openshift / file-integrity-operator

Operator providing OpenShift cluster node file integrity checking
Apache License 2.0
31 stars 27 forks source link

Bump github.com/prometheus-operator/prometheus-operator/pkg/client from 0.65.2 to 0.67.0 #411

Closed dependabot[bot] closed 1 year ago

dependabot[bot] commented 1 year ago

Bumps github.com/prometheus-operator/prometheus-operator/pkg/client from 0.65.2 to 0.67.0.

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's releases.

0.67.0 / 2023-07-27

  • [FEATURE] Add spec.scheme field to the ScrapeConfig CRD. #5679
  • [FEATURE] Add spec.params field to the ScrapeConfig CRD. #5750
  • [FEATURE] Add spec.scrapeInterval and spec.scrapeTimeout fields to the ScrapeConfig CRD. #5742
  • [FEATURE] Add support for TLS configuration to the ScrapeConfig CRD. #5710
  • [FEATURE] Add support for scrape limits to the ScrapeConfig CRD. #5658
  • [FEATURE] Add support for Kubernetes node service discovery to the ScrapeConfig CRD. #5675
  • [FEATURE] Add support for Consul service discovery to the ScrapeConfig CRD. #5709
  • [FEATURE] Add support for ScrapeConfig objects to spec.excludedFromEnforcement (Prometheus CRD). #5577
  • [FEATURE] Add support for global scrape limits to the Prometheus CRD. #5646
  • [FEATURE] Add spec.alertmanagerConfiguration.smtp field to the Alertmanager CRD. #5649
  • [FEATURE] Add support for Discord integration to the AlertmanagerConfig CRD. #5671
  • [ENHANCEMENT] (jsonnet) expose resource settings for the reloader. #5768
  • [BUGFIX] Avoid deadlock of the config reloader when the initial configuration is invalid. #5743
  • [BUGFIX] Reload the Alertmanager configuration when templates are modified. #5727

0.66.0 / 2023-06-14

After research, we noticed how the default CPU requests of the config-reloader container were too high compared to the effective usage. We decided to decrease the default CPU requests from 100m to 10m. For most environments, this won't make a difference but if you need to increase the values, you can use the -config-reloader-cpu-request and -config-reloader-cpu-limit CLI arguments of the Prometheus operator.

  • [CHANGE] Decrease the default CPU requests for the config-reloader container from 100m to 10m. #5539
  • [FEATURE] Add spec.alertmanagerConfiguration.global.PagerdutyURL to the Alertmanager CRD. #5469
  • [FEATURE] Add spec.volumeMounts to the ThanosRuler CRD. #5541
  • [FEATURE] Add spec.remoteWrite.sendNativeHistograms to Prometheus and PrometheusAgent CRDs. #5564
  • [FEATURE] Add spec.tracingConfig to Prometheus and PrometheusAgent CRDs. #5591 #5640
  • [FEATURE] Add followRedirects field to the RemoteRead configuration. #5612
  • [FEATURE] Add spec.automountServiceAccountToken to the Alertmanager CRD. #5474
  • [FEATURE] Support keep_firing_for fields for PrometheusRule CRD. #5651
  • [FEATURE] Allow to add custom annotations to all resources managed by the operator. #5626
  • [FEATURE] Add BasicAuth and Authorization support to ScrapeConfig CRD. #5642
  • [ENHANCEMENT] Add -kubelet-selector CLI argument to filter the Kubernetes nodes by labels. #5641
  • [BUGFIX] Fix bug with logs that don't end with new line(\n) characters. #5566
  • [BUGFIX] Fix Prometheus and Alertmanager not picking up the web server's certificate after renewal. #5535
  • [BUGFIX] Fix config-reloader not handling SIGTERM signal. #5617
  • [BUGFIX] Fix Thanos volume name when using VolumeClaimTemplate in Prometheus CRD. #5596
  • [BUGFIX] Fix WAL Compression configuration for PrometheusAgent CRD. #5625
  • [BUGFIX] Fix DNS name resolution for individual ThanosRuler pods. #5632
Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's changelog.

0.67.0 / 2023-07-27

  • [FEATURE] Add spec.scheme field to the ScrapeConfig CRD. #5679
  • [FEATURE] Add spec.params field to the ScrapeConfig CRD. #5750
  • [FEATURE] Add spec.scrapeInterval and spec.scrapeTimeout fields to the ScrapeConfig CRD. #5742
  • [FEATURE] Add support for TLS configuration to the ScrapeConfig CRD. #5710
  • [FEATURE] Add support for scrape limits to the ScrapeConfig CRD. #5658
  • [FEATURE] Add support for Kubernetes node service discovery to the ScrapeConfig CRD. #5675
  • [FEATURE] Add support for Consul service discovery to the ScrapeConfig CRD. #5709
  • [FEATURE] Add support for ScrapeConfig objects to spec.excludedFromEnforcement (Prometheus CRD). #5577
  • [FEATURE] Add support for global scrape limits to the Prometheus CRD. #5646
  • [FEATURE] Add spec.alertmanagerConfiguration.smtp field to the Alertmanager CRD. #5649
  • [FEATURE] Add support for Discord integration to the AlertmanagerConfig CRD. #5671
  • [ENHANCEMENT] (jsonnet) expose resource settings for the reloader. #5768
  • [BUGFIX] Avoid deadlock of the config reloader when the initial configuration is invalid. #5743
  • [BUGFIX] Reload the Alertmanager configuration when templates are modified. #5727

0.66.0 / 2023-06-14

After research, we noticed how the default CPU requests of the config-reloader container were too high compared to the effective usage. We decided to decrease the default CPU requests from 100m to 10m. For most environments, this won't make a difference but if you need to increase the values, you can use the -config-reloader-cpu-request and -config-reloader-cpu-limit CLI arguments of the Prometheus operator.

  • [CHANGE] Decrease the default CPU requests for the config-reloader container from 100m to 10m. #5539
  • [FEATURE] Add spec.alertmanagerConfiguration.global.PagerdutyURL to the Alertmanager CRD. #5469
  • [FEATURE] Add spec.volumeMounts to the ThanosRuler CRD. #5541
  • [FEATURE] Add spec.remoteWrite.sendNativeHistograms to Prometheus and PrometheusAgent CRDs. #5564
  • [FEATURE] Add spec.tracingConfig to Prometheus and PrometheusAgent CRDs. #5591 #5640
  • [FEATURE] Add followRedirects field to the RemoteRead configuration. #5612
  • [FEATURE] Add spec.automountServiceAccountToken to the Alertmanager CRD. #5474
  • [FEATURE] Support keep_firing_for fields for PrometheusRule CRD. #5651
  • [FEATURE] Allow to add custom annotations to all resources managed by the operator. #5626
  • [FEATURE] Add BasicAuth and Authorization support to ScrapeConfig CRD. #5642
  • [ENHANCEMENT] Add -kubelet-selector CLI argument to filter the Kubernetes nodes by labels. #5641
  • [BUGFIX] Fix bug with logs that don't end with new line(\n) characters. #5566
  • [BUGFIX] Fix Prometheus and Alertmanager not picking up the web server's certificate after renewal. #5535
  • [BUGFIX] Fix config-reloader not handling SIGTERM signal. #5617
  • [BUGFIX] Fix Thanos volume name when using VolumeClaimTemplate in Prometheus CRD. #5596
  • [BUGFIX] Fix WAL Compression configuration for PrometheusAgent CRD. #5625
  • [BUGFIX] Fix DNS name resolution for individual ThanosRuler pods. #5632
Commits
  • ffd897f Merge pull request #5775 from simonpasquier/fix-go-mod-files
  • 5ee0029 chore: bump prometheus-operator in go.mod files
  • 9c58119 Merge pull request #5774 from simonpasquier/cut-0.67.0
  • 71d804b chore: cut v0.67.0
  • 93b2161 Merge pull request #5742 from slashpai/scrape_time
  • b3a9e47 feat: Add scrape{interval,timeout} to ScrapeConfig
  • c5ca520 Merge pull request #5577 from mcbenjemaa/scrapeconfig-resource
  • 43c9e40 Merge pull request #5750 from slashpai/http-params
  • 12b69b5 build(deps): bump github.com/prometheus/prometheus from 0.45.0 to 0.46.0 (#5771)
  • 15bb515 pkg/apis: Add params to ScrapeConfig
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
openshift-ci[bot] commented 1 year ago

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.
openshift-ci[bot] commented 1 year ago

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot] Once this PR has been reviewed and has the lgtm label, please assign vincent056 for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files: - **[OWNERS](https://github.com/openshift/file-integrity-operator/blob/master/OWNERS)** Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
openshift-ci[bot] commented 1 year ago

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/verify 7faebd6f1d890ab8eea9a564eb4403c9fb0b3c63 link true /test verify
ci/prow/e2e-bundle-aws 7faebd6f1d890ab8eea9a564eb4403c9fb0b3c63 link true /test e2e-bundle-aws
ci/prow/unit 7faebd6f1d890ab8eea9a564eb4403c9fb0b3c63 link true /test unit
ci/prow/images 7faebd6f1d890ab8eea9a564eb4403c9fb0b3c63 link true /test images
ci/prow/ci-index-file-integrity-operator-bundle 7faebd6f1d890ab8eea9a564eb4403c9fb0b3c63 link true /test ci-index-file-integrity-operator-bundle
ci/prow/e2e-aws 7faebd6f1d890ab8eea9a564eb4403c9fb0b3c63 link true /test e2e-aws
ci/prow/e2e-bundle-aws-upgrade 7faebd6f1d890ab8eea9a564eb4403c9fb0b3c63 link true /test e2e-bundle-aws-upgrade

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository. I understand the commands that are listed [here](https://go.k8s.io/bot-commands).
dependabot[bot] commented 1 year ago

Superseded by #415.