Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump github.com/prometheus-operator/prometheus-operator/pkg/client from 0.73.2 to 0.77.1 #2896

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 26, 2024

Bumps github.com/prometheus-operator/prometheus-operator/pkg/client from 0.73.2 to 0.77.1.

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's releases.

0.77.1 / 2024-09-25

  • [BUGFIX] Fix Thanos Ruler reconciliations not triggered on StatefulSet updates. #6964
  • [BUGFIX] Fix error message for unsupported versions. #6965

0.77.0 / 2024-09-19

[!NOTE] Along with this release we also introduce a new command line tool poctl. It is designed specifically for managing Prometheus Operator Custom Resources. This project is currently under active development and fully experimental, so expect breaking changes and rough edges. We encourage you to try it out and provide the feedback.

[!WARNING] Another notable change is that we have switched the logging framework from go-kit/log to slog which may lead to some differences in the log output.

  • [CHANGE] Add more API validation and changes to the ScrapeConfig CRD. #6921 #6855 #6744
  • [CHANGE] Update the validating webhook to reject PrometheusRule objects that would generate configuration greater than the max ConfigMap size (512KiB). #6606
  • [FEATURE] Add experimental Prometheus 3 support. It allows to try the new Prometheus v3.0.0-beta.0. #6940
    • Feature requests in this version won't be supported until Prometheus 3 reaches a stable release. However, users are encouraged to try the beta version with the Operator and report any issues they encounter.
  • [FEATURE] Add support for PodMonitor to the PrometheusAgent CRD in DaemonSet mode. #6879
  • [FEATURE] Add -kubelet-endpointslice argument to support EndpointSlice for the kubelet controller. #6882
  • [FEATURE] Add outOfOrderTimeWindow field to the PrometheusAgent CRD. #6851
  • [FEATURE] Add matchFirstNetwork field to the ScrapeConfig CRD for the Docker Service Discovery. #6849 #6894
  • [FEATURE] Add the otlp field to the Prometheus and PrometheusAgent CRDs. #6780
  • [FEATURE] Add support for certificate, key and client CA file paths to the web TLS configuration. #6358
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for OAuth2 clients. #6922
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for HTTP clients. #6864
  • [FEATURE] Add Ionos Service Discovery support to ScrapeConfig CRD. (#6732)
  • [BUGFIX] Fix panic when processing an invalid AlertmanagerConfig object used for global configuration. #6931
  • [BUGFIX] Allow configuring proxy URL for all Prometheus versions. #6845

v0.76.2

  • [BUGFIX] Fix OAuth2 TLSConfig nil pointer. #6909

v0.76.1

  • [BUGFIX] fix bug with Kubernetes service discovery Selector.Role field. #6896

v0.76.0

0.76.0 / 2025-08-08

  • [CHANGE] Enhanced secret management in Prometheus and PrometheusAgent CRDs by switching the secrets field from atomic to listType: set, allowing independent handling of entries by different managers to prevent conflicts and improve deployment stability. #6762
  • [CHANGE] Add API-level validations to Kubernetes SD in the ScrapeConfig CRD. #6678
  • [FEATURE] Add TLS and Proxy settings to OAuth2 configuration for Prometheus and PrometheusAgent CRDs. #6735
  • [FEATURE] Add support for OAuth2 in the ScrapeConfig CRD. #6814
  • [FEATURE] Add scale subresource to the Alertmanger CRD. #6728
  • [FEATURE] Add Scaleway service discovery to the ScrapeConfig CRD. #6711
  • [FEATURE] Add serviceDiscoveryRole field to the Prometheus and PrometheusAgent CRDs to select between Endpoints (default) and EndpointSlice for discovering scrape and alerting targets. #6672
  • [ENHANCEMENT] Make the namespace field optional in the Alertmanager endpoints configuration of the Prometheus CRD, if not defined it will use the default namespace. #6338
  • [ENHANCEMENT] Add support to configure the TLS version for Prometheus, PrometheusAgent and Alertmanager CRDs. #6736
  • [ENHANCEMENT] Add -secret-label-selector argument to the operator to filter the Secrets being watched. #6731
  • [ENHANCEMENT] Add attachMetadata field to ScrapeClasses. #6756
  • [BUGFIX] Add support for all proxy settings in the Alertmanager configuration. #6818

... (truncated)

Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's changelog.

0.77.1 / 2024-09-25

  • [BUGFIX] Fix Thanos Ruler reconciliations not triggered on StatefulSet updates. #6964
  • [BUGFIX] Fix error message for unsupported versions. #6965

0.77.0 / 2024-09-19

[!NOTE] Along with this release we also introduce a new command line tool poctl. It is designed specifically for managing Prometheus Operator Custom Resources. This project is currently under active development and fully experimental, so expect breaking changes and rough edges. We encourage you to try it out and provide the feedback.

[!WARNING] Another notable change is that we have switched the logging framework from go-kit/log to slog which may lead to some differences in the log output.

  • [CHANGE] Add more API validation and changes to the ScrapeConfig CRD. #6921 #6855 #6744
  • [CHANGE] Update the validating webhook to reject PrometheusRule objects that would generate configuration greater than the max ConfigMap size (512KiB). #6606
  • [FEATURE] Add experimental Prometheus 3 support. It allows to try the new Prometheus v3.0.0-beta.0. #6940
    • Feature requests in this version won't be supported until Prometheus 3 reaches a stable release. However, users are encouraged to try the beta version with the Operator and report any issues they encounter.
  • [FEATURE] Add support for PodMonitor to the PrometheusAgent CRD in DaemonSet mode. #6879
  • [FEATURE] Add -kubelet-endpointslice argument to support EndpointSlice for the kubelet controller. #6882
  • [FEATURE] Add outOfOrderTimeWindow field to the PrometheusAgent CRD. #6851
  • [FEATURE] Add matchFirstNetwork field to the ScrapeConfig CRD for the Docker Service Discovery. #6849 #6894
  • [FEATURE] Add the otlp field to the Prometheus and PrometheusAgent CRDs. #6780
  • [FEATURE] Add support for certificate, key and client CA file paths to the web TLS configuration. #6358
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for OAuth2 clients. #6922
  • [FEATURE] Add noProxy, proxyFromEnvironment and proxyConnectHeader fields to the AlertmanagerConfig CRD for HTTP clients. #6864
  • [FEATURE] Add Ionos Service Discovery support to ScrapeConfig CRD. (#6732)
  • [BUGFIX] Fix panic when processing an invalid AlertmanagerConfig object used for global configuration. #6931
  • [BUGFIX] Allow configuring proxy URL for all Prometheus versions. #6845

0.76.2 / 2024-09-09

  • [BUGFIX] Fix OAuth2 TLSConfig nil pointer. #6909

0.76.1 / 2024-09-03

  • [BUGFIX] fix bug with Kubernetes service discovery Selector.Role field. #6896

0.76.0 / 2024-08-08

  • [CHANGE] Enhanced secret management in Prometheus and PrometheusAgent CRDs by switching the secrets field from atomic to listType: set, allowing independent handling of entries by different managers to prevent conflicts and improve deployment stability. #6762
  • [CHANGE] Add API-level validations to Kubernetes SD in the ScrapeConfig CRD. #6678
  • [FEATURE] Add TLS and Proxy settings to OAuth2 configuration for Prometheus and PrometheusAgent CRDs. #6735
  • [FEATURE] Add support for OAuth2 in the ScrapeConfig CRD. #6814
  • [FEATURE] Add scale subresource to the Alertmanger CRD. #6728
  • [FEATURE] Add Scaleway service discovery to the ScrapeConfig CRD. #6711
  • [FEATURE] Add serviceDiscoveryRole field to the Prometheus and PrometheusAgent CRDs to select between Endpoints (default) and EndpointSlice for discovering scrape and alerting targets. #6672
  • [ENHANCEMENT] Make the namespace field optional in the Alertmanager endpoints configuration of the Prometheus CRD, if not defined it will use the default namespace. #6338
  • [ENHANCEMENT] Add support to configure the TLS version for Prometheus, PrometheusAgent and Alertmanager CRDs. #6736
  • [ENHANCEMENT] Add -secret-label-selector argument to the operator to filter the Secrets being watched. #6731

... (truncated)

Commits
  • 3271016 Merge pull request #6967 from slashpai/cut-0.77.1
  • f73eefe chore: cut 0.77.1
  • ba6f620 Merge pull request #6965 from simonpasquier/fix-unsupported-prom-err
  • e22d9df fix: fix error message for unsupported versions
  • 841c0d7 Merge pull request #6964 from simonpasquier/fix-thanos-ruler-reconciliation
  • d9a49ef fix: ensure reconciliation on Thanos sts updates
  • 3234e89 Merge pull request #6950 from slashpai/cut-0.77
  • 0a82836 chore: cut 0.77.0
  • c846674 feat: add experimental Prometheus 3 support (#6940)
  • 156eb12 Support PodMonitor for Prometheus Agent in DaemonSet mode (#6879)
  • Additional commits viewable in compare view

Most Recent Ignore Conditions Applied to This Pull Request
Dependency Name Ignore Conditions
github.com/prometheus-operator/prometheus-operator/pkg/client [>= 0.74.a, < 0.75]
github.com/prometheus-operator/prometheus-operator/pkg/client [>= 0.75.a, < 0.76]

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [github.com/prometheus-operator/prometheus-operator/pkg/client](https://github.com/prometheus-operator/prometheus-operator) from 0.73.2 to 0.77.1.
- [Release notes](https://github.com/prometheus-operator/prometheus-operator/releases)
- [Changelog](https://github.com/prometheus-operator/prometheus-operator/blob/main/CHANGELOG.md)
- [Commits](prometheus-operator/prometheus-operator@v0.73.2...v0.77.1)

---
updated-dependencies:
- dependency-name: github.com/prometheus-operator/prometheus-operator/pkg/client
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Sep 26, 2024
Copy link
Contributor

openshift-ci bot commented Sep 26, 2024

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift-knative member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci openshift-ci bot requested a review from skonto September 26, 2024 07:29
Copy link
Contributor

openshift-ci bot commented Sep 26, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot]
Once this PR has been reviewed and has the lgtm label, please assign matzew for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@@ -1,8 +1,8 @@
module github.com/openshift-knative/serverless-operator

go 1.22.0
go 1.23
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

hm, we still don't want this I think

k8s.io/api v0.29.3
k8s.io/apimachinery v0.29.3
k8s.io/client-go v0.29.3
k8s.io/api v0.31.1
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same here

@ReToCode
Copy link
Member

/hold

@dsimansk @skonto we probably should find the latest version of this that has K8s 1.30 (see also https://redhat-internal.slack.com/archives/CD87JDUB0/p1727335947776429) and works with go 1.22. WDYT?

@openshift-merge-robot
Copy link
Contributor

PR needs rebase.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@ReToCode
Copy link
Member

We want to close these, right @dsimansk ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file do-not-merge/hold go Pull requests that update Go code needs-ok-to-test needs-rebase
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants