Skip to content

Commit

Permalink
wip
Browse files Browse the repository at this point in the history
Signed-off-by: André Martins <[email protected]>
  • Loading branch information
aanm committed Feb 20, 2024
1 parent abd66ca commit c822d52
Showing 1 changed file with 2 additions and 362 deletions.
364 changes: 2 additions & 362 deletions .github/renovate.json5
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,8 @@
"extends": [
"config:base",
":gitSignOff",
"helpers:pinGitHubActionDigests"
"helpers:pinGitHubActionDigests",
"best-practices"
],
// This ensures that the gitAuthor and gitSignOff fields match
"gitAuthor": "renovate[bot] <[email protected]>",
Expand Down Expand Up @@ -65,367 +66,6 @@
"release-note/misc"
],
"stopUpdatingLabel": "renovate/stop-updating",
"packageRules": [
{
"groupName": "all github action dependencies",
"groupSlug": "all-github-action",
"matchPaths": [
".github/workflows/**"
],
"excludeDepNames": [
"cilium/little-vm-helper",
"quay.io/lvh-images/complexity-test",
"quay.io/lvh-images/kind",
"quay.io/cilium/kindest-node"
],
},
{
"matchPaths": [
".github/workflows/integration-test.yaml"
],
matchPackageNames: [
"ubuntu"
],
"allowedVersions": "20.04"
},
{
"groupName": "all go dependencies main",
"groupSlug": "all-go-deps-main",
"matchFiles": [
"go.mod",
"go.sum"
],
"postUpdateOptions": [
// update source import paths on major updates
"gomodUpdateImportPaths"
],
matchBaseBranches: [
"main"
]
},
{
// Avoid updating patch releases of golang in go.mod
"enabled": "false",
"matchFiles": [
"go.mod",
],
"matchDepNames": [
"go"
],
"matchDatasources": [
"golang-version"
],
"matchUpdateTypes": [
"patch"
],
matchBaseBranches: [
"main",
"v1.15",
"v1.14",
"v1.13",
"v1.12"
]
},
{
// Do not allow any updates into stable branches.
"enabled": false,
"groupName": "all go dependencies stable",
"groupSlug": "all-go-deps-stable",
"matchFiles": [
"go.mod",
"go.sum"
],
matchBaseBranches: [
"v1.15",
"v1.14",
"v1.13",
"v1.12"
]
},
{
"enabled": false,
"matchPackageNames": [
// All of these packages are maintained on a Cilium fork. Thus, we don't
// want to update them automatically.
"go.universe.tf/metallb",
"github.com/cilium/metallb",
// metallb is still using an old version of "github.com/mdlayher/arp"
"github.com/mdlayher/arp",
"github.com/miekg/dns",
"github.com/cilium/dns",
"sigs.k8s.io/controller-tools",
"github.com/cilium/controller-tools",
"github.com/cilium/client-go",
// We update this dependency manually together with envoy proxy updates
"github.com/cilium/proxy"
],
"matchPackagePatterns": [
// We can't update these libraries until github.com/shoenig/go-m1cpu
// is added as an exception to the list of licenses into CNCF.
".*google/gops/*",
// We can't update these libraries until github.com/shoenig/go-m1cpu
// is added as an exception to the list of licenses into CNCF.
"github.com/shirou/gopsutil/*",
// Once we decide to spend cycles on ginkgo v2 we should update the
// dependency manually.
"github.com/onsi/ginkgo",
"github.com/onsi/gomega/*",
// k8s dependencies will be updated manually along with tests
"k8s.io/*",
"sigs.k8s.io/*"
]
},
{
// Grouped these together because they require a re-creation of the base
// image.
"groupName": "base-images",
"matchFiles": [
"images/builder/Dockerfile",
"images/runtime/Dockerfile"
],
"matchPackageNames": [
"docker.io/library/golang"
],
},
{
"groupName": "spire-images",
"matchFiles": [
"install/kubernetes/cilium/values.yaml.tmpl"
],
"matchPackageNames": [
"ghcr.io/spiffe/spire-agent",
"ghcr.io/spiffe/spire-server"
],
"matchBaseBranches": [
"v1.14"
],
"allowedVersions": "<1.7"
},
{
"matchPackageNames": [
"docker.io/library/ubuntu"
],
"allowedVersions": "22.04",
"matchBaseBranches": [
"main",
"v1.15",
"v1.14",
"v1.13"
],
},
{
"matchPackageNames": [
"docker.io/library/ubuntu"
],
"allowedVersions": "20.04",
"matchBaseBranches": [
"v1.12"
],
},
{
"matchPackageNames": [
"docker.io/library/golang",
"go"
],
"allowedVersions": "<1.22",
"matchBaseBranches": [
"v1.15"
]
},
{
"matchPackageNames": [
"docker.io/library/golang",
"go"
],
"allowedVersions": "<1.22",
"matchBaseBranches": [
"v1.14",
"v1.13",
"v1.12"
]
},
{
"matchPackageNames": [
"docker.io/library/alpine"
],
"allowedVersions": "<3.20",
"matchBaseBranches": [
"v1.15"
]
},
{
"matchPackageNames": [
"docker.io/library/alpine"
],
"allowedVersions": "<3.19",
"matchBaseBranches": [
"v1.14"
]
},
{
"matchPackageNames": [
"docker.io/library/alpine"
],
"allowedVersions": "<3.18",
"matchBaseBranches": [
"v1.13"
]
},
{
"matchPackageNames": [
"docker.io/library/alpine"
],
"allowedVersions": "<3.17",
"matchBaseBranches": [
"v1.12"
]
},
{
"matchPackageNames": [
"gcr.io/etcd-development/etcd"
],
"allowedVersions": "<3.16",
"matchBaseBranches": [
"v1.15"
]
},
{
"matchDepNames": [
"golang.zx2c4.com/wireguard"
],
"versioning": "regex:^v0.0.0-(<patch>\\d+)-.*$"
},
// Ref: https://github.com/cilium/cilium-cli#releases
{
"groupName": "Cilium CLI",
"groupSlug": "cilium-cli",
"matchDepNames": [
"cilium/cilium-cli"
],
"matchBaseBranches": [
"main",
"v1.15",
"v1.14"
]
},
{
// Do not bump the minor version for Cilium <v1.14. Certain workflows
// are already using Cilium CLI v0.15.*, so let's enable patch versions.
"enabled": false,
"groupName": "Cilium CLI",
"groupSlug": "cilium-cli",
"matchDepNames": [
"cilium/cilium-cli"
],
"matchUpdateTypes": [
"major",
"minor"
],
"matchBaseBranches": [
"v1.13",
"v1.12",
]
},
{
"groupName": "Hubble CLI",
"groupSlug": "hubble-cli",
"matchDepNames": [
"cilium/hubble",
"quay.io/cilium/hubble"
]
},
{
"groupName": "Go",
"matchDepNames": [
"go",
"docker.io/library/golang"
],
},
{
// Group golangci-lint updates to overrule grouping of version updates in the GHA files.
// Without this, golangci-lint updates are not in sync for GHA files and other usages.
"groupName": "golangci-lint",
"matchDepPatterns": [
"^golangci/golangci-lint$"
],
},
{
// Do not allow any updates into stable branches.
"enabled": false,
"matchDepNames": [
"golangci/golangci-lint"
],
"matchBaseBranches": [
"v1.15",
"v1.14",
"v1.13",
"v1.12"
]
},
{
"matchDepNames": [
"quay.io/lvh-images/complexity-test",
"quay.io/lvh-images/kind"
],
"versioning": "regex:^((?<compatibility>[a-z-]+)|((?<major>\\d+)\\.(?<minor>\\d+)))\\-(?<patch>\\d+)\\.(?<build>\\d+)(@(?<currentDigest>sha256:[a-f0-9]+))?$"
},
{
"groupName": "stable lvh-images",
"groupSlug": "stable-lvh-images",
"matchPackageNames": [
"cilium/little-vm-helper",
"quay.io/lvh-images/complexity-test",
"quay.io/lvh-images/kind"
],
"allowedVersions": "!/bpf-next-.*/",
"matchBaseBranches": [
"v1.15",
"v1.14",
"v1.13",
"v1.12",
],
},
{
"groupName": "all lvh-images main",
"groupSlug": "all-lvh-images-main",
"matchPackageNames": [
"cilium/little-vm-helper",
"quay.io/lvh-images/complexity-test",
"quay.io/lvh-images/kind"
],
"matchBaseBranches": [
"main"
],
},
{
"groupName": "all kind-images main",
"groupSlug": "all-kind-images-main",
"matchPackageNames": [
"kindest/node",
"quay.io/cilium/kindest-node"
],
},
{
// Do not allow any updates for major.minor, they will be done by maintainers
"enabled": false,
"matchPackageNames": [
"quay.io/lvh-images/complexity-test",
"quay.io/lvh-images/kind",
"kindest/node",
"quay.io/cilium/kindest-node"
],
"matchUpdateTypes": [
"major",
"minor"
]
},
{
"matchPackageNames": [
"quay.io/cilium/kindest-node"
],
"ignoreUnstable": false
}
],
"kubernetes": {
"fileMatch": [
"examples/hubble/hubble-cli\\.yaml"
Expand Down

0 comments on commit c822d52

Please sign in to comment.