openshift / file-integrity-operator

Operator providing OpenShift cluster node file integrity checking
Apache License 2.0
31 stars 27 forks source link

Bump github.com/prometheus-operator/prometheus-operator/pkg/client from 0.68.0 to 0.71.1 #495

Closed dependabot[bot] closed 9 months ago

dependabot[bot] commented 9 months ago

Bumps github.com/prometheus-operator/prometheus-operator/pkg/client from 0.68.0 to 0.71.1.

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's releases.

v0.71.1 / 2024-01-22

  • [BUGFIX] Pass all the ThanosRuler .spec.volumes fields down to the pods. #6249

0.71.0 / 2024-01-12

  • [CHANGE] Configure the configuration reloader sidecar with the same web configuration as Prometheus and Alertmanager. #6194
  • [FEATURE] Implement the Scale subresource for the Prometheus and PrometheusAgent CRDs. #5962
  • [FEATURE] Add support for OpenStack Service Discovery to the ScrapeConfig CRD. #6168
  • [FEATURE] Add support for all settings of the Kubernetes Service Discovery to the ScrapeConfig CRD. #6178
  • [FEATURE] Add support for proxy settings to the ScrapeConfig CRD. #6001
  • [FEATURE] Add the enableHTTP2 field to remote-write configuration. #6192
  • [FEATURE] Add .spec.maximumStartupDurationSeconds to the Prometheus and PrometheusAgent CRDs. #6137
  • [FEATURE] Emit Kubernetes events when detecting invalid configurations. #6179
  • [ENHANCEMENT] Add additionalLabels field to topology spread constraints for Prometheus and PrometheusAgent CRD. #5967
  • [ENHANCEMENT] Add .spec.clusterLabel to the Alertmanager CRD. #6162
  • [ENHANCEMENT] Add prometheus_operator_status_update_errors_total and prometheus_operator_status_update_operations_total metrics. #6185

0.70.0 / 2023-11-30

  • [CHANGE] Use camelCase on scrapeConfig in prometheus job names. #6124
  • [CHANGE] Update field names for ConsulSD configs. #6094
  • [FEATURE] Add trackTimestampsStaleness field to ServiceMonitor, PodMonitor and ScrapeConfig CRDs. #6105
  • [FEATURE] Add persistentVolumeClaimRetentionPolicy field to the Prometheus and PrometheusAgent CRDs. #6038
  • [FEATURE] Support service,pod,endpoints,endpointslice,ingress roles to KubernetesSDConfigs in ScrapeConfig CRD. #6089
  • [FEATURE] Add support for Azure SD and GCE SD in ScrapeConfig CRD. #6078 #6009
  • [FEATURE] Add azure AD oauth support to remote write. #6037
  • [FEATURE] Add .spec.reloadStrategy to the Prometheus and PrometheusAgent CRDs. The value can be HTTP (default if not specified) or ProcessSignal. #5690
  • [ENHANCEMENT] Expose flag to enable the reloader probes in the jsonnet configuration. #6075
  • [ENHANCEMENT] Reduce memory usage for clusters with large number of secrets and/or configmaps. #5993
  • [ENHANCEMENT] Config reloader now sends all logs to os.Stdout. #6085
  • [BUGFIX] Remove verbose logging in admission-webhook pods. #6095
  • [BUGFIX] Fixed HTTP scheme value in the Consul SD configurations. #6098
  • [BUGFIX] Skip adding shard relabel rules if they were already set in additionalScrapeConfigs. #6099
  • [BUGFIX] Fix nil pointer exception when title and text are not set in MS Teams config. #6109

0.69.1 / 2023-11-09

This release is built using Go 1.21.4 which addresses CVE-2023-45283 and CVE-2023-45284.

  • [BUGFIX] Rename test files to resolve Go import failures of github.com/prometheus-operator/prometheus-operator. #6070

0.69.0 / 2023-11-03

  • [CHANGE] Consider secret references without optional value to be mandatory instead of optional for .spec.additionalScrapeConfigs configs. #5985
  • [CHANGE] Remove prometheus_operator_rule_validation_triggered_total, prometheus_operator_rule_validation_errors_total, prometheus_operator_alertmanager_config_validation_triggered_total and prometheus_operator_alertmanager_config_validation_errors_total metrics which have been deprecated since v0.55.0. The same information is available from the apiserver_admission_webhook_rejection_count metric available since Kubernetes v1.16.0. #6024
  • [CHANGE/BUGFIX] Disable HTTP2 connections by default to mitigate CVE-2023-44487. #6028
  • [FEATURE] Add support for EC2 service discovery to the ScrapeConfig CRD. #5902 #6012
  • [FEATURE] Support MSTeams receiver in the AlertmanagerConfig CRD. #6002
  • [FEATURE] Add the sigv4 field to the Alertmanager endpoints for the Prometheus CRD. #6036
  • [FEATURE] Support AzureAD authentication for Prometheus remote write. #5852
  • [FEATURE] Add the userKeyFile and tokenFile fields for Pushover to the AlertmanagerConfig CRD. #5886
  • [FEATURE] Add --as to the operator's CLI arguments for user impersonation. #5906
  • [FEATURE] Add the selectors field for the Kubernetes service discovery to the ScrapeConfig CRD. #6053
  • [ENHANCEMENT] Support url_file for Webhook receiver in the Alertmanager configuration. #5876

... (truncated)

Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's changelog.

0.71.1 / 2024-01-22

  • [BUGFIX] Pass all the ThanosRuler .spec.volumes fields down to the pods. #6249

0.71.0 / 2024-01-12

  • [CHANGE] Configure the configuration reloader sidecar with the same web configuration as Prometheus and Alertmanager. #6194
  • [FEATURE] Implement the Scale subresource for the Prometheus and PrometheusAgent CRDs. #5962
  • [FEATURE] Add support for OpenStack Service Discovery to the ScrapeConfig CRD. #6168
  • [FEATURE] Add support for all settings of the Kubernetes Service Discovery to the ScrapeConfig CRD. #6178
  • [FEATURE] Add support for proxy settings to the ScrapeConfig CRD. #6001
  • [FEATURE] Add the enableHTTP2 field to remote-write configuration. #6192
  • [FEATURE] Add .spec.maximumStartupDurationSeconds to the Prometheus and PrometheusAgent CRDs. #6137
  • [FEATURE] Emit Kubernetes events when detecting invalid configurations. #6179
  • [ENHANCEMENT] Add additionalLabels field to topology spread constraints for Prometheus and PrometheusAgent CRD. #5967
  • [ENHANCEMENT] Add .spec.clusterLabel to the Alertmanager CRD. #6162
  • [ENHANCEMENT] Add prometheus_operator_status_update_errors_total and prometheus_operator_status_update_operations_total metrics. #6185

0.70.0 / 2023-11-30

  • [CHANGE] Use camelCase on scrapeConfig in prometheus job names. #6124
  • [CHANGE] Update field names for ConsulSD configs. #6094
  • [FEATURE] Add trackTimestampsStaleness field to ServiceMonitor, PodMonitor and ScrapeConfig CRDs. #6105
  • [FEATURE] Add persistentVolumeClaimRetentionPolicy field to the Prometheus and PrometheusAgent CRDs. #6038
  • [FEATURE] Support service,pod,endpoints,endpointslice,ingress roles to KubernetesSDConfigs in ScrapeConfig CRD. #6089
  • [FEATURE] Add support for Azure SD and GCE SD in ScrapeConfig CRD. #6078 #6009
  • [FEATURE] Add azure AD oauth support to remote write. #6037
  • [FEATURE] Add .spec.reloadStrategy to the Prometheus and PrometheusAgent CRDs. The value can be HTTP (default if not specified) or ProcessSignal. #5690
  • [ENHANCEMENT] Expose flag to enable the reloader probes in the jsonnet configuration. #6075
  • [ENHANCEMENT] Reduce memory usage for clusters with large number of secrets and/or configmaps. #5993
  • [ENHANCEMENT] Config reloader now sends all logs to os.Stdout. #6085
  • [BUGFIX] Remove verbose logging in admission-webhook pods. #6095
  • [BUGFIX] Fixed HTTP scheme value in the Consul SD configurations. #6098
  • [BUGFIX] Skip adding shard relabel rules if they were already set in additionalScrapeConfigs. #6099
  • [BUGFIX] Fix nil pointer exception when title and text are not set in MS Teams config. #6109

0.69.1 / 2023-11-09

This release is built using Go 1.21.4 which addresses CVE-2023-45283 and CVE-2023-45284.

  • [BUGFIX] Rename test files to resolve Go import failures of github.com/prometheus-operator/prometheus-operator. #6070

0.69.0 / 2023-11-03

  • [CHANGE] Consider secret references without optional value to be mandatory instead of optional for .spec.additionalScrapeConfigs configs. #5985
  • [CHANGE] Remove prometheus_operator_rule_validation_triggered_total, prometheus_operator_rule_validation_errors_total, prometheus_operator_alertmanager_config_validation_triggered_total and prometheus_operator_alertmanager_config_validation_errors_total metrics which have been deprecated since v0.55.0. The same information is available from the apiserver_admission_webhook_rejection_count metric available since Kubernetes v1.16.0. #6024
  • [CHANGE/BUGFIX] Disable HTTP2 connections by default to mitigate CVE-2023-44487. #6028
  • [FEATURE] Add support for EC2 service discovery to the ScrapeConfig CRD. #5902 #6012
  • [FEATURE] Support MSTeams receiver in the AlertmanagerConfig CRD. #6002
  • [FEATURE] Add the sigv4 field to the Alertmanager endpoints for the Prometheus CRD. #6036

... (truncated)

Commits
  • 86a2557 Merge pull request #6251 from simonpasquier/cut-0.71.1
  • 6b50c8c chore: cut v0.71.1
  • c6d0c8d Merge pull request #6249 from SamKirsch10/release-0.71
  • 9100540 ruler: add subpath to volumeMounts if specified (#6243)
  • 9c26b6a chore: cut v0.71.0 (#6223)
  • b2863a4 feat: add support for remaining fields in Kubernetes SD (#6178)
  • 0502a00 Merge pull request #6222 from simonpasquier/fix-http2-fieldname
  • b5bbe3b chore: fix field name to comply with conventions
  • 9a34675 Add scale subresource to Prometheus/PrometheusAgent (#5962)
  • dc0e71c feat: support the operator make use of the config-reloader tls and basic auth...
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
openshift-ci[bot] commented 9 months ago

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.
openshift-ci[bot] commented 9 months ago

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot] Once this PR has been reviewed and has the lgtm label, please assign rhmdnd for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files: - **[OWNERS](https://github.com/openshift/file-integrity-operator/blob/master/OWNERS)** Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
openshift-ci[bot] commented 9 months ago

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws 93d9af66318c19d18a4f1679278834b55a975298 link true /test e2e-aws
ci/prow/e2e-bundle-aws 93d9af66318c19d18a4f1679278834b55a975298 link true /test e2e-bundle-aws
ci/prow/ci-index-file-integrity-operator-bundle 93d9af66318c19d18a4f1679278834b55a975298 link true /test ci-index-file-integrity-operator-bundle
ci/prow/images 93d9af66318c19d18a4f1679278834b55a975298 link true /test images
ci/prow/e2e-bundle-aws-upgrade 93d9af66318c19d18a4f1679278834b55a975298 link true /test e2e-bundle-aws-upgrade

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository. I understand the commands that are listed [here](https://go.k8s.io/bot-commands).
dependabot[bot] commented 9 months ago

Superseded by #497.