Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 #92

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented May 25, 2024

This PR contains the following updates:

Package Update Change
registry.k8s.io/sig-storage/csi-provisioner major v3.6.4 -> v5.1.0

Configuration

📅 Schedule: Branch creation - "on saturday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about these updates again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Copy link

github-actions bot commented May 25, 2024

--- kubernetes/apps/network/echo-server/app Kustomization: flux-system/echo-server HelmRelease: network/echo-server

+++ kubernetes/apps/network/echo-server/app Kustomization: flux-system/echo-server HelmRelease: network/echo-server

@@ -83,24 +83,39 @@

             runAsGroup: 65534
             runAsNonRoot: true
             runAsUser: 65534
         strategy: RollingUpdate
     ingress:
       app:
-        className: internal
+        annotations:
+          external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
+        className: external
         enabled: true
         hosts:
-        - host: '{{ .Release.Name }}.${SECRET_DOMAIN}'
+        - host: '{{ .Release.Name }}-external.${SECRET_DOMAIN}'
           paths:
           - path: /
             service:
               identifier: app
               port: http
         tls:
         - hosts:
-          - '{{ .Release.Name }}.${SECRET_DOMAIN}'
+          - '{{ .Release.Name }}-external.${SECRET_DOMAIN}'
+      internal:
+        className: internal
+        enabled: true
+        hosts:
+        - host: '{{ .Release.Name }}-internal.${SECRET_DOMAIN}'
+          paths:
+          - path: /
+            service:
+              identifier: app
+              port: http
+        tls:
+        - hosts:
+          - '{{ .Release.Name }}-internal.${SECRET_DOMAIN}'
     service:
       app:
         controller: echo-server
         ports:
           http:
             port: 8080
--- kubernetes/apps/storage/democratic-csi/local-path Kustomization: flux-system/democratic-csi-local-path HelmRelease: storage/democratic-csi-local-path

+++ kubernetes/apps/storage/democratic-csi/local-path Kustomization: flux-system/democratic-csi-local-path HelmRelease: storage/democratic-csi-local-path

@@ -37,13 +37,13 @@

         - --node-deployment=true
         - --node-deployment-immediate-binding=false
         - --feature-gates=Topology=true
         - --strict-topology=true
         - --enable-capacity=true
         - --capacity-ownerref-level=1
-        image: registry.k8s.io/sig-storage/csi-provisioner:v3.6.4
+        image: registry.k8s.io/sig-storage/csi-provisioner:v5.1.0
       externalResizer:
         enabled: false
       externalSnapshotter:
         enabled: true
         extraArgs:
         - --leader-election=false
--- kubernetes/apps/flux-system/webhooks/app Kustomization: flux-system/flux-webhooks Ingress: flux-system/flux-webhook

+++ kubernetes/apps/flux-system/webhooks/app Kustomization: flux-system/flux-webhooks Ingress: flux-system/flux-webhook

@@ -1,18 +1,20 @@

 ---
 apiVersion: networking.k8s.io/v1
 kind: Ingress
 metadata:
+  annotations:
+    external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
   labels:
     app.kubernetes.io/name: flux-webhooks
     kustomize.toolkit.fluxcd.io/name: flux-webhooks
     kustomize.toolkit.fluxcd.io/namespace: flux-system
   name: flux-webhook
   namespace: flux-system
 spec:
-  ingressClassName: internal
+  ingressClassName: external
   rules:
   - host: flux-webhook.${SECRET_DOMAIN}
     http:
       paths:
       - backend:
           service:
--- kubernetes/apps/kube-system/spegel/app Kustomization: flux-system/spegel HelmRelease: kube-system/spegel

+++ kubernetes/apps/kube-system/spegel/app Kustomization: flux-system/spegel HelmRelease: kube-system/spegel

@@ -11,15 +11,15 @@

 spec:
   chart:
     spec:
       chart: spegel
       sourceRef:
         kind: HelmRepository
-        name: spegel
+        name: xenitab
         namespace: flux-system
-      version: v0.0.27
+      version: v0.0.18
   install:
     remediation:
       retries: 3
   interval: 30m
   uninstall:
     keepHistory: false
--- kubernetes/apps/services/sshwifty/app Kustomization: flux-system/sshwifty HelmRelease: services/sshwifty

+++ kubernetes/apps/services/sshwifty/app Kustomization: flux-system/sshwifty HelmRelease: services/sshwifty

@@ -1,75 +0,0 @@

----
-apiVersion: helm.toolkit.fluxcd.io/v2beta2
-kind: HelmRelease
-metadata:
-  labels:
-    app.kubernetes.io/name: sshwifty
-    kustomize.toolkit.fluxcd.io/name: sshwifty
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: sshwifty
-  namespace: services
-spec:
-  chart:
-    spec:
-      chart: app-template
-      sourceRef:
-        kind: HelmRepository
-        name: bjw-s
-        namespace: flux-system
-      version: 3.3.2
-  install:
-    remediation:
-      retries: 3
-  interval: 15m
-  uninstall:
-    keepHistory: false
-  upgrade:
-    cleanupOnFail: true
-    remediation:
-      retries: 3
-      strategy: rollback
-  values:
-    controllers:
-      sshwifty:
-        annotations:
-          reloader.stakater.com/auto: 'true'
-        containers:
-          app:
-            env:
-              SSHWIFTY_PRESETS: '[{"Title":"studio","Type":"SSH","Host":"192.168.100.95","Meta":{"Authentication":"Password"}}]'
-              TZ: America/Toronto
-            image:
-              repository: niruix/sshwifty
-              tag: latest
-            resources:
-              limits:
-                memory: 256M
-              requests:
-                cpu: 100m
-                memory: 52M
-    ingress:
-      app:
-        annotations:
-          hajimari.io/appName: sshwifty
-          hajimari.io/enable: 'true'
-          hajimari.io/icon: remote-desktop
-          hajimari.io/targetBlank: 'true'
-        className: internal
-        enabled: true
-        hosts:
-        - host: sshwifty.winterspring.ca
-          paths:
-          - path: /
-            service:
-              identifier: app
-              port: http
-        tls:
-        - hosts:
-          - sshwifty.winterspring.ca
-    service:
-      app:
-        controller: sshwifty
-        ports:
-          http:
-            port: 8182
-
--- kubernetes/flux Kustomization: flux-system/cluster HelmRepository: flux-system/spegel

+++ kubernetes/flux Kustomization: flux-system/cluster HelmRepository: flux-system/spegel

@@ -1,14 +0,0 @@

----
-apiVersion: source.toolkit.fluxcd.io/v1beta2
-kind: HelmRepository
-metadata:
-  labels:
-    kustomize.toolkit.fluxcd.io/name: cluster
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: spegel
-  namespace: flux-system
-spec:
-  interval: 5m
-  type: oci
-  url: oci://ghcr.io/spegel-org/helm-charts
-
--- kubernetes/flux Kustomization: flux-system/cluster HelmRepository: flux-system/xenitab

+++ kubernetes/flux Kustomization: flux-system/cluster HelmRepository: flux-system/xenitab

@@ -0,0 +1,14 @@

+---
+apiVersion: source.toolkit.fluxcd.io/v1beta2
+kind: HelmRepository
+metadata:
+  labels:
+    kustomize.toolkit.fluxcd.io/name: cluster
+    kustomize.toolkit.fluxcd.io/namespace: flux-system
+  name: xenitab
+  namespace: flux-system
+spec:
+  interval: 5m
+  type: oci
+  url: oci://ghcr.io/xenitab/helm-charts
+
--- kubernetes/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/sshwifty

+++ kubernetes/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/sshwifty

@@ -1,40 +0,0 @@

----
-apiVersion: kustomize.toolkit.fluxcd.io/v1
-kind: Kustomization
-metadata:
-  labels:
-    kustomize.toolkit.fluxcd.io/name: cluster-apps
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: sshwifty
-  namespace: flux-system
-spec:
-  commonMetadata:
-    labels:
-      app.kubernetes.io/name: sshwifty
-  decryption:
-    provider: sops
-    secretRef:
-      name: sops-age
-  interval: 30m
-  path: ./kubernetes/apps/services/sshwifty/app
-  postBuild:
-    substituteFrom:
-    - kind: ConfigMap
-      name: cluster-settings
-    - kind: Secret
-      name: cluster-secrets
-    - kind: ConfigMap
-      name: cluster-settings-user
-      optional: true
-    - kind: Secret
-      name: cluster-secrets-user
-      optional: true
-  prune: true
-  retryInterval: 1m
-  sourceRef:
-    kind: GitRepository
-    name: home-kubernetes
-  targetNamespace: services
-  timeout: 3m
-  wait: false
-
--- kubernetes/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/mealie

+++ kubernetes/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/mealie

@@ -1,49 +0,0 @@

----
-apiVersion: kustomize.toolkit.fluxcd.io/v1
-kind: Kustomization
-metadata:
-  labels:
-    kustomize.toolkit.fluxcd.io/name: cluster-apps
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: mealie
-  namespace: flux-system
-spec:
-  commonMetadata:
-    labels:
-      app.kubernetes.io/name: mealie
-  decryption:
-    provider: sops
-    secretRef:
-      name: sops-age
-  dependsOn:
-  - name: external-secrets-stores
-  - name: volsync
-  - name: democratic-csi-local-path
-  interval: 30m
-  path: ./kubernetes/apps/services/mealie/app
-  postBuild:
-    substitute:
-      APP: mealie
-      APP_GID: '105000'
-      APP_UID: '105000'
-      VOLSYNC_CAPACITY: 2Gi
-    substituteFrom:
-    - kind: ConfigMap
-      name: cluster-settings
-    - kind: Secret
-      name: cluster-secrets
-    - kind: ConfigMap
-      name: cluster-settings-user
-      optional: true
-    - kind: Secret
-      name: cluster-secrets-user
-      optional: true
-  prune: true
-  retryInterval: 1m
-  sourceRef:
-    kind: GitRepository
-    name: home-kubernetes
-  targetNamespace: services
-  timeout: 3m
-  wait: false
-
--- kubernetes/apps/network/cloudflared/app Kustomization: flux-system/cloudflared ConfigMap: network/cloudflared-configmap

+++ kubernetes/apps/network/cloudflared/app Kustomization: flux-system/cloudflared ConfigMap: network/cloudflared-configmap

@@ -7,15 +7,15 @@

       originServerName: "external.${SECRET_DOMAIN}"
       http2Origin: true
       noTLSVerify: true
 
     ingress:
       - hostname: "${SECRET_DOMAIN}"
-        service: https://ingress-nginx-internal-controller.network.svc.cluster.local:443
+        service: https://ingress-nginx-external-controller.network.svc.cluster.local:443
       - hostname: "*.${SECRET_DOMAIN}"
-        service: https://ingress-nginx-internal-controller.network.svc.cluster.local:443
+        service: https://ingress-nginx-external-controller.network.svc.cluster.local:443
       - service: http_status:404
 kind: ConfigMap
 metadata:
   labels:
     app.kubernetes.io/name: cloudflared
     kustomize.toolkit.fluxcd.io/name: cloudflared
--- kubernetes/apps/gcsim/gcsim-preview/app Kustomization: flux-system/gcsim-preview HelmRelease: gcsim/gcsim-preview

+++ kubernetes/apps/gcsim/gcsim-preview/app Kustomization: flux-system/gcsim-preview HelmRelease: gcsim/gcsim-preview

@@ -56,23 +56,38 @@

               requests:
                 cpu: 10m
                 memory: 512Mi
     ingress:
       app:
         annotations:
+          external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
+        className: external
+        enabled: true
+        hosts:
+        - host: '{{ .Release.Name }}.${SECRET_DOMAIN}'
+          paths:
+          - path: /
+            service:
+              identifier: app
+              port: http
+        nameOverride: gcsim-preview
+        tls:
+        - hosts:
+          - '{{ .Release.Name }}.${SECRET_DOMAIN}'
+      internal:
+        annotations:
           hajimari.io/enable: 'false'
         className: internal
         enabled: true
         hosts:
         - host: '{{ .Release.Name }}.${SECRET_DOMAIN}'
           paths:
           - path: /
             service:
               identifier: app
               port: http
-        nameOverride: gcsim-preview
         tls:
         - hosts:
           - '{{ .Release.Name }}.${SECRET_DOMAIN}'
     persistence:
       assets:
         enabled: true
--- kubernetes/apps/network/ingress-nginx/external Kustomization: flux-system/ingress-nginx-external HelmRelease: network/ingress-nginx-external

+++ kubernetes/apps/network/ingress-nginx/external Kustomization: flux-system/ingress-nginx-external HelmRelease: network/ingress-nginx-external

@@ -66,13 +66,13 @@

           enabled: true
           namespaceSelector:
             any: true
       replicaCount: 1
       resources:
         limits:
-          memory: 2Gi
+          memory: 500Mi
         requests:
           cpu: 100m
       service:
         annotations:
           external-dns.alpha.kubernetes.io/hostname: external.${SECRET_DOMAIN}
           io.cilium/lb-ipam-ips: 192.168.100.52
--- kubernetes/apps/media/audiobookshelf/app Kustomization: flux-system/audiobookshelf HelmRelease: media/audiobookshelf

+++ kubernetes/apps/media/audiobookshelf/app Kustomization: flux-system/audiobookshelf HelmRelease: media/audiobookshelf

@@ -80,24 +80,40 @@

             fsGroupChangePolicy: OnRootMismatch
             runAsGroup: 105000
             runAsUser: 105000
     ingress:
       app:
         annotations:
+          external-dns.alpha.kubernetes.io/target: external.
           hajimari.io/appName: Audiobookshelf
           hajimari.io/icon: https://github.com/walkxcode/dashboard-icons/raw/main/svg/audiobookshelf.svg
+        className: external
+        enabled: true
+        hosts:
+        - host: '{{ .Release.Name }}.'
+          paths:
+          - path: /
+            service:
+              identifier: app
+              port: http
+        nameOverride: audiobookshelf
+        tls:
+        - hosts:
+          - '{{ .Release.Name }}.'
+      internal:
+        annotations:
+          hajimari.io/enable: 'false'
         className: internal
         enabled: true
         hosts:
         - host: '{{ .Release.Name }}.'
           paths:
           - path: /
             service:
               identifier: app
               port: http
-        nameOverride: audiobookshelf
         tls:
         - hosts:
           - '{{ .Release.Name }}.'
     persistence:
       cache:
         enabled: true
--- kubernetes/apps/network/ingress-nginx/internal Kustomization: flux-system/ingress-nginx-internal HelmRelease: network/ingress-nginx-internal

+++ kubernetes/apps/network/ingress-nginx/internal Kustomization: flux-system/ingress-nginx-internal HelmRelease: network/ingress-nginx-internal

@@ -65,13 +65,13 @@

           enabled: true
           namespaceSelector:
             any: true
       replicaCount: 1
       resources:
         limits:
-          memory: 2Gi
+          memory: 500Mi
         requests:
           cpu: 100m
       service:
         annotations:
           io.cilium/lb-ipam-ips: 192.168.100.51
         externalTrafficPolicy: Cluster
@@ -84,7 +84,9 @@

         maxSkew: 1
         topologyKey: kubernetes.io/hostname
         whenUnsatisfiable: DoNotSchedule
     defaultBackend:
       enabled: false
     fullnameOverride: ingress-nginx-internal
+    tcp:
+      '22': services/gitea-ssh:22
 
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie HelmRelease: services/mealie

+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie HelmRelease: services/mealie

@@ -1,101 +0,0 @@

----
-apiVersion: helm.toolkit.fluxcd.io/v2beta2
-kind: HelmRelease
-metadata:
-  labels:
-    app.kubernetes.io/name: mealie
-    kustomize.toolkit.fluxcd.io/name: mealie
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: mealie
-  namespace: services
-spec:
-  chart:
-    spec:
-      chart: app-template
-      sourceRef:
-        kind: HelmRepository
-        name: bjw-s
-        namespace: flux-system
-      version: 3.0.4
-  install:
-    remediation:
-      retries: 3
-  interval: 15m
-  uninstall:
-    keepHistory: false
-  upgrade:
-    cleanupOnFail: true
-    remediation:
-      retries: 3
-  values:
-    controllers:
-      mealie:
-        annotations:
-          reloader.stakater.com/auto: 'true'
-        containers:
-          app:
-            env:
-              ALLOW_SIGNUP: 'false'
-              API_DOCS: 'false'
-              AUTO_BACKUP_ENABLED: 'true'
-              BASE_URL: https://mealie.winterspring.ca
-              MAX_WORKERS: '1'
-              TZ: America/Toronto
-              WEB_CONCURRENCY: '1'
-              WORKERS_PER_CORE: '1'
-            envFrom:
-            - secretRef:
-                name: mealie-secret
-            image:
-              repository: ghcr.io/mealie-recipes/mealie
-              tag: v2.1.0
-        initContainers:
-          init-db:
-            envFrom:
-            - secretRef:
-                name: mealie-secret
-            image:
-              repository: ghcr.io/onedr0p/postgres-init
-              tag: 16
-        pod:
-          securityContext:
-            fsGroup: 105000
-            fsGroupChangePolicy: OnRootMismatch
-            runAsGroup: 105000
-            runAsUser: 105000
-    ingress:
-      app:
-        annotations:
-          hajimari.io/appName: Mealie
-          hajimari.io/icon: https://raw.githubusercontent.com/walkxcode/dashboard-icons/refs/heads/main/svg/mealie.svg
-        className: internal
-        enabled: true
-        hosts:
-        - host: '{{ .Release.Name }}.winterspring.ca'
-          paths:
-          - path: /
-            service:
-              identifier: app
-              port: http
-        tls:
-        - hosts:
-          - '{{ .Release.Name }}.winterspring.ca'
-    persistence:
-      backups:
-        globalMounts:
-        - path: /app/data/backups
-        path: /storage/documents/mealie
-        server: 192.168.100.5
-        type: nfs
-      data:
-        enabled: true
-        existingClaim: mealie
-        globalMounts:
-        - path: /app/data
-    service:
-      app:
-        controller: mealie
-        ports:
-          http:
-            port: 9000
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ExternalSecret: services/mealie

+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ExternalSecret: services/mealie

@@ -1,36 +0,0 @@

----
-apiVersion: external-secrets.io/v1beta1
-kind: ExternalSecret
-metadata:
-  labels:
-    app.kubernetes.io/name: mealie
-    kustomize.toolkit.fluxcd.io/name: mealie
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: mealie
-  namespace: services
-spec:
-  dataFrom:
-  - extract:
-      key: cloudnative-pg
-  - extract:
-      key: mealie
-  secretStoreRef:
-    kind: ClusterSecretStore
-    name: onepassword-connect
-  target:
-    name: mealie-secret
-    template:
-      data:
-        DB_ENGINE: postgres
-        INIT_POSTGRES_DBNAME: mealie_main
-        INIT_POSTGRES_HOST: postgres-rw.database.svc.cluster.local
-        INIT_POSTGRES_PASS: '{{ .POSTGRES_PASSWORD }}'
-        INIT_POSTGRES_SUPER_PASS: '{{ .POSTGRES_SUPER_PASS }}'
-        INIT_POSTGRES_USER: '{{ .POSTGRES_USER }}'
-        POSTGRES_DB: mealie_main
-        POSTGRES_PASSWORD: '{{ .POSTGRES_PASSWORD }}'
-        POSTGRES_PORT: '5432'
-        POSTGRES_SERVER: postgres-rw.database.svc.cluster.local
-        POSTGRES_USER: '{{ .POSTGRES_USER }}'
-      engineVersion: v2
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie PersistentVolumeClaim: services/mealie

+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie PersistentVolumeClaim: services/mealie

@@ -1,23 +0,0 @@

----
-apiVersion: v1
-kind: PersistentVolumeClaim
-metadata:
-  labels:
-    app.kubernetes.io/name: mealie
-    kustomize.toolkit.fluxcd.io/name: mealie
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: mealie
-  namespace: services
-spec:
-  accessModes:
-  - ReadWriteOnce
-  dataSourceRef:
-    apiGroup: volsync.backube
-    kind: ReplicationDestination
-    name: mealie-bootstrap
-  resources:
-    requests:
-      storage: 2Gi
-  storageClassName: local-hostpath
-  volumeMode: Filesystem
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ExternalSecret: services/mealie-volsync-minio

+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ExternalSecret: services/mealie-volsync-minio

@@ -1,27 +0,0 @@

----
-apiVersion: external-secrets.io/v1beta1
-kind: ExternalSecret
-metadata:
-  labels:
-    app.kubernetes.io/name: mealie
-    kustomize.toolkit.fluxcd.io/name: mealie
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: mealie-volsync-minio
-  namespace: services
-spec:
-  dataFrom:
-  - extract:
-      key: volsync
-  secretStoreRef:
-    kind: ClusterSecretStore
-    name: onepassword-connect
-  target:
-    name: mealie-volsync-minio
-    template:
-      data:
-        AWS_ACCESS_KEY_ID: '{{ .AWS_ACCESS_KEY_ID }}'
-        AWS_SECRET_ACCESS_KEY: '{{ .AWS_SECRET_ACCESS_KEY }}'
-        RESTIC_PASSWORD: '{{ .RESTIC_PASSWORD }}'
-        RESTIC_REPOSITORY: s3:http://minio.lan/persistent-snapshots/mealie
-      engineVersion: v2
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ReplicationSource: services/mealie-minio

+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ReplicationSource: services/mealie-minio

@@ -1,35 +0,0 @@

----
-apiVersion: volsync.backube/v1alpha1
-kind: ReplicationSource
-metadata:
-  labels:
-    app.kubernetes.io/name: mealie
-    kustomize.toolkit.fluxcd.io/name: mealie
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: mealie-minio
-  namespace: services
-spec:
-  restic:
-    accessModes:
-    - ReadWriteOnce
-    cacheAccessModes:
-    - ReadWriteOnce
-    cacheCapacity: 1Gi
-    cacheStorageClassName: local-hostpath
-    copyMethod: Snapshot
-    moverSecurityContext:
-      fsGroup: 105000
-      runAsGroup: 105000
-      runAsUser: 105000
-    pruneIntervalDays: 7
-    repository: mealie-volsync-minio
-    retain:
-      daily: 7
-      hourly: 24
-      weekly: 5
-    storageClassName: local-hostpath
-    volumeSnapshotClassName: local-hostpath
-  sourcePVC: mealie
-  trigger:
-    schedule: 0 * * * *
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ReplicationDestination: services/mealie-bootstrap

+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ReplicationDestination: services/mealie-bootstrap

@@ -1,30 +0,0 @@

----
-apiVersion: volsync.backube/v1alpha1
-kind: ReplicationDestination
-metadata:
-  labels:
-    app.kubernetes.io/name: mealie
-    kustomize.toolkit.fluxcd.io/name: mealie
-    kustomize.toolkit.fluxcd.io/namespace: flux-system
-  name: mealie-bootstrap
-  namespace: services
-spec:
-  restic:
-    accessModes:
-    - ReadWriteOnce
-    cacheAccessModes:
-    - ReadWriteOnce
-    cacheCapacity: 1Gi
-    cacheStorageClassName: local-hostpath
-    capacity: 2Gi
-    copyMethod: Snapshot
-    moverSecurityContext:
-      fsGroup: 105000
-      runAsGroup: 105000
-      runAsUser: 105000
-    repository: mealie-volsync-minio
-    storageClassName: local-hostpath
-    volumeSnapshotClassName: local-hostpath
-  trigger:
-    manual: restore-once-bootstrap
-
--- kubernetes/apps/media/filebrowser/app Kustomization: flux-system/filebrowser HelmRelease: media/filebrowser

+++ kubernetes/apps/media/filebrowser/app Kustomization: flux-system/filebrowser HelmRelease: media/filebrowser

@@ -32,13 +32,13 @@

       filebrowser:
         annotations:
           reloader.stakater.com/auto: 'true'
         containers:
           app:
             env:
-              FB_DATABASE: /config/filebrowserv2.db
+              FB_DATABASE: /config/filebrowser.db
               FB_LOG: stdout
               FB_PORT: 80
               FB_ROOT: /storage
             image:
               repository: docker.io/filebrowser/filebrowser
               tag: v2.31.2@sha256:a4da9ca8364b0a1fc5dd36f7add92582bf673c0ae0bda8dd9bd13062c41d1715

Copy link

github-actions bot commented May 25, 2024

--- HelmRelease: network/ingress-nginx-internal Service: network/ingress-nginx-internal-controller

+++ HelmRelease: network/ingress-nginx-internal Service: network/ingress-nginx-internal-controller

@@ -26,11 +26,15 @@

     appProtocol: http
   - name: https
     port: 443
     protocol: TCP
     targetPort: https
     appProtocol: https
+  - name: 22-tcp
+    port: 22
+    protocol: TCP
+    targetPort: 22-tcp
   selector:
     app.kubernetes.io/name: ingress-nginx
     app.kubernetes.io/instance: ingress-nginx-internal
     app.kubernetes.io/component: controller
 
--- HelmRelease: network/ingress-nginx-internal Deployment: network/ingress-nginx-internal-controller

+++ HelmRelease: network/ingress-nginx-internal Deployment: network/ingress-nginx-internal-controller

@@ -42,12 +42,13 @@

         - /nginx-ingress-controller
         - --publish-service=$(POD_NAMESPACE)/ingress-nginx-internal-controller
         - --election-id=ingress-nginx-internal-leader
         - --controller-class=k8s.io/internal
         - --ingress-class=nginx
         - --configmap=$(POD_NAMESPACE)/ingress-nginx-internal-controller
+        - --tcp-services-configmap=$(POD_NAMESPACE)/ingress-nginx-internal-tcp
         - --validating-webhook=:8443
         - --validating-webhook-certificate=/usr/local/certificates/cert
         - --validating-webhook-key=/usr/local/certificates/key
         - --default-ssl-certificate=network/${SECRET_DOMAIN/./-}-production-tls
         securityContext:
           runAsNonRoot: true
@@ -102,19 +103,22 @@

         - name: metrics
           containerPort: 10254
           protocol: TCP
         - name: webhook
           containerPort: 8443
           protocol: TCP
+        - name: 22-tcp
+          containerPort: 22
+          protocol: TCP
         volumeMounts:
         - name: webhook-cert
           mountPath: /usr/local/certificates/
           readOnly: true
         resources:
           limits:
-            memory: 2Gi
+            memory: 500Mi
           requests:
             cpu: 100m
             memory: 90Mi
       nodeSelector:
         kubernetes.io/os: linux
       topologySpreadConstraints:
--- HelmRelease: network/ingress-nginx-internal ConfigMap: network/ingress-nginx-internal-tcp

+++ HelmRelease: network/ingress-nginx-internal ConfigMap: network/ingress-nginx-internal-tcp

@@ -0,0 +1,15 @@

+---
+apiVersion: v1
+kind: ConfigMap
+metadata:
+  labels:
+    app.kubernetes.io/name: ingress-nginx
+    app.kubernetes.io/instance: ingress-nginx-internal
+    app.kubernetes.io/part-of: ingress-nginx
+    app.kubernetes.io/managed-by: Helm
+    app.kubernetes.io/component: controller
+  name: ingress-nginx-internal-tcp
+  namespace: network
+data:
+  '22': services/gitea-ssh:22
+
--- HelmRelease: network/ingress-nginx-external Deployment: network/ingress-nginx-external-controller

+++ HelmRelease: network/ingress-nginx-external Deployment: network/ingress-nginx-external-controller

@@ -108,13 +108,13 @@

         volumeMounts:
         - name: webhook-cert
           mountPath: /usr/local/certificates/
           readOnly: true
         resources:
           limits:
-            memory: 2Gi
+            memory: 500Mi
           requests:
             cpu: 100m
             memory: 90Mi
       nodeSelector:
         kubernetes.io/os: linux
       topologySpreadConstraints:
--- HelmRelease: storage/democratic-csi-local-path DaemonSet: storage/democratic-csi-local-path-node

+++ HelmRelease: storage/democratic-csi-local-path DaemonSet: storage/democratic-csi-local-path-node

@@ -34,13 +34,13 @@

       hostNetwork: true
       hostAliases: []
       hostIPC: true
       hostPID: false
       containers:
       - name: external-provisioner
-        image: registry.k8s.io/sig-storage/csi-provisioner:v3.6.4
+        image: registry.k8s.io/sig-storage/csi-provisioner:v5.1.0
         args:
         - --v=5
         - --leader-election
         - --leader-election-namespace=storage
         - --timeout=90s
         - --worker-threads=10
--- HelmRelease: kube-system/spegel DaemonSet: kube-system/spegel

+++ HelmRelease: kube-system/spegel DaemonSet: kube-system/spegel

@@ -6,13 +6,12 @@

   namespace: kube-system
   labels:
     app.kubernetes.io/name: spegel
     app.kubernetes.io/instance: spegel
     app.kubernetes.io/managed-by: Helm
 spec:
-  revisionHistoryLimit: 10
   updateStrategy: {}
   selector:
     matchLabels:
       app.kubernetes.io/name: spegel
       app.kubernetes.io/instance: spegel
   template:
@@ -23,21 +22,19 @@

     spec:
       serviceAccountName: spegel
       securityContext: {}
       priorityClassName: system-node-critical
       initContainers:
       - name: configuration
-        image: ghcr.io/spegel-org/spegel@sha256:e10014e197dd47c6297eaaa6d326b25d53b69c2a1461c430a862a959d0eb32fd
+        image: ghcr.io/xenitab/spegel@sha256:6d1ae26917ff5ef7679c185b1c573cafa36a976bb3bcff62313fd36c64e3994a
         imagePullPolicy: IfNotPresent
         securityContext: {}
         args:
         - configuration
-        - --log-level=INFO
         - --containerd-registry-config-path=/etc/cri/conf.d/hosts
         - --registries
-        - https://cgr.dev
         - https://docker.io
         - https://ghcr.io
         - https://quay.io
         - https://mcr.microsoft.com
         - https://public.ecr.aws
         - https://gcr.io
@@ -45,37 +42,33 @@

         - https://k8s.gcr.io
         - https://lscr.io
         - --mirror-registries
         - http://$(NODE_IP):29999
         - http://$(NODE_IP):30021
         - --resolve-tags=true
-        - --append-mirrors=false
         env:
         - name: NODE_IP
           valueFrom:
             fieldRef:
               fieldPath: status.hostIP
-        resources: {}
         volumeMounts:
         - name: containerd-config
           mountPath: /etc/cri/conf.d/hosts
       containers:
       - name: registry
-        image: ghcr.io/spegel-org/spegel@sha256:e10014e197dd47c6297eaaa6d326b25d53b69c2a1461c430a862a959d0eb32fd
+        image: ghcr.io/xenitab/spegel@sha256:6d1ae26917ff5ef7679c185b1c573cafa36a976bb3bcff62313fd36c64e3994a
         imagePullPolicy: IfNotPresent
         securityContext: {}
         args:
         - registry
-        - --log-level=INFO
         - --mirror-resolve-retries=3
-        - --mirror-resolve-timeout=20ms
+        - --mirror-resolve-timeout=5s
         - --registry-addr=:5000
         - --router-addr=:5001
         - --metrics-addr=:9090
         - --registries
-        - https://cgr.dev
         - https://docker.io
         - https://ghcr.io
         - https://quay.io
         - https://mcr.microsoft.com
         - https://public.ecr.aws
         - https://gcr.io
@@ -87,13 +80,12 @@

         - --containerd-registry-config-path=/etc/cri/conf.d/hosts
         - --bootstrap-kind=kubernetes
         - --leader-election-namespace=kube-system
         - --leader-election-name=spegel-leader-election
         - --resolve-latest-tag=true
         - --local-addr=$(NODE_IP):29999
-        - --containerd-content-path=/var/lib/containerd/io.containerd.content.v1.content
         env:
         - name: NODE_IP
           valueFrom:
             fieldRef:
               fieldPath: status.hostIP
         ports:
@@ -105,37 +97,29 @@

           containerPort: 5001
           protocol: TCP
         - name: metrics
           containerPort: 9090
           protocol: TCP
         startupProbe:
-          periodSeconds: 3
+          periodSeconds: 1
           failureThreshold: 60
           httpGet:
             path: /healthz
             port: registry
         readinessProbe:
           httpGet:
             path: /healthz
             port: registry
         volumeMounts:
         - name: containerd-sock
           mountPath: /run/containerd/containerd.sock
-        - name: containerd-content
-          mountPath: /var/lib/containerd/io.containerd.content.v1.content
-          readOnly: true
         resources: {}
       volumes:
       - name: containerd-sock
         hostPath:
           path: /run/containerd/containerd.sock
-          type: Socket
-      - name: containerd-content
-        hostPath:
-          path: /var/lib/containerd/io.containerd.content.v1.content
-          type: Directory
       - name: containerd-config
         hostPath:
           path: /etc/cri/conf.d/hosts
           type: DirectoryOrCreate
       nodeSelector:
         kubernetes.io/os: linux
--- HelmRelease: media/audiobookshelf Ingress: media/audiobookshelf

+++ HelmRelease: media/audiobookshelf Ingress: media/audiobookshelf

@@ -5,16 +5,17 @@

   name: audiobookshelf
   labels:
     app.kubernetes.io/instance: audiobookshelf
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: audiobookshelf
   annotations:
+    external-dns.alpha.kubernetes.io/target: external.
     hajimari.io/appName: Audiobookshelf
     hajimari.io/icon: https://github.com/walkxcode/dashboard-icons/raw/main/svg/audiobookshelf.svg
 spec:
-  ingressClassName: internal
+  ingressClassName: external
   tls:
   - hosts:
     - audiobookshelf.
   rules:
   - host: audiobookshelf.
     http:
--- HelmRelease: media/audiobookshelf Ingress: media/audiobookshelf-internal

+++ HelmRelease: media/audiobookshelf Ingress: media/audiobookshelf-internal

@@ -0,0 +1,28 @@

+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+  name: audiobookshelf-internal
+  labels:
+    app.kubernetes.io/instance: audiobookshelf
+    app.kubernetes.io/managed-by: Helm
+    app.kubernetes.io/name: audiobookshelf
+  annotations:
+    hajimari.io/enable: 'false'
+spec:
+  ingressClassName: internal
+  tls:
+  - hosts:
+    - audiobookshelf.
+  rules:
+  - host: audiobookshelf.
+    http:
+      paths:
+      - path: /
+        pathType: Prefix
+        backend:
+          service:
+            name: audiobookshelf
+            port:
+              number: 80
+
--- HelmRelease: media/filebrowser Deployment: media/filebrowser

+++ HelmRelease: media/filebrowser Deployment: media/filebrowser

@@ -40,13 +40,13 @@

       hostNetwork: false
       hostPID: false
       dnsPolicy: ClusterFirst
       containers:
       - env:
         - name: FB_DATABASE
-          value: /config/filebrowserv2.db
+          value: /config/filebrowser.db
         - name: FB_LOG
           value: stdout
         - name: FB_PORT
           value: '80'
         - name: FB_ROOT
           value: /storage
--- HelmRelease: services/mealie Service: services/mealie

+++ HelmRelease: services/mealie Service: services/mealie

@@ -1,22 +0,0 @@

----
-apiVersion: v1
-kind: Service
-metadata:
-  name: mealie
-  labels:
-    app.kubernetes.io/instance: mealie
-    app.kubernetes.io/managed-by: Helm
-    app.kubernetes.io/name: mealie
-    app.kubernetes.io/service: mealie
-spec:
-  type: ClusterIP
-  ports:
-  - port: 9000
-    targetPort: 9000
-    protocol: TCP
-    name: http
-  selector:
-    app.kubernetes.io/component: mealie
-    app.kubernetes.io/instance: mealie
-    app.kubernetes.io/name: mealie
-
--- HelmRelease: services/mealie Deployment: services/mealie

+++ HelmRelease: services/mealie Deployment: services/mealie

@@ -1,89 +0,0 @@

----
-apiVersion: apps/v1
-kind: Deployment
-metadata:
-  name: mealie
-  labels:
-    app.kubernetes.io/component: mealie
-    app.kubernetes.io/instance: mealie
-    app.kubernetes.io/managed-by: Helm
-    app.kubernetes.io/name: mealie
-  annotations:
-    reloader.stakater.com/auto: 'true'
-spec:
-  revisionHistoryLimit: 3
-  replicas: 1
-  strategy:
-    type: Recreate
-  selector:
-    matchLabels:
-      app.kubernetes.io/component: mealie
-      app.kubernetes.io/name: mealie
-      app.kubernetes.io/instance: mealie
-  template:
-    metadata:
-      labels:
-        app.kubernetes.io/component: mealie
-        app.kubernetes.io/instance: mealie
-        app.kubernetes.io/name: mealie
-    spec:
-      enableServiceLinks: false
-      serviceAccountName: default
-      automountServiceAccountToken: true
-      securityContext:
-        fsGroup: 105000
-        fsGroupChangePolicy: OnRootMismatch
-        runAsGroup: 105000
-        runAsUser: 105000
-      hostIPC: false
-      hostNetwork: false
-      hostPID: false
-      dnsPolicy: ClusterFirst
-      initContainers:
-      - envFrom:
-        - secretRef:
-            name: mealie-secret
-        image: ghcr.io/onedr0p/postgres-init:16
-        name: init-db
-        volumeMounts:
-        - mountPath: /app/data/backups
-          name: backups
-        - mountPath: /app/data
-          name: data
-      containers:
-      - env:
-        - name: ALLOW_SIGNUP
-          value: 'false'
-        - name: API_DOCS
-          value: 'false'
-        - name: AUTO_BACKUP_ENABLED
-          value: 'true'
-        - name: BASE_URL
-          value: https://mealie.winterspring.ca
-        - name: MAX_WORKERS
-          value: '1'
-        - name: TZ
-          value: America/Toronto
-        - name: WEB_CONCURRENCY
-          value: '1'
-        - name: WORKERS_PER_CORE
-          value: '1'
-        envFrom:
-        - secretRef:
-            name: mealie-secret
-        image: ghcr.io/mealie-recipes/mealie:v2.1.0
-        name: app
-        volumeMounts:
-        - mountPath: /app/data/backups
-          name: backups
-        - mountPath: /app/data
-          name: data
-      volumes:
-      - name: backups
-        nfs:
-          path: /storage/documents/mealie
-          server: 192.168.100.5
-      - name: data
-        persistentVolumeClaim:
-          claimName: mealie
-
--- HelmRelease: services/mealie Ingress: services/mealie

+++ HelmRelease: services/mealie Ingress: services/mealie

@@ -1,29 +0,0 @@

----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
-  name: mealie
-  labels:
-    app.kubernetes.io/instance: mealie
-    app.kubernetes.io/managed-by: Helm
-    app.kubernetes.io/name: mealie
-  annotations:
-    hajimari.io/appName: Mealie
-    hajimari.io/icon: https://raw.githubusercontent.com/walkxcode/dashboard-icons/refs/heads/main/svg/mealie.svg
-spec:
-  ingressClassName: internal
-  tls:
-  - hosts:
-    - mealie.winterspring.ca
-  rules:
-  - host: mealie.winterspring.ca
-    http:
-      paths:
-      - path: /
-        pathType: Prefix
-        backend:
-          service:
-            name: mealie
-            port:
-              number: 9000
-
--- HelmRelease: network/echo-server Ingress: network/echo-server

+++ HelmRelease: network/echo-server Ingress: network/echo-server

@@ -1,26 +0,0 @@

----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
-  name: echo-server
-  labels:
-    app.kubernetes.io/instance: echo-server
-    app.kubernetes.io/managed-by: Helm
-    app.kubernetes.io/name: echo-server
-spec:
-  ingressClassName: internal
-  tls:
-  - hosts:
-    - echo-server.${SECRET_DOMAIN}
-  rules:
-  - host: echo-server.${SECRET_DOMAIN}
-    http:
-      paths:
-      - path: /
-        pathType: Prefix
-        backend:
-          service:
-            name: echo-server
-            port:
-              number: 8080
-
--- HelmRelease: network/echo-server Ingress: network/echo-server-app

+++ HelmRelease: network/echo-server Ingress: network/echo-server-app

@@ -0,0 +1,28 @@

+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+  name: echo-server-app
+  labels:
+    app.kubernetes.io/instance: echo-server
+    app.kubernetes.io/managed-by: Helm
+    app.kubernetes.io/name: echo-server
+  annotations:
+    external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
+spec:
+  ingressClassName: external
+  tls:
+  - hosts:
+    - echo-server-external.${SECRET_DOMAIN}
+  rules:
+  - host: echo-server-external.${SECRET_DOMAIN}
+    http:
+      paths:
+      - path: /
+        pathType: Prefix
+        backend:
+          service:
+            name: echo-server
+            port:
+              number: 8080
+
--- HelmRelease: network/echo-server Ingress: network/echo-server-internal

+++ HelmRelease: network/echo-server Ingress: network/echo-server-internal

@@ -0,0 +1,26 @@

+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+  name: echo-server-internal
+  labels:
+    app.kubernetes.io/instance: echo-server
+    app.kubernetes.io/managed-by: Helm
+    app.kubernetes.io/name: echo-server
+spec:
+  ingressClassName: internal
+  tls:
+  - hosts:
+    - echo-server-internal.${SECRET_DOMAIN}
+  rules:
+  - host: echo-server-internal.${SECRET_DOMAIN}
+    http:
+      paths:
+      - path: /
+        pathType: Prefix
+        backend:
+          service:
+            name: echo-server
+            port:
+              number: 8080
+
--- HelmRelease: gcsim/gcsim-preview Ingress: gcsim/gcsim-preview

+++ HelmRelease: gcsim/gcsim-preview Ingress: gcsim/gcsim-preview

@@ -5,15 +5,15 @@

   name: gcsim-preview
   labels:
     app.kubernetes.io/instance: gcsim-preview
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/name: gcsim-preview
   annotations:
-    hajimari.io/enable: 'false'
+    external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
 spec:
-  ingressClassName: internal
+  ingressClassName: external
   tls:
   - hosts:
     - gcsim-preview.${SECRET_DOMAIN}
   rules:
   - host: gcsim-preview.${SECRET_DOMAIN}
     http:
--- HelmRelease: gcsim/gcsim-preview Ingress: gcsim/gcsim-preview-internal

