Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(github-release): update k3s-io/k3s to v1.31.2+k3s1 #242

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Aug 3, 2024

This PR contains the following updates:

Package Update Change
k3s-io/k3s minor v1.30.2+k3s2 -> v1.31.2+k3s1

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

k3s-io/k3s (k3s-io/k3s)

v1.31.2+k3s1: v1.31.2+k3s1

Compare Source

This release updates Kubernetes to v1.31.2, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.31.1+k3s1:

Embedded Component Versions

Component Version
Kubernetes v1.31.2
Kine v0.13.2
SQLite 3.46.1
Etcd v3.5.13-k3s1
Containerd v1.7.22-k3s1
Runc v1.1.14
Flannel v0.25.6
Metrics-server v0.7.2
Traefik v2.11.10
CoreDNS v1.11.3
Helm-controller v0.16.5
Local-path-provisioner v0.0.30

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.31.1+k3s1: v1.31.1+k3s1

Compare Source

This release updates Kubernetes to v1.31.1, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.31.0+k3s1:

  • Testing And Secrets-Encryption Backports for 2024-09 (#​10802)
    • Remove secrets encryption controller
    • Cover edge case when on new minor release for E2E upgrade test
  • Update CNI plugins version (#​10817)
  • Backports for 2024-09 (#​10842)
  • Fix hosts.toml header var (#​10871)
  • Update Kubernetes to v1.31.1 (#​10895)
  • Update Kubernetes to v1.31.1-k3s3 (#​10910)

Embedded Component Versions

Component Version
Kubernetes v1.31.1
Kine v0.12.0
SQLite 3.44.0
Etcd v3.5.13-k3s1
Containerd v1.7.21-k3s2
Runc v1.1.14
Flannel v0.25.6
Metrics-server v0.7.2
Traefik v2.11.8
CoreDNS v1.11.3
Helm-controller v0.16.4
Local-path-provisioner v0.0.28

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.31.0+k3s1: v1.31.0+k3s1

Compare Source

This release is K3S's first in the v1.31 line. This release updates Kubernetes to v1.31.0.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.30.4+k3s1:

  • Move test-compat docker test to GHA (#​10414)
  • Check for bad token permissions when install via PR (#​10387)
  • Bump k3s-root to v0.14.0 (#​10466)
    • The k3s bundled userspace has been bumped to a release based on buildroot 2024.02.3, addressing several CVEs in busybox and coreutils.
  • Fix INSTALL_K3S_PR support (#​10472)
  • Add data-dir to uninstall and killall scripts (#​10473)
  • Bump github.com/hashicorp/go-retryablehttp from 0.7.4 to 0.7.7 (#​10400)
  • Bump golang:alpine image version (#​10359)
  • Bump Local Path Provisioner version (#​10394)
  • Ensure remotedialer kubelet connections use kubelet bind address (#​10480)
    • Fixed an issue where setting the --bind-address flag to a non-loopback or wildcard address would prevent kubectl logs from working properly.
  • Bump Trivy version (#​10339)
  • Add etcd s3 config secret implementation (#​10340)
    • A proxy can now be configured for use when uploading etcd snapshots to a s3-compatible storage service. This overrides any proxy settings passed via environment variables.
    • Credentials and endpoint configuration for storing etcd snapshots on a s3-compatible storage service can now be read from a Secret, instead of passing them via the CLI or config file. See https://github.com/k3s-io/k3s/blob/master/docs/adrs/etcd-s3-secret.md for more information.
  • For E2E upgrade test, automatically determine the channel to use (#​10461)
  • Bump kine to v0.11.11 (#​10494)
  • Fix loadbalancer reentrant rlock (#​10511)
    • Fixed an issue that could cause the agent loadbalancer to deadlock when the currently in-use server goes down.
  • Don't use server value from config file for etcd-snapshot commands (#​10514)
    • The --server and --token flags for the k3s etcd-snapshot command have been renamed to --etcd-server and --etcd-token, to avoid unintentionally running snapshot management commands against a remote node when the cluster join address or token are present in a config file.
  • Use pagination when listing large numbers of resources (#​10527)
  • Fix multiple issues with servicelb (#​10552)
    • Fixed issue that caused ServiceLB to fail to create a daemonset for services with long names
    • Fixed issue that caused ServiceLB pods to crashloop on nodes with ipv6 disabled at the kernel level
  • Enhance E2E Hardened option (#​10558)
  • Allow Pprof and Superisor metrics in standalone mode (#​10576)
  • Use higher QPS for secrets reencryption (#​10571)
  • Fix issues loading data-dir value from env vars or dropin config files (#​10591)
  • Remove deprecated use of wait. functions (#​10546)
  • Wire lasso metrics up to metrics endpoint (#​10528)
  • Update stable channel to v1.30.3+k3s1 (#​10647)
  • Bump docker/docker to v25.0.6 (#​10642)
  • Add a change for killall to not unmount server and agent directory (#​10403)
  • Allow edge case OS rpm installs (#​10680)
  • Bump containerd to v1.7.20 (#​10659)
  • Update to newer OS images for install testing (#​10681)
  • Bump helm-controller to v0.16.3 to drop Helm v2 support (#​10628)
  • Add toleration support to ServiceLB DaemonSet (#​10687)
      • New Feature: Users can now define Kubernetes tolerations for ServiceLB DaemonSet directly in the svccontroller.k3s.cattle.io/tolerations annotation on services.
  • Fix: Add $SUDO prefix to transactional-update commands in install script (#​10531)
  • Update to v1.30.3-k3s1 and Go 1.22.5 (#​10707)
  • Fix caching name for e2e vagrant box (#​10695)
  • Fix k3s-killall.sh support for custom data dir (#​10709)
  • Adding MariaDB to README.md (#​10717)
  • Bump Trivy version (#​10670)
  • V1.31.0-k3s1 (#​10715)
  • Update kubernetes to v1.31.0-k3s3 (#​10780)

Embedded Component Versions

Component Version
Kubernetes v1.31.0
Kine v0.12.0
SQLite 3.44.0
Etcd v3.5.13-k3s1
Containerd v1.7.20-k3s1
Runc v1.1.12
Flannel v0.25.4
Metrics-server v0.7.0
Traefik v2.10.7
CoreDNS v1.10.1
Helm-controller v0.16.3
Local-path-provisioner v0.0.28

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.30.6+k3s1: v1.30.6+k3s1

Compare Source

This release updates Kubernetes to v1.30.6, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.30.5+k3s1:
Embedded Component Versions
Component Version
Kubernetes v1.30.6
Kine v0.13.2
SQLite 3.46.1
Etcd v3.5.13-k3s1
Containerd v1.7.22-k3s1
Runc v1.1.14
Flannel v0.25.6
Metrics-server v0.7.2
Traefik v2.11.10
CoreDNS v1.11.3
Helm-controller v0.16.5
Local-path-provisioner v0.0.30
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.30.5+k3s1: v1.30.5+k3s1

Compare Source

This release updates Kubernetes to v1.30.5, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.30.4+k3s1:

  • Testing And Secrets-Encryption Backports for 2024-09 (#​10801)
    • Update to newer OS images for install testing
    • Fix caching name for e2e vagrant box
    • Remove secrets encryption controller
    • Cover edge case when on new minor release for E2E upgrade test
    • Removes deprecated alpha Secrets Encryption metrics (deprecated in 1.30, removed in 1.31)
  • Update CNI plugins version (#​10818)
  • Backports for 2024-09 (#​10843)
  • Fix hosts.toml header var (#​10872)
  • Update to v1.30.5-k3s1 and Go 1.22.6 (#​10888)
  • Update Kubernetes to v1.30.5-k3s2 (#​10909)

Embedded Component Versions

Component Version
Kubernetes v1.30.5
Kine v0.12.0
SQLite 3.44.0
Etcd v3.5.13-k3s1
Containerd v1.7.21-k3s2
Runc v1.1.14
Flannel v0.25.6
Metrics-server v0.7.2
Traefik v2.11.8
CoreDNS v1.11.3
Helm-controller v0.16.4
Local-path-provisioner v0.0.28

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.30.4+k3s1: v1.30.4+k3s1

Compare Source

This release updates Kubernetes to v1.30.4, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.30.3+k3s1:
  • Bump docker/docker to v25.0.6 (#​10649)
  • Backports for 2024-08 release cycle (#​10664)
    • Use pagination when listing large numbers of resources
    • Fix multiple issues with servicelb
    • Remove deprecated use of wait. functions
    • Wire lasso metrics up to metrics endpoint
  • Backports for August 2024 (#​10671)
  • Bump containerd to v1.7.20 (#​10660)
  • Add tolerations support for DaemonSet pods (#​10703)
    • New Feature: Users can now define Kubernetes tolerations for ServiceLB DaemonSet directly in the svccontroller.k3s.cattle.io/tolerations annotation on services.
  • Update to v1.30.4-k3s1 and Go 1.22.5 (#​10721)
Embedded Component Versions
Component Version
Kubernetes v1.30.4
Kine v0.11.11
SQLite 3.44.0
Etcd v3.5.13-k3s1
Containerd v1.7.20-k3s1
Runc v1.1.12
Flannel v0.25.4
Metrics-server v0.7.0
Traefik v2.10.7
CoreDNS v1.10.1
Helm-controller v0.16.1
Local-path-provisioner v0.0.28
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.30.3+k3s1: v1.30.3+k3s1

Compare Source

This release updates Kubernetes to v1.30.3, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.30.2+k3s2:
  • Update channel server for k3s2 (#​10446)
  • Set correct release channel for e2e upgrade test (#​10460)
  • Backports for 2024-07 release cycle (#​10497)
    • Bump k3s-root to v0.14.0
    • Bump github.com/hashicorp/go-retryablehttp from 0.7.4 to 0.7.7
    • Bump Local Path Provisioner version
    • Ensure remotedialer kubelet connections use kubelet bind address
    • Chore: Bump Trivy version
    • Add etcd s3 config secret implementation
  • July Test Backports (#​10507)
  • Update to v1.30.3-k3s1 and Go 1.22.5 (#​10536)
  • Fix issues loading data-dir value from env vars or dropping config files (#​10596)
Embedded Component Versions
Component Version
Kubernetes v1.30.3
Kine v0.11.11
SQLite 3.44.0
Etcd v3.5.13-k3s1
Containerd v1.7.17-k3s1
Runc v1.1.12
Flannel v0.25.4
Metrics-server v0.7.0
Traefik v2.10.7
CoreDNS v1.10.1
Helm-controller v0.16.1
Local-path-provisioner v0.0.28
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:


Configuration

📅 Schedule: Branch creation - "on saturday" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot changed the title fix(github-release): update k3s-io/k3s to v1.30.3+k3s1 fix(github-release): update k3s-io/k3s to v1.30.4+k3s1 Aug 23, 2024
@renovate renovate bot changed the title fix(github-release): update k3s-io/k3s to v1.30.4+k3s1 feat(github-release): update k3s-io/k3s to v1.31.0+k3s1 Sep 2, 2024
@renovate renovate bot changed the title feat(github-release): update k3s-io/k3s to v1.31.0+k3s1 feat(github-release): update k3s-io/k3s to v1.31.1+k3s1 Sep 23, 2024
@renovate renovate bot changed the title feat(github-release): update k3s-io/k3s to v1.31.1+k3s1 feat(github-release): update k3s-io/k3s to v1.31.2+k3s1 Oct 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants