-
Notifications
You must be signed in to change notification settings - Fork 8
external-dns: update registry.k8s.io/external-dns/external-dns Docker tag to v0.18.0 #366
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/registry.k8s.io-external-dns-external-dns-0.x
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
external-dns: update registry.k8s.io/external-dns/external-dns Docker tag to v0.18.0 #366
renovate
wants to merge
1
commit into
master
from
renovate/registry.k8s.io-external-dns-external-dns-0.x
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
8471545
to
3dbd6b4
Compare
Infro diff for ce4fe9f
time="2025-08-21T02:32:29Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-08-21T02:32:39Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== apps/Deployment argocd/argocd-applicationset-controller ======
--- /tmp/argocd-diff1606798146/argocd-applicationset-controller-live.yaml
+++ /tmp/argocd-diff1606798146/argocd-applicationset-controller
@@ -555,7 +555,7 @@
key: applicationsetcontroller.requeue.after
name: argocd-cmd-params-cm
optional: true
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: Always
name: argocd-applicationset-controller
ports:
===== apps/Deployment argocd/argocd-dex-server ======
--- /tmp/argocd-diff2838665407/argocd-dex-server-live.yaml
+++ /tmp/argocd-diff2838665407/argocd-dex-server
@@ -359,7 +359,7 @@
- -n
- /usr/local/bin/argocd
- /shared/argocd-dex
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: Always
name: copyutil
resources: {}
===== apps/Deployment argocd/argocd-notifications-controller ======
--- /tmp/argocd-diff2944916524/argocd-notifications-controller-live.yaml
+++ /tmp/argocd-diff2944916524/argocd-notifications-controller
@@ -277,7 +277,7 @@
key: notificationscontroller.repo.server.plaintext
name: argocd-cmd-params-cm
optional: true
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: Always
livenessProbe:
failureThreshold: 3
===== apps/Deployment argocd/argocd-redis ======
--- /tmp/argocd-diff2751272699/argocd-redis-live.yaml
+++ /tmp/argocd-diff2751272699/argocd-redis
@@ -261,7 +261,7 @@
- argocd
- admin
- redis-initial-password
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: IfNotPresent
name: secret-init
resources: {}
===== apps/Deployment argocd/argocd-repo-server ======
--- /tmp/argocd-diff1192763471/argocd-repo-server-live.yaml
+++ /tmp/argocd-diff1192763471/argocd-repo-server
@@ -871,7 +871,7 @@
value: /helm-working-dir
- name: HELM_DATA_HOME
value: /helm-working-dir
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: Always
livenessProbe:
failureThreshold: 3
@@ -944,7 +944,7 @@
env:
- name: GNUPGHOME
value: /gnupg-home/.gnupg
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: IfNotPresent
name: import-gpg-key
resources: {}
@@ -975,7 +975,7 @@
- -n
- /usr/local/bin/argocd
- /var/run/argocd/argocd-cmp-server
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: IfNotPresent
name: copyutil
resources: {}
===== apps/Deployment argocd/argocd-server ======
--- /tmp/argocd-diff2765866143/argocd-server-live.yaml
+++ /tmp/argocd-diff2765866143/argocd-server
@@ -904,7 +904,7 @@
key: server.sync.replace.allowed
name: argocd-cmd-params-cm
optional: true
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: Always
livenessProbe:
failureThreshold: 3
===== apps/StatefulSet argocd/argocd-application-controller ======
--- /tmp/argocd-diff2445796214/argocd-application-controller-live.yaml
+++ /tmp/argocd-diff2445796214/argocd-application-controller
@@ -757,7 +757,7 @@
optional: true
- name: KUBECACHEDIR
value: /tmp/kubecache
- image: quay.io/argoproj/argocd:v2.14.15@sha256:3be6babe6a3248cf35f2c7816c0fcbbbdba592320d93494016ef7123031339cb
+ image: quay.io/argoproj/argocd:v3.1.0@sha256:51abf85651c33cfd0645d72e0877eeeae187bb404d4641ec47caa1921c9750be
imagePullPolicy: Always
name: argocd-application-controller
ports:
time="2025-08-21T02:32:54Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-08-21T02:32:56Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== /Service external-dns/external-dns ======
--- /tmp/argocd-diff696126980/external-dns-live.yaml
+++ /tmp/argocd-diff696126980/external-dns
@@ -2,9 +2,11 @@
kind: Service
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:/Service:external-dns/external-dns
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"v1","kind":"Service","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns","namespace":"external-dns"},"spec":{"ports":[{"name":"metrics","port":7979,"targetPort":7979}],"selector":{"app.kubernetes.io/name":"external-dns"}}}
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns
namespace: external-dns
===== /ServiceAccount external-dns/external-dns ======
--- /tmp/argocd-diff2267964805/external-dns-live.yaml
+++ /tmp/argocd-diff2267964805/external-dns
@@ -2,9 +2,11 @@
kind: ServiceAccount
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:/ServiceAccount:external-dns/external-dns
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"v1","kind":"ServiceAccount","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns","namespace":"external-dns"}}
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns
namespace: external-dns
===== apps/Deployment external-dns/external-dns ======
--- /tmp/argocd-diff28469288/external-dns-live.yaml
+++ /tmp/argocd-diff28469288/external-dns
@@ -2,11 +2,13 @@
kind: Deployment
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:apps/Deployment:external-dns/external-dns
deployment.kubernetes.io/revision: "11"
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"apps/v1","kind":"Deployment","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns","namespace":"external-dns"},"spec":{"selector":{"matchLabels":{"app.kubernetes.io/name":"external-dns"}},"strategy":{"type":"Recreate"},"template":{"metadata":{"labels":{"app.kubernetes.io/name":"external-dns"}},"spec":{"containers":[{"args":["--source=service","--source=ingress","--registry=txt","--provider=aws","--txt-owner-id=digitalocean-hashbang","--txt-prefix=_owner.","--source=crd","--domain-filter=hashbang.sh","--managed-record-types=A","--managed-record-types=CNAME","--managed-record-types=TXT"],"env":[{"name":"AWS_REGION","value":"us-west-2"},{"name":"AWS_ACCESS_KEY_ID","value":"AKIAR7CEWFK35SZX5S66"},{"name":"AWS_SECRET_ACCESS_KEY","valueFrom":{"secretKeyRef":{"key":"key","name":"external-dns-iam"}}}],"image":"registry.k8s.io/external-dns/external-dns:v0.16.1@sha256:37d3a7a05c4638b8177382b80a627c223bd84a53c1a91be137245bd3cfdf9986","name":"external-dns","ports":[{"containerPort":7979,"name":"metrics"}]}],"securityContext":{"fsGroup":65534},"serviceAccountName":"external-dns"}}}}
generation: 11
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
managedFields:
- apiVersion: apps/v1
@@ -150,11 +152,6 @@
- --provider=aws
- --txt-owner-id=digitalocean-hashbang
- --txt-prefix=_owner.
- - --source=crd
- - --domain-filter=hashbang.sh
- - --managed-record-types=A
- - --managed-record-types=CNAME
- - --managed-record-types=TXT
env:
- name: AWS_REGION
value: us-west-2
@@ -165,7 +162,7 @@
secretKeyRef:
key: key
name: external-dns-iam
- image: registry.k8s.io/external-dns/external-dns:v0.16.1@sha256:37d3a7a05c4638b8177382b80a627c223bd84a53c1a91be137245bd3cfdf9986
+ image: registry.k8s.io/external-dns/external-dns:v0.18.0@sha256:f90738b35be265d50141d5c21e6f6049c3da7cd761682c40214117a2951b80bc
imagePullPolicy: IfNotPresent
name: external-dns
ports:
===== cilium.io/CiliumNetworkPolicy external-dns/external-dns ======
--- /tmp/argocd-diff1154752173/external-dns-live.yaml
+++ /tmp/argocd-diff1154752173/external-dns
@@ -2,10 +2,12 @@
kind: CiliumNetworkPolicy
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:cilium.io/CiliumNetworkPolicy:external-dns/external-dns
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"cilium.io/v2","kind":"CiliumNetworkPolicy","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns","namespace":"external-dns"},"spec":{"egress":[{"toEntities":["cluster"]},{"toEntities":["cluster"],"toPorts":[{"ports":[{"port":"53","protocol":"ANY"}],"rules":{"dns":[{"matchPattern":"*.amazonaws.com"}]}}]},{"toEntities":["world"],"toPorts":[{"ports":[{"port":"443","protocol":"TCP"}]}]}],"endpointSelector":{"matchLabels":{"k8s:app":"external-dns"}},"ingress":[{"fromEntities":["cluster"],"toPorts":[{"ports":[{"port":"7979","protocol":"TCP"}],"rules":{"http":[{"method":"GET","path":"/metrics"}]}}]}]}}
generation: 32
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns
namespace: external-dns
===== monitoring.coreos.com/ServiceMonitor external-dns/external-dns-server-metrics ======
--- /tmp/argocd-diff2305692656/external-dns-server-metrics-live.yaml
+++ /tmp/argocd-diff2305692656/external-dns-server-metrics
@@ -3,10 +3,12 @@
metadata:
annotations:
argocd.argoproj.io/sync-options: SkipDryRunOnMissingResource=true
+ argocd.argoproj.io/tracking-id: external-dns:monitoring.coreos.com/ServiceMonitor:external-dns/external-dns-server-metrics
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"monitoring.coreos.com/v1","kind":"ServiceMonitor","metadata":{"annotations":{"argocd.argoproj.io/sync-options":"SkipDryRunOnMissingResource=true"},"labels":{"app.kubernetes.io/name":"external-dns","prometheusInstance":"default"},"name":"external-dns-server-metrics","namespace":"external-dns"},"spec":{"endpoints":[{"port":"metrics"}],"selector":{"matchLabels":{"app.kubernetes.io/name":"external-dns"}}}}
generation: 1
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
prometheusInstance: default
managedFields:
===== rbac.authorization.k8s.io/ClusterRole /external-dns ======
--- /tmp/argocd-diff2002501131/external-dns-live.yaml
+++ /tmp/argocd-diff2002501131/external-dns
@@ -2,9 +2,11 @@
kind: ClusterRole
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:rbac.authorization.k8s.io/ClusterRole:external-dns/external-dns
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRole","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns"},"rules":[{"apiGroups":[""],"resources":["endpoints","pods","services"],"verbs":["get","watch","list"]},{"apiGroups":["extensions"],"resources":["ingresses"],"verbs":["get","watch","list"]},{"apiGroups":["networking.k8s.io"],"resources":["ingresses"],"verbs":["get","watch","list"]},{"apiGroups":[""],"resources":["nodes"],"verbs":["watch","list"]},{"apiGroups":["externaldns.k8s.io"],"resources":["dnsendpoints"],"verbs":["get","watch","list"]},{"apiGroups":["externaldns.k8s.io"],"resources":["dnsendpoints/status"],"verbs":["*"]}]}
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns
resourceVersion: "710536737"
@@ -43,17 +45,3 @@
verbs:
- watch
- list
-- apiGroups:
- - externaldns.k8s.io
- resources:
- - dnsendpoints
- verbs:
- - get
- - watch
- - list
-- apiGroups:
- - externaldns.k8s.io
- resources:
- - dnsendpoints/status
- verbs:
- - '*'
===== rbac.authorization.k8s.io/ClusterRoleBinding /external-dns-viewer ======
--- /tmp/argocd-diff381057727/external-dns-viewer-live.yaml
+++ /tmp/argocd-diff381057727/external-dns-viewer
@@ -2,9 +2,11 @@
kind: ClusterRoleBinding
metadata:
annotations:
+ argocd.argoproj.io/tracking-id: external-dns:rbac.authorization.k8s.io/ClusterRoleBinding:external-dns/external-dns-viewer
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"rbac.authorization.k8s.io/v1","kind":"ClusterRoleBinding","metadata":{"annotations":{},"labels":{"app.kubernetes.io/name":"external-dns"},"name":"external-dns-viewer"},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"ClusterRole","name":"external-dns"},"subjects":[{"kind":"ServiceAccount","name":"external-dns","namespace":"external-dns"}]}
labels:
+ app.kubernetes.io/instance: external-dns
app.kubernetes.io/name: external-dns
name: external-dns-viewer
resourceVersion: "710536742"
time="2025-08-21T02:32:58Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-08-21T02:33:01Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== apps/Deployment ingress-nginx/ingress-nginx-controller ======
--- /tmp/argocd-diff213819544/ingress-nginx-controller-live.yaml
+++ /tmp/argocd-diff213819544/ingress-nginx-controller
@@ -280,7 +280,7 @@
fieldPath: metadata.namespace
- name: LD_PRELOAD
value: /usr/local/lib/libmimalloc.so
- image: registry.k8s.io/ingress-nginx/controller:v1.12.3@sha256:ac444cd9515af325ba577b596fe4f27a34be1aa330538e8b317ad9d6c8fb94ee
+ image: registry.k8s.io/ingress-nginx/controller:v1.13.1@sha256:37e489b22ac77576576e52e474941cd7754238438847c1ee795ad6d59c02b12a
imagePullPolicy: IfNotPresent
lifecycle:
preStop:
time="2025-08-21T02:33:02Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-08-21T02:33:05Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== apps/Deployment ircd/irc-deployment ======
--- /tmp/argocd-diff3468232370/irc-deployment-live.yaml
+++ /tmp/argocd-diff3468232370/irc-deployment
@@ -30,7 +30,7 @@
app: irc
spec:
containers:
- - image: ghcr.io/ergochat/ergo:v2.14.0@sha256:ef4040d18044a53c8c995defb3159018cf2e83030e5db068c3976d9343c826a5
+ - image: ghcr.io/ergochat/ergo:v2.15.0@sha256:135cd42c6300d957e0045ee53fbe886e43e1c04bb621391ed7b8940c174d68f3
imagePullPolicy: IfNotPresent
livenessProbe:
failureThreshold: 3
@@ -78,7 +78,7 @@
echo "Exiting.";
command:
- /bin/sh
- image: ghcr.io/ergochat/ergo:v2.14.0@sha256:ef4040d18044a53c8c995defb3159018cf2e83030e5db068c3976d9343c826a5
+ image: ghcr.io/ergochat/ergo:v2.15.0@sha256:135cd42c6300d957e0045ee53fbe886e43e1c04bb621391ed7b8940c174d68f3
imagePullPolicy: IfNotPresent
name: config-reloader
resources: {}
time="2025-08-21T02:33:29Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-08-21T02:33:32Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== apps/Deployment userdb-api/userdb-api-deployment ======
--- /tmp/argocd-diff3499586709/userdb-api-deployment-live.yaml
+++ /tmp/argocd-diff3499586709/userdb-api-deployment
@@ -45,7 +45,7 @@
secretKeyRef:
key: db-uri
name: postgrest-secrets
- image: postgrest/postgrest:v12.2.12@sha256:5f4ce744539bbba786b4e24dbbd95bdb2a956dcf568c5374995a0ff4a68f5bd2
+ image: postgrest/postgrest:v13.0.4@sha256:a312f4b2e48530a01fc26f5310d547d6c26d087858360e164522e415723a7732
imagePullPolicy: IfNotPresent
name: postgrest
ports:
time="2025-08-21T02:33:37Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
time="2025-08-21T02:33:41Z" level=warning msg="Failed to invoke grpc call. Use flag --grpc-web in grpc calls. To avoid this warning message, use flag --grpc-web."
===== apps/Deployment wkd/wkd ======
--- /tmp/argocd-diff1054254814/wkd-live.yaml
+++ /tmp/argocd-diff1054254814/wkd
@@ -233,7 +233,7 @@
value: enroll
- name: FOLDER
value: /tmp/keys
- image: kiwigrid/k8s-sidecar:1.30.8@sha256:494ac9c00e699cda00fc10008a88b9ee24055f284d200390857cc49d1f456730
+ image: kiwigrid/k8s-sidecar:1.30.9@sha256:8c06e1ba643a4625de14b2db65c356f5db6b1482a25fce4754380a2936207338
imagePullPolicy: IfNotPresent
name: watcher
resources: {} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
None yet
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v0.16.1
->v0.18.0
Release Notes
kubernetes-sigs/external-dns (registry.k8s.io/external-dns/external-dns)
v0.18.0
Compare Source
General information
endpointslices
. It will be included in the next Chart release, see #5493.ℹ️ This release remove in-tree support for ibmcloud, tencentcloud & ultradns. Users needing those providers can use a previous version of external-dns or create a webhook-based provider.
ℹ️ The change on
default-targets
behavior provide a mitigation strategy, if you need it, see #5316🚀 Features
ttl
annotation on pod by @ivankatliarchuk in #5527🐛 Bug fixes
📝 Documentation
📦 Others
apis/v1alpha1
by @mloiseleur in #5446New Contributors
Full Changelog: kubernetes-sigs/external-dns@v0.17.0...v0.18.0
v0.17.0
Compare Source
Global information
ℹ️ On Pi Hole, support for v6 has been added. Pi Hole v5 support is deprecated and will be removed in a future version
ℹ️ On OVH, the provider has been heavily rewritten. New ACLs are need. See documentation and PR #5143 for details.
ℹ️ On IPv6, the proposal 002 has been implemented, thanks to @hjoshi123
expose-internal-ipv6
flag will be set to falseℹ️ The legacy txt-format will be removed in the next minor version (#5172)
ℹ️ A new Nomad source may be added to external-dns (#5284)
🚀 Features
🐛 Bug fixes
📝 Documentation
📦 Others
📦 Docker Image
New Contributors
Full Changelog: kubernetes-sigs/external-dns@v0.16.1...v0.17.0
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.