Update dependency io.strimzi:api to v0.34.0 #896
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.29.0
->0.34.0
⚠ Dependency Lookup Warnings ⚠
Warnings were logged while processing this repo. Please check the logs for more information.
Release Notes
strimzi/strimzi-kafka-operator
v0.34.0
Compare Source
StableConnectIdentities
)httpRetries
andhttpRetryPauseMs
options to OAuth authentication configuration. They are set to0
by default - no retries, no backoff between retries. Also added analogoushttpRetries
option in thekeycloak
authorization configuration. These features are enabled by the updated Strimzi Kafka OAuth library (0.12.0).v0.33.2
Compare Source
Main changes since 0.33.1
Bug Fixes
v0.33.1
Compare Source
Main changes since 0.33.0
Bug Fixes
Lease
resource from installation filesv0.33.0
Compare Source
api
,crd-generator
,crd-annotations
, andtest
Recreate
deployment strategyImageStream
validation for Kafka Connect builds on OpenShiftKnown issues
If you use
type: ingress
listener with enabled mTLS authentication, we recommend you to test if your clients are affected or not.If needed, you can also disable the session ticket extension in the Kafka brokers in your
Kafka
custom resource by setting thejdk.tls.server.enableSessionTicketExtension
Java system property tofalse
:...
spec:
...
...
ssl.secure.random.implementation
option in Kafka brokers was always set toSHA1PRNG
.From Strimzi 0.33 on, it is using the default SecureRandom implementation from the Java Runtime.
If you want to keep using
SHA1PRNG
as your SecureRandom, you can configure it in.spec.kafka.config
in yourKafka
custom resource.It is currently planned to be removed in Strimzi 0.35.0.
type: jaeger
tracing based on Jaeger clients and OpenTracing API was deprecated in the Strimzi 0.31 release.As the Jaeger clients are retired and the OpenTracing project is archived, we cannot guarantee their support for future versions.
In Strimzi 0.32 and 0.33, we added support for OpenTelemetry tracing as a replacement.
If possible, we will maintain the support for
type: jaeger
tracing until June 2023 and remove it afterwards.Please migrate to OpenTelemetry as soon as possible.
The Jaeger exporter is even not included in the Kafka images anymore, so if you want to use it you have to add the binary by yourself.
The
OTEL_EXPORTER_OTLP_ENDPOINT
environment variable has to be used instead of theOTEL_EXPORTER_JAEGER_ENDPOINT
in order to specify the OTLP endpoint to send traces to.If you are using Jaeger as the backend system for tracing, you need to have 1.35 release at least which is the first one exposing an OTLP endpoint.
v0.32.0
Compare Source
ControlPlaneListener
feature gate moves to GAcluster-ip
listener. We can use it with a tcp port configuration in an ingress controller to expose kafka with an optional tls encryption and a single LoadBalancer.Changes, deprecations and removals
ClusterRole
from file020-ClusterRole-strimzi-cluster-operator-role.yaml
was split into two separate roles:strimzi-cluster-operator-namespaced
ClusterRole
in the file020-ClusterRole-strimzi-cluster-operator-role.yaml
contains the rights related to the resources created based on some Strimzi custom resources.strimzi-cluster-operator-watched
ClusterRole
in the file023-ClusterRole-strimzi-cluster-operator-role.yaml
contains the rights required to watch and manage the Strimzi custom resources.When deploying the Strimzi Cluster Operator as cluster-wide, the
strimzi-cluster-operator-watched
ClusterRole
needs to be always granted at the cluster level.But the
strimzi-cluster-operator-namespaced
ClusterRole
might be granted only for the namespaces where any custom resources are created.ControlPlaneListener
feature gate moves to GA.Direct upgrade from Strimzi 0.22 or earlier is not possible anymore.
You have to upgrade first to one of the Strimzi versions between 0.22 and 0.32 before upgrading to Strimzi 0.32 or newer.
Please follow the docs for more details.
spec.authorization.acls[*].operation
field in theKafkaUser
resource has been deprecated in favour of the fieldspec.authorization.acls[*].operations
which allows to set multiple operations per ACLRule.v0.31.1
Compare Source
sasl.server.max.receive.size
broker option user configurablev0.31.0
Compare Source
Deprecations and removals
From Strimzi 0.32.0 on, we will support only Kubernetes 1.19 and newer.
The supported Kubernetes versions will be re-evaluated again in Q1/2023.
type: jaeger
tracing support based on Jaeger clients and OpenTracing API is now deprecated.Because the Jaeger clients are retired and the OpenTracing project is archived, we cannot guarantee their support for future Kafka versions.
In the future, we plan to replace it with a new tracing feature based on the OpenTelemetry project.
v0.30.0
Compare Source
simple
authorization and for the User Operator to the experimentalUseKRaft
feature gate(Note: Due to KAFKA-13909, broker restarts currently don't work when authorization is enabled.)
ServiceAccountPatching
feature gate moves to GA.It cannot be disabled anymore and will be permanently enabled.
UseStrimziPodSets
feature gate moves to beta stage.By default, StrimziPodSets are used instead of StatefulSets.
If needed,
UseStrimziPodSets
can be disabled in the feature gates configuration in the Cluster Operator.For existing clusters, the certificates will not be updated during upgrade but only next time the PKCS12 store is created.
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.