Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency k3s-io/k3s to v1.26.1+k3s1 #731

Merged
merged 1 commit into from
Jan 28, 2023

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Nov 27, 2022

Mend Renovate

This PR contains the following updates:

Package Update Change
k3s-io/k3s minor v1.25.3+k3s1 -> v1.26.1+k3s1

Release Notes

k3s-io/k3s

v1.26.1+k3s1: v1.26.1+k3s1

Compare Source

This release updates Kubernetes to v1.26.1, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.26.0+k3s2:

  • Add jitter to scheduled snapshots and retry harder on conflicts (#​6715)
    • Scheduled etcd snapshots are now offset by a short random delay of up to several seconds. This should prevent multi-server clusters from executing pathological behavior when attempting to simultaneously update the snapshot list ConfigMap. The snapshot controller will also be more persistent in attempting to update the snapshot list.
  • Adjust e2e test run script and fixes (#​6718)
  • RIP Codespell (#​6701)
  • Bump alpine from 3.16 to 3.17 in /package (#​6688)
  • Bump alpine from 3.16 to 3.17 in /conformance (#​6687)
  • Bump containerd to v1.6.15-k3s1 (#​6722)
    • The embedded containerd version has been bumped to v1.6.15-k3s1
  • Containerd restart testlet (#​6696)
  • Bump ubuntu from 20.04 to 22.04 in /tests/e2e/scripts (#​6686)
  • Add explicit read permissions to workflows (#​6700)
  • Pass through default tls-cipher-suites (#​6725)
    • The K3s default cipher suites are now explicitly passed in to kube-apiserver, ensuring that all listeners use these values.
  • Bump golang:alpine image version (#​6683)
  • Bugfix: do not break cert-manager when pprof is enabled (#​6635)
  • Fix CI tests on Alpine 3.17 (#​6744)
  • Update Stable to 1.25.5+k3s2 (#​6753)
  • Bump action/download-artifact to v3 (#​6746)
  • Generate report and upload test results (#​6737)
  • Slow dependency CI to weekly (#​6764)
  • Fix Drone plugins/docker tag for 32 bit arm (#​6769)
  • Update to v1.26.1-k3s1 (#​6774)

Embedded Component Versions

Component Version
Kubernetes v1.26.1
Kine v0.9.8
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.15-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.0+k3s2: v1.26.0+k3s2

Compare Source

This release updates containerd to v1.6.14 to resolve an issue where pods would lose their CNI information when containerd was restarted, as well as a number of other stability and administrative changes.

Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.

Changes since v1.26.0+k3s1:

  • Current status badges (#​6653)
  • Add initial Updatecli ADR automation (#​6583)
  • December 2022 channels update (#​6618)
  • Change Updatecli GH action reference branch (#​6682)
  • Fix OpenRC init script error 'openrc-run.sh: source: not found' (#​6614)
  • Add Dependabot config for security ADR (#​6560)
  • Bump containerd to v1.6.14-k3s1 (#​6693)
    • The embedded containerd version has been bumped to v1.6.14-k3s1. This includes a backported fix for containerd/7843 which caused pods to lose their CNI info when containerd was restarted, which in turn caused the kubelet to recreate the pod.
  • Exclude December r1 releases from channel server (#​6706)

Embedded Component Versions

Component Version
Kubernetes v1.26.0
Kine v0.9.8
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.14-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.6+k3s1: v1.25.6+k3s1

Compare Source

This release updates Kubernetes to v1.25.6, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.5+k3s2:

  • Pass through default tls-cipher-suites (#​6730)
    • The K3s default cipher suites are now explicitly passed in to kube-apiserver, ensuring that all listeners use these values.
  • Bump containerd to v1.6.15-k3s1 (#​6735)
    • The embedded containerd version has been bumped to v1.6.15-k3s1
  • Bump action/download-artifact to v3 (#​6747)
  • Backport dependabot/updatecli updates (#​6761)
  • Fix Drone plugins/docker tag for 32 bit arm (#​6768)
  • Update to v1.25.6+k3s1 (#​6775)

Embedded Component Versions

Component Version
Kubernetes v1.25.6
Kine v0.9.6
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.15-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.5+k3s2: v1.25.5+k3s2

Compare Source

This release updates containerd to v1.6.14 to resolve an issue where pods would lose their CNI information when containerd was restarted.

Changes since v1.25.5+k3s1:
  • Bump containerd to v1.6.14-k3s1 (#​6694)
    • The embedded containerd version has been bumped to v1.6.14-k3s1. This includes a backported fix for containerd/7843 which caused pods to lose their CNI info when containerd was restarted, which in turn caused the kubelet to recreate the pod.
Embedded Component Versions
Component Version
Kubernetes v1.25.5
Kine v0.9.6
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.14-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.4+k3s1: v1.25.4+k3s1

Compare Source

This release updates Kubernetes to v1.25.4, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.3+k3s1:
  • Add the gateway parameter in netplan (#​6292)
  • Bumped dynamiclistener library to v0.3.5 (#​6300)
  • Update kube-router to v1.5.1 with extra logging (#​6345)
  • Update maintainers (#​6298)
  • Bump testing to opensuse Leap 15.4 (#​6337)
  • Update E2E docs with more info on ubuntu 22.04 (#​6316)
  • Netpol test for podSelector & ingress (#​6247)
  • Bump all alpine images to 3.16 (#​6334)
  • Bump kine to v0.9.6 / sqlite3 v3.39.2 (CVE-2022-35737) (#​6317)
  • Add hardened cluster and upgrade tests (#​6320)
  • The bundled Traefik helm chart has been updated to v18.0.0 (#​6353)
  • Mark v1.25.3+k3s1 as stable (#​6338)
  • The embedded helm controller has been bumped to v0.13.0 (#​6294)
  • Fixed an issue that would prevent the deploy controller from handling manifests that include resource types that are no longer supported by the apiserver. (#​6295)
  • Replace fedora-coreos with fedora 36 for install tests (#​6315)
  • Convert containerd config.toml.tmpl Linux template to v2 syntax (#​6267)
  • Add test for node-external-ip config parameter (#​6359)
  • Use debugger-friendly compile settings if DEBUG is set (#​6147)
  • update e2e tests (#​6354)
  • Remove unused vagrant development scripts (#​6395)
  • The bundled Traefik has been updated to v2.9.4 / helm chart v18.3.0 (#​6397)
  • None (#​6371)
  • Fix incorrect defer usage (#​6296)
  • Add snapshot restore e2e test (#​6396)
  • Fix sonobouy tests on v1.25 (#​6399)
  • Bump packaged component versions
  • The packaged traefik helm chart has been bumped to v19.0.0, enabling ingressClass support by default.
  • The packaged local-path-provisioner has been bumped to v0.0.23
  • The packaged coredns has been bumped to v1.9.4 (#​6408)
  • log kube-router version when starting netpol controller (#​6405)
  • Add Kairos to ADOPTERS (#​6417)
  • Update Flannel to 0.20.1 (#​6388)
  • Avoid wrong config for flannel-external-ip and add warning if unencrypted backend (#​6403)
  • Fix test-mods to allow for pinning version from k8s.io (#​6413)
  • Fix for metrics-server in the multi-cloud cluster env (#​6386)
  • K3s now indicates specifically which cluster-level configuration flags are out of sync when critical configuration differs between server nodes. (#​6409)
  • Convert test output to JSON format (#​6410)
  • Pull traefik helm chart directly from GH (#​6468)
  • Nightly test fix (#​6475)
  • Update to v1.25.4 (#​6477)
  • Remove stuff which belongs in the windows executor implementation (#​6492)
  • The packaged traefik helm chart has been bumped to 19.0.4 (#​6494)
  • Move traefik chart repo again (#​6508)
Embedded Component Versions
Component Version
Kubernetes v1.25.4
Kine v0.9.6
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.8-k3s1
Runc v1.1.4
Flannel v0.20.1
Metrics-server v0.6.1
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.0
Local-path-provisioner v0.0.23
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:


Configuration

📅 Schedule: Branch creation - "on sunday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot requested a review from Stackclash as a code owner November 27, 2022 00:16
@github-actions
Copy link
Contributor

github-actions bot commented Nov 27, 2022

🦙 MegaLinter status: ✅ SUCCESS

Descriptor Linter Files Fixed Errors Elapsed time
✅ ANSIBLE ansible-lint yes no 12.74s
✅ COPYPASTE jscpd yes no 0.96s
✅ REPOSITORY git_diff yes no 0.01s
✅ REPOSITORY secretlint yes no 0.88s
✅ YAML yamllint 1 0 0.16s

See detailed report in MegaLinter reports
Set VALIDATE_ALL_CODEBASE: true in mega-linter.yml to validate all sources, not only the diff

MegaLinter is graciously provided by OX Security

@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.25.4+k3s1 chore(deps): update dependency k3s-io/k3s to v1.26.0+k3s1 Dec 21, 2022
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.26.0+k3s1 chore(deps): update dependency k3s-io/k3s to v1.25.4+k3s1 Jan 13, 2023
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.25.4+k3s1 chore(deps): update dependency k3s-io/k3s to v1.26.0+k3s2 Jan 14, 2023
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.26.0+k3s2 chore(deps): update dependency k3s-io/k3s to v1.26.0+k3s1 Jan 15, 2023
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.26.0+k3s1 chore(deps): update dependency k3s-io/k3s to v1.26.0+k3s2 Jan 15, 2023
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.26.0+k3s2 chore(deps): update dependency k3s-io/k3s to v1.26.1+k3s1 Jan 27, 2023
@Stackclash Stackclash merged commit 6da45dc into main Jan 28, 2023
@Stackclash Stackclash deleted the renovate/k3s-io-k3s-1.x branch January 28, 2023 22:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant