From 75f4606c5ac0fa76cf2a856d2c83c4f1edae732d Mon Sep 17 00:00:00 2001 From: Tyler Helmuth <12352919+TylerHelmuth@users.noreply.github.com> Date: Thu, 18 Jan 2024 10:50:26 -0700 Subject: [PATCH] [operator] Bump operator version to 0.92.1 (#998) * Bump operator version to 0.92.0 * update cluster role * generate examples * Bump to 0.92.1 * Revert "update cluster role" This reverts commit 7f4356954601eeb0ee2a3596e95df4aeab82183e. * regenerate --- charts/opentelemetry-operator/Chart.yaml | 4 +- .../crds/crd-opentelemetrycollector.yaml | 262 ++++++++++++++---- .../operator-webhook-with-cert-manager.yaml | 8 +- .../default/rendered/certmanager.yaml | 8 +- .../default/rendered/clusterrole.yaml | 12 +- .../default/rendered/clusterrolebinding.yaml | 8 +- .../examples/default/rendered/deployment.yaml | 6 +- .../examples/default/rendered/role.yaml | 4 +- .../default/rendered/rolebinding.yaml | 4 +- .../examples/default/rendered/service.yaml | 8 +- .../default/rendered/serviceaccount.yaml | 4 +- .../tests/test-certmanager-connection.yaml | 4 +- .../tests/test-service-connection.yaml | 8 +- .../opentelemetry-operator/values.schema.json | 16 +- 14 files changed, 260 insertions(+), 96 deletions(-) diff --git a/charts/opentelemetry-operator/Chart.yaml b/charts/opentelemetry-operator/Chart.yaml index a173c5e79..05dd88531 100644 --- a/charts/opentelemetry-operator/Chart.yaml +++ b/charts/opentelemetry-operator/Chart.yaml @@ -1,6 +1,6 @@ apiVersion: v2 name: opentelemetry-operator -version: 0.45.2 +version: 0.46.0 description: OpenTelemetry Operator Helm chart for Kubernetes type: application home: https://opentelemetry.io/ @@ -11,4 +11,4 @@ maintainers: - name: dmitryax - name: TylerHelmuth icon: https://raw.githubusercontent.com/cncf/artwork/a718fa97fffec1b9fd14147682e9e3ac0c8817cb/projects/opentelemetry/icon/color/opentelemetry-icon-color.png -appVersion: 0.91.0 +appVersion: 0.92.1 diff --git a/charts/opentelemetry-operator/crds/crd-opentelemetrycollector.yaml b/charts/opentelemetry-operator/crds/crd-opentelemetrycollector.yaml index 56f84cbb6..c505cb08b 100644 --- a/charts/opentelemetry-operator/crds/crd-opentelemetrycollector.yaml +++ b/charts/opentelemetry-operator/crds/crd-opentelemetrycollector.yaml @@ -2218,6 +2218,37 @@ spec: - name type: object type: array + deploymentUpdateStrategy: + description: UpdateStrategy represents the strategy the operator will + take replacing existing Deployment pods with new pods https://kubernetes. + properties: + rollingUpdate: + description: 'Rolling update config params. Present only if DeploymentStrategyType + = RollingUpdate. --- TODO: Update this to follow our convention + for oneOf, whatever we decide it to be.' + properties: + maxSurge: + anyOf: + - type: integer + - type: string + description: 'The maximum number of pods that can be scheduled + above the desired number of pods. Value can be an absolute + number (ex: 5) or a percentage of desired pods (ex: 10%).' + x-kubernetes-int-or-string: true + maxUnavailable: + anyOf: + - type: integer + - type: string + description: 'The maximum number of pods that can be unavailable + during the update. Value can be an absolute number (ex: + 5) or a percentage of desired pods (ex: 10%).' + x-kubernetes-int-or-string: true + type: object + type: + description: Type of deployment. Can be "Recreate" or "RollingUpdate". + Default is RollingUpdate. + type: string + type: object env: description: ENV vars to set on the OpenTelemetry Collector's Pods. These can then in certain cases be consumed in the config file for @@ -5021,10 +5052,11 @@ spec: type: object type: object allocationStrategy: + default: consistent-hashing description: AllocationStrategy determines which strategy the target allocator should use for allocation. The current options are least-weighted and consistent-hashing. The default option - is least-weighted + is consistent-hashing enum: - least-weighted - consistent-hashing @@ -5194,6 +5226,134 @@ spec: the eviction, i.e. even in the absence of the evicted pod. x-kubernetes-int-or-string: true type: object + podSecurityContext: + description: PodSecurityContext configures the pod security context + for the targetallocator. + properties: + fsGroup: + description: "A special supplemental group that applies to + all containers in a pod. Some volume types allow the Kubelet + to change the ownership of that volume to be owned by the + pod: \n 1." + format: int64 + type: integer + fsGroupChangePolicy: + description: fsGroupChangePolicy defines behavior of changing + ownership and permission of the volume before being exposed + inside Pod. + type: string + runAsGroup: + description: The GID to run the entrypoint of the container + process. Uses runtime default if unset. May also be set + in SecurityContext. + format: int64 + type: integer + runAsNonRoot: + description: Indicates that the container must run as a non-root + user. + type: boolean + runAsUser: + description: The UID to run the entrypoint of the container + process. Defaults to user specified in image metadata if + unspecified. May also be set in SecurityContext. + format: int64 + type: integer + seLinuxOptions: + description: The SELinux context to be applied to all containers. + If unspecified, the container runtime will allocate a random + SELinux context for each container. May also be set in + SecurityContext. + properties: + level: + description: Level is SELinux level label that applies + to the container. + type: string + role: + description: Role is a SELinux role label that applies + to the container. + type: string + type: + description: Type is a SELinux type label that applies + to the container. + type: string + user: + description: User is a SELinux user label that applies + to the container. + type: string + type: object + seccompProfile: + description: The seccomp options to use by the containers + in this pod. Note that this field cannot be set when spec.os.name + is windows. + properties: + localhostProfile: + description: localhostProfile indicates a profile defined + in a file on the node should be used. The profile must + be preconfigured on the node to work. + type: string + type: + description: "type indicates which kind of seccomp profile + will be applied. Valid options are: \n Localhost - a + profile defined in a file on the node should be used." + type: string + required: + - type + type: object + supplementalGroups: + description: A list of groups applied to the first process + run in each container, in addition to the container's primary + GID, the fsGroup (if specified), and group memberships defined + in the container image for th + items: + format: int64 + type: integer + type: array + sysctls: + description: Sysctls hold a list of namespaced sysctls used + for the pod. Pods with unsupported sysctls (by the container + runtime) might fail to launch. Note that this field cannot + be set when spec.os. + items: + description: Sysctl defines a kernel parameter to be set + properties: + name: + description: Name of a property to set + type: string + value: + description: Value of a property to set + type: string + required: + - name + - value + type: object + type: array + windowsOptions: + description: The Windows specific settings applied to all + containers. If unspecified, the options within a container's + SecurityContext will be used. + properties: + gmsaCredentialSpec: + description: GMSACredentialSpec is where the GMSA admission + webhook (https://github.com/kubernetes-sigs/windows-gmsa) + inlines the contents of the GMSA credential spec named + by the GMSACredentialSpecName field. + type: string + gmsaCredentialSpecName: + description: GMSACredentialSpecName is the name of the + GMSA credential spec to use. + type: string + hostProcess: + description: HostProcess determines if a container should + be run as a 'Host Process' container. + type: boolean + runAsUserName: + description: The UserName in Windows to run the entrypoint + of the container process. Defaults to the user specified + in image metadata if unspecified. May also be set in + PodSecurityContext. + type: string + type: object + type: object prometheusCR: description: PrometheusCR defines the configuration for the retrieval of PrometheusOperator CRDs ( servicemonitor.monitoring.coreos.com/v1 @@ -5282,22 +5442,54 @@ spec: description: SecurityContext configures the container security context for the targetallocator. properties: - fsGroup: - description: "A special supplemental group that applies to - all containers in a pod. Some volume types allow the Kubelet - to change the ownership of that volume to be owned by the - pod: \n 1." - format: int64 - type: integer - fsGroupChangePolicy: - description: fsGroupChangePolicy defines behavior of changing - ownership and permission of the volume before being exposed - inside Pod. + allowPrivilegeEscalation: + description: AllowPrivilegeEscalation controls whether a process + can gain more privileges than its parent process. This bool + directly controls if the no_new_privs flag will be set on + the container process. + type: boolean + capabilities: + description: The capabilities to add/drop when running containers. + Defaults to the default set of capabilities granted by the + container runtime. Note that this field cannot be set when + spec.os.name is windows. + properties: + add: + description: Added capabilities + items: + description: Capability represent POSIX capabilities + type + type: string + type: array + drop: + description: Removed capabilities + items: + description: Capability represent POSIX capabilities + type + type: string + type: array + type: object + privileged: + description: Run container in privileged mode. Processes in + privileged containers are essentially equivalent to root + on the host. Defaults to false. Note that this field cannot + be set when spec.os.name is windows. + type: boolean + procMount: + description: procMount denotes the type of proc mount to use + for the containers. The default is DefaultProcMount which + uses the container runtime defaults for readonly paths and + masked paths. type: string + readOnlyRootFilesystem: + description: Whether this container has a read-only root filesystem. + Default is false. Note that this field cannot be set when + spec.os.name is windows. + type: boolean runAsGroup: description: The GID to run the entrypoint of the container process. Uses runtime default if unset. May also be set - in SecurityContext. + in PodSecurityContext. format: int64 type: integer runAsNonRoot: @@ -5307,14 +5499,14 @@ spec: runAsUser: description: The UID to run the entrypoint of the container process. Defaults to user specified in image metadata if - unspecified. May also be set in SecurityContext. + unspecified. May also be set in PodSecurityContext. format: int64 type: integer seLinuxOptions: - description: The SELinux context to be applied to all containers. + description: The SELinux context to be applied to the container. If unspecified, the container runtime will allocate a random SELinux context for each container. May also be set in - SecurityContext. + PodSecurityContext. properties: level: description: Level is SELinux level label that applies @@ -5334,9 +5526,9 @@ spec: type: string type: object seccompProfile: - description: The seccomp options to use by the containers - in this pod. Note that this field cannot be set when spec.os.name - is windows. + description: The seccomp options to use by this container. + If seccomp options are provided at both the pod & container + level, the container options override the pod options. properties: localhostProfile: description: localhostProfile indicates a profile defined @@ -5351,38 +5543,10 @@ spec: required: - type type: object - supplementalGroups: - description: A list of groups applied to the first process - run in each container, in addition to the container's primary - GID, the fsGroup (if specified), and group memberships defined - in the container image for th - items: - format: int64 - type: integer - type: array - sysctls: - description: Sysctls hold a list of namespaced sysctls used - for the pod. Pods with unsupported sysctls (by the container - runtime) might fail to launch. Note that this field cannot - be set when spec.os. - items: - description: Sysctl defines a kernel parameter to be set - properties: - name: - description: Name of a property to set - type: string - value: - description: Value of a property to set - type: string - required: - - name - - value - type: object - type: array windowsOptions: description: The Windows specific settings applied to all - containers. If unspecified, the options within a container's - SecurityContext will be used. + containers. If unspecified, the options from the PodSecurityContext + will be used. properties: gmsaCredentialSpec: description: GMSACredentialSpec is where the GMSA admission diff --git a/charts/opentelemetry-operator/examples/default/rendered/admission-webhooks/operator-webhook-with-cert-manager.yaml b/charts/opentelemetry-operator/examples/default/rendered/admission-webhooks/operator-webhook-with-cert-manager.yaml index 26d8f3d79..576961b87 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/admission-webhooks/operator-webhook-with-cert-manager.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/admission-webhooks/operator-webhook-with-cert-manager.yaml @@ -6,9 +6,9 @@ metadata: annotations: cert-manager.io/inject-ca-from: default/example-opentelemetry-operator-serving-cert labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: webhook @@ -91,9 +91,9 @@ metadata: annotations: cert-manager.io/inject-ca-from: default/example-opentelemetry-operator-serving-cert labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: webhook diff --git a/charts/opentelemetry-operator/examples/default/rendered/certmanager.yaml b/charts/opentelemetry-operator/examples/default/rendered/certmanager.yaml index b99546f8e..d78d0c470 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/certmanager.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/certmanager.yaml @@ -4,9 +4,9 @@ apiVersion: cert-manager.io/v1 kind: Certificate metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: webhook @@ -29,9 +29,9 @@ apiVersion: cert-manager.io/v1 kind: Issuer metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: webhook diff --git a/charts/opentelemetry-operator/examples/default/rendered/clusterrole.yaml b/charts/opentelemetry-operator/examples/default/rendered/clusterrole.yaml index 93ca28f96..51e687aaa 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/clusterrole.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/clusterrole.yaml @@ -4,9 +4,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager @@ -253,9 +253,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager @@ -271,9 +271,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager diff --git a/charts/opentelemetry-operator/examples/default/rendered/clusterrolebinding.yaml b/charts/opentelemetry-operator/examples/default/rendered/clusterrolebinding.yaml index f0590f19e..f2069ffd1 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/clusterrolebinding.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/clusterrolebinding.yaml @@ -4,9 +4,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager @@ -25,9 +25,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager diff --git a/charts/opentelemetry-operator/examples/default/rendered/deployment.yaml b/charts/opentelemetry-operator/examples/default/rendered/deployment.yaml index 2d8c321dd..7a752b438 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/deployment.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/deployment.yaml @@ -4,9 +4,9 @@ apiVersion: apps/v1 kind: Deployment metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager @@ -39,7 +39,7 @@ spec: env: - name: ENABLE_WEBHOOKS value: "true" - image: "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator:0.91.0" + image: "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator:0.92.1" name: manager ports: - containerPort: 8080 diff --git a/charts/opentelemetry-operator/examples/default/rendered/role.yaml b/charts/opentelemetry-operator/examples/default/rendered/role.yaml index c25e7c24d..9d033429b 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/role.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/role.yaml @@ -4,9 +4,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager diff --git a/charts/opentelemetry-operator/examples/default/rendered/rolebinding.yaml b/charts/opentelemetry-operator/examples/default/rendered/rolebinding.yaml index c720f6328..b732325a6 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/rolebinding.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/rolebinding.yaml @@ -4,9 +4,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager diff --git a/charts/opentelemetry-operator/examples/default/rendered/service.yaml b/charts/opentelemetry-operator/examples/default/rendered/service.yaml index 0fb5f7090..fa5b909de 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/service.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/service.yaml @@ -4,9 +4,9 @@ apiVersion: v1 kind: Service metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager @@ -31,9 +31,9 @@ apiVersion: v1 kind: Service metadata: labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager diff --git a/charts/opentelemetry-operator/examples/default/rendered/serviceaccount.yaml b/charts/opentelemetry-operator/examples/default/rendered/serviceaccount.yaml index 318d1d21b..0fd9bce69 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/serviceaccount.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/serviceaccount.yaml @@ -6,9 +6,9 @@ metadata: name: opentelemetry-operator namespace: default labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager diff --git a/charts/opentelemetry-operator/examples/default/rendered/tests/test-certmanager-connection.yaml b/charts/opentelemetry-operator/examples/default/rendered/tests/test-certmanager-connection.yaml index 4529b4982..ceaef1dda 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/tests/test-certmanager-connection.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/tests/test-certmanager-connection.yaml @@ -6,9 +6,9 @@ metadata: name: "example-opentelemetry-operator-cert-manager" namespace: default labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: webhook diff --git a/charts/opentelemetry-operator/examples/default/rendered/tests/test-service-connection.yaml b/charts/opentelemetry-operator/examples/default/rendered/tests/test-service-connection.yaml index 8d5d72cd0..bc1756d43 100644 --- a/charts/opentelemetry-operator/examples/default/rendered/tests/test-service-connection.yaml +++ b/charts/opentelemetry-operator/examples/default/rendered/tests/test-service-connection.yaml @@ -6,9 +6,9 @@ metadata: name: "example-opentelemetry-operator-metrics" namespace: default labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager @@ -43,9 +43,9 @@ metadata: name: "example-opentelemetry-operator-webhook" namespace: default labels: - helm.sh/chart: opentelemetry-operator-0.45.2 + helm.sh/chart: opentelemetry-operator-0.46.0 app.kubernetes.io/name: opentelemetry-operator - app.kubernetes.io/version: "0.91.0" + app.kubernetes.io/version: "0.92.1" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: example app.kubernetes.io/component: controller-manager diff --git a/charts/opentelemetry-operator/values.schema.json b/charts/opentelemetry-operator/values.schema.json index 45c954087..4c7f0f658 100644 --- a/charts/opentelemetry-operator/values.schema.json +++ b/charts/opentelemetry-operator/values.schema.json @@ -142,13 +142,13 @@ "default": "", "title": "The tag Schema", "examples": [ - "v0.89.0" + "v0.92.0" ] } }, "examples": [{ "repository": "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator", - "tag": "v0.89.0" + "tag": "v0.92.0" }] }, "collectorImage": { @@ -173,13 +173,13 @@ "default": "", "title": "The tag Schema", "examples": [ - "0.89.0" + "0.92.0" ] } }, "examples": [{ "repository": "otel/opentelemetry-collector-contrib", - "tag": "0.89.0" + "tag": "0.92.0" }] }, "opampBridgeImage": { @@ -923,11 +923,11 @@ "examples": [{ "image": { "repository": "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator", - "tag": "v0.89.0" + "tag": "v0.92.0" }, "collectorImage": { "repository": "otel/opentelemetry-collector-contrib", - "tag": "0.89.0" + "tag": "0.92.0" }, "opampBridgeImage": { "repository": "", @@ -1674,11 +1674,11 @@ "manager": { "image": { "repository": "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator", - "tag": "v0.89.0" + "tag": "v0.92.0" }, "collectorImage": { "repository": "otel/opentelemetry-collector-contrib", - "tag": "0.89.0" + "tag": "0.92.0" }, "opampBridgeImage": { "repository": "",