{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":275946303,"defaultBranch":"master","name":"assisted-service","ownerLogin":"openshift","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2020-06-29T23:13:57.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/792337?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1720329102.0","currentOid":""},"activityList":{"items":[{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"aa090dd0e21ffe271ee964d8852800148f42898e","ref":"refs/heads/snyk-fix-c2d73f61d48562e931409b93d3c9820b","pushedAt":"2024-07-07T05:11:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"fix: vendor/github.com/buger/jsonparser/Dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN8-GIT-340820\n- https://snyk.io/vuln/SNYK-DEBIAN8-GIT-340820\n- https://snyk.io/vuln/SNYK-DEBIAN8-GIT-340873\n- https://snyk.io/vuln/SNYK-DEBIAN8-GIT-340907\n- https://snyk.io/vuln/SNYK-DEBIAN8-OPENSSH-368697","shortMessageHtmlLink":"fix: vendor/github.com/buger/jsonparser/Dockerfile to reduce vulnerab…"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-c2d73f61d48562e931409b93d3c9820b","pushedAt":"2024-07-07T05:11:42.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"8252ad86b4b29b6b9dbeac6a7150413d64e79d1f","ref":"refs/heads/snyk-fix-dc057e489ac22b5c08560750385b1267","pushedAt":"2024-07-07T04:32:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"adriengentil","name":"Adrien Gentil","path":"/adriengentil","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/199616?s=80&v=4"},"commit":{"message":"fix: vendor/github.com/samber/lo/Dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN11-NGHTTP2-5953384\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133","shortMessageHtmlLink":"fix: vendor/github.com/samber/lo/Dockerfile to reduce vulnerabilities"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-dc057e489ac22b5c08560750385b1267","pushedAt":"2024-07-07T04:32:21.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"adriengentil","name":"Adrien Gentil","path":"/adriengentil","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/199616?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"d3455cfbcae001d11a45387f839cff4c9992b46a","ref":"refs/heads/snyk-fix-f8514150a6f1e84c57521da841733f4f","pushedAt":"2024-07-05T05:00:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"fix: vendor/gopkg.in/djherbis/times.v1/js.cover.dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-NGHTTP2-5953384","shortMessageHtmlLink":"fix: vendor/gopkg.in/djherbis/times.v1/js.cover.dockerfile to reduce …"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-f8514150a6f1e84c57521da841733f4f","pushedAt":"2024-07-05T05:00:23.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"88383a6d9ba54d93790168ebd4f6693acae9a733","ref":"refs/heads/snyk-fix-dc70014d4040308f0bf2ac1280161338","pushedAt":"2024-07-05T04:23:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"adriengentil","name":"Adrien Gentil","path":"/adriengentil","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/199616?s=80&v=4"},"commit":{"message":"fix: vendor/github.com/go-gormigrate/gormigrate/v2/Dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN10-NGHTTP2-5953390\n- https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-3339153\n- https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-3339153\n- https://snyk.io/vuln/SNYK-DEBIAN10-GIT-6846202\n- https://snyk.io/vuln/SNYK-DEBIAN10-LIBBSD-541041","shortMessageHtmlLink":"fix: vendor/github.com/go-gormigrate/gormigrate/v2/Dockerfile to redu…"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-dc70014d4040308f0bf2ac1280161338","pushedAt":"2024-07-05T04:23:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"adriengentil","name":"Adrien Gentil","path":"/adriengentil","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/199616?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"df81b2f1ceeb06106e33b25fb326a074583811b9","after":"11cacec4541ceba02afc331b616044cb0134aad9","ref":"refs/heads/release-ocm-2.11","pushedAt":"2024-07-04T14:32:39.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"openshift-merge-bot[bot]","name":null,"path":"/apps/openshift-merge-bot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/412865?s=80&v=4"},"commit":{"message":"[release-ocm-2.11] OCPBUGS-36413: Allow auth in docker credentials to be empty (#6523)\n\n* OCPBUGS-35932: Remove credsStore references while parsing pull secret\n\n* OCPBUGS-35932: Allow auth in docker credentials to be empty\n\n* NO-ISSUE: Replace bytes.SplitN by strings.SplitN for readability\n\n---------\n\nCo-authored-by: Matthieu Bernardin ","shortMessageHtmlLink":"[release-ocm-2.11] OCPBUGS-36413: Allow auth in docker credentials to…"}},{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"54b8b14381a9fa1a89bd6aab3aebff125497ec33","ref":"refs/heads/snyk-fix-55825a90e95b3ae077a390c312fbbc43","pushedAt":"2024-07-04T05:10:40.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"fix: vendor/github.com/go-gormigrate/gormigrate/v2/Dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN10-NGHTTP2-5953390\n- https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-3339153\n- https://snyk.io/vuln/SNYK-DEBIAN10-SYSTEMD-3339153\n- https://snyk.io/vuln/SNYK-DEBIAN10-CURL-3065760\n- https://snyk.io/vuln/SNYK-DEBIAN10-CURL-3065760","shortMessageHtmlLink":"fix: vendor/github.com/go-gormigrate/gormigrate/v2/Dockerfile to redu…"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-55825a90e95b3ae077a390c312fbbc43","pushedAt":"2024-07-04T05:10:39.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"3b7c5f3a1df0f7c33167e96f4937c2bbe9df2323","ref":"refs/heads/snyk-fix-4660cb64293d93b79ab65dedf20f5fe6","pushedAt":"2024-07-04T05:03:11.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"fix: vendor/github.com/buger/jsonparser/Dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN8-GIT-340820\n- https://snyk.io/vuln/SNYK-DEBIAN8-GIT-340820\n- https://snyk.io/vuln/SNYK-DEBIAN8-GIT-340907\n- https://snyk.io/vuln/SNYK-DEBIAN8-PROCPS-309313\n- https://snyk.io/vuln/SNYK-DEBIAN8-PROCPS-309313","shortMessageHtmlLink":"fix: vendor/github.com/buger/jsonparser/Dockerfile to reduce vulnerab…"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-4660cb64293d93b79ab65dedf20f5fe6","pushedAt":"2024-07-04T05:03:10.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"7a318dc48e8d30252106593e6788df478edeb172","ref":"refs/heads/snyk-fix-100ce2e33762053d1315eb4badfe3ddd","pushedAt":"2024-07-04T04:54:30.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"adriengentil","name":"Adrien Gentil","path":"/adriengentil","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/199616?s=80&v=4"},"commit":{"message":"fix: vendor/github.com/samber/lo/Dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-NGHTTP2-5953384","shortMessageHtmlLink":"fix: vendor/github.com/samber/lo/Dockerfile to reduce vulnerabilities"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-100ce2e33762053d1315eb4badfe3ddd","pushedAt":"2024-07-04T04:54:29.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"adriengentil","name":"Adrien Gentil","path":"/adriengentil","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/199616?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"e1aaa9e3d84bc677a861e71ef490f06a9489248a","ref":"refs/heads/snyk-fix-c8ad86e8e5d2aa39de8c5d420971ad3b","pushedAt":"2024-07-04T04:42:28.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"fix: vendor/github.com/nxadm/tail/Dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN12-PYTHON311-3325304\n- https://snyk.io/vuln/SNYK-DEBIAN12-PYTHON311-3325304\n- https://snyk.io/vuln/SNYK-DEBIAN12-PYTHON311-5853785\n- https://snyk.io/vuln/SNYK-DEBIAN12-PYTHON311-5853785\n- https://snyk.io/vuln/SNYK-DEBIAN12-SYSTEMD-6277507","shortMessageHtmlLink":"fix: vendor/github.com/nxadm/tail/Dockerfile to reduce vulnerabilities"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-c8ad86e8e5d2aa39de8c5d420971ad3b","pushedAt":"2024-07-04T04:42:27.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"gamli75","name":"Liat Gamliel","path":"/gamli75","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/62331841?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"b7116f3a023014bbc5290a071aeb2326c00711e1","after":"d514ad7ac85a6dcc1b638df870755b184c9088f2","ref":"refs/heads/snyk-fix-e1a4cdda57965dc622476830e7a87771","pushedAt":"2024-07-04T04:32:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"adriengentil","name":"Adrien Gentil","path":"/adriengentil","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/199616?s=80&v=4"},"commit":{"message":"fix: vendor/gopkg.in/djherbis/times.v1/js.cover.dockerfile to reduce vulnerabilities\n\nThe following vulnerabilities are fixed with an upgrade:\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-GLIBC-5927133\n- https://snyk.io/vuln/SNYK-DEBIAN11-NGHTTP2-5953384","shortMessageHtmlLink":"fix: vendor/gopkg.in/djherbis/times.v1/js.cover.dockerfile to reduce …"}},{"before":null,"after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/snyk-fix-e1a4cdda57965dc622476830e7a87771","pushedAt":"2024-07-04T04:32:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"adriengentil","name":"Adrien Gentil","path":"/adriengentil","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/199616?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"e220d572ad383e0b5c91d1cca2c525573d4667be","after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/release-4.17","pushedAt":"2024-07-03T18:13:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openshift-merge-robot","name":"OpenShift Merge Robot","path":"/openshift-merge-robot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30189218?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"e220d572ad383e0b5c91d1cca2c525573d4667be","after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/release-4.18","pushedAt":"2024-07-03T18:13:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openshift-merge-robot","name":"OpenShift Merge Robot","path":"/openshift-merge-robot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30189218?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"e220d572ad383e0b5c91d1cca2c525573d4667be","after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/release-ocm-2.12","pushedAt":"2024-07-03T17:05:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openshift-merge-robot","name":"OpenShift Merge Robot","path":"/openshift-merge-robot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30189218?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":"e220d572ad383e0b5c91d1cca2c525573d4667be","after":"b7116f3a023014bbc5290a071aeb2326c00711e1","ref":"refs/heads/master","pushedAt":"2024-07-03T16:22:47.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"openshift-merge-bot[bot]","name":null,"path":"/apps/openshift-merge-bot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/412865?s=80&v=4"},"commit":{"message":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)\n\n* Add API to AgentServiceConfig for ingress hostnames\n\nThese will be used to create ingress resources when not running on an\nOCP cluster.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Skip webhooks and https to get the services deployed\n\nThere is no way to deploy our webhooks without tls config and deciding\non a way to manage certificates is out of the scope of this patch.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Deploy ingress instead of routes when not running in OCP\n\nThis will allow traffic based on a hostname and on a standard port\nrather than using hostport type services.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Add ingress class name API\n\nIf a user hasn't marked a particular ingress class as the default they\nwill need to specify an ingress class.\n\nhttps://issues.redhat.com/browse/MGMT-18131\n\n* Document deploying the operator on a kind cluster for dev\n\n* Create a separate struct for ingress config\n\n* Make ingress hostnames required and ingress itself properly optional\n\nThis also adds a validation to ensure that Ingress is provided if the\noperator is running on a non-OpenShift kubernetes platform","shortMessageHtmlLink":"MGMT-18131: Make application work on non-OCP kubernetes (#6446)"}},{"before":null,"after":"af5ed3d904a66da345d872de12b6c330614c667b","ref":"refs/heads/renovate/master-registry.k8s.io-kustomize-kustomize-5.x","pushedAt":"2024-07-03T14:17:42.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"red-hat-konflux[bot]","name":null,"path":"/apps/red-hat-konflux","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/296509?s=80&v=4"},"commit":{"message":"Update registry.k8s.io/kustomize/kustomize Docker tag to v5\n\nSigned-off-by: red-hat-konflux <123456+red-hat-konflux[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Update registry.k8s.io/kustomize/kustomize Docker tag to v5"}},{"before":null,"after":"df9c9898a875a1e346d76381495207b60d2bdd8d","ref":"refs/heads/renovate/master-registry.k8s.io-kustomize-kustomize-4.x","pushedAt":"2024-07-03T14:17:37.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"red-hat-konflux[bot]","name":null,"path":"/apps/red-hat-konflux","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/296509?s=80&v=4"},"commit":{"message":"Update registry.k8s.io/kustomize/kustomize Docker tag to v4.5.7\n\nSigned-off-by: red-hat-konflux <123456+red-hat-konflux[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Update registry.k8s.io/kustomize/kustomize Docker tag to v4.5.7"}},{"before":"0e6269fa88d45e5a00e9123924bfb4bed6865c36","after":"e220d572ad383e0b5c91d1cca2c525573d4667be","ref":"refs/heads/release-4.17","pushedAt":"2024-07-03T14:13:25.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openshift-merge-robot","name":"OpenShift Merge Robot","path":"/openshift-merge-robot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30189218?s=80&v=4"},"commit":{"message":"NO-ISSUE: [master] Bump OCP versions: 4.15 (#6511)\n\nCo-authored-by: danmanor ","shortMessageHtmlLink":"NO-ISSUE: [master] Bump OCP versions: 4.15 (#6511)"}},{"before":"0e6269fa88d45e5a00e9123924bfb4bed6865c36","after":"e220d572ad383e0b5c91d1cca2c525573d4667be","ref":"refs/heads/release-4.18","pushedAt":"2024-07-03T14:13:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openshift-merge-robot","name":"OpenShift Merge Robot","path":"/openshift-merge-robot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30189218?s=80&v=4"},"commit":{"message":"NO-ISSUE: [master] Bump OCP versions: 4.15 (#6511)\n\nCo-authored-by: danmanor ","shortMessageHtmlLink":"NO-ISSUE: [master] Bump OCP versions: 4.15 (#6511)"}},{"before":"0e6269fa88d45e5a00e9123924bfb4bed6865c36","after":"e220d572ad383e0b5c91d1cca2c525573d4667be","ref":"refs/heads/release-ocm-2.12","pushedAt":"2024-07-03T14:02:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"openshift-merge-robot","name":"OpenShift Merge Robot","path":"/openshift-merge-robot","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/30189218?s=80&v=4"},"commit":{"message":"NO-ISSUE: [master] Bump OCP versions: 4.15 (#6511)\n\nCo-authored-by: danmanor ","shortMessageHtmlLink":"NO-ISSUE: [master] Bump OCP versions: 4.15 (#6511)"}},{"before":"0e6269fa88d45e5a00e9123924bfb4bed6865c36","after":"e220d572ad383e0b5c91d1cca2c525573d4667be","ref":"refs/heads/master","pushedAt":"2024-07-03T13:43:18.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"openshift-merge-bot[bot]","name":null,"path":"/apps/openshift-merge-bot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/412865?s=80&v=4"},"commit":{"message":"NO-ISSUE: [master] Bump OCP versions: 4.15 (#6511)\n\nCo-authored-by: danmanor ","shortMessageHtmlLink":"NO-ISSUE: [master] Bump OCP versions: 4.15 (#6511)"}},{"before":null,"after":"8f77392d3b1615640d92e42356e216dccdc19083","ref":"refs/heads/renovate/cloud_hotfix_releases-registry.k8s.io-kustomize-kustomize-5.x","pushedAt":"2024-07-03T12:19:51.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"red-hat-konflux[bot]","name":null,"path":"/apps/red-hat-konflux","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/296509?s=80&v=4"},"commit":{"message":"Update registry.k8s.io/kustomize/kustomize Docker tag to v5\n\nSigned-off-by: red-hat-konflux <123456+red-hat-konflux[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Update registry.k8s.io/kustomize/kustomize Docker tag to v5"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEeLQAsQA","startCursor":null,"endCursor":null}},"title":"Activity · openshift/assisted-service"}