kubevirt / kubevirt-velero-plugin

Plugin to Velero which automates backing up and restoring KubeVirt/CDI objects
Apache License 2.0
26 stars 26 forks source link

Bump kubevirt.io/containerized-data-importer-api from 1.58.0 to 1.58.3 #233

Closed dependabot[bot] closed 3 months ago

dependabot[bot] commented 3 months ago

Bumps kubevirt.io/containerized-data-importer-api from 1.58.0 to 1.58.3.

Release notes

Sourced from kubevirt.io/containerized-data-importer-api's releases.

v1.58.3

This release follows v1.58.2 and consists of 2 changes, contributed by 2 people, leading to 9 files changed, 135 insertions(+), 11 deletions(-).

The source code and selected binaries are available for download at: https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.58.3.

Pre-built CDI containers are published on Quay.io and can be viewed at: https://quay.io/repository/kubevirt/cdi-controller/ https://quay.io/repository/kubevirt/cdi-importer/ https://quay.io/repository/kubevirt/cdi-cloner/ https://quay.io/repository/kubevirt/cdi-uploadproxy/ https://quay.io/repository/kubevirt/cdi-apiserver/ https://quay.io/repository/kubevirt/cdi-uploadserver/ https://quay.io/repository/kubevirt/cdi-operator/

Notable changes

BugFix: CNV-39618 - cdi.kubevirt.io/allowClaimAdoption annotation broken

Contributors

2 people contributed to this release:

     1   Alex Kalenyuk <akalenyu@redhat.com>
     1  Michael Henriksen <mhenriks@redhat.com>

Additional Resources

v1.58.2

This release follows v1.58.1 and consists of 9 changes, contributed by 4 people, leading to 48 files changed, 1169 insertions(+), 155 deletions(-).

The source code and selected binaries are available for download at: https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.58.2.

Pre-built CDI containers are published on Quay.io and can be viewed at: https://quay.io/repository/kubevirt/cdi-controller/ https://quay.io/repository/kubevirt/cdi-importer/

... (truncated)

Changelog

Sourced from kubevirt.io/containerized-data-importer-api's changelog.

v1.58.0 BugFix: Avoid crash of cdi-operator when CDI CR is deleted (#2856) BugFix: panic in /go/pkg/mod/k8s.io/client-go@v0.26.2/discovery/aggregated_discovery.go:88 (#2855) Enhancement: Increase deployment cpu requests to 100m. Configure controllers to handle concurrent requests (#2862) BugFix: Remove DataVolume reconcile error when storage class is not found yet (#2860) BugFix: Fix not passing priority class to populator pod (#2864) BugFix: Bump github.com/containers/image/v5 for resuming layer pulls after "unexpected EOF" and "connection reset by peer" errors (#2874) BugFix: Avoid creating snapshot of old storage class DataImportCron PVCs (#2837) BugFix: Global permissions [*] seen across CDI components (#2866) Enhancement: Allow modifying log verbosity in CDI (#2882) BugFix: Trident ontap-san supports RWX not just RWO (#2868) BugFix: Delete old version DV's with DIC garbage collector (#2749) BugFix: Add preferred ReadWriteMany, Filesystem capability to the pxd.portworx.com provisioner (#2789) BugFix: nil ptr in snapshot clone controller (#2900) BugFix: Allow the usage of AnnPodRetainAfterCompletion with populators (#2873) BugFix: wffc override not respected for blank block disks (#2917) Cleanup: "clone_progress" metric has been removed from the project documentation. exclude this metric from the documentation as it is intended for internal use only. (#2929) Enhancement: Default virtualization storage class that takes precedence over k8s default storage class (#2913) Cleanup: Updated to bazel 5.4.0 and golang 1.20.10 (#2934) Cleanup: Build with golang 1.20.10 (#2942)

v1.58.1 BugFix: Fix populators not repopulating pvc after it was deleted (#3071) BugFix: Fix DataImportCron PVC GC race and test flakiness (#3063) BugFix: Add Trident RWO Filesystem capability (#3051) BugFix: Extract regular files as well during clone from filesystem (#3046) Enhancement: Add new Prometheus alerts and label existing alerts (#3040) BugFix: Grant ns admin missing create RBAC for various CDI resources (#3031) BugFix: Update CDIMultipleDefaultVirtStorageClasses alert health impact labels to "none" (#3025) Enhancement: add .snyk file (#3016) BugFix: Add version field to the OpenAPI definition (#3014) BugFix: Fix Trident provisioner key for using csi-clone (#3008) Cleanup: Work around common snapshot controller issue in tests (#2996)

v1.58.2 Cleanup: Adapt test suite for Filesystem only advanced storage BugFix: StorageProfile ClaimPropertySets validation BugFix: Fix DataImportCron import DataVolume creation when last import is not found BugFix: Watch DataImportCron-orphan cronjobs and cleanup them Enhancement: cdi.kubevirt.io/garbageCollected added to PVCs when DataVolumes are garbage collected Enhancement: DataVolume supports PVC adoption via DataVolumeClaimAdoption feature gate and cdi.kubevirt.io/allowClaimAdoption annotation on PVC BugFix: Change CDI webhook failure policy to Ignore BugFix: Allow Deployed CDI to get out of Error Phase

v1.58.3 BugFix: CNV-39618 - cdi.kubevirt.io/allowClaimAdoption annotation broken

Commits
  • c2795b7 v1.58.3 release notes
  • becdd15 cdi.kubevirt.io/allowClaimAdoption annotation breaking "regular" operations (...
  • fac83da v1.58.2 release notes
  • 0cae433 [release-v1.58] Adapt test suite for Filesystem only advanced storage (#3102)
  • d5ad9b7 [release-v1.58] Fix StorageProfile ClaimPropertySets validation (#3099)
  • 4f7dbea [release-v1.58] Fix DIC DV creation when last import is not found (#3079)
  • 6c61efd [release-v1.58] Watch DIC-orphan cronjobs and cleanup them (#3120)
  • 8caaf57 add annotation cdi.kubevirt.io/garbageCollected to PVCs when DVs are garbage ...
  • 6d766c9 [release-v1.58] Feature Gate and annotation for PVCs to be "adopted" by DataV...
  • ec5fcfd Change CDI webhook failure policy to Ignore (#3091)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
kubevirt-bot commented 3 months ago

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: Once this PR has been reviewed and has the lgtm label, please assign awels for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files: - **[OWNERS](https://github.com/kubevirt/kubevirt-velero-plugin/blob/main/OWNERS)** Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
kubevirt-bot commented 3 months ago

Hi @dependabot[bot]. Thanks for your PR.

PRs from untrusted users cannot be marked as trusted with /ok-to-test in this repo meaning untrusted PR authors can never trigger tests themselves. Collaborators can still trigger tests on the PR using /test all.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.
dependabot[bot] commented 3 months ago

Superseded by #239.