Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package popeye for openSUSE:Factory checked 
in at 2023-02-21 15:36:38
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/popeye (Old)
 and      /work/SRC/openSUSE:Factory/.popeye.new.22824 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "popeye"

Tue Feb 21 15:36:38 2023 rev:5 rq:1066973 version:0.11.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/popeye/popeye.changes    2023-02-13 
16:43:10.808174574 +0100
+++ /work/SRC/openSUSE:Factory/.popeye.new.22824/popeye.changes 2023-02-21 
15:36:56.340596288 +0100
@@ -1,0 +2,7 @@
+Tue Feb 21 09:27:22 UTC 2023 - ka...@b1-systems.de
+
+- Update to version 0.11.1:
+  * fix #245
+  * deprecated cronjob api
+
+-------------------------------------------------------------------

Old:
----
  popeye-0.11.0.tar.gz

New:
----
  popeye-0.11.1.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ popeye.spec ++++++
--- /var/tmp/diff_new_pack.FemjI8/_old  2023-02-21 15:36:57.520603069 +0100
+++ /var/tmp/diff_new_pack.FemjI8/_new  2023-02-21 15:36:57.528603116 +0100
@@ -19,7 +19,7 @@
 %define __arch_install_post export NO_BRP_STRIP_DEBUG=true
 
 Name:           popeye
-Version:        0.11.0
+Version:        0.11.1
 Release:        0
 Summary:        A Kubernetes cluster resource sanitizer
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.FemjI8/_old  2023-02-21 15:36:57.564603323 +0100
+++ /var/tmp/diff_new_pack.FemjI8/_new  2023-02-21 15:36:57.572603369 +0100
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/derailed/popeye</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.11.0</param>
+    <param name="revision">v0.11.1</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>
@@ -16,7 +16,7 @@
     <param name="compression">gz</param>
   </service>
   <service name="go_modules" mode="disabled">
-    <param name="archive">popeye-0.11.0.tar.gz</param>
+    <param name="archive">popeye-0.11.1.tar.gz</param>
   </service>
 </services>
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.FemjI8/_old  2023-02-21 15:36:57.596603506 +0100
+++ /var/tmp/diff_new_pack.FemjI8/_new  2023-02-21 15:36:57.600603530 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param name="url">https://github.com/derailed/popeye</param>
-              <param 
name="changesrevision">c68b6391107214440852adfd213a04110730ee55</param></service></servicedata>
+              <param 
name="changesrevision">22d0830c2c2000f46137b703276786c66ac90908</param></service></servicedata>
 (No newline at EOF)
 

++++++ popeye-0.11.0.tar.gz -> popeye-0.11.1.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/Makefile new/popeye-0.11.1/Makefile
--- old/popeye-0.11.0/Makefile  2023-02-13 01:17:43.000000000 +0100
+++ new/popeye-0.11.1/Makefile  2023-02-20 17:52:03.000000000 +0100
@@ -1,6 +1,6 @@
 NAME     := popeye
 PACKAGE  := github.com/derailed/$(NAME)
-VERSION  := v0.11.0
+VERSION  := v0.11.1
 GIT      := $(shell git rev-parse --short HEAD)
 DATE     := $(shell date +%FT%T%Z)
 IMG_NAME := derailed/popeye
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/change_logs/release_v0.11.0.md 
new/popeye-0.11.1/change_logs/release_v0.11.0.md
--- old/popeye-0.11.0/change_logs/release_v0.11.0.md    2023-02-13 
01:17:43.000000000 +0100
+++ new/popeye-0.11.1/change_logs/release_v0.11.0.md    2023-02-20 
17:52:03.000000000 +0100
@@ -18,16 +18,16 @@
 
 ## Contributed PRs
 
-Please give `Big Thanks!` and `ATTA Girls/Boys!` to all the fine contributors 
for making K9s better for all of us!!
+Please give `Big Thanks!` and `ATTA Girls/Boys!` to all the fine contributors 
for making Popeye better for all of us!!
 
-* [PR #243](https://github.com/derailed/k9s/pull/243) Invalid value for 
--force-exit-zero
-* [PR #241](https://github.com/derailed/k9s/pull/241) Add a non-root user in 
docker image
-* [PR #240](https://github.com/derailed/k9s/pull/240) Optimize README documents
-* [PR #238](https://github.com/derailed/k9s/pull/238) Add arm64 Darwin 
releases to krew-index
-* [PR #233](https://github.com/derailed/k9s/pull/233) Add go install option to 
readme
-* [PR #226](https://github.com/derailed/k9s/pull/226) Fixing CVE issue for 
client_golang 1.11.0 to 1.12.2
-* [PR #224](https://github.com/derailed/k9s/pull/224) Add check for pods that 
are managed by multiple pdbs
-* [PR #222](https://github.com/derailed/k9s/pull/222) Fix RBAC rules in 
README.md
+* [PR #243](https://github.com/derailed/popeye/pull/243) Invalid value for 
--force-exit-zero
+* [PR #241](https://github.com/derailed/popeye/pull/241) Add a non-root user 
in docker image
+* [PR #240](https://github.com/derailed/popeye/pull/240) Optimize README 
documents
+* [PR #238](https://github.com/derailed/popeye/pull/238) Add arm64 Darwin 
releases to krew-index
+* [PR #233](https://github.com/derailed/popeye/pull/233) Add go install option 
to readme
+* [PR #226](https://github.com/derailed/popeye/pull/226) Fixing CVE issue for 
client_golang 1.11.0 to 1.12.2
+* [PR #224](https://github.com/derailed/popeye/pull/224) Add check for pods 
that are managed by multiple pdbs
+* [PR #222](https://github.com/derailed/popeye/pull/222) Fix RBAC rules in 
README.md
 
 ---
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/change_logs/release_v0.11.1.md 
new/popeye-0.11.1/change_logs/release_v0.11.1.md
--- old/popeye-0.11.0/change_logs/release_v0.11.1.md    1970-01-01 
01:00:00.000000000 +0100
+++ new/popeye-0.11.1/change_logs/release_v0.11.1.md    2023-02-20 
17:52:03.000000000 +0100
@@ -0,0 +1,33 @@
+<img 
src="https://raw.githubusercontent.com/derailed/popeye/master/assets/popeye_logo.png";
 align="right" width="200" height="auto"/>
+
+# Release v0.11.1
+
+## Notes
+
+Thank you to all that contributed with flushing out issues and enhancements 
for Popeye! I'll try to mark some of these issues as fixed. But if you don't 
mind grab the latest rev and see if we're happier with some of the fixes! If 
you've filed an issue please help me verify and close. Your support, kindness 
and awesome suggestions to make Popeye better is as ever very much noticed and 
appreciated!
+
+This project offers a GitHub Sponsor button (over here 👆). As you well know 
this is not pimped out by big corps with deep pockets. If you feel `Popeye` is 
saving you cycles diagnosing potential cluster issues please consider 
sponsoring this project!! It does go a long way in keeping our servers lights 
on and beers in our fridge.
+
+Also if you dig this tool, please make some noise on social! 
[@kitesurfer](https://twitter.com/kitesurfer)
+
+---
+
+## Maintenance Release!
+
+---
+
+## Resolved Issues
+
+* [Issue #245](https://github.com/derailed/popeye/issues/245) Checking 
Kubernetes clusters fails because v1/PodSecurityPolicy is checked
+
+---
+
+## Contributed Issues
+
+Please give `Big Thanks!` and `ATTA Girls/Boys!` to all the fine contributors 
for making Popeye better for all of us!!
+
+* [PR #247](https://github.com/derailed/popeye/pull/247) Fix deprecated 
cronjob api
+
+---
+
+<img 
src="https://raw.githubusercontent.com/derailed/popeye/master/assets/imhotep_logo.png";
 width="32" height="auto"/>&nbsp; © 2023 Imhotep Software LLC. All materials 
licensed under [Apache v2.0](http://www.apache.org/licenses/LICENSE-2.0)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/cmd/root.go 
new/popeye-0.11.1/cmd/root.go
--- old/popeye-0.11.0/cmd/root.go       2023-02-13 01:17:43.000000000 +0100
+++ new/popeye-0.11.1/cmd/root.go       2023-02-20 17:52:03.000000000 +0100
@@ -64,8 +64,7 @@
        }()
 
        clearScreen()
-       err := checkFlags()
-       if err != nil {
+       if err := checkFlags(); err != nil {
                bomb(fmt.Sprintf("%v", err))
        }
        flags.StandAlone = true
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/internal/cache/pdb.go 
new/popeye-0.11.1/internal/cache/pdb.go
--- old/popeye-0.11.0/internal/cache/pdb.go     2023-02-13 01:17:43.000000000 
+0100
+++ new/popeye-0.11.1/internal/cache/pdb.go     2023-02-20 17:52:03.000000000 
+0100
@@ -1,7 +1,7 @@
 package cache
 
 import (
-       polv1beta1 "k8s.io/api/policy/v1beta1"
+       policyv1 "k8s.io/api/policy/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 )
 
@@ -10,21 +10,21 @@
 
 // PodDisruptionBudget represents PodDisruptionBudget cache.
 type PodDisruptionBudget struct {
-       cms map[string]*polv1beta1.PodDisruptionBudget
+       cms map[string]*policyv1.PodDisruptionBudget
 }
 
 // NewPodDisruptionBudget returns a new PodDisruptionBudget cache.
-func NewPodDisruptionBudget(cms map[string]*polv1beta1.PodDisruptionBudget) 
*PodDisruptionBudget {
+func NewPodDisruptionBudget(cms map[string]*policyv1.PodDisruptionBudget) 
*PodDisruptionBudget {
        return &PodDisruptionBudget{cms: cms}
 }
 
 // ListPodDisruptionBudgets returns all available PodDisruptionBudgets on the 
cluster.
-func (c *PodDisruptionBudget) ListPodDisruptionBudgets() 
map[string]*polv1beta1.PodDisruptionBudget {
+func (c *PodDisruptionBudget) ListPodDisruptionBudgets() 
map[string]*policyv1.PodDisruptionBudget {
        return c.cms
 }
 
 // ForLabels returns a pdb whose selector match the given labels. Returns nil 
if no match.
-func (c *PodDisruptionBudget) ForLabels(labels map[string]string) 
*polv1beta1.PodDisruptionBudget {
+func (c *PodDisruptionBudget) ForLabels(labels map[string]string) 
*policyv1.PodDisruptionBudget {
        for _, pdb := range c.ListPodDisruptionBudgets() {
                m, err := metav1.LabelSelectorAsMap(pdb.Spec.Selector)
                if err != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/internal/dag/pdb.go 
new/popeye-0.11.1/internal/dag/pdb.go
--- old/popeye-0.11.0/internal/dag/pdb.go       2023-02-13 01:17:43.000000000 
+0100
+++ new/popeye-0.11.1/internal/dag/pdb.go       2023-02-20 17:52:03.000000000 
+0100
@@ -6,24 +6,24 @@
 
        "github.com/derailed/popeye/internal/client"
        "github.com/derailed/popeye/internal/dao"
-       polv1beta1 "k8s.io/api/policy/v1beta1"
+       policyv1 "k8s.io/api/policy/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
        "k8s.io/apimachinery/pkg/runtime"
 )
 
 // ListPodDisruptionBudgets list all included PodDisruptionBudgets.
-func ListPodDisruptionBudgets(ctx context.Context) 
(map[string]*polv1beta1.PodDisruptionBudget, error) {
+func ListPodDisruptionBudgets(ctx context.Context) 
(map[string]*policyv1.PodDisruptionBudget, error) {
        return listAllPodDisruptionBudgets(ctx)
 }
 
 // ListAllPodDisruptionBudgets fetch all PodDisruptionBudgets on the cluster.
-func listAllPodDisruptionBudgets(ctx context.Context) 
(map[string]*polv1beta1.PodDisruptionBudget, error) {
+func listAllPodDisruptionBudgets(ctx context.Context) 
(map[string]*policyv1.PodDisruptionBudget, error) {
        ll, err := fetchPodDisruptionBudgets(ctx)
        if err != nil {
                return nil, err
        }
-       pdbs := make(map[string]*polv1beta1.PodDisruptionBudget, len(ll.Items))
+       pdbs := make(map[string]*policyv1.PodDisruptionBudget, len(ll.Items))
        for i := range ll.Items {
                pdbs[metaFQN(ll.Items[i].ObjectMeta)] = &ll.Items[i]
        }
@@ -32,25 +32,25 @@
 }
 
 // fetchPodDisruptionBudgets retrieves all PodDisruptionBudgets on the cluster.
-func fetchPodDisruptionBudgets(ctx context.Context) 
(*polv1beta1.PodDisruptionBudgetList, error) {
+func fetchPodDisruptionBudgets(ctx context.Context) 
(*policyv1.PodDisruptionBudgetList, error) {
        f, cfg := mustExtractFactory(ctx), mustExtractConfig(ctx)
        if cfg.Flags.StandAlone {
                dial, err := f.Client().Dial()
                if err != nil {
                        return nil, err
                }
-               return 
dial.PolicyV1beta1().PodDisruptionBudgets(f.Client().ActiveNamespace()).List(ctx,
 metav1.ListOptions{})
+               return 
dial.PolicyV1().PodDisruptionBudgets(f.Client().ActiveNamespace()).List(ctx, 
metav1.ListOptions{})
        }
 
        var res dao.Resource
-       res.Init(f, client.NewGVR("policy/v1beta1/poddisruptionbudgets"))
+       res.Init(f, client.NewGVR("policy/v1/poddisruptionbudgets"))
        oo, err := res.List(ctx)
        if err != nil {
                return nil, err
        }
-       var ll polv1beta1.PodDisruptionBudgetList
+       var ll policyv1.PodDisruptionBudgetList
        for _, o := range oo {
-               var pdb polv1beta1.PodDisruptionBudget
+               var pdb policyv1.PodDisruptionBudget
                err = 
runtime.DefaultUnstructuredConverter.FromUnstructured(o.(*unstructured.Unstructured).Object,
 &pdb)
                if err != nil {
                        return nil, errors.New("expecting pdb resource")
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/internal/sanitize/pdb.go 
new/popeye-0.11.1/internal/sanitize/pdb.go
--- old/popeye-0.11.0/internal/sanitize/pdb.go  2023-02-13 01:17:43.000000000 
+0100
+++ new/popeye-0.11.1/internal/sanitize/pdb.go  2023-02-20 17:52:03.000000000 
+0100
@@ -6,7 +6,7 @@
        "github.com/derailed/popeye/internal"
        "github.com/derailed/popeye/internal/issues"
        "github.com/rs/zerolog/log"
-       polv1beta1 "k8s.io/api/policy/v1beta1"
+       policyv1 "k8s.io/api/policy/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 )
 
@@ -20,7 +20,7 @@
        // PodDisruptionBudgetLister list available PodDisruptionBudgets on a 
cluster.
        PodDisruptionBudgetLister interface {
                PodLister
-               ListPodDisruptionBudgets() 
map[string]*polv1beta1.PodDisruptionBudget
+               ListPodDisruptionBudgets() 
map[string]*policyv1.PodDisruptionBudget
        }
 )
 
@@ -49,7 +49,7 @@
        return nil
 }
 
-func (p *PodDisruptionBudget) checkDeprecation(ctx context.Context, pdb 
*polv1beta1.PodDisruptionBudget) {
+func (p *PodDisruptionBudget) checkDeprecation(ctx context.Context, pdb 
*policyv1.PodDisruptionBudget) {
        const current = "policy/v1"
 
        fqn := internal.MustExtractFQN(ctx)
@@ -65,7 +65,7 @@
        }
 }
 
-func (p *PodDisruptionBudget) checkInUse(ctx context.Context, pdb 
*polv1beta1.PodDisruptionBudget) {
+func (p *PodDisruptionBudget) checkInUse(ctx context.Context, pdb 
*policyv1.PodDisruptionBudget) {
        m, err := metav1.LabelSelectorAsMap(pdb.Spec.Selector)
        if err != nil {
                log.Error().Err(err).Msg("No selectors found")
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/internal/sanitize/pdb_test.go 
new/popeye-0.11.1/internal/sanitize/pdb_test.go
--- old/popeye-0.11.0/internal/sanitize/pdb_test.go     2023-02-13 
01:17:43.000000000 +0100
+++ new/popeye-0.11.1/internal/sanitize/pdb_test.go     2023-02-20 
17:52:03.000000000 +0100
@@ -7,7 +7,7 @@
        "github.com/derailed/popeye/internal/issues"
        "github.com/stretchr/testify/assert"
        v1 "k8s.io/api/core/v1"
-       polv1beta1 "k8s.io/api/policy/v1beta1"
+       policyv1 "k8s.io/api/policy/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        "k8s.io/apimachinery/pkg/util/intstr"
 )
@@ -65,8 +65,8 @@
        }
 }
 
-func (r *pdb) ListPodDisruptionBudgets() 
map[string]*polv1beta1.PodDisruptionBudget {
-       return map[string]*polv1beta1.PodDisruptionBudget{
+func (r *pdb) ListPodDisruptionBudgets() 
map[string]*policyv1.PodDisruptionBudget {
+       return map[string]*policyv1.PodDisruptionBudget{
                cache.FQN("default", r.name): makePDB(r.name),
        }
 }
@@ -84,14 +84,14 @@
        return makePod("p1")
 }
 
-func makePDB(n string) *polv1beta1.PodDisruptionBudget {
+func makePDB(n string) *policyv1.PodDisruptionBudget {
        min, max := intstr.FromInt(1), intstr.FromInt(1)
-       return &polv1beta1.PodDisruptionBudget{
+       return &policyv1.PodDisruptionBudget{
                ObjectMeta: metav1.ObjectMeta{
                        Name:      n,
                        Namespace: "default",
                },
-               Spec: polv1beta1.PodDisruptionBudgetSpec{
+               Spec: policyv1.PodDisruptionBudgetSpec{
                        Selector:       &metav1.LabelSelector{},
                        MinAvailable:   &min,
                        MaxUnavailable: &max,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/internal/sanitize/pod.go 
new/popeye-0.11.1/internal/sanitize/pod.go
--- old/popeye-0.11.0/internal/sanitize/pod.go  2023-02-13 01:17:43.000000000 
+0100
+++ new/popeye-0.11.1/internal/sanitize/pod.go  2023-02-20 17:52:03.000000000 
+0100
@@ -13,7 +13,7 @@
        "github.com/derailed/popeye/internal/client"
        "github.com/derailed/popeye/internal/issues"
        v1 "k8s.io/api/core/v1"
-       polv1beta1 "k8s.io/api/policy/v1beta1"
+       policyv1 "k8s.io/api/policy/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        mv1beta1 "k8s.io/metrics/pkg/apis/metrics/v1beta1"
 )
@@ -39,8 +39,8 @@
 
        // PdbLister list pdb matching a given selector
        PdbLister interface {
-               ListPodDisruptionBudgets() 
map[string]*polv1beta1.PodDisruptionBudget
-               ForLabels(labels map[string]string) 
*polv1beta1.PodDisruptionBudget
+               ListPodDisruptionBudgets() 
map[string]*policyv1.PodDisruptionBudget
+               ForLabels(labels map[string]string) 
*policyv1.PodDisruptionBudget
        }
 
        // PodLister lists available pods.
@@ -293,7 +293,7 @@
        return false
 }
 
-func (p *Pod) checkForMultiplePdbMatches(ctx context.Context, podNamespace 
string, podLabels map[string]string, pdbs 
map[string]*polv1beta1.PodDisruptionBudget) {
+func (p *Pod) checkForMultiplePdbMatches(ctx context.Context, podNamespace 
string, podLabels map[string]string, pdbs 
map[string]*policyv1.PodDisruptionBudget) {
        var matchedPdbs []string
        for _, pdb := range pdbs {
                if podNamespace != pdb.Namespace {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/internal/sanitize/pod_test.go 
new/popeye-0.11.1/internal/sanitize/pod_test.go
--- old/popeye-0.11.0/internal/sanitize/pod_test.go     2023-02-13 
01:17:43.000000000 +0100
+++ new/popeye-0.11.1/internal/sanitize/pod_test.go     2023-02-20 
17:52:03.000000000 +0100
@@ -9,7 +9,7 @@
        "github.com/derailed/popeye/pkg/config"
        "github.com/stretchr/testify/assert"
        v1 "k8s.io/api/core/v1"
-       polv1beta1 "k8s.io/api/policy/v1beta1"
+       policyv1 "k8s.io/api/policy/v1"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
        v1beta1 "k8s.io/metrics/pkg/apis/metrics/v1beta1"
 )
@@ -232,11 +232,11 @@
        }
 }
 
-func (p *pod) ForLabels(l map[string]string) *polv1beta1.PodDisruptionBudget {
-       return &polv1beta1.PodDisruptionBudget{}
+func (p *pod) ForLabels(l map[string]string) *policyv1.PodDisruptionBudget {
+       return &policyv1.PodDisruptionBudget{}
 }
 
-func (p *pod) ListPodDisruptionBudgets() 
map[string]*polv1beta1.PodDisruptionBudget {
+func (p *pod) ListPodDisruptionBudgets() 
map[string]*policyv1.PodDisruptionBudget {
        return nil
 }
 
@@ -406,7 +406,7 @@
                ctx          context.Context
                podLabels    map[string]string
                podNamespace string
-               pdbs         map[string]*polv1beta1.PodDisruptionBudget
+               pdbs         map[string]*policyv1.PodDisruptionBudget
        }
        tests := []struct {
                name   string
@@ -419,9 +419,9 @@
                        args: args{
                                podNamespace: "namespace-1",
                                podLabels:    map[string]string{"app": "test"},
-                               pdbs: 
map[string]*polv1beta1.PodDisruptionBudget{
+                               pdbs: map[string]*policyv1.PodDisruptionBudget{
                                        "pdb": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app": "test"},
                                                        },
@@ -432,7 +432,7 @@
                                                },
                                        },
                                        "pdb2": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app": "test"},
                                                        },
@@ -457,9 +457,9 @@
                        args: args{
                                podNamespace: "namespace-1",
                                podLabels:    map[string]string{"app": "test"},
-                               pdbs: 
map[string]*polv1beta1.PodDisruptionBudget{
+                               pdbs: map[string]*policyv1.PodDisruptionBudget{
                                        "pdb": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app": "test"},
                                                        },
@@ -470,7 +470,7 @@
                                                },
                                        },
                                        "pdb2": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app": "test"},
                                                        },
@@ -481,7 +481,7 @@
                                                },
                                        },
                                        "pdb3": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app": "test"},
                                                        },
@@ -506,9 +506,9 @@
                        args: args{
                                podNamespace: "namespace-1",
                                podLabels:    map[string]string{"app": "test", 
"app2": "test2"},
-                               pdbs: 
map[string]*polv1beta1.PodDisruptionBudget{
+                               pdbs: map[string]*policyv1.PodDisruptionBudget{
                                        "pdb": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app": "test", "app2": "test2"},
                                                        },
@@ -519,7 +519,7 @@
                                                },
                                        },
                                        "pdb2": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app3": "test3"},
                                                        },
@@ -537,9 +537,9 @@
                        name: "pod with no label - no issue expected",
                        args: args{
                                podLabels: map[string]string{},
-                               pdbs: 
map[string]*polv1beta1.PodDisruptionBudget{
+                               pdbs: map[string]*policyv1.PodDisruptionBudget{
                                        "pdb": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app": "test"},
                                                        },
@@ -548,7 +548,7 @@
                                                        Name: "pdb-1"},
                                        },
                                        "pdb2": {
-                                               Spec: 
polv1beta1.PodDisruptionBudgetSpec{
+                                               Spec: 
policyv1.PodDisruptionBudgetSpec{
                                                        Selector: 
&metav1.LabelSelector{
                                                                MatchLabels: 
map[string]string{"app": "test"},
                                                        },
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/k8s/popeye/cronjob.yml 
new/popeye-0.11.1/k8s/popeye/cronjob.yml
--- old/popeye-0.11.0/k8s/popeye/cronjob.yml    2023-02-13 01:17:43.000000000 
+0100
+++ new/popeye-0.11.1/k8s/popeye/cronjob.yml    2023-02-20 17:52:03.000000000 
+0100
@@ -1,6 +1,6 @@
 # Sample Popeye CronJob. Runs Popeye as a cron every hours
 ---
-apiVersion: batch/v1beta1
+apiVersion: batch/v1
 kind: CronJob
 metadata:
   name: popeye
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/popeye-0.11.0/pkg/popeye.go 
new/popeye-0.11.1/pkg/popeye.go
--- old/popeye-0.11.0/pkg/popeye.go     2023-02-13 01:17:43.000000000 +0100
+++ new/popeye-0.11.1/pkg/popeye.go     2023-02-20 17:52:03.000000000 +0100
@@ -134,7 +134,6 @@
                internal.RoGVR:  "rbac.authorization.k8s.io/v1/roles",
                internal.RobGVR: "rbac.authorization.k8s.io/v1/rolebindings",
                internal.IngGVR: "networking.k8s.io/v1/ingresses",
-               internal.PspGVR: "policy/v1/podsecuritypolicies",
                internal.PdbGVR: "policy/v1/poddisruptionbudgets",
                internal.HpaGVR: "autoscaling/v2/horizontalpodautoscalers",
        }
@@ -142,15 +141,15 @@
        if rev.Minor < 18 {
                mm[internal.IngGVR] = "networking.k8s.io/v1beta1/ingresses"
        }
-       if rev.Minor <= 21 {
-               mm[internal.PspGVR] = "policy/v1beta1/podsecuritypolicies"
-       }
        if rev.Minor < 21 {
                mm[internal.PdbGVR] = "policy/v1beta1/poddisruptionbudgets"
        }
        if rev.Minor < 23 {
                mm[internal.HpaGVR] = "autoscaling/v1/horizontalpodautoscalers"
        }
+       if rev.Minor < 25 {
+               mm[internal.PspGVR] = "policy/v1beta1/podsecuritypolicies"
+       }
 
        return mm
 }
@@ -227,11 +226,14 @@
                gvrs[internal.CrbGVR]: scrub.NewClusterRoleBinding,
                gvrs[internal.RoGVR]:  scrub.NewRole,
                gvrs[internal.RobGVR]: scrub.NewRoleBinding,
-               gvrs[internal.PspGVR]: scrub.NewPodSecurityPolicy,
                gvrs[internal.PdbGVR]: scrub.NewPodDisruptionBudget,
                gvrs[internal.HpaGVR]: scrub.NewHorizontalPodAutoscaler,
        }
 
+       if rev.Minor < 25 {
+               mm[gvrs[internal.PspGVR]] = scrub.NewPodSecurityPolicy
+       }
+
        return mm
 }
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/popeye/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.popeye.new.22824/vendor.tar.gz differ: char 5, line 
1

Reply via email to