Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package kubeseal for openSUSE:Factory 
checked in at 2024-01-05 21:42:35
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/kubeseal (Old)
 and      /work/SRC/openSUSE:Factory/.kubeseal.new.28375 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "kubeseal"

Fri Jan  5 21:42:35 2024 rev:27 rq:1136917 version:0.24.5

Changes:
--------
--- /work/SRC/openSUSE:Factory/kubeseal/kubeseal.changes        2023-11-16 
20:30:18.876247368 +0100
+++ /work/SRC/openSUSE:Factory/.kubeseal.new.28375/kubeseal.changes     
2024-01-05 21:44:02.992065303 +0100
@@ -1,0 +2,15 @@
+Thu Jan 04 17:55:17 UTC 2024 - opensuse_buildserv...@ojkastl.de
+
+- Update to version 0.24.5:
+  * Release notes for v0.24.5 (#1399)
+  * Update golang to the latest tooling version (#1398)
+  * Bump github.com/onsi/ginkgo/v2 from 2.13.1 to 2.13.2 (#1397)
+  * Bump golang.org/x/crypto from 0.15.0 to 0.16.0 (#1394)
+  * feat: Helm - Add sources (#1383)
+  * Expose controller metrics in an isolated port (#1369)
+  * Bump k8s.io/client-go from 0.28.3 to 0.28.4 (#1389)
+  * Bump k8s.io/code-generator from 0.28.3 to 0.28.4 (#1390)
+  * Update carvel package to v2.13.3 (#1381)
+  * Release chart 2.13.3 (#1380)
+
+-------------------------------------------------------------------

Old:
----
  sealed-secrets-0.24.4.obscpio

New:
----
  sealed-secrets-0.24.5.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ kubeseal.spec ++++++
--- /var/tmp/diff_new_pack.lvV7lq/_old  2024-01-05 21:44:04.384116246 +0100
+++ /var/tmp/diff_new_pack.lvV7lq/_new  2024-01-05 21:44:04.384116246 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package kubeseal
 #
-# Copyright (c) 2023 SUSE LLC
+# Copyright (c) 2024 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -21,7 +21,7 @@
 %define archive_name sealed-secrets
 
 Name:           kubeseal
-Version:        0.24.4
+Version:        0.24.5
 Release:        0
 Summary:        CLI for encrypting secrets to SealedSecrets
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.lvV7lq/_old  2024-01-05 21:44:04.412117271 +0100
+++ /var/tmp/diff_new_pack.lvV7lq/_new  2024-01-05 21:44:04.416117417 +0100
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/bitnami-labs/sealed-secrets</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.24.4</param>
+    <param name="revision">v0.24.5</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>
@@ -17,7 +17,7 @@
     <param name="compression">gz</param>
   </service>
   <service name="go_modules" mode="manual">
-    <param name="archive">sealed-secrets-0.24.4.obscpio</param>
+    <param name="archive">sealed-secrets-0.24.5.obscpio</param>
   </service>
 </services>
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.lvV7lq/_old  2024-01-05 21:44:04.432118002 +0100
+++ /var/tmp/diff_new_pack.lvV7lq/_new  2024-01-05 21:44:04.436118149 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/bitnami-labs/sealed-secrets</param>
-              <param 
name="changesrevision">8fe2b61f3e553749ec18f288741579876d3b7c15</param></service></servicedata>
+              <param 
name="changesrevision">64693897d3f03934d1c0063c0dec4175d93c9680</param></service></servicedata>
 (No newline at EOF)
 

++++++ sealed-secrets-0.24.4.obscpio -> sealed-secrets-0.24.5.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/RELEASE-NOTES.md 
new/sealed-secrets-0.24.5/RELEASE-NOTES.md
--- old/sealed-secrets-0.24.4/RELEASE-NOTES.md  2023-11-15 12:18:05.000000000 
+0100
+++ new/sealed-secrets-0.24.5/RELEASE-NOTES.md  2023-12-15 11:36:28.000000000 
+0100
@@ -4,6 +4,18 @@
 
 
[![](https://img.shields.io/github/release/bitnami-labs/sealed-secrets.svg)](https://github.com/bitnami-labs/sealed-secrets/releases/latest)
 
+## v0.24.5
+
+### Changelog
+
+- feat: Helm - Add sources 
([#1383](https://github.com/bitnami-labs/sealed-secrets/pull/1383))
+- Update golang to the latest tooling version 
([#1398](https://github.com/bitnami-labs/sealed-secrets/pull/1398))
+- Bump github.com/onsi/ginkgo/v2 from 2.13.1 to 2.13.2 
([#1397](https://github.com/bitnami-labs/sealed-secrets/pull/1397))
+- Bump golang.org/x/crypto from 0.15.0 to 0.16.0 
([#1394](https://github.com/bitnami-labs/sealed-secrets/pull/1394))
+- Bump k8s.io/code-generator from 0.28.3 to 0.28.4  
([#1390](https://github.com/bitnami-labs/sealed-secrets/pull/1390))
+- Bump k8s.io/client-go from 0.28.3 to 0.28.4  
([#1389](https://github.com/bitnami-labs/sealed-secrets/pull/1389))
+- Bump k8s.io/client-go from 0.28.3 to 0.28.4  
([#1389](https://github.com/bitnami-labs/sealed-secrets/pull/1389))
+
 ## v0.24.4
 
 ### Changelog
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/carvel/package.yaml 
new/sealed-secrets-0.24.5/carvel/package.yaml
--- old/sealed-secrets-0.24.4/carvel/package.yaml       2023-11-15 
12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/carvel/package.yaml       2023-12-15 
11:36:28.000000000 +0100
@@ -1,10 +1,10 @@
 apiVersion: data.packaging.carvel.dev/v1alpha1
 kind: Package
 metadata:
-  name: "sealedsecrets.bitnami.com.2.13.2"
+  name: "sealedsecrets.bitnami.com.2.13.3"
 spec:
   refName: "sealedsecrets.bitnami.com"
-  version: "2.13.2"
+  version: "2.13.3"
   valuesSchema:
     openAPIv3:
       title: Chart Values
@@ -45,7 +45,7 @@
             tag:
               type: string
               description: Sealed Secrets image tag (immutable tags are 
recommended)
-              default: v0.24.3
+              default: v0.24.4
             pullPolicy:
               type: string
               description: Sealed Secrets image pull policy
@@ -424,7 +424,7 @@
     spec:
       fetch:
       - imgpkgBundle:
-          image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-929569be32748b3271ca245bc9c7a0c0586ab6b32437283df7e402ed27ea0e58.imgpkg
+          image: 
ghcr.io/bitnami-labs/sealed-secrets-carvel:sha256-17aebe4754893fb5aacc501ba340f40c6675755daa087bb1df03e141475a982a.imgpkg
       template:
       - helmTemplate:
           path: sealed-secrets
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.24.4/contrib/prometheus-mixin/README.md 
new/sealed-secrets-0.24.5/contrib/prometheus-mixin/README.md
--- old/sealed-secrets-0.24.4/contrib/prometheus-mixin/README.md        
2023-11-15 12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/contrib/prometheus-mixin/README.md        
2023-12-15 11:36:28.000000000 +0100
@@ -1,7 +1,7 @@
 # Sealed Secrets Metrics
 
 The Sealed Secrets Controller running in Kubernetes exposes Prometheus
-metrics on `*:8080/metrics`.
+metrics on `*:8081/metrics`.
 
 These metrics enable operators to observe how it is performing. For example 
 how many `SealedSecret` unseals have been attempted and how many errors may 
@@ -30,13 +30,13 @@
 Kubernetes port-forward to your pod:
 
 ```
-$ kubectl port-forward sealed-secrets-controller-6566dc69c6-lqr6x 8080 &
+$ kubectl port-forward sealed-secrets-controller-6566dc69c6-lqr6x 8081 &
 [1] 293283
 ```
 
 Then query the metrics endpoint:
 ```
-$ curl localhost:8080/metrics
+$ curl localhost:8081/metrics
 
 <snip>
 # HELP sealed_secrets_controller_build_info Build information.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/controller-norbac.jsonnet 
new/sealed-secrets-0.24.5/controller-norbac.jsonnet
--- old/sealed-secrets-0.24.4/controller-norbac.jsonnet 2023-11-15 
12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/controller-norbac.jsonnet 2023-12-15 
11:36:28.000000000 +0100
@@ -34,6 +34,21 @@
     target_pod: $.controller.spec.template,
   },
 
+  service_metrics: kube.Service('sealed-secrets-controller-metrics') + 
$.namespace {
+    local service = self,
+    target_pod: $.controller.spec.template,
+    spec: {
+      selector: service.target_pod.metadata.labels,
+      ports: [
+        {
+          port: 8081,
+          targetPort: 8081,
+        },
+      ],
+      type: "ClusterIP",
+    },
+  },
+
   controller: kube.Deployment('sealed-secrets-controller') + $.namespace {
     spec+: {
       template+: {
@@ -57,6 +72,7 @@
               livenessProbe: self.readinessProbe,
               ports_+: {
                 http: { containerPort: 8080 },
+                metrics: { containerPort: 8081 },
               },
               securityContext+: {
                 allowPrivilegeEscalation: false,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/docker/controller.Dockerfile 
new/sealed-secrets-0.24.5/docker/controller.Dockerfile
--- old/sealed-secrets-0.24.4/docker/controller.Dockerfile      2023-11-15 
12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/docker/controller.Dockerfile      2023-12-15 
11:36:28.000000000 +0100
@@ -6,6 +6,6 @@
 ARG TARGETARCH
 COPY dist/controller_linux_${TARGETARCH}*/controller /usr/local/bin/
 
-EXPOSE 8080
+EXPOSE 8080 8081
 
 ENTRYPOINT ["controller"]
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/docs/GKE.md 
new/sealed-secrets-0.24.5/docs/GKE.md
--- old/sealed-secrets-0.24.4/docs/GKE.md       2023-11-15 12:18:05.000000000 
+0100
+++ new/sealed-secrets-0.24.5/docs/GKE.md       2023-12-15 11:36:28.000000000 
+0100
@@ -82,3 +82,14 @@
   --target-tags "$NETWORK_TARGET_TAG" \
   --priority 1000
 ```
+
+Create the firewall rule to see the metrics
+
+```bash
+gcloud compute firewall-rules create gke-to-metrics-8081 \
+  --network "$NETWORK" \
+  --allow "tcp:8081" \
+  --source-ranges "$CP_IPV4_CIDR" \
+  --target-tags "$NETWORK_TARGET_TAG" \
+  --priority 1000
+```
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/go.mod 
new/sealed-secrets-0.24.5/go.mod
--- old/sealed-secrets-0.24.4/go.mod    2023-11-15 12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/go.mod    2023-12-15 11:36:28.000000000 +0100
@@ -7,17 +7,17 @@
        github.com/google/renameio v0.1.0
        github.com/mattn/go-isatty v0.0.20
        github.com/mkmik/multierror v0.3.0
-       github.com/onsi/ginkgo/v2 v2.13.1
+       github.com/onsi/ginkgo/v2 v2.13.2
        github.com/onsi/gomega v1.30.0
        github.com/prometheus/client_golang v1.17.0
        github.com/spf13/pflag v1.0.5
        github.com/throttled/throttled v2.2.5+incompatible
-       golang.org/x/crypto v0.15.0
+       golang.org/x/crypto v0.16.0
        gopkg.in/yaml.v2 v2.4.0
-       k8s.io/api v0.28.3
-       k8s.io/apimachinery v0.28.3
-       k8s.io/client-go v0.28.3
-       k8s.io/code-generator v0.28.3
+       k8s.io/api v0.28.4
+       k8s.io/apimachinery v0.28.4
+       k8s.io/client-go v0.28.4
+       k8s.io/code-generator v0.28.4
        k8s.io/klog v1.0.0
        k8s.io/klog/v2 v2.110.1
        k8s.io/utils v0.0.0-20230406110748-d93618cff8a2
@@ -58,8 +58,8 @@
        golang.org/x/mod v0.13.0 // indirect
        golang.org/x/net v0.17.0 // indirect
        golang.org/x/oauth2 v0.8.0 // indirect
-       golang.org/x/sys v0.14.0 // indirect
-       golang.org/x/term v0.14.0 // indirect
+       golang.org/x/sys v0.15.0 // indirect
+       golang.org/x/term v0.15.0 // indirect
        golang.org/x/text v0.14.0 // indirect
        golang.org/x/time v0.3.0 // indirect
        golang.org/x/tools v0.14.0 // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/go.sum 
new/sealed-secrets-0.24.5/go.sum
--- old/sealed-secrets-0.24.4/go.sum    2023-11-15 12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/go.sum    2023-12-15 11:36:28.000000000 +0100
@@ -85,8 +85,8 @@
 github.com/modern-go/reflect2 v1.0.2/go.mod 
h1:yWuevngMOJpCy52FWWMvUC8ws7m/LJsjYzDa0/r8luk=
 github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 
h1:C3w9PqII01/Oq1c1nUAm88MOHcQC9l5mIlSMApZMrHA=
 github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822/go.mod 
h1:+n7T8mK8HuQTcFwEeznm/DIxMOiR9yIdICNftLE1DvQ=
-github.com/onsi/ginkgo/v2 v2.13.1 
h1:LNGfMbR2OVGBfXjvRZIZ2YCTQdGKtPLvuI1rMCCj3OU=
-github.com/onsi/ginkgo/v2 v2.13.1/go.mod 
h1:XStQ8QcGwLyF4HdfcZB8SFOS/MWCgDuXMSBe6zrvLgM=
+github.com/onsi/ginkgo/v2 v2.13.2 
h1:Bi2gGVkfn6gQcjNjZJVO8Gf0FHzMPf2phUei9tejVMs=
+github.com/onsi/ginkgo/v2 v2.13.2/go.mod 
h1:XStQ8QcGwLyF4HdfcZB8SFOS/MWCgDuXMSBe6zrvLgM=
 github.com/onsi/gomega v1.30.0 h1:hvMK7xYz4D3HapigLTeGdId/NcfQx1VHMJc60ew99+8=
 github.com/onsi/gomega v1.30.0/go.mod 
h1:9sxs+SwGrKI0+PWe4Fxa9tFQQBG5xSsSbMXOI8PPpoQ=
 github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4=
@@ -120,8 +120,8 @@
 golang.org/x/crypto v0.0.0-20190308221718-c2843e01d9a2/go.mod 
h1:djNgcEr1/C05ACkg1iLfiJU5Ep61QUkGW8qpdssI0+w=
 golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod 
h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
 golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod 
h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
-golang.org/x/crypto v0.15.0 h1:frVn1TEaCEaZcn3Tmd7Y2b5KKPaZ+I32Q2OA3kYp5TA=
-golang.org/x/crypto v0.15.0/go.mod 
h1:4ChreQoLWfG3xLDer1WdlH5NdlQ3+mwnQq1YTKY+72g=
+golang.org/x/crypto v0.16.0 h1:mMMrFzRSCF0GvB7Ne27XVtVAaXLrPmgPC7/v0tkwHaY=
+golang.org/x/crypto v0.16.0/go.mod 
h1:gCAAfMLgwOJRpTjQ2zCCt2OcSfYMTeZVSRtQlPC7Nq4=
 golang.org/x/mod v0.2.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
 golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA=
 golang.org/x/mod v0.13.0 h1:I/DsJXRlw/8l/0c24sM9yb0T4z9liZTduXvdAWYiysY=
@@ -144,10 +144,10 @@
 golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod 
h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
 golang.org/x/sys v0.0.0-20200930185726-fdedc70b468f/go.mod 
h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
 golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
-golang.org/x/sys v0.14.0 h1:Vz7Qs629MkJkGyHxUlRHizWJRG2j8fbQKjELVSNhy7Q=
-golang.org/x/sys v0.14.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
-golang.org/x/term v0.14.0 h1:LGK9IlZ8T9jvdy6cTdfKUCltatMFOehAQo9SRC46UQ8=
-golang.org/x/term v0.14.0/go.mod 
h1:TySc+nGkYR6qt8km8wUhuFRTVSMIX3XPR58y2lC8vww=
+golang.org/x/sys v0.15.0 h1:h48lPFYpsTvQJZF4EKyI4aLHaev3CxivZmv7yZig9pc=
+golang.org/x/sys v0.15.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
+golang.org/x/term v0.15.0 h1:y/Oo/a/q3IXu26lQgl04j/gjuBDOBlx7X6Om1j2CPW4=
+golang.org/x/term v0.15.0/go.mod 
h1:BDl952bC7+uMoWR75FIrCDx79TPU9oHkTZ9yRbYOrX0=
 golang.org/x/text v0.3.0/go.mod h1:NqM8EUOU14njkJ3fqMW+pc6Ldnwhi/IjpwHt7yyuwOQ=
 golang.org/x/text v0.3.2/go.mod h1:bEr9sfX3Q8Zfm5fL9x+3itogRgK3+ptLWKqgva+5dAk=
 golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
@@ -184,14 +184,14 @@
 gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod 
h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
 gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
 gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.28.3 h1:Gj1HtbSdB4P08C8rs9AR94MfSGpRhJgsS+GF9V26xMM=
-k8s.io/api v0.28.3/go.mod h1:MRCV/jr1dW87/qJnZ57U5Pak65LGmQVkKTzf3AtKFHc=
-k8s.io/apimachinery v0.28.3 h1:B1wYx8txOaCQG0HmYF6nbpU8dg6HvA06x5tEffvOe7A=
-k8s.io/apimachinery v0.28.3/go.mod 
h1:uQTKmIqs+rAYaq+DFaoD2X7pcjLOqbQX2AOiO0nIpb8=
-k8s.io/client-go v0.28.3 h1:2OqNb72ZuTZPKCl+4gTKvqao0AMOl9f3o2ijbAj3LI4=
-k8s.io/client-go v0.28.3/go.mod h1:LTykbBp9gsA7SwqirlCXBWtK0guzfhpoW4qSm7i9dxo=
-k8s.io/code-generator v0.28.3 h1:I847QvdpYx7xKiG2KVQeCSyNF/xU9TowaDAg601mvlw=
-k8s.io/code-generator v0.28.3/go.mod 
h1:A2EAHTRYvCvBrb/MM2zZBNipeCk3f8NtpdNIKawC43M=
+k8s.io/api v0.28.4 h1:8ZBrLjwosLl/NYgv1P7EQLqoO8MGQApnbgH8tu3BMzY=
+k8s.io/api v0.28.4/go.mod h1:axWTGrY88s/5YE+JSt4uUi6NMM+gur1en2REMR7IRj0=
+k8s.io/apimachinery v0.28.4 h1:zOSJe1mc+GxuMnFzD4Z/U1wst50X28ZNsn5bhgIIao8=
+k8s.io/apimachinery v0.28.4/go.mod 
h1:wI37ncBvfAoswfq626yPTe6Bz1c22L7uaJ8dho83mgg=
+k8s.io/client-go v0.28.4 h1:Np5ocjlZcTrkyRJ3+T3PkXDpe4UpatQxj85+xjaD2wY=
+k8s.io/client-go v0.28.4/go.mod h1:0VDZFpgoZfelyP5Wqu0/r/TRYcLYuJ2U1KEeoaPa1N4=
+k8s.io/code-generator v0.28.4 h1:tcOSNIZQvuAvXhOwpbuJkKbAABJQeyCcQBCN/3uI18c=
+k8s.io/code-generator v0.28.4/go.mod 
h1:OQAfl6bZikQ/tK6faJ18Vyzo54rUII2NmjurHyiN1g4=
 k8s.io/gengo v0.0.0-20220902162205-c0856e24416d 
h1:U9tB195lKdzwqicbJvyJeOXV7Klv+wNAWENRnXEGi08=
 k8s.io/gengo v0.0.0-20220902162205-c0856e24416d/go.mod 
h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
 k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/helm/sealed-secrets/Chart.yaml 
new/sealed-secrets-0.24.5/helm/sealed-secrets/Chart.yaml
--- old/sealed-secrets-0.24.4/helm/sealed-secrets/Chart.yaml    2023-11-15 
12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/helm/sealed-secrets/Chart.yaml    2023-12-15 
11:36:28.000000000 +0100
@@ -1,7 +1,7 @@
 annotations:
   category: DeveloperTools
 apiVersion: v2
-appVersion: v0.24.3
+appVersion: v0.24.4
 description: Helm chart for the sealed-secrets controller.
 home: https://github.com/bitnami-labs/sealed-secrets
 icon: 
https://bitnami.com/assets/stacks/sealed-secrets/img/sealed-secrets-stack-220x234.png
@@ -14,4 +14,6 @@
     url: https://github.com/bitnami-labs/sealed-secrets
 name: sealed-secrets
 type: application
-version: 2.13.2
+version: 2.13.3
+sources:
+  - https://github.com/bitnami-labs/sealed-secrets
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/helm/sealed-secrets/README.md 
new/sealed-secrets-0.24.5/helm/sealed-secrets/README.md
--- old/sealed-secrets-0.24.4/helm/sealed-secrets/README.md     2023-11-15 
12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/helm/sealed-secrets/README.md     2023-12-15 
11:36:28.000000000 +0100
@@ -85,7 +85,7 @@
 | ------------------------------------------------- | 
-----------------------------------------------------------------------------------------------------
 | ----------------------------------- |
 | `image.registry`                                  | Sealed Secrets image 
registry                                                                        
 | `docker.io`                         |
 | `image.repository`                                | Sealed Secrets image 
repository                                                                      
 | `bitnami/sealed-secrets-controller` |
-| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                                             | 
`v0.24.3`                           |
+| `image.tag`                                       | Sealed Secrets image tag 
(immutable tags are recommended)                                             | 
`v0.24.4`                           |
 | `image.pullPolicy`                                | Sealed Secrets image 
pull policy                                                                     
 | `IfNotPresent`                      |
 | `image.pullSecrets`                               | Sealed Secrets image 
pull secrets                                                                    
 | `[]`                                |
 | `revisionHistoryLimit`                            | Number of old history to 
retain to allow rollback (If not set, default Kubernetes value is set to 10) | 
`""`                                |
@@ -188,21 +188,25 @@
 
 ### Metrics parameters
 
-| Name                                       | Description                     
                                                       | Value   |
-| ------------------------------------------ | 
--------------------------------------------------------------------------------------
 | ------- |
-| `metrics.serviceMonitor.enabled`           | Specify if a ServiceMonitor 
will be deployed for Prometheus Operator                   | `false` |
-| `metrics.serviceMonitor.namespace`         | Namespace where Prometheus 
Operator is running in                                      | `""`    |
-| `metrics.serviceMonitor.labels`            | Extra labels for the 
ServiceMonitor                                                    | `{}`    |
-| `metrics.serviceMonitor.annotations`       | Extra annotations for the 
ServiceMonitor                                               | `{}`    |
-| `metrics.serviceMonitor.interval`          | How frequently to scrape 
metrics                                                       | `""`    |
-| `metrics.serviceMonitor.scrapeTimeout`     | Timeout after which the scrape 
is ended                                                | `""`    |
-| `metrics.serviceMonitor.honorLabels`       | Specify if ServiceMonitor 
endPoints will honor labels                                  | `true`  |
-| `metrics.serviceMonitor.metricRelabelings` | Specify additional relabeling 
of metrics                                               | `[]`    |
-| `metrics.serviceMonitor.relabelings`       | Specify general relabeling      
                                                       | `[]`    |
-| `metrics.dashboards.create`                | Specifies whether a ConfigMap 
with a Grafana dashboard configuration should be created | `false` |
-| `metrics.dashboards.labels`                | Extra labels to be added to the 
Grafana dashboard ConfigMap                            | `{}`    |
-| `metrics.dashboards.annotations`           | Annotations to be added to the 
Grafana dashboard ConfigMap                             | `{}`    |
-| `metrics.dashboards.namespace`             | Namespace where Grafana 
dashboard ConfigMap is deployed                                | `""`    |
+| Name                                       | Description                     
                                                       | Value       |
+| ------------------------------------------ | 
--------------------------------------------------------------------------------------
 | ----------- |
+| `metrics.serviceMonitor.enabled`           | Specify if a ServiceMonitor 
will be deployed for Prometheus Operator                   | `false`     |
+| `metrics.serviceMonitor.namespace`         | Namespace where Prometheus 
Operator is running in                                      | `""`        |
+| `metrics.serviceMonitor.labels`            | Extra labels for the 
ServiceMonitor                                                    | `{}`        
|
+| `metrics.serviceMonitor.annotations`       | Extra annotations for the 
ServiceMonitor                                               | `{}`        |
+| `metrics.serviceMonitor.interval`          | How frequently to scrape 
metrics                                                       | `""`        |
+| `metrics.serviceMonitor.scrapeTimeout`     | Timeout after which the scrape 
is ended                                                | `""`        |
+| `metrics.serviceMonitor.honorLabels`       | Specify if ServiceMonitor 
endPoints will honor labels                                  | `true`      |
+| `metrics.serviceMonitor.metricRelabelings` | Specify additional relabeling 
of metrics                                               | `[]`        |
+| `metrics.serviceMonitor.relabelings`       | Specify general relabeling      
                                                       | `[]`        |
+| `metrics.dashboards.create`                | Specifies whether a ConfigMap 
with a Grafana dashboard configuration should be created | `false`     |
+| `metrics.dashboards.labels`                | Extra labels to be added to the 
Grafana dashboard ConfigMap                            | `{}`        |
+| `metrics.dashboards.annotations`           | Annotations to be added to the 
Grafana dashboard ConfigMap                             | `{}`        |
+| `metrics.dashboards.namespace`             | Namespace where Grafana 
dashboard ConfigMap is deployed                                | `""`        |
+| `metrics.service.type`                     | Sealed Secret Metrics service 
type                                                     | `ClusterIP` |
+| `metrics.service.port`                     | Sealed Secret service Metrics 
HTTP port                                                | `8081`      |
+| `metrics.service.nodePort`                 | Node port for HTTP              
                                                       | `""`        |
+| `metrics.service.annotations`              | Additional custom annotations 
for Sealed Secret Metrics service                        | `{}`        |
 
 ### PodDisruptionBudget Parameters
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.24.4/helm/sealed-secrets/templates/deployment.yaml 
new/sealed-secrets-0.24.5/helm/sealed-secrets/templates/deployment.yaml
--- old/sealed-secrets-0.24.4/helm/sealed-secrets/templates/deployment.yaml     
2023-11-15 12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/helm/sealed-secrets/templates/deployment.yaml     
2023-12-15 11:36:28.000000000 +0100
@@ -123,6 +123,8 @@
           ports:
             - containerPort: 8080
               name: http
+            - containerPort: 8081
+              name: metrics
           {{- if .Values.startupProbe.enabled }}
           startupProbe: {{- include "sealed-secrets.render" (dict "value" 
(omit .Values.startupProbe "enabled") "context" $) | nindent 12 }}
             tcpSocket:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.24.4/helm/sealed-secrets/templates/service.yaml 
new/sealed-secrets-0.24.5/helm/sealed-secrets/templates/service.yaml
--- old/sealed-secrets-0.24.4/helm/sealed-secrets/templates/service.yaml        
2023-11-15 12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/helm/sealed-secrets/templates/service.yaml        
2023-12-15 11:36:28.000000000 +0100
@@ -29,4 +29,35 @@
       nodePort: null
       {{- end }}
   selector: {{- include "sealed-secrets.matchLabels" . | nindent 4 }}
+---
+apiVersion: v1
+kind: Service
+metadata:
+  name: {{ include "sealed-secrets.fullname" . }}-metrics
+  namespace: {{ include "sealed-secrets.namespace" . }}
+  {{- if or .Values.metrics.service.annotations .Values.commonAnnotations }}
+  annotations:
+    {{- if .Values.metrics.service.annotations }}
+    {{- include "sealed-secrets.render" (dict "value" 
.Values.metrics.service.annotations "context" $) | nindent 4 }}
+    {{- end }}
+    {{- if .Values.commonAnnotations }}
+    {{- include "sealed-secrets.render" ( dict "value" 
.Values.commonAnnotations "context" $ ) | nindent 4 }}
+    {{- end }}
+  {{- end }}
+  labels: {{- include "sealed-secrets.labels" . | nindent 4 }}
+    {{- if .Values.metrics.service.labels }}
+    {{- include "sealed-secrets.render" ( dict "value" 
.Values.metrics.service.labels "context" $) | nindent 4 }}
+    {{- end }}
+spec:
+  type: {{ .Values.metrics.service.type }}
+  ports:
+    - name: http
+      port: {{ .Values.metrics.service.port }}
+      targetPort: http
+      {{- if and (or (eq .Values.metrics.service.type "NodePort") (eq 
.Values.metrics.service.type "LoadBalancer")) (not (empty 
.Values.metrics.service.nodePort)) }}
+      nodePort: {{ .Values.metrics.service.nodePort }}
+      {{- else if eq .Values.metrics.service.type "ClusterIP" }}
+      nodePort: null
+      {{- end }}
+  selector: {{- include "sealed-secrets.matchLabels" . | nindent 4 }}
 {{- end }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sealed-secrets-0.24.4/helm/sealed-secrets/values.yaml 
new/sealed-secrets-0.24.5/helm/sealed-secrets/values.yaml
--- old/sealed-secrets-0.24.4/helm/sealed-secrets/values.yaml   2023-11-15 
12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/helm/sealed-secrets/values.yaml   2023-12-15 
11:36:28.000000000 +0100
@@ -34,7 +34,7 @@
 image:
   registry: docker.io
   repository: bitnami/sealed-secrets-controller
-  tag: v0.24.3
+  tag: v0.24.4
   ## Specify a imagePullPolicy
   ## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
   ## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
@@ -448,6 +448,25 @@
     ##
     namespace: ""
 
+  ## Sealed Secret Metrics service parameters
+  ##
+  service:
+    ## @param metrics.service.type Sealed Secret Metrics service type
+    ##
+    type: ClusterIP
+    ## @param metrics.service.port Sealed Secret service Metrics HTTP port
+    ##
+    port: 8081
+    ## @param metrics.service.nodePort Node port for HTTP
+    ## Specify the nodePort value for the LoadBalancer and NodePort service 
types
+    ## ref: 
https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeport
+    ## NOTE: choose port between <30000-32767>
+    ##
+    nodePort: ""
+    ## @param metrics.service.annotations [object] Additional custom 
annotations for Sealed Secret Metrics service
+    ##
+    annotations: {}
+
 ## @section PodDisruptionBudget Parameters
 
 pdb:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/pkg/controller/main.go 
new/sealed-secrets-0.24.5/pkg/controller/main.go
--- old/sealed-secrets-0.24.4/pkg/controller/main.go    2023-11-15 
12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/pkg/controller/main.go    2023-12-15 
11:36:28.000000000 +0100
@@ -248,12 +248,21 @@
        }
 
        server := httpserver(cp, controller.AttemptUnseal, controller.Rotate, 
f.RateLimitBurst, f.RateLimitPerSecond)
+       serverMetrics := httpserverMetrics()
 
        sigterm := make(chan os.Signal, 1)
        signal.Notify(sigterm, syscall.SIGTERM)
        <-sigterm
 
-       return server.Shutdown(context.Background())
+       if err := server.Shutdown(context.Background()); err != nil {
+               return err
+       }
+
+       if err := serverMetrics.Shutdown(context.Background()); err != nil {
+               return err
+       }
+
+       return nil
 }
 
 func prepareController(clientset kubernetes.Interface, namespace string, 
tweakopts func(*metav1.ListOptions), f *Flags, ssclientset versioned.Interface, 
keyRegistry *KeyRegistry) (*Controller, error) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/pkg/controller/server.go 
new/sealed-secrets-0.24.5/pkg/controller/server.go
--- old/sealed-secrets-0.24.4/pkg/controller/server.go  2023-11-15 
12:18:05.000000000 +0100
+++ new/sealed-secrets-0.24.5/pkg/controller/server.go  2023-12-15 
11:36:28.000000000 +0100
@@ -17,9 +17,10 @@
 )
 
 var (
-       listenAddr   = flag.String("listen-addr", ":8080", "HTTP serving 
address.")
-       readTimeout  = flag.Duration("read-timeout", 2*time.Minute, "HTTP 
request timeout.")
-       writeTimeout = flag.Duration("write-timeout", 2*time.Minute, "HTTP 
response timeout.")
+       listenAddr        = flag.String("listen-addr", ":8080", "HTTP serving 
address.")
+       listenMetricsAddr = flag.String("listen-metrics-addr", ":8081", "HTTP 
metrics serving address.")
+       readTimeout       = flag.Duration("read-timeout", 2*time.Minute, "HTTP 
request timeout.")
+       writeTimeout      = flag.Duration("write-timeout", 2*time.Minute, "HTTP 
response timeout.")
 )
 
 // Called on every request to /cert.  Errors will be logged and return a 500.
@@ -44,8 +45,6 @@
                }
        })
 
-       mux.Handle("/metrics", promhttp.Handler())
-
        mux.Handle("/v1/verify", Instrument("/v1/verify", 
httpRateLimiter.RateLimit(http.HandlerFunc(func(w http.ResponseWriter, r 
*http.Request) {
                content, err := io.ReadAll(r.Body)
                if err != nil {
@@ -118,6 +117,26 @@
        }()
        return &server
 }
+
+func httpserverMetrics() *http.Server {
+       mux := http.NewServeMux()
+       mux.Handle("/metrics", promhttp.Handler())
+
+       server := http.Server{
+               Addr:              *listenMetricsAddr,
+               Handler:           mux,
+               ReadTimeout:       *readTimeout,
+               ReadHeaderTimeout: *readTimeout,
+               WriteTimeout:      *writeTimeout,
+       }
+
+       log.Infof("HTTP metrics server serving on %s", server.Addr)
+       go func() {
+               err := server.ListenAndServe()
+               log.Errorf("HTTP metrics server exiting: %v", err)
+       }()
+       return &server
+}
 
 func rateLimiter(burst int, rate int) throttled.HTTPRateLimiter {
        store, err := memstore.New(65536)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/sealed-secrets-0.24.4/versions.env 
new/sealed-secrets-0.24.5/versions.env
--- old/sealed-secrets-0.24.4/versions.env      2023-11-15 12:18:05.000000000 
+0100
+++ new/sealed-secrets-0.24.5/versions.env      2023-12-15 11:36:28.000000000 
+0100
@@ -1,2 +1,2 @@
-GO_VERSION=1.21.1
+GO_VERSION=1.21.5
 GO_VERSION_LIST="[\"$GO_VERSION\"]"

++++++ sealed-secrets.obsinfo ++++++
--- /var/tmp/diff_new_pack.lvV7lq/_old  2024-01-05 21:44:04.744129421 +0100
+++ /var/tmp/diff_new_pack.lvV7lq/_new  2024-01-05 21:44:04.748129567 +0100
@@ -1,5 +1,5 @@
 name: sealed-secrets
-version: 0.24.4
-mtime: 1700047085
-commit: 8fe2b61f3e553749ec18f288741579876d3b7c15
+version: 0.24.5
+mtime: 1702636588
+commit: 64693897d3f03934d1c0063c0dec4175d93c9680
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/kubeseal/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.kubeseal.new.28375/vendor.tar.gz differ: char 5, 
line 1

Reply via email to