service/glue: Updates service API and documentation
Adding RowFilter in the response for GetUnfilteredTableMetadata API
service/internetmonitor: Updates service API, documentation, and paginators
service/personalize: Updates service API and documentation
Release v1.51.24 (2024-04-18)
Service Client Updates
service/drs: Updates service API and documentation
service/emr-serverless: Updates service API and documentation
service/guardduty: Updates service API and documentation
Added IPv6Address fields for local and remote IP addresses
service/quicksight: Updates service API and documentation
This release adds support for the Cross Sheet Filter and Control features, and support for warnings in asset imports for any permitted errors encountered during execution
service/rolesanywhere: Updates service API and documentation
service/sagemaker: Updates service API and documentation
Removed deprecated enum values and updated API documentation.
service/workspaces: Updates service API, documentation, and paginators
Adds new APIs for managing and sharing WorkSpaces BYOL configuration across accounts.
Release v1.51.23 (2024-04-17)
Service Client Updates
service/ec2: Updates service documentation
Documentation updates for Elastic Compute Cloud (EC2).
service/qbusiness: Updates service API and documentation
Release v1.51.22 (2024-04-16)
Service Client Updates
service/bedrock-agent: Updates service API and documentation
service/emr-serverless: Updates service API and documentation
service/entityresolution: Updates service API, documentation, and paginators
service/iotwireless: Updates service API and documentation
service/lakeformation: Updates service API and documentation
service/m2: Updates service API and documentation
service/mediapackagev2: Updates service API and documentation
service/outposts: Updates service API, documentation, and paginators
service/wellarchitected: Updates service API and documentation
The maintainers and contributors to go-ceph are pleased to announce the v0.27.0 release. This is another great step towards making it possible to use the power of the Ceph APIs in the Go language.
As this is a v0.x release we do not guarantee backwards compatibility with previous versions of the code. However, we aim not to disrupt existing consumers of the library and thus make an effort not to immediately implement breaking changes without very good justification. Please see the "Deprecations & Removals" section (if present) to get a sense of what you can expect to change in the future and prepare your code ahead of time. You may also want to view "Deprecations & Removals" of previous releases as they are not repeated here. All newly introduced APIs in the following section are labeled as "preview" APIs first, and are only available if the ceph_preview build tag is set. There is explicitly no backwards compatibility guaranteed for these until they are labeled as "stable" in a later release.
secrets/ssh: removal of the deprecated dynamic keys mode. When any remaining dynamic key leases expire, an error stating secret is unsupported by this backend will be thrown by the lease manager. [GH-18874]
CHANGES:
auth/alicloud: require the role field on login [GH-19005]
auth/approle: Add maximum length of 4096 for approle role_names, as this value results in HMAC calculation [GH-17768]
auth: Returns invalid credentials for ldap, userpass and approle when wrong credentials are provided for existent users.
This will only be used internally for implementing user lockout. [GH-17104]
core: Bump Go version to 1.20.1.
core: Vault version has been moved out of sdk and into main vault module.
Plugins using sdk/useragent.String must instead use sdk/useragent.PluginString. [GH-14229]
logging: Removed legacy environment variable for log format ('LOGXI_FORMAT'), should use 'VAULT_LOG_FORMAT' instead [GH-17822]
plugins: Mounts can no longer be pinned to a specific builtin version. Mounts previously pinned to a specific builtin version will now automatically upgrade to the latest builtin version, and may now be overridden if an unversioned plugin of the same name and type is registered. Mounts using plugin versions without builtin in their metadata remain unaffected. [GH-18051]
plugins: GET /database/config/:name endpoint now returns an additional plugin_version field in the response data. [GH-16982]
plugins: GET /sys/auth/:path/tune and GET /sys/mounts/:path/tune endpoints may now return an additional plugin_version field in the response data if set. [GH-17167]
plugins: GET for /sys/auth, /sys/auth/:path, /sys/mounts, and /sys/mounts/:path paths now return additional plugin_version, running_plugin_version and running_sha256 fields in the response data for each mount. [GH-17167]
sdk: Remove version package, make useragent.String versionless. [GH-19068]
secrets/aws: do not create leases for non-renewable/non-revocable STS credentials to reduce storage calls [GH-15869]
secrets/gcpkms: Updated plugin from v0.13.0 to v0.14.0 [GH-19063]
sys/internal/inspect: Turns of this endpoint by default. A SIGHUP can now be used to reload the configs and turns this endpoint on.
Azure Auth Managed Identities: Allow any Azure resource that supports managed identities to authenticate with Vault [GH-19077]
Azure Auth Rotate Root: Add support for rotate root in Azure Auth engine [GH-19077]
Event System (Alpha): Vault has a new opt-in experimental event system. Not yet suitable for production use. Events are currently only generated on writes to the KV secrets engine, but external plugins can also be updated to start generating events. [GH-19194]
GCP Secrets Impersonated Account Support: Add support for GCP service account impersonation, allowing callers to generate a GCP access token without requiring Vault to store or retrieve a GCP service account key for each role. [GH-19018]
Kubernetes Secrets Engine UI: Kubernetes is now available in the UI as a supported secrets engine. [GH-17893]
New PKI UI: Add beta support for new and improved PKI UI [GH-18842]
PKI Cross-Cluster Revocations: Revocation information can now be
synchronized across primary and performance replica clusters offering
a unified CRL/OCSP view of revocations across cluster boundaries. [GH-19196]
Server UDS Listener: Adding listener to Vault server to serve http request via unix domain socket [GH-18227]
Transit managed keys: The transit secrets engine now supports configuring and using managed keys
User Lockout: Adds support to configure the user-lockout behaviour for failed logins to prevent
brute force attacks for userpass, approle and ldap auth methods. [GH-19230]
VMSS Flex Authentication: Adds support for Virtual Machine Scale Set Flex Authentication [GH-19077]
Namespaces (enterprise): Added the ability to allow access to secrets and more to be shared across namespaces that do not share a namespace hierarchy. Using the new sys/config/group-policy-application API, policies can be configured to apply outside of namespace hierarchy, allowing this kind of cross-namespace sharing.
OpenAPI-based Go & .NET Client Libraries (Beta): We have now made available two new OpenAPI-based Go & .NET Client libraries (beta). You can use them to perform various secret management operations easily from your applications.
IMPROVEMENTS:
Redis ElastiCache DB Engine: Renamed configuration parameters for disambiguation; old parameters still supported for compatibility. [GH-18752]
secrets/ssh: removal of the deprecated dynamic keys mode. When any remaining dynamic key leases expire, an error stating secret is unsupported by this backend will be thrown by the lease manager. [GH-18874]
auth/approle: When using the Vault and Vault Enterprise (Vault) approle auth method, any authenticated user with access to the /auth/approle/role/:role_name/secret-id-accessor/destroy endpoint can destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability, CVE-2023-24999 has been fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above. [HSEC-2023-07]
CHANGES:
auth/alicloud: require the role field on login [GH-19005]
auth/approle: Add maximum length of 4096 for approle role_names, as this value results in HMAC calculation [GH-17768]
auth: Returns invalid credentials for ldap, userpass and approle when wrong credentials are provided for existent users.
This will only be used internally for implementing user lockout. [GH-17104]
core: Bump Go version to 1.20.1.
core: Vault version has been moved out of sdk and into main vault module.
Plugins using sdk/useragent.String must instead use sdk/useragent.PluginString. [GH-14229]
logging: Removed legacy environment variable for log format ('LOGXI_FORMAT'), should use 'VAULT_LOG_FORMAT' instead [GH-17822]
plugins: Mounts can no longer be pinned to a specific builtin version. Mounts previously pinned to a specific builtin version will now automatically upgrade to the latest builtin version, and may now be overridden if an unversioned plugin of the same name and type is registered. Mounts using plugin versions without builtin in their metadata remain unaffected. [GH-18051]
plugins: GET /database/config/:name endpoint now returns an additional plugin_version field in the response data. [GH-16982]
plugins: GET /sys/auth/:path/tune and GET /sys/mounts/:path/tune endpoints may now return an additional plugin_version field in the response data if set. [GH-17167]
plugins: GET for /sys/auth, /sys/auth/:path, /sys/mounts, and /sys/mounts/:path paths now return additional plugin_version, running_plugin_version and running_sha256 fields in the response data for each mount. [GH-17167]
sdk: Remove version package, make useragent.String versionless. [GH-19068]
secrets/aws: do not create leases for non-renewable/non-revocable STS credentials to reduce storage calls [GH-15869]
secrets/gcpkms: Updated plugin from v0.13.0 to v0.14.0 [GH-19063]
sys/internal/inspect: Turns of this endpoint by default. A SIGHUP can now be used to reload the configs and turns this endpoint on.
User lockout: Ignore repeated bad credentials from the same user for a configured period of time. Enabled by default.
Azure Auth Managed Identities: Allow any Azure resource that supports managed identities to authenticate with Vault [GH-19077]
Azure Auth Rotate Root: Add support for rotate root in Azure Auth engine [GH-19077]
Event System (Alpha): Vault has a new opt-in experimental event system. Not yet suitable for production use. Events are currently only generated on writes to the KV secrets engine, but external plugins can also be updated to start generating events. [GH-19194]
GCP Secrets Impersonated Account Support: Add support for GCP service account impersonation, allowing callers to generate a GCP access token without requiring Vault to store or retrieve a GCP service account key for each role. [GH-19018]
Kubernetes Secrets Engine UI: Kubernetes is now available in the UI as a supported secrets engine. [GH-17893]
New PKI UI: Add beta support for new and improved PKI UI [GH-18842]
PKI Cross-Cluster Revocations: Revocation information can now be
synchronized across primary and performance replica clusters offering
a unified CRL/OCSP view of revocations across cluster boundaries. [GH-19196]
Server UDS Listener: Adding listener to Vault server to serve http request via unix domain socket [GH-18227]
Transit managed keys: The transit secrets engine now supports configuring and using managed keys
User Lockout: Adds support to configure the user-lockout behaviour for failed logins to prevent
brute force attacks for userpass, approle and ldap auth methods. [GH-19230]
VMSS Flex Authentication: Adds support for Virtual Machine Scale Set Flex Authentication [GH-19077]
Namespaces (enterprise): Added the ability to allow access to secrets and more to be shared across namespaces that do not share a namespace hierarchy. Using the new sys/config/group-policy-application API, policies can be configured to apply outside of namespace hierarchy, allowing this kind of cross-namespace sharing.
OpenAPI-based Go & .NET Client Libraries (Beta): We have now made available two new [OpenAPI-based Go] & [OpenAPI-based .NET] Client libraries (beta). You can use them to perform various secret management operations easily from your applications.
[BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #6495
0.73.0 / 2024-04-03
[CHANGE/BUGFIX] Add proxyURL validation for ServiceMonitor, PodMonitor and Probe objects. It could be a breaking change for those who rely on the configuration reloader sidecar to expand environment variables in the generated configuration file.#6464
[CHANGE/BUGFIX] Allow empty separator in relabel config. #6425
[FEATURE] Add summary field to the MSteams receiver. #6206
[FEATURE] Add support for Kuma SD in ScrapeConfig CRD. #6427,#6465
[FEATURE] Add support for Eureka SD in ScrapeConfig CRD. #6408
[FEATURE] Add support for Docker SD in ScrapeConfig CRD. #6421
[FEATURE] Add support for Hetzner SD in ScrapeConfig CRD. #6436
[FEATURE] Add the --kubelet-node-address-priority CLI argument to set the node address priority. #6377
[FEATURE] Add relabelings field to scrape classes. #6379
[FEATURE] Add bodySizeLimit field to the ServiceMonitor and PodMonitor CRDs. #6349
[FEATURE] Add sampleAgeLimit field to the remote-write configuration. #6326
[ENHANCEMENT] Verify which CRDs are installed and start the respective controllers only when needed. #6351
[ENHANCEMENT] Add checks for selectors in KubernetesSDConfig. #6359
[BUGFIX] Fix ScrapeConfigs selection issue across different namespaces. #6390
[BUGFIX] Add check to determine if Thanos supports the --prometheus.http-client flag. #6448
[BUGFIX] Fix PrometheusAgent reconciliation when the secret/configmap's namespace is different from the PrometheusAgent namespace. #6412
[BUGFIX] Fix the validation for muteTimeIntervals's months in the AlertmanagerConfig CRD. #6362
[BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #6495
0.73.0 / 2024-04-03
[CHANGE/BUGFIX] Add proxyURL validation for ServiceMonitor, PodMonitor and Probe objects. It could be a breaking change for those who rely on the configuration reloader sidecar to expand environment variables in the generated configuration file.#6464
[CHANGE/BUGFIX] Allow empty separator in relabel config. #6425
[FEATURE] Add summary field to the MSteams receiver. #6206
[FEATURE] Add support for Kuma SD in ScrapeConfig CRD. #6427,#6465
[FEATURE] Add support for Eureka SD in ScrapeConfig CRD. #6408
[FEATURE] Add support for Docker SD in ScrapeConfig CRD. #6421
[FEATURE] Add support for Hetzner SD in ScrapeConfig CRD. #6436
[FEATURE] Add the --kubelet-node-address-priority CLI argument to set the node address priority. #6377
[FEATURE] Add relabelings field to scrape classes. #6379
[FEATURE] Add bodySizeLimit field to the ServiceMonitor and PodMonitor CRDs. #6349
[FEATURE] Add sampleAgeLimit field to the remote-write configuration. #6326
[ENHANCEMENT] Verify which CRDs are installed and start the respective controllers only when needed. #6351
[ENHANCEMENT] Add checks for selectors in KubernetesSDConfig. #6359
[BUGFIX] Fix ScrapeConfigs selection issue across different namespaces. #6390
[BUGFIX] Add check to determine if Thanos supports the --prometheus.http-client flag. #6448
[BUGFIX] Fix PrometheusAgent reconciliation when the secret/configmap's namespace is different from the PrometheusAgent namespace. #6412
[BUGFIX] Fix the validation for muteTimeIntervals's months in the AlertmanagerConfig CRD. #6362
Commits
20beb0b Merge pull request #6527 from slashpai/cut-0.73.2
[BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #6495
0.73.0 / 2024-04-03
[CHANGE/BUGFIX] Add proxyURL validation for ServiceMonitor, PodMonitor and Probe objects. It could be a breaking change for those who rely on the configuration reloader sidecar to expand environment variables in the generated configuration file.#6464
[CHANGE/BUGFIX] Allow empty separator in relabel config. #6425
[FEATURE] Add summary field to the MSteams receiver. #6206
[FEATURE] Add support for Kuma SD in ScrapeConfig CRD. #6427,#6465
[FEATURE] Add support for Eureka SD in ScrapeConfig CRD. #6408
[FEATURE] Add support for Docker SD in ScrapeConfig CRD. #6421
[FEATURE] Add support for Hetzner SD in ScrapeConfig CRD. #6436
[FEATURE] Add the --kubelet-node-address-priority CLI argument to set the node address priority. #6377
[FEATURE] Add relabelings field to scrape classes. #6379
[FEATURE] Add bodySizeLimit field to the ServiceMonitor and PodMonitor CRDs. #6349
[FEATURE] Add sampleAgeLimit field to the remote-write configuration. #6326
[ENHANCEMENT] Verify which CRDs are installed and start the respective controllers only when needed. #6351
[ENHANCEMENT] Add checks for selectors in KubernetesSDConfig. #6359
[BUGFIX] Fix ScrapeConfigs selection issue across different namespaces. #6390
[BUGFIX] Add check to determine if Thanos supports the --prometheus.http-client flag. #6448
[BUGFIX] Fix PrometheusAgent reconciliation when the secret/configmap's namespace is different from the PrometheusAgent namespace. #6412
[BUGFIX] Fix the validation for muteTimeIntervals's months in the AlertmanagerConfig CRD. #6362
[BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #6495
0.73.0 / 2024-04-03
[CHANGE/BUGFIX] Add proxyURL validation for ServiceMonitor, PodMonitor and Probe objects. It could be a breaking change for those who rely on the configuration reloader sidecar to expand environment variables in the generated configuration file.#6464
[CHANGE/BUGFIX] Allow empty separator in relabel config. #6425
[FEATURE] Add summary field to the MSteams receiver. #6206
[FEATURE] Add support for Kuma SD in ScrapeConfig CRD. #6427,#6465
[FEATURE] Add support for Eureka SD in ScrapeConfig CRD. #6408
[FEATURE] Add support for Docker SD in ScrapeConfig CRD. #6421
[FEATURE] Add support for Hetzner SD in ScrapeConfig CRD. #6436
[FEATURE] Add the --kubelet-node-address-priority CLI argument to set the node address priority. #6377
[FEATURE] Add relabelings field to scrape classes. #6379
[FEATURE] Add bodySizeLimit field to the ServiceMonitor and PodMonitor CRDs. #6349
[FEATURE] Add sampleAgeLimit field to the remote-write configuration. #6326
[ENHANCEMENT] Verify which CRDs are installed and start the respective controllers only when needed. #6351
[ENHANCEMENT] Add checks for selectors in KubernetesSDConfig. #6359
[BUGFIX] Fix ScrapeConfigs selection issue across different namespaces. #6390
[BUGFIX] Add check to determine if Thanos supports the --prometheus.http-client flag. #6448
[BUGFIX] Fix PrometheusAgent reconciliation when the secret/configmap's namespace is different from the PrometheusAgent namespace. #6412
[BUGFIX] Fix the validation for muteTimeIntervals's months in the AlertmanagerConfig CRD. #6362
Commits
20beb0b Merge pull request #6527 from slashpai/cut-0.73.2
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
- `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency
- `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
- `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
- `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
- `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency
- `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
Bumps the github-dependencies group with 7 updates:
0.12.2
0.13.0
1.51.11
1.51.25
0.26.0
0.27.0
1.12.2
1.13.0
1.6.0
1.7.0
0.72.0
0.73.2
0.72.0
0.73.2
Updates
github.com/IBM/keyprotect-go-client
from 0.12.2 to 0.13.0Release notes
Sourced from github.com/IBM/keyprotect-go-client's releases.
Commits
ef8a971
add info to contributing about the semantic release (#124)406a0f3
feat(build): Update travis distribution in CI file (#123)d81a8cc
feat(build): Add KMIP Management APIs to Go SDK (#122)866c8c2
retractions (#119)Updates
github.com/aws/aws-sdk-go
from 1.51.11 to 1.51.25Release notes
Sourced from github.com/aws/aws-sdk-go's releases.
... (truncated)
Commits
2a3c889
Release v1.51.25 (2024-04-19) (#5232)49815a2
Release v1.51.24 (2024-04-18) (#5230)6d8a4d9
Release v1.51.23 (2024-04-17) (#5228)92466d9
Release v1.51.22 (2024-04-16) (#5226)49079a4
Release v1.51.21 (2024-04-12) (#5224)8888dae
Release v1.51.20 (2024-04-11) (#5223)ee8448b
Release v1.51.19 (2024-04-10) (#5222)9f6e3bb
Release v1.51.18 (2024-04-09) (#5221)76ef9d5
Release v1.51.17 (2024-04-08) (#5220)9f80461
Release v1.51.16 (2024-04-05) (#5219)Updates
github.com/ceph/go-ceph
from 0.26.0 to 0.27.0Release notes
Sourced from github.com/ceph/go-ceph's releases.
... (truncated)
Commits
26e7ee7
docs: update README for release v0.27.0593a097
docs: fix version numbers for apis added prior to v0.27f9290c8
rgw/admin: promote GetInfo API to stable0a78704
rbd: promote Image.Resize2 api to stable2146f1a
rbd: trigger an error on invalid max snaps valuecfae965
rbd: remove features_nautilus.go3075e63
go-ceph: bump github.com/aws/aws-sdk-go from 1.50.32 to 1.51.125e9984a
cephfs/admin: Adjust build tags for subvolume quiescing API tests8d71b1f
rbd: prevent warning about redefining _POSIX_C_SOURCEbb2a449
rbd: add a test to verify that encrypted volumes can be resizedUpdates
github.com/hashicorp/vault/api
from 1.12.2 to 1.13.0Release notes
Sourced from github.com/hashicorp/vault/api's releases.
... (truncated)
Changelog
Sourced from github.com/hashicorp/vault/api's changelog.
... (truncated)
Commits
a4cf0dc
Remove rc1 prerelease tag. (#19417)0a42f2a
backport of commit 9bb8321a5bf5b26beae865eb6290bd17aabc159f (#19409)75f1ea2
backport of commit eb70bfdc5bfb0dd4c47326e1933b94bd93602c56 (#19407)20e201b
backport of commit da31528fdc0d9b043a21b1676694eecfaef130db (#19405)7383b52
backport of commit 52bbf65ae7232e9306c8c8d7d392399f82d24f04 (#19397)b3dc15f
backport of commit ba013912b1b2fd75fd7776fecb5e5f0329cb21e4 (#19396)1240c8c
backport of commit 538bb799e49ba12e6b6fec9877d7a03b2225d239 (#19381)478b6f1
backport of commit 7b2ff1f111b95786528bd578fea5f25b88afb119 (#19382)a5edc66
backport of commit d35be2d0de3d1c036248570c538c2051c4c1dc57 (#19375)a0beacd
Backport of add nil check for secret id entry on delete via accessor into rel...Updates
github.com/k8snetworkplumbingwg/network-attachment-definition-client
from 1.6.0 to 1.7.0Release notes
Sourced from github.com/k8snetworkplumbingwg/network-attachment-definition-client's releases.
Commits
8a8e914
Merge pull request #65 from SchSeba/support_mtu668df90
Support MTU representation in NetworkStatusfe19962
Merge pull request #64 from k8snetworkplumbingwg/dependabot/go_modules/google...b469461
Bump google.golang.org/protobuf from 1.31.0 to 1.33.0Updates
github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring
from 0.72.0 to 0.73.2Release notes
Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's releases.
Changelog
Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's changelog.
Commits
20beb0b
Merge pull request #6527 from slashpai/cut-0.73.23aa2b0e
chore:cut v0.73.221b32c5
Merge pull request #6525 from simonpasquier/fix-6513af00f92
Merge pull request #6526 from simonpasquier/cherry-pick-6507ada71c2
fix: ScrapeClass TLSConfig nil pointer exception (#6507)349d97e
fix: register k8s metrics6d917ce
Merge pull request #6498 from slashpai/cut-0.73.17e83f96
chore: cut v0.73.1c383b81
Merge pull request #6495 from simonpasquier/fix-6493383f242
fix: log deprecated bearer token fields at debug levelUpdates
github.com/prometheus-operator/prometheus-operator/pkg/client
from 0.72.0 to 0.73.2Release notes
Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's releases.
Changelog
Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's changelog.
Commits
20beb0b
Merge pull request #6527 from slashpai/cut-0.73.23aa2b0e
chore:cut v0.73.221b32c5
Merge pull request #6525 from simonpasquier/fix-6513af00f92
Merge pull request #6526 from simonpasquier/cherry-pick-6507ada71c2
fix: ScrapeClass TLSConfig nil pointer exception (#6507)349d97e
fix: register k8s metrics6d917ce
Merge pull request #6498 from slashpai/cut-0.73.17e83f96
chore: cut v0.73.1c383b81
Merge pull request #6495 from simonpasquier/fix-6493383f242
fix: log deprecated bearer token fields at debug levelDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show