diff --git a/_service b/_service index d10129d..e79c23e 100644 --- a/_service +++ b/_service @@ -3,7 +3,7 @@ https://github.com/bitnami-labs/sealed-secrets git .git - v0.24.0 + v0.24.1 @PARENT_TAG@ enable v(.*) @@ -17,6 +17,6 @@ gz - sealed-secrets-0.24.0.obscpio + sealed-secrets-0.24.1.obscpio diff --git a/_servicedata b/_servicedata index 8da535a..3acaaec 100644 --- a/_servicedata +++ b/_servicedata @@ -1,4 +1,4 @@ https://github.com/bitnami-labs/sealed-secrets - 3344ac6b6403320c46d0c3b26124a3c27f296c3c \ No newline at end of file + 3c52ecf1f862ccfe4839dbb018ecd830a200d467 \ No newline at end of file diff --git a/kubeseal.changes b/kubeseal.changes index 0b9fee9..ff3c80d 100644 --- a/kubeseal.changes +++ b/kubeseal.changes @@ -1,3 +1,19 @@ +------------------------------------------------------------------- +Thu Oct 05 12:27:25 UTC 2023 - kastl@b1-systems.de + +- Update to version 0.24.1: + * Release notes for 0.24.1 (#1339) + * fix: remove trailing dashes for multidoc yaml (#1335) + * Bump github.com/prometheus/client_golang from 1.16.0 to 1.17.0 + (#1338) + * Bump github.com/onsi/gomega from 1.27.10 to 1.28.0 (#1337) + * Bump github.com/onsi/ginkgo/v2 from 2.12.0 to 2.12.1 (#1333) + * Bump k8s.io/code-generator from 0.28.1 to 0.28.2 (#1327) + * Bump k8s.io/client-go from 0.28.1 to 0.28.2 (#1328) + * Bump k8s.io/api from 0.28.1 to 0.28.2 (#1329) + * Update carvel package to v2.13.0 (#1325) + * Release chart 2.13.0 (#1323) + ------------------------------------------------------------------- Fri Sep 15 11:07:12 UTC 2023 - kastl@b1-systems.de diff --git a/kubeseal.spec b/kubeseal.spec index bab152b..dee6fde 100644 --- a/kubeseal.spec +++ b/kubeseal.spec @@ -21,7 +21,7 @@ %define archive_name sealed-secrets Name: kubeseal -Version: 0.24.0 +Version: 0.24.1 Release: 0 Summary: CLI for encrypting secrets to SealedSecrets License: Apache-2.0 @@ -36,8 +36,7 @@ Problem: "I can manage all my K8s config in git, except Secrets." Solution: Encrypt your Secret into a SealedSecret, which is safe to store - even to a public repository. The SealedSecret can be decrypted only by the controller running in the target cluster and nobody else (not even the original author) is able to obtain the original Secret from the SealedSecret. %prep -%setup -q -n %{archive_name}-%{version} -%setup -q -n %{archive_name}-%{version} -T -D -a 1 +%autosetup -p 1 -a 1 -n %{archive_name}-%{version} %build go build \ diff --git a/sealed-secrets-0.24.1.obscpio b/sealed-secrets-0.24.1.obscpio new file mode 100644 index 0000000..d4432d7 --- /dev/null +++ b/sealed-secrets-0.24.1.obscpio @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c89d8a95d23c545378508882974c4db8b6f8632a4f4efdd2721cf42cc9500e3b +size 2335756 diff --git a/sealed-secrets.obsinfo b/sealed-secrets.obsinfo index 0d2ab17..0a8be6a 100644 --- a/sealed-secrets.obsinfo +++ b/sealed-secrets.obsinfo @@ -1,4 +1,4 @@ name: sealed-secrets -version: 0.24.0 -mtime: 1694770936 -commit: 3344ac6b6403320c46d0c3b26124a3c27f296c3c +version: 0.24.1 +mtime: 1696505515 +commit: 3c52ecf1f862ccfe4839dbb018ecd830a200d467 diff --git a/vendor.tar.gz b/vendor.tar.gz index 3c69d20..7194a9e 100644 --- a/vendor.tar.gz +++ b/vendor.tar.gz @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:f0c57c21d7af894ce68eafce7ebae73bc69c1a9f68a9df30d852da5acfa34e06 -size 7912360 +oid sha256:f06d1222fbbf8e42e799b62e74d6a6c23c5bee3d60da691e8adade74124a2bd9 +size 7918220