Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump github.com/coreos/ignition/v2 from 2.10.1 to 2.14.0 #2739

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 27, 2023

Bumps github.com/coreos/ignition/v2 from 2.10.1 to 2.14.0.

Release notes

Sourced from github.com/coreos/ignition/v2's releases.

v2.14.0

Starting with this release, ignition-validate binaries are signed with the Fedora 36 key.

Features:

  • Support KubeVirt platform
  • Support AWS arn: URLs for S3 objects and access points (3.4.0-exp)
  • Support reading configs from Azure IMDS "user data"
  • Support S3 fetch via IPv6
  • Add ignition-apply entrypoint to apply an Ignition config in a container

Changes:

  • Delete userdata after provisioning on VirtualBox and VMware by default (see operator notes for details) (GHSA-hj57-j5cw-2mwp, CVE-2022-1706)
  • Support setting setuid/setgid/sticky mode bits (3.4.0-exp)
  • Warn if setuid/setgid/sticky mode bits specified (3.0.0 - 3.3.0)
  • Support UEFI Secure Boot on VMware
  • Add arm64 support to ignition-validate container
  • Document S3 fetch semantics in operator notes
  • Document considerations for handling secrets in operator notes

Bug Fixes:

  • Fix disabling systemd units with pre-existing enablement symlinks
  • Fix reuse of statically keyed LUKS volumes (2.12.0 regression)
  • Fix gs:// fetch in GCE instances configured without a service account
  • Fix error reading VirtualBox guest properties that have flags
  • Fix infinite loop if -root command-line argument is a relative path

v2.13.0

Starting with this release, ignition-validate binaries are signed with the Fedora 35 key.

Features:

  • Add Nutanix provider
  • Switch VirtualBox provider to read from /Ignition/Config guest property

Changes:

  • Improve QEMU fw_cfg read performance
  • Warn when QEMU fw_cfg config is too large for reasonable performance
  • Move Ignition report to /etc/.ignition-result.json
  • Improve resilience to filesystem unmount failures
  • Run mkfs.fat instead of its alias mkfs.vfat
  • Refresh supported platform documentation

Bug Fixes:

  • Make ignition.version required in JSON schema (3.4.0-exp)
  • Disallow null noProxy array entries in JSON schema (3.4.0-exp)

... (truncated)

Changelog

Sourced from github.com/coreos/ignition/v2's changelog.

Ignition 2.14.0 (12-May-2022)

Starting with this release, ignition-validate binaries are signed with the Fedora 36 key.

Features

  • Support KubeVirt platform
  • Support AWS arn: URLs for S3 objects and access points (3.4.0-exp)
  • Support reading configs from Azure IMDS "user data"
  • Support S3 fetch via IPv6
  • Add ignition-apply entrypoint to apply an Ignition config in a container

Changes

  • Delete userdata after provisioning on VirtualBox and VMware by default (see operator notes for details) (GHSA-hj57-j5cw-2mwp, CVE-2022-1706)
  • Support setting setuid/setgid/sticky mode bits (3.4.0-exp)
  • Warn if setuid/setgid/sticky mode bits specified (3.0.0 - 3.3.0)
  • Support UEFI Secure Boot on VMware
  • Add arm64 support to ignition-validate container
  • Document S3 fetch semantics in operator notes
  • Document considerations for handling secrets in operator notes

Bug fixes

  • Fix disabling systemd units with pre-existing enablement symlinks
  • Fix reuse of statically keyed LUKS volumes (2.12.0 regression)
  • Fix gs:// fetch in GCE instances configured without a service account
  • Fix error reading VirtualBox guest properties that have flags
  • Fix infinite loop if -root command-line argument is a relative path

Ignition 2.13.0 (30-Nov-2021)

Starting with this release, ignition-validate binaries are signed with the Fedora 35 key.

Features

  • Add Nutanix provider
  • Switch VirtualBox provider to read from /Ignition/Config guest property

Changes

  • Improve QEMU fw_cfg read performance
  • Warn when QEMU fw_cfg config is too large for reasonable performance
  • Move Ignition report to /etc/.ignition-result.json
  • Improve resilience to filesystem unmount failures
  • Run mkfs.fat instead of its alias mkfs.vfat

... (truncated)

Commits
  • fef845a Merge pull request #1354 from prestist/update-news
  • d10f7c1 NEWS: update v2.14.0
  • 8110a50 Merge pull request #1365 from bgilbert/secrets
  • 339cb77 docs/operator-notes: add section on provisioning secrets
  • b0def86 Merge pull request #1359 from bgilbert/path
  • 8c03e60 Merge pull request #1364 from bgilbert/f36
  • 801a2ae Merge pull request #1363 from bgilbert/gs
  • 816b475 Dockerfile.validate: build with Fedora 36
  • 2febcab internal/resource: fix gs:// fetches in GCE without a service account
  • 427a35b Merge pull request #1358 from bgilbert/aws-docs
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/coreos/ignition/v2](https://github.com/coreos/ignition) from 2.10.1 to 2.14.0.
- [Release notes](https://github.com/coreos/ignition/releases)
- [Changelog](https://github.com/coreos/ignition/blob/main/docs/release-notes.md)
- [Commits](coreos/ignition@v2.10.1...v2.14.0)

---
updated-dependencies:
- dependency-name: github.com/coreos/ignition/v2
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jun 27, 2023
@openshift-ci openshift-ci bot requested review from csrwng and sjenning June 27, 2023 18:26
@openshift-ci openshift-ci bot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Jun 27, 2023
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 27, 2023

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@bryan-cox
Copy link
Member

/ok-to-test

@openshift-ci openshift-ci bot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Jun 28, 2023
@bryan-cox
Copy link
Member

/area ci-tooling

@openshift-ci openshift-ci bot added area/ci-tooling Indicates the PR includes changes for CI or tooling and removed do-not-merge/needs-area labels Jun 28, 2023
Copy link
Member

@bryan-cox bryan-cox left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jun 28, 2023
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 28, 2023

@dependabot[bot]: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@csrwng
Copy link
Contributor

csrwng commented Jun 30, 2023

/approve

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 30, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: bryan-cox, csrwng, dependabot[bot]

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 30, 2023
@openshift-merge-robot openshift-merge-robot merged commit 9c28f3a into main Jun 30, 2023
12 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/github.com/coreos/ignition/v2-2.14.0 branch June 30, 2023 23:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. area/ci-tooling Indicates the PR includes changes for CI or tooling dependencies Pull requests that update a dependency file lgtm Indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants