Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump kubevirt.io/containerized-data-importer-api from 1.60.2 to 1.61.0 #303

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Dec 2, 2024

Bumps kubevirt.io/containerized-data-importer-api from 1.60.2 to 1.61.0.

Release notes

Sourced from kubevirt.io/containerized-data-importer-api's releases.

v1.61.0

This release follows v1.60.0 and consists of 53 changes, contributed by 18 people, leading to 99 files changed, 4230 insertions(+), 1273 deletions(-).

The source code and selected binaries are available for download at: https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.61.0.

Pre-built CDI containers are published on Quay.io and can be viewed at: https://quay.io/repository/kubevirt/cdi-controller/ https://quay.io/repository/kubevirt/cdi-importer/ https://quay.io/repository/kubevirt/cdi-cloner/ https://quay.io/repository/kubevirt/cdi-uploadproxy/ https://quay.io/repository/kubevirt/cdi-apiserver/ https://quay.io/repository/kubevirt/cdi-uploadserver/ https://quay.io/repository/kubevirt/cdi-operator/

Notable changes

Enhancement: Add nbdkit command line parameters to improve reliability of multi-stage VDDK imports Enhancement: enable cross compile tools for s390x for CDI builder BugFix: Fix PVC deletion logic in CDI populators Enhancement: enable s390x native build BugFix: Bump tar rpm to fix concurrent host-assisted clone tar failure on file change during read BugFix: Increased size of scratch space to take fs overhead into account Enhancement: Handle desired storage class changes automatically in cron controller by deleting old storage class sources Cleanup: Deprecating ObjectTransfer feature Enhancement: provide s390x support for functional tests Enhancement: Add s390x nightly build automation BugFix: Handle PunchHole/AppendZeroWithTruncate failures Enhancement: Suppress alerting for static provisioning Cleanup: Document device_ownership_from_security_context=true for containerd v2 BugFix: Warm imports to filesystem volumes would fail size validation on subsequent snapshots Enhancement: Explicitly declaring containerPort in cdi-apiserver deployment BugFix: Reduce frequency of SCC management Events BugFix: Reduce frequency of Route management events BugFix: Fix uploading for block devices that exceed requested size Cleanup: Standardize go.mod to not specify patch version BugFix: nil pointer in handleSnapshot BugFix: config controller broken with ingresses Enhancement: Add RWX to AWS EBS io2 storage capabilities BugFix: VDDK Fix Incomplete transfer of change blocks leads to data corruption Cleanup: cdi-uploadserver: healthcheck and application use same port

Contributors

18 people contributed to this release:

... (truncated)

Changelog

Sourced from kubevirt.io/containerized-data-importer-api's changelog.

v1.61.0 Enhancement: Add nbdkit command line parameters to improve reliability of multi-stage VDDK imports Enhancement: enable cross compile tools for s390x for CDI builder BugFix: Fix PVC deletion logic in CDI populators Enhancement: enable s390x native build BugFix: Bump tar rpm to fix concurrent host-assisted clone tar failure on file change during read BugFix: Increased size of scratch space to take fs overhead into account Enhancement: Handle desired storage class changes automatically in cron controller by deleting old storage class sources Cleanup: Deprecating ObjectTransfer feature Enhancement: provide s390x support for functional tests Enhancement: Add s390x nightly build automation BugFix: Handle PunchHole/AppendZeroWithTruncate failures Enhancement: Suppress alerting for static provisioning Cleanup: Document device_ownership_from_security_context=true for containerd v2 BugFix: Warm imports to filesystem volumes would fail size validation on subsequent snapshots Enhancement: Explicitly declaring containerPort in cdi-apiserver deployment BugFix: Reduce frequency of SCC management Events BugFix: Reduce frequency of Route management events BugFix: Fix uploading for block devices that exceed requested size Cleanup: Standardize go.mod to not specify patch version BugFix: nil pointer in handleSnapshot BugFix: config controller broken with ingresses Enhancement: Add RWX to AWS EBS io2 storage capabilities BugFix: VDDK Fix Incomplete transfer of change blocks leads to data corruption Cleanup: cdi-uploadserver: healthcheck and application use same port

Commits
  • 3cfe2b7 v1.61.0 release notes
  • d57445e CNV-51521 | Fix Incomplete transfer of change blocks leads to data corruption...
  • 6408daf cdi-uploadserver: healthcheck and application use same port (#3536)
  • ed0b779 Run bazelisk run //robots/cmd/uploader:uploader -- -workspace /home/prow/go/s...
  • 448fe9d Add RWX to AWS EBS io2 capabilities (#3528)
  • d4bee3d Populators: Add to PVC' exclude velero backup label (#3522)
  • a03c153 Fix the location of the nightly commit file (#3521)
  • 13c2bf5 add the commit file to the nightly build, as in kv/kv (#3518)
  • 44948dd Add RBAC for secrets in the CDI namespace (#3516)
  • a25dd7e Add the "latest" endpoint for the nightly manifest (#3509)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [kubevirt.io/containerized-data-importer-api](https://github.com/kubevirt/containerized-data-importer) from 1.60.2 to 1.61.0.
- [Release notes](https://github.com/kubevirt/containerized-data-importer/releases)
- [Changelog](https://github.com/kubevirt/containerized-data-importer/blob/v1.61.0/manual-release-notes)
- [Commits](kubevirt/containerized-data-importer@v1.60.2...v1.61.0)

---
updated-dependencies:
- dependency-name: kubevirt.io/containerized-data-importer-api
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Dec 2, 2024
@kubevirt-bot kubevirt-bot added the dco-signoff: yes Indicates the PR's author has DCO signed all their commits. label Dec 2, 2024
@kubevirt-bot
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign alromeros for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@dependabot dependabot bot requested review from awels and ShellyKa13 December 2, 2024 04:28
@kubevirt-bot
Copy link

Hi @dependabot[bot]. Thanks for your PR.

PRs from untrusted users cannot be marked as trusted with /ok-to-test in this repo meaning untrusted PR authors can never trigger tests themselves. Collaborators can still trigger tests on the PR using /test all.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dco-signoff: yes Indicates the PR's author has DCO signed all their commits. dependencies Pull requests that update a dependency file size/S
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant