Dependency Dashboard #31

Open
opened 2024-02-11 04:37:23 +01:00 by renovate · 0 comments
Collaborator

This issue lists Renovate updates and detected dependencies. Read the Dependency Dashboard docs to learn more.

Open

The following updates have all been created. To force a retry/rebase of any, click on a checkbox below.

PR Closed (Blocked)

The following updates are blocked by an existing closed PR. To recreate the PR, click on a checkbox below.

Detected Dependencies

argocd (3)
app-files/apps.yaml (1)
  • ghcr.io/woodpecker-ci/helm/woodpecker 3.5.1
app-files/core-deployments.yaml (11)
  • traefik 39.0.8
  • argo-cd 9.5.4
  • longhorn 1.11.1
  • https://github.com/kubernetes-csi/external-snapshotter.git v8.4.0 → [Updates: v8.5.0]
  • https://github.com/kubernetes-csi/external-snapshotter.git v8.4.0 → [Updates: v8.5.0]
  • kube-prometheus-stack 84.0.1 → [Updates: 84.1.2]
  • cilium 1.19.3
  • loki 6.55.0 → [Updates: 7.0.0]
  • promtail 6.17.1
  • metrics-server 3.13.0
  • cert-manager v1.20.2
app-files/tests.yaml
helm-values (2)
argo/values.yaml
woodpecker/values/values.yaml
kubernetes (21)
apt-version-exporter/daemonset.yaml (2)
  • debian 13.4
  • DaemonSet apps/v1
authentik/manifest.yaml (3)
  • ghcr.io/goauthentik/proxy 2026.2.2
  • Ingress networking.k8s.io/v1
  • Deployment apps/v1
dashboard/base/dashboard.yaml (2)
  • Deployment apps/v1
  • Ingress networking.k8s.io/v1
examples/example-deployment.yaml (2)
  • Deployment apps/v1
  • Ingress networking.k8s.io/v1
fail2ban-exporter/daemonset.yaml (1)
  • DaemonSet apps/v1
fail2ban-exporter/deployment.yaml (1)
  • Deployment apps/v1
fip-controller/1-rbac.yaml (2)
  • ClusterRole rbac.authorization.k8s.io/v1
  • ClusterRoleBinding rbac.authorization.k8s.io/v1
fip-controller/4-deployment.yaml (2)
  • yolokube/hcloud-fip-controller v0.6.0
  • Deployment apps/v1
grafana-backuper/1-cronjob.yaml (1)
  • CronJob batch/v1
longhorn/storageclass.yaml (1)
  • StorageClass storage.k8s.io/v1
node-labeler/node-labeler.yaml (3)
  • DaemonSet apps/v1
  • ClusterRole rbac.authorization.k8s.io/v1
  • ClusterRoleBinding rbac.authorization.k8s.io/v1
paste/manifest.yaml (2)
  • Deployment apps/v1
  • Ingress networking.k8s.io/v1
quota/quotad.yaml (3)
  • CronJob batch/v1
  • ClusterRole rbac.authorization.k8s.io/v1
  • ClusterRoleBinding rbac.authorization.k8s.io/v1
sb-server-monitor/2-deployment.yaml (1)
  • Deployment apps/v1
tests/test-ingress.yaml (2)
  • Deployment apps/v1
  • Ingress networking.k8s.io/v1
thanos/3-querier.yaml (3)
  • quay.io/thanos/thanos v0.41.0
  • Deployment apps/v1
  • Ingress networking.k8s.io/v1
thanos/4-storegateway.yaml (2)
  • quay.io/thanos/thanos v0.41.0
  • StatefulSet apps/v1
thanos/5-compactor.yaml (2)
  • quay.io/thanos/thanos v0.41.0
  • Deployment apps/v1
thanos/6-receiver.yaml (2)
  • quay.io/thanos/thanos v0.41.0
  • StatefulSet apps/v1
traefik-certmanager/base/traefik-certmanager.yaml (3)
  • ClusterRole rbac.authorization.k8s.io/v1
  • ClusterRoleBinding rbac.authorization.k8s.io/v1
  • Deployment apps/v1
traefik/secondingressclass.yaml (1)
  • IngressClass networking.k8s.io/v1
This issue lists Renovate updates and detected dependencies. Read the [Dependency Dashboard](https://docs.renovatebot.com/key-concepts/dashboard/) docs to learn more. ## Open The following updates have all been created. To force a retry/rebase of any, click on a checkbox below. - [ ] <!-- rebase-branch=renovate/loki-7.x -->[Update Helm release loki to v7](pulls/1985) ## PR Closed (Blocked) The following updates are blocked by an existing closed PR. To recreate the PR, click on a checkbox below. - [ ] <!-- recreate-branch=renovate/https-github.com-kubernetes-csi-external-snapshotter.git-8.x -->[Update dependency https://github.com/kubernetes-csi/external-snapshotter.git to v8.5.0](pulls/1774) ## Detected Dependencies <details><summary>argocd (3)</summary> <blockquote> <details><summary>app-files/apps.yaml (1)</summary> - `ghcr.io/woodpecker-ci/helm/woodpecker 3.5.1` </details> <details><summary>app-files/core-deployments.yaml (11)</summary> - `traefik 39.0.8` - `argo-cd 9.5.4` - `longhorn 1.11.1` - `https://github.com/kubernetes-csi/external-snapshotter.git v8.4.0` → [Updates: `v8.5.0`] - `https://github.com/kubernetes-csi/external-snapshotter.git v8.4.0` → [Updates: `v8.5.0`] - `kube-prometheus-stack 84.0.1` → [Updates: `84.1.2`] - `cilium 1.19.3` - `loki 6.55.0` → [Updates: `7.0.0`] - `promtail 6.17.1` - `metrics-server 3.13.0` - `cert-manager v1.20.2` </details> <details><summary>app-files/tests.yaml</summary> </details> </blockquote> </details> <details><summary>helm-values (2)</summary> <blockquote> <details><summary>argo/values.yaml</summary> </details> <details><summary>woodpecker/values/values.yaml</summary> </details> </blockquote> </details> <details><summary>kubernetes (21)</summary> <blockquote> <details><summary>apt-version-exporter/daemonset.yaml (2)</summary> - `debian 13.4` - `DaemonSet apps/v1` </details> <details><summary>authentik/manifest.yaml (3)</summary> - `ghcr.io/goauthentik/proxy 2026.2.2` - `Ingress networking.k8s.io/v1` - `Deployment apps/v1` </details> <details><summary>dashboard/base/dashboard.yaml (2)</summary> - `Deployment apps/v1` - `Ingress networking.k8s.io/v1` </details> <details><summary>examples/example-deployment.yaml (2)</summary> - `Deployment apps/v1` - `Ingress networking.k8s.io/v1` </details> <details><summary>fail2ban-exporter/daemonset.yaml (1)</summary> - `DaemonSet apps/v1` </details> <details><summary>fail2ban-exporter/deployment.yaml (1)</summary> - `Deployment apps/v1` </details> <details><summary>fip-controller/1-rbac.yaml (2)</summary> - `ClusterRole rbac.authorization.k8s.io/v1` - `ClusterRoleBinding rbac.authorization.k8s.io/v1` </details> <details><summary>fip-controller/4-deployment.yaml (2)</summary> - `yolokube/hcloud-fip-controller v0.6.0` - `Deployment apps/v1` </details> <details><summary>grafana-backuper/1-cronjob.yaml (1)</summary> - `CronJob batch/v1` </details> <details><summary>longhorn/storageclass.yaml (1)</summary> - `StorageClass storage.k8s.io/v1` </details> <details><summary>node-labeler/node-labeler.yaml (3)</summary> - `DaemonSet apps/v1` - `ClusterRole rbac.authorization.k8s.io/v1` - `ClusterRoleBinding rbac.authorization.k8s.io/v1` </details> <details><summary>paste/manifest.yaml (2)</summary> - `Deployment apps/v1` - `Ingress networking.k8s.io/v1` </details> <details><summary>quota/quotad.yaml (3)</summary> - `CronJob batch/v1` - `ClusterRole rbac.authorization.k8s.io/v1` - `ClusterRoleBinding rbac.authorization.k8s.io/v1` </details> <details><summary>sb-server-monitor/2-deployment.yaml (1)</summary> - `Deployment apps/v1` </details> <details><summary>tests/test-ingress.yaml (2)</summary> - `Deployment apps/v1` - `Ingress networking.k8s.io/v1` </details> <details><summary>thanos/3-querier.yaml (3)</summary> - `quay.io/thanos/thanos v0.41.0` - `Deployment apps/v1` - `Ingress networking.k8s.io/v1` </details> <details><summary>thanos/4-storegateway.yaml (2)</summary> - `quay.io/thanos/thanos v0.41.0` - `StatefulSet apps/v1` </details> <details><summary>thanos/5-compactor.yaml (2)</summary> - `quay.io/thanos/thanos v0.41.0` - `Deployment apps/v1` </details> <details><summary>thanos/6-receiver.yaml (2)</summary> - `quay.io/thanos/thanos v0.41.0` - `StatefulSet apps/v1` </details> <details><summary>traefik-certmanager/base/traefik-certmanager.yaml (3)</summary> - `ClusterRole rbac.authorization.k8s.io/v1` - `ClusterRoleBinding rbac.authorization.k8s.io/v1` - `Deployment apps/v1` </details> <details><summary>traefik/secondingressclass.yaml (1)</summary> - `IngressClass networking.k8s.io/v1` </details> </blockquote> </details>
aaron added this to the Updates project 2024-02-11 05:01:24 +01:00
tom removed this from the Updates project 2024-11-12 18:19:05 +01:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
yolokube/core-deployments#31
No description provided.