generated from SAP/repository-template
-
Notifications
You must be signed in to change notification settings - Fork 2
fix(deps): update non-minor dependencies #94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
main
Choose a base branch
from
renovate/non-minor-deps
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ℹ Artifact update noticeFile name: go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
abef6b0
to
e0a52e3
Compare
e0a52e3
to
bc8142d
Compare
bc8142d
to
0935702
Compare
0935702
to
ca2b2c0
Compare
ca2b2c0
to
9ee9a2c
Compare
9ee9a2c
to
4fb9a60
Compare
4fb9a60
to
188426c
Compare
188426c
to
2e2645e
Compare
2e2645e
to
ccf66c1
Compare
ccf66c1
to
6b05d67
Compare
36f30fe
to
cf0b5f6
Compare
cf0b5f6
to
dcfe639
Compare
dcfe639
to
d848bc5
Compare
d848bc5
to
e3a35ad
Compare
e3a35ad
to
689d487
Compare
689d487
to
a37789e
Compare
a37789e
to
bc1943e
Compare
bc1943e
to
aa54058
Compare
9cad1b3
to
cba1939
Compare
660fad0
to
1261a3e
Compare
1261a3e
to
ab3039e
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v0.3.67
->v0.3.89
1.24.0
->1.24.2
v0.20.1
->v0.20.4
1a91ccc
->6ad5c1d
Release Notes
sap/component-operator-runtime (github.com/sap/component-operator-runtime)
v0.3.89
Compare Source
v0.3.88
Compare Source
Fixes
With restricted privileges (that is not having full
cluster-admin
rights) Kubernetes checks that (cluster)roles assigned through a (cluster)rolebinding do exist (probably it needs to read it in order to perform the escalation check).That is, (cluster)roles must be always created before any (cluster)rolebindings referencing them.
Previously, component-operator-runtime applied roles and bindings in one and the same wave; with the effect that a deadlock could happen if the binding happened to be first. This is now corrected, that is, (cluster)roles are created before (cluster)rolebinindings.
v0.3.87
Compare Source
Incompatible changes
This release slightly changes the processing timeout logic.
Previously the processing timeout was reset (means:
status.processingSince
was set to the current time), and then started counting down whenever the component digest changed. This had the effect that a component starting inPending
state (for example because it is waiting for another dependent component to become ready) might time out before it ever got a chance to really process. With the consequence that, once it eventually started processing, its state was immediatelyError
withTimeout
reason.From now on,
status.processingSince
is not set immediately when the digest changes, but later, when the first apply iteration happens after the digest change.v0.3.86
: v03.86Compare Source
Fixes
This is a bugfix release; it fixes #265 and #267.
The logic around the
SsaOverride
update policy should now work reliably.Incompatible changes
Previously, with
SsaOverride
fields owned by field managers starting withkubectl
orhelm
were reclaimed by component-operator-runtime and, if the intended manifest did not have an opinion on these fields, dropped. With that releasehelm
is removed from this list of specially treated field managers. This change is necessary to avoid clashes with flux's helm-controller which uses field managerhelm-controller
.v0.3.85
Compare Source
v0.3.84
Compare Source
Changes
This is a bugfix release; see https://github.com/SAP/component-operator-runtime/pull/260.
v0.3.83
Compare Source
This release is about revisiting/improving the timeout handling of components.
Improving the logic of the processing/timeout flow
It is well-known that every component has a processing timeout. Components can specify the timeout value by implementing the
component.TimeoutConfiguration
interface. Otherwise (or if a zero timeout is specified), it will be defaulted by the effective requeue interval, which defaults to 10 minutes.Then, note that a component can be in a 'processing' or 'non-processing' state (which is not directly related to
status.state
beingProcessing
). Here, 'processing' means thatstatus.processingSince
is non-initial. Now, if a component is reconciled, a certain component digest is calculated from the component's annotations, spec and references in the spec (see below for more details about references). Whenever this component digest differs from the currentstatus.processingDigest
, thenstatus.processingSince
is set to the current time, andstatus.processingDigest
is set to the new component digest.Roughly spoken, that means a new timeout countdown is started.
In addition to 'processing' a component can be in a 'timeout' state; this is the case if the
status.processingSince
timestamp lies more than the specified timeout duration in the past. If a component gets into the 'timeout' statestatus.state
) will be set toError
with condition reasonTimeout
Error
orPending
), and the condition reason is set toTimeout
.That means, a timeout can always be reliably detected by checking if the condition reason equals
Timeout
.A 'processing' component will be set to 'non-processing' (that is,
status.processingSince
is cleared) if the component becomes ready (in that case, in addition, one immediate requeue is triggered).Calculation of the component digest
At the beginning of the reconcilation of a component, a (component) digest is calculated that considers
metadata.annotations
of the componentmetadata.generation
resp. the spec of the componentConfigMapReference
,ConfigMapKeyReference
,SecretReference
,SecretKeyReference
,Reference
.Such references will be automatically loaded at the beginning of the reconcile iteration; for the builtin
ConfigMap
andSecret
reference types the logic is part of the framework, and for types implementing theinterface, the loading and digest logic is to be provided by the implementation. Besides being used in the timeout handling as
status.processingDigest
, the component digestOnObjectOrComponentChange
.Roughly speaking, the component digest should identify result of reconciling the component as exact as possible; that means: applying two components with identical digest should produce the same cluster state.
Incompatible changes
Besides the changes outlined above (which should not have a bad impact) this release contains the following incompatible changes:
status.state
was set toPending
with reasonPending
, respectively toDeletionPending
with reasonDeletionPending
; the reason values are changed toRetrying
andDeletionRetrying
, respectivelyRestarting
was added, that will be used withstatus.state
beingPending
, if the processing state of a component is reset due to a component digest change.v0.3.82
Compare Source
v0.3.81
Compare Source
v0.3.80
Compare Source
v0.3.79
Compare Source
Enhancements
So far, the framework emitted really many component events, mostly if the component is in
Processing
state. That often exceeded the burst of the event broadcaster provided by controller-runtime (b=25, r=1/300
, see https://github.com/kubernetes/client-go/blob/b46275ad754db4dd7695a48cd3ca673e0154dd9e/tools/record/events_cache.go#L43).We change that now. If there are identical subsequent events produced for a component, only the first one will be emitted within 5 minutes; after 5 minutes, again one instance of the throttled event may be sent, and so on.
v0.3.78
Compare Source
Notable changes
status.ProcessingDigest
) is now considering themetadata.generation
of the component.v0.3.77
Compare Source
Enhancements
New methods are added to
cluster.Client
:In addition there is a new reconciler option
with
This allow to replace or modify the default component/hook client that would be used by the reconciler
v0.3.76
Compare Source
v0.3.75
Compare Source
Enhancements
Additional managed types
By its nature, component-operator-runtime tries to handle extension types (such as CRDs or API groups added through APIService federation), and instances of these types, in a smart way.
That is, if the component contains extension types, and also instances of these types, it tries to process things in the right order; that means, during apply the instances will be applied as late as possible (to ensure that controllers and webhooks are up); and during delete, the instances will be deleted as early as possible (to ensure that controllers and webhooks are still there). Furthermore, during deletion, foreign instances (that is, instances of these types that are not part of the component) block the deletion of the whole component.
Sometimes, components are implicitly adding extension types to the cluster; in the sense that the extension types are not explicitly part of the manifests, but added in the dark through controllers, once running. A typical example are crossplane providers.
This PR tries to add some relief in this situation. Components can now list 'additional managed types', by implementing the
TypeConfiguration
interface; these 'additional managed types' will be treated in the same way as extension types which are explicitly mentioned in the manifest.Improved APIService handling
Up to now,
APIService
objects were deployed along with the other regular (that was: unmanaged) objects of the current apply wave. As a consequence, if the federated API server was not yet ready,stale group version
errors were returned by the discovery API of the main API server. To overcome this problem,APIService
objects receive a special handling now, in the sense that they are reconciled (in the apply wave) after all other regular objects, and before all managed instances. That means: within each apply order, objects are deployed to readiness in three sub stagesAPIService
objects)APIService
)Within each of these sub groups, the static ordering defined in
sortObjectsForApply()
is effective.More robust handling of external recreations happening during deletion
Previously there was a rare race condition while deleting objects (either during component delete or component apply):
The old logic was:
ScheduledForDeletion
during apply or if the whole component is being deleted); if successful (that is API server responds with 2xx) then the inventory status of the dependent object is set toDeleting
.Now, if the object was recreated by someone right between 1. and 2. then the reconciler went stuck.
Note that really does not happen usually (also because the critical period is very, very short).
To overcome, we are now checking the deletion timestamp of the dependent object (if still or again existing). If it has none, then we check the owner; if it is not us, then we give the object up (because apparently, someone else has just recreated it).
v0.3.74
Compare Source
Improvements
So far, there was no special logic to check status status of
CustomResourceDefinition
andAPIService
resources.That is, they were considered ready immediately, which was causing problems (for example, lookup errors when querying the discovery API immediately after creating an
APIService
, such as... stale GroupVersion discovery ...
).To mitigate, the default status analyzer now evaluates existing conditions (such as the
Available
condition ofAPIService
).v0.3.73
Compare Source
v0.3.72
Compare Source
Incompatible changes
Background: values passed to the built-in generators and transformers
are of type
map[string]any
. Of course, templates are rendered with themissingkey=zero
option.But still, if a key is missing in the values, the empty value of
any
(returned in this case)makes the go templating engine return
<no value>
in that case.Helm decided to override that by replacing all occurrences of the string
<no value>
in any template output.Starting with this PR we adopt the helm approach, and do the same.
v0.3.71
Compare Source
Incompatible changes
Orphan
is slightly changed; previouslyOrphan
had no effect if a dependent object became redundant during apply (that is, it was part of the component manifest before, and is no longer now). Now, if an object has an effective deletion policyOrphan
, then it will be always orphaned ifEnhancements
OrphanOnApply
andOrphanOnDelete
, with the obvious meaning.apiResources
is added forKustomizeGenerator
. It returns[]*metav1.APIResourceList
, as returned by the discovery client's methodServerGroupsAndResources
, see https://pkg.go.dev/k8s.io/[email protected]/discovery#ServerResourcesInterface.ServerGroupsAndResources.v0.3.70
Compare Source
Changes
This release finalizes the reworking of the force-reapply logic started in https://github.com/SAP/component-operator-runtime/releases/tag/v0.3.62.
So far, a dependent object was applied to the cluster if
status.inventory[].lastAppliedAt
timestamp is set and is more than 60m in the past.The third condition is now changed to
status.inventory[].lastAppliedAt
timestamp is not set, or is set and is more than 60m in the past.As a consequence, the component CRD now must contain the
status.inventory[].lastAppliedAt
field, that is the consumers must have regenerated their CRD to reflect the current component-operator-runtime API types, as already stated in the release notes of v0.3.62.v0.3.69
Compare Source
Enhancements
Starting with this release, the deletion of dependent objects will fail unless the existing value of the owner-id label of the dependent object matches the component that wants to delete it. If the owner-id label is missing, or the value does not match, the deletion will be rejected.
v0.3.68
Compare Source
kubernetes-sigs/controller-runtime (sigs.k8s.io/controller-runtime)
v0.20.4
Compare Source
What's Changed
Full Changelog: kubernetes-sigs/controller-runtime@v0.20.3...v0.20.4
v0.20.3
Compare Source
What's Changed
Full Changelog: kubernetes-sigs/controller-runtime@v0.20.2...v0.20.3
v0.20.2
Compare Source
What's Changed
Full Changelog: kubernetes-sigs/controller-runtime@v0.20.1...v0.20.2
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.