Releases: kubescape/operator
Release v0.2.142
Populate GitLab repositories before scanning when the registry is configured to scan all repos, so registryx host discovery can resolve the actual registry host.
Release v0.2.141
Summary
- Add
GoMemLimitPercentagefield toNodeAgentAutoscalerConfig(default 0.8 = 80%) - Compute
GOMEMLIMITper node group inTemplateRendereras a percentage of the memory limit, and inject it asGoMemLimitinto the DaemonSet template - Validate that
goMemLimitPercentageis in the valid range(0, 1.0]at construction time
Motivation
In autoscaler mode the operator creates per-node-group DaemonSets with dynamically sized resource requests/limits. Previously the DaemonSet template had a static GOMEMLIMIT set at Helm install time. This PR makes the operator compute GOMEMLIMIT at reconcile time from the actual computed memory limit, so it always stays at the configured percentage (default 80%) of whatever the operator decided the limit should be for that node group.
Design note: main container vs. sidecar
The operator computes GOMEMLIMIT only for the main node-agent container, whose resources scale per node group. When the SBOM scanner sidecar is enabled, its resources are static (configured via Helm values, uniform across node groups) and its GOMEMLIMIT is computed once by Helm at install time — the operator passes the sidecar definition through unchanged. Sidecar resource limits can still be adjusted via helm upgrade --set nodeAgent.sbomScanner.resources.limits.memory=....
Changes
| File | Change |
|---|---|
config/config.go |
Add GoMemLimitPercentage float64 to NodeAgentAutoscalerConfig; set viper default to 0.8 |
nodeagentautoscaler/templaterenderer.go |
Add goMemLimitPercentage field; compute GoMemLimit in RenderDaemonSet; validate percentage in constructor |
nodeagentautoscaler/autoscaler.go |
Pass cfg.GoMemLimitPercentage to NewTemplateRenderer |
nodeagentautoscaler/templaterenderer_test.go |
Test GOMEMLIMIT computation for multiple memory/percentage combos; test invalid percentage rejection |
Test plan
- Unit tests:
TestTemplateRenderer_RenderDaemonSet_GoMemLimitcovers 450Mi→360MiB, 1Gi→819MiB, 1800Mi→1440MiB, 900Mi→720MiB at 80% - Unit tests:
TestTemplateRenderer_NewTemplateRenderer_InvalidPercentageverifies rejection of 0, negative, >1.0 and acceptance of 1.0 - All existing tests pass (
go test ./...) - Local kind cluster verification: computed GOMEMLIMIT matched expected 80% of memory limit in both with-sidecar and without-sidecar scenarios
Summary by CodeRabbit
Release Notes
-
New Features
- Added
nodeAgentAutoscaler.goMemLimitPercentageconfiguration option (defaults to 0.8) with validation for values between 0 and 1.0 - Autoscaler now populates Go memory limit environment variables on DaemonSets based on memory limits and the configured percentage
- Added
-
Tests
- Added integration test job to CI/CD pipeline for build verification
Release v0.2.140
Merge pull request #369 from kubescape/bump chore(deps): bump github.com/docker/cli to v29.2.0
Release v0.2.139
Bumps github.com/go-jose/go-jose/v4 from 4.1.3 to 4.1.4.
Release notes
Sourced from github.com/go-jose/go-jose/v4's releases.
v4.1.4
What's Changed
Fixes Panic in JWE decryption. See GHSA-78h2-9frx-2jm8
Full Changelog: go-jose/go-jose@v4.1.3...v4.1.4
Commits
0e59876Merge commit from forkddffdbcBump actions/checkout from 5 to 6 (#213)- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the Security Alerts page.
Release v0.2.136
Summary
- Bumps
github.com/armosec/registryxfrom v0.0.34 to v0.0.35 - Picks up the GitLab registry host auto-discovery fix : self-hosted GitLab instances where the container registry hostname differs from the web URL now work correctly
- The fix uses the GitLab API
locationfield to discover the actual registry hostname, avoiding theservice=dependency_proxy403 error
Summary by CodeRabbit
- Chores
- Updated an internal dependency to a newer version for enhanced stability.
Release v0.2.134
Bumps github.com/cilium/cilium from 1.16.17 to 1.17.14.
Release notes
Sourced from github.com/cilium/cilium's releases.
1.17.14
Summary of Changes
Bugfixes:
- bpf: nodeport: use hairpin redirect for L7 LB on bridge devices (Backport PR cilium/cilium#44709, Upstream PR cilium/cilium#44658,
@smagnani96)- Fix envoy admin socket being created as world-accessible (Backport PR cilium/cilium#44591, Upstream PR cilium/cilium#44512,
@0xch4z)- l7lb: fix bypassing ingress policies for local backends (Backport PR cilium/cilium#44805, Upstream PR cilium/cilium#44693,
@smagnani96)CI Changes:
- pkg: Mark node_linux_test.go as unparallel (Backport PR cilium/cilium#44591, Upstream PR cilium/cilium#38172,
@jschwinger233)Misc Changes:
cilium/cilium#44752@sayboras)cilium/cilium#44376@cilium-renovate[bot])cilium/cilium#44485@cilium-renovate[bot])cilium/cilium#44583@cilium-renovate[bot])cilium/cilium#44687@cilium-renovate[bot])cilium/cilium#44794@cilium-renovate[bot])cilium/cilium#44373@cilium-renovate[bot])cilium/cilium#44811@cilium-renovate[bot])cilium/cilium#44345@cilium-renovate[bot])cilium/cilium#44402@cilium-renovate[bot])cilium/cilium#44552@cilium-renovate[bot])cilium/cilium#44684@cilium-renovate[bot])cilium/cilium#44584@cilium-renovate[bot])cilium/cilium#44685@cilium-renovate[bot])cilium/cilium#44481@cilium-renovate[bot])cilium/cilium#44798@cilium-renovate[bot])cilium/cilium#44581@cilium-renovate[bot])cilium/cilium#44686@cilium-renovate[bot])cilium/cilium#44374@cilium-renovate[bot])cilium/cilium#44483@cilium-renovate[bot])cilium/cilium#44682@cilium-renovate[bot])cilium/cilium#44792@cilium-renovate[bot])cilium/cilium#44808@cilium-renovate[bot])cilium/cilium#44375@cilium-renovate[bot])cilium/cilium#44484@cilium-renovate[bot])cilium/cilium#44683@cilium-renovate[bot])cilium/cilium#44793@cilium-renovate[bot])cilium/cilium#44508@cilium-renovate[bot])cilium/cilium#44582@cilium-renovate[bot])cilium/cilium#44482@cilium-renovate[bot])- Include the results of
find /sys/fs/bpfin bugtool output (Backport PR cilium/cilium#44591, Upstream PR cilium/cilium#38980,@ti-mo)Other Changes:
cilium/cilium#44558@Artyop)cilium/cilium#44325@cilium-release-bot[bot])
... (truncated)
Changelog
Sourced from github.com/cilium/cilium's changelog.
v1.17.14
Summary of Changes
Bugfixes:
- bpf: nodeport: use hairpin redirect for L7 LB on bridge devices (Backport PR cilium/cilium#44709, Upstream PR cilium/cilium#44658,
@smagnani96)- Fix envoy admin socket being created as world-accessible (Backport PR cilium/cilium#44591, Upstream PR cilium/cilium#44512,
@0xch4z)- l7lb: fix bypassing ingress policies for local backends (Backport PR cilium/cilium#44805, Upstream PR cilium/cilium#44693,
@smagnani96)CI Changes:
- pkg: Mark node_linux_test.go as unparallel (Backport PR cilium/cilium#44591, Upstream PR cilium/cilium#38172,
@jschwinger233)Misc Changes:
cilium/cilium#44752@sayboras)cilium/cilium#44376@cilium-renovate[bot])cilium/cilium#44485@cilium-renovate[bot])cilium/cilium#44583@cilium-renovate[bot])cilium/cilium#44687@cilium-renovate[bot])cilium/cilium#44794@cilium-renovate[bot])cilium/cilium#44373@cilium-renovate[bot])cilium/cilium#44811@cilium-renovate[bot])cilium/cilium#44345@cilium-renovate[bot])cilium/cilium#44402@cilium-renovate[bot])cilium/cilium#44552@cilium-renovate[bot])cilium/cilium#44684@cilium-renovate[bot])cilium/cilium#44584@cilium-renovate[bot])cilium/cilium#44685@cilium-renovate[bot])cilium/cilium#44481@cilium-renovate[bot])cilium/cilium#44798
Release v0.2.133
Summary by CodeRabbit
- Bug Fixes
- Scanning efficiency improved by preventing unnecessary reprocessing of items already handled within the same request, reducing computational overhead.
- Resource optimization enhanced through metadata-driven conditional logic that intelligently skips redundant operations when applicable, ensuring better overall system performance.
Release v0.2.131
Summary by CodeRabbit
- Chores
- Updated dependencies to latest versions
Release v0.2.129
Bumps go.opentelemetry.io/otel/sdk from 1.39.0 to 1.40.0.
Changelog
Sourced from go.opentelemetry.io/otel/sdk's changelog.
[1.40.0/0.62.0/0.16.0] 2026-02-02
Added
- Add
AlwaysRecordsampler ingo.opentelemetry.io/otel/sdk/trace. (#7724)- Add
Enabledmethod to all synchronous instrument interfaces (Float64Counter,Float64UpDownCounter,Float64Histogram,Float64Gauge,Int64Counter,Int64UpDownCounter,Int64Histogram,Int64Gauge,) ingo.opentelemetry.io/otel/metric. This stabilizes the synchronous instrument enabled feature, allowing users to check if an instrument will process measurements before performing computationally expensive operations. (#7763)- Add
go.opentelemetry.io/otel/semconv/v1.39.0package. The package contains semantic conventions from thev1.39.0version of the OpenTelemetry Semantic Conventions. See the migration documentation for information on how to upgrade fromgo.opentelemetry.io/otel/semconv/v1.38.0.(#7783, #7789)Changed
- Improve the concurrent performance of
HistogramReservoiringo.opentelemetry.io/otel/sdk/metric/exemplarby 4x. (#7443)- Improve the concurrent performance of
FixedSizeReservoiringo.opentelemetry.io/otel/sdk/metric/exemplar. (#7447)- Improve performance of concurrent histogram measurements in
go.opentelemetry.io/otel/sdk/metric. (#7474)- Improve performance of concurrent synchronous gauge measurements in
go.opentelemetry.io/otel/sdk/metric. (#7478)- Add experimental observability metrics in
go.opentelemetry.io/otel/exporters/stdout/stdoutmetric. (#7492)Exporteringo.opentelemetry.io/otel/exporters/prometheusignores metrics with the scopego.opentelemetry.io/contrib/bridges/prometheus. This prevents scrape failures when the Prometheus exporter is misconfigured to get data from the Prometheus bridge. (#7688)- Improve performance of concurrent exponential histogram measurements in
go.opentelemetry.io/otel/sdk/metric. (#7702)- The
rpc.grpc.status_codeattribute in the experimental metrics emitted fromgo.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcis replaced with therpc.response.status_codeattribute to align with the semantic conventions. (#7854)- The
rpc.grpc.status_codeattribute in the experimental metrics emitted fromgo.opentelemetry.io/otel/exporters/otlp/otlplog/otlploggrpcis replaced with therpc.response.status_codeattribute to align with the semantic conventions. (#7854)Fixed
- Fix bad log message when key-value pairs are dropped because of key duplication in
go.opentelemetry.io/otel/sdk/log. (#7662)- Fix
DroppedAttributesonRecordingo.opentelemetry.io/otel/sdk/logto not count the non-attribute key-value pairs dropped because of key duplication. (#7662)- Fix
SetAttributesonRecordingo.opentelemetry.io/otel/sdk/logto not log that attributes are dropped when they are actually not dropped. (#7662)- Fix missing
request.GetBodyingo.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttpto correctly handle HTTP/2GOAWAYframe. (#7794)WithHostIDdetector ingo.opentelemetry.io/otel/sdk/resourceto use full path forioregcommand on Darwin (macOS). (#7818)Deprecated
- Deprecate
go.opentelemetry.io/otel/exporters/zipkin. For more information, see the OTel blog post deprecating the Zipkin exporter. (#7670)
Commits
a3a5317Release v1.40.0 (#7859)77785dachore(deps): update github/codeql-action action to v4.32.1 (#7858)56fa1c2chore(deps): update module github.com/clipperhouse/uax29/v2 to v2.5.0 (#7857)298cbedUpgrade semconv use to v1.39.0 (#7854)3264bf1refactor: modernize code (#7850)fd5d030chore(deps): update module github.com/grpc-ecosystem/grpc-gateway/v2 to v2.27...8d3b4cbchore(deps): update actions/cache action to v5.0.3 (#7847)91f7cadchore(deps): update github.com/timakin/bodyclose digest to 73d1f95 (#7845)fdad1ebchore(deps): update module github.com/grpc-ecosystem/grpc-gateway/v2 to v2.27...c46d3bachore(deps): update golang.org/x/telemetry digest to fcf36f6 (#7843)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot show <dependency name> ignore conditionswill show all of th...
Release v0.2.128
Summary by CodeRabbit
-
New Features
- Runtime alerts now include Workload UID and Container ID; container resolution defaults to the first container when no name is provided.
-
Tests
- Test coverage extended to assert Workload UID and Container ID are populated, including cases with empty container name.
-
Dependencies
- Go toolchain bumped to 1.25.0 and a broad set of Kubernetes, AWS SDK, and container runtime dependencies updated.