Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump the github-dependencies group across 1 directory with 7 updates #166

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github May 20, 2024

Bumps the github-dependencies group with 7 updates in the / directory:

Package From To
github.com/IBM/keyprotect-go-client 0.12.2 0.14.0
github.com/aws/aws-sdk-go 1.50.35 1.53.5
github.com/ceph/go-ceph 0.26.0 0.27.0
github.com/hashicorp/vault/api 1.12.0 1.13.0
github.com/k8snetworkplumbingwg/network-attachment-definition-client 1.6.0 1.7.0
github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring 0.72.0 0.74.0
github.com/prometheus-operator/prometheus-operator/pkg/client 0.72.0 0.74.0

Updates github.com/IBM/keyprotect-go-client from 0.12.2 to 0.14.0

Release notes

Sourced from github.com/IBM/keyprotect-go-client's releases.

v0.14.0

Allow instance policy attributes to be optionally specified

v0.13.1

Fix disable KeyCreateImportAccess and AllowedIP instance policy behavior (disregard attribute inputs per API requirement)

v0.13.0

Added support for KMIP management REST APIs (Create, Read and Delete for KMIP adapters, certificates and objects where applicable)

v0.12.3

Retract the versions of the SDK that have a broken create key function.

Commits

Updates github.com/aws/aws-sdk-go from 1.50.35 to 1.53.5

Release notes

Sourced from github.com/aws/aws-sdk-go's releases.

Release v1.53.5 (2024-05-17)

Service Client Updates

  • service/application-autoscaling: Updates service API
  • service/codebuild: Updates service API and documentation
    • Aws CodeBuild now supports 36 hours build timeout
  • service/elasticloadbalancingv2: Updates service API and documentation
  • service/lakeformation: Updates service API and documentation
  • service/transfer: Updates service API and documentation
    • Enable use of CloudFormation traits in Smithy model to improve generated CloudFormation schema from the Smithy API model.

Release v1.53.4 (2024-05-16)

Service Client Updates

  • service/acm-pca: Updates service API and waiters
  • service/connect: Updates service documentation
  • service/kafka: Updates service API and documentation
  • service/mwaa: Updates service API and documentation
  • service/quicksight: Updates service API and documentation
    • This release adds DescribeKeyRegistration and UpdateKeyRegistration APIs to manage QuickSight Customer Managed Keys (CMK).
  • service/sagemaker: Updates service API and documentation
    • Introduced WorkerAccessConfiguration to SageMaker Workteam. This allows customers to configure resource access for workers in a workteam.
  • service/secretsmanager: Updates service API and documentation
    • Documentation updates for AWS Secrets Manager

Release v1.53.3 (2024-05-15)

Service Client Updates

  • service/bedrock-agent-runtime: Updates service documentation
  • service/codebuild: Updates service API and documentation
    • CodeBuild Reserved Capacity VPC Support
  • service/datasync: Updates service API
  • service/grafana: Updates service API, documentation, and paginators
  • service/medical-imaging: Updates service API and documentation
  • service/securityhub: Updates service API and documentation

Release v1.53.2 (2024-05-14)

Service Client Updates

  • service/connect: Updates service API, documentation, and paginators
  • service/s3: Updates service API and examples
    • Updated a few x-id in the http uri traits

Release v1.53.1 (2024-05-13)

... (truncated)

Commits

Updates github.com/ceph/go-ceph from 0.26.0 to 0.27.0

Release notes

Sourced from github.com/ceph/go-ceph's releases.

v0.27.0

The maintainers and contributors to go-ceph are pleased to announce the v0.27.0 release. This is another great step towards making it possible to use the power of the Ceph APIs in the Go language.

As this is a v0.x release we do not guarantee backwards compatibility with previous versions of the code. However, we aim not to disrupt existing consumers of the library and thus make an effort not to immediately implement breaking changes without very good justification. Please see the "Deprecations & Removals" section (if present) to get a sense of what you can expect to change in the future and prepare your code ahead of time. You may also want to view "Deprecations & Removals" of previous releases as they are not repeated here. All newly introduced APIs in the following section are labeled as "preview" APIs first, and are only available if the ceph_preview build tag is set. There is explicitly no backwards compatibility guaranteed for these until they are labeled as "stable" in a later release.

Special thanks to our new contributors:

New Features

cephfs/admin

rbd

  • rbd: add GetSnapGroupNamespace() to get details about group snapshots by @​nixpanic in ceph/go-ceph#968
    • Adds GetSnapGroupNamespace implementing rbd_snap_get_group_namespace

API Stability Updates

The following APIs are now stable:

rbd

  • Image.Resize2

rgw/admin

  • API.GetInfo

Other Changes

rbd

cephfs/admin

Internal

... (truncated)

Commits
  • 26e7ee7 docs: update README for release v0.27.0
  • 593a097 docs: fix version numbers for apis added prior to v0.27
  • f9290c8 rgw/admin: promote GetInfo API to stable
  • 0a78704 rbd: promote Image.Resize2 api to stable
  • 2146f1a rbd: trigger an error on invalid max snaps value
  • cfae965 rbd: remove features_nautilus.go
  • 3075e63 go-ceph: bump github.com/aws/aws-sdk-go from 1.50.32 to 1.51.12
  • 5e9984a cephfs/admin: Adjust build tags for subvolume quiescing API tests
  • 8d71b1f rbd: prevent warning about redefining _POSIX_C_SOURCE
  • bb2a449 rbd: add a test to verify that encrypted volumes can be resized
  • Additional commits viewable in compare view

Updates github.com/hashicorp/vault/api from 1.12.0 to 1.13.0

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.13.0

1.13.0

March 01, 2023

SECURITY:

  • secrets/ssh: removal of the deprecated dynamic keys mode. When any remaining dynamic key leases expire, an error stating secret is unsupported by this backend will be thrown by the lease manager. [GH-18874]

CHANGES:

  • auth/alicloud: require the role field on login [GH-19005]
  • auth/approle: Add maximum length of 4096 for approle role_names, as this value results in HMAC calculation [GH-17768]
  • auth: Returns invalid credentials for ldap, userpass and approle when wrong credentials are provided for existent users. This will only be used internally for implementing user lockout. [GH-17104]
  • core: Bump Go version to 1.20.1.
  • core: Vault version has been moved out of sdk and into main vault module. Plugins using sdk/useragent.String must instead use sdk/useragent.PluginString. [GH-14229]
  • logging: Removed legacy environment variable for log format ('LOGXI_FORMAT'), should use 'VAULT_LOG_FORMAT' instead [GH-17822]
  • plugins: Mounts can no longer be pinned to a specific builtin version. Mounts previously pinned to a specific builtin version will now automatically upgrade to the latest builtin version, and may now be overridden if an unversioned plugin of the same name and type is registered. Mounts using plugin versions without builtin in their metadata remain unaffected. [GH-18051]
  • plugins: GET /database/config/:name endpoint now returns an additional plugin_version field in the response data. [GH-16982]
  • plugins: GET /sys/auth/:path/tune and GET /sys/mounts/:path/tune endpoints may now return an additional plugin_version field in the response data if set. [GH-17167]
  • plugins: GET for /sys/auth, /sys/auth/:path, /sys/mounts, and /sys/mounts/:path paths now return additional plugin_version, running_plugin_version and running_sha256 fields in the response data for each mount. [GH-17167]
  • sdk: Remove version package, make useragent.String versionless. [GH-19068]
  • secrets/aws: do not create leases for non-renewable/non-revocable STS credentials to reduce storage calls [GH-15869]
  • secrets/gcpkms: Updated plugin from v0.13.0 to v0.14.0 [GH-19063]
  • sys/internal/inspect: Turns of this endpoint by default. A SIGHUP can now be used to reload the configs and turns this endpoint on.
  • ui: Upgrade Ember to version 4.4.0 [GH-17086]

FEATURES:

