Skip to content

fix(github-release): update k3s-io/k3s to v1.26.3+k3s1#940

Merged
kashalls merged 1 commit intomainfrom
renovate/k3s-io-k3s-1.x
Mar 31, 2023
Merged

fix(github-release): update k3s-io/k3s to v1.26.3+k3s1#940
kashalls merged 1 commit intomainfrom
renovate/k3s-io-k3s-1.x

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Mar 13, 2023

Mend Renovate

This PR contains the following updates:

Package Update Change
k3s-io/k3s patch v1.26.1+k3s1 -> v1.26.3+k3s1

Release Notes

k3s-io/k3s

v1.26.3+k3s1: v1.26.3+k3s1

Compare Source

This release updates Kubernetes to v1.26.3, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.26.2+k3s1:
  • Add E2E to Drone (#​6890)
  • Add flannel adr (#​6973)
  • Update flannel and kube-router (#​7039)
  • Bump various dependencies for CVEs (#​7044)
  • Adds a warning about editing to the containerd config.toml file (#​7057)
  • Update stable version in channel server (#​7066)
  • Wait for kubelet port to be ready before setting (#​7041)
    • The agent tunnel authorizer now waits for the kubelet to be ready before reading the kubelet port from the node object.
  • Improve support for rotating the default self-signed certs (#​7032)
    • The k3s certificate rotate-ca checks now support rotating self-signed certificates without the --force option.
  • Skip all pipelines based on what is in the PR (#​6996)
  • Add missing kernel config checks (#​6946)
  • Remove deprecated nodeSelector label beta.kubernetes.io/os (#​6970)
  • MultiClusterCIDR for v1.26 (#​6885)
    • MultiClusterCIDR feature
  • Remove Nikolai from MAINTAINERS list (#​7088)
  • Add automation for Restart command for K3s (#​7002)
  • Fix to Rotate CA e2e test (#​7101)
  • Drone: Cleanup E2E VMs on test panic (#​7104)
  • Update to v1.26.3-k3s1 (#​7108)
  • Pin golangci-lint version to v1.51.2 (#​7113)
  • Clean E2E VMs before testing (#​7109)
  • Update flannel to fix NAT issue with old iptables version (#​7136)
Embedded Component Versions
Component Version
Kubernetes v1.26.3
Kine v0.9.9
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.19-k3s1
Runc v1.1.4
Flannel v0.21.4
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.2+k3s1: v1.26.2+k3s1

Compare Source

This release updates Kubernetes to v1.26.2, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.26.1+k3s1:
  • Add build tag to disable cri-dockerd (#​6760)
  • Bump cri-dockerd (#​6797)
    • The embedded cri-dockerd has been updated to v0.3.1
  • Update stable channel to v1.25.6+k3s1 (#​6828)
  • E2E Rancher and Hardened script improvements (#​6778)
  • Add Ayedo to Adopters (#​6801)
  • Consolidate E2E tests and GH Actions (#​6772)
  • Allow ServiceLB to honor ExternalTrafficPolicy=Local (#​6726)
    • ServiceLB now honors the Service's ExternalTrafficPolicy. When set to Local, the LoadBalancer will only advertise addresses of Nodes with a Pod for the Service, and will not forward traffic to other cluster members.
  • Fix cronjob example (#​6707)
  • Bump vagrant boxes to fedora37 (#​6832)
  • Ensure flag type consistency (#​6852)
  • E2E: Consoldiate docker and prefer bundled tests into new startup test (#​6851)
  • Fix reference to documentation (#​6860)
  • Bump deps: trivy, sonobuoy, dapper, golangci-lint, gopls (#​6807)
  • Fix check for (open)SUSE version (#​6791)
  • Add support for user-provided CA certificates (#​6615)
    • K3s now functions properly when the cluster CA certificates are signed by an existing root or intermediate CA. You can find a sample script for generating such certificates before K3s starts in the github repo at contrib/util/certs.sh.
  • Ignore value conflicts when reencrypting secrets (#​6850)
  • Add kubeadm style bootstrap token secret support (#​6663)
    • K3s now supports kubeadm style join tokens. k3s token create now creates join token secrets, optionally with a limited TTL.
    • K3s agents joined with an expired or deleted token stay in the cluster using existing client certificates via the NodeAuthorization admission plugin, unless their Node object is deleted from the cluster.
  • Add NATS to the list of supported data stores (#​6876)
  • Use default address family when adding kubernetes service address to SAN list (#​6857)
    • The apiserver advertised address and IP SAN entry are now set correctly on clusters that use IPv6 as the default IP family.
  • Fix issue with servicelb startup failure when validating webhooks block creation (#​6911)
    • The embedded cloud controller manager will no longer attempt to unconditionally re-create its namespace and serviceaccount on startup. This resolves an issue that could cause a deadlocked cluster when fail-closed webhooks are in use.
  • Fix access to hostNetwork port on NodeIP when egress-selector-mode=agent (#​6829)
    • Fixed an issue that would cause the apiserver egress proxy to attempt to use the agent tunnel to connect to service endpoints even in agent or disabled mode.
  • Wait for server to become ready before creating token (#​6932)
  • Allow for multiple sets of leader-elected controllers (#​6922)
    • Fixed an issue where leader-elected controllers for managed etcd did not run on etcd-only nodes
  • Update Flannel to v0.21.1 (#​6944)
  • Fix Nightly E2E tests (#​6950)
  • Fix etcd and ca-cert rotate issues (#​6952)
  • Fix ServiceLB dual-stack ingress IP listing (#​6979)
    • Resolved an issue with ServiceLB that would cause it to advertise node IPv6 addresses, even if the cluster or service was not enabled for dual-stack operation.
  • Bump kine to v0.9.9 (#​6974)
    • The embedded kine version has been bumped to v0.9.9. Compaction log messages are now omitted at info level for increased visibility.
  • Update to v1.26.2-k3s1 (#​7011)
Embedded Component Versions
Component Version
Kubernetes v1.26.2
Kine v0.9.9
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.15-k3s1
Runc v1.1.4
Flannel v0.21.1
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@cloudflare-workers-and-pages
Copy link

cloudflare-workers-and-pages bot commented Mar 13, 2023

Deploying with  Cloudflare Pages  Cloudflare Pages

Latest commit: 027f833
Status: ✅  Deploy successful!
Preview URL: https://0923afd4.home-cluster.pages.dev
Branch Preview URL: https://renovate-k3s-io-k3s-1-x.home-cluster.pages.dev

View logs

| datasource      | package    | from         | to           |
| --------------- | ---------- | ------------ | ------------ |
| github-releases | k3s-io/k3s | v1.26.1+k3s1 | v1.26.3+k3s1 |
@renovate renovate bot force-pushed the renovate/k3s-io-k3s-1.x branch from 4051307 to 027f833 Compare March 29, 2023 05:31
@renovate renovate bot changed the title fix(github-release): update k3s-io/k3s to v1.26.2+k3s1 fix(github-release): update k3s-io/k3s to v1.26.3+k3s1 Mar 29, 2023
@kashalls kashalls merged commit e9c8c1a into main Mar 31, 2023
@renovate renovate bot deleted the renovate/k3s-io-k3s-1.x branch March 31, 2023 13:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant