-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 #92
Open
renovate
wants to merge
1
commit into
main
Choose a base branch
from
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 #92
renovate
wants to merge
1
commit into
main
from
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- kubernetes/apps/network/echo-server/app Kustomization: flux-system/echo-server HelmRelease: network/echo-server
+++ kubernetes/apps/network/echo-server/app Kustomization: flux-system/echo-server HelmRelease: network/echo-server
@@ -83,24 +83,39 @@
runAsGroup: 65534
runAsNonRoot: true
runAsUser: 65534
strategy: RollingUpdate
ingress:
app:
- className: internal
+ annotations:
+ external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
+ className: external
enabled: true
hosts:
- - host: '{{ .Release.Name }}.${SECRET_DOMAIN}'
+ - host: '{{ .Release.Name }}-external.${SECRET_DOMAIN}'
paths:
- path: /
service:
identifier: app
port: http
tls:
- hosts:
- - '{{ .Release.Name }}.${SECRET_DOMAIN}'
+ - '{{ .Release.Name }}-external.${SECRET_DOMAIN}'
+ internal:
+ className: internal
+ enabled: true
+ hosts:
+ - host: '{{ .Release.Name }}-internal.${SECRET_DOMAIN}'
+ paths:
+ - path: /
+ service:
+ identifier: app
+ port: http
+ tls:
+ - hosts:
+ - '{{ .Release.Name }}-internal.${SECRET_DOMAIN}'
service:
app:
controller: echo-server
ports:
http:
port: 8080
--- kubernetes/apps/storage/democratic-csi/local-path Kustomization: flux-system/democratic-csi-local-path HelmRelease: storage/democratic-csi-local-path
+++ kubernetes/apps/storage/democratic-csi/local-path Kustomization: flux-system/democratic-csi-local-path HelmRelease: storage/democratic-csi-local-path
@@ -37,13 +37,13 @@
- --node-deployment=true
- --node-deployment-immediate-binding=false
- --feature-gates=Topology=true
- --strict-topology=true
- --enable-capacity=true
- --capacity-ownerref-level=1
- image: registry.k8s.io/sig-storage/csi-provisioner:v3.6.4
+ image: registry.k8s.io/sig-storage/csi-provisioner:v5.1.0
externalResizer:
enabled: false
externalSnapshotter:
enabled: true
extraArgs:
- --leader-election=false
--- kubernetes/apps/flux-system/webhooks/app Kustomization: flux-system/flux-webhooks Ingress: flux-system/flux-webhook
+++ kubernetes/apps/flux-system/webhooks/app Kustomization: flux-system/flux-webhooks Ingress: flux-system/flux-webhook
@@ -1,18 +1,20 @@
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
+ annotations:
+ external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
labels:
app.kubernetes.io/name: flux-webhooks
kustomize.toolkit.fluxcd.io/name: flux-webhooks
kustomize.toolkit.fluxcd.io/namespace: flux-system
name: flux-webhook
namespace: flux-system
spec:
- ingressClassName: internal
+ ingressClassName: external
rules:
- host: flux-webhook.${SECRET_DOMAIN}
http:
paths:
- backend:
service:
--- kubernetes/apps/kube-system/spegel/app Kustomization: flux-system/spegel HelmRelease: kube-system/spegel
+++ kubernetes/apps/kube-system/spegel/app Kustomization: flux-system/spegel HelmRelease: kube-system/spegel
@@ -11,15 +11,15 @@
spec:
chart:
spec:
chart: spegel
sourceRef:
kind: HelmRepository
- name: spegel
+ name: xenitab
namespace: flux-system
- version: v0.0.27
+ version: v0.0.18
install:
remediation:
retries: 3
interval: 30m
uninstall:
keepHistory: false
--- kubernetes/apps/services/sshwifty/app Kustomization: flux-system/sshwifty HelmRelease: services/sshwifty
+++ kubernetes/apps/services/sshwifty/app Kustomization: flux-system/sshwifty HelmRelease: services/sshwifty
@@ -1,75 +0,0 @@
----
-apiVersion: helm.toolkit.fluxcd.io/v2beta2
-kind: HelmRelease
-metadata:
- labels:
- app.kubernetes.io/name: sshwifty
- kustomize.toolkit.fluxcd.io/name: sshwifty
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: sshwifty
- namespace: services
-spec:
- chart:
- spec:
- chart: app-template
- sourceRef:
- kind: HelmRepository
- name: bjw-s
- namespace: flux-system
- version: 3.3.2
- install:
- remediation:
- retries: 3
- interval: 15m
- uninstall:
- keepHistory: false
- upgrade:
- cleanupOnFail: true
- remediation:
- retries: 3
- strategy: rollback
- values:
- controllers:
- sshwifty:
- annotations:
- reloader.stakater.com/auto: 'true'
- containers:
- app:
- env:
- SSHWIFTY_PRESETS: '[{"Title":"studio","Type":"SSH","Host":"192.168.100.95","Meta":{"Authentication":"Password"}}]'
- TZ: America/Toronto
- image:
- repository: niruix/sshwifty
- tag: latest
- resources:
- limits:
- memory: 256M
- requests:
- cpu: 100m
- memory: 52M
- ingress:
- app:
- annotations:
- hajimari.io/appName: sshwifty
- hajimari.io/enable: 'true'
- hajimari.io/icon: remote-desktop
- hajimari.io/targetBlank: 'true'
- className: internal
- enabled: true
- hosts:
- - host: sshwifty.winterspring.ca
- paths:
- - path: /
- service:
- identifier: app
- port: http
- tls:
- - hosts:
- - sshwifty.winterspring.ca
- service:
- app:
- controller: sshwifty
- ports:
- http:
- port: 8182
-
--- kubernetes/flux Kustomization: flux-system/cluster HelmRepository: flux-system/spegel
+++ kubernetes/flux Kustomization: flux-system/cluster HelmRepository: flux-system/spegel
@@ -1,14 +0,0 @@
----
-apiVersion: source.toolkit.fluxcd.io/v1beta2
-kind: HelmRepository
-metadata:
- labels:
- kustomize.toolkit.fluxcd.io/name: cluster
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: spegel
- namespace: flux-system
-spec:
- interval: 5m
- type: oci
- url: oci://ghcr.io/spegel-org/helm-charts
-
--- kubernetes/flux Kustomization: flux-system/cluster HelmRepository: flux-system/xenitab
+++ kubernetes/flux Kustomization: flux-system/cluster HelmRepository: flux-system/xenitab
@@ -0,0 +1,14 @@
+---
+apiVersion: source.toolkit.fluxcd.io/v1beta2
+kind: HelmRepository
+metadata:
+ labels:
+ kustomize.toolkit.fluxcd.io/name: cluster
+ kustomize.toolkit.fluxcd.io/namespace: flux-system
+ name: xenitab
+ namespace: flux-system
+spec:
+ interval: 5m
+ type: oci
+ url: oci://ghcr.io/xenitab/helm-charts
+
--- kubernetes/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/sshwifty
+++ kubernetes/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/sshwifty
@@ -1,40 +0,0 @@
----
-apiVersion: kustomize.toolkit.fluxcd.io/v1
-kind: Kustomization
-metadata:
- labels:
- kustomize.toolkit.fluxcd.io/name: cluster-apps
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: sshwifty
- namespace: flux-system
-spec:
- commonMetadata:
- labels:
- app.kubernetes.io/name: sshwifty
- decryption:
- provider: sops
- secretRef:
- name: sops-age
- interval: 30m
- path: ./kubernetes/apps/services/sshwifty/app
- postBuild:
- substituteFrom:
- - kind: ConfigMap
- name: cluster-settings
- - kind: Secret
- name: cluster-secrets
- - kind: ConfigMap
- name: cluster-settings-user
- optional: true
- - kind: Secret
- name: cluster-secrets-user
- optional: true
- prune: true
- retryInterval: 1m
- sourceRef:
- kind: GitRepository
- name: home-kubernetes
- targetNamespace: services
- timeout: 3m
- wait: false
-
--- kubernetes/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/mealie
+++ kubernetes/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/mealie
@@ -1,49 +0,0 @@
----
-apiVersion: kustomize.toolkit.fluxcd.io/v1
-kind: Kustomization
-metadata:
- labels:
- kustomize.toolkit.fluxcd.io/name: cluster-apps
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: mealie
- namespace: flux-system
-spec:
- commonMetadata:
- labels:
- app.kubernetes.io/name: mealie
- decryption:
- provider: sops
- secretRef:
- name: sops-age
- dependsOn:
- - name: external-secrets-stores
- - name: volsync
- - name: democratic-csi-local-path
- interval: 30m
- path: ./kubernetes/apps/services/mealie/app
- postBuild:
- substitute:
- APP: mealie
- APP_GID: '105000'
- APP_UID: '105000'
- VOLSYNC_CAPACITY: 2Gi
- substituteFrom:
- - kind: ConfigMap
- name: cluster-settings
- - kind: Secret
- name: cluster-secrets
- - kind: ConfigMap
- name: cluster-settings-user
- optional: true
- - kind: Secret
- name: cluster-secrets-user
- optional: true
- prune: true
- retryInterval: 1m
- sourceRef:
- kind: GitRepository
- name: home-kubernetes
- targetNamespace: services
- timeout: 3m
- wait: false
-
--- kubernetes/apps/network/cloudflared/app Kustomization: flux-system/cloudflared ConfigMap: network/cloudflared-configmap
+++ kubernetes/apps/network/cloudflared/app Kustomization: flux-system/cloudflared ConfigMap: network/cloudflared-configmap
@@ -7,15 +7,15 @@
originServerName: "external.${SECRET_DOMAIN}"
http2Origin: true
noTLSVerify: true
ingress:
- hostname: "${SECRET_DOMAIN}"
- service: https://ingress-nginx-internal-controller.network.svc.cluster.local:443
+ service: https://ingress-nginx-external-controller.network.svc.cluster.local:443
- hostname: "*.${SECRET_DOMAIN}"
- service: https://ingress-nginx-internal-controller.network.svc.cluster.local:443
+ service: https://ingress-nginx-external-controller.network.svc.cluster.local:443
- service: http_status:404
kind: ConfigMap
metadata:
labels:
app.kubernetes.io/name: cloudflared
kustomize.toolkit.fluxcd.io/name: cloudflared
--- kubernetes/apps/gcsim/gcsim-preview/app Kustomization: flux-system/gcsim-preview HelmRelease: gcsim/gcsim-preview
+++ kubernetes/apps/gcsim/gcsim-preview/app Kustomization: flux-system/gcsim-preview HelmRelease: gcsim/gcsim-preview
@@ -56,23 +56,38 @@
requests:
cpu: 10m
memory: 512Mi
ingress:
app:
annotations:
+ external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
+ className: external
+ enabled: true
+ hosts:
+ - host: '{{ .Release.Name }}.${SECRET_DOMAIN}'
+ paths:
+ - path: /
+ service:
+ identifier: app
+ port: http
+ nameOverride: gcsim-preview
+ tls:
+ - hosts:
+ - '{{ .Release.Name }}.${SECRET_DOMAIN}'
+ internal:
+ annotations:
hajimari.io/enable: 'false'
className: internal
enabled: true
hosts:
- host: '{{ .Release.Name }}.${SECRET_DOMAIN}'
paths:
- path: /
service:
identifier: app
port: http
- nameOverride: gcsim-preview
tls:
- hosts:
- '{{ .Release.Name }}.${SECRET_DOMAIN}'
persistence:
assets:
enabled: true
--- kubernetes/apps/network/ingress-nginx/external Kustomization: flux-system/ingress-nginx-external HelmRelease: network/ingress-nginx-external
+++ kubernetes/apps/network/ingress-nginx/external Kustomization: flux-system/ingress-nginx-external HelmRelease: network/ingress-nginx-external
@@ -66,13 +66,13 @@
enabled: true
namespaceSelector:
any: true
replicaCount: 1
resources:
limits:
- memory: 2Gi
+ memory: 500Mi
requests:
cpu: 100m
service:
annotations:
external-dns.alpha.kubernetes.io/hostname: external.${SECRET_DOMAIN}
io.cilium/lb-ipam-ips: 192.168.100.52
--- kubernetes/apps/media/audiobookshelf/app Kustomization: flux-system/audiobookshelf HelmRelease: media/audiobookshelf
+++ kubernetes/apps/media/audiobookshelf/app Kustomization: flux-system/audiobookshelf HelmRelease: media/audiobookshelf
@@ -80,24 +80,40 @@
fsGroupChangePolicy: OnRootMismatch
runAsGroup: 105000
runAsUser: 105000
ingress:
app:
annotations:
+ external-dns.alpha.kubernetes.io/target: external.
