Tags: google/kf
Tags
Set version of php-buildpack to v4.6.23 to address git clone error in… … run-lifecycle task (#1081) ## Release Notes ```release-note Changed version of php-buildpack used from latest to v4.6.23 as a workaround to github.com/cloudfoundry/php-buildpack/issues/1110 ```
Upgraded server-side dependencies: Tekton, ASM, Config Connector (#1064) <!-- Include the issue number below --> ## Proposed Changes * Upgraded dependencies - Tekton to 0.53.2, ASM to 1.19 and Config Connector to 1.111 ## Release Notes ```release-note CHANGED Server-side dependencies - Tekton to 0.53.2, ASM to 1.19 and Config Connector to 1.111 ```
Revert PR: #1049 (#1063) PR: #1049 is breaking .net Core applications, where lower case environment variables are expected. Proposing this change, before better fix is available <!-- Include the issue number below --> Fixes # ## Proposed Changes * * * ## Release Notes <!-- kf follows the Keep A Changelog standard for release notes. https://keepachangelog.com/en/1.0.0/ Changelog entries should be one per line and start with one of the following words: `Added` for new features. `Changed` for changes in existing functionality. `Deprecated` for soon-to-be removed features. `Removed` for now removed features. `Fixed` for any bug fixes. `Security` in case of vulnerabilities. If one of the changes is breaking include that as a second word e.g. Removed BREAKING support for manifests v1 --> ```release-note ```
chore: ensure that e2e tests cleanup clusters (#1057) Ensures that the delete clusters flow executes even when * cluster turnup succeeds partially (e.g. cluster created but various kubectl apply operations fail) * other testing stages fail This reduces resource waste in our integration testing project.
Bump golang.org/x/net from 0.0.0-20220225172249-27dd8689420f to 0.7.0… … in /operator (#1045) Bumps [golang.org/x/net](https://github.com/golang/net) from 0.0.0-20220225172249-27dd8689420f to 0.7.0. <details> <summary>Commits</summary> <ul> <li>See full diff in <a href="https://github.com/golang/net/commits/v0.7.0">compare view</a></li> </ul> </details> <br /> [](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/google/kf/network/alerts). </details> Signed-off-by: dependabot[bot] <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Add the ability to override KSAs. (#1020) This is a new opt-in feature that will allow developers to supply custom KSAs for their applciations. This will allow consistent KSAs to be used for blue/green applications, and for integrations like GCP's workload identity to work with the KSAs in Kf -- supporting Kf users who want to move away from Service Brokers and use rotating creds.
Fixes for issues in 1.18 pre-release (#1016) * Generated docs for xargs-apps * Fixed pluralization in xargs-apps * Fixed incorrect examples in xargs-apps * Changed xargs-apps into an experimental subcommand * Added extra comment in xargs-apps to allow exporting as a command * Fixed garbagecollector logging name * Added config watcher to garbagecollector logger to prevent a panic
PreviousNext