+++ HelmRelease: gcsim/gcsim-preview Ingress: gcsim/gcsim-preview-internal

@@ -0,0 +1,28 @@

+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+  name: gcsim-preview-internal
+  labels:
+    app.kubernetes.io/instance: gcsim-preview
+    app.kubernetes.io/managed-by: Helm
+    app.kubernetes.io/name: gcsim-preview
+  annotations:
+    hajimari.io/enable: 'false'
+spec:
+  ingressClassName: internal
+  tls:
+  - hosts:
+    - gcsim-preview.${SECRET_DOMAIN}
+  rules:
+  - host: gcsim-preview.${SECRET_DOMAIN}
+    http:
+      paths:
+      - path: /
+        pathType: Prefix
+        backend:
+          service:
+            name: gcsim-preview
+            port:
+              number: 7777
+
--- HelmRelease: services/sshwifty Service: services/sshwifty

+++ HelmRelease: services/sshwifty Service: services/sshwifty

@@ -1,22 +0,0 @@

----
-apiVersion: v1
-kind: Service
-metadata:
-  name: sshwifty
-  labels:
-    app.kubernetes.io/instance: sshwifty
-    app.kubernetes.io/managed-by: Helm
-    app.kubernetes.io/name: sshwifty
-    app.kubernetes.io/service: sshwifty
-spec:
-  type: ClusterIP
-  ports:
-  - port: 8182
-    targetPort: 8182
-    protocol: TCP
-    name: http
-  selector:
-    app.kubernetes.io/component: sshwifty
-    app.kubernetes.io/instance: sshwifty
-    app.kubernetes.io/name: sshwifty
-
--- HelmRelease: services/sshwifty Deployment: services/sshwifty

+++ HelmRelease: services/sshwifty Deployment: services/sshwifty

@@ -1,51 +0,0 @@

----
-apiVersion: apps/v1
-kind: Deployment
-metadata:
-  name: sshwifty
-  labels:
-    app.kubernetes.io/component: sshwifty
-    app.kubernetes.io/instance: sshwifty
-    app.kubernetes.io/managed-by: Helm
-    app.kubernetes.io/name: sshwifty
-  annotations:
-    reloader.stakater.com/auto: 'true'
-spec:
-  revisionHistoryLimit: 3
-  replicas: 1
-  strategy:
-    type: Recreate
-  selector:
-    matchLabels:
-      app.kubernetes.io/component: sshwifty
-      app.kubernetes.io/name: sshwifty
-      app.kubernetes.io/instance: sshwifty
-  template:
-    metadata:
-      labels:
-        app.kubernetes.io/component: sshwifty
-        app.kubernetes.io/instance: sshwifty
-        app.kubernetes.io/name: sshwifty
-    spec:
-      enableServiceLinks: false
-      serviceAccountName: default
-      automountServiceAccountToken: true
-      hostIPC: false
-      hostNetwork: false
-      hostPID: false
-      dnsPolicy: ClusterFirst
-      containers:
-      - env:
-        - name: SSHWIFTY_PRESETS
-          value: '[{"Title":"studio","Type":"SSH","Host":"192.168.100.95","Meta":{"Authentication":"Password"}}]'
-        - name: TZ
-          value: America/Toronto
-        image: niruix/sshwifty:latest
-        name: app
-        resources:
-          limits:
-            memory: 256M
-          requests:
-            cpu: 100m
-            memory: 52M
-
--- HelmRelease: services/sshwifty Ingress: services/sshwifty

+++ HelmRelease: services/sshwifty Ingress: services/sshwifty

@@ -1,31 +0,0 @@

----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
-  name: sshwifty
-  labels:
-    app.kubernetes.io/instance: sshwifty
-    app.kubernetes.io/managed-by: Helm
-    app.kubernetes.io/name: sshwifty
-  annotations:
-    hajimari.io/appName: sshwifty
-    hajimari.io/enable: 'true'
-    hajimari.io/icon: remote-desktop
-    hajimari.io/targetBlank: 'true'
-spec:
-  ingressClassName: internal
-  tls:
-  - hosts:
-    - sshwifty.winterspring.ca
-  rules:
-  - host: sshwifty.winterspring.ca
-    http:
-      paths:
-      - path: /
-        pathType: Prefix
-        backend:
-          service:
-            name: sshwifty
-            port:
-              number: 8182
-

@renovate renovate bot force-pushed the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch from 3d39787 to 8aaa168 Compare June 4, 2024 19:26
@renovate renovate bot force-pushed the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch from 8aaa168 to b791d20 Compare August 6, 2024 19:50
@renovate renovate bot force-pushed the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch from b791d20 to 8752e18 Compare August 27, 2024 16:59
@renovate renovate bot changed the title feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed Oct 16, 2024
@renovate renovate bot closed this Oct 16, 2024
@renovate renovate bot deleted the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch October 16, 2024 14:44
@renovate renovate bot changed the title feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 Oct 16, 2024
@renovate renovate bot reopened this Oct 16, 2024
@renovate renovate bot restored the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch October 16, 2024 16:22
@renovate renovate bot force-pushed the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch from 8752e18 to 378bfd0 Compare October 23, 2024 11:39
@renovate renovate bot changed the title feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed Oct 27, 2024
@renovate renovate bot closed this Oct 27, 2024
@renovate renovate bot deleted the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch October 27, 2024 14:06
@renovate renovate bot restored the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch October 27, 2024 16:56
@renovate renovate bot changed the title feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 Oct 27, 2024
@renovate renovate bot reopened this Oct 27, 2024
@renovate renovate bot changed the title feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed Nov 3, 2024
@renovate renovate bot closed this Nov 3, 2024
@renovate renovate bot deleted the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch November 3, 2024 21:55
@renovate renovate bot changed the title feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 Nov 4, 2024
@renovate renovate bot reopened this Nov 4, 2024
@renovate renovate bot restored the renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x branch November 4, 2024 01:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants