gitops
gitops copied to clipboard
argocd: update redis Docker tag to v7.4.2
This PR contains the following updates:
| Package | Type | Update | Change |
|---|---|---|---|
| redis | Kustomization | minor | 7.2.0-alpine -> 7.4.2-alpine |
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, check this box
This PR was generated by Mend Renovate. View the repository job log.
Infro diff for 18cfa01
argocd.hashbang.sh > argocd (0 files changed)
time="2025-07-17T21:58:24Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-07-17T21:58:36Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== apps/Deployment argocd/argocd-redis ======
--- /tmp/argocd-diff335165127/argocd-redis-live.yaml
+++ /tmp/argocd-diff335165127/argocd-redis
@@ -240,7 +240,7 @@
secretKeyRef:
key: auth
name: argocd-redis
- image: redis:7.2.0-alpine@sha256:fd5de2340bc46cbc2241975ab027797c350dec6fd86349e3ac384e3a41be6fee
+ image: redis:7.4.5-alpine@sha256:bb186d083732f669da90be8b0f975a37812b15e913465bb14d845db72a4e3e08
imagePullPolicy: Always
name: redis
ports:
argocd.hashbang.sh > external-dns (2 files changed)
time="2025-07-17T21:58:49Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-07-17T21:58:52Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== /Service external-dns/external-dns ======
--- /tmp/argocd-diff38975748/external-dns-live.yaml
+++ /tmp/argocd-diff38975748/external-dns
@@ -2,9 +2,11 @@
kind: Service
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:/Service:external-dns/external-dns
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns","namespace":"external-dns"},"spec":{"ports":[{"name":"metrics","port":7979,"targetPort":7979}],"selector":{"app.kubernetes.io/name":"external-dns"}}}
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns
namespace: external-dns
===== /ServiceAccount external-dns/external-dns ======
--- /tmp/argocd-diff1525608312/external-dns-live.yaml
+++ /tmp/argocd-diff1525608312/external-dns
@@ -2,9 +2,11 @@
kind: ServiceAccount
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:/ServiceAccount:external-dns/external-dns
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns","namespace":"external-dns"}}
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns
namespace: external-dns
===== apps/Deployment external-dns/external-dns ======
--- /tmp/argocd-diff2386594759/external-dns-live.yaml
+++ /tmp/argocd-diff2386594759/external-dns
@@ -2,11 +2,13 @@
kind: Deployment
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:apps/Deployment:external-dns/external-dns
deployment.kubernetes.io/revision: "11"
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns","namespace":"external-dns"},"spec":{"selector":{"matchLabels":{"app.kubernetes.io/name":"external-dns"}},"strategy":{"type":"Recreate"},"template":{"metadata":{"labels":{"app.kubernetes.io/name":"external-dns"}},"spec":{"containers":[{"args":["--source=service","--source=ingress","--registry=txt","--provider=aws","--txt-owner-id=digitalocean-hashbang","--txt-prefix=_owner.","--source=crd","--domain-filter=hashbang.sh","--managed-record-types=A","--managed-record-types=CNAME","--managed-record-types=TXT"],"env":[{"name":"AWS_REGION","value":"us-west-2"},{"name":"AWS_ACCESS_KEY_ID","value":"AKIAR7CEWFK35SZX5S66"},{"name":"AWS_SECRET_ACCESS_KEY","valueFrom":{"secretKeyRef":{"key":"key","name":"external-dns-iam"}}}],"image":"registry.k8s.io/external-dns/external-dns:v0.16.1@sha256:37d3a7a05c4638b8177382b80a627c223bd84a53c1a91be137245bd3cfdf9986","name":"external-dns","ports":[{"containerPort":7979,"name":"metrics"}]}],"securityContext":{"fsGroup":65534},"serviceAccountName":"external-dns"}}}}
generation: 11
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
managedFields:
- apiVersion: apps/v1
@@ -150,11 +152,6 @@
- --provider=aws
- --txt-owner-id=digitalocean-hashbang
- --txt-prefix=_owner.
- - --source=crd
- - --domain-filter=hashbang.sh
- - --managed-record-types=A
- - --managed-record-types=CNAME
- - --managed-record-types=TXT
env:
- name: AWS_REGION
value: us-west-2
===== cilium.io/CiliumNetworkPolicy external-dns/external-dns ======
--- /tmp/argocd-diff3833095667/external-dns-live.yaml
+++ /tmp/argocd-diff3833095667/external-dns
@@ -2,10 +2,12 @@
kind: CiliumNetworkPolicy
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:cilium.io/CiliumNetworkPolicy:external-dns/external-dns
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"cilium.io/v2","kind":"CiliumNetworkPolicy","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns","namespace":"external-dns"},"spec":{"egress":[{"toEntities":["cluster"]},{"toEntities":["cluster"],"toPorts":[{"ports":[{"port":"53","protocol":"ANY"}],"rules":{"dns":[{"matchPattern":"*.amazonaws.com"}]}}]},{"toEntities":["world"],"toPorts":[{"ports":[{"port":"443","protocol":"TCP"}]}]}],"endpointSelector":{"matchLabels":{"k8s:app":"external-dns"}},"ingress":[{"fromEntities":["cluster"],"toPorts":[{"ports":[{"port":"7979","protocol":"TCP"}],"rules":{"http":[{"method":"GET","path":"/metrics"}]}}]}]}}
generation: 32
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns
namespace: external-dns
===== monitoring.coreos.com/ServiceMonitor external-dns/external-dns-server-metrics ======
--- /tmp/argocd-diff675045266/external-dns-server-metrics-live.yaml
+++ /tmp/argocd-diff675045266/external-dns-server-metrics
@@ -3,10 +3,12 @@
metadata:
annotations:
argocd.argoproj.io/sync-options: SkipDryRunOnMissingResource=true
+ argocd.argoproj.io/tracking-id: external-dns:monitoring.coreos.com/ServiceMonitor:external-dns/external-dns-server-metrics
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"monitoring.coreos.com/v1","kind":"ServiceMonitor","metadata":{"annotations":{"argocd.argoproj.io/sync-options":"SkipDryRunOnMissingResource=true"},"labels":{"app.kubernetes.io/name":"external-dns","prometheusInstance":"default"},"name":"external-dns-server-metrics","namespace":"external-dns"},"spec":{"endpoints":[{"port":"metrics"}],"selector":{"matchLabels":{"app.kubernetes.io/name":"external-dns"}}}}
generation: 1
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
prometheusInstance: default
managedFields:
===== rbac.authorization.k8s.io/ClusterRole /external-dns ======
--- /tmp/argocd-diff1866537647/external-dns-live.yaml
+++ /tmp/argocd-diff1866537647/external-dns
@@ -2,9 +2,11 @@
kind: ClusterRole
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:rbac.authorization.k8s.io/ClusterRole:external-dns/external-dns
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns"},"rules":[{"apiGroups":[""],"resources":["endpoints","pods","services"],"verbs":["get","watch","list"]},{"apiGroups":["extensions"],"resources":["ingresses"],"verbs":["get","watch","list"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","watch","list"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["watch","list"]},{"apiGroups":["externaldns.k8s.io"],"resources":["dnsendpoints"],"verbs":["get","watch","list"]},{"apiGroups":["externaldns.k8s.io"],"resources":["dnsendpoints/status"],"verbs":["*"]}]}
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns
resourceVersion: "710536737"
@@ -43,17 +45,3 @@
verbs:
- watch
- list
-- apiGroups:
- - externaldns.k8s.io
- resources:
- - dnsendpoints
- verbs:
- - get
- - watch
- - list
-- apiGroups:
- - externaldns.k8s.io
- resources:
- - dnsendpoints/status
- verbs:
- - '*'
===== rbac.authorization.k8s.io/ClusterRoleBinding /external-dns-viewer ======
--- /tmp/argocd-diff1948268341/external-dns-viewer-live.yaml
+++ /tmp/argocd-diff1948268341/external-dns-viewer
@@ -2,9 +2,11 @@
kind: ClusterRoleBinding
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:rbac.authorization.k8s.io/ClusterRoleBinding:external-dns/external-dns-viewer
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns-viewer"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"external-dns"},"subjects":[{"kind":"ServiceAccount","name":"external-dns","namespace":"external-dns"}]}
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns-viewer
resourceVersion: "710536742"
argocd.hashbang.sh > ircd (0 files changed)
time="2025-07-17T21:58:58Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-07-17T21:59:01Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== apps/Deployment ircd/irc-deployment ======
--- /tmp/argocd-diff3320226507/irc-deployment-live.yaml
+++ /tmp/argocd-diff3320226507/irc-deployment
@@ -30,7 +30,7 @@
app: irc
spec:
containers:
- - image: ghcr.io/ergochat/ergo:v2.14.0@sha256:ef4040d18044a53c8c995defb3159018cf2e83030e5db068c3976d9343c826a5
+ - image: ghcr.io/ergochat/ergo:v2.15.0@sha256:135cd42c6300d957e0045ee53fbe886e43e1c04bb621391ed7b8940c174d68f3
imagePullPolicy: IfNotPresent
livenessProbe:
failureThreshold: 3
@@ -78,7 +78,7 @@
echo "Exiting.";
command:
- /bin/sh
- image: ghcr.io/ergochat/ergo:v2.14.0@sha256:ef4040d18044a53c8c995defb3159018cf2e83030e5db068c3976d9343c826a5
+ image: ghcr.io/ergochat/ergo:v2.15.0@sha256:135cd42c6300d957e0045ee53fbe886e43e1c04bb621391ed7b8940c174d68f3
imagePullPolicy: IfNotPresent
name: config-reloader
resources: {}