Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kubeseal for openSUSE:Factory 
checked in at 2023-10-19 22:49:09
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kubeseal (Old)
 and      /work/SRC/openSUSE:Factory/.kubeseal.new.1945 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kubeseal"

Thu Oct 19 22:49:09 2023 rev:24 rq:1118767 version:0.24.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes        2023-10-05 
20:06:38.154262325 +0200
+++ /work/SRC/openSUSE:Factory/.kubeseal.new.1945/kubeseal.changes      
2023-10-19 22:51:40.315903704 +0200
@@ -1,0 +2,12 @@
+Thu Oct 19 05:49:47 UTC 2023 - ka...@b1-systems.de
+
+- Update to version 0.24.2:
+  * Prepare Release Notes for 0.24.2 (#1345)
+  * Fix issue where sealed secrets status is not updated if sealed
+    secret… (#1295)
+  * Bump golang.org/x/net from 0.14.0 to 0.17.0 (#1344)
+  * Bump golang.org/x/crypto from 0.13.0 to 0.14.0 (#1341)
+  * Bump github.com/onsi/ginkgo/v2 from 2.12.1 to 2.13.0 (#1342)
+  * Updated command for restoring from backups (#1334)
+
+-------------------------------------------------------------------

Old:
----
  sealed-secrets-0.24.0.obscpio
  sealed-secrets-0.24.1.obscpio

New:
----
  sealed-secrets-0.24.2.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ kubeseal.spec ++++++
--- /var/tmp/diff_new_pack.njPFr0/_old  2023-10-19 22:51:41.031929674 +0200
+++ /var/tmp/diff_new_pack.njPFr0/_new  2023-10-19 22:51:41.035929819 +0200
@@ -21,7 +21,7 @@
 %define archive_name sealed-secrets
 
 Name:           kubeseal
-Version:        0.24.1
+Version:        0.24.2
 Release:        0
 Summary:        CLI for encrypting secrets to SealedSecrets
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.njPFr0/_old  2023-10-19 22:51:41.063930834 +0200
+++ /var/tmp/diff_new_pack.njPFr0/_new  2023-10-19 22:51:41.067930979 +0200
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/bitnami-labs/sealed-secrets</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.24.1</param>
+    <param name="revision">v0.24.2</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>
@@ -17,7 +17,7 @@
     <param name="compression">gz</param>
   </service>
   <service name="go_modules" mode="manual">
-    <param name="archive">sealed-secrets-0.24.1.obscpio</param>
+    <param name="archive">sealed-secrets-0.24.2.obscpio</param>
   </service>
 </services>
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.njPFr0/_old  2023-10-19 22:51:41.079931415 +0200
+++ /var/tmp/diff_new_pack.njPFr0/_new  2023-10-19 22:51:41.091931850 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/bitnami-labs/sealed-secrets</param>
-              <param 
name="changesrevision">3c52ecf1f862ccfe4839dbb018ecd830a200d467</param></service></servicedata>
+              <param 
name="changesrevision">9634c0c89e40eb19405add4cd5d2256f316c32cb</param></service></servicedata>
 (No newline at EOF)
 

++++++ sealed-secrets-0.24.0.obscpio -> sealed-secrets-0.24.2.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/README.md 
new/sealed-secrets-0.24.2/README.md
--- old/sealed-secrets-0.24.0/README.md 2023-09-15 11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/README.md 2023-10-16 11:06:30.000000000 +0200
@@ -741,10 +741,17 @@
 
 To restore from a backup after some disaster, just put that secrets back 
before starting the controller - or if the controller was already started, 
replace the newly-created secrets and restart the controller:
 
-```bash
-kubectl apply -f main.key
-kubectl delete pod -n kube-system -l name=sealed-secrets-controller
-```
+* For Helm deployment:
+    ```bash
+    kubectl apply -f main.key
+    kubectl delete pod -n kube-system -l app.kubernetes.io/name=sealed-secrets
+    ```
+
+* For deployment via `controller.yaml` manifest
+    ```bash
+    kubectl apply -f main.key
+    kubectl delete pod -n kube-system -l name=sealed-secrets-controller
+    ```
 
 ### Can I decrypt my secrets offline with a backup key?
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/RELEASE-NOTES.md 
new/sealed-secrets-0.24.2/RELEASE-NOTES.md
--- old/sealed-secrets-0.24.0/RELEASE-NOTES.md  2023-09-15 11:42:16.000000000 
+0200
+++ new/sealed-secrets-0.24.2/RELEASE-NOTES.md  2023-10-16 11:06:30.000000000 
+0200
@@ -4,6 +4,21 @@
 
 
[![](https://img.shields.io/github/release/bitnami-labs/sealed-secrets.svg)](https://github.com/bitnami-labs/sealed-secrets/releases/latest)
 
+## v0.24.2
+
+### Changelog
+
+- Fix issue where sealed secrets status is not updated if sealed secret…  
([#1295](https://github.com/bitnami-labs/sealed-secrets/pull/1295))
+- Bump golang.org/x/crypto from 0.13.0 to 
0.14.0([#1341](https://github.com/bitnami-labs/sealed-secrets/pull/1341))
+- Bump github.com/onsi/ginkgo/v2 from 2.12.1 to 2.13.0 
([#1342](https://github.com/bitnami-labs/sealed-secrets/pull/1342))
+- Bump golang.org/x/net from 0.14.0 to 0.17.0 
([#1344](https://github.com/bitnami-labs/sealed-secrets/pull/1344))
+
+## v0.24.1
+
+### Changelog
+
+- fix: remove trailing dashes for multidoc yaml 
([#1335](https://github.com/bitnami-labs/sealed-secrets/pull/1335))
+
 ## v0.24.0
 
 ### Changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/carvel/package.yaml 
new/sealed-secrets-0.24.2/carvel/package.yaml
--- old/sealed-secrets-0.24.0/carvel/package.yaml       2023-09-15 
11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/carvel/package.yaml       2023-10-16 
11:06:30.000000000 +0200
@@ -1,10 +1,10 @@
 apiVersion: data.packaging.carvel.dev/v1alpha1
 kind: Package
 metadata:
-  name: "sealedsecrets.bitnami.com.2.12.0"
+  name: "sealedsecrets.bitnami.com.2.13.0"
 spec:
   refName: "sealedsecrets.bitnami.com"
-  version: "2.12.0"
+  version: "2.13.0"
   valuesSchema:
     openAPIv3:
       title: Chart Values
@@ -45,7 +45,7 @@
             tag:
               type: string
               description: Sealed Secrets image tag (immutable tags are 
recommended)
-              default: v0.23.1
+              default: v0.24.0
             pullPolicy:
               type: string
               description: Sealed Secrets image pull policy
@@ -424,7 +424,7 @@
     spec:
       fetch:
       - imgpkgBundle:
-          image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-24b95a0df834fb46af38f5d4511d6fce0526ee4c12f03a039fc3bc02bafc3694.imgpkg
+          image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-7507de99c9a29aed8351e357e77461041021085a2f70b270aa33e90945e979b4.imgpkg
       template:
       - helmTemplate:
           path: sealed-secrets
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/go.mod 
new/sealed-secrets-0.24.2/go.mod
--- old/sealed-secrets-0.24.0/go.mod    2023-09-15 11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/go.mod    2023-10-16 11:06:30.000000000 +0200
@@ -7,19 +7,20 @@
        github.com/google/renameio v0.1.0
        github.com/mattn/go-isatty v0.0.19
        github.com/mkmik/multierror v0.3.0
-       github.com/onsi/ginkgo/v2 v2.12.0
-       github.com/onsi/gomega v1.27.10
-       github.com/prometheus/client_golang v1.16.0
+       github.com/onsi/ginkgo/v2 v2.13.0
+       github.com/onsi/gomega v1.28.0
+       github.com/prometheus/client_golang v1.17.0
        github.com/spf13/pflag v1.0.5
        github.com/throttled/throttled v2.2.5+incompatible
-       golang.org/x/crypto v0.13.0
+       golang.org/x/crypto v0.14.0
        gopkg.in/yaml.v2 v2.4.0
-       k8s.io/api v0.28.1
-       k8s.io/apimachinery v0.28.1
-       k8s.io/client-go v0.28.1
-       k8s.io/code-generator v0.28.1
+       k8s.io/api v0.28.2
+       k8s.io/apimachinery v0.28.2
+       k8s.io/client-go v0.28.2
+       k8s.io/code-generator v0.28.2
        k8s.io/klog v1.0.0
        k8s.io/klog/v2 v2.100.1
+       k8s.io/utils v0.0.0-20230406110748-d93618cff8a2
 )
 
 require (
@@ -51,24 +52,23 @@
        github.com/modern-go/reflect2 v1.0.2 // indirect
        github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // 
indirect
        github.com/pkg/errors v0.9.1 // indirect
-       github.com/prometheus/client_model v0.3.0 // indirect
-       github.com/prometheus/common v0.42.0 // indirect
-       github.com/prometheus/procfs v0.10.1 // indirect
+       github.com/prometheus/client_model v0.4.1-0.20230718164431-9a2bf3000d16 
// indirect
+       github.com/prometheus/common v0.44.0 // indirect
+       github.com/prometheus/procfs v0.11.1 // indirect
        golang.org/x/mod v0.12.0 // indirect
-       golang.org/x/net v0.14.0 // indirect
+       golang.org/x/net v0.17.0 // indirect
        golang.org/x/oauth2 v0.8.0 // indirect
-       golang.org/x/sys v0.12.0 // indirect
-       golang.org/x/term v0.12.0 // indirect
+       golang.org/x/sys v0.13.0 // indirect
+       golang.org/x/term v0.13.0 // indirect
        golang.org/x/text v0.13.0 // indirect
        golang.org/x/time v0.3.0 // indirect
        golang.org/x/tools v0.12.0 // indirect
        google.golang.org/appengine v1.6.7 // indirect
-       google.golang.org/protobuf v1.30.0 // indirect
+       google.golang.org/protobuf v1.31.0 // indirect
        gopkg.in/inf.v0 v0.9.1 // indirect
        gopkg.in/yaml.v3 v3.0.1 // indirect
        k8s.io/gengo v0.0.0-20220902162205-c0856e24416d // indirect
        k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 // indirect
-       k8s.io/utils v0.0.0-20230406110748-d93618cff8a2 // indirect
        sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd // indirect
        sigs.k8s.io/structured-merge-diff/v4 v4.2.3 // indirect
        sigs.k8s.io/yaml v1.3.0 // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/go.sum 
new/sealed-secrets-0.24.2/go.sum
--- old/sealed-secrets-0.24.0/go.sum    2023-09-15 11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/go.sum    2023-10-16 11:06:30.000000000 +0200
@@ -32,7 +32,6 @@
 github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da/go.mod 
h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc=
 github.com/golang/protobuf v1.2.0/go.mod 
h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
 github.com/golang/protobuf v1.3.1/go.mod 
h1:6lQm79b+lXiMfvg/cZm0SGofjICqVBUtrP5yJMmIC1U=
-github.com/golang/protobuf v1.3.5/go.mod 
h1:6O5/vntMXwX2lRkT1hjjk0nAC1IDOTvTlVgjlRvqsdk=
 github.com/golang/protobuf v1.5.0/go.mod 
h1:FsONVRAS9T7sI+LIUmWTfcYkHO4aIWwzhcaSAoJOfIk=
 github.com/golang/protobuf v1.5.3 
h1:KhyjKVUg7Usr/dYsdSqoFveMYd5ko72D+zANwlG1mmg=
 github.com/golang/protobuf v1.5.3/go.mod 
h1:XVQd3VNwM+JqD3oG2Ue2ip4fOMUkwXdXDdiuN0vRsmY=
@@ -87,22 +86,22 @@
 github.com/modern-go/reflect2 v1.0.2/go.mod 
h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
 github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 
h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
 github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod 
h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
-github.com/onsi/ginkgo/v2 v2.12.0 
h1:UIVDowFPwpg6yMUpPjGkYvf06K3RAiJXUhCxEwQVHRI=
-github.com/onsi/ginkgo/v2 v2.12.0/go.mod 
h1:ZNEzXISYlqpb8S36iN71ifqLi3vVD1rVJGvWRCJOUpQ=
-github.com/onsi/gomega v1.27.10 h1:naR28SdDFlqrG6kScpT8VWpu1xWY5nJRCF3XaYyBjhI=
-github.com/onsi/gomega v1.27.10/go.mod 
h1:RsS8tutOdbdgzbPtzzATp12yT7kM5I5aElG3evPbQ0M=
+github.com/onsi/ginkgo/v2 v2.13.0 
h1:0jY9lJquiL8fcf3M4LAXN5aMlS/b2BV86HFFPCPMgE4=
+github.com/onsi/ginkgo/v2 v2.13.0/go.mod 
h1:TE309ZR8s5FsKKpuB1YAQYBzCaAfUgatB/xlT/ETL/o=
+github.com/onsi/gomega v1.28.0 h1:i2rg/p9n/UqIDAMFUJ6qIUUMcsqOuUHgbpbu235Vr1c=
+github.com/onsi/gomega v1.28.0/go.mod 
h1:A1H2JE76sI14WIP57LMKj7FVfCHx3g3BcZVjJG8bjX8=
 github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
 github.com/pkg/errors v0.9.1/go.mod 
h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINEl0=
 github.com/pmezard/go-difflib v1.0.0 
h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
 github.com/pmezard/go-difflib v1.0.0/go.mod 
h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
-github.com/prometheus/client_golang v1.16.0 
h1:yk/hx9hDbrGHovbci4BY+pRMfSuuat626eFsHb7tmT8=
-github.com/prometheus/client_golang v1.16.0/go.mod 
h1:Zsulrv/L9oM40tJ7T815tM89lFEugiJ9HzIqaAx4LKc=
-github.com/prometheus/client_model v0.3.0 
h1:UBgGFHqYdG/TPFD1B1ogZywDqEkwp3fBMvqdiQ7Xew4=
-github.com/prometheus/client_model v0.3.0/go.mod 
h1:LDGWKZIo7rky3hgvBe+caln+Dr3dPggB5dvjtD7w9+w=
-github.com/prometheus/common v0.42.0 
h1:EKsfXEYo4JpWMHH5cg+KOUWeuJSov1Id8zGR8eeI1YM=
-github.com/prometheus/common v0.42.0/go.mod 
h1:xBwqVerjNdUDjgODMpudtOMwlOwf2SaTr1yjz4b7Zbc=
-github.com/prometheus/procfs v0.10.1 
h1:kYK1Va/YMlutzCGazswoHKo//tZVlFpKYh+PymziUAg=
-github.com/prometheus/procfs v0.10.1/go.mod 
h1:nwNm2aOCAYw8uTR/9bWRREkZFxAUcWzPHWJq+XBB/FM=
+github.com/prometheus/client_golang v1.17.0 
h1:rl2sfwZMtSthVU752MqfjQozy7blglC+1SOtjMAMh+Q=
+github.com/prometheus/client_golang v1.17.0/go.mod 
h1:VeL+gMmOAxkS2IqfCq0ZmHSL+LjWfWDUmp1mBz9JgUY=
+github.com/prometheus/client_model v0.4.1-0.20230718164431-9a2bf3000d16 
h1:v7DLqVdK4VrYkVD5diGdl4sxJurKJEMnODWRJlxV9oM=
+github.com/prometheus/client_model v0.4.1-0.20230718164431-9a2bf3000d16/go.mod 
h1:oMQmHW1/JoDwqLtg57MGgP/Fb1CJEYF2imWWhWtMkYU=
+github.com/prometheus/common v0.44.0 
h1:+5BrQJwiBB9xsMygAB3TNvpQKOwlkc25LbISbrdOOfY=
+github.com/prometheus/common v0.44.0/go.mod 
h1:ofAIvZbQ1e/nugmZGz4/qCb9Ap1VoSTIO7x0VV9VvuY=
+github.com/prometheus/procfs v0.11.1 
h1:xRC8Iq1yyca5ypa9n1EZnWZkt7dwcoRPQwX/5gwaUuI=
+github.com/prometheus/procfs v0.11.1/go.mod 
h1:eesXgaPo1q7lBpVMoMy0ZOFTth9hBn4W/y0/p/ScXhY=
 github.com/rogpeppe/go-internal v1.10.0 
h1:TMyTOH3F/DB16zRVcYyreMH6GnZZrwQVAoYjRBZyWFQ=
 github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
 github.com/spf13/pflag v1.0.5/go.mod 
h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
@@ -122,8 +121,8 @@
 golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod 
h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
 golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod 
h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
 golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod 
h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.13.0 h1:mvySKfSWJ+UKUii46M40LOvyWfN0s2U+46/jDd0e6Ck=
-golang.org/x/crypto v0.13.0/go.mod 
h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliYc=
+golang.org/x/crypto v0.14.0 h1:wBqGXzWJW6m1XrIKlAH0Hs1JJ7+9KBwnIO8v66Q9cHc=
+golang.org/x/crypto v0.14.0/go.mod 
h1:MVFd36DqK4CsrnJYDkBA3VC4m2GkXAM0PvzMCn4JQf4=
 golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
 golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
 golang.org/x/mod v0.12.0 h1:rmsUpXtvNzj340zd98LZ4KntptpfRHwpFOHG188oHXc=
@@ -133,8 +132,8 @@
 golang.org/x/net v0.0.0-20190620200207-3b0461eec859/go.mod 
h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
 golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod 
h1:z5CRVTTTmAJ677TzLLGU+0bjPO0LkuOLi4/5GtJWs/s=
 golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod 
h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=
-golang.org/x/net v0.14.0 h1:BONx9s002vGdD9umnlX1Po8vOZmrgH34qlHcD1MfK14=
-golang.org/x/net v0.14.0/go.mod h1:PpSgVXXLK0OxS0F31C1/tv6XNguvCrnXIDrFMspZIUI=
+golang.org/x/net v0.17.0 h1:pVaXccu2ozPjCXewfr1S7xza/zcXTity9cCdXQYSjIM=
+golang.org/x/net v0.17.0/go.mod h1:NxSsAGuq816PNPmqtQdLE42eU2Fs7NoRIZrHJAlaCOE=
 golang.org/x/oauth2 v0.8.0 h1:6dkIjl3j3LtZ/O3sTgZTMsLKSftL/B8Zgq4huOIIUu8=
 golang.org/x/oauth2 v0.8.0/go.mod 
h1:yr7u4HXZRm1R1kBWqr/xKNqewf0plRYoB7sla+BCIXE=
