openshift / file-integrity-operator

Operator providing OpenShift cluster node file integrity checking
Apache License 2.0
31 stars 27 forks source link

Bump github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.75.2 to 0.76.1 #564

Closed dependabot[bot] closed 2 months ago

dependabot[bot] commented 2 months ago

Bumps github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.75.2 to 0.76.1.

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's releases.

v0.76.1

  • [BUGFIX] fix bug with Kubernetes service discovery Selector.Role field. #6896

v0.76.0

0.76.0 / 2025-08-08

  • [CHANGE] Enhanced secret management in Prometheus and PrometheusAgent CRDs by switching the secrets field from atomic to listType: set, allowing independent handling of entries by different managers to prevent conflicts and improve deployment stability. #6762
  • [CHANGE] Add API-level validations to Kubernetes SD in the ScrapeConfig CRD. #6678
  • [FEATURE] Add TLS and Proxy settings to OAuth2 configuration for Prometheus and PrometheusAgent CRDs. #6735
  • [FEATURE] Add support for OAuth2 in the ScrapeConfig CRD. #6814
  • [FEATURE] Add scale subresource to the Alertmanger CRD. #6728
  • [FEATURE] Add Scaleway service discovery to the ScrapeConfig CRD. #6711
  • [FEATURE] Add serviceDiscoveryRole field to the Prometheus and PrometheusAgent CRDs to select between Endpoints (default) and EndpointSlice for discovering scrape and alerting targets. #6672
  • [ENHANCEMENT] Make the namespace field optional in the Alertmanager endpoints configuration of the Prometheus CRD, if not defined it will use the default namespace. #6338
  • [ENHANCEMENT] Add support to configure the TLS version for Prometheus, PrometheusAgent and Alertmanager CRDs. #6736
  • [ENHANCEMENT] Add -secret-label-selector argument to the operator to filter the Secrets being watched. #6731
  • [ENHANCEMENT] Add attachMetadata field to ScrapeClasses. #6756
  • [BUGFIX] Add support for all proxy settings in the Alertmanager configuration. #6818
Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's changelog.

0.76.1 / 2025-09-03

  • [BUGFIX] fix bug with Kubernetes service discovery Selector.Role field. #6896

0.76.0 / 2025-08-08

[CHANGE] Enhanced secret management in Prometheus and PrometheusAgent CRDs by switching the secrets field from atomic to listType: set, allowing independent handling of entries by different managers to prevent conflicts and improve deployment stability. #6762 [CHANGE] Add API-level validations to Kubernetes SD in the ScrapeConfig CRD. #6678 [FEATURE] Add TLS and Proxy settings to OAuth2 configuration for Prometheus and PrometheusAgent CRDs. #6735 [FEATURE] Add support for OAuth2 in the ScrapeConfig CRD. #6814 [FEATURE] Add scale subresource to the Alertmanger CRD. #6728 [FEATURE] Add Scaleway service discovery to the ScrapeConfig CRD. #6711 [FEATURE] Add serviceDiscoveryRole field to the Prometheus and PrometheusAgent CRDs to select between Endpoints (default) and EndpointSlice for discovering scrape and alerting targets. #6672 [ENHANCEMENT] Make the namespace field optional in the Alertmanager endpoints configuration of the Prometheus CRD, if not defined it will use the default namespace. #6338 [ENHANCEMENT] Add support to configure the TLS version for Prometheus, PrometheusAgent and Alertmanager CRDs. #6736 [ENHANCEMENT] Add -secret-label-selector argument to the operator to filter the Secrets being watched. #6731 [ENHANCEMENT] Add attachMetadata field to ScrapeClasses. #6756 [BUGFIX] Add support for all proxy settings in the Alertmanager configuration. #6818

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
openshift-ci[bot] commented 2 months ago

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes-sigs/prow](https://github.com/kubernetes-sigs/prow/issues/new?title=Prow%20issue:) repository.
openshift-ci[bot] commented 2 months ago

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot] Once this PR has been reviewed and has the lgtm label, please assign xiaojiey for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files: - **[OWNERS](https://github.com/openshift/file-integrity-operator/blob/master/OWNERS)** Approvers can indicate their approval by writing `/approve` in a comment Approvers can cancel approval by writing `/approve cancel` in a comment
openshift-ci[bot] commented 2 months ago

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/verify 926a9e2c652a5901c117669b2df89398347ff46d link true /test verify
ci/prow/unit 926a9e2c652a5901c117669b2df89398347ff46d link true /test unit
ci/prow/e2e-rosa 926a9e2c652a5901c117669b2df89398347ff46d link false /test e2e-rosa
ci/prow/e2e-bundle-aws 926a9e2c652a5901c117669b2df89398347ff46d link true /test e2e-bundle-aws

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes-sigs/prow](https://github.com/kubernetes-sigs/prow/issues/new?title=Prow%20issue:) repository. I understand the commands that are listed [here](https://go.k8s.io/bot-commands).
dependabot[bot] commented 2 months ago

Superseded by #570.