Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package kubeseal for openSUSE:Factory checked in at 2023-10-19 22:49:09 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/kubeseal (Old) and /work/SRC/openSUSE:Factory/.kubeseal.new.1945 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "kubeseal" Thu Oct 19 22:49:09 2023 rev:24 rq:1118767 version:0.24.2 Changes: -------- --- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes 2023-10-05 20:06:38.154262325 +0200 +++ /work/SRC/openSUSE:Factory/.kubeseal.new.1945/kubeseal.changes 2023-10-19 22:51:40.315903704 +0200 @@ -1,0 +2,12 @@ +Thu Oct 19 05:49:47 UTC 2023 - ka...@b1-systems.de + +- Update to version 0.24.2: + * Prepare Release Notes for 0.24.2 (#1345) + * Fix issue where sealed secrets status is not updated if sealed + secret⦠(#1295) + * Bump golang.org/x/net from 0.14.0 to 0.17.0 (#1344) + * Bump golang.org/x/crypto from 0.13.0 to 0.14.0 (#1341) + * Bump github.com/onsi/ginkgo/v2 from 2.12.1 to 2.13.0 (#1342) + * Updated command for restoring from backups (#1334) + +------------------------------------------------------------------- Old: ---- sealed-secrets-0.24.0.obscpio sealed-secrets-0.24.1.obscpio New: ---- sealed-secrets-0.24.2.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ kubeseal.spec ++++++ --- /var/tmp/diff_new_pack.njPFr0/_old 2023-10-19 22:51:41.031929674 +0200 +++ /var/tmp/diff_new_pack.njPFr0/_new 2023-10-19 22:51:41.035929819 +0200 @@ -21,7 +21,7 @@ %define archive_name sealed-secrets Name: kubeseal -Version: 0.24.1 +Version: 0.24.2 Release: 0 Summary: CLI for encrypting secrets to SealedSecrets License: Apache-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.njPFr0/_old 2023-10-19 22:51:41.063930834 +0200 +++ /var/tmp/diff_new_pack.njPFr0/_new 2023-10-19 22:51:41.067930979 +0200 @@ -3,7 +3,7 @@ <param name="url">https://github.com/bitnami-labs/sealed-secrets</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v0.24.1</param> + <param name="revision">v0.24.2</param> <param name="versionformat">@PARENT_TAG@</param> <param name="changesgenerate">enable</param> <param name="versionrewrite-pattern">v(.*)</param> @@ -17,7 +17,7 @@ <param name="compression">gz</param> </service> <service name="go_modules" mode="manual"> - <param name="archive">sealed-secrets-0.24.1.obscpio</param> + <param name="archive">sealed-secrets-0.24.2.obscpio</param> </service> </services> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.njPFr0/_old 2023-10-19 22:51:41.079931415 +0200 +++ /var/tmp/diff_new_pack.njPFr0/_new 2023-10-19 22:51:41.091931850 +0200 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/bitnami-labs/sealed-secrets</param> - <param name="changesrevision">3c52ecf1f862ccfe4839dbb018ecd830a200d467</param></service></servicedata> + <param name="changesrevision">9634c0c89e40eb19405add4cd5d2256f316c32cb</param></service></servicedata> (No newline at EOF) ++++++ sealed-secrets-0.24.0.obscpio -> sealed-secrets-0.24.2.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/README.md new/sealed-secrets-0.24.2/README.md --- old/sealed-secrets-0.24.0/README.md 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/README.md 2023-10-16 11:06:30.000000000 +0200 @@ -741,10 +741,17 @@ To restore from a backup after some disaster, just put that secrets back before starting the controller - or if the controller was already started, replace the newly-created secrets and restart the controller: -```bash -kubectl apply -f main.key -kubectl delete pod -n kube-system -l name=sealed-secrets-controller -``` +* For Helm deployment: + ```bash + kubectl apply -f main.key + kubectl delete pod -n kube-system -l app.kubernetes.io/name=sealed-secrets + ``` + +* For deployment via `controller.yaml` manifest + ```bash + kubectl apply -f main.key + kubectl delete pod -n kube-system -l name=sealed-secrets-controller + ``` ### Can I decrypt my secrets offline with a backup key? diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/RELEASE-NOTES.md new/sealed-secrets-0.24.2/RELEASE-NOTES.md --- old/sealed-secrets-0.24.0/RELEASE-NOTES.md 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/RELEASE-NOTES.md 2023-10-16 11:06:30.000000000 +0200 @@ -4,6 +4,21 @@ [](https://github.com/bitnami-labs/sealed-secrets/releases/latest) +## v0.24.2 + +### Changelog + +- Fix issue where sealed secrets status is not updated if sealed secret⦠([#1295](https://github.com/bitnami-labs/sealed-secrets/pull/1295)) +- Bump golang.org/x/crypto from 0.13.0 to 0.14.0([#1341](https://github.com/bitnami-labs/sealed-secrets/pull/1341)) +- Bump github.com/onsi/ginkgo/v2 from 2.12.1 to 2.13.0 ([#1342](https://github.com/bitnami-labs/sealed-secrets/pull/1342)) +- Bump golang.org/x/net from 0.14.0 to 0.17.0 ([#1344](https://github.com/bitnami-labs/sealed-secrets/pull/1344)) + +## v0.24.1 + +### Changelog + +- fix: remove trailing dashes for multidoc yaml ([#1335](https://github.com/bitnami-labs/sealed-secrets/pull/1335)) + ## v0.24.0 ### Changelog diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/carvel/package.yaml new/sealed-secrets-0.24.2/carvel/package.yaml --- old/sealed-secrets-0.24.0/carvel/package.yaml 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/carvel/package.yaml 2023-10-16 11:06:30.000000000 +0200 @@ -1,10 +1,10 @@ apiVersion: data.packaging.carvel.dev/v1alpha1 kind: Package metadata: - name: "sealedsecrets.bitnami.com.2.12.0" + name: "sealedsecrets.bitnami.com.2.13.0" spec: refName: "sealedsecrets.bitnami.com" - version: "2.12.0" + version: "2.13.0" valuesSchema: openAPIv3: title: Chart Values @@ -45,7 +45,7 @@ tag: type: string description: Sealed Secrets image tag (immutable tags are recommended) - default: v0.23.1 + default: v0.24.0 pullPolicy: type: string description: Sealed Secrets image pull policy @@ -424,7 +424,7 @@ spec: fetch: - imgpkgBundle: - image: ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-24b95a0df834fb46af38f5d4511d6fce0526ee4c12f03a039fc3bc02bafc3694.imgpkg + image: ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-7507de99c9a29aed8351e357e77461041021085a2f70b270aa33e90945e979b4.imgpkg template: - helmTemplate: path: sealed-secrets diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/go.mod new/sealed-secrets-0.24.2/go.mod --- old/sealed-secrets-0.24.0/go.mod 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/go.mod 2023-10-16 11:06:30.000000000 +0200 @@ -7,19 +7,20 @@ github.com/google/renameio v0.1.0 github.com/mattn/go-isatty v0.0.19 github.com/mkmik/multierror v0.3.0 - github.com/onsi/ginkgo/v2 v2.12.0 - github.com/onsi/gomega v1.27.10 - github.com/prometheus/client_golang v1.16.0 + github.com/onsi/ginkgo/v2 v2.13.0 + github.com/onsi/gomega v1.28.0 + github.com/prometheus/client_golang v1.17.0 github.com/spf13/pflag v1.0.5 github.com/throttled/throttled v2.2.5+incompatible - golang.org/x/crypto v0.13.0 + golang.org/x/crypto v0.14.0 gopkg.in/yaml.v2 v2.4.0 - k8s.io/api v0.28.1 - k8s.io/apimachinery v0.28.1 - k8s.io/client-go v0.28.1 - k8s.io/code-generator v0.28.1 + k8s.io/api v0.28.2 + k8s.io/apimachinery v0.28.2 + k8s.io/client-go v0.28.2 + k8s.io/code-generator v0.28.2 k8s.io/klog v1.0.0 k8s.io/klog/v2 v2.100.1 + k8s.io/utils v0.0.0-20230406110748-d93618cff8a2 ) require ( @@ -51,24 +52,23 @@ github.com/modern-go/reflect2 v1.0.2 // indirect github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect github.com/pkg/errors v0.9.1 // indirect - github.com/prometheus/client_model v0.3.0 // indirect - github.com/prometheus/common v0.42.0 // indirect - github.com/prometheus/procfs v0.10.1 // indirect + github.com/prometheus/client_model v0.4.1-0.20230718164431-9a2bf3000d16 // indirect + github.com/prometheus/common v0.44.0 // indirect + github.com/prometheus/procfs v0.11.1 // indirect golang.org/x/mod v0.12.0 // indirect - golang.org/x/net v0.14.0 // indirect + golang.org/x/net v0.17.0 // indirect golang.org/x/oauth2 v0.8.0 // indirect - golang.org/x/sys v0.12.0 // indirect - golang.org/x/term v0.12.0 // indirect + golang.org/x/sys v0.13.0 // indirect + golang.org/x/term v0.13.0 // indirect golang.org/x/text v0.13.0 // indirect golang.org/x/time v0.3.0 // indirect golang.org/x/tools v0.12.0 // indirect google.golang.org/appengine v1.6.7 // indirect - google.golang.org/protobuf v1.30.0 // indirect + google.golang.org/protobuf v1.31.0 // indirect gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect k8s.io/gengo v0.0.0-20220902162205-c0856e24416d // indirect k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 // indirect - k8s.io/utils v0.0.0-20230406110748-d93618cff8a2 // indirect sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect sigs.k8s.io/structured-merge-diff/v4 v4.2.3 // indirect sigs.k8s.io/yaml v1.3.0 // indirect diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/go.sum new/sealed-secrets-0.24.2/go.sum --- old/sealed-secrets-0.24.0/go.sum 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/go.sum 2023-10-16 11:06:30.000000000 +0200 @@ -32,7 +32,6 @@ github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/protobuf v1.2.0/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= github.com/golang/protobuf v1.3.1/go.mod h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U= -github.com/golang/protobuf v1.3.5/go.mod h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk= github.com/golang/protobuf v1.5.0/go.mod h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk= github.com/golang/protobuf v1.5.3 h1:KhyjKVUg7Usr/dYsdSqoFveMYd5ko72D+zANwlG1mmg= github.com/golang/protobuf v1.5.3/go.mod h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY= @@ -87,22 +86,22 @@ github.com/modern-go/reflect2 v1.0.2/go.mod h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk= github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA= github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ= -github.com/onsi/ginkgo/v2 v2.12.0 h1:UIVDowFPwpg6yMUpPjGkYvf06K3RAiJXUhCxEwQVHRI= -github.com/onsi/ginkgo/v2 v2.12.0/go.mod h1:ZNEzXISYlqpb8S36iN71ifqLi3vVD1rVJGvWRCJOUpQ= -github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI= -github.com/onsi/gomega v1.27.10/go.mod h1:RsS8tutOdbdgzbPtzzATp12yT7kM5I5aElG3evPbQ0M= +github.com/onsi/ginkgo/v2 v2.13.0 h1:0jY9lJquiL8fcf3M4LAXN5aMlS/b2BV86HFFPCPMgE4= +github.com/onsi/ginkgo/v2 v2.13.0/go.mod h1:TE309ZR8s5FsKKpuB1YAQYBzCaAfUgatB/xlT/ETL/o= +github.com/onsi/gomega v1.28.0 h1:i2rg/p9n/UqIDAMFUJ6qIUUMcsqOuUHgbpbu235Vr1c= +github.com/onsi/gomega v1.28.0/go.mod h1:A1H2JE76sI14WIP57LMKj7FVfCHx3g3BcZVjJG8bjX8= github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= -github.com/prometheus/client_golang v1.16.0 h1:yk/hx9hDbrGHovbci4BY+pRMfSuuat626eFsHb7tmT8= -github.com/prometheus/client_golang v1.16.0/go.mod h1:Zsulrv/L9oM40tJ7T815tM89lFEugiJ9HzIqaAx4LKc= -github.com/prometheus/client_model v0.3.0 h1:UBgGFHqYdG/TPFD1B1ogZywDqEkwp3fBMvqdiQ7Xew4= -github.com/prometheus/client_model v0.3.0/go.mod h1:LDGWKZIo7rky3hgvBe+caln+Dr3dPggB5dvjtD7w9+w= -github.com/prometheus/common v0.42.0 h1:EKsfXEYo4JpWMHH5cg+KOUWeuJSov1Id8zGR8eeI1YM= -github.com/prometheus/common v0.42.0/go.mod h1:xBwqVerjNdUDjgODMpudtOMwlOwf2SaTr1yjz4b7Zbc= -github.com/prometheus/procfs v0.10.1 h1:kYK1Va/YMlutzCGazswoHKo//tZVlFpKYh+PymziUAg= -github.com/prometheus/procfs v0.10.1/go.mod h1:nwNm2aOCAYw8uTR/9bWRREkZFxAUcWzPHWJq+XBB/FM= +github.com/prometheus/client_golang v1.17.0 h1:rl2sfwZMtSthVU752MqfjQozy7blglC+1SOtjMAMh+Q= +github.com/prometheus/client_golang v1.17.0/go.mod h1:VeL+gMmOAxkS2IqfCq0ZmHSL+LjWfWDUmp1mBz9JgUY= +github.com/prometheus/client_model v0.4.1-0.20230718164431-9a2bf3000d16 h1:v7DLqVdK4VrYkVD5diGdl4sxJurKJEMnODWRJlxV9oM= +github.com/prometheus/client_model v0.4.1-0.20230718164431-9a2bf3000d16/go.mod h1:oMQmHW1/JoDwqLtg57MGgP/Fb1CJEYF2imWWhWtMkYU= +github.com/prometheus/common v0.44.0 h1:+5BrQJwiBB9xsMygAB3TNvpQKOwlkc25LbISbrdOOfY= +github.com/prometheus/common v0.44.0/go.mod h1:ofAIvZbQ1e/nugmZGz4/qCb9Ap1VoSTIO7x0VV9VvuY= +github.com/prometheus/procfs v0.11.1 h1:xRC8Iq1yyca5ypa9n1EZnWZkt7dwcoRPQwX/5gwaUuI= +github.com/prometheus/procfs v0.11.1/go.mod h1:eesXgaPo1q7lBpVMoMy0ZOFTth9hBn4W/y0/p/ScXhY= github.com/rogpeppe/go-internal v1.10.0 h1:TMyTOH3F/DB16zRVcYyreMH6GnZZrwQVAoYjRBZyWFQ= github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA= github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg= @@ -122,8 +121,8 @@ golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w= golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI= golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= -golang.org/x/crypto v0.13.0 h1:mvySKfSWJ+UKUii46M40LOvyWfN0s2U+46/jDd0e6Ck= -golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc= +golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc= +golang.org/x/crypto v0.14.0/go.mod h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4= golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.12.0 h1:rmsUpXtvNzj340zd98LZ4KntptpfRHwpFOHG188oHXc= @@ -133,8 +132,8 @@ golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s= golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU= -golang.org/x/net v0.14.0 h1:BONx9s002vGdD9umnlX1Po8vOZmrgH34qlHcD1MfK14= -golang.org/x/net v0.14.0/go.mod h1:PpSgVXXLK0OxS0F31C1/tv6XNguvCrnXIDrFMspZIUI= +golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM= +golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE= golang.org/x/oauth2 v0.8.0 h1:6dkIjl3j3LtZ/O3sTgZTMsLKSftL/B8Zgq4huOIIUu8= golang.org/x/oauth2 v0.8.0/go.mod h1:yr7u4HXZRm1R1kBWqr/xKNqewf0plRYoB7sla+BCIXE= golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= @@ -146,10 +145,10 @@ golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/sys v0.12.0 h1:CM0HF96J0hcLAwsHPJZjfdNzs0gftsLfgKt57wWHJ0o= -golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= -golang.org/x/term v0.12.0 h1:/ZfYdc3zq+q02Rv9vGqTeSItdzZTSNDmfTi0mBAuidU= -golang.org/x/term v0.12.0/go.mod h1:owVbMEjm3cBLCHdkQu9b1opXd4ETQWc3BhuQGKgXgvU= +golang.org/x/sys v0.13.0 h1:Af8nKPmuFypiUBjVoU9V20FiaFXOcuZI21p0ycVYYGE= +golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/term v0.13.0 h1:bb+I9cTfFazGW51MZqBVmZy7+JEJMouUHTUSKVQLBek= +golang.org/x/term v0.13.0/go.mod h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U= golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ= golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk= golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ= @@ -172,8 +171,8 @@ google.golang.org/appengine v1.6.7/go.mod h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc= google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw= google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc= -google.golang.org/protobuf v1.30.0 h1:kPPoIgf3TsEvrm0PFe15JQ+570QVxYzEvvHqChK+cng= -google.golang.org/protobuf v1.30.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I= +google.golang.org/protobuf v1.31.0 h1:g0LDEJHgrBl9N9r17Ru3sqWhkIx2NB67okBHPwC7hs8= +google.golang.org/protobuf v1.31.0/go.mod h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk= @@ -186,14 +185,14 @@ gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA= gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= -k8s.io/api v0.28.1 h1:i+0O8k2NPBCPYaMB+uCkseEbawEt/eFaiRqUx8aB108= -k8s.io/api v0.28.1/go.mod h1:uBYwID+66wiL28Kn2tBjBYQdEU0Xk0z5qF8bIBqk/Dg= -k8s.io/apimachinery v0.28.1 h1:EJD40og3GizBSV3mkIoXQBsws32okPOy+MkRyzh6nPY= -k8s.io/apimachinery v0.28.1/go.mod h1:X0xh/chESs2hP9koe+SdIAcXWcQ+RM5hy0ZynB+yEvw= -k8s.io/client-go v0.28.1 h1:pRhMzB8HyLfVwpngWKE8hDcXRqifh1ga2Z/PU9SXVK8= -k8s.io/client-go v0.28.1/go.mod h1:pEZA3FqOsVkCc07pFVzK076R+P/eXqsgx5zuuRWukNE= -k8s.io/code-generator v0.28.1 h1:o0WFcqtv80GEf1iaOAzLIlrKyny9HBd2jaspJfWb5sI= -k8s.io/code-generator v0.28.1/go.mod h1:ueeSJZJ61NHBa0ccWLey6mwawum25vX61nRZ6WOzN9A= +k8s.io/api v0.28.2 h1:9mpl5mOb6vXZvqbQmankOfPIGiudghwCoLl1EYfUZbw= +k8s.io/api v0.28.2/go.mod h1:RVnJBsjU8tcMq7C3iaRSGMeaKt2TWEUXcpIt/90fjEg= +k8s.io/apimachinery v0.28.2 h1:KCOJLrc6gu+wV1BYgwik4AF4vXOlVJPdiqn0yAWWwXQ= +k8s.io/apimachinery v0.28.2/go.mod h1:RdzF87y/ngqk9H4z3EL2Rppv5jj95vGS/HaFXrLDApU= +k8s.io/client-go v0.28.2 h1:DNoYI1vGq0slMBN/SWKMZMw0Rq+0EQW6/AK4v9+3VeY= +k8s.io/client-go v0.28.2/go.mod h1:sMkApowspLuc7omj1FOSUxSoqjr+d5Q0Yc0LOFnYFJY= +k8s.io/code-generator v0.28.2 h1:u47guga1rCWLnEnffF09p+cqj8B20oHOLoQ1lb1HGtQ= +k8s.io/code-generator v0.28.2/go.mod h1:ueeSJZJ61NHBa0ccWLey6mwawum25vX61nRZ6WOzN9A= k8s.io/gengo v0.0.0-20220902162205-c0856e24416d h1:U9tB195lKdzwqicbJvyJeOXV7Klv+wNAWENRnXEGi08= k8s.io/gengo v0.0.0-20220902162205-c0856e24416d/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E= k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/helm/sealed-secrets/Chart.yaml new/sealed-secrets-0.24.2/helm/sealed-secrets/Chart.yaml --- old/sealed-secrets-0.24.0/helm/sealed-secrets/Chart.yaml 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/helm/sealed-secrets/Chart.yaml 2023-10-16 11:06:30.000000000 +0200 @@ -1,7 +1,7 @@ annotations: category: DeveloperTools apiVersion: v2 -appVersion: v0.23.1 +appVersion: v0.24.0 description: Helm chart for the sealed-secrets controller. home: https://github.com/bitnami-labs/sealed-secrets icon: https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png @@ -14,4 +14,4 @@ url: https://github.com/bitnami-labs/sealed-secrets name: sealed-secrets type: application -version: 2.12.0 +version: 2.13.0 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/helm/sealed-secrets/README.md new/sealed-secrets-0.24.2/helm/sealed-secrets/README.md --- old/sealed-secrets-0.24.0/helm/sealed-secrets/README.md 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/helm/sealed-secrets/README.md 2023-10-16 11:06:30.000000000 +0200 @@ -85,7 +85,7 @@ | ------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ----------------------------------- | | `image.registry` | Sealed Secrets image registry | `docker.io` | | `image.repository` | Sealed Secrets image repository | `bitnami/sealed-secrets-controller` | -| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `v0.23.1` | +| `image.tag` | Sealed Secrets image tag (immutable tags are recommended) | `v0.24.0` | | `image.pullPolicy` | Sealed Secrets image pull policy | `IfNotPresent` | | `image.pullSecrets` | Sealed Secrets image pull secrets | `[]` | | `revisionHistoryLimit` | Number of old history to retain to allow rollback (If not set, default Kubernetes value is set to 10) | `""` | diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/helm/sealed-secrets/values.yaml new/sealed-secrets-0.24.2/helm/sealed-secrets/values.yaml --- old/sealed-secrets-0.24.0/helm/sealed-secrets/values.yaml 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/helm/sealed-secrets/values.yaml 2023-10-16 11:06:30.000000000 +0200 @@ -34,7 +34,7 @@ image: registry: docker.io repository: bitnami/sealed-secrets-controller - tag: v0.23.1 + tag: v0.24.0 ## Specify a imagePullPolicy ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent' ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/pkg/controller/controller.go new/sealed-secrets-0.24.2/pkg/controller/controller.go --- old/sealed-secrets-0.24.0/pkg/controller/controller.go 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/pkg/controller/controller.go 2023-10-16 11:06:30.000000000 +0200 @@ -412,20 +412,18 @@ ssecret.Status = &ssv1alpha1.SealedSecretStatus{} } - // No need to update the status if we already have observed it from the - // current generation of the resource. - if ssecret.Status.ObservedGeneration == ssecret.ObjectMeta.Generation { - return nil - } - ssecret.Status.ObservedGeneration = ssecret.ObjectMeta.Generation - updateSealedSecretsStatusConditions(ssecret.Status, unsealError) + updatedRequired := updateSealedSecretsStatusConditions(ssecret.Status, unsealError) + if updatedRequired { + _, err := c.ssclient.SealedSecrets(ssecret.GetObjectMeta().GetNamespace()).UpdateStatus(context.Background(), ssecret, metav1.UpdateOptions{}) + return err + } - _, err := c.ssclient.SealedSecrets(ssecret.GetObjectMeta().GetNamespace()).UpdateStatus(context.Background(), ssecret, metav1.UpdateOptions{}) - return err + return nil } -func updateSealedSecretsStatusConditions(st *ssv1alpha1.SealedSecretStatus, unsealError error) { +func updateSealedSecretsStatusConditions(st *ssv1alpha1.SealedSecretStatus, unsealError error) bool { + var updateRequired bool cond := func() *ssv1alpha1.SealedSecretCondition { for i := range st.Conditions { if st.Conditions[i].Type == ssv1alpha1.SealedSecretSynced { @@ -446,11 +444,16 @@ status = corev1.ConditionFalse cond.Message = unsealError.Error() } - cond.LastUpdateTime = metav1.Now() + + // Status has changed, update the transition time and signal that an update is required if cond.Status != status { cond.LastTransitionTime = cond.LastUpdateTime cond.Status = status + cond.LastUpdateTime = metav1.Now() + updateRequired = true } + + return updateRequired } func isAnnotatedToBeManaged(secret *corev1.Secret) bool { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/pkg/controller/controller_test.go new/sealed-secrets-0.24.2/pkg/controller/controller_test.go --- old/sealed-secrets-0.24.0/pkg/controller/controller_test.go 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/pkg/controller/controller_test.go 2023-10-16 11:06:30.000000000 +0200 @@ -156,6 +156,53 @@ } } +func TestEmptyStatusSendsUpdate(t *testing.T) { + updateRequired := updateSealedSecretsStatusConditions(&ssv1alpha1.SealedSecretStatus{}, nil) + + if !updateRequired { + t.Fatalf("expected status update, but no update was send") + } +} + +func TestStatusUpdateSendsUpdate(t *testing.T) { + updateRequired := updateSealedSecretsStatusConditions(&ssv1alpha1.SealedSecretStatus{ + Conditions: []ssv1alpha1.SealedSecretCondition{{ + Status: "False", + Type: ssv1alpha1.SealedSecretSynced, + }}, + }, nil) + + if !updateRequired { + t.Fatalf("expected status update, but no update was send") + } +} + +func TestSameStatusNoUpdate(t *testing.T) { + updateRequired := updateSealedSecretsStatusConditions(&ssv1alpha1.SealedSecretStatus{ + Conditions: []ssv1alpha1.SealedSecretCondition{{ + Type: ssv1alpha1.SealedSecretSynced, + Status: "False", + }}, + }, errors.New("testerror")) + + if updateRequired { + t.Fatalf("expected no status update, but update was send") + } +} + +func TestSyncedSecretWithErrorSendsUpdate(t *testing.T) { + updateRequired := updateSealedSecretsStatusConditions(&ssv1alpha1.SealedSecretStatus{ + Conditions: []ssv1alpha1.SealedSecretCondition{{ + Type: ssv1alpha1.SealedSecretSynced, + Status: "True", + }}, + }, errors.New("testerror")) + + if !updateRequired { + t.Fatalf("expected status update, but no update was send") + } +} + func testKeyRegister(t *testing.T, ctx context.Context, clientset kubernetes.Interface, ns string) *KeyRegistry { t.Helper() diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/pkg/kubeseal/kubeseal.go new/sealed-secrets-0.24.2/pkg/kubeseal/kubeseal.go --- old/sealed-secrets-0.24.0/pkg/kubeseal/kubeseal.go 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/pkg/kubeseal/kubeseal.go 2023-10-16 11:06:30.000000000 +0200 @@ -389,6 +389,7 @@ contentType = runtime.ContentTypeJSON case "yaml": contentType = runtime.ContentTypeYAML + fmt.Fprint(out, "---\n") default: return fmt.Errorf("unsupported output format: %s", outputFormat) } @@ -402,11 +403,8 @@ } _, _ = out.Write(buf) - switch contentType { - case runtime.ContentTypeJSON: + if contentType == runtime.ContentTypeJSON { fmt.Fprint(out, "\n") - case runtime.ContentTypeYAML: - fmt.Fprint(out, "---\n") } return nil } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sealed-secrets-0.24.0/pkg/kubeseal/kubeseal_test.go new/sealed-secrets-0.24.2/pkg/kubeseal/kubeseal_test.go --- old/sealed-secrets-0.24.0/pkg/kubeseal/kubeseal_test.go 2023-09-15 11:42:16.000000000 +0200 +++ new/sealed-secrets-0.24.2/pkg/kubeseal/kubeseal_test.go 2023-10-16 11:06:30.000000000 +0200 @@ -220,7 +220,7 @@ t.Fatalf("Error writing to buffer: %v", err) } - t.Logf("input is: %s", inbuf.String()) + t.Logf("input is:\n%s", inbuf.String()) outbuf := bytes.Buffer{} if err := Seal(clientConfig, outputFormat, &inbuf, &outbuf, scheme.Codecs, key, ssv1alpha1.NamespaceWideScope, false, "", ""); err != nil { @@ -228,7 +228,17 @@ } outBytes := outbuf.Bytes() - t.Logf("output is %s", outBytes) + t.Logf("output is:\n%s", outBytes) + + if tc.asYaml { + if !strings.HasPrefix(string(outBytes), "---") { + t.Errorf("YAML output should start with ---") + } + + if strings.HasSuffix(string(outBytes), "---\n") { + t.Errorf("YAML output should not end with ---") + } + } decoder := yaml.NewYAMLOrJSONDecoder(bytes.NewReader(outBytes), 4096) var gotSecrets []*ssv1alpha1.SealedSecret ++++++ sealed-secrets.obsinfo ++++++ --- /var/tmp/diff_new_pack.njPFr0/_old 2023-10-19 22:51:41.387942586 +0200 +++ /var/tmp/diff_new_pack.njPFr0/_new 2023-10-19 22:51:41.387942586 +0200 @@ -1,5 +1,5 @@ name: sealed-secrets -version: 0.24.1 -mtime: 1696505515 -commit: 3c52ecf1f862ccfe4839dbb018ecd830a200d467 +version: 0.24.2 +mtime: 1697447190 +commit: 9634c0c89e40eb19405add4cd5d2256f316c32cb ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz /work/SRC/openSUSE:Factory/.kubeseal.new.1945/vendor.tar.gz differ: char 5, line 1