 golang.org/x/sync v0.0.0-20181221193216-37e7f081c4d4/go.mod 
h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=
@@ -146,10 +145,10 @@
 golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod 
h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
 golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod 
h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
 golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.12.0 h1:CM0HF96J0hcLAwsHPJZjfdNzs0gftsLfgKt57wWHJ0o=
-golang.org/x/sys v0.12.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/term v0.12.0 h1:/ZfYdc3zq+q02Rv9vGqTeSItdzZTSNDmfTi0mBAuidU=
-golang.org/x/term v0.12.0/go.mod 
h1:owVbMEjm3cBLCHdkQu9b1opXd4ETQWc3BhuQGKgXgvU=
+golang.org/x/sys v0.13.0 h1:Af8nKPmuFypiUBjVoU9V20FiaFXOcuZI21p0ycVYYGE=
+golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
+golang.org/x/term v0.13.0 h1:bb+I9cTfFazGW51MZqBVmZy7+JEJMouUHTUSKVQLBek=
+golang.org/x/term v0.13.0/go.mod 
h1:LTmsnFJwVN6bCy1rVCoS+qHT1HhALEFxKncY3WNNh4U=
 golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
 golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
 golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
@@ -172,8 +171,8 @@
 google.golang.org/appengine v1.6.7/go.mod 
h1:8WjMMxjGQR8xUklV/ARdw2HLXBOI7O7uCIDZVag1xfc=
 google.golang.org/protobuf v1.26.0-rc.1/go.mod 
h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp09yW+WbY/TyQbw=
 google.golang.org/protobuf v1.26.0/go.mod 
h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc=
-google.golang.org/protobuf v1.30.0 
h1:kPPoIgf3TsEvrm0PFe15JQ+570QVxYzEvvHqChK+cng=
-google.golang.org/protobuf v1.30.0/go.mod 
h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
+google.golang.org/protobuf v1.31.0 
h1:g0LDEJHgrBl9N9r17Ru3sqWhkIx2NB67okBHPwC7hs8=
+google.golang.org/protobuf v1.31.0/go.mod 
h1:HV8QOd/L58Z+nl8r43ehVNZIU/HEI6OcFqwMG9pJV4I=
 gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod 
h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
 gopkg.in/check.v1 v1.0.0-20190902080502-41f04d3bba15/go.mod 
h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
 gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c 
h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk=
@@ -186,14 +185,14 @@
 gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod 
h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
 gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
 gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.28.1 h1:i+0O8k2NPBCPYaMB+uCkseEbawEt/eFaiRqUx8aB108=
-k8s.io/api v0.28.1/go.mod h1:uBYwID+66wiL28Kn2tBjBYQdEU0Xk0z5qF8bIBqk/Dg=
-k8s.io/apimachinery v0.28.1 h1:EJD40og3GizBSV3mkIoXQBsws32okPOy+MkRyzh6nPY=
-k8s.io/apimachinery v0.28.1/go.mod 
h1:X0xh/chESs2hP9koe+SdIAcXWcQ+RM5hy0ZynB+yEvw=
-k8s.io/client-go v0.28.1 h1:pRhMzB8HyLfVwpngWKE8hDcXRqifh1ga2Z/PU9SXVK8=
-k8s.io/client-go v0.28.1/go.mod h1:pEZA3FqOsVkCc07pFVzK076R+P/eXqsgx5zuuRWukNE=
-k8s.io/code-generator v0.28.1 h1:o0WFcqtv80GEf1iaOAzLIlrKyny9HBd2jaspJfWb5sI=
-k8s.io/code-generator v0.28.1/go.mod 
h1:ueeSJZJ61NHBa0ccWLey6mwawum25vX61nRZ6WOzN9A=
+k8s.io/api v0.28.2 h1:9mpl5mOb6vXZvqbQmankOfPIGiudghwCoLl1EYfUZbw=
+k8s.io/api v0.28.2/go.mod h1:RVnJBsjU8tcMq7C3iaRSGMeaKt2TWEUXcpIt/90fjEg=
+k8s.io/apimachinery v0.28.2 h1:KCOJLrc6gu+wV1BYgwik4AF4vXOlVJPdiqn0yAWWwXQ=
+k8s.io/apimachinery v0.28.2/go.mod 
h1:RdzF87y/ngqk9H4z3EL2Rppv5jj95vGS/HaFXrLDApU=
+k8s.io/client-go v0.28.2 h1:DNoYI1vGq0slMBN/SWKMZMw0Rq+0EQW6/AK4v9+3VeY=
+k8s.io/client-go v0.28.2/go.mod h1:sMkApowspLuc7omj1FOSUxSoqjr+d5Q0Yc0LOFnYFJY=
+k8s.io/code-generator v0.28.2 h1:u47guga1rCWLnEnffF09p+cqj8B20oHOLoQ1lb1HGtQ=
+k8s.io/code-generator v0.28.2/go.mod 
h1:ueeSJZJ61NHBa0ccWLey6mwawum25vX61nRZ6WOzN9A=
 k8s.io/gengo v0.0.0-20220902162205-c0856e24416d 
h1:U9tB195lKdzwqicbJvyJeOXV7Klv+wNAWENRnXEGi08=
 k8s.io/gengo v0.0.0-20220902162205-c0856e24416d/go.mod 
h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
 k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/helm/sealed-secrets/Chart.yaml 
new/sealed-secrets-0.24.2/helm/sealed-secrets/Chart.yaml
--- old/sealed-secrets-0.24.0/helm/sealed-secrets/Chart.yaml    2023-09-15 
11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/helm/sealed-secrets/Chart.yaml    2023-10-16 
11:06:30.000000000 +0200
@@ -1,7 +1,7 @@
 annotations:
   category: DeveloperTools
 apiVersion: v2
-appVersion: v0.23.1
+appVersion: v0.24.0
 description: Helm chart for the sealed-secrets controller.
 home: https://github.com/bitnami-labs/sealed-secrets
 icon: 
https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png
@@ -14,4 +14,4 @@
     url: https://github.com/bitnami-labs/sealed-secrets
 name: sealed-secrets
 type: application
-version: 2.12.0
+version: 2.13.0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/helm/sealed-secrets/README.md 
new/sealed-secrets-0.24.2/helm/sealed-secrets/README.md
--- old/sealed-secrets-0.24.0/helm/sealed-secrets/README.md     2023-09-15 
11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/helm/sealed-secrets/README.md     2023-10-16 
11:06:30.000000000 +0200
@@ -85,7 +85,7 @@
 | ------------------------------------------------- | 
-----------------------------------------------------------------------------------------------------
 | ----------------------------------- |
 | `image.registry`                                  | Sealed Secrets image 
registry                                                                        
 | `docker.io`                         |
 | `image.repository`                                | Sealed Secrets image 
repository                                                                      
 | `bitnami/sealed-secrets-controller` |
-| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                                             | 
`v0.23.1`                           |
+| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                                             | 
`v0.24.0`                           |
 | `image.pullPolicy`                                | Sealed Secrets image 
pull policy                                                                     
 | `IfNotPresent`                      |
 | `image.pullSecrets`                               | Sealed Secrets image 
pull secrets                                                                    
 | `[]`                                |
 | `revisionHistoryLimit`                            | Number of old history to 
retain to allow rollback (If not set, default Kubernetes value is set to 10) | 
`""`                                |
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.24.0/helm/sealed-secrets/values.yaml 
new/sealed-secrets-0.24.2/helm/sealed-secrets/values.yaml
--- old/sealed-secrets-0.24.0/helm/sealed-secrets/values.yaml   2023-09-15 
11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/helm/sealed-secrets/values.yaml   2023-10-16 
11:06:30.000000000 +0200
@@ -34,7 +34,7 @@
 image:
   registry: docker.io
   repository: bitnami/sealed-secrets-controller
-  tag: v0.23.1
+  tag: v0.24.0
   ## Specify a imagePullPolicy
   ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
   ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/pkg/controller/controller.go 
new/sealed-secrets-0.24.2/pkg/controller/controller.go
--- old/sealed-secrets-0.24.0/pkg/controller/controller.go      2023-09-15 
11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/pkg/controller/controller.go      2023-10-16 
11:06:30.000000000 +0200
@@ -412,20 +412,18 @@
                ssecret.Status = &ssv1alpha1.SealedSecretStatus{}
        }
 
-       // No need to update the status if we already have observed it from the
-       // current generation of the resource.
-       if ssecret.Status.ObservedGeneration == ssecret.ObjectMeta.Generation {
-               return nil
-       }
-
        ssecret.Status.ObservedGeneration = ssecret.ObjectMeta.Generation
-       updateSealedSecretsStatusConditions(ssecret.Status, unsealError)
+       updatedRequired := updateSealedSecretsStatusConditions(ssecret.Status, 
unsealError)
+       if updatedRequired {
+               _, err := 
c.ssclient.SealedSecrets(ssecret.GetObjectMeta().GetNamespace()).UpdateStatus(context.Background(),
 ssecret, metav1.UpdateOptions{})
+               return err
+       }
 
-       _, err := 
c.ssclient.SealedSecrets(ssecret.GetObjectMeta().GetNamespace()).UpdateStatus(context.Background(),
 ssecret, metav1.UpdateOptions{})
-       return err
+       return nil
 }
 
-func updateSealedSecretsStatusConditions(st *ssv1alpha1.SealedSecretStatus, 
unsealError error) {
+func updateSealedSecretsStatusConditions(st *ssv1alpha1.SealedSecretStatus, 
unsealError error) bool {
+       var updateRequired bool
        cond := func() *ssv1alpha1.SealedSecretCondition {
                for i := range st.Conditions {
                        if st.Conditions[i].Type == 
ssv1alpha1.SealedSecretSynced {
@@ -446,11 +444,16 @@
                status = corev1.ConditionFalse
                cond.Message = unsealError.Error()
        }
-       cond.LastUpdateTime = metav1.Now()
+
+       // Status has changed, update the transition time and signal that an 
update is required
        if cond.Status != status {
                cond.LastTransitionTime = cond.LastUpdateTime
                cond.Status = status
+               cond.LastUpdateTime = metav1.Now()
+               updateRequired = true
        }
+
+       return updateRequired
 }
 
 func isAnnotatedToBeManaged(secret *corev1.Secret) bool {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.24.0/pkg/controller/controller_test.go 
new/sealed-secrets-0.24.2/pkg/controller/controller_test.go
--- old/sealed-secrets-0.24.0/pkg/controller/controller_test.go 2023-09-15 
11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/pkg/controller/controller_test.go 2023-10-16 
11:06:30.000000000 +0200
@@ -156,6 +156,53 @@
        }
 }
 
+func TestEmptyStatusSendsUpdate(t *testing.T) {
+       updateRequired := 
updateSealedSecretsStatusConditions(&ssv1alpha1.SealedSecretStatus{}, nil)
+
+       if !updateRequired {
+               t.Fatalf("expected status update, but no update was send")
+       }
+}
+
+func TestStatusUpdateSendsUpdate(t *testing.T) {
+       updateRequired := 
updateSealedSecretsStatusConditions(&ssv1alpha1.SealedSecretStatus{
+               Conditions: []ssv1alpha1.SealedSecretCondition{{
+                       Status: "False",
+                       Type:   ssv1alpha1.SealedSecretSynced,
+               }},
+       }, nil)
+
+       if !updateRequired {
+               t.Fatalf("expected status update, but no update was send")
+       }
+}
+
+func TestSameStatusNoUpdate(t *testing.T) {
+       updateRequired := 
updateSealedSecretsStatusConditions(&ssv1alpha1.SealedSecretStatus{
+               Conditions: []ssv1alpha1.SealedSecretCondition{{
+                       Type:   ssv1alpha1.SealedSecretSynced,
+                       Status: "False",
+               }},
+       }, errors.New("testerror"))
+
+       if updateRequired {
+               t.Fatalf("expected no status update, but update was send")
+       }
+}
+
+func TestSyncedSecretWithErrorSendsUpdate(t *testing.T) {
+       updateRequired := 
updateSealedSecretsStatusConditions(&ssv1alpha1.SealedSecretStatus{
+               Conditions: []ssv1alpha1.SealedSecretCondition{{
+                       Type:   ssv1alpha1.SealedSecretSynced,
+                       Status: "True",
+               }},
+       }, errors.New("testerror"))
+
+       if !updateRequired {
+               t.Fatalf("expected status update, but no update was send")
+       }
+}
+
 func testKeyRegister(t *testing.T, ctx context.Context, clientset 
kubernetes.Interface, ns string) *KeyRegistry {
        t.Helper()
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/pkg/kubeseal/kubeseal.go 
new/sealed-secrets-0.24.2/pkg/kubeseal/kubeseal.go
--- old/sealed-secrets-0.24.0/pkg/kubeseal/kubeseal.go  2023-09-15 
11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/pkg/kubeseal/kubeseal.go  2023-10-16 
11:06:30.000000000 +0200
@@ -389,6 +389,7 @@
                contentType = runtime.ContentTypeJSON
        case "yaml":
                contentType = runtime.ContentTypeYAML
+               fmt.Fprint(out, "---\n")
        default:
                return fmt.Errorf("unsupported output format: %s", outputFormat)
        }
@@ -402,11 +403,8 @@
        }
        _, _ = out.Write(buf)
 
-       switch contentType {
-       case runtime.ContentTypeJSON:
+       if contentType == runtime.ContentTypeJSON {
                fmt.Fprint(out, "\n")
-       case runtime.ContentTypeYAML:
-               fmt.Fprint(out, "---\n")
        }
        return nil
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.0/pkg/kubeseal/kubeseal_test.go 
new/sealed-secrets-0.24.2/pkg/kubeseal/kubeseal_test.go
--- old/sealed-secrets-0.24.0/pkg/kubeseal/kubeseal_test.go     2023-09-15 
11:42:16.000000000 +0200
+++ new/sealed-secrets-0.24.2/pkg/kubeseal/kubeseal_test.go     2023-10-16 
11:06:30.000000000 +0200
@@ -220,7 +220,7 @@
                                t.Fatalf("Error writing to buffer: %v", err)
                        }
 
-                       t.Logf("input is: %s", inbuf.String())
+                       t.Logf("input is:\n%s", inbuf.String())
 
                        outbuf := bytes.Buffer{}
                        if err := Seal(clientConfig, outputFormat, &inbuf, 
&outbuf, scheme.Codecs, key, ssv1alpha1.NamespaceWideScope, false, "", ""); err 
!= nil {
@@ -228,7 +228,17 @@
                        }
 
                        outBytes := outbuf.Bytes()
-                       t.Logf("output is %s", outBytes)
+                       t.Logf("output is:\n%s", outBytes)
+
+                       if tc.asYaml {
+                               if !strings.HasPrefix(string(outBytes), "---") {
+                                       t.Errorf("YAML output should start with 
---")
+                               }
+
+                               if strings.HasSuffix(string(outBytes), "---\n") 
{
+                                       t.Errorf("YAML output should not end 
with ---")
+                               }
+                       }
 
                        decoder := 
yaml.NewYAMLOrJSONDecoder(bytes.NewReader(outBytes), 4096)
                        var gotSecrets []*ssv1alpha1.SealedSecret

++++++ sealed-secrets.obsinfo ++++++
--- /var/tmp/diff_new_pack.njPFr0/_old  2023-10-19 22:51:41.387942586 +0200
+++ /var/tmp/diff_new_pack.njPFr0/_new  2023-10-19 22:51:41.387942586 +0200
@@ -1,5 +1,5 @@
 name: sealed-secrets
-version: 0.24.1
-mtime: 1696505515
-commit: 3c52ecf1f862ccfe4839dbb018ecd830a200d467
+version: 0.24.2
+mtime: 1697447190
+commit: 9634c0c89e40eb19405add4cd5d2256f316c32cb
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.kubeseal.new.1945/vendor.tar.gz differ: char 5, 
line 1

Reply via email to