Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency k3s-io/k3s to v1.26.3+k3s1 #19

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link

@renovate renovate bot commented Jun 11, 2022

Mend Renovate

This PR contains the following updates:

Package Update Change
k3s-io/k3s minor v1.23.6+k3s1 -> v1.26.3+k3s1

⚠ Dependency Lookup Warnings ⚠

Warnings were logged while processing this repo. Please check the Dependency Dashboard for more information.


Release Notes

k3s-io/k3s

v1.26.3+k3s1: v1.26.3+k3s1

Compare Source

This release updates Kubernetes to v1.26.3, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.26.2+k3s1:
  • Add E2E to Drone (#​6890)
  • Add flannel adr (#​6973)
  • Update flannel and kube-router (#​7039)
  • Bump various dependencies for CVEs (#​7044)
  • Adds a warning about editing to the containerd config.toml file (#​7057)
  • Update stable version in channel server (#​7066)
  • Wait for kubelet port to be ready before setting (#​7041)
    • The agent tunnel authorizer now waits for the kubelet to be ready before reading the kubelet port from the node object.
  • Improve support for rotating the default self-signed certs (#​7032)
    • The k3s certificate rotate-ca checks now support rotating self-signed certificates without the --force option.
  • Skip all pipelines based on what is in the PR (#​6996)
  • Add missing kernel config checks (#​6946)
  • Remove deprecated nodeSelector label beta.kubernetes.io/os (#​6970)
  • MultiClusterCIDR for v1.26 (#​6885)
    • MultiClusterCIDR feature
  • Remove Nikolai from MAINTAINERS list (#​7088)
  • Add automation for Restart command for K3s (#​7002)
  • Fix to Rotate CA e2e test (#​7101)
  • Drone: Cleanup E2E VMs on test panic (#​7104)
  • Update to v1.26.3-k3s1 (#​7108)
  • Pin golangci-lint version to v1.51.2 (#​7113)
  • Clean E2E VMs before testing (#​7109)
  • Update flannel to fix NAT issue with old iptables version (#​7136)
Embedded Component Versions
Component Version
Kubernetes v1.26.3
Kine v0.9.9
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.19-k3s1
Runc v1.1.4
Flannel v0.21.4
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.2+k3s1: v1.26.2+k3s1

Compare Source

This release updates Kubernetes to v1.26.2, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.26.1+k3s1:
  • Add build tag to disable cri-dockerd (#​6760)
  • Bump cri-dockerd (#​6797)
    • The embedded cri-dockerd has been updated to v0.3.1
  • Update stable channel to v1.25.6+k3s1 (#​6828)
  • E2E Rancher and Hardened script improvements (#​6778)
  • Add Ayedo to Adopters (#​6801)
  • Consolidate E2E tests and GH Actions (#​6772)
  • Allow ServiceLB to honor ExternalTrafficPolicy=Local (#​6726)
    • ServiceLB now honors the Service's ExternalTrafficPolicy. When set to Local, the LoadBalancer will only advertise addresses of Nodes with a Pod for the Service, and will not forward traffic to other cluster members.
  • Fix cronjob example (#​6707)
  • Bump vagrant boxes to fedora37 (#​6832)
  • Ensure flag type consistency (#​6852)
  • E2E: Consoldiate docker and prefer bundled tests into new startup test (#​6851)
  • Fix reference to documentation (#​6860)
  • Bump deps: trivy, sonobuoy, dapper, golangci-lint, gopls (#​6807)
  • Fix check for (open)SUSE version (#​6791)
  • Add support for user-provided CA certificates (#​6615)
    • K3s now functions properly when the cluster CA certificates are signed by an existing root or intermediate CA. You can find a sample script for generating such certificates before K3s starts in the github repo at contrib/util/certs.sh.
  • Ignore value conflicts when reencrypting secrets (#​6850)
  • Add kubeadm style bootstrap token secret support (#​6663)
    • K3s now supports kubeadm style join tokens. k3s token create now creates join token secrets, optionally with a limited TTL.
    • K3s agents joined with an expired or deleted token stay in the cluster using existing client certificates via the NodeAuthorization admission plugin, unless their Node object is deleted from the cluster.
  • Add NATS to the list of supported data stores (#​6876)
  • Use default address family when adding kubernetes service address to SAN list (#​6857)
    • The apiserver advertised address and IP SAN entry are now set correctly on clusters that use IPv6 as the default IP family.
  • Fix issue with servicelb startup failure when validating webhooks block creation (#​6911)
    • The embedded cloud controller manager will no longer attempt to unconditionally re-create its namespace and serviceaccount on startup. This resolves an issue that could cause a deadlocked cluster when fail-closed webhooks are in use.
  • Fix access to hostNetwork port on NodeIP when egress-selector-mode=agent (#​6829)
    • Fixed an issue that would cause the apiserver egress proxy to attempt to use the agent tunnel to connect to service endpoints even in agent or disabled mode.
  • Wait for server to become ready before creating token (#​6932)
  • Allow for multiple sets of leader-elected controllers (#​6922)
    • Fixed an issue where leader-elected controllers for managed etcd did not run on etcd-only nodes
  • Update Flannel to v0.21.1 (#​6944)
  • Fix Nightly E2E tests (#​6950)
  • Fix etcd and ca-cert rotate issues (#​6952)
  • Fix ServiceLB dual-stack ingress IP listing (#​6979)
    • Resolved an issue with ServiceLB that would cause it to advertise node IPv6 addresses, even if the cluster or service was not enabled for dual-stack operation.
  • Bump kine to v0.9.9 (#​6974)
    • The embedded kine version has been bumped to v0.9.9. Compaction log messages are now omitted at info level for increased visibility.
  • Update to v1.26.2-k3s1 (#​7011)
Embedded Component Versions
Component Version
Kubernetes v1.26.2
Kine v0.9.9
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.15-k3s1
Runc v1.1.4
Flannel v0.21.1
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.1+k3s1: v1.26.1+k3s1

Compare Source

This release updates Kubernetes to v1.26.1, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.26.0+k3s2:
  • Add jitter to scheduled snapshots and retry harder on conflicts (#​6715)
    • Scheduled etcd snapshots are now offset by a short random delay of up to several seconds. This should prevent multi-server clusters from executing pathological behavior when attempting to simultaneously update the snapshot list ConfigMap. The snapshot controller will also be more persistent in attempting to update the snapshot list.
  • Adjust e2e test run script and fixes (#​6718)
  • RIP Codespell (#​6701)
  • Bump alpine from 3.16 to 3.17 in /package (#​6688)
  • Bump alpine from 3.16 to 3.17 in /conformance (#​6687)
  • Bump containerd to v1.6.15-k3s1 (#​6722)
    • The embedded containerd version has been bumped to v1.6.15-k3s1
  • Containerd restart testlet (#​6696)
  • Bump ubuntu from 20.04 to 22.04 in /tests/e2e/scripts (#​6686)
  • Add explicit read permissions to workflows (#​6700)
  • Pass through default tls-cipher-suites (#​6725)
    • The K3s default cipher suites are now explicitly passed in to kube-apiserver, ensuring that all listeners use these values.
  • Bump golang:alpine image version (#​6683)
  • Bugfix: do not break cert-manager when pprof is enabled (#​6635)
  • Fix CI tests on Alpine 3.17 (#​6744)
  • Update Stable to 1.25.5+k3s2 (#​6753)
  • Bump action/download-artifact to v3 (#​6746)
  • Generate report and upload test results (#​6737)
  • Slow dependency CI to weekly (#​6764)
  • Fix Drone plugins/docker tag for 32 bit arm (#​6769)
  • Update to v1.26.1-k3s1 (#​6774)
Embedded Component Versions
Component Version
Kubernetes v1.26.1
Kine v0.9.8
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.15-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.0+k3s1: v1.26.0+k3s1

Compare Source

⚠️ WARNING

This release is affected by https://github.com/containerd/containerd/issues/7843, which causes the kubelet to restart all pods whenever K3s is restarted. For this reason, we have removed this K3s release from the channel server. Please use v1.26.0+k3s2 instead.

This release is K3S's first in the v1.26 line. This release updates Kubernetes to v1.26.0.

Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.

Changes since v1.25.5+k3s1:

  • Remove deprecated flags in v1.26 (#​6574)
  • Using "etcd-snapshot" for saving snapshots is now deprecated, use "etcd-snapshot save" instead. (#​6575)
  • Update to v1.26.0-k3s1
    • Update kubernetes to v1.26.0-k3s1
    • Update cri-tools to v1.26.0-rc.0-k3s1
    • Update helm controller to v0.13.1
    • Update etcd to v3.5.5-k3s1
    • Update cri-dockerd to the latest 1.26.0
    • Update cadvisor
  • Preload iptable_filter/ip6table_filter (#​6645)
  • Bump k3s-root version to v0.12.1 (#​6651)

Embedded Component Versions

Component Version
Kubernetes v1.26.0
Kine v0.9.8
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.12-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.0+k3s2: v1.26.0+k3s2

Compare Source

This release updates containerd to v1.6.14 to resolve an issue where pods would lose their CNI information when containerd was restarted, as well as a number of other stability and administrative changes.

Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.

Changes since v1.26.0+k3s1:

  • Current status badges (#​6653)
  • Add initial Updatecli ADR automation (#​6583)
  • December 2022 channels update (#​6618)
  • Change Updatecli GH action reference branch (#​6682)
  • Fix OpenRC init script error 'openrc-run.sh: source: not found' (#​6614)
  • Add Dependabot config for security ADR (#​6560)
  • Bump containerd to v1.6.14-k3s1 (#​6693)
    • The embedded containerd version has been bumped to v1.6.14-k3s1. This includes a backported fix for containerd/7843 which caused pods to lose their CNI info when containerd was restarted, which in turn caused the kubelet to recreate the pod.
  • Exclude December r1 releases from channel server (#​6706)

Embedded Component Versions

Component Version
Kubernetes v1.26.0
Kine v0.9.8
SQLite 3.39.2
Etcd v3.5.5-k3s1
Containerd v1.6.14-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.8+k3s1: v1.25.8+k3s1

Compare Source

This release updates Kubernetes to v1.25.8, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.7+k3s1:
  • Update flannel and kube-router (#​7061)
  • Bump various dependencies for CVEs (#​7043)
  • Enable dependabot (#​7045)
  • Wait for kubelet port to be ready before setting (#​7064)
    • The agent tunnel authorizer now waits for the kubelet to be ready before reading the kubelet port from the node object.
  • Adds a warning about editing to the containerd config.toml file (#​7075)
  • Improve support for rotating the default self-signed certs (#​7079)
    • The k3s certificate rotate-ca checks now support rotating self-signed certificates without the --force option.
  • Update to v1.25.8-k3s1 (#​7106)
  • Update flannel to fix NAT issue with old iptables version (#​7138)
Embedded Component Versions
Component Version
Kubernetes v1.25.8
Kine v0.9.9
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.19-k3s1
Runc v1.1.4
Flannel v0.21.4
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23
Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.7+k3s1: v1.25.7+k3s1

Compare Source

This release updates Kubernetes to v1.25.7, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.6+k3s1:

  • Add jitter to scheduled snapshots and retry harder on conflicts (#​6782)
    • Scheduled etcd snapshots are now offset by a short random delay of up to several seconds. This should prevent multi-server clusters from executing pathological behavior when attempting to simultaneously update the snapshot list ConfigMap. The snapshot controller will also be more persistent in attempting to update the snapshot list.
  • Bump cri-dockerd (#​6798)
    • The embedded cri-dockerd has been updated to v0.3.1
  • Bugfix: do not break cert-manager when pprof is enabled (#​6837)
  • Wait for cri-dockerd socket (#​6853)
  • Bump vagrant boxes to fedora37 (#​6858)
  • Fix cronjob example (#​6864)
  • Ensure flag type consistency (#​6867)
  • Consolidate E2E tests (#​6887)
  • Ignore value conflicts when reencrypting secrets (#​6919)
  • Use default address family when adding kubernetes service address to SAN list (#​6904)
    • The apiserver advertised address and IP SAN entry are now set correctly on clusters that use IPv6 as the default IP family.
  • Allow ServiceLB to honor ExternalTrafficPolicy=Local (#​6907)
    • ServiceLB now honors the Service's ExternalTrafficPolicy. When set to Local, the LoadBalancer will only advertise addresses of Nodes with a Pod for the Service, and will not forward traffic to other cluster members.
  • Fix issue with servicelb startup failure when validating webhooks block creation (#​6916)
    • The embedded cloud controller manager will no longer attempt to unconditionally re-create its namespace and serviceaccount on startup. This resolves an issue that could cause a deadlocked cluster when fail-closed webhooks are in use.
  • Backport user-provided CA cert and kubeadm bootstrap token support (#​6929)
    • K3s now functions properly when the cluster CA certificates are signed by an existing root or intermediate CA. You can find a sample script for generating such certificates before K3s starts in the github repo at contrib/util/certs.sh.
    • K3s now supports kubeadm style join tokens. k3s token create now creates join token secrets, optionally with a limited TTL.
    • K3s agents joined with an expired or deleted token stay in the cluster using existing client certificates via the NodeAuthorization admission plugin, unless their Node object is deleted from the cluster.
  • Fix access to hostNetwork port on NodeIP when egress-selector-mode=agent (#​6936)
    • Fixed an issue that would cause the apiserver egress proxy to attempt to use the agent tunnel to connect to service endpoints even in agent or disabled mode.
  • Updated flannel version to v0.21.1 (#​6915)
  • Allow for multiple sets of leader-elected controllers (#​6941)
    • Fixed an issue where leader-elected controllers for managed etcd did not run on etcd-only nodes
  • Fix etcd and ca-cert rotate issues (#​6954)
  • Fix ServiceLB dual-stack ingress IP listing (#​6987)
    • Resolved an issue with ServiceLB that would cause it to advertise node IPv6 addresses, even if the cluster or service was not enabled for dual-stack operation.
  • Bump kine to v0.9.9 (#​6975)
    • The embedded kine version has been bumped to v0.9.9. Compaction log messages are now omitted at info level for increased visibility.
  • Update to v1.25.7-k3s1 (#​7010)

Embedded Component Versions

Component Version
Kubernetes v1.25.7
Kine v0.9.9
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.15-k3s1
Runc v1.1.4
Flannel v0.21.1
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.6+k3s1: v1.25.6+k3s1

Compare Source

This release updates Kubernetes to v1.25.6, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.5+k3s2:

  • Pass through default tls-cipher-suites (#​6730)
    • The K3s default cipher suites are now explicitly passed in to kube-apiserver, ensuring that all listeners use these values.
  • Bump containerd to v1.6.15-k3s1 (#​6735)
    • The embedded containerd version has been bumped to v1.6.15-k3s1
  • Bump action/download-artifact to v3 (#​6747)
  • Backport dependabot/updatecli updates (#​6761)
  • Fix Drone plugins/docker tag for 32 bit arm (#​6768)
  • Update to v1.25.6+k3s1 (#​6775)

Embedded Component Versions

Component Version
Kubernetes v1.25.6
Kine v0.9.6
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.15-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.5+k3s1: v1.25.5+k3s1

Compare Source

⚠️ WARNING

This release is affected by https://github.com/containerd/containerd/issues/7843, which causes the kubelet to restart all pods whenever K3s is restarted. For this reason, we have removed this K3s release from the channel server. Please use v1.25.5+k3s2 instead.

This release updates Kubernetes to v1.25.5, and fixes a number of issues.

Breaking Change: K3s no longer includes swanctl and charon binaries. If you are using the ipsec flannel backend, please ensure that the strongswan swanctl and charon packages are installed on your node before upgrading K3s to this release.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.4+k3s1:

  • Fix log for flannelExternalIP use case (#​6531)
  • Fix Carolines github id (#​6464)
  • Github CI Updates (#​6522)
  • Add new prefer-bundled-bin experimental flag (#​6420)
    • Added new prefer-bundled-bin flag which force K3s to use its bundle binaries over that of the host tools
  • Bump containerd to v1.6.10 (#​6512)
    • The embedded containerd version has been updated to v1.6.10-k3s1
  • Stage the Traefik charts through k3s-charts (#​6519)
  • Make rootless settings configurable (#​6498)
    • The rootless port-driver, cidr, mtu, enable-ipv6, and disable-host-loopback settings can now be configured via environment variables.
  • Remove stuff which belongs in the windows executor implementation (#​6517)
  • Mark v1.25.4+k3s1 as stable (#​6534)
  • Add prefer-bundled-bin as an agent flag (#​6545)
  • Bump klipper-helm and klipper-lb versions (#​6549)
    • The embedded Load-Balancer controller image has been bumped to klipper-lb:v0.4.0, which includes support for the LoadBalancerSourceRanges field.
    • The embedded Helm controller image has been bumped to klipper-helm:v0.7.4-build20221121
  • Switch from Google Buckets to AWS S3 Buckets (#​6497)
  • Fix passing AWS creds through Dapper (#​6567)
  • Fix artifact upload with aws s3 cp (#​6568)
  • Disable CCM metrics port when legacy CCM functionality is disabled (#​6572)
    • The embedded cloud-controller-manager's metrics listener on port 10258 is now disabled when the --disable-cloud-controller flag is set.
  • Sync packaged component Deployment config (#​6552)
    • Deployments for K3s packaged components now have consistent upgrade strategy and revisionHistoryLimit settings, and will not override scaling decisions by hardcoding the replica count.
    • The packaged metrics-server has been bumped to v0.6.2
  • Mark secrets-encryption flag as GA (#​6582)
  • Bump k3s root to v0.12.0 and remove strongswan binaries (#​6400)
    • The embedded k3s-root version has been bumped to v0.12.0, based on buildroot 2022.08.1.
    • The embedded swanctl and charon binaries have been removed. If you are using the ipsec flannel backend, please ensure that the strongswan swanctl and charon packages are installed on your node before upgrading k3s.
  • Update flannel to v0.20.2 (#​6588)
  • Add ADR for security bumps automation (#​6559)
  • Update node12->node16 based GH actions (#​6593)
  • Updating rel docs (#​6237)
  • Update install.sh to recommend current version of k3s-selinux (#​6453)
  • Update to v1.25.5-k3s1 (#​6622)
  • Bump containerd to v1.6.12-k3s1 (#​6631)
    • The embedded containerd version has been bumped to v1.6.12
  • Preload iptable_filter/ip6table_filter (#​6646)

Embedded Component Versions

Component Version
Kubernetes v1.25.5
Kine v0.9.6
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.12-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.5+k3s2: v1.25.5+k3s2

Compare Source

This release updates containerd to v1.6.14 to resolve an issue where pods would lose their CNI information when containerd was restarted.

Changes since v1.25.5+k3s1:

  • Bump containerd to v1.6.14-k3s1 (#​6694)
    • The embedded containerd version has been bumped to v1.6.14-k3s1. This includes a backported fix for containerd/7843 which caused pods to lose their CNI info when containerd was restarted, which in turn caused the kubelet to recreate the pod.

Embedded Component Versions

Component Version
Kubernetes v1.25.5
Kine v0.9.6
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.14-k3s1
Runc v1.1.4
Flannel v0.20.2
Metrics-server v0.6.2
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.1
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.4+k3s1: v1.25.4+k3s1

Compare Source

This release updates Kubernetes to v1.25.4, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.3+k3s1:

  • Add the gateway parameter in netplan (#​6292)
  • Bumped dynamiclistener library to v0.3.5 (#​6300)
  • Update kube-router to v1.5.1 with extra logging (#​6345)
  • Update maintainers (#​6298)
  • Bump testing to opensuse Leap 15.4 (#​6337)
  • Update E2E docs with more info on ubuntu 22.04 (#​6316)
  • Netpol test for podSelector & ingress (#​6247)
  • Bump all alpine images to 3.16 (#​6334)
  • Bump kine to v0.9.6 / sqlite3 v3.39.2 (CVE-2022-35737) (#​6317)
  • Add hardened cluster and upgrade tests (#​6320)
  • The bundled Traefik helm chart has been updated to v18.0.0 (#​6353)
  • Mark v1.25.3+k3s1 as stable (#​6338)
  • The embedded helm controller has been bumped to v0.13.0 (#​6294)
  • Fixed an issue that would prevent the deploy controller from handling manifests that include resource types that are no longer supported by the apiserver. (#​6295)
  • Replace fedora-coreos with fedora 36 for install tests (#​6315)
  • Convert containerd config.toml.tmpl Linux template to v2 syntax (#​6267)
  • Add test for node-external-ip config parameter (#​6359)
  • Use debugger-friendly compile settings if DEBUG is set (#​6147)
  • update e2e tests (#​6354)
  • Remove unused vagrant development scripts (#​6395)
  • The bundled Traefik has been updated to v2.9.4 / helm chart v18.3.0 (#​6397)
  • None (#​6371)
  • Fix incorrect defer usage (#​6296)
  • Add snapshot restore e2e test (#​6396)
  • Fix sonobouy tests on v1.25 (#​6399)
  • Bump packaged component versions
  • The packaged traefik helm chart has been bumped to v19.0.0, enabling ingressClass support by default.
  • The packaged local-path-provisioner has been bumped to v0.0.23
  • The packaged coredns has been bumped to v1.9.4 (#​6408)
  • log kube-router version when starting netpol controller (#​6405)
  • Add Kairos to ADOPTERS (#​6417)
  • Update Flannel to 0.20.1 (#​6388)
  • Avoid wrong config for flannel-external-ip and add warning if unencrypted backend (#​6403)
  • Fix test-mods to allow for pinning version from k8s.io (#​6413)
  • Fix for metrics-server in the multi-cloud cluster env (#​6386)
  • K3s now indicates specifically which cluster-level configuration flags are out of sync when critical configuration differs between server nodes. (#​6409)
  • Convert test output to JSON format (#​6410)
  • Pull traefik helm chart directly from GH (#​6468)
  • Nightly test fix (#​6475)
  • Update to v1.25.4 (#​6477)
  • Remove stuff which belongs in the windows executor implementation (#​6492)
  • The packaged traefik helm chart has been bumped to 19.0.4 (#​6494)
  • Move traefik chart repo again (#​6508)

Embedded Component Versions

Component Version
Kubernetes v1.25.4
Kine v0.9.6
SQLite 3.39.2
Etcd v3.5.3-k3s1
Containerd v1.6.8-k3s1
Runc v1.1.4
Flannel v0.20.1
Metrics-server v0.6.1
Traefik v2.9.4
CoreDNS v1.9.4
Helm-controller v0.13.0
Local-path-provisioner v0.0.23

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.3+k3s1: v1.25.3+k3s1

Compare Source

This release updates Kubernetes to v1.25.3, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.2+k3s1:

  • E2E: Groundwork for PR runs (#​6131)
  • Fix flannel for deployments of nodes which do not belong to the same network and connect using their public IP (#​6180)
  • Mark v1.24.6+k3s1 as stable (#​6193)
  • Add cluster reset test (#​6161)
  • The embedded metrics-server version has been bumped to v0.6.1 (#​6151)
  • The ServiceLB (klipper-lb) service controller is now integrated into the K3s stub cloud controller manager. (#​6181)
  • Events recorded to the cluster by embedded controllers are now properly formatted in the service logs. (#​6203)
  • Fix error dialing backend errors in apiserver network proxy (#​6216)
    • Fixed an issue with the apiserver network proxy that caused kubectl exec to occasionally fail with error dialing backend: EOF
    • Fixed an issue with the apiserver network proxy that caused kubectl exec and kubectl logs to fail when a custom kubelet port was used, and the custom port was blocked by firewall or security group rules.
  • Fix the typo in the test (#​6183)
  • Use setup-go action to cache dependencies (#​6220)
  • Add journalctl logs to E2E tests (#​6224)
  • The embedded Traefik version has been bumped to v2.9.1 / chart 12.0.0 (#​6223)
  • Fix flakey etcd test (#​6232)
  • Replace deprecated ioutil package (#​6230)
  • Fix dualStack test (#​6245)
  • Add ServiceAccount for svclb pods (#​6253)
  • Update to v1.25.3-k3s1 (#​6269)
  • Return ProviderID in URI format (#​6284)
  • Corrected CCM RBAC to allow for removal of legacy service finalizer during upgrades. (#​6306)
  • Added a new --flannel-external-ip flag. (#​6321)
    • When enabled, Flannel traffic will now use the nodes external IPs, instead of internal.
    • This is meant for use with distributed clusters that are not all on the same local network.

Embedded Component Versions

Component Version
Kubernetes v1.25.3
Kine v0.9.3
SQLite 3.36.0
Etcd v3.5.3-k3s1
Containerd v1.6.8-k3s1
Runc v1.1.4
Flannel v0.19.2
Metrics-server v0.6.1
Traefik v2.9.1
CoreDNS v1.9.1
Helm-controller v0.12.3
Local-path-provisioner v0.0.21

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.25.2+k3s1: v1.25.2+k3s1

Compare Source

This release updates Kubernetes to v1.25.2, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.25.0+k3s1:
Embedded Component Versions
Component Version
Kubernetes v1.25.2
Kine v0.9.3
SQLite 3.36.0
Etcd v3.5.3-k3s1
Containerd v1.6.8-k3s1
Runc v1.1.4
Flannel v0.19.2
Metrics-server v0.5.2
Traefik v2.6.2
CoreDNS v1.9.1
Helm-controller [v0.12.3](https://togithub.com/k3s-io/h

Configuration

📅 Schedule: Branch creation - "every weekend" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.24.1+k3s1 chore(deps): update dependency k3s-io/k3s to v1.24.2+k3s1 Jun 27, 2022
@renovate renovate bot force-pushed the renovate/k3s-io-k3s-1.x branch from 3afb5fe to 7b0c1f6 Compare June 27, 2022 22:11
@renovate renovate bot force-pushed the renovate/k3s-io-k3s-1.x branch from 7b0c1f6 to ea5cf1c Compare July 19, 2022 20:30
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.24.2+k3s1 chore(deps): update dependency k3s-io/k3s to v1.24.3+k3s1 Jul 19, 2022
@renovate renovate bot force-pushed the renovate/k3s-io-k3s-1.x branch from ea5cf1c to 2006edf Compare September 25, 2022 12:45
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.24.3+k3s1 chore(deps): update dependency k3s-io/k3s to v1.25.0+k3s1 Sep 25, 2022
@renovate renovate bot force-pushed the renovate/k3s-io-k3s-1.x branch from 2006edf to f5ddd99 Compare November 20, 2022 19:09
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.25.0+k3s1 chore(deps): update dependency k3s-io/k3s to v1.25.3+k3s1 Nov 20, 2022
@renovate renovate bot force-pushed the renovate/k3s-io-k3s-1.x branch from f5ddd99 to ff22489 Compare March 21, 2023 15:39
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.25.3+k3s1 chore(deps): update dependency k3s-io/k3s to v1.26.2+k3s1 Mar 21, 2023
@renovate renovate bot force-pushed the renovate/k3s-io-k3s-1.x branch from ff22489 to efe651d Compare March 29, 2023 23:55
@renovate renovate bot changed the title chore(deps): update dependency k3s-io/k3s to v1.26.2+k3s1 chore(deps): update dependency k3s-io/k3s to v1.26.3+k3s1 Mar 29, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants