Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package talosctl for openSUSE:Factory 
checked in at 2025-08-02 00:42:56
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/talosctl (Old)
 and      /work/SRC/openSUSE:Factory/.talosctl.new.1085 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "talosctl"

Sat Aug  2 00:42:56 2025 rev:32 rq:1297053 version:1.10.6

Changes:
--------
--- /work/SRC/openSUSE:Factory/talosctl/talosctl.changes        2025-07-06 
17:17:59.131966619 +0200
+++ /work/SRC/openSUSE:Factory/.talosctl.new.1085/talosctl.changes      
2025-08-02 00:44:13.740720180 +0200
@@ -1,0 +2,18 @@
+Fri Aug  1 11:59:24 UTC 2025 - Johannes Kastl 
<[email protected]>
+
+- update to 1.10.6:
+  https://github.com/siderolabs/talos/releases/tag/v1.10.6
+  * no CLI-related changes in the Changelog
+  * Dependency changes
+    - github.com/siderolabs/gen v0.8.4 -> v0.8.5
+    - github.com/siderolabs/go-blockdevice/v2 v2.0.16 -> v2.0.19
+    - github.com/siderolabs/pkgs v1.10.0-24-g28fa97d ->
+      v1.10.0-29-g2e6dd0a
+    - github.com/siderolabs/talos/pkg/machinery v1.10.5 -> v1.10.6
+    - github.com/siderolabs/tools v1.10.0-4-g9d54ed4 ->
+      v1.10.0-5-g31fd099
+    - golang.org/x/sync v0.15.0 -> v0.16.0
+    - golang.org/x/sys v0.33.0 -> v0.34.0
+    - golang.org/x/text v0.26.0 -> v0.27.0
+
+-------------------------------------------------------------------

Old:
----
  talosctl-1.10.5.obscpio

New:
----
  talosctl-1.10.6.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ talosctl.spec ++++++
--- /var/tmp/diff_new_pack.peKEbx/_old  2025-08-02 00:44:17.080858996 +0200
+++ /var/tmp/diff_new_pack.peKEbx/_new  2025-08-02 00:44:17.100859827 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           talosctl
-Version:        1.10.5
+Version:        1.10.6
 Release:        0
 Summary:        CLI to interact with Talos Linux
 License:        MPL-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.peKEbx/_old  2025-08-02 00:44:17.484875787 +0200
+++ /var/tmp/diff_new_pack.peKEbx/_new  2025-08-02 00:44:17.540878114 +0200
@@ -4,7 +4,7 @@
     <param name="scm">git</param>
     <param name="exclude">.git</param>
     <param name="exclude">go.work</param>
-    <param name="revision">v1.10.5</param>
+    <param name="revision">v1.10.6</param>
     <param name="match-tag">v*</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="versionrewrite-pattern">v(.*)</param>

++++++ talosctl-1.10.5.obscpio -> talosctl-1.10.6.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/CHANGELOG.md 
new/talosctl-1.10.6/CHANGELOG.md
--- old/talosctl-1.10.5/CHANGELOG.md    2025-07-03 16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/CHANGELOG.md    2025-07-31 13:33:32.000000000 +0200
@@ -1,3 +1,80 @@
+## [Talos 1.10.6](https://github.com/siderolabs/talos/releases/tag/v1.10.6) 
(2025-07-31)
+
+Welcome to the v1.10.6 release of Talos!
+
+
+
+Please try out the release binaries and report any issues at
+https://github.com/siderolabs/talos/issues.
+
+### Component Updates
+
+Linux: 6.12.40
+Kubernetes: 1.33.3
+
+Talos is built with Go 1.24.5.
+
+
+### Contributors
+
+* Andrey Smirnov
+* Andrew Longwill
+* