openshift / file-integrity-operator

Operator providing OpenShift cluster node file integrity checking
Apache License 2.0
31 stars 27 forks source link

Bump github.com/prometheus-operator/prometheus-operator/pkg/client from 0.75.2 to 0.76.0 #557

Closed dependabot[bot] closed 3 weeks ago

dependabot[bot] commented 1 month ago

Bumps github.com/prometheus-operator/prometheus-operator/pkg/client from 0.75.2 to 0.76.0.

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's releases.

v0.76.0

0.76.0 / 2025-08-08

  • [CHANGE] Enhanced secret management in Prometheus and PrometheusAgent CRDs by switching the secrets field from atomic to listType: set, allowing independent handling of entries by different managers to prevent conflicts and improve deployment stability. #6762
  • [CHANGE] Add API-level validations to Kubernetes SD in the ScrapeConfig CRD. #6678
  • [FEATURE] Add TLS and Proxy settings to OAuth2 configuration for Prometheus and PrometheusAgent CRDs. #6735
  • [FEATURE] Add support for OAuth2 in the ScrapeConfig CRD. #6814
  • [FEATURE] Add scale subresource to the Alertmanger CRD. #6728
  • [FEATURE] Add Scaleway service discovery to the ScrapeConfig CRD. #6711
  • [FEATURE] Add serviceDiscoveryRole field to the Prometheus and PrometheusAgent CRDs to select between Endpoints (default) and EndpointSlice for discovering scrape and alerting targets. #6672
  • [ENHANCEMENT] Make the namespace field optional in the Alertmanager endpoints configuration of the Prometheus CRD, if not defined it will use the default namespace. #6338
  • [ENHANCEMENT] Add support to configure the TLS version for Prometheus, PrometheusAgent and Alertmanager CRDs. #6736
  • [ENHANCEMENT] Add -secret-label-selector argument to the operator to filter the Secrets being watched. #6731
  • [ENHANCEMENT] Add attachMetadata field to ScrapeClasses. #6756
  • [BUGFIX] Add support for all proxy settings in the Alertmanager configuration. #6818
Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's changelog.

0.76.0 / 2025-08-08

[CHANGE] Enhanced secret management in Prometheus and PrometheusAgent CRDs by switching the secrets field from atomic to listType: set, allowing independent handling of entries by different managers to prevent conflicts and improve deployment stability. #6762 [CHANGE] Add API-level validations to Kubernetes SD in the ScrapeConfig CRD. #6678 [FEATURE] Add TLS and Proxy settings to OAuth2 configuration for Prometheus and PrometheusAgent CRDs. #6735 [FEATURE] Add support for OAuth2 in the ScrapeConfig CRD. #6814 [FEATURE] Add scale subresource to the Alertmanger CRD. #6728 [FEATURE] Add Scaleway service discovery to the ScrapeConfig CRD. #6711 [FEATURE] Add serviceDiscoveryRole field to the Prometheus and PrometheusAgent CRDs to select between Endpoints (default) and EndpointSlice for discovering scrape and alerting targets. #6672 [ENHANCEMENT] Make the namespace field optional in the Alertmanager endpoints configuration of the Prometheus CRD, if not defined it will use the default namespace. #6338 [ENHANCEMENT] Add support to configure the TLS version for Prometheus, PrometheusAgent and Alertmanager CRDs. #6736 [ENHANCEMENT] Add -secret-label-selector argument to the operator to filter the Secrets being watched. #6731 [ENHANCEMENT] Add attachMetadata field to ScrapeClasses. #6756 [BUGFIX] Add support for all proxy settings in the Alertmanager configuration. #6818

Commits
  • 022a289 Merge pull request #6834 from prometheus-operator/nicolas/prepare-0.76
  • e12ef9a Update CHANGELOG.md
  • 1565ea0 Update CHANGELOG.md
  • 2ea3a03 Update CHANGELOG.md
  • 7da8459 [CHORE] updating change log
  • 46076a5 [CHORE] generating templates 0.76
  • 6b6c773 [CHORE] upgrading prometheus
  • 6ad25e9 [CHORE] updating dependencies
  • a7a1ad6 Merge pull request #6827 from prometheus-operator/arthur-affiliation
  • 99f737f chore: replace go kit log in alertmanager package (#6828)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
openshift-ci[bot] commented 1 month ago

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes-sigs/prow](https://github.com/kubernetes-sigs/prow/issues/new?title=Prow%20issue:) repository.
openshift-ci[bot] commented 1 month ago

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot] Once this PR has been reviewed and has the lgtm label, please assign yuumasato for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files: - **[OWNERS](https://github.com/openshift/file-integrity-operator/blob/master/OWNERS)** Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
openshift-ci[bot] commented 1 month ago

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-rosa a18de3afbada2150acff811547390fa34a4327e5 link false /test e2e-rosa
ci/prow/e2e-bundle-aws a18de3afbada2150acff811547390fa34a4327e5 link true /test e2e-bundle-aws

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes-sigs/prow](https://github.com/kubernetes-sigs/prow/issues/new?title=Prow%20issue:) repository. I understand the commands that are listed [here](https://go.k8s.io/bot-commands).
dependabot[bot] commented 3 weeks ago

Superseded by #563.