kedacore / keda-olm-operator

Operator for deploying KEDA Controller on OperatorHub.io/OLM
Apache License 2.0
30 stars 23 forks source link

prepare release 2.13.1 #225

Closed joelsmith closed 1 month ago

joelsmith commented 1 month ago

Checklist

joelsmith commented 1 month ago

The failing functionality test seems to be a broken test. When I install the operator on a real cluster and exercise the same functionality of changing log levels and observing the operand deployments, everything works as expected. So something in this update appears to have broken the test.

github-actions[bot] commented 1 month ago

Diff 2.13.1/manifests/keda.sh_scaledjobs.yaml \& 2.12.1/manifests/keda.sh_scaledjobs.yaml

```diff 9c9 < app.kubernetes.io/version: 2.12.1 --- > app.kubernetes.io/version: 2.13.1 ```
github-actions[bot] commented 1 month ago

Diff 2.13.1/manifests/keda.sh_clustertriggerauthentications.yaml \& 2.12.1/manifests/keda.sh_clustertriggerauthentications.yaml

```diff 9c9 < app.kubernetes.io/version: 2.12.1 --- > app.kubernetes.io/version: 2.13.1 64a65,185 > awsSecretManager: > description: AwsSecretManager is used to authenticate using AwsSecretManager > properties: > credentials: > properties: > accessKey: > properties: > valueFrom: > properties: > secretKeyRef: > properties: > key: > type: string > name: > type: string > required: > - key > - name > type: object > required: > - secretKeyRef > type: object > required: > - valueFrom > type: object > accessSecretKey: > properties: > valueFrom: > properties: > secretKeyRef: > properties: > key: > type: string > name: > type: string > required: > - key > - name > type: object > required: > - secretKeyRef > type: object > required: > - valueFrom > type: object > accessToken: > properties: > valueFrom: > properties: > secretKeyRef: > properties: > key: > type: string > name: > type: string > required: > - key > - name > type: object > required: > - secretKeyRef > type: object > required: > - valueFrom > type: object > required: > - accessKey > - accessSecretKey > type: object > podIdentity: > description: AuthPodIdentity allows users to select the platform > native identity mechanism > properties: > identityId: > type: string > identityOwner: > description: IdentityOwner configures which identity has to > be used during auto discovery, keda or the scaled workload. > Mutually exclusive with roleArn > enum: > - keda > - workload > type: string > provider: > description: PodIdentityProvider contains the list of providers > enum: > - azure > - azure-workload > - gcp > - aws > - aws-eks > - aws-kiam > type: string > roleArn: > description: RoleArn sets the AWS RoleArn to be used. Mutually > exclusive with IdentityOwner > type: string > required: > - provider > type: object > region: > type: string > secrets: > items: > properties: > name: > type: string > parameter: > type: string > versionId: > type: string > versionStage: > type: string > required: > - name > - parameter > type: object > type: array > required: > - secrets > type: object 116a238,245 > identityOwner: > description: IdentityOwner configures which identity has to > be used during auto discovery, keda or the scaled workload. > Mutually exclusive with roleArn > enum: > - keda > - workload > type: string 118a248,258 > enum: > - azure > - azure-workload > - gcp > - aws > - aws-eks > - aws-kiam > type: string > roleArn: > description: RoleArn sets the AWS RoleArn to be used. Mutually > exclusive with IdentityOwner 142a283,299 > configMapTargetRef: > items: > description: AuthConfigMapTargetRef is used to authenticate using > a reference to a config map > properties: > key: > type: string > name: > type: string > parameter: > type: string > required: > - key > - name > - parameter > type: object > type: array 158a316,390 > gcpSecretManager: > properties: > credentials: > properties: > clientSecret: > properties: > valueFrom: > properties: > secretKeyRef: > properties: > key: > type: string > name: > type: string > required: > - key > - name > type: object > required: > - secretKeyRef > type: object > required: > - valueFrom > type: object > required: > - clientSecret > type: object > podIdentity: > description: AuthPodIdentity allows users to select the platform > native identity mechanism > properties: > identityId: > type: string > identityOwner: > description: IdentityOwner configures which identity has to > be used during auto discovery, keda or the scaled workload. > Mutually exclusive with roleArn > enum: > - keda > - workload > type: string > provider: > description: PodIdentityProvider contains the list of providers > enum: > - azure > - azure-workload > - gcp > - aws > - aws-eks > - aws-kiam > type: string > roleArn: > description: RoleArn sets the AWS RoleArn to be used. Mutually > exclusive with IdentityOwner > type: string > required: > - provider > type: object > secrets: > items: > properties: > id: > type: string > parameter: > type: string > version: > type: string > required: > - id > - parameter > type: object > type: array > required: > - secrets > type: object 194a427,446 > pkiData: > properties: > altNames: > type: string > commonName: > type: string > format: > type: string > ipSans: > type: string > otherSans: > type: string > ttl: > type: string > uriSans: > type: string > type: object > type: > description: VaultSecretType defines the type of vault secret > type: string 211a464,471 > identityOwner: > description: IdentityOwner configures which identity has to be > used during auto discovery, keda or the scaled workload. Mutually > exclusive with roleArn > enum: > - keda > - workload > type: string 213a474,484 > enum: > - azure > - azure-workload > - gcp > - aws > - aws-eks > - aws-kiam > type: string > roleArn: > description: RoleArn sets the AWS RoleArn to be used. Mutually > exclusive with IdentityOwner ```
github-actions[bot] commented 1 month ago

Diff 2.13.1/manifests/keda.sh_triggerauthentications.yaml \& 2.12.1/manifests/keda.sh_triggerauthentications.yaml

```diff 9c9 < app.kubernetes.io/version: 2.12.1 --- > app.kubernetes.io/version: 2.13.1 63a64,184 > awsSecretManager: > description: AwsSecretManager is used to authenticate using AwsSecretManager > properties: > credentials: > properties: > accessKey: > properties: > valueFrom: > properties: > secretKeyRef: > properties: > key: > type: string > name: > type: string > required: > - key > - name > type: object > required: > - secretKeyRef > type: object > required: > - valueFrom > type: object > accessSecretKey: > properties: > valueFrom: > properties: > secretKeyRef: > properties: > key: > type: string > name: > type: string > required: > - key > - name > type: object > required: > - secretKeyRef > type: object > required: > - valueFrom > type: object > accessToken: > properties: > valueFrom: > properties: > secretKeyRef: > properties: > key: > type: string > name: > type: string > required: > - key > - name > type: object > required: > - secretKeyRef > type: object > required: > - valueFrom > type: object > required: > - accessKey > - accessSecretKey > type: object > podIdentity: > description: AuthPodIdentity allows users to select the platform > native identity mechanism > properties: > identityId: > type: string > identityOwner: > description: IdentityOwner configures which identity has to > be used during auto discovery, keda or the scaled workload. > Mutually exclusive with roleArn > enum: > - keda > - workload > type: string > provider: > description: PodIdentityProvider contains the list of providers > enum: > - azure > - azure-workload > - gcp > - aws > - aws-eks > - aws-kiam > type: string > roleArn: > description: RoleArn sets the AWS RoleArn to be used. Mutually > exclusive with IdentityOwner > type: string > required: > - provider > type: object > region: > type: string > secrets: > items: > properties: > name: > type: string > parameter: > type: string > versionId: > type: string > versionStage: > type: string > required: > - name > - parameter > type: object > type: array > required: > - secrets > type: object 115a237,244 > identityOwner: > description: IdentityOwner configures which identity has to > be used during auto discovery, keda or the scaled workload. > Mutually exclusive with roleArn > enum: > - keda > - workload > type: string 117a247,257 > enum: > - azure > - azure-workload > - gcp > - aws > - aws-eks > - aws-kiam > type: string > roleArn: > description: RoleArn sets the AWS RoleArn to be used. Mutually > exclusive with IdentityOwner 141a282,298 > configMapTargetRef: > items: > description: AuthConfigMapTargetRef is used to authenticate using > a reference to a config map > properties: > key: > type: string > name: > type: string > parameter: > type: string > required: > - key > - name > - parameter > type: object > type: array 157a315,389 > gcpSecretManager: > properties: > credentials: > properties: > clientSecret: > properties: > valueFrom: > properties: > secretKeyRef: > properties: > key: > type: string > name: > type: string > required: > - key > - name > type: object > required: > - secretKeyRef > type: object > required: > - valueFrom > type: object > required: > - clientSecret > type: object > podIdentity: > description: AuthPodIdentity allows users to select the platform > native identity mechanism > properties: > identityId: > type: string > identityOwner: > description: IdentityOwner configures which identity has to > be used during auto discovery, keda or the scaled workload. > Mutually exclusive with roleArn > enum: > - keda > - workload > type: string > provider: > description: PodIdentityProvider contains the list of providers > enum: > - azure > - azure-workload > - gcp > - aws > - aws-eks > - aws-kiam > type: string > roleArn: > description: RoleArn sets the AWS RoleArn to be used. Mutually > exclusive with IdentityOwner > type: string > required: > - provider > type: object > secrets: > items: > properties: > id: > type: string > parameter: > type: string > version: > type: string > required: > - id > - parameter > type: object > type: array > required: > - secrets > type: object 193a426,445 > pkiData: > properties: > altNames: > type: string > commonName: > type: string > format: > type: string > ipSans: > type: string > otherSans: > type: string > ttl: > type: string > uriSans: > type: string > type: object > type: > description: VaultSecretType defines the type of vault secret > type: string 210a463,470 > identityOwner: > description: IdentityOwner configures which identity has to be > used during auto discovery, keda or the scaled workload. Mutually > exclusive with roleArn > enum: > - keda > - workload > type: string 212a473,483 > enum: > - azure > - azure-workload > - gcp > - aws > - aws-eks > - aws-kiam > type: string > roleArn: > description: RoleArn sets the AWS RoleArn to be used. Mutually > exclusive with IdentityOwner ```
github-actions[bot] commented 1 month ago

File 2.13.1/manifests/eventing.keda.sh_cloudeventsources.yaml wasn't found in previous version, its brand new!

github-actions[bot] commented 1 month ago

Diff 2.13.1/manifests/keda.sh_scaledobjects.yaml \& 2.12.1/manifests/keda.sh_scaledobjects.yaml

```diff 9c9 < app.kubernetes.io/version: 2.12.1 --- > app.kubernetes.io/version: 2.13.1 ```
github-actions[bot] commented 1 month ago

Diff 2.13.1/manifests/keda.v2.13.1.clusterserviceversion.yaml \& 2.12.1/manifests/keda.v2.12.1.clusterserviceversion.yaml

```diff 118c118 < containerImage: ghcr.io/kedacore/keda-olm-operator:2.12.1 --- > containerImage: ghcr.io/kedacore/keda-olm-operator:2.13.1 126c126 < name: keda.v2.12.1 --- > name: keda.v2.13.1 131a132,134 > - kind: CloudEventSource > name: cloudeventsources.eventing.keda.sh > version: v1alpha1 572c575,577 < - name: keda-olm-operator --- > - label: > app.kubernetes.io/part-of: keda-olm-operator > name: keda-olm-operator 599c604 < image: ghcr.io/kedacore/keda-olm-operator:2.12.1 --- > image: ghcr.io/kedacore/keda-olm-operator:2.13.1 671c676 < replaces: keda.v2.12.0 --- > replaces: keda.v2.12.1 673c678 < version: 2.12.1 --- > version: 2.13.1 ```