Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(container): update image ghcr.io/xirixiz/dsmr-reader-docker ( 5.11.0-2024.04.03 β†’ 5.11.0-2024.12.01 ) - autoclosed #7762

Conversation

lab-assistant[bot]
Copy link
Contributor

@lab-assistant lab-assistant bot commented Dec 30, 2024

This PR contains the following updates:

Package Update Change
ghcr.io/xirixiz/dsmr-reader-docker patch 5.11.0-2024.04.03 -> 5.11.0-2024.12.01

Configuration

πŸ“… Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

β™» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

πŸ”• Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

…1.0-2024.04.03 β†’ 5.11.0-2024.12.01 )

| datasource | package                            | from              | to                |
| ---------- | ---------------------------------- | ----------------- | ----------------- |
| docker     | ghcr.io/xirixiz/dsmr-reader-docker | 5.11.0-2024.04.03 | 5.11.0-2024.12.01 |
@lab-assistant lab-assistant bot added renovate/container type/patch Issue relates to a patch version bump area/kubernetes Issue relates to Kubernetes labels Dec 30, 2024
@lab-assistant
Copy link
Contributor Author

lab-assistant bot commented Dec 30, 2024

--- HelmRelease: network/nginx-external Deployment: network/nginx-external-controller

+++ HelmRelease: network/nginx-external Deployment: network/nginx-external-controller

@@ -30,35 +30,34 @@

         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: controller
     spec:
       dnsPolicy: ClusterFirst
       containers:
       - name: controller
-        image: registry.k8s.io/ingress-nginx/controller:v1.12.0@sha256:e6b8de175acda6ca913891f0f727bca4527e797d52688cbe9fec9040d6f6b6fa
+        image: registry.k8s.io/ingress-nginx/controller:v1.11.3@sha256:d56f135b6462cfc476447cfe564b83a45e8bb7da2774963b00d12161112270b7
         imagePullPolicy: IfNotPresent
         lifecycle:
           preStop:
             exec:
               command:
               - /wait-shutdown
         args:
         - /nginx-ingress-controller
+        - --enable-annotation-validation=true
         - --election-id=nginx-external-leader
         - --controller-class=k8s.io/ingress-nginx-external
         - --ingress-class=nginx
         - --configmap=$(POD_NAMESPACE)/nginx-external-controller
         - --validating-webhook=:8443
         - --validating-webhook-certificate=/usr/local/certificates/cert
         - --validating-webhook-key=/usr/local/certificates/key
-        - --enable-metrics=true
         - --default-ssl-certificate=network/bjw-s-dev-tls
         - --publish-status-address=ingress-ext.bjw-s.dev
         securityContext:
           runAsNonRoot: true
           runAsUser: 101
-          runAsGroup: 82
           allowPrivilegeEscalation: false
           seccompProfile:
             type: RuntimeDefault
           capabilities:
             drop:
             - ALL
--- HelmRelease: network/nginx-external ServiceMonitor: network/nginx-external-controller

+++ HelmRelease: network/nginx-external ServiceMonitor: network/nginx-external-controller

@@ -8,17 +8,17 @@

     app.kubernetes.io/name: ingress-nginx
     app.kubernetes.io/instance: nginx-external
     app.kubernetes.io/part-of: ingress-nginx
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: controller
 spec:
+  endpoints:
+  - port: metrics
+    interval: 30s
   namespaceSelector:
     any: true
   selector:
     matchLabels:
       app.kubernetes.io/name: ingress-nginx
       app.kubernetes.io/instance: nginx-external
       app.kubernetes.io/component: controller
-  endpoints:
-  - port: metrics
-    interval: 30s
 
--- HelmRelease: network/nginx-external Job: network/nginx-external-admission-create

+++ HelmRelease: network/nginx-external Job: network/nginx-external-admission-create

@@ -23,13 +23,13 @@

         app.kubernetes.io/part-of: ingress-nginx
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: admission-webhook
     spec:
       containers:
       - name: create
-        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.5.0@sha256:aaafd456bda110628b2d4ca6296f38731a3aaf0bf7581efae824a41c770a8fc4
+        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4@sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
         imagePullPolicy: IfNotPresent
         args:
         - create
         - --host=nginx-external-controller-admission,nginx-external-controller-admission.$(POD_NAMESPACE).svc
         - --namespace=$(POD_NAMESPACE)
         - --secret-name=nginx-external-admission
@@ -41,13 +41,12 @@

         securityContext:
           allowPrivilegeEscalation: false
           capabilities:
             drop:
             - ALL
           readOnlyRootFilesystem: true
-          runAsGroup: 65532
           runAsNonRoot: true
           runAsUser: 65532
           seccompProfile:
             type: RuntimeDefault
       restartPolicy: OnFailure
       serviceAccountName: nginx-external-admission
--- HelmRelease: network/nginx-external Job: network/nginx-external-admission-patch

+++ HelmRelease: network/nginx-external Job: network/nginx-external-admission-patch

@@ -23,13 +23,13 @@

         app.kubernetes.io/part-of: ingress-nginx
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: admission-webhook
     spec:
       containers:
       - name: patch
-        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.5.0@sha256:aaafd456bda110628b2d4ca6296f38731a3aaf0bf7581efae824a41c770a8fc4
+        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4@sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
         imagePullPolicy: IfNotPresent
         args:
         - patch
         - --webhook-name=nginx-external-admission
         - --namespace=$(POD_NAMESPACE)
         - --patch-mutating=false
@@ -43,13 +43,12 @@

         securityContext:
           allowPrivilegeEscalation: false
           capabilities:
             drop:
             - ALL
           readOnlyRootFilesystem: true
-          runAsGroup: 65532
           runAsNonRoot: true
           runAsUser: 65532
           seccompProfile:
             type: RuntimeDefault
       restartPolicy: OnFailure
       serviceAccountName: nginx-external-admission
--- HelmRelease: network/nginx-internal Deployment: network/nginx-internal-controller

+++ HelmRelease: network/nginx-internal Deployment: network/nginx-internal-controller

@@ -30,35 +30,34 @@

         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: controller
     spec:
       dnsPolicy: ClusterFirst
       containers:
       - name: controller
-        image: registry.k8s.io/ingress-nginx/controller:v1.12.0@sha256:e6b8de175acda6ca913891f0f727bca4527e797d52688cbe9fec9040d6f6b6fa
+        image: registry.k8s.io/ingress-nginx/controller:v1.11.3@sha256:d56f135b6462cfc476447cfe564b83a45e8bb7da2774963b00d12161112270b7
         imagePullPolicy: IfNotPresent
         lifecycle:
           preStop:
             exec:
               command:
               - /wait-shutdown
         args:
         - /nginx-ingress-controller
+        - --enable-annotation-validation=true
         - --election-id=nginx-internal-leader
         - --controller-class=k8s.io/ingress-nginx-internal
         - --ingress-class=nginx
         - --configmap=$(POD_NAMESPACE)/nginx-internal-controller
         - --validating-webhook=:8443
         - --validating-webhook-certificate=/usr/local/certificates/cert
         - --validating-webhook-key=/usr/local/certificates/key
-        - --enable-metrics=true
         - --default-ssl-certificate=network/bjw-s-dev-tls
         - --publish-status-address=ingress-int.bjw-s.dev
         securityContext:
           runAsNonRoot: true
           runAsUser: 101
-          runAsGroup: 82
           allowPrivilegeEscalation: false
           seccompProfile:
             type: RuntimeDefault
           capabilities:
             drop:
             - ALL
--- HelmRelease: network/nginx-internal ServiceMonitor: network/nginx-internal-controller

+++ HelmRelease: network/nginx-internal ServiceMonitor: network/nginx-internal-controller

@@ -8,17 +8,17 @@

     app.kubernetes.io/name: ingress-nginx
     app.kubernetes.io/instance: nginx-internal
     app.kubernetes.io/part-of: ingress-nginx
     app.kubernetes.io/managed-by: Helm
     app.kubernetes.io/component: controller
 spec:
+  endpoints:
+  - port: metrics
+    interval: 30s
   namespaceSelector:
     any: true
   selector:
     matchLabels:
       app.kubernetes.io/name: ingress-nginx
       app.kubernetes.io/instance: nginx-internal
       app.kubernetes.io/component: controller
-  endpoints:
-  - port: metrics
-    interval: 30s
 
--- HelmRelease: network/nginx-internal Job: network/nginx-internal-admission-create

+++ HelmRelease: network/nginx-internal Job: network/nginx-internal-admission-create

@@ -23,13 +23,13 @@

         app.kubernetes.io/part-of: ingress-nginx
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: admission-webhook
     spec:
       containers:
       - name: create
-        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.5.0@sha256:aaafd456bda110628b2d4ca6296f38731a3aaf0bf7581efae824a41c770a8fc4
+        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4@sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
         imagePullPolicy: IfNotPresent
         args:
         - create
         - --host=nginx-internal-controller-admission,nginx-internal-controller-admission.$(POD_NAMESPACE).svc
         - --namespace=$(POD_NAMESPACE)
         - --secret-name=nginx-internal-admission
@@ -41,13 +41,12 @@

         securityContext:
           allowPrivilegeEscalation: false
           capabilities:
             drop:
             - ALL
           readOnlyRootFilesystem: true
-          runAsGroup: 65532
           runAsNonRoot: true
           runAsUser: 65532
           seccompProfile:
             type: RuntimeDefault
       restartPolicy: OnFailure
       serviceAccountName: nginx-internal-admission
--- HelmRelease: network/nginx-internal Job: network/nginx-internal-admission-patch

+++ HelmRelease: network/nginx-internal Job: network/nginx-internal-admission-patch

@@ -23,13 +23,13 @@

         app.kubernetes.io/part-of: ingress-nginx
         app.kubernetes.io/managed-by: Helm
         app.kubernetes.io/component: admission-webhook
     spec:
       containers:
       - name: patch
-        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.5.0@sha256:aaafd456bda110628b2d4ca6296f38731a3aaf0bf7581efae824a41c770a8fc4
+        image: registry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.4.4@sha256:a9f03b34a3cbfbb26d103a14046ab2c5130a80c3d69d526ff8063d2b37b9fd3f
         imagePullPolicy: IfNotPresent
         args:
         - patch
         - --webhook-name=nginx-internal-admission
         - --namespace=$(POD_NAMESPACE)
         - --patch-mutating=false
@@ -43,13 +43,12 @@

         securityContext:
           allowPrivilegeEscalation: false
           capabilities:
             drop:
             - ALL
           readOnlyRootFilesystem: true
-          runAsGroup: 65532
           runAsNonRoot: true
           runAsUser: 65532
           seccompProfile:
             type: RuntimeDefault
       restartPolicy: OnFailure
       serviceAccountName: nginx-internal-admission
--- HelmRelease: home-automation/dsmr-reader Deployment: home-automation/dsmr-reader

+++ HelmRelease: home-automation/dsmr-reader Deployment: home-automation/dsmr-reader

@@ -45,13 +45,13 @@

           value: api_server
         envFrom:
         - secretRef:
             name: dsmr-reader-secret
         - secretRef:
             name: dsmr-reader-db-secret
-        image: ghcr.io/xirixiz/dsmr-reader-docker:5.11.0-2024.04.03
+        image: ghcr.io/xirixiz/dsmr-reader-docker:5.11.0-2024.12.01
         livenessProbe:
           failureThreshold: 3
           initialDelaySeconds: 0
           periodSeconds: 10
           tcpSocket:
             port: 80

@lab-assistant
Copy link
Contributor Author

lab-assistant bot commented Dec 30, 2024

--- kubernetes/main/apps/monitoring/kube-state-metrics/app Kustomization: flux-system/kube-state-metrics HelmRelease: monitoring/kube-state-metrics

+++ kubernetes/main/apps/monitoring/kube-state-metrics/app Kustomization: flux-system/kube-state-metrics HelmRelease: monitoring/kube-state-metrics

@@ -14,13 +14,13 @@

       chart: kube-state-metrics
       interval: 30m
       sourceRef:
         kind: HelmRepository
         name: prometheus-community
         namespace: flux-system
-      version: 5.28.0
+      version: 5.27.1
   interval: 30m
   values:
     fullnameOverride: kube-state-metrics
     prometheus:
       monitor:
         enabled: true
--- kubernetes/main/apps/home-automation/dsmr-reader/app Kustomization: flux-system/dsmr-reader HelmRelease: home-automation/dsmr-reader

+++ kubernetes/main/apps/home-automation/dsmr-reader/app Kustomization: flux-system/dsmr-reader HelmRelease: home-automation/dsmr-reader

@@ -34,13 +34,13 @@

             - secretRef:
                 name: dsmr-reader-secret
             - secretRef:
                 name: dsmr-reader-db-secret
             image:
               repository: ghcr.io/xirixiz/dsmr-reader-docker
-              tag: 5.11.0-2024.04.03
+              tag: 5.11.0-2024.12.01
             probes:
               liveness:
                 enabled: true
               readiness:
                 enabled: true
               startup:
--- kubernetes/main/apps/network/ingress-nginx/external Kustomization: flux-system/nginx-external HelmRelease: network/nginx-external

+++ kubernetes/main/apps/network/ingress-nginx/external Kustomization: flux-system/nginx-external HelmRelease: network/nginx-external

@@ -14,13 +14,13 @@

       chart: ingress-nginx
       interval: 30m
       sourceRef:
         kind: HelmRepository
         name: ingress-nginx
         namespace: flux-system
-      version: 4.12.0
+      version: 4.11.3
   interval: 30m
   values:
     controller:
       admissionWebhooks:
         objectSelector:
           matchExpressions:
--- kubernetes/main/apps/network/ingress-nginx/internal Kustomization: flux-system/nginx-internal HelmRelease: network/nginx-internal

+++ kubernetes/main/apps/network/ingress-nginx/internal Kustomization: flux-system/nginx-internal HelmRelease: network/nginx-internal

@@ -14,13 +14,13 @@

       chart: ingress-nginx
       interval: 30m
       sourceRef:
         kind: HelmRepository
         name: ingress-nginx
         namespace: flux-system
-      version: 4.12.0
+      version: 4.11.3
   interval: 30m
   values:
     controller:
       admissionWebhooks:
         objectSelector:
           matchExpressions:

@lab-assistant lab-assistant bot changed the title fix(container): update image ghcr.io/xirixiz/dsmr-reader-docker ( 5.11.0-2024.04.03 β†’ 5.11.0-2024.12.01 ) fix(container): update image ghcr.io/xirixiz/dsmr-reader-docker ( 5.11.0-2024.04.03 β†’ 5.11.0-2024.12.01 ) - autoclosed Dec 31, 2024
@lab-assistant lab-assistant bot closed this Dec 31, 2024
@lab-assistant lab-assistant bot deleted the renovate/main-ghcr.io-xirixiz-dsmr-reader-docker-5.x branch December 31, 2024 08:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/kubernetes Issue relates to Kubernetes type/patch Issue relates to a patch version bump
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants