From fe6ef6428e44fe91cdcb7402a41c3583915302298faa36dc424ff8bb3dd91a11 Mon Sep 17 00:00:00 2001 From: Richard Brown Date: Fri, 13 Nov 2020 14:20:13 +0000 Subject: [PATCH] Accepting request 847374 from home:jenting:branches:devel:kubic - Update to version v1.5.2 - Fix BSL controller to avoid invoking init() on all BSLs regardless of ValidationFrequency (#2992, @betta1) - cli: allow creating multiple instances of Velero across two different namespaces (#2886, @alaypatel07) - Restore CRD Resource name to fix CRD wait functionality. (#2949, @sseago) - Ensure that bound PVCs and PVs remain bound on restore. (#3007, @nrb). This fixes CVE-2020-3996. OBS-URL: https://build.opensuse.org/request/show/847374 OBS-URL: https://build.opensuse.org/package/show/devel:kubic/velero?expand=0&rev=10 --- velero-1.5.1.tar.gz | 3 --- velero-1.5.2.tar.gz | 3 +++ velero.changes | 9 +++++++++ velero.spec | 6 +++--- vendor.tar.gz | 4 ++-- 5 files changed, 17 insertions(+), 8 deletions(-) delete mode 100644 velero-1.5.1.tar.gz create mode 100644 velero-1.5.2.tar.gz diff --git a/velero-1.5.1.tar.gz b/velero-1.5.1.tar.gz deleted file mode 100644 index c6384d5..0000000 --- a/velero-1.5.1.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:b5d8f50f8f84f08ec7fc72d2572fd15749b3b95f1a0ac2483f3a4fe6f43e4961 -size 5929719 diff --git a/velero-1.5.2.tar.gz b/velero-1.5.2.tar.gz new file mode 100644 index 0000000..d8f0e00 --- /dev/null +++ b/velero-1.5.2.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a0c872567a5476a4483dc227ede6491e6d15fcf8da2ffd89c3e42a66550dbf91 +size 5929474 diff --git a/velero.changes b/velero.changes index ab2401a..88ef48e 100644 --- a/velero.changes +++ b/velero.changes @@ -1,3 +1,12 @@ +------------------------------------------------------------------- +Tue Nov 10 02:49:25 UTC 2020 - jenting hsiao + +- Update to version v1.5.2 + - Fix BSL controller to avoid invoking init() on all BSLs regardless of ValidationFrequency (#2992, @betta1) + - cli: allow creating multiple instances of Velero across two different namespaces (#2886, @alaypatel07) + - Restore CRD Resource name to fix CRD wait functionality. (#2949, @sseago) + - Ensure that bound PVCs and PVs remain bound on restore. (#3007, @nrb). This fixes CVE-2020-3996. + ------------------------------------------------------------------- Wed Oct 14 10:12:25 UTC 2020 - Jan Engelhardt diff --git a/velero.spec b/velero.spec index e1f3177..b427d12 100644 --- a/velero.spec +++ b/velero.spec @@ -17,17 +17,17 @@ %define goipath github.com/vmware-tanzu/velero -%define commit 87d86a45a6ca66c6c942c7c7f08352e26809426c +%define commit e115e5a191b1fdb5d379b62a35916115e77124a4 %define gitstate clean Name: velero -Version: 1.5.1 +Version: 1.5.2 Release: 0 Summary: Backup program with deduplication and encryption License: Apache-2.0 Group: Productivity/Archiving/Backup URL: https://velero.io -Source0: %{name}-%{version}.tar.gz +Source0: https://github.com/vmware-tanzu/velero/archive/v%{version}.tar.gz#/%{name}-%{version}.tar.gz Source1: vendor.tar.gz BuildRequires: golang-packaging BuildRequires: golang(API) = 1.14 diff --git a/vendor.tar.gz b/vendor.tar.gz index f70c6b4..c2b7108 100644 --- a/vendor.tar.gz +++ b/vendor.tar.gz @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:966f43279582db1db93066b13c2e5f5f41e632e7d6952ae97ce3404eebbd3980 -size 6920761 +oid sha256:503b2f5a7c617d814b9bd20308a0cf9ea368738eb2db65e27a8ab78b659ce957 +size 6920778