Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package cmctl for openSUSE:Factory checked 
in at 2023-01-12 22:44:38
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/cmctl (Old)
 and      /work/SRC/openSUSE:Factory/.cmctl.new.32243 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "cmctl"

Thu Jan 12 22:44:38 2023 rev:10 rq:1057846 version:1.11.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/cmctl/cmctl.changes      2023-01-11 
14:37:16.637984824 +0100
+++ /work/SRC/openSUSE:Factory/.cmctl.new.32243/cmctl.changes   2023-01-12 
22:44:54.173070278 +0100
@@ -1,0 +2,115 @@
+Wed Jan 11 19:08:01 UTC 2023 - [email protected]
+
+- BuildRequire go1.19
+- Update to version 1.11.0:
+  * Bump go to 1.19.5
+  * Bump containerd to fix reported vuln
+  * bump base images to latest
+  * Policy check ensures that cert.sepc.secretName secret gets labelled
+  * Keymanager controller ensures that temporary private key Secrets are 
labelled
+  * Issuing controller ensures that cert.spec.secretName secrets are labelled
+  * Adds a new label to cert-manager API
+  * move custom acmesolver image above extraArgs
+  * Log error if CA source is in a namespace that is not in scope
+  * Fix cainjector's namespace flag
+  * Code review feedback- better comment
+  * Bump golang.org/x/crypto and golang.org/x/oauth2
+  * Fix integration tests
+  * Ensures that only one secrets cache is created for cert-manager controller
+  * bump base images to latest
+  * avoid logging confusing error messages for external issuers
+  * Allow custom helm values files to be supplied to make ko-deploy-certmanager
+  * Remove trailing escape slash
+  * various ginkgo tweaks
+  * Remove duplicate ko-deploy-cert-manager make target
+  * use template when generating tempdir in verify-crds
+  * update LICENSES (make update-licenses)
+  * vcert: upgrade to v4.23.0 to fix "Click Retry" and "WebSDK CertRequest"
+  * fix(AzureDNS): suppress original message in adal.TokenRefreshError to 
prevent early CR reconciliations due to unique data (timestamp, Trace ID) that 
lands to CR status
+  * helm: add option to override ACME HTTP-01 solver image
+  * Bump sigs.k8s.io deps
+  * Bump supported versions of k8s mentioned in the helm chart
+  * Add some experimental ko based build and deploy tools
+  * update base images to latest
+  * Bump version of contour helm chart + images
+  * Add ko tool
+  * bump golang.org/x/net version to fix trivy vulns
+  * update SECURITY policy to exclude vuln reports
+  * Enable + use k8s 1.26 for e2e tests by default
+  * Bumps [helm.sh/helm/v3](https://github.com/helm/helm) from 3.10.0 to 
3.10.3. - [Release notes](https://github.com/helm/helm/releases) - 
[Commits](helm/[email protected])
+  * add + use CABundle field for ACME servers in issuers
+  * change wording on descriptions for Vault and TPP 'CABundle' fields
+  * Update controller-runtime to v0.14.0
+  * kubebuilder did not yet create a 1.26 release
+  * add WithLegacy function to our fake discovery client
+  * Bump k8s.io deps to v0.26.0
+  * feat: Add max-concurrent-challenges parameter to helm
+  * fix kubebuilder tools arm64 sha256sum
+  * bump dep versions to fix trivy-reported vulns
+  * Fixed a typo in helm chart values
+  * bump go to 1.19.4
+  * remove verify-licenses from ci-presubmit
+  * Addressing review comments
+  * Updating CRDs
+  * Addressing review comments
+  * Update internal/controller/certificates/policies/checks.go
+  * Refreshing secrets when the keystore fields change
+  * Gateway and GatewayClass for tests are created against beta Gateway API
+  * Corrects test Gateway resources
+  * Removes unused check
+  * Updates Gateway API test dependency
+  * Bumps Contour Helm chart version
+  * Tests download Gateway installation bundle
+  * Update reference to HTTPRoute docs
+  * feature: update gateway api to v1beta1
+  * e2e: use Vault 1.12.1 instead of the outdated 1.2.3
+  * Return error when Gateway has a cross-namespace secret ref
+  * Use distinct manifest dirs for signed / unsigned manifests
+  * Add boilerplate comment
+  * Add error case + list all supported OIDs in cannonical order
+  * Make test assertion more specific to slice, need to verify ordering of rdns
+  * e2e test confirming LDAP rdn literalsubject in generated certificate
+  * chore(AzureDNS): added more comments as requested by @wallrj
+  * Test that the Sign function *does* use the Vault namespace
+  * Recreate the original behaviour of sending a Vault token to the 
unauthenticated sys/health endpoint.
+  * Remove unused Token method
+  * Remove unused Sys methods
+  * Test
+  * Set the Vault namespace using the official method in the vault SDK
+  * Gofmt files
+  * Add support for required LDAP (rfc4514) RDNs in LiteralSubject
+  * feat(AzureDNS): add a test for federated SPT
+  * fix: featureGates add webhook deployment in chart yaml
+  * updating to match feedback and adjust the RunAsNonRoot options for http01 
solver to be more descriptive
+  * fail in case of invalid IP address
+  * enable basicConstraints feature in e2e environments by default
+  * Addressing review comments
+  * improve gen.CSR and use it everywhere
+  * Fix typos in explanatory comment
+  * Always initialize tlsClientConfig if the default is nil
+  * Use RenegotiateOnceAsClient and explain why
+  * chore(Azure): improve naming, add comments
+  * fix x/text vuln and ignore AWS vuln
+  * bump to latest go minor version to fix vulns
+  * Adding unit tests
+  * add make target for updating base images
+  * bump base / kind images
+  * re-order Helm parameters & move some values to constants
+  * feat: add commonLabels to webhook configmap
+  * Fixing CA flag in basic constraints extension
+  * feat(Azure): add support for workload identity
+  * fix: update scorecard not running
+  * Fire event for informational purposes when the CertificateRequest has not 
yet been approved.
+  * remove devel folder
+  * update base and kind images
+  * don't write to devel folder when updating kind images
+  * final update to old devel kind images
+  * minor language tweaks to README and ROADMAP
+  * Remove the old Helm chart for Vault
+  * [NIT] Changing variable name to denote right type
+  * [NIT] Changing variable name to denote right type
+  * use Vault Helm Chart provied by Hashicorp
+  * Add scorecard badge to README
+  * Add Scorecard Action yml
+
+-------------------------------------------------------------------

Old:
----
  cert-manager-1.10.2.tar.gz

New:
----
  cert-manager-1.11.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ cmctl.spec ++++++
--- /var/tmp/diff_new_pack.5rpVT6/_old  2023-01-12 22:44:55.009074970 +0100
+++ /var/tmp/diff_new_pack.5rpVT6/_new  2023-01-12 22:44:55.013074993 +0100
@@ -21,14 +21,14 @@
 %define archive_name cert-manager
 
 Name:           cmctl
-Version:        1.10.2
+Version:        1.11.0
 Release:        0
 Summary:        CLI tool that can help you to manage cert-manager resources 
inside your cluster
 License:        Apache-2.0
 URL:            https://github.com/cert-manager/cert-manager
 Source:         %{archive_name}-%{version}.tar.gz
 Source1:        vendor.tar.gz
-BuildRequires:  go >= 1.17
+BuildRequires:  go >= 1.19
 
 %description
 cmctl is a CLI tool that can help you to manage cert-manager resources inside 
your cluster.

++++++ _service ++++++
--- /var/tmp/diff_new_pack.5rpVT6/_old  2023-01-12 22:44:55.049075195 +0100
+++ /var/tmp/diff_new_pack.5rpVT6/_new  2023-01-12 22:44:55.049075195 +0100
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/cert-manager/cert-manager</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v1.10.2</param>
+    <param name="revision">v1.11.0</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>
@@ -16,7 +16,7 @@
     <param name="compression">gz</param>
   </service>
   <service name="go_modules" mode="disabled">
-    <param name="archive">cert-manager-1.10.2.tar.gz</param>
+    <param name="archive">cert-manager-1.11.0.tar.gz</param>
   </service>
 </services>
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.5rpVT6/_old  2023-01-12 22:44:55.069075307 +0100
+++ /var/tmp/diff_new_pack.5rpVT6/_new  2023-01-12 22:44:55.073075329 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/cert-manager/cert-manager</param>
-              <param 
name="changesrevision">707dcff96a26445c1f0897e9e623625695200eab</param></service></servicedata>
+              <param 
name="changesrevision">2a0ef53b06e183356d922cd58af2510d8885bef5</param></service></servicedata>
 (No newline at EOF)
 

++++++ cert-manager-1.10.2.tar.gz -> cert-manager-1.11.0.tar.gz ++++++
++++ 17179 lines of diff (skipped)

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/cmctl/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.cmctl.new.32243/vendor.tar.gz differ: char 5, line 1

Reply via email to