Open
Conversation
7541c6b to
08b4d9f
Compare
Contributor
Author
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.25.4-rootless→1.25.5-rootless43.66.0-full→43.75.0-full1.28.1→1.29.0-rc1-ubi9-indexWarning
Some dependencies could not be looked up. Check the warning logs for more information.
Release Notes
go-gitea/gitea (docker.io/gitea/gitea)
v1.25.5Compare Source
security-checkinformational only (#36681) (#36852)renovatebot/renovate (docker.io/renovate/renovate)
v43.75.0Compare Source
Features
v43.74.0Compare Source
Features
Miscellaneous Chores
v43.73.2Compare Source
Bug Fixes
v43.73.1Compare Source
Bug Fixes
Miscellaneous Chores
v43.71.0Compare Source
Features
v43.70.0Compare Source
Features
Bug Fixes
vprefix withPackage.resolved(#41782) (25c77c6), closes #41780Miscellaneous Chores
v43.69.0Compare Source
Features
v43.66.5Compare Source
Bug Fixes
Miscellaneous Chores
v43.66.4Compare Source
Bug Fixes
Miscellaneous Chores
v43.66.3Compare Source
Bug Fixes
v43.66.2Compare Source
Miscellaneous Chores
Build System
v43.66.1Compare Source
Bug Fixes
Miscellaneous Chores
cloudnative-pg/cloudnative-pg (ghcr.io/cloudnative-pg/cloudnative-pg)
v1.29.0-rc1Compare Source
Release date: Mar 13, 2026
Important changes
Features
PostgreSQL extensions in image catalogs: extended the
ImageCatalogfunctionality to support PostgreSQL extensions. This allows users to define and manage extension-specific images within a catalog, simplifying the deployment of customized PostgreSQL builds. (#9781)Dynamic network access control via pod selectors: introduced the declarative definition of
podSelectorRefsto managepg_hba.confrules dynamically. By using label selectors to identify client pods, the operator automatically resolves their ephemeral IP addresses and updates the PostgreSQL host-based authentication rules accordingly. This ensures that only authorized workloads in the same namespace can connect to the database, eliminating the need for manual IP management or static CIDR ranges. (#10148)Shared
ServiceAccountsupport: added an optionalserviceAccountNamefield to bothClusterandPoolerspecifications. This allows multiple resources to share a pre-existing ServiceAccount, facilitating one-time IAM configurations (such as AWS IRSA, GCP Workload Identity, or Azure Workload Identity) across all clusters and poolers. Contributed by @bozkayasalihx. (#9287)Enhancements
Improved the
PoolerCRD with support for granular configuration of TLS cipher suites and minimum/maximum TLS versions. This enables administrators to meet strict security compliance requirements for pooler-to-client and pooler-to-server connections. Contributed by @alex1989hu. (#9571)Improved the reliability of major upgrades by setting
BackoffLimit=0on the upgrade job, preventing unnecessary retries of a failedpg_upgrade. The operator now automatically deletes the failed job when a user reverts the container image, allowing the cluster to restart gracefully on the original version. (#10104)Improved the operator's observability by emitting native Kubernetes events during key phases of the reconciliation loop. This provides much better visibility into the operator's decision-making process and the lifecycle of managed resources directly through
kubectl get events. (#10040)Extended support for the
cnpg.io/reconciliationDisabledannotation on Backup resources. This allows administrators to temporarily freeze the operator's reconciliation logic for specific backup objects. Contributed by @GabriFedi97. (#10020)Added a
bin_pathfield to thepostgresql.extensionsstanza, as well as inImageCatalogandClusterImageCatalogresources. This allows extensions to specify directory paths for external binaries, which are automatically appended to thePATHenvironment variable of the Postgres process. (#10250)Implemented a finalizer for plugins to ensure that resources managed by a plugin are gracefully cleaned up when the corresponding service is deleted. (#9560)
Enhanced the security and reliability of role management by verifying the primary status of an instance before each reconciliation cycle. (#9971)
The operator now honors the
primaryUpdateMethodwhen adding new PVCs to a cluster, ensuring that the rollout strategy (e.g., switchover vs. restart) is respected during storage expansion or additions. (#9720)Refined the
alpha.cnpg.io/unrecoverableannotation logic to allow it to function even on pods that have not yet reached theReadystate, facilitating the recovery of stuck instances. (#9968)Introduced a "Terminal Error" phase for backups that encounter unrecoverable issues (such as invalid credentials or non-existent cloud buckets). This ensures the operator stops retrying doomed operations, preventing resource exhaustion and providing immediate, clear feedback in the status. (#9353)
Improved monitoring of long-running backups by introducing
reconciliationStartedAtandreconciliationTerminatedAtfields to theBackupstatus. This change separates the operator's internal lifecycle from the actual backup tool's execution timing (startedAt/stoppedAt), allowing users to track when the operator begins processing a request. (#9351)Added a
Pendingphase to theBackupstatus to explicitly indicate when a backup is queued and waiting for an available worker or instance availability. (#9364)Security and Supply Chain
Security best practices integration: integrated the OpenSSF baseline scanner and added a
SECURITY-INSIGHTS.yamlfile to the repository to align with industry-standard security reporting. (#10054, #10062)SLSA provenance and SBOMs: added SLSA (Supply-chain Levels for Software Artifacts) provenance to release binaries and container images. Additionally, enabled Software Bill of Materials (SBOM) generation within the GoReleaser pipeline for improved dependency transparency. (#10048, #10074)
Password leak prevention: fixed a potential security risk where PostgreSQL could leak role passwords in the logs during specific reconciliation phases. (#9950)
Changes
18.3-system-trixie). (#10090)Fixes
Fixed an issue where replicas would get stuck in a
Pendingstate if theVolumeSnapshotused for the initial bootstrap had been deleted. The operator now validates snapshot existence before use; if a snapshot is missing, it attempts to use the next available candidate or falls back topg_basebackup. (#10192)Prevented the "supervised primary" rollout strategy from consuming all available rollout slots, which previously caused delays in scheduled updates. Contributed by @ermakov-oleg. (#9977)
Fixed an issue where certain hot-standby parameter changes were not being correctly applied to replica clusters. (#9952)
Fixed a bug in the CNPG-I reconciler hook that could lead to skipping subsequent plugins when a "continue" result was returned. Contributed by @sharifmshaker. (#9978)
Fixed a deadlock scenario that occurred when attempting to resize a filesystem on a PVC that was not currently attached to a Pod. Contributed by @jmealo. (#9981)
Refined the bootstrap recovery logic by adding a missing check for
ConnectionParametersand updating error messages to include all valid configuration types. (#10268)Volume names for extensions and tablespaces are now prefixed to avoid naming collisions with standard cluster volumes. (#9973)
Improved feedback when hibernating a non-healthy cluster. While the operator correctly defers hibernation until a cluster recovers, this state is now explicitly reported via a
WaitingForHealthycondition, making it visible throughcnpg status. (#10193)Removed unnecessary pod existence checks from the
FencingMetadataExecutorto streamline the fencing process, particularly in environments where pods may be quickly deleted. (#10035)Fixed the cluster and pooler service reconcilers to detect changes to all spec fields (such as
loadBalancerSourceRanges) when using the patch update strategy, which previously only compared selectors, labels, and annotations. (#10190)Fixed a race condition in the deprecated in-tree Barman Cloud backup implementation affecting parallel WAL restore, where prefetched files could be read while still being downloaded, causing PostgreSQL recovery to fail with "invalid checkpoint record" errors. (#10285)
cnpgplugin:pgbenchJob pod template. (#10174)Supported versions
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.