hajimari.io/appName: Audiobookshelf
hajimari.io/icon: https://github.com/walkxcode/dashboard-icons/raw/main/svg/audiobookshelf.svg
+ className: external
+ enabled: true
+ hosts:
+ - host: '{{ .Release.Name }}.'
+ paths:
+ - path: /
+ service:
+ identifier: app
+ port: http
+ nameOverride: audiobookshelf
+ tls:
+ - hosts:
+ - '{{ .Release.Name }}.'
+ internal:
+ annotations:
+ hajimari.io/enable: 'false'
className: internal
enabled: true
hosts:
- host: '{{ .Release.Name }}.'
paths:
- path: /
service:
identifier: app
port: http
- nameOverride: audiobookshelf
tls:
- hosts:
- '{{ .Release.Name }}.'
persistence:
cache:
enabled: true
--- kubernetes/apps/network/ingress-nginx/internal Kustomization: flux-system/ingress-nginx-internal HelmRelease: network/ingress-nginx-internal
+++ kubernetes/apps/network/ingress-nginx/internal Kustomization: flux-system/ingress-nginx-internal HelmRelease: network/ingress-nginx-internal
@@ -65,13 +65,13 @@
enabled: true
namespaceSelector:
any: true
replicaCount: 1
resources:
limits:
- memory: 2Gi
+ memory: 500Mi
requests:
cpu: 100m
service:
annotations:
io.cilium/lb-ipam-ips: 192.168.100.51
externalTrafficPolicy: Cluster
@@ -84,7 +84,9 @@
maxSkew: 1
topologyKey: kubernetes.io/hostname
whenUnsatisfiable: DoNotSchedule
defaultBackend:
enabled: false
fullnameOverride: ingress-nginx-internal
+ tcp:
+ '22': services/gitea-ssh:22
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie HelmRelease: services/mealie
+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie HelmRelease: services/mealie
@@ -1,101 +0,0 @@
----
-apiVersion: helm.toolkit.fluxcd.io/v2beta2
-kind: HelmRelease
-metadata:
- labels:
- app.kubernetes.io/name: mealie
- kustomize.toolkit.fluxcd.io/name: mealie
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: mealie
- namespace: services
-spec:
- chart:
- spec:
- chart: app-template
- sourceRef:
- kind: HelmRepository
- name: bjw-s
- namespace: flux-system
- version: 3.0.4
- install:
- remediation:
- retries: 3
- interval: 15m
- uninstall:
- keepHistory: false
- upgrade:
- cleanupOnFail: true
- remediation:
- retries: 3
- values:
- controllers:
- mealie:
- annotations:
- reloader.stakater.com/auto: 'true'
- containers:
- app:
- env:
- ALLOW_SIGNUP: 'false'
- API_DOCS: 'false'
- AUTO_BACKUP_ENABLED: 'true'
- BASE_URL: https://mealie.winterspring.ca
- MAX_WORKERS: '1'
- TZ: America/Toronto
- WEB_CONCURRENCY: '1'
- WORKERS_PER_CORE: '1'
- envFrom:
- - secretRef:
- name: mealie-secret
- image:
- repository: ghcr.io/mealie-recipes/mealie
- tag: v2.1.0
- initContainers:
- init-db:
- envFrom:
- - secretRef:
- name: mealie-secret
- image:
- repository: ghcr.io/onedr0p/postgres-init
- tag: 16
- pod:
- securityContext:
- fsGroup: 105000
- fsGroupChangePolicy: OnRootMismatch
- runAsGroup: 105000
- runAsUser: 105000
- ingress:
- app:
- annotations:
- hajimari.io/appName: Mealie
- hajimari.io/icon: https://raw.githubusercontent.com/walkxcode/dashboard-icons/refs/heads/main/svg/mealie.svg
- className: internal
- enabled: true
- hosts:
- - host: '{{ .Release.Name }}.winterspring.ca'
- paths:
- - path: /
- service:
- identifier: app
- port: http
- tls:
- - hosts:
- - '{{ .Release.Name }}.winterspring.ca'
- persistence:
- backups:
- globalMounts:
- - path: /app/data/backups
- path: /storage/documents/mealie
- server: 192.168.100.5
- type: nfs
- data:
- enabled: true
- existingClaim: mealie
- globalMounts:
- - path: /app/data
- service:
- app:
- controller: mealie
- ports:
- http:
- port: 9000
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ExternalSecret: services/mealie
+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ExternalSecret: services/mealie
@@ -1,36 +0,0 @@
----
-apiVersion: external-secrets.io/v1beta1
-kind: ExternalSecret
-metadata:
- labels:
- app.kubernetes.io/name: mealie
- kustomize.toolkit.fluxcd.io/name: mealie
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: mealie
- namespace: services
-spec:
- dataFrom:
- - extract:
- key: cloudnative-pg
- - extract:
- key: mealie
- secretStoreRef:
- kind: ClusterSecretStore
- name: onepassword-connect
- target:
- name: mealie-secret
- template:
- data:
- DB_ENGINE: postgres
- INIT_POSTGRES_DBNAME: mealie_main
- INIT_POSTGRES_HOST: postgres-rw.database.svc.cluster.local
- INIT_POSTGRES_PASS: '{{ .POSTGRES_PASSWORD }}'
- INIT_POSTGRES_SUPER_PASS: '{{ .POSTGRES_SUPER_PASS }}'
- INIT_POSTGRES_USER: '{{ .POSTGRES_USER }}'
- POSTGRES_DB: mealie_main
- POSTGRES_PASSWORD: '{{ .POSTGRES_PASSWORD }}'
- POSTGRES_PORT: '5432'
- POSTGRES_SERVER: postgres-rw.database.svc.cluster.local
- POSTGRES_USER: '{{ .POSTGRES_USER }}'
- engineVersion: v2
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie PersistentVolumeClaim: services/mealie
+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie PersistentVolumeClaim: services/mealie
@@ -1,23 +0,0 @@
----
-apiVersion: v1
-kind: PersistentVolumeClaim
-metadata:
- labels:
- app.kubernetes.io/name: mealie
- kustomize.toolkit.fluxcd.io/name: mealie
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: mealie
- namespace: services
-spec:
- accessModes:
- - ReadWriteOnce
- dataSourceRef:
- apiGroup: volsync.backube
- kind: ReplicationDestination
- name: mealie-bootstrap
- resources:
- requests:
- storage: 2Gi
- storageClassName: local-hostpath
- volumeMode: Filesystem
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ExternalSecret: services/mealie-volsync-minio
+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ExternalSecret: services/mealie-volsync-minio
@@ -1,27 +0,0 @@
----
-apiVersion: external-secrets.io/v1beta1
-kind: ExternalSecret
-metadata:
- labels:
- app.kubernetes.io/name: mealie
- kustomize.toolkit.fluxcd.io/name: mealie
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: mealie-volsync-minio
- namespace: services
-spec:
- dataFrom:
- - extract:
- key: volsync
- secretStoreRef:
- kind: ClusterSecretStore
- name: onepassword-connect
- target:
- name: mealie-volsync-minio
- template:
- data:
- AWS_ACCESS_KEY_ID: '{{ .AWS_ACCESS_KEY_ID }}'
- AWS_SECRET_ACCESS_KEY: '{{ .AWS_SECRET_ACCESS_KEY }}'
- RESTIC_PASSWORD: '{{ .RESTIC_PASSWORD }}'
- RESTIC_REPOSITORY: s3:http://minio.lan/persistent-snapshots/mealie
- engineVersion: v2
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ReplicationSource: services/mealie-minio
+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ReplicationSource: services/mealie-minio
@@ -1,35 +0,0 @@
----
-apiVersion: volsync.backube/v1alpha1
-kind: ReplicationSource
-metadata:
- labels:
- app.kubernetes.io/name: mealie
- kustomize.toolkit.fluxcd.io/name: mealie
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: mealie-minio
- namespace: services
-spec:
- restic:
- accessModes:
- - ReadWriteOnce
- cacheAccessModes:
- - ReadWriteOnce
- cacheCapacity: 1Gi
- cacheStorageClassName: local-hostpath
- copyMethod: Snapshot
- moverSecurityContext:
- fsGroup: 105000
- runAsGroup: 105000
- runAsUser: 105000
- pruneIntervalDays: 7
- repository: mealie-volsync-minio
- retain:
- daily: 7
- hourly: 24
- weekly: 5
- storageClassName: local-hostpath
- volumeSnapshotClassName: local-hostpath
- sourcePVC: mealie
- trigger:
- schedule: 0 * * * *
-
--- kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ReplicationDestination: services/mealie-bootstrap
+++ kubernetes/apps/services/mealie/app Kustomization: flux-system/mealie ReplicationDestination: services/mealie-bootstrap
@@ -1,30 +0,0 @@
----
-apiVersion: volsync.backube/v1alpha1
-kind: ReplicationDestination
-metadata:
- labels:
- app.kubernetes.io/name: mealie
- kustomize.toolkit.fluxcd.io/name: mealie
- kustomize.toolkit.fluxcd.io/namespace: flux-system
- name: mealie-bootstrap
- namespace: services
-spec:
- restic:
- accessModes:
- - ReadWriteOnce
- cacheAccessModes:
- - ReadWriteOnce
- cacheCapacity: 1Gi
- cacheStorageClassName: local-hostpath
- capacity: 2Gi
- copyMethod: Snapshot
- moverSecurityContext:
- fsGroup: 105000
- runAsGroup: 105000
- runAsUser: 105000
- repository: mealie-volsync-minio
- storageClassName: local-hostpath
- volumeSnapshotClassName: local-hostpath
- trigger:
- manual: restore-once-bootstrap
-
--- kubernetes/apps/media/filebrowser/app Kustomization: flux-system/filebrowser HelmRelease: media/filebrowser
+++ kubernetes/apps/media/filebrowser/app Kustomization: flux-system/filebrowser HelmRelease: media/filebrowser
@@ -32,13 +32,13 @@
filebrowser:
annotations:
reloader.stakater.com/auto: 'true'
containers:
app:
env:
- FB_DATABASE: /config/filebrowserv2.db
+ FB_DATABASE: /config/filebrowser.db
FB_LOG: stdout
FB_PORT: 80
FB_ROOT: /storage
image:
repository: docker.io/filebrowser/filebrowser
tag: v2.31.2@sha256:a4da9ca8364b0a1fc5dd36f7add92582bf673c0ae0bda8dd9bd13062c41d1715 |
--- HelmRelease: network/ingress-nginx-internal Service: network/ingress-nginx-internal-controller
+++ HelmRelease: network/ingress-nginx-internal Service: network/ingress-nginx-internal-controller
@@ -26,11 +26,15 @@
appProtocol: http
- name: https
port: 443
protocol: TCP
targetPort: https
appProtocol: https
+ - name: 22-tcp
+ port: 22
+ protocol: TCP
+ targetPort: 22-tcp
selector:
app.kubernetes.io/name: ingress-nginx
app.kubernetes.io/instance: ingress-nginx-internal
app.kubernetes.io/component: controller
--- HelmRelease: network/ingress-nginx-internal Deployment: network/ingress-nginx-internal-controller
+++ HelmRelease: network/ingress-nginx-internal Deployment: network/ingress-nginx-internal-controller
@@ -42,12 +42,13 @@
- /nginx-ingress-controller
- --publish-service=$(POD_NAMESPACE)/ingress-nginx-internal-controller
- --election-id=ingress-nginx-internal-leader
- --controller-class=k8s.io/internal
- --ingress-class=nginx
- --configmap=$(POD_NAMESPACE)/ingress-nginx-internal-controller
+ - --tcp-services-configmap=$(POD_NAMESPACE)/ingress-nginx-internal-tcp
- --validating-webhook=:8443
- --validating-webhook-certificate=/usr/local/certificates/cert
- --validating-webhook-key=/usr/local/certificates/key
- --default-ssl-certificate=network/${SECRET_DOMAIN/./-}-production-tls
securityContext:
runAsNonRoot: true
@@ -102,19 +103,22 @@
- name: metrics
containerPort: 10254
protocol: TCP
- name: webhook
containerPort: 8443
protocol: TCP
+ - name: 22-tcp
+ containerPort: 22
+ protocol: TCP
volumeMounts:
- name: webhook-cert
mountPath: /usr/local/certificates/
readOnly: true
resources:
limits:
- memory: 2Gi
+ memory: 500Mi
requests:
cpu: 100m
memory: 90Mi
nodeSelector:
kubernetes.io/os: linux
topologySpreadConstraints:
--- HelmRelease: network/ingress-nginx-internal ConfigMap: network/ingress-nginx-internal-tcp
+++ HelmRelease: network/ingress-nginx-internal ConfigMap: network/ingress-nginx-internal-tcp
@@ -0,0 +1,15 @@
+---
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ labels:
+ app.kubernetes.io/name: ingress-nginx
+ app.kubernetes.io/instance: ingress-nginx-internal
+ app.kubernetes.io/part-of: ingress-nginx
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/component: controller
+ name: ingress-nginx-internal-tcp
+ namespace: network
+data:
+ '22': services/gitea-ssh:22
+
--- HelmRelease: network/ingress-nginx-external Deployment: network/ingress-nginx-external-controller
+++ HelmRelease: network/ingress-nginx-external Deployment: network/ingress-nginx-external-controller
@@ -108,13 +108,13 @@
volumeMounts:
- name: webhook-cert
mountPath: /usr/local/certificates/
readOnly: true
resources:
limits:
- memory: 2Gi
+ memory: 500Mi
requests:
cpu: 100m
memory: 90Mi
nodeSelector:
kubernetes.io/os: linux
topologySpreadConstraints:
--- HelmRelease: storage/democratic-csi-local-path DaemonSet: storage/democratic-csi-local-path-node
+++ HelmRelease: storage/democratic-csi-local-path DaemonSet: storage/democratic-csi-local-path-node
@@ -34,13 +34,13 @@
hostNetwork: true
hostAliases: []
hostIPC: true
hostPID: false
containers:
- name: external-provisioner
- image: registry.k8s.io/sig-storage/csi-provisioner:v3.6.4
+ image: registry.k8s.io/sig-storage/csi-provisioner:v5.1.0
args:
- --v=5
- --leader-election
- --leader-election-namespace=storage
- --timeout=90s
- --worker-threads=10
--- HelmRelease: kube-system/spegel DaemonSet: kube-system/spegel
+++ HelmRelease: kube-system/spegel DaemonSet: kube-system/spegel
@@ -6,13 +6,12 @@
namespace: kube-system
labels:
app.kubernetes.io/name: spegel
app.kubernetes.io/instance: spegel
app.kubernetes.io/managed-by: Helm
spec:
- revisionHistoryLimit: 10
updateStrategy: {}
selector:
matchLabels:
app.kubernetes.io/name: spegel
app.kubernetes.io/instance: spegel
template:
@@ -23,21 +22,19 @@
spec:
serviceAccountName: spegel
securityContext: {}
priorityClassName: system-node-critical
initContainers:
- name: configuration
- image: ghcr.io/spegel-org/spegel@sha256:e10014e197dd47c6297eaaa6d326b25d53b69c2a1461c430a862a959d0eb32fd
+ image: ghcr.io/xenitab/spegel@sha256:6d1ae26917ff5ef7679c185b1c573cafa36a976bb3bcff62313fd36c64e3994a
imagePullPolicy: IfNotPresent
securityContext: {}
args:
- configuration
- - --log-level=INFO
- --containerd-registry-config-path=/etc/cri/conf.d/hosts
- --registries
- - https://cgr.dev
- https://docker.io
- https://ghcr.io
- https://quay.io
- https://mcr.microsoft.com
- https://public.ecr.aws
- https://gcr.io
@@ -45,37 +42,33 @@
- https://k8s.gcr.io
- https://lscr.io
- --mirror-registries
- http://$(NODE_IP):29999
- http://$(NODE_IP):30021
- --resolve-tags=true
- - --append-mirrors=false
env:
- name: NODE_IP
valueFrom:
fieldRef:
fieldPath: status.hostIP
- resources: {}
volumeMounts:
- name: containerd-config
mountPath: /etc/cri/conf.d/hosts
containers:
- name: registry
- image: ghcr.io/spegel-org/spegel@sha256:e10014e197dd47c6297eaaa6d326b25d53b69c2a1461c430a862a959d0eb32fd
+ image: ghcr.io/xenitab/spegel@sha256:6d1ae26917ff5ef7679c185b1c573cafa36a976bb3bcff62313fd36c64e3994a
imagePullPolicy: IfNotPresent
securityContext: {}
args:
- registry
- - --log-level=INFO
- --mirror-resolve-retries=3
- - --mirror-resolve-timeout=20ms
+ - --mirror-resolve-timeout=5s
- --registry-addr=:5000
- --router-addr=:5001
- --metrics-addr=:9090
- --registries
- - https://cgr.dev
- https://docker.io
- https://ghcr.io
- https://quay.io
- https://mcr.microsoft.com
- https://public.ecr.aws
- https://gcr.io
@@ -87,13 +80,12 @@
- --containerd-registry-config-path=/etc/cri/conf.d/hosts
- --bootstrap-kind=kubernetes
- --leader-election-namespace=kube-system
- --leader-election-name=spegel-leader-election
- --resolve-latest-tag=true
- --local-addr=$(NODE_IP):29999
- - --containerd-content-path=/var/lib/containerd/io.containerd.content.v1.content
env:
- name: NODE_IP
valueFrom:
fieldRef:
fieldPath: status.hostIP
ports:
@@ -105,37 +97,29 @@
containerPort: 5001
protocol: TCP
- name: metrics
containerPort: 9090
protocol: TCP
startupProbe:
- periodSeconds: 3
+ periodSeconds: 1
failureThreshold: 60
httpGet:
path: /healthz
port: registry
readinessProbe:
httpGet:
path: /healthz
port: registry
volumeMounts:
- name: containerd-sock
mountPath: /run/containerd/containerd.sock
- - name: containerd-content
- mountPath: /var/lib/containerd/io.containerd.content.v1.content
- readOnly: true
resources: {}
volumes:
- name: containerd-sock
hostPath:
path: /run/containerd/containerd.sock
- type: Socket
- - name: containerd-content
- hostPath:
- path: /var/lib/containerd/io.containerd.content.v1.content
- type: Directory
- name: containerd-config
hostPath:
path: /etc/cri/conf.d/hosts
type: DirectoryOrCreate
nodeSelector:
kubernetes.io/os: linux
--- HelmRelease: media/audiobookshelf Ingress: media/audiobookshelf
+++ HelmRelease: media/audiobookshelf Ingress: media/audiobookshelf
@@ -5,16 +5,17 @@
name: audiobookshelf
labels:
app.kubernetes.io/instance: audiobookshelf
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: audiobookshelf
annotations:
+ external-dns.alpha.kubernetes.io/target: external.
hajimari.io/appName: Audiobookshelf
hajimari.io/icon: https://github.com/walkxcode/dashboard-icons/raw/main/svg/audiobookshelf.svg
spec:
- ingressClassName: internal
+ ingressClassName: external
tls:
- hosts:
- audiobookshelf.
rules:
- host: audiobookshelf.
http:
--- HelmRelease: media/audiobookshelf Ingress: media/audiobookshelf-internal
+++ HelmRelease: media/audiobookshelf Ingress: media/audiobookshelf-internal
@@ -0,0 +1,28 @@
+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ name: audiobookshelf-internal
+ labels:
+ app.kubernetes.io/instance: audiobookshelf
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/name: audiobookshelf
+ annotations:
+ hajimari.io/enable: 'false'
+spec:
+ ingressClassName: internal
+ tls:
+ - hosts:
+ - audiobookshelf.
+ rules:
+ - host: audiobookshelf.
+ http:
+ paths:
+ - path: /
+ pathType: Prefix
+ backend:
+ service:
+ name: audiobookshelf
+ port:
+ number: 80
+
--- HelmRelease: media/filebrowser Deployment: media/filebrowser
+++ HelmRelease: media/filebrowser Deployment: media/filebrowser
@@ -40,13 +40,13 @@
hostNetwork: false
hostPID: false
dnsPolicy: ClusterFirst
containers:
- env:
- name: FB_DATABASE
- value: /config/filebrowserv2.db
+ value: /config/filebrowser.db
- name: FB_LOG
value: stdout
- name: FB_PORT
value: '80'
- name: FB_ROOT
value: /storage
--- HelmRelease: services/mealie Service: services/mealie
+++ HelmRelease: services/mealie Service: services/mealie
@@ -1,22 +0,0 @@
----
-apiVersion: v1
-kind: Service
-metadata:
- name: mealie
- labels:
- app.kubernetes.io/instance: mealie
- app.kubernetes.io/managed-by: Helm
- app.kubernetes.io/name: mealie
- app.kubernetes.io/service: mealie
-spec:
- type: ClusterIP
- ports:
- - port: 9000
- targetPort: 9000
- protocol: TCP
- name: http
- selector:
- app.kubernetes.io/component: mealie
- app.kubernetes.io/instance: mealie
- app.kubernetes.io/name: mealie
-
--- HelmRelease: services/mealie Deployment: services/mealie
+++ HelmRelease: services/mealie Deployment: services/mealie
@@ -1,89 +0,0 @@
----
-apiVersion: apps/v1
-kind: Deployment
-metadata:
- name: mealie
- labels:
- app.kubernetes.io/component: mealie
- app.kubernetes.io/instance: mealie
- app.kubernetes.io/managed-by: Helm
- app.kubernetes.io/name: mealie
- annotations:
- reloader.stakater.com/auto: 'true'
-spec:
- revisionHistoryLimit: 3
- replicas: 1
- strategy:
- type: Recreate
- selector:
- matchLabels:
- app.kubernetes.io/component: mealie
- app.kubernetes.io/name: mealie
- app.kubernetes.io/instance: mealie
- template:
- metadata:
- labels:
- app.kubernetes.io/component: mealie
- app.kubernetes.io/instance: mealie
- app.kubernetes.io/name: mealie
- spec:
- enableServiceLinks: false
- serviceAccountName: default
- automountServiceAccountToken: true
- securityContext:
- fsGroup: 105000
- fsGroupChangePolicy: OnRootMismatch
- runAsGroup: 105000
- runAsUser: 105000
- hostIPC: false
- hostNetwork: false
- hostPID: false
- dnsPolicy: ClusterFirst
- initContainers:
- - envFrom:
- - secretRef:
- name: mealie-secret
- image: ghcr.io/onedr0p/postgres-init:16
- name: init-db
- volumeMounts:
- - mountPath: /app/data/backups
- name: backups
- - mountPath: /app/data
- name: data
- containers:
- - env:
- - name: ALLOW_SIGNUP
- value: 'false'
- - name: API_DOCS
- value: 'false'
- - name: AUTO_BACKUP_ENABLED
- value: 'true'
- - name: BASE_URL
- value: https://mealie.winterspring.ca
- - name: MAX_WORKERS
- value: '1'
- - name: TZ
- value: America/Toronto
- - name: WEB_CONCURRENCY
- value: '1'
- - name: WORKERS_PER_CORE
- value: '1'
- envFrom:
- - secretRef:
- name: mealie-secret
- image: ghcr.io/mealie-recipes/mealie:v2.1.0
- name: app
- volumeMounts:
- - mountPath: /app/data/backups
- name: backups
- - mountPath: /app/data
- name: data
- volumes:
- - name: backups
- nfs:
- path: /storage/documents/mealie
- server: 192.168.100.5
- - name: data
- persistentVolumeClaim:
- claimName: mealie
-
--- HelmRelease: services/mealie Ingress: services/mealie
+++ HelmRelease: services/mealie Ingress: services/mealie
@@ -1,29 +0,0 @@
----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- name: mealie
- labels:
- app.kubernetes.io/instance: mealie
- app.kubernetes.io/managed-by: Helm
- app.kubernetes.io/name: mealie
- annotations:
- hajimari.io/appName: Mealie
- hajimari.io/icon: https://raw.githubusercontent.com/walkxcode/dashboard-icons/refs/heads/main/svg/mealie.svg
-spec:
- ingressClassName: internal
- tls:
- - hosts:
- - mealie.winterspring.ca
- rules:
- - host: mealie.winterspring.ca
- http:
- paths:
- - path: /
- pathType: Prefix
- backend:
- service:
- name: mealie
- port:
- number: 9000
-
--- HelmRelease: network/echo-server Ingress: network/echo-server
+++ HelmRelease: network/echo-server Ingress: network/echo-server
@@ -1,26 +0,0 @@
----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- name: echo-server
- labels:
- app.kubernetes.io/instance: echo-server
- app.kubernetes.io/managed-by: Helm
- app.kubernetes.io/name: echo-server
-spec:
- ingressClassName: internal
- tls:
- - hosts:
- - echo-server.${SECRET_DOMAIN}
- rules:
- - host: echo-server.${SECRET_DOMAIN}
- http:
- paths:
- - path: /
- pathType: Prefix
- backend:
- service:
- name: echo-server
- port:
- number: 8080
-
--- HelmRelease: network/echo-server Ingress: network/echo-server-app
+++ HelmRelease: network/echo-server Ingress: network/echo-server-app
@@ -0,0 +1,28 @@
+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ name: echo-server-app
+ labels:
+ app.kubernetes.io/instance: echo-server
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/name: echo-server
+ annotations:
+ external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
+spec:
+ ingressClassName: external
+ tls:
+ - hosts:
+ - echo-server-external.${SECRET_DOMAIN}
+ rules:
+ - host: echo-server-external.${SECRET_DOMAIN}
+ http:
+ paths:
+ - path: /
+ pathType: Prefix
+ backend:
+ service:
+ name: echo-server
+ port:
+ number: 8080
+
--- HelmRelease: network/echo-server Ingress: network/echo-server-internal
+++ HelmRelease: network/echo-server Ingress: network/echo-server-internal
@@ -0,0 +1,26 @@
+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ name: echo-server-internal
+ labels:
+ app.kubernetes.io/instance: echo-server
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/name: echo-server
+spec:
+ ingressClassName: internal
+ tls:
+ - hosts:
+ - echo-server-internal.${SECRET_DOMAIN}
+ rules:
+ - host: echo-server-internal.${SECRET_DOMAIN}
+ http:
+ paths:
+ - path: /
+ pathType: Prefix
+ backend:
+ service:
+ name: echo-server
+ port:
+ number: 8080
+
--- HelmRelease: gcsim/gcsim-preview Ingress: gcsim/gcsim-preview
+++ HelmRelease: gcsim/gcsim-preview Ingress: gcsim/gcsim-preview
@@ -5,15 +5,15 @@
name: gcsim-preview
labels:
app.kubernetes.io/instance: gcsim-preview
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: gcsim-preview
annotations:
- hajimari.io/enable: 'false'
+ external-dns.alpha.kubernetes.io/target: external.${SECRET_DOMAIN}
spec:
- ingressClassName: internal
+ ingressClassName: external
tls:
- hosts:
- gcsim-preview.${SECRET_DOMAIN}
rules:
- host: gcsim-preview.${SECRET_DOMAIN}
http:
--- HelmRelease: gcsim/gcsim-preview Ingress: gcsim/gcsim-preview-internal
+++ HelmRelease: gcsim/gcsim-preview Ingress: gcsim/gcsim-preview-internal
@@ -0,0 +1,28 @@
+---
+apiVersion: networking.k8s.io/v1
+kind: Ingress
+metadata:
+ name: gcsim-preview-internal
+ labels:
+ app.kubernetes.io/instance: gcsim-preview
+ app.kubernetes.io/managed-by: Helm
+ app.kubernetes.io/name: gcsim-preview
+ annotations:
+ hajimari.io/enable: 'false'
+spec:
+ ingressClassName: internal
+ tls:
+ - hosts:
+ - gcsim-preview.${SECRET_DOMAIN}
+ rules:
+ - host: gcsim-preview.${SECRET_DOMAIN}
+ http:
+ paths:
+ - path: /
+ pathType: Prefix
+ backend:
+ service:
+ name: gcsim-preview
+ port:
+ number: 7777
+
--- HelmRelease: services/sshwifty Service: services/sshwifty
+++ HelmRelease: services/sshwifty Service: services/sshwifty
@@ -1,22 +0,0 @@
----
-apiVersion: v1
-kind: Service
-metadata:
- name: sshwifty
- labels:
- app.kubernetes.io/instance: sshwifty
- app.kubernetes.io/managed-by: Helm
- app.kubernetes.io/name: sshwifty
- app.kubernetes.io/service: sshwifty
-spec:
- type: ClusterIP
- ports:
- - port: 8182
- targetPort: 8182
- protocol: TCP
- name: http
- selector:
- app.kubernetes.io/component: sshwifty
- app.kubernetes.io/instance: sshwifty
- app.kubernetes.io/name: sshwifty
-
--- HelmRelease: services/sshwifty Deployment: services/sshwifty
+++ HelmRelease: services/sshwifty Deployment: services/sshwifty
@@ -1,51 +0,0 @@
----
-apiVersion: apps/v1
-kind: Deployment
-metadata:
- name: sshwifty
- labels:
- app.kubernetes.io/component: sshwifty
- app.kubernetes.io/instance: sshwifty
- app.kubernetes.io/managed-by: Helm
- app.kubernetes.io/name: sshwifty
- annotations:
- reloader.stakater.com/auto: 'true'
-spec:
- revisionHistoryLimit: 3
- replicas: 1
- strategy:
- type: Recreate
- selector:
- matchLabels:
- app.kubernetes.io/component: sshwifty
- app.kubernetes.io/name: sshwifty
- app.kubernetes.io/instance: sshwifty
- template:
- metadata:
- labels:
- app.kubernetes.io/component: sshwifty
- app.kubernetes.io/instance: sshwifty
- app.kubernetes.io/name: sshwifty
- spec:
- enableServiceLinks: false
- serviceAccountName: default
- automountServiceAccountToken: true
- hostIPC: false
- hostNetwork: false
- hostPID: false
- dnsPolicy: ClusterFirst
- containers:
- - env:
- - name: SSHWIFTY_PRESETS
- value: '[{"Title":"studio","Type":"SSH","Host":"192.168.100.95","Meta":{"Authentication":"Password"}}]'
- - name: TZ
- value: America/Toronto
- image: niruix/sshwifty:latest
- name: app
- resources:
- limits:
- memory: 256M
- requests:
- cpu: 100m
- memory: 52M
-
--- HelmRelease: services/sshwifty Ingress: services/sshwifty
+++ HelmRelease: services/sshwifty Ingress: services/sshwifty
@@ -1,31 +0,0 @@
----
-apiVersion: networking.k8s.io/v1
-kind: Ingress
-metadata:
- name: sshwifty
- labels:
- app.kubernetes.io/instance: sshwifty
- app.kubernetes.io/managed-by: Helm
- app.kubernetes.io/name: sshwifty
- annotations:
- hajimari.io/appName: sshwifty
- hajimari.io/enable: 'true'
- hajimari.io/icon: remote-desktop
- hajimari.io/targetBlank: 'true'
-spec:
- ingressClassName: internal
- tls:
- - hosts:
- - sshwifty.winterspring.ca
- rules:
- - host: sshwifty.winterspring.ca
- http:
- paths:
- - path: /
- pathType: Prefix
- backend:
- service:
- name: sshwifty
- port:
- number: 8182
- |
renovate
bot
force-pushed
the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
from
June 4, 2024 19:26
3d39787
to
8aaa168
Compare
renovate
bot
force-pushed
the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
from
August 6, 2024 19:50
8aaa168
to
b791d20
Compare
renovate
bot
force-pushed
the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
from
August 27, 2024 16:59
b791d20
to
8752e18
Compare
renovate
bot
changed the title
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed
Oct 16, 2024
renovate
bot
deleted the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
October 16, 2024 14:44
renovate
bot
changed the title
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5
Oct 16, 2024
renovate
bot
restored the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
October 16, 2024 16:22
renovate
bot
force-pushed
the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
from
October 23, 2024 11:39
8752e18
to
378bfd0
Compare
renovate
bot
changed the title
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed
Oct 27, 2024
renovate
bot
deleted the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
October 27, 2024 14:06
renovate
bot
restored the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
October 27, 2024 16:56
renovate
bot
changed the title
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5
Oct 27, 2024
renovate
bot
changed the title
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed
Nov 3, 2024
renovate
bot
deleted the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
November 3, 2024 21:55
renovate
bot
changed the title
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5 - autoclosed
feat(container)!: Update image registry.k8s.io/sig-storage/csi-provisioner to v5
Nov 4, 2024
renovate
bot
restored the
renovate/registry.k8s.io-sig-storage-csi-provisioner-5.x
branch
November 4, 2024 01:49
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v3.6.4
->v5.1.0
Configuration
📅 Schedule: Branch creation - "on saturday" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.