Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package talosctl for openSUSE:Factory checked in at 2025-07-06 17:14:00 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/talosctl (Old) and /work/SRC/openSUSE:Factory/.talosctl.new.1903 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "talosctl" Sun Jul 6 17:14:00 2025 rev:31 rq:1290575 version:1.10.5 Changes: -------- --- /work/SRC/openSUSE:Factory/talosctl/talosctl.changes 2025-06-12 15:55:12.050012825 +0200 +++ /work/SRC/openSUSE:Factory/.talosctl.new.1903/talosctl.changes 2025-07-06 17:17:59.131966619 +0200 @@ -1,0 +2,7 @@ +Fri Jul 4 05:09:50 UTC 2025 - Johannes Kastl <opensuse_buildserv...@ojkastl.de> + +- update to 1.10.5: + https://github.com/siderolabs/talos/releases/tag/v1.10.5 + * no CLI-related changes in the Changelog + +------------------------------------------------------------------- Old: ---- talosctl-1.10.4.obscpio New: ---- talosctl-1.10.5.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ talosctl.spec ++++++ --- /var/tmp/diff_new_pack.hgJCgc/_old 2025-07-06 17:18:00.516023850 +0200 +++ /var/tmp/diff_new_pack.hgJCgc/_new 2025-07-06 17:18:00.520024015 +0200 @@ -17,7 +17,7 @@ Name: talosctl -Version: 1.10.4 +Version: 1.10.5 Release: 0 Summary: CLI to interact with Talos Linux License: MPL-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.hgJCgc/_old 2025-07-06 17:18:00.560025669 +0200 +++ /var/tmp/diff_new_pack.hgJCgc/_new 2025-07-06 17:18:00.564025835 +0200 @@ -4,7 +4,7 @@ <param name="scm">git</param> <param name="exclude">.git</param> <param name="exclude">go.work</param> - <param name="revision">v1.10.4</param> + <param name="revision">v1.10.5</param> <param name="match-tag">v*</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> ++++++ talosctl-1.10.4.obscpio -> talosctl-1.10.5.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/CHANGELOG.md new/talosctl-1.10.5/CHANGELOG.md --- old/talosctl-1.10.4/CHANGELOG.md 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/CHANGELOG.md 2025-07-03 16:21:40.000000000 +0200 @@ -1,3 +1,69 @@ +## [Talos 1.10.5](https://github.com/siderolabs/talos/releases/tag/v1.10.5) (2025-07-03) + +Welcome to the v1.10.5 release of Talos! + + + +Please try out the release binaries and report any issues at +https://github.com/siderolabs/talos/issues. + +### Azure + +Talos on Azure now defaults to MTU of 1400 bytes for the `eth0` interface to avoid packet fragmentation issues. +The default MTU can be overriden with machine configuration. + + +### Component Updates + +Linux: 6.12.35 +Kubernetes: 1.33.2 + +Talos is built with Go 1.24.4. + + +### Contributors + +* Andrey Smirnov +* Noel Georgi + +### Changes +<details><summary>8 commits</summary> +<p> + +* [`b84e15037`](https://github.com/siderolabs/talos/commit/b84e15037c3acc2b2f92543f11faf5c5a5cb1627) feat: update Kubernetes default to 1.33.2 +* [`2017ec228`](https://github.com/siderolabs/talos/commit/2017ec228d7903ffc2bf92a74fb7d525172dcf87) fix: add limited retries for not found images +* [`b3e510ac5`](https://github.com/siderolabs/talos/commit/b3e510ac5a8002c9afc188b6e05b56047d3a3060) chore: improve cloud image uploader resilience +* [`4a40cddbb`](https://github.com/siderolabs/talos/commit/4a40cddbbf190dd90322a6b7cd0c7cd485ccef67) fix: hold user volume mount point across kubelet restarts +* [`9e1f347f5`](https://github.com/siderolabs/talos/commit/9e1f347f5a098159067c6c555da27a3db361f4ea) fix: etcd recover with multiple advertised addresses +* [`f85ff5fa8`](https://github.com/siderolabs/talos/commit/f85ff5fa8dc447c19f3db20c31f59bfc0cc2d0c3) feat: update Linux to 6.12.35 +* [`87ed1b589`](https://github.com/siderolabs/talos/commit/87ed1b589343d8a7cc939a65af9c0b9ce4d3633d) fix: treat context canceled as expected error on image pull +* [`9a0644a64`](https://github.com/siderolabs/talos/commit/9a0644a64fad894f481298185b636e862ba3b87d) fix: set default MTU on Azure to 1400 +</p> +</details> + +### Changes from siderolabs/pkgs +<details><summary>2 commits</summary> +<p> + +* [`28fa97d`](https://github.com/siderolabs/pkgs/commit/28fa97deebdb72d278aef5406676eaeafad0fe77) fix: iptables url +* [`6109fe6`](https://github.com/siderolabs/pkgs/commit/6109fe67ce5d335f8de68ffbad4b3944c6b4da4e) feat: update dependencies +</p> +</details> + +### Dependency Changes + +* **github.com/siderolabs/pkgs** v1.10.0-22-g51e388c -> v1.10.0-24-g28fa97d +* **k8s.io/api** v0.33.1 -> v0.33.2 +* **k8s.io/apiserver** v0.33.1 -> v0.33.2 +* **k8s.io/client-go** v0.33.1 -> v0.33.2 +* **k8s.io/component-base** v0.33.1 -> v0.33.2 +* **k8s.io/kube-scheduler** v0.33.1 -> v0.33.2 +* **k8s.io/kubectl** v0.33.1 -> v0.33.2 +* **k8s.io/kubelet** v0.33.1 -> v0.33.2 +* **k8s.io/pod-security-admission** v0.33.1 -> v0.33.2 + +Previous release can be found at [v1.10.4](https://github.com/siderolabs/talos/releases/tag/v1.10.4) + ## [Talos 1.10.4](https://github.com/siderolabs/talos/releases/tag/v1.10.4) (2025-06-11) Welcome to the v1.10.4 release of Talos! diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/Makefile new/talosctl-1.10.5/Makefile --- old/talosctl-1.10.4/Makefile 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/Makefile 2025-07-03 16:21:40.000000000 +0200 @@ -27,7 +27,7 @@ TOOLS_PREFIX ?= ghcr.io/siderolabs/tools TOOLS ?= v1.10.0-4-g9d54ed4 PKGS_PREFIX ?= ghcr.io/siderolabs -PKGS ?= v1.10.0-22-g51e388c +PKGS ?= v1.10.0-24-g28fa97d KRES_IMAGE ?= ghcr.io/siderolabs/kres:latest CONFORMANCE_IMAGE ?= ghcr.io/siderolabs/conform:latest @@ -125,7 +125,7 @@ INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM) INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM) # renovate: datasource=github-releases depName=kubernetes/kubernetes -KUBECTL_VERSION ?= v1.33.1 +KUBECTL_VERSION ?= v1.33.2 # renovate: datasource=github-releases depName=kastenhq/kubestr KUBESTR_VERSION ?= v0.4.48 # renovate: datasource=github-releases depName=helm/helm diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/go.mod new/talosctl-1.10.5/go.mod --- old/talosctl-1.10.4/go.mod 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/go.mod 2025-07-03 16:21:40.000000000 +0200 @@ -35,16 +35,16 @@ // Kubernetes dependencies sharing the same version. require ( - k8s.io/api v0.33.1 - k8s.io/apimachinery v0.33.1 - k8s.io/apiserver v0.33.1 - k8s.io/client-go v0.33.1 - k8s.io/component-base v0.33.1 - k8s.io/cri-api v0.33.1 - k8s.io/kube-scheduler v0.33.1 - k8s.io/kubectl v0.33.1 - k8s.io/kubelet v0.33.1 - k8s.io/pod-security-admission v0.33.1 + k8s.io/api v0.33.2 + k8s.io/apimachinery v0.33.2 + k8s.io/apiserver v0.33.2 + k8s.io/client-go v0.33.2 + k8s.io/component-base v0.33.2 + k8s.io/cri-api v0.33.2 + k8s.io/kube-scheduler v0.33.2 + k8s.io/kubectl v0.33.2 + k8s.io/kubelet v0.33.2 + k8s.io/pod-security-admission v0.33.2 ) require ( @@ -165,7 +165,7 @@ github.com/siderolabs/net v0.4.0 github.com/siderolabs/proto-codec v0.1.2 github.com/siderolabs/siderolink v0.3.15 - github.com/siderolabs/talos/pkg/machinery v1.10.4 + github.com/siderolabs/talos/pkg/machinery v1.10.5 github.com/sirupsen/logrus v1.9.3 github.com/spf13/cobra v1.9.1 github.com/spf13/pflag v1.0.6 @@ -233,7 +233,7 @@ github.com/cespare/xxhash/v2 v2.3.0 // indirect github.com/chai2010/gettext-go v1.0.2 // indirect github.com/cilium/ebpf v0.17.3 // indirect - github.com/cloudflare/circl v1.6.0 // indirect + github.com/cloudflare/circl v1.6.1 // indirect github.com/containerd/continuity v0.4.4 // indirect github.com/containerd/errdefs/pkg v0.3.0 // indirect github.com/containerd/fifo v1.1.0 // indirect @@ -364,7 +364,7 @@ gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect - k8s.io/cli-runtime v0.33.1 // indirect + k8s.io/cli-runtime v0.33.2 // indirect k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff // indirect k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e // indirect kernel.org/pub/linux/libs/security/libcap/psx v1.2.76 // indirect diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/go.sum new/talosctl-1.10.5/go.sum --- old/talosctl-1.10.4/go.sum 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/go.sum 2025-07-03 16:21:40.000000000 +0200 @@ -116,8 +116,8 @@ github.com/cilium/ebpf v0.17.3 h1:FnP4r16PWYSE4ux6zN+//jMcW4nMVRvuTLVTvCjyyjg= github.com/cilium/ebpf v0.17.3/go.mod h1:G5EDHij8yiLzaqn0WjyfJHvRa+3aDlReIaLVRMvOyJk= github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw= -github.com/cloudflare/circl v1.6.0 h1:cr5JKic4HI+LkINy2lg3W2jF8sHCVTBncJr5gIIq7qk= -github.com/cloudflare/circl v1.6.0/go.mod h1:uddAzsPgqdMAYatqJ0lsjX1oECcQLIlRpzZh3pJrofs= +github.com/cloudflare/circl v1.6.1 h1:zqIqSPIndyBh1bjLVVDHMPpVKqp8Su/V+6MeDzzQBQ0= +github.com/cloudflare/circl v1.6.1/go.mod h1:uddAzsPgqdMAYatqJ0lsjX1oECcQLIlRpzZh3pJrofs= github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc= github.com/cncf/udpa/go v0.0.0-20200629203442-efcf912fb354/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk= github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk= @@ -1105,32 +1105,32 @@ honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -k8s.io/api v0.33.1 h1:tA6Cf3bHnLIrUK4IqEgb2v++/GYUtqiu9sRVk3iBXyw= -k8s.io/api v0.33.1/go.mod h1:87esjTn9DRSRTD4fWMXamiXxJhpOIREjWOSjsW1kEHw= -k8s.io/apimachinery v0.33.1 h1:mzqXWV8tW9Rw4VeW9rEkqvnxj59k1ezDUl20tFK/oM4= -k8s.io/apimachinery v0.33.1/go.mod h1:BHW0YOu7n22fFv/JkYOEfkUYNRN0fj0BlvMFWA7b+SM= -k8s.io/apiserver v0.33.1 h1:yLgLUPDVC6tHbNcw5uE9mo1T6ELhJj7B0geifra3Qdo= -k8s.io/apiserver v0.33.1/go.mod h1:VMbE4ArWYLO01omz+k8hFjAdYfc3GVAYPrhP2tTKccs= -k8s.io/cli-runtime v0.33.1 h1:TvpjEtF71ViFmPeYMj1baZMJR4iWUEplklsUQ7D3quA= -k8s.io/cli-runtime v0.33.1/go.mod h1:9dz5Q4Uh8io4OWCLiEf/217DXwqNgiTS/IOuza99VZE= -k8s.io/client-go v0.33.1 h1:ZZV/Ks2g92cyxWkRRnfUDsnhNn28eFpt26aGc8KbXF4= -k8s.io/client-go v0.33.1/go.mod h1:JAsUrl1ArO7uRVFWfcj6kOomSlCv+JpvIsp6usAGefA= -k8s.io/component-base v0.33.1 h1:EoJ0xA+wr77T+G8p6T3l4efT2oNwbqBVKR71E0tBIaI= -k8s.io/component-base v0.33.1/go.mod h1:guT/w/6piyPfTgq7gfvgetyXMIh10zuXA6cRRm3rDuY= -k8s.io/cri-api v0.33.1 h1:CEvLiHZm/uTTp/5qsesU8/OG1a56RPnwMk4Ae73bUvs= -k8s.io/cri-api v0.33.1/go.mod h1:OLQvT45OpIA+tv91ZrpuFIGY+Y2Ho23poS7n115Aocs= +k8s.io/api v0.33.2 h1:YgwIS5jKfA+BZg//OQhkJNIfie/kmRsO0BmNaVSimvY= +k8s.io/api v0.33.2/go.mod h1:fhrbphQJSM2cXzCWgqU29xLDuks4mu7ti9vveEnpSXs= +k8s.io/apimachinery v0.33.2 h1:IHFVhqg59mb8PJWTLi8m1mAoepkUNYmptHsV+Z1m5jY= +k8s.io/apimachinery v0.33.2/go.mod h1:BHW0YOu7n22fFv/JkYOEfkUYNRN0fj0BlvMFWA7b+SM= +k8s.io/apiserver v0.33.2 h1:KGTRbxn2wJagJowo29kKBp4TchpO1DRO3g+dB/KOJN4= +k8s.io/apiserver v0.33.2/go.mod h1:9qday04wEAMLPWWo9AwqCZSiIn3OYSZacDyu/AcoM/M= +k8s.io/cli-runtime v0.33.2 h1:koNYQKSDdq5AExa/RDudXMhhtFasEg48KLS2KSAU74Y= +k8s.io/cli-runtime v0.33.2/go.mod h1:gnhsAWpovqf1Zj5YRRBBU7PFsRc6NkEkwYNQE+mXL88= +k8s.io/client-go v0.33.2 h1:z8CIcc0P581x/J1ZYf4CNzRKxRvQAwoAolYPbtQes+E= +k8s.io/client-go v0.33.2/go.mod h1:9mCgT4wROvL948w6f6ArJNb7yQd7QsvqavDeZHvNmHo= +k8s.io/component-base v0.33.2 h1:sCCsn9s/dG3ZrQTX/Us0/Sx2R0G5kwa0wbZFYoVp/+0= +k8s.io/component-base v0.33.2/go.mod h1:/41uw9wKzuelhN+u+/C59ixxf4tYQKW7p32ddkYNe2k= +k8s.io/cri-api v0.33.2 h1:1OiWm6gUx7JrN+xqxMzGDCPfPxVT8b6n7B6SeYl5luM= +k8s.io/cri-api v0.33.2/go.mod h1:OLQvT45OpIA+tv91ZrpuFIGY+Y2Ho23poS7n115Aocs= k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk= k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE= k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff h1:/usPimJzUKKu+m+TE36gUyGcf03XZEP0ZIKgKj35LS4= k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff/go.mod h1:5jIi+8yX4RIb8wk3XwBo5Pq2ccx4FP10ohkbSKCZoK8= -k8s.io/kube-scheduler v0.33.1 h1:0WfBGqrfy3HzqgIVxIRpq+iYQKMgh24vcmAlvDYRkzo= -k8s.io/kube-scheduler v0.33.1/go.mod h1:Gz6+HUJcGvIkRk1PRLVniVwYasVvNhjhTbZWPh2gJ+8= -k8s.io/kubectl v0.33.1 h1:OJUXa6FV5bap6iRy345ezEjU9dTLxqv1zFTVqmeHb6A= -k8s.io/kubectl v0.33.1/go.mod h1:Z07pGqXoP4NgITlPRrnmiM3qnoo1QrK1zjw85Aiz8J0= -k8s.io/kubelet v0.33.1 h1:x4LCw1/iZVWOKA4RoITnuB8gMHnw31HPB3S0EF0EexE= -k8s.io/kubelet v0.33.1/go.mod h1:8WpdC9M95VmsqIdGSQrajXooTfT5otEj8pGWOm+KKfQ= -k8s.io/pod-security-admission v0.33.1 h1:amePfcTDgLHB1wpZFIO7chW3Pc/ikeYbniuMTQEcaB4= -k8s.io/pod-security-admission v0.33.1/go.mod h1:3gSyP5JPgte2EHjQheA81299vISL6D7DDvk2m9RQj6k= +k8s.io/kube-scheduler v0.33.2 h1:B6W7oldVnH6aIGAxh7HNHIV2YoPOoAUzqzlzUJsg/B0= +k8s.io/kube-scheduler v0.33.2/go.mod h1:+1TrLmFINNQdEKGtxkgs0KY/5vDeOYIpiysMcVHwjls= +k8s.io/kubectl v0.33.2 h1:7XKZ6DYCklu5MZQzJe+CkCjoGZwD1wWl7t/FxzhMz7Y= +k8s.io/kubectl v0.33.2/go.mod h1:8rC67FB8tVTYraovAGNi/idWIK90z2CHFNMmGJZJ3KI= +k8s.io/kubelet v0.33.2 h1:wxEau5/563oJb3j3KfrCKlNWWx35YlSgDLOYUBCQ0pg= +k8s.io/kubelet v0.33.2/go.mod h1:way8VCDTUMiX1HTOvJv7M3xS/xNysJI6qh7TOqMe5KM= +k8s.io/pod-security-admission v0.33.2 h1:XRm2Q50aFtB61qVG1Fqyn3sw1A4RaFL4HRzF3LOAq/M= +k8s.io/pod-security-admission v0.33.2/go.mod h1:e6wsjnmzRbmdp6JWoXJeXqQ1iex5N4h2dke/TH1Jros= k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e h1:KqK5c/ghOm8xkHYhlodbp6i6+r+ChV2vuAuVRdFbLro= k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0= kernel.org/pub/linux/libs/security/libcap/cap v1.2.76 h1:mrdLPj8ujM6eIKGtd1PkkuCIodpFFDM42Cfm0YODkIM= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/hack/cloud-image-uploader/aws.go new/talosctl-1.10.5/hack/cloud-image-uploader/aws.go --- old/talosctl-1.10.4/hack/cloud-image-uploader/aws.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/hack/cloud-image-uploader/aws.go 2025-07-03 16:21:40.000000000 +0200 @@ -249,7 +249,7 @@ g.Go(func() error { err = au.registerAMIArch(ctx, region, svc, arch, bucketName, uploader) if err != nil { - return fmt.Errorf("error registering AMI for %s: %w", arch, err) + log.Printf("WARNING: aws: ignoring failure to upload AMI into %s/%s: %s", region, arch, err) } return nil @@ -261,7 +261,7 @@ //nolint:gocyclo func (au *AWSUploader) registerAMIArch(ctx context.Context, region string, svc *ec2.Client, arch, bucketName string, uploader *manager.Uploader) error { - err := retry.Constant(15*time.Minute, retry.WithUnits(time.Second), retry.WithErrorLogging(true)).RetryWithContext(ctx, func(ctx context.Context) error { + err := retry.Constant(30*time.Minute, retry.WithUnits(time.Second), retry.WithErrorLogging(true)).RetryWithContext(ctx, func(ctx context.Context) error { source, err := os.Open(au.Options.AWSImage(arch)) if err != nil { return err @@ -285,7 +285,7 @@ return retry.ExpectedError(err) }) if err != nil { - return err + return fmt.Errorf("failed to upload image to the bucket: %w", err) } log.Printf("aws: import into %s/%s, image uploaded to S3", region, arch) @@ -302,7 +302,7 @@ }, }) if err != nil { - return err + return fmt.Errorf("failed to import snapshot: %w", err) } taskID := *resp.ImportTaskId @@ -348,9 +348,7 @@ return retry.ExpectedErrorf("task status not found") }) if err != nil { - log.Printf("WARNING: aws: ignoring failure to import snapshot into %s/%s: %s", region, arch, err) - - return nil //nolint:nilerr + return fmt.Errorf("failed to wait for import task: %w", err) } log.Printf("aws: import into %s/%s, snapshot ID %q", region, arch, snapshotID) @@ -370,7 +368,7 @@ }, }) if err != nil { - return err + return fmt.Errorf("failed to describe images: %w", err) } for _, image := range imageResp.Images { @@ -378,7 +376,7 @@ ImageId: image.ImageId, }) if err != nil { - return err + return fmt.Errorf("failed to deregister image: %w", err) } log.Printf("aws: import into %s/%s, deregistered image ID %q", region, arch, *image.ImageId) @@ -412,7 +410,7 @@ registerResp, err := svc.RegisterImage(ctx, registerReq) if err != nil { - return err + return fmt.Errorf("failed to register image: %w", err) } imageID := *registerResp.ImageId @@ -430,6 +428,9 @@ }, Attribute: aws.String("launchPermission"), }) + if err != nil { + return fmt.Errorf("failed to modify image attribute: %w", err) + } pushResult(CloudImage{ Cloud: "aws", diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/hack/release.toml new/talosctl-1.10.5/hack/release.toml --- old/talosctl-1.10.4/hack/release.toml 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/hack/release.toml 2025-07-03 16:21:40.000000000 +0200 @@ -7,7 +7,7 @@ ignore_deps = ["github.com/coredns/coredns"] # previous release -previous = "v1.10.3" +previous = "v1.10.4" pre_release = false @@ -18,12 +18,20 @@ [notes.updates] title = "Component Updates" - description = """ -Linux: 6.12.31 + description = """\ +Linux: 6.12.35 +Kubernetes: 1.33.2 Talos is built with Go 1.24.4. """ + [notes.azure] + title = "Azure" + description = """\ +Talos on Azure now defaults to MTU of 1400 bytes for the `eth0` interface to avoid packet fragmentation issues. +The default MTU can be overriden with machine configuration. +""" + [make_deps] [make_deps.tools] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/hack/test/e2e.sh new/talosctl-1.10.5/hack/test/e2e.sh --- old/talosctl-1.10.4/hack/test/e2e.sh 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/hack/test/e2e.sh 2025-07-03 16:21:40.000000000 +0200 @@ -33,7 +33,7 @@ # Kubernetes export KUBECONFIG="${TMP}/kubeconfig" -export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.1} +export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.2} export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}" export TIMEOUT=1200 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/internal/app/machined/internal/server/v1alpha1/v1alpha1_images.go new/talosctl-1.10.5/internal/app/machined/internal/server/v1alpha1/v1alpha1_images.go --- old/talosctl-1.10.4/internal/app/machined/internal/server/v1alpha1/v1alpha1_images.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/internal/app/machined/internal/server/v1alpha1/v1alpha1_images.go 2025-07-03 16:21:40.000000000 +0200 @@ -92,7 +92,10 @@ return nil, err } - _, err = image.Pull(ctx, cri.RegistryBuilder(s.Controller.Runtime().State().V1Alpha2().Resources()), client, req.Reference, image.WithSkipIfAlreadyPulled()) + _, err = image.Pull(ctx, cri.RegistryBuilder(s.Controller.Runtime().State().V1Alpha2().Resources()), client, req.Reference, + image.WithSkipIfAlreadyPulled(), + image.WithMaxNotFoundRetries(0), // return an error immediately if the image is not found + ) if err != nil { if errdefs.IsNotFound(err) { return nil, status.Errorf(codes.NotFound, "error pulling image: %s", err) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/internal/app/machined/pkg/controllers/block/user_volume_config.go new/talosctl-1.10.5/internal/app/machined/pkg/controllers/block/user_volume_config.go --- old/talosctl-1.10.4/internal/app/machined/pkg/controllers/block/user_volume_config.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/internal/app/machined/pkg/controllers/block/user_volume_config.go 2025-07-03 16:21:40.000000000 +0200 @@ -78,6 +78,20 @@ return nil } + // create a volume mount request for the root user volume mount point + // to keep it alive and prevent it from being torn down + if err := safe.WriterModify(ctx, r, + block.NewVolumeMountRequest(block.NamespaceName, constants.UserVolumeMountPoint), + func(v *block.VolumeMountRequest) error { + v.TypedSpec().Requester = ctrl.Name() + v.TypedSpec().VolumeID = constants.UserVolumeMountPoint + + return nil + }, + ); err != nil { + return fmt.Errorf("error creating volume mount request for user volume mount point: %w", err) + } + cfg, err := safe.ReaderGetByID[*config.MachineConfig](ctx, r, config.ActiveID) if err != nil && !state.IsNotFoundError(err) { return fmt.Errorf("error fetching machine configuration") diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/internal/app/machined/pkg/controllers/network/operator/vip.go new/talosctl-1.10.5/internal/app/machined/pkg/controllers/network/operator/vip.go --- old/talosctl-1.10.4/internal/app/machined/pkg/controllers/network/operator/vip.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/internal/app/machined/pkg/controllers/network/operator/vip.go 2025-07-03 16:21:40.000000000 +0200 @@ -283,7 +283,6 @@ return nil case event := <-watchCh: // note: here we don't wait for kube-apiserver, as it might not be up on cluster bootstrap, but VIP should be still assigned - // break the loop when etcd is stopped if event.Type == state.Destroyed && event.Resource.Metadata().ID() == "etcd" { return nil diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/azure.go new/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/azure.go --- old/talosctl-1.10.4/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/azure.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/azure.go 2025-07-03 16:21:40.000000000 +0200 @@ -124,6 +124,7 @@ DHCP6: network.DHCP6OperatorSpec{ RouteMetric: 2 * network.DefaultRouteMetric, }, + ConfigLayer: network.ConfigPlatform, }) // If accept_ra is not set, use the default gateway. @@ -160,6 +161,22 @@ return nil, err } + networkConfig.Operators = append(networkConfig.Operators, network.OperatorSpecSpec{ + Operator: network.OperatorDHCP4, + LinkName: "eth0", + RequireUp: true, + ConfigLayer: network.ConfigPlatform, + }) + + networkConfig.Links = append(networkConfig.Links, + network.LinkSpecSpec{ + Name: "eth0", + Up: true, + MTU: 1400, + ConfigLayer: network.ConfigPlatform, + }, + ) + networkConfig.Metadata = &runtimeres.PlatformMetadataSpec{ Platform: a.Name(), Hostname: metadata.OSProfile.ComputerName, diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/testdata/expected.yaml new/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/testdata/expected.yaml --- old/talosctl-1.10.4/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/testdata/expected.yaml 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/testdata/expected.yaml 2025-07-03 16:21:40.000000000 +0200 @@ -1,5 +1,12 @@ addresses: [] -links: [] +links: + - name: eth0 + logical: false + up: true + mtu: 1400 + kind: "" + type: netrom + layer: platform routes: - family: inet6 dst: "" @@ -25,7 +32,11 @@ requireUp: true dhcp6: routeMetric: 2048 - layer: default + layer: platform + - operator: dhcp4 + linkName: eth0 + requireUp: true + layer: platform externalIPs: - 1.2.3.4 - 2603:1020:10:5::34 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/internal/app/machined/pkg/system/services/etcd.go new/talosctl-1.10.5/internal/app/machined/pkg/system/services/etcd.go --- old/talosctl-1.10.4/internal/app/machined/pkg/system/services/etcd.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/internal/app/machined/pkg/system/services/etcd.go 2025-07-03 16:21:40.000000000 +0200 @@ -561,7 +561,7 @@ PeerURLs: getEtcdURLs(spec.AdvertisedAddresses, constants.EtcdPeerPort), - InitialCluster: fmt.Sprintf("%s=%s", spec.Name, formatEtcdURLs(spec.AdvertisedAddresses, constants.EtcdPeerPort)), + InitialCluster: formatClusterURLs(spec.Name, getEtcdURLs(spec.AdvertisedAddresses, constants.EtcdPeerPort)), SkipHashCheck: e.RecoverSkipHashCheck, }); err != nil { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/internal/pkg/containers/image/image.go new/talosctl-1.10.5/internal/pkg/containers/image/image.go --- old/talosctl-1.10.4/internal/pkg/containers/image/image.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/internal/pkg/containers/image/image.go 2025-07-03 16:21:40.000000000 +0200 @@ -6,6 +6,7 @@ import ( "context" + "errors" "fmt" stdlog "log" "time" @@ -34,6 +35,15 @@ // PullOptions configure Pull function. type PullOptions struct { SkipIfAlreadyPulled bool + MaxNotFoundRetries int +} + +// DefaultPullOptions returns default options for Pull function. +func DefaultPullOptions() PullOptions { + return PullOptions{ + SkipIfAlreadyPulled: false, + MaxNotFoundRetries: 5, + } } // WithSkipIfAlreadyPulled skips pulling if image is already pulled and unpacked. @@ -43,6 +53,13 @@ } } +// WithMaxNotFoundRetries sets the maximum number of retries for not found errors. +func WithMaxNotFoundRetries(maxRetries int) PullOption { + return func(opts *PullOptions) { + opts.MaxNotFoundRetries = maxRetries + } +} + // RegistriesBuilder is a function that returns registries configuration. type RegistriesBuilder = func(context.Context) (config.Registries, error) @@ -51,7 +68,7 @@ // //nolint:gocyclo func Pull(ctx context.Context, registryBuilder RegistriesBuilder, client *containerd.Client, ref string, opt ...PullOption) (img containerd.Image, err error) { - var opts PullOptions + opts := DefaultPullOptions() for _, o := range opt { o(&opts) @@ -89,6 +106,8 @@ ctx = log.WithLogger(ctx, containerdLogger.WithField("image", ref)) + notFoundErrors := 0 + err = retry.Exponential(PullTimeout, retry.WithUnits(PullRetryInterval), retry.WithErrorLogging(true)).RetryWithContext(ctx, func(ctx context.Context) error { registriesConfig, err := registryBuilder(ctx) if err != nil { @@ -105,9 +124,12 @@ containerd.WithChildLabelMap(images.ChildGCLabelsFilterLayers), ); err != nil { err = fmt.Errorf("failed to pull image %q: %w", ref, err) + if errors.Is(err, errdefs.ErrNotFound) { + notFoundErrors++ - if errdefs.IsNotFound(err) || errdefs.IsCanceled(err) { - return err + if notFoundErrors > opts.MaxNotFoundRetries { + return err + } } return retry.ExpectedError(err) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/internal/pkg/install/pull.go new/talosctl-1.10.5/internal/pkg/install/pull.go --- old/talosctl-1.10.4/internal/pkg/install/pull.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/internal/pkg/install/pull.go 2025-07-03 16:21:40.000000000 +0200 @@ -35,7 +35,10 @@ defer client.Close() //nolint:errcheck - img, err := image.Pull(containerdctx, registryBuilder, client, ref, image.WithSkipIfAlreadyPulled()) + img, err := image.Pull(containerdctx, registryBuilder, client, ref, + image.WithSkipIfAlreadyPulled(), + image.WithMaxNotFoundRetries(1), + ) if err != nil { return err } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/pkg/machinery/constants/constants.go new/talosctl-1.10.5/pkg/machinery/constants/constants.go --- old/talosctl-1.10.4/pkg/machinery/constants/constants.go 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/pkg/machinery/constants/constants.go 2025-07-03 16:21:40.000000000 +0200 @@ -14,7 +14,7 @@ const ( // DefaultKernelVersion is the default Linux kernel version. - DefaultKernelVersion = "6.12.31-talos" + DefaultKernelVersion = "6.12.35-talos" // KernelParamConfig is the kernel parameter name for specifying the URL. // to the config. @@ -389,7 +389,7 @@ // DefaultKubernetesVersion is the default target version of the control plane. // renovate: datasource=github-releases depName=kubernetes/kubernetes - DefaultKubernetesVersion = "1.33.1" + DefaultKubernetesVersion = "1.33.2" // SupportedKubernetesVersions is the number of Kubernetes versions supported by Talos starting from DefaultKubernesVersion going backwards. SupportedKubernetesVersions = 6 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/pkg/machinery/gendata/data/pkgs new/talosctl-1.10.5/pkg/machinery/gendata/data/pkgs --- old/talosctl-1.10.4/pkg/machinery/gendata/data/pkgs 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/pkg/machinery/gendata/data/pkgs 2025-07-03 16:21:40.000000000 +0200 @@ -1 +1 @@ -v1.10.0-22-g51e388c \ No newline at end of file +v1.10.0-24-g28fa97d \ No newline at end of file diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/pkg/machinery/gendata/data/tag new/talosctl-1.10.5/pkg/machinery/gendata/data/tag --- old/talosctl-1.10.4/pkg/machinery/gendata/data/tag 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/pkg/machinery/gendata/data/tag 2025-07-03 16:21:40.000000000 +0200 @@ -1 +1 @@ -v1.10.4 \ No newline at end of file +v1.10.5 \ No newline at end of file diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/pkg/machinery/version/os-release new/talosctl-1.10.5/pkg/machinery/version/os-release --- old/talosctl-1.10.4/pkg/machinery/version/os-release 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/pkg/machinery/version/os-release 2025-07-03 16:21:40.000000000 +0200 @@ -1,7 +1,7 @@ NAME="Talos" ID=talos -VERSION_ID=v1.10.4 -PRETTY_NAME="Talos (v1.10.4)" +VERSION_ID=v1.10.5 +PRETTY_NAME="Talos (v1.10.5)" HOME_URL="https://www.talos.dev/" BUG_REPORT_URL="https://github.com/siderolabs/talos/issues" VENDOR_NAME="Sidero Labs" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/website/content/v1.10/reference/cli.md new/talosctl-1.10.5/website/content/v1.10/reference/cli.md --- old/talosctl-1.10.4/website/content/v1.10/reference/cli.md 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/website/content/v1.10/reference/cli.md 2025-07-03 16:21:40.000000000 +0200 @@ -144,7 +144,7 @@ --bad-rtc launch VM with bad RTC state (QEMU only) --cidr string CIDR of the cluster network (IPv4, ULA network for IPv6 is derived in automated way) (default "10.5.0.0/24") --cni-bin-path strings search path for CNI binaries (VM only) (default [/home/user/.talos/cni/bin]) - --cni-bundle-url string URL to download CNI bundle from (VM only) (default "https://github.com/siderolabs/talos/releases/download/v1.10.4/talosctl-cni-bundle-${ARCH}.tar.gz") + --cni-bundle-url string URL to download CNI bundle from (VM only) (default "https://github.com/siderolabs/talos/releases/download/v1.10.5/talosctl-cni-bundle-${ARCH}.tar.gz") --cni-cache-dir