Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package talosctl for openSUSE:Factory 
checked in at 2025-07-06 17:14:00
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/talosctl (Old)
 and      /work/SRC/openSUSE:Factory/.talosctl.new.1903 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "talosctl"

Sun Jul  6 17:14:00 2025 rev:31 rq:1290575 version:1.10.5

Changes:
--------
--- /work/SRC/openSUSE:Factory/talosctl/talosctl.changes        2025-06-12 
15:55:12.050012825 +0200
+++ /work/SRC/openSUSE:Factory/.talosctl.new.1903/talosctl.changes      
2025-07-06 17:17:59.131966619 +0200
@@ -1,0 +2,7 @@
+Fri Jul  4 05:09:50 UTC 2025 - Johannes Kastl 
<opensuse_buildserv...@ojkastl.de>
+
+- update to 1.10.5:
+  https://github.com/siderolabs/talos/releases/tag/v1.10.5
+  * no CLI-related changes in the Changelog
+
+-------------------------------------------------------------------

Old:
----
  talosctl-1.10.4.obscpio

New:
----
  talosctl-1.10.5.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ talosctl.spec ++++++
--- /var/tmp/diff_new_pack.hgJCgc/_old  2025-07-06 17:18:00.516023850 +0200
+++ /var/tmp/diff_new_pack.hgJCgc/_new  2025-07-06 17:18:00.520024015 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           talosctl
-Version:        1.10.4
+Version:        1.10.5
 Release:        0
 Summary:        CLI to interact with Talos Linux
 License:        MPL-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.hgJCgc/_old  2025-07-06 17:18:00.560025669 +0200
+++ /var/tmp/diff_new_pack.hgJCgc/_new  2025-07-06 17:18:00.564025835 +0200
@@ -4,7 +4,7 @@
     <param name="scm">git</param>
     <param name="exclude">.git</param>
     <param name="exclude">go.work</param>
-    <param name="revision">v1.10.4</param>
+    <param name="revision">v1.10.5</param>
     <param name="match-tag">v*</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="versionrewrite-pattern">v(.*)</param>

++++++ talosctl-1.10.4.obscpio -> talosctl-1.10.5.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/CHANGELOG.md 
new/talosctl-1.10.5/CHANGELOG.md
--- old/talosctl-1.10.4/CHANGELOG.md    2025-06-11 14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/CHANGELOG.md    2025-07-03 16:21:40.000000000 +0200
@@ -1,3 +1,69 @@
+## [Talos 1.10.5](https://github.com/siderolabs/talos/releases/tag/v1.10.5) 
(2025-07-03)
+
+Welcome to the v1.10.5 release of Talos!
+
+
+
+Please try out the release binaries and report any issues at
+https://github.com/siderolabs/talos/issues.
+
+### Azure
+
+Talos on Azure now defaults to MTU of 1400 bytes for the `eth0` interface to 
avoid packet fragmentation issues.
+The default MTU can be overriden with machine configuration.
+
+
+### Component Updates
+
+Linux: 6.12.35
+Kubernetes: 1.33.2
+
+Talos is built with Go 1.24.4.
+
+
+### Contributors
+
+* Andrey Smirnov
+* Noel Georgi
+
+### Changes
+<details><summary>8 commits</summary>
+<p>
+
+* 
[`b84e15037`](https://github.com/siderolabs/talos/commit/b84e15037c3acc2b2f92543f11faf5c5a5cb1627)
 feat: update Kubernetes default to 1.33.2
+* 
[`2017ec228`](https://github.com/siderolabs/talos/commit/2017ec228d7903ffc2bf92a74fb7d525172dcf87)
 fix: add limited retries for not found images
+* 
[`b3e510ac5`](https://github.com/siderolabs/talos/commit/b3e510ac5a8002c9afc188b6e05b56047d3a3060)
 chore: improve cloud image uploader resilience
+* 
[`4a40cddbb`](https://github.com/siderolabs/talos/commit/4a40cddbbf190dd90322a6b7cd0c7cd485ccef67)
 fix: hold user volume mount point across kubelet restarts
+* 
[`9e1f347f5`](https://github.com/siderolabs/talos/commit/9e1f347f5a098159067c6c555da27a3db361f4ea)
 fix: etcd recover with multiple advertised addresses
+* 
[`f85ff5fa8`](https://github.com/siderolabs/talos/commit/f85ff5fa8dc447c19f3db20c31f59bfc0cc2d0c3)
 feat: update Linux to 6.12.35
+* 
[`87ed1b589`](https://github.com/siderolabs/talos/commit/87ed1b589343d8a7cc939a65af9c0b9ce4d3633d)
 fix: treat context canceled as expected error on image pull
+* 
[`9a0644a64`](https://github.com/siderolabs/talos/commit/9a0644a64fad894f481298185b636e862ba3b87d)
 fix: set default MTU on Azure to 1400
+</p>
+</details>
+
+### Changes from siderolabs/pkgs
+<details><summary>2 commits</summary>
+<p>
+
+* 
[`28fa97d`](https://github.com/siderolabs/pkgs/commit/28fa97deebdb72d278aef5406676eaeafad0fe77)
 fix: iptables url
+* 
[`6109fe6`](https://github.com/siderolabs/pkgs/commit/6109fe67ce5d335f8de68ffbad4b3944c6b4da4e)
 feat: update dependencies
+</p>
+</details>
+
+### Dependency Changes
+
+* **github.com/siderolabs/pkgs**     v1.10.0-22-g51e388c -> v1.10.0-24-g28fa97d
+* **k8s.io/api**                     v0.33.1 -> v0.33.2
+* **k8s.io/apiserver**               v0.33.1 -> v0.33.2
+* **k8s.io/client-go**               v0.33.1 -> v0.33.2
+* **k8s.io/component-base**          v0.33.1 -> v0.33.2
+* **k8s.io/kube-scheduler**          v0.33.1 -> v0.33.2
+* **k8s.io/kubectl**                 v0.33.1 -> v0.33.2
+* **k8s.io/kubelet**                 v0.33.1 -> v0.33.2
+* **k8s.io/pod-security-admission**  v0.33.1 -> v0.33.2
+
+Previous release can be found at 
[v1.10.4](https://github.com/siderolabs/talos/releases/tag/v1.10.4)
+
 ## [Talos 1.10.4](https://github.com/siderolabs/talos/releases/tag/v1.10.4) 
(2025-06-11)
 
 Welcome to the v1.10.4 release of Talos!
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/Makefile new/talosctl-1.10.5/Makefile
--- old/talosctl-1.10.4/Makefile        2025-06-11 14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/Makefile        2025-07-03 16:21:40.000000000 +0200
@@ -27,7 +27,7 @@
 TOOLS_PREFIX ?= ghcr.io/siderolabs/tools
 TOOLS ?= v1.10.0-4-g9d54ed4
 PKGS_PREFIX ?= ghcr.io/siderolabs
-PKGS ?= v1.10.0-22-g51e388c
+PKGS ?= v1.10.0-24-g28fa97d
 
 KRES_IMAGE ?= ghcr.io/siderolabs/kres:latest
 CONFORMANCE_IMAGE ?= ghcr.io/siderolabs/conform:latest
@@ -125,7 +125,7 @@
 INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM)
 INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := 
integration-test-provision-$(OPERATING_SYSTEM)
 # renovate: datasource=github-releases depName=kubernetes/kubernetes
-KUBECTL_VERSION ?= v1.33.1
+KUBECTL_VERSION ?= v1.33.2
 # renovate: datasource=github-releases depName=kastenhq/kubestr
 KUBESTR_VERSION ?= v0.4.48
 # renovate: datasource=github-releases depName=helm/helm
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/go.mod new/talosctl-1.10.5/go.mod
--- old/talosctl-1.10.4/go.mod  2025-06-11 14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/go.mod  2025-07-03 16:21:40.000000000 +0200
@@ -35,16 +35,16 @@
 
 // Kubernetes dependencies sharing the same version.
 require (
-       k8s.io/api v0.33.1
-       k8s.io/apimachinery v0.33.1
-       k8s.io/apiserver v0.33.1
-       k8s.io/client-go v0.33.1
-       k8s.io/component-base v0.33.1
-       k8s.io/cri-api v0.33.1
-       k8s.io/kube-scheduler v0.33.1
-       k8s.io/kubectl v0.33.1
-       k8s.io/kubelet v0.33.1
-       k8s.io/pod-security-admission v0.33.1
+       k8s.io/api v0.33.2
+       k8s.io/apimachinery v0.33.2
+       k8s.io/apiserver v0.33.2
+       k8s.io/client-go v0.33.2
+       k8s.io/component-base v0.33.2
+       k8s.io/cri-api v0.33.2
+       k8s.io/kube-scheduler v0.33.2
+       k8s.io/kubectl v0.33.2
+       k8s.io/kubelet v0.33.2
+       k8s.io/pod-security-admission v0.33.2
 )
 
 require (
@@ -165,7 +165,7 @@
        github.com/siderolabs/net v0.4.0
        github.com/siderolabs/proto-codec v0.1.2
        github.com/siderolabs/siderolink v0.3.15
-       github.com/siderolabs/talos/pkg/machinery v1.10.4
+       github.com/siderolabs/talos/pkg/machinery v1.10.5
        github.com/sirupsen/logrus v1.9.3
        github.com/spf13/cobra v1.9.1
        github.com/spf13/pflag v1.0.6
@@ -233,7 +233,7 @@
        github.com/cespare/xxhash/v2 v2.3.0 // indirect
        github.com/chai2010/gettext-go v1.0.2 // indirect
        github.com/cilium/ebpf v0.17.3 // indirect
-       github.com/cloudflare/circl v1.6.0 // indirect
+       github.com/cloudflare/circl v1.6.1 // indirect
        github.com/containerd/continuity v0.4.4 // indirect
        github.com/containerd/errdefs/pkg v0.3.0 // indirect
        github.com/containerd/fifo v1.1.0 // indirect
@@ -364,7 +364,7 @@
        gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
        gopkg.in/inf.v0 v0.9.1 // indirect
        gopkg.in/yaml.v2 v2.4.0 // indirect
-       k8s.io/cli-runtime v0.33.1 // indirect
+       k8s.io/cli-runtime v0.33.2 // indirect
        k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff // indirect
        k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e // indirect
        kernel.org/pub/linux/libs/security/libcap/psx v1.2.76 // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/go.sum new/talosctl-1.10.5/go.sum
--- old/talosctl-1.10.4/go.sum  2025-06-11 14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/go.sum  2025-07-03 16:21:40.000000000 +0200
@@ -116,8 +116,8 @@
 github.com/cilium/ebpf v0.17.3 h1:FnP4r16PWYSE4ux6zN+//jMcW4nMVRvuTLVTvCjyyjg=
 github.com/cilium/ebpf v0.17.3/go.mod 
h1:G5EDHij8yiLzaqn0WjyfJHvRa+3aDlReIaLVRMvOyJk=
 github.com/client9/misspell v0.3.4/go.mod 
h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw=
-github.com/cloudflare/circl v1.6.0 
h1:cr5JKic4HI+LkINy2lg3W2jF8sHCVTBncJr5gIIq7qk=
-github.com/cloudflare/circl v1.6.0/go.mod 
h1:uddAzsPgqdMAYatqJ0lsjX1oECcQLIlRpzZh3pJrofs=
+github.com/cloudflare/circl v1.6.1 
h1:zqIqSPIndyBh1bjLVVDHMPpVKqp8Su/V+6MeDzzQBQ0=
+github.com/cloudflare/circl v1.6.1/go.mod 
h1:uddAzsPgqdMAYatqJ0lsjX1oECcQLIlRpzZh3pJrofs=
 github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod 
h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc=
 github.com/cncf/udpa/go v0.0.0-20200629203442-efcf912fb354/go.mod 
h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
 github.com/cncf/udpa/go v0.0.0-20201120205902-5459f2c99403/go.mod 
h1:WmhPx2Nbnhtbo57+VJT5O0JRkEi1Wbu0z5j0R8u5Hbk=
@@ -1105,32 +1105,32 @@
 honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod 
h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
 honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod 
h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
 honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod 
h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
-k8s.io/api v0.33.1 h1:tA6Cf3bHnLIrUK4IqEgb2v++/GYUtqiu9sRVk3iBXyw=
-k8s.io/api v0.33.1/go.mod h1:87esjTn9DRSRTD4fWMXamiXxJhpOIREjWOSjsW1kEHw=
-k8s.io/apimachinery v0.33.1 h1:mzqXWV8tW9Rw4VeW9rEkqvnxj59k1ezDUl20tFK/oM4=
-k8s.io/apimachinery v0.33.1/go.mod 
h1:BHW0YOu7n22fFv/JkYOEfkUYNRN0fj0BlvMFWA7b+SM=
-k8s.io/apiserver v0.33.1 h1:yLgLUPDVC6tHbNcw5uE9mo1T6ELhJj7B0geifra3Qdo=
-k8s.io/apiserver v0.33.1/go.mod h1:VMbE4ArWYLO01omz+k8hFjAdYfc3GVAYPrhP2tTKccs=
-k8s.io/cli-runtime v0.33.1 h1:TvpjEtF71ViFmPeYMj1baZMJR4iWUEplklsUQ7D3quA=
-k8s.io/cli-runtime v0.33.1/go.mod 
h1:9dz5Q4Uh8io4OWCLiEf/217DXwqNgiTS/IOuza99VZE=
-k8s.io/client-go v0.33.1 h1:ZZV/Ks2g92cyxWkRRnfUDsnhNn28eFpt26aGc8KbXF4=
-k8s.io/client-go v0.33.1/go.mod h1:JAsUrl1ArO7uRVFWfcj6kOomSlCv+JpvIsp6usAGefA=
-k8s.io/component-base v0.33.1 h1:EoJ0xA+wr77T+G8p6T3l4efT2oNwbqBVKR71E0tBIaI=
-k8s.io/component-base v0.33.1/go.mod 
h1:guT/w/6piyPfTgq7gfvgetyXMIh10zuXA6cRRm3rDuY=
-k8s.io/cri-api v0.33.1 h1:CEvLiHZm/uTTp/5qsesU8/OG1a56RPnwMk4Ae73bUvs=
-k8s.io/cri-api v0.33.1/go.mod h1:OLQvT45OpIA+tv91ZrpuFIGY+Y2Ho23poS7n115Aocs=
+k8s.io/api v0.33.2 h1:YgwIS5jKfA+BZg//OQhkJNIfie/kmRsO0BmNaVSimvY=
+k8s.io/api v0.33.2/go.mod h1:fhrbphQJSM2cXzCWgqU29xLDuks4mu7ti9vveEnpSXs=
+k8s.io/apimachinery v0.33.2 h1:IHFVhqg59mb8PJWTLi8m1mAoepkUNYmptHsV+Z1m5jY=
+k8s.io/apimachinery v0.33.2/go.mod 
h1:BHW0YOu7n22fFv/JkYOEfkUYNRN0fj0BlvMFWA7b+SM=
+k8s.io/apiserver v0.33.2 h1:KGTRbxn2wJagJowo29kKBp4TchpO1DRO3g+dB/KOJN4=
+k8s.io/apiserver v0.33.2/go.mod h1:9qday04wEAMLPWWo9AwqCZSiIn3OYSZacDyu/AcoM/M=
+k8s.io/cli-runtime v0.33.2 h1:koNYQKSDdq5AExa/RDudXMhhtFasEg48KLS2KSAU74Y=
+k8s.io/cli-runtime v0.33.2/go.mod 
h1:gnhsAWpovqf1Zj5YRRBBU7PFsRc6NkEkwYNQE+mXL88=
+k8s.io/client-go v0.33.2 h1:z8CIcc0P581x/J1ZYf4CNzRKxRvQAwoAolYPbtQes+E=
+k8s.io/client-go v0.33.2/go.mod h1:9mCgT4wROvL948w6f6ArJNb7yQd7QsvqavDeZHvNmHo=
+k8s.io/component-base v0.33.2 h1:sCCsn9s/dG3ZrQTX/Us0/Sx2R0G5kwa0wbZFYoVp/+0=
+k8s.io/component-base v0.33.2/go.mod 
h1:/41uw9wKzuelhN+u+/C59ixxf4tYQKW7p32ddkYNe2k=
+k8s.io/cri-api v0.33.2 h1:1OiWm6gUx7JrN+xqxMzGDCPfPxVT8b6n7B6SeYl5luM=
+k8s.io/cri-api v0.33.2/go.mod h1:OLQvT45OpIA+tv91ZrpuFIGY+Y2Ho23poS7n115Aocs=
 k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
 k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
 k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff 
h1:/usPimJzUKKu+m+TE36gUyGcf03XZEP0ZIKgKj35LS4=
 k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff/go.mod 
h1:5jIi+8yX4RIb8wk3XwBo5Pq2ccx4FP10ohkbSKCZoK8=
-k8s.io/kube-scheduler v0.33.1 h1:0WfBGqrfy3HzqgIVxIRpq+iYQKMgh24vcmAlvDYRkzo=
-k8s.io/kube-scheduler v0.33.1/go.mod 
h1:Gz6+HUJcGvIkRk1PRLVniVwYasVvNhjhTbZWPh2gJ+8=
-k8s.io/kubectl v0.33.1 h1:OJUXa6FV5bap6iRy345ezEjU9dTLxqv1zFTVqmeHb6A=
-k8s.io/kubectl v0.33.1/go.mod h1:Z07pGqXoP4NgITlPRrnmiM3qnoo1QrK1zjw85Aiz8J0=
-k8s.io/kubelet v0.33.1 h1:x4LCw1/iZVWOKA4RoITnuB8gMHnw31HPB3S0EF0EexE=
-k8s.io/kubelet v0.33.1/go.mod h1:8WpdC9M95VmsqIdGSQrajXooTfT5otEj8pGWOm+KKfQ=
-k8s.io/pod-security-admission v0.33.1 
h1:amePfcTDgLHB1wpZFIO7chW3Pc/ikeYbniuMTQEcaB4=
-k8s.io/pod-security-admission v0.33.1/go.mod 
h1:3gSyP5JPgte2EHjQheA81299vISL6D7DDvk2m9RQj6k=
+k8s.io/kube-scheduler v0.33.2 h1:B6W7oldVnH6aIGAxh7HNHIV2YoPOoAUzqzlzUJsg/B0=
+k8s.io/kube-scheduler v0.33.2/go.mod 
h1:+1TrLmFINNQdEKGtxkgs0KY/5vDeOYIpiysMcVHwjls=
+k8s.io/kubectl v0.33.2 h1:7XKZ6DYCklu5MZQzJe+CkCjoGZwD1wWl7t/FxzhMz7Y=
+k8s.io/kubectl v0.33.2/go.mod h1:8rC67FB8tVTYraovAGNi/idWIK90z2CHFNMmGJZJ3KI=
+k8s.io/kubelet v0.33.2 h1:wxEau5/563oJb3j3KfrCKlNWWx35YlSgDLOYUBCQ0pg=
+k8s.io/kubelet v0.33.2/go.mod h1:way8VCDTUMiX1HTOvJv7M3xS/xNysJI6qh7TOqMe5KM=
+k8s.io/pod-security-admission v0.33.2 
h1:XRm2Q50aFtB61qVG1Fqyn3sw1A4RaFL4HRzF3LOAq/M=
+k8s.io/pod-security-admission v0.33.2/go.mod 
h1:e6wsjnmzRbmdp6JWoXJeXqQ1iex5N4h2dke/TH1Jros=
 k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e 
h1:KqK5c/ghOm8xkHYhlodbp6i6+r+ChV2vuAuVRdFbLro=
 k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e/go.mod 
h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
 kernel.org/pub/linux/libs/security/libcap/cap v1.2.76 
h1:mrdLPj8ujM6eIKGtd1PkkuCIodpFFDM42Cfm0YODkIM=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/hack/cloud-image-uploader/aws.go 
new/talosctl-1.10.5/hack/cloud-image-uploader/aws.go
--- old/talosctl-1.10.4/hack/cloud-image-uploader/aws.go        2025-06-11 
14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/hack/cloud-image-uploader/aws.go        2025-07-03 
16:21:40.000000000 +0200
@@ -249,7 +249,7 @@
                g.Go(func() error {
                        err = au.registerAMIArch(ctx, region, svc, arch, 
bucketName, uploader)
                        if err != nil {
-                               return fmt.Errorf("error registering AMI for 
%s: %w", arch, err)
+                               log.Printf("WARNING: aws: ignoring failure to 
upload AMI into %s/%s: %s", region, arch, err)
                        }
 
                        return nil
@@ -261,7 +261,7 @@
 
 //nolint:gocyclo
 func (au *AWSUploader) registerAMIArch(ctx context.Context, region string, svc 
*ec2.Client, arch, bucketName string, uploader *manager.Uploader) error {
-       err := retry.Constant(15*time.Minute, retry.WithUnits(time.Second), 
retry.WithErrorLogging(true)).RetryWithContext(ctx, func(ctx context.Context) 
error {
+       err := retry.Constant(30*time.Minute, retry.WithUnits(time.Second), 
retry.WithErrorLogging(true)).RetryWithContext(ctx, func(ctx context.Context) 
error {
                source, err := os.Open(au.Options.AWSImage(arch))
                if err != nil {
                        return err
@@ -285,7 +285,7 @@
                return retry.ExpectedError(err)
        })
        if err != nil {
-               return err
+               return fmt.Errorf("failed to upload image to the bucket: %w", 
err)
        }
 
        log.Printf("aws: import into %s/%s, image uploaded to S3", region, arch)
@@ -302,7 +302,7 @@
                },
        })
        if err != nil {
-               return err
+               return fmt.Errorf("failed to import snapshot: %w", err)
        }
 
        taskID := *resp.ImportTaskId
@@ -348,9 +348,7 @@
                return retry.ExpectedErrorf("task status not found")
        })
        if err != nil {
-               log.Printf("WARNING: aws: ignoring failure to import snapshot 
into %s/%s: %s", region, arch, err)
-
-               return nil //nolint:nilerr
+               return fmt.Errorf("failed to wait for import task: %w", err)
        }
 
        log.Printf("aws: import into %s/%s, snapshot ID %q", region, arch, 
snapshotID)
@@ -370,7 +368,7 @@
                },
        })
        if err != nil {
-               return err
+               return fmt.Errorf("failed to describe images: %w", err)
        }
 
        for _, image := range imageResp.Images {
@@ -378,7 +376,7 @@
                        ImageId: image.ImageId,
                })
                if err != nil {
-                       return err
+                       return fmt.Errorf("failed to deregister image: %w", err)
                }
 
                log.Printf("aws: import into %s/%s, deregistered image ID %q", 
region, arch, *image.ImageId)
@@ -412,7 +410,7 @@
 
        registerResp, err := svc.RegisterImage(ctx, registerReq)
        if err != nil {
-               return err
+               return fmt.Errorf("failed to register image: %w", err)
        }
 
        imageID := *registerResp.ImageId
@@ -430,6 +428,9 @@
                },
                Attribute: aws.String("launchPermission"),
        })
+       if err != nil {
+               return fmt.Errorf("failed to modify image attribute: %w", err)
+       }
 
        pushResult(CloudImage{
                Cloud:  "aws",
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/hack/release.toml 
new/talosctl-1.10.5/hack/release.toml
--- old/talosctl-1.10.4/hack/release.toml       2025-06-11 14:22:34.000000000 
+0200
+++ new/talosctl-1.10.5/hack/release.toml       2025-07-03 16:21:40.000000000 
+0200
@@ -7,7 +7,7 @@
 ignore_deps = ["github.com/coredns/coredns"]
 
 # previous release
-previous = "v1.10.3"
+previous = "v1.10.4"
 
 pre_release = false
 
@@ -18,12 +18,20 @@
 
     [notes.updates]
         title = "Component Updates"
-        description = """
-Linux: 6.12.31
+        description = """\
+Linux: 6.12.35
+Kubernetes: 1.33.2
 
 Talos is built with Go 1.24.4.
 """
 
+    [notes.azure]
+        title = "Azure"
+        description = """\
+Talos on Azure now defaults to MTU of 1400 bytes for the `eth0` interface to 
avoid packet fragmentation issues.
+The default MTU can be overriden with machine configuration.
+"""
+
 [make_deps]
 
     [make_deps.tools]
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/hack/test/e2e.sh 
new/talosctl-1.10.5/hack/test/e2e.sh
--- old/talosctl-1.10.4/hack/test/e2e.sh        2025-06-11 14:22:34.000000000 
+0200
+++ new/talosctl-1.10.5/hack/test/e2e.sh        2025-07-03 16:21:40.000000000 
+0200
@@ -33,7 +33,7 @@
 # Kubernetes
 
 export KUBECONFIG="${TMP}/kubeconfig"
-export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.1}
+export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.2}
 
 export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}"
 export TIMEOUT=1200
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/internal/app/machined/internal/server/v1alpha1/v1alpha1_images.go
 
new/talosctl-1.10.5/internal/app/machined/internal/server/v1alpha1/v1alpha1_images.go
--- 
old/talosctl-1.10.4/internal/app/machined/internal/server/v1alpha1/v1alpha1_images.go
       2025-06-11 14:22:34.000000000 +0200
+++ 
new/talosctl-1.10.5/internal/app/machined/internal/server/v1alpha1/v1alpha1_images.go
       2025-07-03 16:21:40.000000000 +0200
@@ -92,7 +92,10 @@
                return nil, err
        }
 
-       _, err = image.Pull(ctx, 
cri.RegistryBuilder(s.Controller.Runtime().State().V1Alpha2().Resources()), 
client, req.Reference, image.WithSkipIfAlreadyPulled())
+       _, err = image.Pull(ctx, 
cri.RegistryBuilder(s.Controller.Runtime().State().V1Alpha2().Resources()), 
client, req.Reference,
+               image.WithSkipIfAlreadyPulled(),
+               image.WithMaxNotFoundRetries(0), // return an error immediately 
if the image is not found
+       )
        if err != nil {
                if errdefs.IsNotFound(err) {
                        return nil, status.Errorf(codes.NotFound, "error 
pulling image: %s", err)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/internal/app/machined/pkg/controllers/block/user_volume_config.go
 
new/talosctl-1.10.5/internal/app/machined/pkg/controllers/block/user_volume_config.go
--- 
old/talosctl-1.10.4/internal/app/machined/pkg/controllers/block/user_volume_config.go
       2025-06-11 14:22:34.000000000 +0200
+++ 
new/talosctl-1.10.5/internal/app/machined/pkg/controllers/block/user_volume_config.go
       2025-07-03 16:21:40.000000000 +0200
@@ -78,6 +78,20 @@
                        return nil
                }
 
+               // create a volume mount request for the root user volume mount 
point
+               // to keep it alive and prevent it from being torn down
+               if err := safe.WriterModify(ctx, r,
+                       block.NewVolumeMountRequest(block.NamespaceName, 
constants.UserVolumeMountPoint),
+                       func(v *block.VolumeMountRequest) error {
+                               v.TypedSpec().Requester = ctrl.Name()
+                               v.TypedSpec().VolumeID = 
constants.UserVolumeMountPoint
+
+                               return nil
+                       },
+               ); err != nil {
+                       return fmt.Errorf("error creating volume mount request 
for user volume mount point: %w", err)
+               }
+
                cfg, err := safe.ReaderGetByID[*config.MachineConfig](ctx, r, 
config.ActiveID)
                if err != nil && !state.IsNotFoundError(err) {
                        return fmt.Errorf("error fetching machine 
configuration")
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/internal/app/machined/pkg/controllers/network/operator/vip.go
 
new/talosctl-1.10.5/internal/app/machined/pkg/controllers/network/operator/vip.go
--- 
old/talosctl-1.10.4/internal/app/machined/pkg/controllers/network/operator/vip.go
   2025-06-11 14:22:34.000000000 +0200
+++ 
new/talosctl-1.10.5/internal/app/machined/pkg/controllers/network/operator/vip.go
   2025-07-03 16:21:40.000000000 +0200
@@ -283,7 +283,6 @@
                        return nil
                case event := <-watchCh:
                        // note: here we don't wait for kube-apiserver, as it 
might not be up on cluster bootstrap, but VIP should be still assigned
-
                        // break the loop when etcd is stopped
                        if event.Type == state.Destroyed && 
event.Resource.Metadata().ID() == "etcd" {
                                return nil
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/azure.go
 
new/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/azure.go
--- 
old/talosctl-1.10.4/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/azure.go
      2025-06-11 14:22:34.000000000 +0200
+++ 
new/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/azure.go
      2025-07-03 16:21:40.000000000 +0200
@@ -124,6 +124,7 @@
                                DHCP6: network.DHCP6OperatorSpec{
                                        RouteMetric: 2 * 
network.DefaultRouteMetric,
                                },
+                               ConfigLayer: network.ConfigPlatform,
                        })
 
                        // If accept_ra is not set, use the default gateway.
@@ -160,6 +161,22 @@
                return nil, err
        }
 
+       networkConfig.Operators = append(networkConfig.Operators, 
network.OperatorSpecSpec{
+               Operator:    network.OperatorDHCP4,
+               LinkName:    "eth0",
+               RequireUp:   true,
+               ConfigLayer: network.ConfigPlatform,
+       })
+
+       networkConfig.Links = append(networkConfig.Links,
+               network.LinkSpecSpec{
+                       Name:        "eth0",
+                       Up:          true,
+                       MTU:         1400,
+                       ConfigLayer: network.ConfigPlatform,
+               },
+       )
+
        networkConfig.Metadata = &runtimeres.PlatformMetadataSpec{
                Platform:     a.Name(),
                Hostname:     metadata.OSProfile.ComputerName,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/testdata/expected.yaml
 
new/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/testdata/expected.yaml
--- 
old/talosctl-1.10.4/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/testdata/expected.yaml
        2025-06-11 14:22:34.000000000 +0200
+++ 
new/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/platform/azure/testdata/expected.yaml
        2025-07-03 16:21:40.000000000 +0200
@@ -1,5 +1,12 @@
 addresses: []
-links: []
+links:
+    - name: eth0
+      logical: false
+      up: true
+      mtu: 1400
+      kind: ""
+      type: netrom
+      layer: platform
 routes:
     - family: inet6
       dst: ""
@@ -25,7 +32,11 @@
       requireUp: true
       dhcp6:
         routeMetric: 2048
-      layer: default
+      layer: platform
+    - operator: dhcp4
+      linkName: eth0
+      requireUp: true
+      layer: platform
 externalIPs:
     - 1.2.3.4
     - 2603:1020:10:5::34
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/internal/app/machined/pkg/system/services/etcd.go 
new/talosctl-1.10.5/internal/app/machined/pkg/system/services/etcd.go
--- old/talosctl-1.10.4/internal/app/machined/pkg/system/services/etcd.go       
2025-06-11 14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/internal/app/machined/pkg/system/services/etcd.go       
2025-07-03 16:21:40.000000000 +0200
@@ -561,7 +561,7 @@
 
                PeerURLs: getEtcdURLs(spec.AdvertisedAddresses, 
constants.EtcdPeerPort),
 
-               InitialCluster: fmt.Sprintf("%s=%s", spec.Name, 
formatEtcdURLs(spec.AdvertisedAddresses, constants.EtcdPeerPort)),
+               InitialCluster: formatClusterURLs(spec.Name, 
getEtcdURLs(spec.AdvertisedAddresses, constants.EtcdPeerPort)),
 
                SkipHashCheck: e.RecoverSkipHashCheck,
        }); err != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/internal/pkg/containers/image/image.go 
new/talosctl-1.10.5/internal/pkg/containers/image/image.go
--- old/talosctl-1.10.4/internal/pkg/containers/image/image.go  2025-06-11 
14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/internal/pkg/containers/image/image.go  2025-07-03 
16:21:40.000000000 +0200
@@ -6,6 +6,7 @@
 
 import (
        "context"
+       "errors"
        "fmt"
        stdlog "log"
        "time"
@@ -34,6 +35,15 @@
 // PullOptions configure Pull function.
 type PullOptions struct {
        SkipIfAlreadyPulled bool
+       MaxNotFoundRetries  int
+}
+
+// DefaultPullOptions returns default options for Pull function.
+func DefaultPullOptions() PullOptions {
+       return PullOptions{
+               SkipIfAlreadyPulled: false,
+               MaxNotFoundRetries:  5,
+       }
 }
 
 // WithSkipIfAlreadyPulled skips pulling if image is already pulled and 
unpacked.
@@ -43,6 +53,13 @@
        }
 }
 
+// WithMaxNotFoundRetries sets the maximum number of retries for not found 
errors.
+func WithMaxNotFoundRetries(maxRetries int) PullOption {
+       return func(opts *PullOptions) {
+               opts.MaxNotFoundRetries = maxRetries
+       }
+}
+
 // RegistriesBuilder is a function that returns registries configuration.
 type RegistriesBuilder = func(context.Context) (config.Registries, error)
 
@@ -51,7 +68,7 @@
 //
 //nolint:gocyclo
 func Pull(ctx context.Context, registryBuilder RegistriesBuilder, client 
*containerd.Client, ref string, opt ...PullOption) (img containerd.Image, err 
error) {
-       var opts PullOptions
+       opts := DefaultPullOptions()
 
        for _, o := range opt {
                o(&opts)
@@ -89,6 +106,8 @@
 
        ctx = log.WithLogger(ctx, containerdLogger.WithField("image", ref))
 
+       notFoundErrors := 0
+
        err = retry.Exponential(PullTimeout, 
retry.WithUnits(PullRetryInterval), 
retry.WithErrorLogging(true)).RetryWithContext(ctx, func(ctx context.Context) 
error {
                registriesConfig, err := registryBuilder(ctx)
                if err != nil {
@@ -105,9 +124,12 @@
                        
containerd.WithChildLabelMap(images.ChildGCLabelsFilterLayers),
                ); err != nil {
                        err = fmt.Errorf("failed to pull image %q: %w", ref, 
err)
+                       if errors.Is(err, errdefs.ErrNotFound) {
+                               notFoundErrors++
 
-                       if errdefs.IsNotFound(err) || errdefs.IsCanceled(err) {
-                               return err
+                               if notFoundErrors > opts.MaxNotFoundRetries {
+                                       return err
+                               }
                        }
 
                        return retry.ExpectedError(err)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/internal/pkg/install/pull.go 
new/talosctl-1.10.5/internal/pkg/install/pull.go
--- old/talosctl-1.10.4/internal/pkg/install/pull.go    2025-06-11 
14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/internal/pkg/install/pull.go    2025-07-03 
16:21:40.000000000 +0200
@@ -35,7 +35,10 @@
 
        defer client.Close() //nolint:errcheck
 
-       img, err := image.Pull(containerdctx, registryBuilder, client, ref, 
image.WithSkipIfAlreadyPulled())
+       img, err := image.Pull(containerdctx, registryBuilder, client, ref,
+               image.WithSkipIfAlreadyPulled(),
+               image.WithMaxNotFoundRetries(1),
+       )
        if err != nil {
                return err
        }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/pkg/machinery/constants/constants.go 
new/talosctl-1.10.5/pkg/machinery/constants/constants.go
--- old/talosctl-1.10.4/pkg/machinery/constants/constants.go    2025-06-11 
14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/pkg/machinery/constants/constants.go    2025-07-03 
16:21:40.000000000 +0200
@@ -14,7 +14,7 @@
 
 const (
        // DefaultKernelVersion is the default Linux kernel version.
-       DefaultKernelVersion = "6.12.31-talos"
+       DefaultKernelVersion = "6.12.35-talos"
 
        // KernelParamConfig is the kernel parameter name for specifying the 
URL.
        // to the config.
@@ -389,7 +389,7 @@
 
        // DefaultKubernetesVersion is the default target version of the 
control plane.
        // renovate: datasource=github-releases depName=kubernetes/kubernetes
-       DefaultKubernetesVersion = "1.33.1"
+       DefaultKubernetesVersion = "1.33.2"
 
        // SupportedKubernetesVersions is the number of Kubernetes versions 
supported by Talos starting from DefaultKubernesVersion going backwards.
        SupportedKubernetesVersions = 6
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/pkg/machinery/gendata/data/pkgs 
new/talosctl-1.10.5/pkg/machinery/gendata/data/pkgs
--- old/talosctl-1.10.4/pkg/machinery/gendata/data/pkgs 2025-06-11 
14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/pkg/machinery/gendata/data/pkgs 2025-07-03 
16:21:40.000000000 +0200
@@ -1 +1 @@
-v1.10.0-22-g51e388c
\ No newline at end of file
+v1.10.0-24-g28fa97d
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/pkg/machinery/gendata/data/tag 
new/talosctl-1.10.5/pkg/machinery/gendata/data/tag
--- old/talosctl-1.10.4/pkg/machinery/gendata/data/tag  2025-06-11 
14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/pkg/machinery/gendata/data/tag  2025-07-03 
16:21:40.000000000 +0200
@@ -1 +1 @@
-v1.10.4
\ No newline at end of file
+v1.10.5
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.4/pkg/machinery/version/os-release 
new/talosctl-1.10.5/pkg/machinery/version/os-release
--- old/talosctl-1.10.4/pkg/machinery/version/os-release        2025-06-11 
14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/pkg/machinery/version/os-release        2025-07-03 
16:21:40.000000000 +0200
@@ -1,7 +1,7 @@
 NAME="Talos"
 ID=talos
-VERSION_ID=v1.10.4
-PRETTY_NAME="Talos (v1.10.4)"
+VERSION_ID=v1.10.5
+PRETTY_NAME="Talos (v1.10.5)"
 HOME_URL="https://www.talos.dev/";
 BUG_REPORT_URL="https://github.com/siderolabs/talos/issues";
 VENDOR_NAME="Sidero Labs"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/website/content/v1.10/reference/cli.md 
new/talosctl-1.10.5/website/content/v1.10/reference/cli.md
--- old/talosctl-1.10.4/website/content/v1.10/reference/cli.md  2025-06-11 
14:22:34.000000000 +0200
+++ new/talosctl-1.10.5/website/content/v1.10/reference/cli.md  2025-07-03 
16:21:40.000000000 +0200
@@ -144,7 +144,7 @@
       --bad-rtc                                  launch VM with bad RTC state 
(QEMU only)
       --cidr string                              CIDR of the cluster network 
(IPv4, ULA network for IPv6 is derived in automated way) (default "10.5.0.0/24")
       --cni-bin-path strings                     search path for CNI binaries 
(VM only) (default [/home/user/.talos/cni/bin])
-      --cni-bundle-url string                    URL to download CNI bundle 
from (VM only) (default 
"https://github.com/siderolabs/talos/releases/download/v1.10.4/talosctl-cni-bundle-${ARCH}.tar.gz";)
+      --cni-bundle-url string                    URL to download CNI bundle 
from (VM only) (default 
"https://github.com/siderolabs/talos/releases/download/v1.10.5/talosctl-cni-bundle-${ARCH}.tar.gz";)
       --cni-cache-dir string                     CNI cache directory path (VM 
only) (default "/home/user/.talos/cni/cache")
       --cni-conf-dir string                      CNI config directory path (VM 
only) (default "/home/user/.talos/cni/conf.d")
       --config-injection-method string           a method to inject machine 
config: default is HTTP server, 'metal-iso' to mount an ISO (QEMU only)
@@ -186,7 +186,7 @@
       --ipxe-boot-script string                  iPXE boot script (URL) to use
       --iso-path string                          the ISO path to use for the 
initial boot (VM only)
       --kubeprism-port int                       KubePrism port (set to 0 to 
disable) (default 7445)
-      --kubernetes-version string                desired kubernetes version to 
run (default "1.33.1")
+      --kubernetes-version string                desired kubernetes version to 
run (default "1.33.2")
       --memory int                               the limit on memory usage in 
MB (each control plane/VM) (default 2048)
       --memory-workers int                       the limit on memory usage in 
MB (each worker/VM) (default 2048)
       --mount mount                              attach a mount to the 
container (Docker only)
@@ -1364,7 +1364,7 @@
   -h, --help                                     help for config
       --install-disk string                      the disk to install to 
(default "/dev/sda")
       --install-image string                     the image used to perform an 
installation (default "ghcr.io/siderolabs/installer:latest")
-      --kubernetes-version string                desired kubernetes version to 
run (default "1.33.1")
+      --kubernetes-version string                desired kubernetes version to 
run (default "1.33.2")
   -o, --output string                            destination to output 
generated files. when multiple output types are specified, it must be a 
directory. for a single output type, it must either be a file path, or "-" for 
stdout
   -t, --output-types strings                     types of outputs to be 
generated. valid types are: ["controlplane" "worker" "talosconfig"] (default 
[controlplane,worker,talosconfig])
   -p, --persist                                  the desired persist value for 
configs (default true)
@@ -1797,7 +1797,7 @@
 ### Examples
 
 ```
-talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.1 
--image-cache-path=/tmp/talos-image-cache
+talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.2 
--image-cache-path=/tmp/talos-image-cache
 
 Alternatively, stdin can be piped to the command:
 talosctl images default | talosctl images cache-create 
--image-cache-path=/tmp/talos-image-cache --images=-
@@ -2982,7 +2982,7 @@
       --debug                debug operation from kernel logs. --wait is set 
to true when this flag is set
   -f, --force                force the upgrade (skip checks on etcd health and 
members, might lead to data loss)
   -h, --help                 help for upgrade
-  -i, --image string         the container image to use for performing the 
install (default "ghcr.io/siderolabs/installer:v1.10.4")
+  -i, --image string         the container image to use for performing the 
install (default "ghcr.io/siderolabs/installer:v1.10.5")
       --insecure             upgrade using the insecure (encrypted with no 
auth) maintenance service
   -m, --reboot-mode string   select the reboot mode during upgrade. Mode 
"powercycle" bypasses kexec. Valid values are: ["default" "powercycle"]. 
(default "default")
   -s, --stage                stage the upgrade to perform it after a reboot
@@ -3029,7 +3029,7 @@
       --pre-pull-images                   pre-pull images before upgrade 
(default true)
       --proxy-image string                kube-proxy image to use (default 
"registry.k8s.io/kube-proxy")
       --scheduler-image string            kube-scheduler image to use (default 
"registry.k8s.io/kube-scheduler")
-      --to string                         the Kubernetes control plane version 
to upgrade to (default "1.33.1")
+      --to string                         the Kubernetes control plane version 
to upgrade to (default "1.33.2")
       --upgrade-kubelet                   upgrade kubelet service (default 
true)
       --with-docs                         patch all machine configs adding the 
documentation for each field (default true)
       --with-examples                     patch all machine configs with the 
commented examples (default true)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.4/website/content/v1.10/reference/configuration/v1alpha1/config.md
 
new/talosctl-1.10.5/website/content/v1.10/reference/configuration/v1alpha1/config.md
--- 
old/talosctl-1.10.4/website/content/v1.10/reference/configuration/v1alpha1/config.md
        2025-06-11 14:22:34.000000000 +0200
+++ 
new/talosctl-1.10.5/website/content/v1.10/reference/configuration/v1alpha1/config.md
        2025-07-03 16:21:40.000000000 +0200
@@ -86,7 +86,7 @@
 {{< /highlight >}}</details> | |
 |`kubelet` |<a href="#Config.machine.kubelet">KubeletConfig</a> |Used to 
provide additional options to the kubelet. <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 kubelet:
-    image: ghcr.io/siderolabs/kubelet:v1.33.1 # The `image` field is an 
optional reference to an alternative kubelet image.
+    image: ghcr.io/siderolabs/kubelet:v1.33.2 # The `image` field is an 
optional reference to an alternative kubelet image.
     # The `extraArgs` field is used to provide additional flags to the kubelet.
     extraArgs:
         feature-gates: ServerSideApply=true
@@ -497,7 +497,7 @@
 {{< highlight yaml >}}
 machine:
     kubelet:
-        image: ghcr.io/siderolabs/kubelet:v1.33.1 # The `image` field is an 
optional reference to an alternative kubelet image.
+        image: ghcr.io/siderolabs/kubelet:v1.33.2 # The `image` field is an 
optional reference to an alternative kubelet image.
         # The `extraArgs` field is used to provide additional flags to the 
kubelet.
         extraArgs:
             feature-gates: ServerSideApply=true
@@ -550,7 +550,7 @@
 | Field | Type | Description | Value(s) |
 |-------|------|-------------|----------|
 |`image` |string |The `image` field is an optional reference to an alternative 
kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: ghcr.io/siderolabs/kubelet:v1.33.1
+image: ghcr.io/siderolabs/kubelet:v1.33.2
 {{< /highlight >}}</details> | |
 |`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an 
alternative kubelet clusterDNS ip list. <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 clusterDNS:
@@ -2889,7 +2889,7 @@
 {{< /highlight >}}</details> | |
 |`apiServer` |<a href="#Config.cluster.apiServer">APIServerConfig</a> |API 
server specific configuration options. <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 apiServer:
-    image: registry.k8s.io/kube-apiserver:v1.33.1 # The container image used 
in the API server manifest.
+    image: registry.k8s.io/kube-apiserver:v1.33.2 # The container image used 
in the API server manifest.
     # Extra arguments to supply to the API server.
     extraArgs:
         feature-gates: ServerSideApply=true
@@ -2954,14 +2954,14 @@
 {{< /highlight >}}</details> | |
 |`controllerManager` |<a 
href="#Config.cluster.controllerManager">ControllerManagerConfig</a> 
|Controller manager server specific configuration options. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
 controllerManager:
-    image: registry.k8s.io/kube-controller-manager:v1.33.1 # The container 
image used in the controller manager manifest.
+    image: registry.k8s.io/kube-controller-manager:v1.33.2 # The container 
image used in the controller manager manifest.
     # Extra arguments to supply to the controller manager.
     extraArgs:
         feature-gates: ServerSideApply=true
 {{< /highlight >}}</details> | |
 |`proxy` |<a href="#Config.cluster.proxy">ProxyConfig</a> |Kube-proxy 
server-specific configuration options <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 proxy:
-    image: registry.k8s.io/kube-proxy:v1.33.1 # The container image used in 
the kube-proxy manifest.
+    image: registry.k8s.io/kube-proxy:v1.33.2 # The container image used in 
the kube-proxy manifest.
     mode: ipvs # proxy mode of kube-proxy.
     # Extra arguments to supply to kube-proxy.
     extraArgs:
@@ -2972,7 +2972,7 @@
 {{< /highlight >}}</details> | |
 |`scheduler` |<a href="#Config.cluster.scheduler">SchedulerConfig</a> 
|Scheduler server specific configuration options. <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 scheduler:
-    image: registry.k8s.io/kube-scheduler:v1.33.1 # The container image used 
in the scheduler manifest.
+    image: registry.k8s.io/kube-scheduler:v1.33.2 # The container image used 
in the scheduler manifest.
     # Extra arguments to supply to the scheduler.
     extraArgs:
         feature-gates: AllBeta=true
@@ -3216,7 +3216,7 @@
 {{< highlight yaml >}}
 cluster:
     apiServer:
-        image: registry.k8s.io/kube-apiserver:v1.33.1 # The container image 
used in the API server manifest.
+        image: registry.k8s.io/kube-apiserver:v1.33.2 # The container image 
used in the API server manifest.
         # Extra arguments to supply to the API server.
         extraArgs:
             feature-gates: ServerSideApply=true
@@ -3284,7 +3284,7 @@
 | Field | Type | Description | Value(s) |
 |-------|------|-------------|----------|
 |`image` |string |The container image used in the API server manifest. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: registry.k8s.io/kube-apiserver:v1.33.1
+image: registry.k8s.io/kube-apiserver:v1.33.2
 {{< /highlight >}}</details> | |
 |`extraArgs` |map[string]string |Extra arguments to supply to the API server.  
| |
 |`extraVolumes` |<a 
href="#Config.cluster.apiServer.extraVolumes.">[]VolumeMountConfig</a> |Extra 
volumes to mount to the API server static pod.  | |
@@ -3496,7 +3496,7 @@
 {{< highlight yaml >}}
 cluster:
     controllerManager:
-        image: registry.k8s.io/kube-controller-manager:v1.33.1 # The container 
image used in the controller manager manifest.
+        image: registry.k8s.io/kube-controller-manager:v1.33.2 # The container 
image used in the controller manager manifest.
         # Extra arguments to supply to the controller manager.
         extraArgs:
             feature-gates: ServerSideApply=true
@@ -3506,7 +3506,7 @@
 | Field | Type | Description | Value(s) |
 |-------|------|-------------|----------|
 |`image` |string |The container image used in the controller manager manifest. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: registry.k8s.io/kube-controller-manager:v1.33.1
+image: registry.k8s.io/kube-controller-manager:v1.33.2
 {{< /highlight >}}</details> | |
 |`extraArgs` |map[string]string |Extra arguments to supply to the controller 
manager.  | |
 |`extraVolumes` |<a 
href="#Config.cluster.controllerManager.extraVolumes.">[]VolumeMountConfig</a> 
|Extra volumes to mount to the controller manager static pod.  | |
@@ -3576,7 +3576,7 @@
 {{< highlight yaml >}}
 cluster:
     proxy:
-        image: registry.k8s.io/kube-proxy:v1.33.1 # The container image used 
in the kube-proxy manifest.
+        image: registry.k8s.io/kube-proxy:v1.33.2 # The container image used 
in the kube-proxy manifest.
         mode: ipvs # proxy mode of kube-proxy.
         # Extra arguments to supply to kube-proxy.
         extraArgs:
@@ -3593,7 +3593,7 @@
 disabled: false
 {{< /highlight >}}</details> | |
 |`image` |string |The container image used in the kube-proxy manifest. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: registry.k8s.io/kube-proxy:v1.33.1
+image: registry.k8s.io/kube-proxy:v1.33.2
 {{< /highlight >}}</details> | |
 |`mode` |string |<details><summary>proxy mode of kube-proxy.</summary>The 
default is 'iptables'.</details>  | |
 |`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy.  | |
@@ -3612,7 +3612,7 @@
 {{< highlight yaml >}}
 cluster:
     scheduler:
-        image: registry.k8s.io/kube-scheduler:v1.33.1 # The container image 
used in the scheduler manifest.
+        image: registry.k8s.io/kube-scheduler:v1.33.2 # The container image 
used in the scheduler manifest.
         # Extra arguments to supply to the scheduler.
         extraArgs:
             feature-gates: AllBeta=true
@@ -3622,7 +3622,7 @@
 | Field | Type | Description | Value(s) |
 |-------|------|-------------|----------|
 |`image` |string |The container image used in the scheduler manifest. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: registry.k8s.io/kube-scheduler:v1.33.1
+image: registry.k8s.io/kube-scheduler:v1.33.2
 {{< /highlight >}}</details> | |
 |`extraArgs` |map[string]string |Extra arguments to supply to the scheduler.  
| |
 |`extraVolumes` |<a 
href="#Config.cluster.scheduler.extraVolumes.">[]VolumeMountConfig</a> |Extra 
volumes to mount to the scheduler static pod.  | |

++++++ talosctl.obsinfo ++++++
--- /var/tmp/diff_new_pack.hgJCgc/_old  2025-07-06 17:18:02.804118463 +0200
+++ /var/tmp/diff_new_pack.hgJCgc/_new  2025-07-06 17:18:02.808118629 +0200
@@ -1,5 +1,5 @@
 name: talosctl
-version: 1.10.4
-mtime: 1749644554
-commit: 3c119bf87fdf4a2c8051de53613e7f8796149ef6
+version: 1.10.5
+mtime: 1751552500
+commit: 55fc623313ca69e47b31471c6024a7b05f6b3833
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/talosctl/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.talosctl.new.1903/vendor.tar.gz differ: char 135, 
line 1

Reply via email to