go 2026-01-29 15:22:36.000000000 +0100 @@ -67,7 +67,7 @@ for { select { case <-timeout: - return fmt.Errorf("Timeout reached %v:%v transitioningMessage: %v", resource.Type, resource.ID, mapResource["transitioningMessage"]) + return fmt.Errorf("timeout reached %v:%v transitioningMessage: %v", resource.Type, resource.ID, mapResource["transitioningMessage"]) case <-ticker.C: err = c.ByID(resource, &mapResource) if err != nil { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/writer.go new/rancher-cli-2.13.2/cmd/writer.go --- old/rancher-cli-2.13.1/cmd/writer.go 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/cmd/writer.go 2026-01-29 15:22:36.000000000 +0100 @@ -93,21 +93,22 @@ return } - if t.ValueFormat == "json" { + switch t.ValueFormat { + case "json": content, err := json.Marshal(obj) t.err = err if t.err != nil { return } _, t.err = t.Writer.Write(append(content, byte('\n'))) - } else if t.ValueFormat == "yaml" { + case "yaml": content, err := yaml.Marshal(obj) t.err = err if t.err != nil { return } _, t.err = t.Writer.Write(append(content, byte('\n'))) - } else { + default: t.err = printTemplate(t.Writer, t.ValueFormat, obj) } } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/go.mod new/rancher-cli-2.13.2/go.mod --- old/rancher-cli-2.13.1/go.mod 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/go.mod 2026-01-29 15:22:36.000000000 +0100 @@ -2,21 +2,20 @@ go 1.24.0 -toolchain go1.24.9 +toolchain go1.24.11 replace ( - k8s.io/apiserver => k8s.io/apiserver v0.34.2 - k8s.io/client-go => k8s.io/client-go v0.34.2 - k8s.io/component-base => k8s.io/component-base v0.34.2 - k8s.io/kubernetes => k8s.io/kubernetes v1.34.2 + k8s.io/apiserver => k8s.io/apiserver v0.34.3 + k8s.io/client-go => k8s.io/client-go v0.34.3 + k8s.io/component-base => k8s.io/component-base v0.34.3 + k8s.io/kubernetes => k8s.io/kubernetes v1.34.3 ) require ( github.com/ghodss/yaml v1.0.0 - github.com/grantae/certinfo v0.0.0-20170412194111-59d56a35515b github.com/rancher/norman v0.7.2 - github.com/rancher/rancher/pkg/apis v0.0.0-20251218234335-4c2e04b31079 - github.com/rancher/rancher/pkg/client v0.0.0-20251218234335-4c2e04b31079 + github.com/rancher/rancher/pkg/apis v0.0.0-20260129014206-f93c99323f67 + github.com/rancher/rancher/pkg/client v0.0.0-20260129014206-f93c99323f67 github.com/sirupsen/logrus v1.9.3 github.com/stretchr/testify v1.11.1 github.com/tidwall/gjson v1.17.0 @@ -61,7 +60,7 @@ github.com/rancher/aks-operator v1.13.1 // indirect github.com/rancher/ali-operator v1.13.0 // indirect github.com/rancher/eks-operator v1.13.1 // indirect - github.com/rancher/fleet/pkg/apis v0.14.1-0.20251210150425-9e77da0d13fd // indirect + github.com/rancher/fleet/pkg/apis v0.14.2 // indirect github.com/rancher/gke-operator v1.13.1 // indirect github.com/rancher/lasso v0.2.5 // indirect github.com/rancher/rke v1.8.0 // indirect @@ -82,13 +81,13 @@ gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect - k8s.io/api v0.34.2 // indirect + k8s.io/api v0.34.3 // indirect k8s.io/apimachinery v0.34.3 // indirect - k8s.io/apiserver v0.34.2 // indirect - k8s.io/component-base v0.34.2 // indirect + k8s.io/apiserver v0.34.3 // indirect + k8s.io/component-base v0.34.3 // indirect k8s.io/klog/v2 v2.130.1 // indirect k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b // indirect - k8s.io/kubernetes v1.34.2 // indirect + k8s.io/kubernetes v1.34.3 // indirect k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 // indirect sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 // indirect sigs.k8s.io/randfill v1.0.0 // indirect diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/go.sum new/rancher-cli-2.13.2/go.sum --- old/rancher-cli-2.13.1/go.sum 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/go.sum 2026-01-29 15:22:36.000000000 +0100 @@ -43,8 +43,6 @@ github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo= github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 h1:JeSE6pjso5THxAzdVpqr6/geYxZytqFMBCOtn/ujyeo= github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674/go.mod h1:r4w70xmWCQKmi1ONH4KIaBptdivuRPyosB9RmPlGEwA= -github.com/grantae/certinfo v0.0.0-20170412194111-59d56a35515b h1:NGgE5ELokSf2tZ/bydyDUKrvd/jP8lrAoPNeBuMOTOk= -github.com/grantae/certinfo v0.0.0-20170412194111-59d56a35515b/go.mod h1:zT/uzhdQGTqlwTq7Lpbj3JoJQWfPfIJ1tE0OidAmih8= github.com/josharian/intern v1.0.0 h1:vlS4z54oSdjm0bgjRigI+G1HpF+tI+9rE5LLzOg8HmY= github.com/josharian/intern v1.0.0/go.mod h1:5DoeVV0s6jJacbCEi61lwdGj/aVlrQvzHFFd8Hwg//Y= github.com/json-iterator/go v1.1.12 h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM= @@ -92,18 +90,18 @@ github.com/rancher/ali-operator v1.13.0/go.mod h1:s5HznpxsN9LsgtX6u5UoW9dZNKnDLuXcwzQRAEoDcog= github.com/rancher/eks-operator v1.13.1 h1:0wq1A3rUlzyyEEPkBKOcoc3kfhdL4j/GH6BjzH1akKo= github.com/rancher/eks-operator v1.13.1/go.mod h1:aZHPP/pTGLrbELrek5zluuxF0PoMj7Qc6lLp+Rl54+c= -github.com/rancher/fleet/pkg/apis v0.14.1-0.20251210150425-9e77da0d13fd h1:7V9UuLSTMN7eEYVTAUjX+sUS7yCPaIioegLQGWaOzE4= -github.com/rancher/fleet/pkg/apis v0.14.1-0.20251210150425-9e77da0d13fd/go.mod h1:NH2GmVA3iSL+LnooVj0Plqv0zljrpXjSDpOkFF/yLQ0= +github.com/rancher/fleet/pkg/apis v0.14.2 h1:VtE5ayMlswYGjUnLCvqVvXfBKs+neBXkznGDXTt/yco= +github.com/rancher/fleet/pkg/apis v0.14.2/go.mod h1:RlHzOtW4+JExNAN0mRBmcsTbAb9zAqJ+43ZwHOJsqPg= github.com/rancher/gke-operator v1.13.1 h1:i9RkWfUkvUg5QZ7hrJNHimqKUgC9kspqn7++2ePTanE= github.com/rancher/gke-operator v1.13.1/go.mod h1:IhrrQK+Wf1jZkbOioJW0Un0LVuqteEWWUndFGrbzVU8= github.com/rancher/lasso v0.2.5 h1:K++lWDDdfeN98Ixc1kCfUq0/q6tLjoHN++Np6QntXw0= github.com/rancher/lasso v0.2.5/go.mod h1:71rWfv+KkdSmSxZ9Ly5QYhxAu0nEUcaq9N2ByjcHqAM= github.com/rancher/norman v0.7.2 h1:5ZPwGbTy/mt8rDxXSqyMwohn6TVef+jntSVD2kA9pYg= github.com/rancher/norman v0.7.2/go.mod h1:vZ5qL+eKodJ7zOMQYdl6jwMrSFrqTKpA+KYSFEKew2M= -github.com/rancher/rancher/pkg/apis v0.0.0-20251218234335-4c2e04b31079 h1:xlG5hssfNlaJhE4nP9AwC7xVksbXP7r0/ngdipUCJkI= -github.com/rancher/rancher/pkg/apis v0.0.0-20251218234335-4c2e04b31079/go.mod h1:VydA5iWoq8x1rp8YaTIRMcryKiClq/xVwfTlEgunqfs= -github.com/rancher/rancher/pkg/client v0.0.0-20251218234335-4c2e04b31079 h1:er6FuczE4fewcXVHkZHq+48SKftxUkAll1OA1SafV0M= -github.com/rancher/rancher/pkg/client v0.0.0-20251218234335-4c2e04b31079/go.mod h1:JhQyuNwunMXNvBMrjXVc3DTccZHFqCDZNxJBDF2zYo4= +github.com/rancher/rancher/pkg/apis v0.0.0-20260129014206-f93c99323f67 h1:jLSR443ZtoOokGKIbj5dLOnwIap8GizkgzWFHPUxS+0= +github.com/rancher/rancher/pkg/apis v0.0.0-20260129014206-f93c99323f67/go.mod h1:ua1R2Be7aXeO0fSsQaMy2CHe98uVpag6DJXPVXj+RT4= +github.com/rancher/rancher/pkg/client v0.0.0-20260129014206-f93c99323f67 h1:DKRr2Fg0LDtLc4rCQB7nMEk+wiJmCqSzBjcLYW5VdNU= +github.com/rancher/rancher/pkg/client v0.0.0-20260129014206-f93c99323f67/go.mod h1:fGfsCQgJLxdtqPSRRHWcKM+q2iUXCoYrNKtNXeoggUU= github.com/rancher/rke v1.8.0 h1:87jeoOccnnNCq27YgWgMh4o0GVrrVKbw+zfo+cHMZlo= github.com/rancher/rke v1.8.0/go.mod h1:x9N1abruzDFMwTpqq2cnaDYpKCptlNoW8VraNWB6Pc4= github.com/rancher/wrangler/v3 v3.3.1 h1:YFqRfhxjuLNudUrvWrn+64wUPZ8pnn2KWbTsha75JLg= @@ -212,22 +210,22 @@ gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA= gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= -k8s.io/api v0.34.2 h1:fsSUNZhV+bnL6Aqrp6O7lMTy6o5x2C4XLjnh//8SLYY= -k8s.io/api v0.34.2/go.mod h1:MMBPaWlED2a8w4RSeanD76f7opUoypY8TFYkSM+3XHw= +k8s.io/api v0.34.3 h1:D12sTP257/jSH2vHV2EDYrb16bS7ULlHpdNdNhEw2S4= +k8s.io/api v0.34.3/go.mod h1:PyVQBF886Q5RSQZOim7DybQjAbVs8g7gwJNhGtY5MBk= k8s.io/apimachinery v0.34.3 h1:/TB+SFEiQvN9HPldtlWOTp0hWbJ+fjU+wkxysf/aQnE= k8s.io/apimachinery v0.34.3/go.mod h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw= -k8s.io/apiserver v0.34.2 h1:2/yu8suwkmES7IzwlehAovo8dDE07cFRC7KMDb1+MAE= -k8s.io/apiserver v0.34.2/go.mod h1:gqJQy2yDOB50R3JUReHSFr+cwJnL8G1dzTA0YLEqAPI= -k8s.io/client-go v0.34.2 h1:Co6XiknN+uUZqiddlfAjT68184/37PS4QAzYvQvDR8M= -k8s.io/client-go v0.34.2/go.mod h1:2VYDl1XXJsdcAxw7BenFslRQX28Dxz91U9MWKjX97fE= -k8s.io/component-base v0.34.2 h1:HQRqK9x2sSAsd8+R4xxRirlTjowsg6fWCPwWYeSvogQ= -k8s.io/component-base v0.34.2/go.mod h1:9xw2FHJavUHBFpiGkZoKuYZ5pdtLKe97DEByaA+hHbM= +k8s.io/apiserver v0.34.3 h1:uGH1qpDvSiYG4HVFqc6A3L4CKiX+aBWDrrsxHYK0Bdo= +k8s.io/apiserver v0.34.3/go.mod h1:QPnnahMO5C2m3lm6fPW3+JmyQbvHZQ8uudAu/493P2w= +k8s.io/client-go v0.34.3 h1:wtYtpzy/OPNYf7WyNBTj3iUA0XaBHVqhv4Iv3tbrF5A= +k8s.io/client-go v0.34.3/go.mod h1:OxxeYagaP9Kdf78UrKLa3YZixMCfP6bgPwPwNBQBzpM= +k8s.io/component-base v0.34.3 h1:zsEgw6ELqK0XncCQomgO9DpUIzlrYuZYA0Cgo+JWpVk= +k8s.io/component-base v0.34.3/go.mod h1:5iIlD8wPfWE/xSHTRfbjuvUul2WZbI2nOUK65XL0E/c= k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk= k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE= k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b h1:MloQ9/bdJyIu9lb1PzujOPolHyvO06MXG5TUIj2mNAA= k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b/go.mod h1:UZ2yyWbFTpuhSbFhv24aGNOdoRdJZgsIObGBUaYVsts= -k8s.io/kubernetes v1.34.2 h1:WQdDvYJazkmkwSncgNwGvVtaCt4TYXIU3wSMRgvp3MI= -k8s.io/kubernetes v1.34.2/go.mod h1:m6pZk6a179pRo2wsTiCPORJ86iOEQmfIzUvtyEF8BwA= +k8s.io/kubernetes v1.34.3 h1:0TfljWbhEF5DBks+WFMSrvKfxBLo4vnZuqORjLMiyT4= +k8s.io/kubernetes v1.34.3/go.mod h1:m6pZk6a179pRo2wsTiCPORJ86iOEQmfIzUvtyEF8BwA= k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 h1:hwvWFiBzdWw1FhfY1FooPn3kzWuJ8tmbZBHi4zVsl1Y= k8s.io/utils v0.0.0-20250604170112-4c0f3b243397/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0= sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 h1:gBQPwqORJ8d8/YNZWEjoZs7npUVDpVXUUOFfW6CgAqE= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/rancher-cli-2.13.1/scripts/ci new/rancher-cli-2.13.2/scripts/ci --- old/rancher-cli-2.13.1/scripts/ci 2025-12-19 11:35:50.000000000 +0100 +++ new/rancher-cli-2.13.2/scripts/ci 2026-01-29 15:22:36.000000000 +0100 @@ -5,6 +5,5 @@ ./build ./test -./lint ./validate ./package ++++++ rancher-cli.obsinfo ++++++ --- /var/tmp/diff_new_pack.mtLsjp/_old 2026-01-30 18:28:42.661733466 +0100 +++ /var/tmp/diff_new_pack.mtLsjp/_new 2026-01-30 18:28:42.665733634 +0100 @@ -1,5 +1,5 @@ name: rancher-cli -version: 2.13.1 -mtime: 1766140550 -commit: 4584728f78deafc7480186114387078edfe4edc9 +version: 2.13.2 +mtime: 1769696556 +commit: 0c8b6f6bd26fb6beec8678f18664f472f72c9bd8 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/rancher-cli/vendor.tar.gz /work/SRC/openSUSE:Factory/.rancher-cli.new.1995/vendor.tar.gz differ: char 13, line 1