string CNI cache directory path (VM only) (default "/home/user/.talos/cni/cache") --cni-conf-dir string CNI config directory path (VM only) (default "/home/user/.talos/cni/conf.d") --config-injection-method string a method to inject machine config: default is HTTP server, 'metal-iso' to mount an ISO (QEMU only) @@ -186,7 +186,7 @@ --ipxe-boot-script string iPXE boot script (URL) to use --iso-path string the ISO path to use for the initial boot (VM only) --kubeprism-port int KubePrism port (set to 0 to disable) (default 7445) - --kubernetes-version string desired kubernetes version to run (default "1.33.1") + --kubernetes-version string desired kubernetes version to run (default "1.33.2") --memory int the limit on memory usage in MB (each control plane/VM) (default 2048) --memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048) --mount mount attach a mount to the container (Docker only) @@ -1364,7 +1364,7 @@ -h, --help help for config --install-disk string the disk to install to (default "/dev/sda") --install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest") - --kubernetes-version string desired kubernetes version to run (default "1.33.1") + --kubernetes-version string desired kubernetes version to run (default "1.33.2") -o, --output string destination to output generated files. when multiple output types are specified, it must be a directory. for a single output type, it must either be a file path, or "-" for stdout -t, --output-types strings types of outputs to be generated. valid types are: ["controlplane" "worker" "talosconfig"] (default [controlplane,worker,talosconfig]) -p, --persist the desired persist value for configs (default true) @@ -1797,7 +1797,7 @@ ### Examples ``` -talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.1 --image-cache-path=/tmp/talos-image-cache +talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.2 --image-cache-path=/tmp/talos-image-cache Alternatively, stdin can be piped to the command: talosctl images default | talosctl images cache-create --image-cache-path=/tmp/talos-image-cache --images=- @@ -2982,7 +2982,7 @@ --debug debug operation from kernel logs. --wait is set to true when this flag is set -f, --force force the upgrade (skip checks on etcd health and members, might lead to data loss) -h, --help help for upgrade - -i, --image string the container image to use for performing the install (default "ghcr.io/siderolabs/installer:v1.10.4") + -i, --image string the container image to use for performing the install (default "ghcr.io/siderolabs/installer:v1.10.5") --insecure upgrade using the insecure (encrypted with no auth) maintenance service -m, --reboot-mode string select the reboot mode during upgrade. Mode "powercycle" bypasses kexec. Valid values are: ["default" "powercycle"]. (default "default") -s, --stage stage the upgrade to perform it after a reboot @@ -3029,7 +3029,7 @@ --pre-pull-images pre-pull images before upgrade (default true) --proxy-image string kube-proxy image to use (default "registry.k8s.io/kube-proxy") --scheduler-image string kube-scheduler image to use (default "registry.k8s.io/kube-scheduler") - --to string the Kubernetes control plane version to upgrade to (default "1.33.1") + --to string the Kubernetes control plane version to upgrade to (default "1.33.2") --upgrade-kubelet upgrade kubelet service (default true) --with-docs patch all machine configs adding the documentation for each field (default true) --with-examples patch all machine configs with the commented examples (default true) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.4/website/content/v1.10/reference/configuration/v1alpha1/config.md new/talosctl-1.10.5/website/content/v1.10/reference/configuration/v1alpha1/config.md --- old/talosctl-1.10.4/website/content/v1.10/reference/configuration/v1alpha1/config.md 2025-06-11 14:22:34.000000000 +0200 +++ new/talosctl-1.10.5/website/content/v1.10/reference/configuration/v1alpha1/config.md 2025-07-03 16:21:40.000000000 +0200 @@ -86,7 +86,7 @@ {{< /highlight >}}</details> | | |`kubelet` |<a href="#Config.machine.kubelet">KubeletConfig</a> |Used to provide additional options to the kubelet. <details><summary>Show example(s)</summary>{{< highlight yaml >}} kubelet: - image: ghcr.io/siderolabs/kubelet:v1.33.1 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.33.2 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -497,7 +497,7 @@ {{< highlight yaml >}} machine: kubelet: - image: ghcr.io/siderolabs/kubelet:v1.33.1 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.33.2 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -550,7 +550,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The `image` field is an optional reference to an alternative kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: ghcr.io/siderolabs/kubelet:v1.33.1 +image: ghcr.io/siderolabs/kubelet:v1.33.2 {{< /highlight >}}</details> | | |`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list. <details><summary>Show example(s)</summary>{{< highlight yaml >}} clusterDNS: @@ -2889,7 +2889,7 @@ {{< /highlight >}}</details> | | |`apiServer` |<a href="#Config.cluster.apiServer">APIServerConfig</a> |API server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} apiServer: - image: registry.k8s.io/kube-apiserver:v1.33.1 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.33.2 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -2954,14 +2954,14 @@ {{< /highlight >}}</details> | | |`controllerManager` |<a href="#Config.cluster.controllerManager">ControllerManagerConfig</a> |Controller manager server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.33.1 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.33.2 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true {{< /highlight >}}</details> | | |`proxy` |<a href="#Config.cluster.proxy">ProxyConfig</a> |Kube-proxy server-specific configuration options <details><summary>Show example(s)</summary>{{< highlight yaml >}} proxy: - image: registry.k8s.io/kube-proxy:v1.33.1 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.33.2 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -2972,7 +2972,7 @@ {{< /highlight >}}</details> | | |`scheduler` |<a href="#Config.cluster.scheduler">SchedulerConfig</a> |Scheduler server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} scheduler: - image: registry.k8s.io/kube-scheduler:v1.33.1 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.33.2 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3216,7 +3216,7 @@ {{< highlight yaml >}} cluster: apiServer: - image: registry.k8s.io/kube-apiserver:v1.33.1 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.33.2 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -3284,7 +3284,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the API server manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-apiserver:v1.33.1 +image: registry.k8s.io/kube-apiserver:v1.33.2 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the API server. | | |`extraVolumes` |<a href="#Config.cluster.apiServer.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the API server static pod. | | @@ -3496,7 +3496,7 @@ {{< highlight yaml >}} cluster: controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.33.1 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.33.2 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true @@ -3506,7 +3506,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the controller manager manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-controller-manager:v1.33.1 +image: registry.k8s.io/kube-controller-manager:v1.33.2 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | | |`extraVolumes` |<a href="#Config.cluster.controllerManager.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the controller manager static pod. | | @@ -3576,7 +3576,7 @@ {{< highlight yaml >}} cluster: proxy: - image: registry.k8s.io/kube-proxy:v1.33.1 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.33.2 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -3593,7 +3593,7 @@ disabled: false {{< /highlight >}}</details> | | |`image` |string |The container image used in the kube-proxy manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-proxy:v1.33.1 +image: registry.k8s.io/kube-proxy:v1.33.2 {{< /highlight >}}</details> | | |`mode` |string |<details><summary>proxy mode of kube-proxy.</summary>The default is 'iptables'.</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | | @@ -3612,7 +3612,7 @@ {{< highlight yaml >}} cluster: scheduler: - image: registry.k8s.io/kube-scheduler:v1.33.1 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.33.2 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3622,7 +3622,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the scheduler manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-scheduler:v1.33.1 +image: registry.k8s.io/kube-scheduler:v1.33.2 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | | |`extraVolumes` |<a href="#Config.cluster.scheduler.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the scheduler static pod. | | ++++++ talosctl.obsinfo ++++++ --- /var/tmp/diff_new_pack.hgJCgc/_old 2025-07-06 17:18:02.804118463 +0200 +++ /var/tmp/diff_new_pack.hgJCgc/_new 2025-07-06 17:18:02.808118629 +0200 @@ -1,5 +1,5 @@ name: talosctl -version: 1.10.4 -mtime: 1749644554 -commit: 3c119bf87fdf4a2c8051de53613e7f8796149ef6 +version: 1.10.5 +mtime: 1751552500 +commit: 55fc623313ca69e47b31471c6024a7b05f6b3833 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/talosctl/vendor.tar.gz /work/SRC/openSUSE:Factory/.talosctl.new.1903/vendor.tar.gz differ: char 135, line 1