kcl-lang / flux-kcl-controller

Flux KCL Controller
https://kcl-lang.io
Apache License 2.0
22 stars 7 forks source link

chore(deps): bump github.com/fluxcd/source-controller/api from 1.3.0 to 1.4.0 in the flux-deps group #139

Closed dependabot[bot] closed 1 month ago

dependabot[bot] commented 1 month ago

Bumps the flux-deps group with 1 update: github.com/fluxcd/source-controller/api.

Updates github.com/fluxcd/source-controller/api from 1.3.0 to 1.4.0

Release notes

Sourced from github.com/fluxcd/source-controller/api's releases.

v1.4.0

Changelog

v1.4.0 changelog

Container images

  • docker.io/fluxcd/source-controller:v1.4.0
  • ghcr.io/fluxcd/source-controller:v1.4.0

Supported architectures: linux/amd64, linux/arm64 and linux/arm/v7.

The container images are built on GitHub hosted runners and are signed with cosign and GitHub OIDC. To verify the images and their provenance (SLSA level 3), please see the security documentation.

Changelog

Sourced from github.com/fluxcd/source-controller/api's changelog.

1.4.0

Release date: 2024-09-25

This minor release promotes the Bucket API to GA, and comes with new features, improvements and bug fixes.

Bucket

The Bucket API has been promoted from v1beta2 to v1 (GA). The v1 API is backwards compatible with v1beta2.

Bucket API now supports proxy through the field .spec.proxySecretRef and custom TLS client certificate and CA through the field .spec.certSecretRef.

Bucket API now also supports specifying a custom STS configuration through the field .spec.sts. This is currently only supported for the providers generic and aws. When specifying a custom STS configuration one must specify which STS provider to use. For the generic bucket provider we support the ldap STS provider, and for the aws bucket provider we support the aws STS provider. For the aws STS provider, one may use the default main STS endpoint, or the regional STS endpoints, or even an interface endpoint.

OCIRepository

OCIRepository API now supports proxy through the field .spec.proxySecretRef.

Warning: Proxy is not supported for cosign keyless verification.

GitRepository

GitRepository API now supports OIDC authentication for Azure DevOps repositories through the field .spec.provider using the value azure. See the docs for details here.

In addition, the Kubernetes dependencies have been updated to v1.31.1, Helm has been updated to v3.16.1 and various other controller dependencies have been updated to their latest version. The controller is now built with Go 1.23.

Fixes:

  • helm: Use the default transport pool to preserve proxy settings #1490
  • Fix incorrect use of format strings with the conditions package. #1529
  • Fix HelmChart local dependency resolution for name-based path #1539
  • Fix Helm index validation for Artifactory #1516

Improvements:

  • Promote Bucket API to v1 #1592
  • Add .spec.certSecretRef to Bucket API #1475
  • Run ARM64 tests on GitHub runners #1512
  • Add support for .spec.proxySecretRef for generic provider of Bucket API #1500
  • Improve invalid proxy error message for Bucket API

... (truncated)

Commits
  • e6e2b15 Merge pull request #1620 from fluxcd/release-v1.4.0
  • e920838 Release v1.4.0
  • c796f52 Add changelog entry for v1.4.0
  • 03889fe Merge pull request #1618 from fluxcd/dependabot/go_modules/go-deps-a9e873101f
  • 32bc10c build(deps): bump the go-deps group across 1 directory with 3 updates
  • ccdd523 Merge pull request #1614 from fluxcd/k8s-1.31.1
  • 1e6ddbc Update dependencies to Kubernetes 1.31.1
  • 852394e Merge pull request #1591 from dipti-pai/git-azure-oidc-auth
  • 48417bd Enable Azure OIDC for Azure DevOps Respository
  • 93253c7 Merge pull request #1610 from fluxcd/helm-3.16.0
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions