openshift / file-integrity-operator

Operator providing OpenShift cluster node file integrity checking
Apache License 2.0
31 stars 27 forks source link

Bump github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.68.0 to 0.70.0 #482

Closed dependabot[bot] closed 10 months ago

dependabot[bot] commented 11 months ago

Bumps github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.68.0 to 0.70.0.

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's releases.

0.70.0 / 2023-11-30

  • [CHANGE] Use camelCase on scrapeConfig in prometheus job names. #6124
  • [CHANGE] Update field names for ConsulSD configs. #6094
  • [FEATURE] Add trackTimestampsStaleness field to ServiceMonitor, PodMonitor and ScrapeConfig CRDs. #6105
  • [FEATURE] Add persistentVolumeClaimRetentionPolicy field to the Prometheus and PrometheusAgent CRDs. #6038
  • [FEATURE] Support service,pod,endpoints,endpointslice,ingress roles to KubernetesSDConfigs in ScrapeConfig CRD. #6089
  • [FEATURE] Add support for Azure SD and GCE SD in ScrapeConfig CRD. #6078 #6009
  • [FEATURE] Add azure AD oauth support to remote write. #6037
  • [FEATURE] Add .spec.reloadStrategy to the Prometheus and PrometheusAgent CRDs. The value can be HTTP (default if not specified) or ProcessSignal. #5690
  • [ENHANCEMENT] Expose flag to enable the reloader probes in the jsonnet configuration. #6075
  • [ENHANCEMENT] Reduce memory usage for clusters with large number of secrets and/or configmaps. #5993
  • [ENHANCEMENT] Config reloader now sends all logs to os.Stdout. #6085
  • [BUGFIX] Remove verbose logging in admission-webhook pods. #6095
  • [BUGFIX] Fixed HTTP scheme value in the Consul SD configurations. #6098
  • [BUGFIX] Skip adding shard relabel rules if they were already set in additionalScrapeConfigs. #6099
  • [BUGFIX] Fix nil pointer exception when title and text are not set in MS Teams config. #6109

0.69.1 / 2023-11-09

This release is built using Go 1.21.4 which addresses CVE-2023-45283 and CVE-2023-45284.

  • [BUGFIX] Rename test files to resolve Go import failures of github.com/prometheus-operator/prometheus-operator. #6070

0.69.0 / 2023-11-03

  • [CHANGE] Consider secret references without optional value to be mandatory instead of optional for .spec.additionalScrapeConfigs configs. #5985
  • [CHANGE] Remove prometheus_operator_rule_validation_triggered_total, prometheus_operator_rule_validation_errors_total, prometheus_operator_alertmanager_config_validation_triggered_total and prometheus_operator_alertmanager_config_validation_errors_total metrics which have been deprecated since v0.55.0. The same information is available from the apiserver_admission_webhook_rejection_count metric available since Kubernetes v1.16.0. #6024
  • [CHANGE/BUGFIX] Disable HTTP2 connections by default to mitigate CVE-2023-44487. #6028
  • [FEATURE] Add support for EC2 service discovery to the ScrapeConfig CRD. #5902 #6012
  • [FEATURE] Support MSTeams receiver in the AlertmanagerConfig CRD. #6002
  • [FEATURE] Add the sigv4 field to the Alertmanager endpoints for the Prometheus CRD. #6036
  • [FEATURE] Support AzureAD authentication for Prometheus remote write. #5852
  • [FEATURE] Add the userKeyFile and tokenFile fields for Pushover to the AlertmanagerConfig CRD. #5886
  • [FEATURE] Add --as to the operator's CLI arguments for user impersonation. #5906
  • [FEATURE] Add the selectors field for the Kubernetes service discovery to the ScrapeConfig CRD. #6053
  • [ENHANCEMENT] Support url_file for Webhook receiver in the Alertmanager configuration. #5876
  • [ENHANCEMENT] Support user_key_file and token_file for Pushover receiver in the Alertmanager configuration. #5876
  • [ENHANCEMENT] Use server-side apply instead of update when reconciling the resource's status. #5883 #5913 #5912
  • [ENHANCEMENT] Detect when an invalid storage class is defined. #5792
  • [ENHANCEMENT] Add OCI labels to container images. #5946
  • [ENHANCEMENT] Add the operator.prometheus.io/version annotation to the CRD manifests. #6050
  • [BUGFIX] Detect namespace changes without list/watch permissions on the namespace resources. #5934 #5898
  • [BUGFIX] Avoid operator panic when using ScrapeConfig with the Consul service discovery. #5937
  • [BUGFIX] Don't enable Prometheus unmanaged mode when only .spec.scrapeConfigSelector is defined. #5941
  • [BUGFIX] Prevent Alertmanager pods from joining random clusters. #5945
  • [BUGFIX] Fix race condition when deleting Alertmanager, Prometheus, PrometheusAgent and ThanosRuler instances. #5954
  • [BUGFIX] Enable klog verbose level only when the log level is debug.. #5981
  • [BUGFIX] Reduce memory usage by using secret metadata informer in the PrometheusAgent controller. #5982
  • [BUGFIX] Do not strip mandatory fields in the stripped-down-crds.yaml manifest file. #6008
  • [BUGFIX] Update the resource requests and limits of the config reloader sidecar when updated. #5971
Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's changelog.

0.70.0 / 2023-11-30

  • [CHANGE] Use camelCase on scrapeConfig in prometheus job names. #6124
  • [CHANGE] Update field names for ConsulSD configs. #6094
  • [FEATURE] Add trackTimestampsStaleness field to ServiceMonitor, PodMonitor and ScrapeConfig CRDs. #6105
  • [FEATURE] Add persistentVolumeClaimRetentionPolicy field to the Prometheus and PrometheusAgent CRDs. #6038
  • [FEATURE] Support service,pod,endpoints,endpointslice,ingress roles to KubernetesSDConfigs in ScrapeConfig CRD. #6089
  • [FEATURE] Add support for Azure SD and GCE SD in ScrapeConfig CRD. #6078 #6009
  • [FEATURE] Add azure AD oauth support to remote write. #6037
  • [FEATURE] Add .spec.reloadStrategy to the Prometheus and PrometheusAgent CRDs. The value can be HTTP (default if not specified) or ProcessSignal. #5690
  • [ENHANCEMENT] Expose flag to enable the reloader probes in the jsonnet configuration. #6075
  • [ENHANCEMENT] Reduce memory usage for clusters with large number of secrets and/or configmaps. #5993
  • [ENHANCEMENT] Config reloader now sends all logs to os.Stdout. #6085
  • [BUGFIX] Remove verbose logging in admission-webhook pods. #6095
  • [BUGFIX] Fixed HTTP scheme value in the Consul SD configurations. #6098
  • [BUGFIX] Skip adding shard relabel rules if they were already set in additionalScrapeConfigs. #6099
  • [BUGFIX] Fix nil pointer exception when title and text are not set in MS Teams config. #6109

0.69.1 / 2023-11-09

This release is built using Go 1.21.4 which addresses CVE-2023-45283 and CVE-2023-45284.

  • [BUGFIX] Rename test files to resolve Go import failures of github.com/prometheus-operator/prometheus-operator. #6070

0.69.0 / 2023-11-03

  • [CHANGE] Consider secret references without optional value to be mandatory instead of optional for .spec.additionalScrapeConfigs configs. #5985
  • [CHANGE] Remove prometheus_operator_rule_validation_triggered_total, prometheus_operator_rule_validation_errors_total, prometheus_operator_alertmanager_config_validation_triggered_total and prometheus_operator_alertmanager_config_validation_errors_total metrics which have been deprecated since v0.55.0. The same information is available from the apiserver_admission_webhook_rejection_count metric available since Kubernetes v1.16.0. #6024
  • [CHANGE/BUGFIX] Disable HTTP2 connections by default to mitigate CVE-2023-44487. #6028
  • [FEATURE] Add support for EC2 service discovery to the ScrapeConfig CRD. #5902 #6012
  • [FEATURE] Support MSTeams receiver in the AlertmanagerConfig CRD. #6002
  • [FEATURE] Add the sigv4 field to the Alertmanager endpoints for the Prometheus CRD. #6036
  • [FEATURE] Support AzureAD authentication for Prometheus remote write. #5852
  • [FEATURE] Add the userKeyFile and tokenFile fields for Pushover to the AlertmanagerConfig CRD. #5886
  • [FEATURE] Add --as to the operator's CLI arguments for user impersonation. #5906
  • [FEATURE] Add the selectors field for the Kubernetes service discovery to the ScrapeConfig CRD. #6053
  • [ENHANCEMENT] Support url_file for Webhook receiver in the Alertmanager configuration. #5876
  • [ENHANCEMENT] Support user_key_file and token_file for Pushover receiver in the Alertmanager configuration. #5876
  • [ENHANCEMENT] Use server-side apply instead of update when reconciling the resource's status. #5883 #5913 #5912
  • [ENHANCEMENT] Detect when an invalid storage class is defined. #5792
  • [ENHANCEMENT] Add OCI labels to container images. #5946
  • [ENHANCEMENT] Add the operator.prometheus.io/version annotation to the CRD manifests. #6050
  • [BUGFIX] Detect namespace changes without list/watch permissions on the namespace resources. #5934 #5898
  • [BUGFIX] Avoid operator panic when using ScrapeConfig with the Consul service discovery. #5937
  • [BUGFIX] Don't enable Prometheus unmanaged mode when only .spec.scrapeConfigSelector is defined. #5941
  • [BUGFIX] Prevent Alertmanager pods from joining random clusters. #5945
  • [BUGFIX] Fix race condition when deleting Alertmanager, Prometheus, PrometheusAgent and ThanosRuler instances. #5954
  • [BUGFIX] Enable klog verbose level only when the log level is debug.. #5981
  • [BUGFIX] Reduce memory usage by using secret metadata informer in the PrometheusAgent controller. #5982
  • [BUGFIX] Do not strip mandatory fields in the stripped-down-crds.yaml manifest file. #6008

... (truncated)

Commits
  • c2c673f *: release 0.70
  • c67c951 *: bump dependencies
  • 2fc4faf Update stale workflow to close stale PRs (#6119)
  • a3e501d Merge pull request #6125 from prometheus-operator/dependabot/go_modules/golan...
  • e3fe536 build(deps): bump golang.org/x/net from 0.18.0 to 0.19.0
  • e2d5527 Merge pull request #6124 from perylemke/fix-scrapeconfig
  • a036183 scrapeConfig: Change to camelCase on scrapeConfig
  • 1d00063 Merge pull request #6121 from simonpasquier/split-endpoints-controller
  • ffd2f20 Merge pull request #5690 from simonpasquier/reload-via-signal
  • a143c8d feat: enable config reload via signal
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
openshift-ci[bot] commented 11 months ago

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.
openshift-ci[bot] commented 11 months ago

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot] Once this PR has been reviewed and has the lgtm label, please assign rhmdnd for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files: - **[OWNERS](https://github.com/openshift/file-integrity-operator/blob/master/OWNERS)** Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
openshift-ci[bot] commented 11 months ago

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-bundle-aws-upgrade f70fa019d2abea86d8d2395f9f440edc471e647b link true /test e2e-bundle-aws-upgrade
ci/prow/e2e-bundle-aws f70fa019d2abea86d8d2395f9f440edc471e647b link true /test e2e-bundle-aws
ci/prow/ci-index-file-integrity-operator-bundle f70fa019d2abea86d8d2395f9f440edc471e647b link true /test ci-index-file-integrity-operator-bundle
ci/prow/images f70fa019d2abea86d8d2395f9f440edc471e647b link true /test images
ci/prow/e2e-aws f70fa019d2abea86d8d2395f9f440edc471e647b link true /test e2e-aws

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository. I understand the commands that are listed [here](https://go.k8s.io/bot-commands).
dependabot[bot] commented 10 months ago

Superseded by #490.