Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package rancher-cli for openSUSE:Factory 
checked in at 2026-01-30 18:28:22
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/rancher-cli (Old)
 and      /work/SRC/openSUSE:Factory/.rancher-cli.new.1995 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "rancher-cli"

Fri Jan 30 18:28:22 2026 rev:26 rq:1329980 version:2.13.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/rancher-cli/rancher-cli.changes  2025-12-20 
21:48:28.860128682 +0100
+++ /work/SRC/openSUSE:Factory/.rancher-cli.new.1995/rancher-cli.changes        
2026-01-30 18:28:39.853615549 +0100
@@ -1,0 +2,11 @@
+Fri Jan 30 08:38:28 UTC 2026 - Johannes Kastl 
<[email protected]>
+
+- Update to version 2.13.2:
+  * Update Rancher refs to (#540)
+  * [v2.13] Fix release GHA workflow (#537)
+  * [v2.13] Prerelease dependency bumps for v2.13.2 (#533)
+  * [v2.13] Fix login command (#525)
+  * [v2.13] Use staticcheck linter (#523)
+  * [v2.13] Bump Go toolchain to 1.24.11 (#524)
+
+-------------------------------------------------------------------

Old:
----
  rancher-cli-2.13.1.obscpio

New:
----
  rancher-cli-2.13.2.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ rancher-cli.spec ++++++
--- /var/tmp/diff_new_pack.mtLsjp/_old  2026-01-30 18:28:42.401722548 +0100
+++ /var/tmp/diff_new_pack.mtLsjp/_new  2026-01-30 18:28:42.401722548 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package rancher-cli
 #
-# Copyright (c) 2025 SUSE LLC and contributors
+# Copyright (c) 2026 SUSE LLC and contributors
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,14 +17,14 @@
 
 
 Name:           rancher-cli
-Version:        2.13.1
+Version:        2.13.2
 Release:        0
 Summary:        Rancher CLI
 License:        Apache-2.0
 URL:            https://github.com/rancher/cli
 Source:         %{name}-%{version}.tar.gz
 Source1:        vendor.tar.gz
-BuildRequires:  go1.24 >= 1.24.6
+BuildRequires:  golang(API) >= 1.24
 
 %description
 The Rancher Command Line Interface (CLI) is a unified tool for interacting with

++++++ _service ++++++
--- /var/tmp/diff_new_pack.mtLsjp/_old  2026-01-30 18:28:42.441724227 +0100
+++ /var/tmp/diff_new_pack.mtLsjp/_new  2026-01-30 18:28:42.445724396 +0100
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/rancher/cli</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v2.13.1</param>
+    <param name="revision">v2.13.2</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="versionrewrite-pattern">v(.*)</param>
     <param name="changesgenerate">enable</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.mtLsjp/_old  2026-01-30 18:28:42.465725235 +0100
+++ /var/tmp/diff_new_pack.mtLsjp/_new  2026-01-30 18:28:42.469725403 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param name="url">https://github.com/rancher/cli</param>
-              <param 
name="changesrevision">4584728f78deafc7480186114387078edfe4edc9</param></service></servicedata>
+              <param 
name="changesrevision">0c8b6f6bd26fb6beec8678f18664f472f72c9bd8</param></service></servicedata>
 (No newline at EOF)
 

++++++ rancher-cli-2.13.1.obscpio -> rancher-cli-2.13.2.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/.golangci.json 
new/rancher-cli-2.13.2/.golangci.json
--- old/rancher-cli-2.13.1/.golangci.json       2025-12-19 11:35:50.000000000 
+0100
+++ new/rancher-cli-2.13.2/.golangci.json       2026-01-29 15:22:36.000000000 
+0100
@@ -1,10 +1,17 @@
 {
-    "linters": {
-        "enable": [
-            "gofmt"
-        ]
-    },
-    "run": {
-        "timeout": "10m"
-    }
-}
\ No newline at end of file
+  "formatters": {
+    "enable": [
+      "gofmt"
+    ]
+  },
+  "linters": {
+    "default": "none",
+    "enable": [
+      "govet",
+      "ineffassign",
+      "staticcheck",
+      "unused"
+    ]
+  },
+  "version": "2"
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/cliclient/cliclient.go 
new/rancher-cli-2.13.2/cliclient/cliclient.go
--- old/rancher-cli-2.13.1/cliclient/cliclient.go       2025-12-19 
11:35:50.000000000 +0100
+++ new/rancher-cli-2.13.2/cliclient/cliclient.go       2026-01-29 
15:22:36.000000000 +0100
@@ -162,11 +162,11 @@
 func (mc *MasterClient) ByID(resource *ntypes.Resource, respObject 
interface{}) error {
        if strings.HasPrefix(resource.Type, "cluster.x-k8s.io") {
                return mc.CAPIClient.ByID(resource.Type, resource.ID, 
&respObject)
-       } else if _, ok := 
mc.ManagementClient.APIBaseClient.Types[resource.Type]; ok {
+       } else if _, ok := mc.ManagementClient.Types[resource.Type]; ok {
                return mc.ManagementClient.ByID(resource.Type, resource.ID, 
&respObject)
-       } else if _, ok := mc.ProjectClient.APIBaseClient.Types[resource.Type]; 
ok {
+       } else if _, ok := mc.ProjectClient.Types[resource.Type]; ok {
                return mc.ProjectClient.ByID(resource.Type, resource.ID, 
&respObject)
-       } else if _, ok := mc.ClusterClient.APIBaseClient.Types[resource.Type]; 
ok {
+       } else if _, ok := mc.ClusterClient.Types[resource.Type]; ok {
                return mc.ClusterClient.ByID(resource.Type, resource.ID, 
&respObject)
        }
        return fmt.Errorf("MasterClient - unknown resource type %v", 
resource.Type)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/cluster.go 
new/rancher-cli-2.13.2/cmd/cluster.go
--- old/rancher-cli-2.13.1/cmd/cluster.go       2025-12-19 11:35:50.000000000 
+0100
+++ new/rancher-cli-2.13.2/cmd/cluster.go       2026-01-29 15:22:36.000000000 
+0100
@@ -742,7 +742,7 @@
 // parseResourceString returns GB for Ki and Mi and CPU cores from 'm'
 func parseResourceString(mem string) string {
        if strings.HasSuffix(mem, "Ki") {
-               num, err := strconv.ParseFloat(strings.Replace(mem, "Ki", "", 
-1), 64)
+               num, err := strconv.ParseFloat(strings.ReplaceAll(mem, "Ki", 
""), 64)
                if err != nil {
                        return mem
                }
@@ -750,7 +750,7 @@
                return strings.TrimSuffix(fmt.Sprintf("%.2f", num), ".0")
        }
        if strings.HasSuffix(mem, "Mi") {
-               num, err := strconv.ParseFloat(strings.Replace(mem, "Mi", "", 
-1), 64)
+               num, err := strconv.ParseFloat(strings.ReplaceAll(mem, "Mi", 
""), 64)
                if err != nil {
                        return mem
                }
@@ -758,7 +758,7 @@
                return strings.TrimSuffix(fmt.Sprintf("%.2f", num), ".0")
        }
        if strings.HasSuffix(mem, "m") {
-               num, err := strconv.ParseFloat(strings.Replace(mem, "m", "", 
-1), 64)
+               num, err := strconv.ParseFloat(strings.ReplaceAll(mem, "m", 
""), 64)
                if err != nil {
                        return mem
                }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/common.go 
new/rancher-cli-2.13.2/cmd/common.go
--- old/rancher-cli-2.13.1/cmd/common.go        2025-12-19 11:35:50.000000000 
+0100
+++ new/rancher-cli-2.13.2/cmd/common.go        2026-01-29 15:22:36.000000000 
+0100
@@ -261,7 +261,7 @@
 
 func verifyCert(caCert []byte) (string, error) {
        // replace the escaped version of the line break
-       caCert = bytes.Replace(caCert, []byte(`\n`), []byte("\n"), -1)
+       caCert = bytes.ReplaceAll(caCert, []byte(`\n`), []byte("\n"))
 
        block, _ := pem.Decode(caCert)
 
@@ -322,28 +322,28 @@
 // GetResourceType maps an incoming resource type to a valid one from the 
schema
 func GetResourceType(c *cliclient.MasterClient, resource string) (string, 
error) {
        if c.ManagementClient != nil {
-               for key := range c.ManagementClient.APIBaseClient.Types {
+               for key := range c.ManagementClient.Types {
                        if strings.EqualFold(key, resource) {
                                return key, nil
                        }
                }
        }
        if c.ProjectClient != nil {
-               for key := range c.ProjectClient.APIBaseClient.Types {
+               for key := range c.ProjectClient.Types {
                        if strings.EqualFold(key, resource) {
                                return key, nil
                        }
                }
        }
        if c.ClusterClient != nil {
-               for key := range c.ClusterClient.APIBaseClient.Types {
+               for key := range c.ClusterClient.Types {
                        if strings.EqualFold(key, resource) {
                                return key, nil
                        }
                }
        }
        if c.CAPIClient != nil {
-               for key := range c.CAPIClient.APIBaseClient.Types {
+               for key := range c.CAPIClient.Types {
                        lowerKey := strings.ToLower(key)
                        if strings.HasPrefix(lowerKey, "cluster.x-k8s.io") && 
lowerKey == strings.ToLower(resource) {
                                return key, nil
@@ -370,17 +370,17 @@
                        }
                }
                if c.ManagementClient != nil {
-                       if _, ok := c.ManagementClient.APIBaseClient.Types[rt]; 
ok {
+                       if _, ok := c.ManagementClient.Types[rt]; ok {
                                schemaClient = c.ManagementClient
                        }
                }
                if c.ProjectClient != nil {
-                       if _, ok := c.ProjectClient.APIBaseClient.Types[rt]; ok 
{
+                       if _, ok := c.ProjectClient.Types[rt]; ok {
                                schemaClient = c.ProjectClient
                        }
                }
                if c.ClusterClient != nil {
-                       if _, ok := c.ClusterClient.APIBaseClient.Types[rt]; ok 
{
+                       if _, ok := c.ClusterClient.Types[rt]; ok {
                                schemaClient = c.ClusterClient
                        }
                }
@@ -415,7 +415,7 @@
                        for _, data := range collection.Data {
                                ids = append(ids, data.ID)
                        }
-                       return nil, fmt.Errorf("Multiple resources of type %s 
found for name %s: %v", schemaType, name, ids)
+                       return nil, fmt.Errorf("multiple resources of type %s 
found for name %s: %v", schemaType, name, ids)
                }
 
                // No matches for this schemaType, try the next one
@@ -424,7 +424,7 @@
                }
 
                if byName != nil {
-                       return nil, fmt.Errorf("Multiple resources named %s: 
%s:%s, %s:%s", name, collection.Data[0].Type,
+                       return nil, fmt.Errorf("multiple resources named %s: 
%s:%s, %s:%s", name, collection.Data[0].Type,
                                collection.Data[0].ID, byName.Type, byName.ID)
                }
 
@@ -433,7 +433,7 @@
        }
 
        if byName == nil {
-               return nil, fmt.Errorf("Not found: %s", name)
+               return nil, fmt.Errorf("not found: %s", name)
        }
 
        return byName, nil
@@ -546,7 +546,7 @@
                parts := SplitOnColon(id)
                return parts[0], parts[1], nil
        }
-       return "", "", fmt.Errorf("Unable to extract clusterid and projectid 
from [%s]", id)
+       return "", "", fmt.Errorf("unable to extract clusterid and projectid 
from [%s]", id)
 }
 
 // Return a JSON blob of the file at path
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/kubectl_token.go 
new/rancher-cli-2.13.2/cmd/kubectl_token.go
--- old/rancher-cli-2.13.1/cmd/kubectl_token.go 2025-12-19 11:35:50.000000000 
+0100
+++ new/rancher-cli-2.13.2/cmd/kubectl_token.go 2026-01-29 15:22:36.000000000 
+0100
@@ -241,7 +241,7 @@
                return cred, nil
        }
        ts := cred.Status.ExpirationTimestamp
-       if ts != nil && ts.Time.Before(time.Now()) {
+       if ts != nil && ts.Before(time.Now()) {
                cf, err := loadConfig(ctx)
                if err != nil {
                        return nil, err
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/kubectl_token_test.go 
new/rancher-cli-2.13.2/cmd/kubectl_token_test.go
--- old/rancher-cli-2.13.1/cmd/kubectl_token_test.go    2025-12-19 
11:35:50.000000000 +0100
+++ new/rancher-cli-2.13.2/cmd/kubectl_token_test.go    2026-01-29 
15:22:36.000000000 +0100
@@ -165,5 +165,5 @@
 
        expirationTimestamp := 
cfg.Servers["rancher.example.com"].KubeCredentials["dev-server"].Status.ExpirationTimestamp
        require.NotNil(t, expirationTimestamp)
-       assert.True(t, expirationTimestamp.Time.Equal(expires.Time))
+       assert.True(t, expirationTimestamp.Equal(expires.Time))
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/login.go 
new/rancher-cli-2.13.2/cmd/login.go
--- old/rancher-cli-2.13.1/cmd/login.go 2025-12-19 11:35:50.000000000 +0100
+++ new/rancher-cli-2.13.2/cmd/login.go 2026-01-29 15:22:36.000000000 +0100
@@ -2,23 +2,17 @@
 
 import (
        "bufio"
-       "crypto/tls"
-       "encoding/json"
        "errors"
        "fmt"
-       "io"
-       "net/http"
        "net/url"
        "os"
        "strconv"
        "strings"
 
