openshift / file-integrity-operator

Operator providing OpenShift cluster node file integrity checking
Apache License 2.0
31 stars 27 forks source link

Bump github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.68.0 to 0.69.0 #470

Closed dependabot[bot] closed 1 year ago

dependabot[bot] commented 1 year ago

Bumps github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.68.0 to 0.69.0.

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's releases.

0.69.0 / 2023-11-03

  • [CHANGE] Consider secret references without optional value to be mandatory instead of optional for .spec.additionalScrapeConfigs configs. #5985
  • [CHANGE] Remove prometheus_operator_rule_validation_triggered_total, prometheus_operator_rule_validation_errors_total, prometheus_operator_alertmanager_config_validation_triggered_total and prometheus_operator_alertmanager_config_validation_errors_total metrics which have been deprecated since v0.55.0. The same information is available from the apiserver_admission_webhook_rejection_count metric available since Kubernetes v1.16.0. #6024
  • [CHANGE/BUGFIX] Disable HTTP2 connections by default to mitigate CVE-2023-44487. #6028
  • [FEATURE] Add support for EC2 service discovery to the ScrapeConfig CRD. #5902 #6012
  • [FEATURE] Support MSTeams receiver in the AlertmanagerConfig CRD. #6002
  • [FEATURE] Add the sigv4 field to the Alertmanager endpoints for the Prometheus CRD. #6036
  • [FEATURE] Support AzureAD authentication for Prometheus remote write. #5852
  • [FEATURE] Add the userKeyFile and tokenFile fields for Pushover to the AlertmanagerConfig CRD. #5886
  • [FEATURE] Add --as to the operator's CLI arguments for user impersonation. #5906
  • [FEATURE] Add the selectors field for the Kubernetes service discovery to the ScrapeConfig CRD. #6053
  • [ENHANCEMENT] Support url_file for Webhook receiver in the Alertmanager configuration. #5876
  • [ENHANCEMENT] Support user_key_file and token_file for Pushover receiver in the Alertmanager configuration. #5876
  • [ENHANCEMENT] Use server-side apply instead of update when reconciling the resource's status. #5883 #5913 #5912
  • [ENHANCEMENT] Detect when an invalid storage class is defined. #5792
  • [ENHANCEMENT] Add OCI labels to container images. #5946
  • [ENHANCEMENT] Add the operator.prometheus.io/version annotation to the CRD manifests. #6050
  • [BUGFIX] Detect namespace changes without list/watch permissions on the namespace resources. #5934 #5898
  • [BUGFIX] Avoid operator panic when using ScrapeConfig with the Consul service discovery. #5937
  • [BUGFIX] Don't enable Prometheus unmanaged mode when only .spec.scrapeConfigSelector is defined. #5941
  • [BUGFIX] Prevent Alertmanager pods from joining random clusters. #5945
  • [BUGFIX] Fix race condition when deleting Alertmanager, Prometheus, PrometheusAgent and ThanosRuler instances. #5954
  • [BUGFIX] Enable klog verbose level only when the log level is debug.. #5981
  • [BUGFIX] Reduce memory usage by using secret metadata informer in the PrometheusAgent controller. #5982
  • [BUGFIX] Do not strip mandatory fields in the stripped-down-crds.yaml manifest file. #6008
  • [BUGFIX] Update the resource requests and limits of the config reloader sidecar when updated. #5971
Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's changelog.

0.69.0 / 2023-11-03

  • [CHANGE] Consider secret references without optional value to be mandatory instead of optional for .spec.additionalScrapeConfigs configs. #5985
  • [CHANGE] Remove prometheus_operator_rule_validation_triggered_total, prometheus_operator_rule_validation_errors_total, prometheus_operator_alertmanager_config_validation_triggered_total and prometheus_operator_alertmanager_config_validation_errors_total metrics which have been deprecated since v0.55.0. The same information is available from the apiserver_admission_webhook_rejection_count metric available since Kubernetes v1.16.0. #6024
  • [CHANGE/BUGFIX] Disable HTTP2 connections by default to mitigate CVE-2023-44487. #6028
  • [FEATURE] Add support for EC2 service discovery to the ScrapeConfig CRD. #5902 #6012
  • [FEATURE] Support MSTeams receiver in the AlertmanagerConfig CRD. #6002
  • [FEATURE] Add the sigv4 field to the Alertmanager endpoints for the Prometheus CRD. #6036
  • [FEATURE] Support AzureAD authentication for Prometheus remote write. #5852
  • [FEATURE] Add the userKeyFile and tokenFile fields for Pushover to the AlertmanagerConfig CRD. #5886
  • [FEATURE] Add --as to the operator's CLI arguments for user impersonation. #5906
  • [FEATURE] Add the selectors field for the Kubernetes service discovery to the ScrapeConfig CRD. #6053
  • [ENHANCEMENT] Support url_file for Webhook receiver in the Alertmanager configuration. #5876
  • [ENHANCEMENT] Support user_key_file and token_file for Pushover receiver in the Alertmanager configuration. #5876
  • [ENHANCEMENT] Use server-side apply instead of update when reconciling the resource's status. #5883 #5913 #5912
  • [ENHANCEMENT] Detect when an invalid storage class is defined. #5792
  • [ENHANCEMENT] Add OCI labels to container images. #5946
  • [ENHANCEMENT] Add the operator.prometheus.io/version annotation to the CRD manifests. #6050
  • [BUGFIX] Detect namespace changes without list/watch permissions on the namespace resources. #5934 #5898
  • [BUGFIX] Avoid operator panic when using ScrapeConfig with the Consul service discovery. #5937
  • [BUGFIX] Don't enable Prometheus unmanaged mode when only .spec.scrapeConfigSelector is defined. #5941
  • [BUGFIX] Prevent Alertmanager pods from joining random clusters. #5945
  • [BUGFIX] Fix race condition when deleting Alertmanager, Prometheus, PrometheusAgent and ThanosRuler instances. #5954
  • [BUGFIX] Enable klog verbose level only when the log level is debug.. #5981
  • [BUGFIX] Reduce memory usage by using secret metadata informer in the PrometheusAgent controller. #5982
  • [BUGFIX] Do not strip mandatory fields in the stripped-down-crds.yaml manifest file. #6008
  • [BUGFIX] Update the resource requests and limits of the config reloader sidecar when updated. #5971
Commits
  • f0b85f3 Merge pull request #6062 from simonpasquier/cut-v0.69.0
  • 3d0df24 Merge pull request #6064 from slashpai/webhookfix
  • 374f4b3 fix: remove verbose logging admission-webhook
  • fc2a36d chore: cut v0.69.0
  • 45185c8 docs: overriding behavior for common labels (#5699)
  • dbfcf7a feat: Add --web-config-file flag to the config reloader (#6011)
  • fca0075 Merge pull request #6053 from slashpai/node-discovery
  • c2fe7a8 feat: support Selectors field in kubernetes SD
  • ddfea89 enhancement: include operator version in CRD annotations (#6050)
  • 63e15b7 Merge pull request #6039 from adinhodovic/add-node-to-minikube-docs
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
openshift-ci[bot] commented 1 year ago

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.
openshift-ci[bot] commented 1 year ago

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot] Once this PR has been reviewed and has the lgtm label, please assign rhmdnd for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files: - **[OWNERS](https://github.com/openshift/file-integrity-operator/blob/master/OWNERS)** Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
openshift-ci[bot] commented 1 year ago

@dependabot[bot]: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository. I understand the commands that are listed [here](https://go.k8s.io/bot-commands).
dependabot[bot] commented 1 year ago

Superseded by #477.