diff --git a/_service b/_service
index d10129d..e79c23e 100644
--- a/_service
+++ b/_service
@@ -3,7 +3,7 @@
https://github.com/bitnami-labs/sealed-secrets
git
.git
- v0.24.0
+ v0.24.1
@PARENT_TAG@
enable
v(.*)
@@ -17,6 +17,6 @@
gz
- sealed-secrets-0.24.0.obscpio
+ sealed-secrets-0.24.1.obscpio
diff --git a/_servicedata b/_servicedata
index 8da535a..3acaaec 100644
--- a/_servicedata
+++ b/_servicedata
@@ -1,4 +1,4 @@
https://github.com/bitnami-labs/sealed-secrets
- 3344ac6b6403320c46d0c3b26124a3c27f296c3c
\ No newline at end of file
+ 3c52ecf1f862ccfe4839dbb018ecd830a200d467
\ No newline at end of file
diff --git a/kubeseal.changes b/kubeseal.changes
index 0b9fee9..ff3c80d 100644
--- a/kubeseal.changes
+++ b/kubeseal.changes
@@ -1,3 +1,19 @@
+-------------------------------------------------------------------
+Thu Oct 05 12:27:25 UTC 2023 - kastl@b1-systems.de
+
+- Update to version 0.24.1:
+ * Release notes for 0.24.1 (#1339)
+ * fix: remove trailing dashes for multidoc yaml (#1335)
+ * Bump github.com/prometheus/client_golang from 1.16.0 to 1.17.0
+ (#1338)
+ * Bump github.com/onsi/gomega from 1.27.10 to 1.28.0 (#1337)
+ * Bump github.com/onsi/ginkgo/v2 from 2.12.0 to 2.12.1 (#1333)
+ * Bump k8s.io/code-generator from 0.28.1 to 0.28.2 (#1327)
+ * Bump k8s.io/client-go from 0.28.1 to 0.28.2 (#1328)
+ * Bump k8s.io/api from 0.28.1 to 0.28.2 (#1329)
+ * Update carvel package to v2.13.0 (#1325)
+ * Release chart 2.13.0 (#1323)
+
-------------------------------------------------------------------
Fri Sep 15 11:07:12 UTC 2023 - kastl@b1-systems.de
diff --git a/kubeseal.spec b/kubeseal.spec
index bab152b..dee6fde 100644
--- a/kubeseal.spec
+++ b/kubeseal.spec
@@ -21,7 +21,7 @@
%define archive_name sealed-secrets
Name: kubeseal
-Version: 0.24.0
+Version: 0.24.1
Release: 0
Summary: CLI for encrypting secrets to SealedSecrets
License: Apache-2.0
@@ -36,8 +36,7 @@ Problem: "I can manage all my K8s config in git, except Secrets."
Solution: Encrypt your Secret into a SealedSecret, which is safe to store - even to a public repository. The SealedSecret can be decrypted only by the controller running in the target cluster and nobody else (not even the original author) is able to obtain the original Secret from the SealedSecret.
%prep
-%setup -q -n %{archive_name}-%{version}
-%setup -q -n %{archive_name}-%{version} -T -D -a 1
+%autosetup -p 1 -a 1 -n %{archive_name}-%{version}
%build
go build \
diff --git a/sealed-secrets-0.24.1.obscpio b/sealed-secrets-0.24.1.obscpio
new file mode 100644
index 0000000..d4432d7
--- /dev/null
+++ b/sealed-secrets-0.24.1.obscpio
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:c89d8a95d23c545378508882974c4db8b6f8632a4f4efdd2721cf42cc9500e3b
+size 2335756
diff --git a/sealed-secrets.obsinfo b/sealed-secrets.obsinfo
index 0d2ab17..0a8be6a 100644
--- a/sealed-secrets.obsinfo
+++ b/sealed-secrets.obsinfo
@@ -1,4 +1,4 @@
name: sealed-secrets
-version: 0.24.0
-mtime: 1694770936
-commit: 3344ac6b6403320c46d0c3b26124a3c27f296c3c
+version: 0.24.1
+mtime: 1696505515
+commit: 3c52ecf1f862ccfe4839dbb018ecd830a200d467
diff --git a/vendor.tar.gz b/vendor.tar.gz
index 3c69d20..7194a9e 100644
--- a/vendor.tar.gz
+++ b/vendor.tar.gz
@@ -1,3 +1,3 @@
version https://git-lfs.github.com/spec/v1
-oid sha256:f0c57c21d7af894ce68eafce7ebae73bc69c1a9f68a9df30d852da5acfa34e06
-size 7912360
+oid sha256:f06d1222fbbf8e42e799b62e74d6a6c23c5bee3d60da691e8adade74124a2bd9
+size 7918220