-       "github.com/sirupsen/logrus"
-
-       "github.com/grantae/certinfo"
        "github.com/rancher/cli/cliclient"
        "github.com/rancher/cli/config"
        managementClient 
"github.com/rancher/rancher/pkg/client/generated/management/v3"
+       "github.com/sirupsen/logrus"
        "github.com/urfave/cli"
 )
 
@@ -57,10 +51,6 @@
                                Name:  "name",
                                Usage: "Name of the Server",
                        },
-                       cli.BoolFlag{
-                               Name:  "skip-verify",
-                               Usage: "Skip verification of the CACerts 
presented by the Server",
-                       },
                },
        }
 }
@@ -85,7 +75,7 @@
        // Validate the url and drop the path
        u, err := url.ParseRequestURI(ctx.Args().First())
        if err != nil {
-               return fmt.Errorf("Failed to parse SERVERURL (%s), make sure it 
is a valid HTTPS URL (e.g. https://rancher.yourdomain.com or https://1.1.1.1). 
Error: %s", ctx.Args().First(), err)
+               return fmt.Errorf("failed to parse SERVERURL (%s), make sure it 
is a valid HTTPS URL (e.g. https://rancher.yourdomain.com or https://1.1.1.1). 
Error: %s", ctx.Args().First(), err)
        }
 
        u.Path = ""
@@ -115,16 +105,7 @@
 
        c, err := cliclient.NewManagementClient(serverConfig)
        if err != nil {
-               if _, ok := err.(*url.Error); ok && 
strings.Contains(err.Error(), "certificate signed by unknown authority") {
-                       // no cert was provided and it's most likely a self 
signed cert if
-                       // we get here so grab the cacert and see if the user 
accepts the server
-                       c, err = getCertFromServer(ctx, serverConfig)
-                       if err != nil {
-                               return err
-                       }
-               } else {
-                       return err
-               }
+               return err
        }
 
        proj, err := getProjectContext(ctx, c)
@@ -152,12 +133,12 @@
                // Check if given context is in valid format
                _, _, err := parseClusterAndProjectID(context)
                if err != nil {
-                       return "", fmt.Errorf("Unable to parse context (%s). 
Please provide context as local:p-xxxxx, c-xxxxx:p-xxxxx, 
c-xxxxx:project-xxxxx, c-m-xxxxxxxx:p-xxxxx or c-m-xxxxxxxx:project-xxxxx", 
context)
+                       return "", fmt.Errorf("unable to parse context (%s). 
Please provide context as local:p-xxxxx, c-xxxxx:p-xxxxx, 
c-xxxxx:project-xxxxx, c-m-xxxxxxxx:p-xxxxx or c-m-xxxxxxxx:project-xxxxx", 
context)
                }
                // Check if context exists
                _, err = Lookup(c, context, "project")
                if err != nil {
-                       return "", fmt.Errorf("Unable to find context (%s). 
Make sure the context exists and you have permissions to use it. Error: %s", 
context, err)
+                       return "", fmt.Errorf("unable to find context (%s). 
Make sure the context exists and you have permissions to use it. Error: %s", 
context, err)
                }
                return context, nil
        }
@@ -252,94 +233,6 @@
        return projectCollection.Data[selection].ID, nil
 }
 
-func getCertFromServer(ctx *cli.Context, serverConfig *config.ServerConfig) 
(*cliclient.MasterClient, error) {
-       req, err := http.NewRequest("GET", 
serverConfig.URL+"/v3/settings/cacerts", nil)
-       if err != nil {
-               return nil, err
-       }
-
-       req.SetBasicAuth(serverConfig.AccessKey, serverConfig.SecretKey)
-
-       tlsConfig := &tls.Config{InsecureSkipVerify: true}
-       client, err := newHTTPClient(serverConfig, tlsConfig)
-       if err != nil {
-               return nil, err
-       }
-
-       res, err := client.Do(req)
-       if err != nil {
-               return nil, err
-       }
-
-       defer res.Body.Close()
-
-       content, err := io.ReadAll(res.Body)
-       if err != nil {
-               return nil, err
-       }
-
-       var certReponse *CACertResponse
-       err = json.Unmarshal(content, &certReponse)
-       if err != nil {
-               return nil, fmt.Errorf("Unable to parse response from 
%s/v3/settings/cacerts\nError: %s\nResponse:\n%s", serverConfig.URL, err, 
content)
-       }
-
-       cert, err := verifyCert([]byte(certReponse.Value))
-       if err != nil {
-               return nil, err
-       }
-
-       // Get the server cert chain in a printable form
-       serverCerts, err := processServerChain(res)
-       if err != nil {
-               return nil, err
-       }
-
-       if !ctx.Bool("skip-verify") {
-               if ok := verifyUserAcceptsCert(serverCerts, serverConfig.URL); 
!ok {
-                       return nil, errors.New("CACert of server was not 
accepted, unable to login")
-               }
-       }
-
-       serverConfig.CACerts = cert
-
-       return cliclient.NewManagementClient(serverConfig)
-}
-
-func verifyUserAcceptsCert(certs []string, url string) bool {
-       fmt.Printf("The authenticity of server '%s' can't be established.\n", 
url)
-       fmt.Printf("Cert chain is : %v \n", certs)
-       fmt.Print("Do you want to continue connecting (yes/no)? ")
-
-       scanner := bufio.NewScanner(os.Stdin)
-
-       for scanner.Scan() {
-               input := scanner.Text()
-               input = strings.ToLower(strings.TrimSpace(input))
-
-               if input == "yes" || input == "y" {
-                       return true
-               } else if input == "no" || input == "n" {
-                       return false
-               }
-               fmt.Printf("Please type 'yes' or 'no': ")
-       }
-       return false
-}
-
-func processServerChain(res *http.Response) ([]string, error) {
-       var allCerts []string
-
-       for _, cert := range res.TLS.PeerCertificates {
-               result, err := certinfo.CertificateText(cert)
-               if err != nil {
-                       return allCerts, err
-               }
-               allCerts = append(allCerts, result)
-       }
-       return allCerts, nil
-}
-
 func loginContext(ctx *cli.Context) error {
        c, err := GetClient(ctx)
        if err != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/wait.go 
new/rancher-cli-2.13.2/cmd/wait.go
--- old/rancher-cli-2.13.1/cmd/wait.go  2025-12-19 11:35:50.000000000 +0100
+++ new/rancher-cli-2.13.2/cmd/wait.go  2026-01-29 15:22:36.000000000 +0100
@@ -67,7 +67,7 @@
        for {
                select {
                case <-timeout:
-                       return fmt.Errorf("Timeout reached %v:%v 
transitioningMessage: %v", resource.Type, resource.ID, 
mapResource["transitioningMessage"])
+                       return fmt.Errorf("timeout reached %v:%v 
transitioningMessage: %v", resource.Type, resource.ID, 
mapResource["transitioningMessage"])
                case <-ticker.C:
                        err = c.ByID(resource, &mapResource)
                        if err != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/cmd/writer.go 
new/rancher-cli-2.13.2/cmd/writer.go
--- old/rancher-cli-2.13.1/cmd/writer.go        2025-12-19 11:35:50.000000000 
+0100
+++ new/rancher-cli-2.13.2/cmd/writer.go        2026-01-29 15:22:36.000000000 
+0100
@@ -93,21 +93,22 @@
                return
        }
 
-       if t.ValueFormat == "json" {
+       switch t.ValueFormat {
+       case "json":
                content, err := json.Marshal(obj)
                t.err = err
                if t.err != nil {
                        return
                }
                _, t.err = t.Writer.Write(append(content, byte('\n')))
-       } else if t.ValueFormat == "yaml" {
+       case "yaml":
                content, err := yaml.Marshal(obj)
                t.err = err
                if t.err != nil {
                        return
                }
                _, t.err = t.Writer.Write(append(content, byte('\n')))
-       } else {
+       default:
                t.err = printTemplate(t.Writer, t.ValueFormat, obj)
        }
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/go.mod 
new/rancher-cli-2.13.2/go.mod
--- old/rancher-cli-2.13.1/go.mod       2025-12-19 11:35:50.000000000 +0100
+++ new/rancher-cli-2.13.2/go.mod       2026-01-29 15:22:36.000000000 +0100
@@ -2,21 +2,20 @@
 
 go 1.24.0
 
-toolchain go1.24.9
+toolchain go1.24.11
 
 replace (
-       k8s.io/apiserver => k8s.io/apiserver v0.34.2
-       k8s.io/client-go => k8s.io/client-go v0.34.2
-       k8s.io/component-base => k8s.io/component-base v0.34.2
-       k8s.io/kubernetes => k8s.io/kubernetes v1.34.2
+       k8s.io/apiserver => k8s.io/apiserver v0.34.3
+       k8s.io/client-go => k8s.io/client-go v0.34.3
+       k8s.io/component-base => k8s.io/component-base v0.34.3
+       k8s.io/kubernetes => k8s.io/kubernetes v1.34.3
 )
 
 require (
        github.com/ghodss/yaml v1.0.0
-       github.com/grantae/certinfo v0.0.0-20170412194111-59d56a35515b
        github.com/rancher/norman v0.7.2
-       github.com/rancher/rancher/pkg/apis v0.0.0-20251218234335-4c2e04b31079
-       github.com/rancher/rancher/pkg/client v0.0.0-20251218234335-4c2e04b31079
+       github.com/rancher/rancher/pkg/apis v0.0.0-20260129014206-f93c99323f67
+       github.com/rancher/rancher/pkg/client v0.0.0-20260129014206-f93c99323f67
        github.com/sirupsen/logrus v1.9.3
        github.com/stretchr/testify v1.11.1
        github.com/tidwall/gjson v1.17.0
@@ -61,7 +60,7 @@
        github.com/rancher/aks-operator v1.13.1 // indirect
        github.com/rancher/ali-operator v1.13.0 // indirect
        github.com/rancher/eks-operator v1.13.1 // indirect
-       github.com/rancher/fleet/pkg/apis v0.14.1-0.20251210150425-9e77da0d13fd 
// indirect
+       github.com/rancher/fleet/pkg/apis v0.14.2 // indirect
        github.com/rancher/gke-operator v1.13.1 // indirect
        github.com/rancher/lasso v0.2.5 // indirect
        github.com/rancher/rke v1.8.0 // indirect
@@ -82,13 +81,13 @@
        gopkg.in/inf.v0 v0.9.1 // indirect
        gopkg.in/yaml.v2 v2.4.0 // indirect
        gopkg.in/yaml.v3 v3.0.1 // indirect
-       k8s.io/api v0.34.2 // indirect
+       k8s.io/api v0.34.3 // indirect
        k8s.io/apimachinery v0.34.3 // indirect
-       k8s.io/apiserver v0.34.2 // indirect
-       k8s.io/component-base v0.34.2 // indirect
+       k8s.io/apiserver v0.34.3 // indirect
+       k8s.io/component-base v0.34.3 // indirect
        k8s.io/klog/v2 v2.130.1 // indirect
        k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b // indirect
-       k8s.io/kubernetes v1.34.2 // indirect
+       k8s.io/kubernetes v1.34.3 // indirect
        k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 // indirect
        sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 // indirect
        sigs.k8s.io/randfill v1.0.0 // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/go.sum 
new/rancher-cli-2.13.2/go.sum
--- old/rancher-cli-2.13.1/go.sum       2025-12-19 11:35:50.000000000 +0100
+++ new/rancher-cli-2.13.2/go.sum       2026-01-29 15:22:36.000000000 +0100
@@ -43,8 +43,6 @@
 github.com/google/uuid v1.6.0/go.mod 
h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
 github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 
h1:JeSE6pjso5THxAzdVpqr6/geYxZytqFMBCOtn/ujyeo=
 github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674/go.mod 
h1:r4w70xmWCQKmi1ONH4KIaBptdivuRPyosB9RmPlGEwA=
-github.com/grantae/certinfo v0.0.0-20170412194111-59d56a35515b 
h1:NGgE5ELokSf2tZ/bydyDUKrvd/jP8lrAoPNeBuMOTOk=
-github.com/grantae/certinfo v0.0.0-20170412194111-59d56a35515b/go.mod 
h1:zT/uzhdQGTqlwTq7Lpbj3JoJQWfPfIJ1tE0OidAmih8=
 github.com/josharian/intern v1.0.0 
h1:vlS4z54oSdjm0bgjRigI+G1HpF+tI+9rE5LLzOg8HmY=
 github.com/josharian/intern v1.0.0/go.mod 
h1:5DoeVV0s6jJacbCEi61lwdGj/aVlrQvzHFFd8Hwg//Y=
 github.com/json-iterator/go v1.1.12 
h1:PV8peI4a0ysnczrg+LtxykD8LfKY9ML6u2jnxaEnrnM=
@@ -92,18 +90,18 @@
 github.com/rancher/ali-operator v1.13.0/go.mod 
h1:s5HznpxsN9LsgtX6u5UoW9dZNKnDLuXcwzQRAEoDcog=
 github.com/rancher/eks-operator v1.13.1 
h1:0wq1A3rUlzyyEEPkBKOcoc3kfhdL4j/GH6BjzH1akKo=
 github.com/rancher/eks-operator v1.13.1/go.mod 
h1:aZHPP/pTGLrbELrek5zluuxF0PoMj7Qc6lLp+Rl54+c=
-github.com/rancher/fleet/pkg/apis v0.14.1-0.20251210150425-9e77da0d13fd 
h1:7V9UuLSTMN7eEYVTAUjX+sUS7yCPaIioegLQGWaOzE4=
-github.com/rancher/fleet/pkg/apis v0.14.1-0.20251210150425-9e77da0d13fd/go.mod 
h1:NH2GmVA3iSL+LnooVj0Plqv0zljrpXjSDpOkFF/yLQ0=
+github.com/rancher/fleet/pkg/apis v0.14.2 
h1:VtE5ayMlswYGjUnLCvqVvXfBKs+neBXkznGDXTt/yco=
+github.com/rancher/fleet/pkg/apis v0.14.2/go.mod 
h1:RlHzOtW4+JExNAN0mRBmcsTbAb9zAqJ+43ZwHOJsqPg=
 github.com/rancher/gke-operator v1.13.1 
h1:i9RkWfUkvUg5QZ7hrJNHimqKUgC9kspqn7++2ePTanE=
 github.com/rancher/gke-operator v1.13.1/go.mod 
h1:IhrrQK+Wf1jZkbOioJW0Un0LVuqteEWWUndFGrbzVU8=
 github.com/rancher/lasso v0.2.5 h1:K++lWDDdfeN98Ixc1kCfUq0/q6tLjoHN++Np6QntXw0=
 github.com/rancher/lasso v0.2.5/go.mod 
h1:71rWfv+KkdSmSxZ9Ly5QYhxAu0nEUcaq9N2ByjcHqAM=
 github.com/rancher/norman v0.7.2 
h1:5ZPwGbTy/mt8rDxXSqyMwohn6TVef+jntSVD2kA9pYg=
 github.com/rancher/norman v0.7.2/go.mod 
h1:vZ5qL+eKodJ7zOMQYdl6jwMrSFrqTKpA+KYSFEKew2M=
-github.com/rancher/rancher/pkg/apis v0.0.0-20251218234335-4c2e04b31079 
h1:xlG5hssfNlaJhE4nP9AwC7xVksbXP7r0/ngdipUCJkI=
-github.com/rancher/rancher/pkg/apis v0.0.0-20251218234335-4c2e04b31079/go.mod 
h1:VydA5iWoq8x1rp8YaTIRMcryKiClq/xVwfTlEgunqfs=
-github.com/rancher/rancher/pkg/client v0.0.0-20251218234335-4c2e04b31079 
h1:er6FuczE4fewcXVHkZHq+48SKftxUkAll1OA1SafV0M=
-github.com/rancher/rancher/pkg/client 
v0.0.0-20251218234335-4c2e04b31079/go.mod 
h1:JhQyuNwunMXNvBMrjXVc3DTccZHFqCDZNxJBDF2zYo4=
+github.com/rancher/rancher/pkg/apis v0.0.0-20260129014206-f93c99323f67 
h1:jLSR443ZtoOokGKIbj5dLOnwIap8GizkgzWFHPUxS+0=
+github.com/rancher/rancher/pkg/apis v0.0.0-20260129014206-f93c99323f67/go.mod 
h1:ua1R2Be7aXeO0fSsQaMy2CHe98uVpag6DJXPVXj+RT4=
+github.com/rancher/rancher/pkg/client v0.0.0-20260129014206-f93c99323f67 
h1:DKRr2Fg0LDtLc4rCQB7nMEk+wiJmCqSzBjcLYW5VdNU=
+github.com/rancher/rancher/pkg/client 
v0.0.0-20260129014206-f93c99323f67/go.mod 
h1:fGfsCQgJLxdtqPSRRHWcKM+q2iUXCoYrNKtNXeoggUU=
 github.com/rancher/rke v1.8.0 h1:87jeoOccnnNCq27YgWgMh4o0GVrrVKbw+zfo+cHMZlo=
 github.com/rancher/rke v1.8.0/go.mod 
h1:x9N1abruzDFMwTpqq2cnaDYpKCptlNoW8VraNWB6Pc4=
 github.com/rancher/wrangler/v3 v3.3.1 
h1:YFqRfhxjuLNudUrvWrn+64wUPZ8pnn2KWbTsha75JLg=
@@ -212,22 +210,22 @@
 gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c/go.mod 
h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
 gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
 gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
-k8s.io/api v0.34.2 h1:fsSUNZhV+bnL6Aqrp6O7lMTy6o5x2C4XLjnh//8SLYY=
-k8s.io/api v0.34.2/go.mod h1:MMBPaWlED2a8w4RSeanD76f7opUoypY8TFYkSM+3XHw=
+k8s.io/api v0.34.3 h1:D12sTP257/jSH2vHV2EDYrb16bS7ULlHpdNdNhEw2S4=
+k8s.io/api v0.34.3/go.mod h1:PyVQBF886Q5RSQZOim7DybQjAbVs8g7gwJNhGtY5MBk=
 k8s.io/apimachinery v0.34.3 h1:/TB+SFEiQvN9HPldtlWOTp0hWbJ+fjU+wkxysf/aQnE=
 k8s.io/apimachinery v0.34.3/go.mod 
h1:/GwIlEcWuTX9zKIg2mbw0LRFIsXwrfoVxn+ef0X13lw=
-k8s.io/apiserver v0.34.2 h1:2/yu8suwkmES7IzwlehAovo8dDE07cFRC7KMDb1+MAE=
-k8s.io/apiserver v0.34.2/go.mod h1:gqJQy2yDOB50R3JUReHSFr+cwJnL8G1dzTA0YLEqAPI=
-k8s.io/client-go v0.34.2 h1:Co6XiknN+uUZqiddlfAjT68184/37PS4QAzYvQvDR8M=
-k8s.io/client-go v0.34.2/go.mod h1:2VYDl1XXJsdcAxw7BenFslRQX28Dxz91U9MWKjX97fE=
-k8s.io/component-base v0.34.2 h1:HQRqK9x2sSAsd8+R4xxRirlTjowsg6fWCPwWYeSvogQ=
-k8s.io/component-base v0.34.2/go.mod 
h1:9xw2FHJavUHBFpiGkZoKuYZ5pdtLKe97DEByaA+hHbM=
+k8s.io/apiserver v0.34.3 h1:uGH1qpDvSiYG4HVFqc6A3L4CKiX+aBWDrrsxHYK0Bdo=
+k8s.io/apiserver v0.34.3/go.mod h1:QPnnahMO5C2m3lm6fPW3+JmyQbvHZQ8uudAu/493P2w=
+k8s.io/client-go v0.34.3 h1:wtYtpzy/OPNYf7WyNBTj3iUA0XaBHVqhv4Iv3tbrF5A=
+k8s.io/client-go v0.34.3/go.mod h1:OxxeYagaP9Kdf78UrKLa3YZixMCfP6bgPwPwNBQBzpM=
+k8s.io/component-base v0.34.3 h1:zsEgw6ELqK0XncCQomgO9DpUIzlrYuZYA0Cgo+JWpVk=
+k8s.io/component-base v0.34.3/go.mod 
h1:5iIlD8wPfWE/xSHTRfbjuvUul2WZbI2nOUK65XL0E/c=
 k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
 k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
 k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b 
h1:MloQ9/bdJyIu9lb1PzujOPolHyvO06MXG5TUIj2mNAA=
 k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b/go.mod 
h1:UZ2yyWbFTpuhSbFhv24aGNOdoRdJZgsIObGBUaYVsts=
-k8s.io/kubernetes v1.34.2 h1:WQdDvYJazkmkwSncgNwGvVtaCt4TYXIU3wSMRgvp3MI=
-k8s.io/kubernetes v1.34.2/go.mod 
h1:m6pZk6a179pRo2wsTiCPORJ86iOEQmfIzUvtyEF8BwA=
+k8s.io/kubernetes v1.34.3 h1:0TfljWbhEF5DBks+WFMSrvKfxBLo4vnZuqORjLMiyT4=
+k8s.io/kubernetes v1.34.3/go.mod 
h1:m6pZk6a179pRo2wsTiCPORJ86iOEQmfIzUvtyEF8BwA=
 k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 
h1:hwvWFiBzdWw1FhfY1FooPn3kzWuJ8tmbZBHi4zVsl1Y=
 k8s.io/utils v0.0.0-20250604170112-4c0f3b243397/go.mod 
h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
 sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 
h1:gBQPwqORJ8d8/YNZWEjoZs7npUVDpVXUUOFfW6CgAqE=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/rancher-cli-2.13.1/scripts/ci 
new/rancher-cli-2.13.2/scripts/ci
--- old/rancher-cli-2.13.1/scripts/ci   2025-12-19 11:35:50.000000000 +0100
+++ new/rancher-cli-2.13.2/scripts/ci   2026-01-29 15:22:36.000000000 +0100
@@ -5,6 +5,5 @@
 
 ./build
 ./test
-./lint
 ./validate
 ./package

++++++ rancher-cli.obsinfo ++++++
--- /var/tmp/diff_new_pack.mtLsjp/_old  2026-01-30 18:28:42.661733466 +0100
+++ /var/tmp/diff_new_pack.mtLsjp/_new  2026-01-30 18:28:42.665733634 +0100
@@ -1,5 +1,5 @@
 name: rancher-cli
-version: 2.13.1
-mtime: 1766140550
-commit: 4584728f78deafc7480186114387078edfe4edc9
+version: 2.13.2
+mtime: 1769696556
+commit: 0c8b6f6bd26fb6beec8678f18664f472f72c9bd8
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/rancher-cli/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.rancher-cli.new.1995/vendor.tar.gz differ: char 13, 
line 1

Reply via email to