  • Azure Auth Managed Identities: Allow any Azure resource that supports managed identities to authenticate with Vault [GH-19077]
  • Azure Auth Rotate Root: Add support for rotate root in Azure Auth engine [GH-19077]
  • Event System (Alpha): Vault has a new opt-in experimental event system. Not yet suitable for production use. Events are currently only generated on writes to the KV secrets engine, but external plugins can also be updated to start generating events. [GH-19194]
  • GCP Secrets Impersonated Account Support: Add support for GCP service account impersonation, allowing callers to generate a GCP access token without requiring Vault to store or retrieve a GCP service account key for each role. [GH-19018]
  • Kubernetes Secrets Engine UI: Kubernetes is now available in the UI as a supported secrets engine. [GH-17893]
  • New PKI UI: Add beta support for new and improved PKI UI [GH-18842]
  • PKI Cross-Cluster Revocations: Revocation information can now be synchronized across primary and performance replica clusters offering a unified CRL/OCSP view of revocations across cluster boundaries. [GH-19196]
  • Server UDS Listener: Adding listener to Vault server to serve http request via unix domain socket [GH-18227]
  • Transit managed keys: The transit secrets engine now supports configuring and using managed keys
  • User Lockout: Adds support to configure the user-lockout behaviour for failed logins to prevent brute force attacks for userpass, approle and ldap auth methods. [GH-19230]
  • VMSS Flex Authentication: Adds support for Virtual Machine Scale Set Flex Authentication [GH-19077]
  • Namespaces (enterprise): Added the ability to allow access to secrets and more to be shared across namespaces that do not share a namespace hierarchy. Using the new sys/config/group-policy-application API, policies can be configured to apply outside of namespace hierarchy, allowing this kind of cross-namespace sharing.
  • OpenAPI-based Go & .NET Client Libraries (Beta): We have now made available two new OpenAPI-based Go & .NET Client libraries (beta). You can use them to perform various secret management operations easily from your applications.

IMPROVEMENTS:

  • Redis ElastiCache DB Engine: Renamed configuration parameters for disambiguation; old parameters still supported for compatibility. [GH-18752]

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.13.0

March 01, 2023

SECURITY:

  • secrets/ssh: removal of the deprecated dynamic keys mode. When any remaining dynamic key leases expire, an error stating secret is unsupported by this backend will be thrown by the lease manager. [GH-18874]
  • auth/approle: When using the Vault and Vault Enterprise (Vault) approle auth method, any authenticated user with access to the /auth/approle/role/:role_name/secret-id-accessor/destroy endpoint can destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability, CVE-2023-24999 has been fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above. [HSEC-2023-07]

CHANGES:

  • auth/alicloud: require the role field on login [GH-19005]
  • auth/approle: Add maximum length of 4096 for approle role_names, as this value results in HMAC calculation [GH-17768]
  • auth: Returns invalid credentials for ldap, userpass and approle when wrong credentials are provided for existent users. This will only be used internally for implementing user lockout. [GH-17104]
  • core: Bump Go version to 1.20.1.
  • core: Vault version has been moved out of sdk and into main vault module. Plugins using sdk/useragent.String must instead use sdk/useragent.PluginString. [GH-14229]
  • logging: Removed legacy environment variable for log format ('LOGXI_FORMAT'), should use 'VAULT_LOG_FORMAT' instead [GH-17822]
  • plugins: Mounts can no longer be pinned to a specific builtin version. Mounts previously pinned to a specific builtin version will now automatically upgrade to the latest builtin version, and may now be overridden if an unversioned plugin of the same name and type is registered. Mounts using plugin versions without builtin in their metadata remain unaffected. [GH-18051]
  • plugins: GET /database/config/:name endpoint now returns an additional plugin_version field in the response data. [GH-16982]
  • plugins: GET /sys/auth/:path/tune and GET /sys/mounts/:path/tune endpoints may now return an additional plugin_version field in the response data if set. [GH-17167]
  • plugins: GET for /sys/auth, /sys/auth/:path, /sys/mounts, and /sys/mounts/:path paths now return additional plugin_version, running_plugin_version and running_sha256 fields in the response data for each mount. [GH-17167]
  • sdk: Remove version package, make useragent.String versionless. [GH-19068]
  • secrets/aws: do not create leases for non-renewable/non-revocable STS credentials to reduce storage calls [GH-15869]
  • secrets/gcpkms: Updated plugin from v0.13.0 to v0.14.0 [GH-19063]
  • sys/internal/inspect: Turns of this endpoint by default. A SIGHUP can now be used to reload the configs and turns this endpoint on.
  • ui: Upgrade Ember to version 4.4.0 [GH-17086]

FEATURES:

  • User lockout: Ignore repeated bad credentials from the same user for a configured period of time. Enabled by default.
  • Azure Auth Managed Identities: Allow any Azure resource that supports managed identities to authenticate with Vault [GH-19077]
  • Azure Auth Rotate Root: Add support for rotate root in Azure Auth engine [GH-19077]
  • Event System (Alpha): Vault has a new opt-in experimental event system. Not yet suitable for production use. Events are currently only generated on writes to the KV secrets engine, but external plugins can also be updated to start generating events. [GH-19194]
  • GCP Secrets Impersonated Account Support: Add support for GCP service account impersonation, allowing callers to generate a GCP access token without requiring Vault to store or retrieve a GCP service account key for each role. [GH-19018]
  • Kubernetes Secrets Engine UI: Kubernetes is now available in the UI as a supported secrets engine. [GH-17893]
  • New PKI UI: Add beta support for new and improved PKI UI [GH-18842]
  • PKI Cross-Cluster Revocations: Revocation information can now be synchronized across primary and performance replica clusters offering a unified CRL/OCSP view of revocations across cluster boundaries. [GH-19196]
  • Server UDS Listener: Adding listener to Vault server to serve http request via unix domain socket [GH-18227]
  • Transit managed keys: The transit secrets engine now supports configuring and using managed keys
  • User Lockout: Adds support to configure the user-lockout behaviour for failed logins to prevent brute force attacks for userpass, approle and ldap auth methods. [GH-19230]
  • VMSS Flex Authentication: Adds support for Virtual Machine Scale Set Flex Authentication [GH-19077]
  • Namespaces (enterprise): Added the ability to allow access to secrets and more to be shared across namespaces that do not share a namespace hierarchy. Using the new sys/config/group-policy-application API, policies can be configured to apply outside of namespace hierarchy, allowing this kind of cross-namespace sharing.
  • OpenAPI-based Go & .NET Client Libraries (Beta): We have now made available two new [OpenAPI-based Go] & [OpenAPI-based .NET] Client libraries (beta). You can use them to perform various secret management operations easily from your applications.

IMPROVEMENTS:

... (truncated)

Commits
  • a4cf0dc Remove rc1 prerelease tag. (#19417)
  • 0a42f2a backport of commit 9bb8321a5bf5b26beae865eb6290bd17aabc159f (#19409)
  • 75f1ea2 backport of commit eb70bfdc5bfb0dd4c47326e1933b94bd93602c56 (#19407)
  • 20e201b backport of commit da31528fdc0d9b043a21b1676694eecfaef130db (#19405)
  • 7383b52 backport of commit 52bbf65ae7232e9306c8c8d7d392399f82d24f04 (#19397)
  • b3dc15f backport of commit ba013912b1b2fd75fd7776fecb5e5f0329cb21e4 (#19396)
  • 1240c8c backport of commit 538bb799e49ba12e6b6fec9877d7a03b2225d239 (#19381)
  • 478b6f1 backport of commit 7b2ff1f111b95786528bd578fea5f25b88afb119 (#19382)
  • a5edc66 backport of commit d35be2d0de3d1c036248570c538c2051c4c1dc57 (#19375)
  • a0beacd Backport of add nil check for secret id entry on delete via accessor into rel...
  • Additional commits viewable in compare view

Updates github.com/k8snetworkplumbingwg/network-attachment-definition-client from 1.6.0 to 1.7.0

Release notes

Sourced from github.com/k8snetworkplumbingwg/network-attachment-definition-client's releases.

v1.7.0

Adds MTU to network-status

Commits
  • 8a8e914 Merge pull request #65 from SchSeba/support_mtu
  • 668df90 Support MTU representation in NetworkStatus
  • fe19962 Merge pull request #64 from k8snetworkplumbingwg/dependabot/go_modules/google...
  • b469461 Bump google.golang.org/protobuf from 1.31.0 to 1.33.0
  • See full diff in compare view

Updates github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring from 0.72.0 to 0.74.0

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's releases.

0.74.0 / 2024-05-17

  • [CHANGE/BUGFIX] Change the proxyConnectHeader field of the proxy configuration in the ScrapeConfig CRD from a map of strings to a map of string slices. #6541
  • [CHANGE] Automatically set the GOMAXPROCS variable according to the CPU limits of the process cgroup. #6576
  • [FEATURE] Add support for the Nomad Service Discovery to the ScrapeConfig CRD. #6485
  • [FEATURE] Add relabelings field for Alertmanager's endpoints in the Prometheus CRD. #6467
  • [FEATURE] Add alertRelabelings field for the Alertmanager's endpoints in the Prometheus CRD. #6450
  • [FEATURE] Add support for the Azure SDK authentication to the Azure Service Discovery in the ScrapeConfig CRD. #6595
  • [FEATURE] Add support for the Azure SDK authentication to the remote-write configuration in the Prometheus and PrometheusAgent CRDs. #6596
  • [ENHANCEMENT] Add Go runtime scheduler metrics to the operator. #6563
  • [ENHANCEMENT] Add go_sync_mutex_wait_total_seconds_total metric to the operator. #6581
  • [BUGFIX] Allow templated strings for the responder's type in OpsGenie configuration. #6378
  • [BUGFIX] Fix nil pointer panic in the AlertmanagerConfig Webex receiver. #6582
  • [BUGFIX] Apply TLS scrape class settings to all PodMonitor, Probe and ScrapeConfig objects. #6573

0.73.2 / 2024-04-18

  • [BUGFIX] Fix ScrapeClassTLSConfig nil pointer exception. #6526
  • [BUGFIX] Fix missing prometheus_operator_kubernetes_client_http_requests_total metric. #6525

0.73.1 / 2024-04-10

  • [BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #6495

0.73.0 / 2024-04-03

  • [CHANGE/BUGFIX] Add proxyURL validation for ServiceMonitor, PodMonitor and Probe objects. It could be a breaking change for those who rely on the configuration reloader sidecar to expand environment variables in the generated configuration file. #6464
  • [CHANGE/BUGFIX] Allow empty separator in relabel config. #6425
  • [FEATURE] Add summary field to the MSteams receiver. #6206
  • [FEATURE] Add support for Kuma SD in ScrapeConfig CRD. #6427,#6465
  • [FEATURE] Add support for Eureka SD in ScrapeConfig CRD. #6408
  • [FEATURE] Add support for Docker SD in ScrapeConfig CRD. #6421
  • [FEATURE] Add support for Hetzner SD in ScrapeConfig CRD. #6436
  • [FEATURE] Add the --kubelet-node-address-priority CLI argument to set the node address priority. #6377
  • [FEATURE] Add relabelings field to scrape classes. #6379
  • [FEATURE] Add bodySizeLimit field to the ServiceMonitor and PodMonitor CRDs. #6349
  • [FEATURE] Add sampleAgeLimit field to the remote-write configuration. #6326
  • [ENHANCEMENT] Verify which CRDs are installed and start the respective controllers only when needed. #6351
  • [ENHANCEMENT] Add checks for selectors in KubernetesSDConfig. #6359
  • [BUGFIX] Fix ScrapeConfigs selection issue across different namespaces. #6390
  • [BUGFIX] Add check to determine if Thanos supports the --prometheus.http-client flag. #6448
  • [BUGFIX] Fix PrometheusAgent reconciliation when the secret/configmap's namespace is different from the PrometheusAgent namespace. #6412
  • [BUGFIX] Fix the validation for muteTimeIntervals's months in the AlertmanagerConfig CRD. #6362
Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring's changelog.

0.74.0 / 2024-05-17

  • [CHANGE/BUGFIX] Change the proxyConnectHeader field of the proxy configuration in the ScrapeConfig CRD from a map of strings to a map of string slices. #6541
  • [CHANGE] Automatically set the GOMAXPROCS variable according to the CPU limits of the process cgroup. #6576
  • [FEATURE] Add support for the Nomad Service Discovery to the ScrapeConfig CRD. #6485
  • [FEATURE] Add relabelings field for Alertmanager's endpoints in the Prometheus CRD. #6467
  • [FEATURE] Add alertRelabelings field for the Alertmanager's endpoints in the Prometheus CRD. #6450
  • [FEATURE] Add support for the Azure SDK authentication to the Azure Service Discovery in the ScrapeConfig CRD. #6595
  • [FEATURE] Add support for the Azure SDK authentication to the remote-write configuration in the Prometheus and PrometheusAgent CRDs. #6596
  • [ENHANCEMENT] Add Go runtime scheduler metrics to the operator. #6563
  • [ENHANCEMENT] Add go_sync_mutex_wait_total_seconds_total metric to the operator. #6581
  • [BUGFIX] Allow templated strings for the responder's type in OpsGenie configuration. #6378
  • [BUGFIX] Fix nil pointer panic in the AlertmanagerConfig Webex receiver. #6582
  • [BUGFIX] Apply TLS scrape class settings to all PodMonitor, Probe and ScrapeConfig objects. #6573

0.73.2 / 2024-04-18

  • [BUGFIX] Fix ScrapeClassTLSConfig nil pointer exception. #6526
  • [BUGFIX] Fix missing prometheus_operator_kubernetes_client_http_requests_total metric. #6525

0.73.1 / 2024-04-10

  • [BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #6495

0.73.0 / 2024-04-03

  • [CHANGE/BUGFIX] Add proxyURL validation for ServiceMonitor, PodMonitor and Probe objects. It could be a breaking change for those who rely on the configuration reloader sidecar to expand environment variables in the generated configuration file. #6464
  • [CHANGE/BUGFIX] Allow empty separator in relabel config. #6425
  • [FEATURE] Add summary field to the MSteams receiver. #6206
  • [FEATURE] Add support for Kuma SD in ScrapeConfig CRD. #6427,#6465
  • [FEATURE] Add support for Eureka SD in ScrapeConfig CRD. #6408
  • [FEATURE] Add support for Docker SD in ScrapeConfig CRD. #6421
  • [FEATURE] Add support for Hetzner SD in ScrapeConfig CRD. #6436
  • [FEATURE] Add the --kubelet-node-address-priority CLI argument to set the node address priority. #6377
  • [FEATURE] Add relabelings field to scrape classes. #6379
  • [FEATURE] Add bodySizeLimit field to the ServiceMonitor and PodMonitor CRDs. #6349
  • [FEATURE] Add sampleAgeLimit field to the remote-write configuration. #6326
  • [ENHANCEMENT] Verify which CRDs are installed and start the respective controllers only when needed. #6351
  • [ENHANCEMENT] Add checks for selectors in KubernetesSDConfig. #6359
  • [BUGFIX] Fix ScrapeConfigs selection issue across different namespaces. #6390
  • [BUGFIX] Add check to determine if Thanos supports the --prometheus.http-client flag. #6448
  • [BUGFIX] Fix PrometheusAgent reconciliation when the secret/configmap's namespace is different from the PrometheusAgent namespace. #6412
  • [BUGFIX] Fix the validation for muteTimeIntervals's months in the AlertmanagerConfig CRD. #6362
Commits
  • cd506c4 Merge pull request #6602 from simonpasquier/cut-0.74.0
  • ef34de2 chore: cut v0.74.0
  • 35340a6 [WIP] Feat: Add alert_relabel_configs to the Prometheus and PrometheusAgent...
  • 49472c7 Merge pull request #6491 from prometheus-operator/feature-flags
  • 282afa4 Merge pull request #6596 from slashpai/azure-sdk-rw
  • 6b1caac Add structure for feature flags
  • a7f0d26 Update promcfg.go
  • 3bea446 feat: support SDK auth in AzureAD RemoteWrite
  • f4b82d7 Merge pull request #6595 from slashpai/azure-sd
  • d24ff5b feat: support SDK auth in AzureSD
  • Additional commits viewable in compare view

Updates github.com/prometheus-operator/prometheus-operator/pkg/client from 0.72.0 to 0.74.0

Release notes

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's releases.

0.74.0 / 2024-05-17

  • [CHANGE/BUGFIX] Change the proxyConnectHeader field of the proxy configuration in the ScrapeConfig CRD from a map of strings to a map of string slices. #6541
  • [CHANGE] Automatically set the GOMAXPROCS variable according to the CPU limits of the process cgroup. #6576
  • [FEATURE] Add support for the Nomad Service Discovery to the ScrapeConfig CRD. #6485
  • [FEATURE] Add relabelings field for Alertmanager's endpoints in the Prometheus CRD. #6467
  • [FEATURE] Add alertRelabelings field for the Alertmanager's endpoints in the Prometheus CRD. #6450
  • [FEATURE] Add support for the Azure SDK authentication to the Azure Service Discovery in the ScrapeConfig CRD. #6595
  • [FEATURE] Add support for the Azure SDK authentication to the remote-write configuration in the Prometheus and PrometheusAgent CRDs. #6596
  • [ENHANCEMENT] Add Go runtime scheduler metrics to the operator. #6563
  • [ENHANCEMENT] Add go_sync_mutex_wait_total_seconds_total metric to the operator. #6581
  • [BUGFIX] Allow templated strings for the responder's type in OpsGenie configuration. #6378
  • [BUGFIX] Fix nil pointer panic in the AlertmanagerConfig Webex receiver. #6582
  • [BUGFIX] Apply TLS scrape class settings to all PodMonitor, Probe and ScrapeConfig objects. #6573

0.73.2 / 2024-04-18

  • [BUGFIX] Fix ScrapeClassTLSConfig nil pointer exception. #6526
  • [BUGFIX] Fix missing prometheus_operator_kubernetes_client_http_requests_total metric. #6525

0.73.1 / 2024-04-10

  • [BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #6495

0.73.0 / 2024-04-03

  • [CHANGE/BUGFIX] Add proxyURL validation for ServiceMonitor, PodMonitor and Probe objects. It could be a breaking change for those who rely on the configuration reloader sidecar to expand environment variables in the generated configuration file. #6464
  • [CHANGE/BUGFIX] Allow empty separator in relabel config. #6425
  • [FEATURE] Add summary field to the MSteams receiver. #6206
  • [FEATURE] Add support for Kuma SD in ScrapeConfig CRD. #6427,#6465
  • [FEATURE] Add support for Eureka SD in ScrapeConfig CRD. #6408
  • [FEATURE] Add support for Docker SD in ScrapeConfig CRD. #6421
  • [FEATURE] Add support for Hetzner SD in ScrapeConfig CRD. #6436
  • [FEATURE] Add the --kubelet-node-address-priority CLI argument to set the node address priority. #6377
  • [FEATURE] Add relabelings field to scrape classes. #6379
  • [FEATURE] Add bodySizeLimit field to the ServiceMonitor and PodMonitor CRDs. #6349
  • [FEATURE] Add sampleAgeLimit field to the remote-write configuration. #6326
  • [ENHANCEMENT] Verify which CRDs are installed and start the respective controllers only when needed. #6351
  • [ENHANCEMENT] Add checks for selectors in KubernetesSDConfig. #6359
  • [BUGFIX] Fix ScrapeConfigs selection issue across different namespaces. #6390
  • [BUGFIX] Add check to determine if Thanos supports the --prometheus.http-client flag. #6448
  • [BUGFIX] Fix PrometheusAgent reconciliation when the secret/configmap's namespace is different from the PrometheusAgent namespace. #6412
  • [BUGFIX] Fix the validation for muteTimeIntervals's months in the AlertmanagerConfig CRD. #6362
Changelog

Sourced from github.com/prometheus-operator/prometheus-operator/pkg/client's changelog.

0.74.0 / 2024-05-17

  • [CHANGE/BUGFIX] Change the proxyConnectHeader field of the proxy configuration in the ScrapeConfig CRD from a map of strings to a map of string slices. #6541
  • [CHANGE] Automatically set the GOMAXPROCS variable according to the CPU limits of the process cgroup. #6576
  • [FEATURE] Add support for the Nomad Service Discovery to the ScrapeConfig CRD. #6485
  • [FEATURE] Add relabelings field for Alertmanager's endpoints in the Prometheus CRD. #6467
  • [FEATURE] Add alertRelabelings field for the Alertmanager's endpoints in the Prometheus CRD. #6450
  • [FEATURE] Add support for the Azure SDK authentication to the Azure Service Discovery in the ScrapeConfig CRD. #6595
  • [FEATURE] Add support for the Azure SDK authentication to the remote-write configuration in the Prometheus and PrometheusAgent CRDs. #6596
  • [ENHANCEMENT] Add Go runtime scheduler metrics to the operator. #6563
  • [ENHANCEMENT] Add go_sync_mutex_wait_total_seconds_total metric to the operator. #6581
  • [BUGFIX] Allow templated strings for the responder's type in OpsGenie configuration. #6378
  • [BUGFIX] Fix nil pointer panic in the AlertmanagerConfig Webex receiver. #6582
  • [BUGFIX] Apply TLS scrape class settings to all PodMonitor, Probe and ScrapeConfig objects. #6573

0.73.2 / 2024-04-18

  • [BUGFIX] Fix ScrapeClassTLSConfig nil pointer exception. #6526
  • [BUGFIX] Fix missing prometheus_operator_kubernetes_client_http_requests_total metric. #6525

0.73.1 / 2024-04-10

  • [BUGFIX] To minimize excessive logging, log the deprecated bearer token fields at the debug level. #6495

0.73.0 / 2024-04-03

  • [CHANGE/BUGFIX] Add proxyURL validation for ServiceMonitor, PodMonitor and Probe objects. It could be a breaking change for those who rely on the configuration reloader sidecar to expand environment variables in the generated configuration file. #6464
  • [CHANGE/BUGFIX] Allow empty separator in relabel config. #6425
  • [FEATURE] Add summary field to the MSteams receiver. #6206
  • [FEATURE] Add support for Kuma SD in ScrapeConfig CRD. #6427,#6465
  • [FEATURE] ...

    Description has been truncated

…th 7 updates

Bumps the github-dependencies group with 7 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [github.com/IBM/keyprotect-go-client](https://github.com/IBM/keyprotect-go-client) | `0.12.2` | `0.14.0` |
| [github.com/aws/aws-sdk-go](https://github.com/aws/aws-sdk-go) | `1.50.35` | `1.53.5` |
| [github.com/ceph/go-ceph](https://github.com/ceph/go-ceph) | `0.26.0` | `0.27.0` |
| [github.com/hashicorp/vault/api](https://github.com/hashicorp/vault) | `1.12.0` | `1.13.0` |
| [github.com/k8snetworkplumbingwg/network-attachment-definition-client](https://github.com/k8snetworkplumbingwg/network-attachment-definition-client) | `1.6.0` | `1.7.0` |
| [github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring](https://github.com/prometheus-operator/prometheus-operator) | `0.72.0` | `0.74.0` |
| [github.com/prometheus-operator/prometheus-operator/pkg/client](https://github.com/prometheus-operator/prometheus-operator) | `0.72.0` | `0.74.0` |



Updates `github.com/IBM/keyprotect-go-client` from 0.12.2 to 0.14.0
- [Release notes](https://github.com/IBM/keyprotect-go-client/releases)
- [Changelog](https://github.com/IBM/keyprotect-go-client/blob/master/CHANGELOG.md)
- [Commits](IBM/keyprotect-go-client@v0.12.2...v0.14.0)

Updates `github.com/aws/aws-sdk-go` from 1.50.35 to 1.53.5
- [Release notes](https://github.com/aws/aws-sdk-go/releases)
- [Commits](aws/aws-sdk-go@v1.50.35...v1.53.5)

Updates `github.com/ceph/go-ceph` from 0.26.0 to 0.27.0
- [Release notes](https://github.com/ceph/go-ceph/releases)
- [Changelog](https://github.com/ceph/go-ceph/blob/master/docs/release-process.md)
- [Commits](ceph/go-ceph@v0.26.0...v0.27.0)

Updates `github.com/hashicorp/vault/api` from 1.12.0 to 1.13.0
- [Release notes](https://github.com/hashicorp/vault/releases)
- [Changelog](https://github.com/hashicorp/vault/blob/main/CHANGELOG.md)
- [Commits](hashicorp/vault@v1.12.0...v1.13.0)

Updates `github.com/k8snetworkplumbingwg/network-attachment-definition-client` from 1.6.0 to 1.7.0
- [Release notes](https://github.com/k8snetworkplumbingwg/network-attachment-definition-client/releases)
- [Commits](k8snetworkplumbingwg/network-attachment-definition-client@v1.6.0...v1.7.0)

Updates `github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring` from 0.72.0 to 0.74.0
- [Release notes](https://github.com/prometheus-operator/prometheus-operator/releases)
- [Changelog](https://github.com/prometheus-operator/prometheus-operator/blob/main/CHANGELOG.md)
- [Commits](prometheus-operator/prometheus-operator@v0.72.0...v0.74.0)

Updates `github.com/prometheus-operator/prometheus-operator/pkg/client` from 0.72.0 to 0.74.0
- [Release notes](https://github.com/prometheus-operator/prometheus-operator/releases)
- [Changelog](https://github.com/prometheus-operator/prometheus-operator/blob/main/CHANGELOG.md)
- [Commits](prometheus-operator/prometheus-operator@v0.72.0...v0.74.0)

---
updated-dependencies:
- dependency-name: github.com/IBM/keyprotect-go-client
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: github-dependencies
- dependency-name: github.com/aws/aws-sdk-go
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: github-dependencies
- dependency-name: github.com/ceph/go-ceph
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: github-dependencies
- dependency-name: github.com/hashicorp/vault/api
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: github-dependencies
- dependency-name: github.com/k8snetworkplumbingwg/network-attachment-definition-client
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: github-dependencies
- dependency-name: github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: github-dependencies
- dependency-name: github.com/prometheus-operator/prometheus-operator/pkg/client
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: github-dependencies
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels May 20, 2024
Copy link
Author

dependabot bot commented on behalf of github May 27, 2024

Superseded by #168.

@dependabot dependabot bot closed this May 27, 2024
@dependabot dependabot bot deleted the dependabot/go_modules/github-dependencies-bdb9012f15 branch May 27, 2024 07:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants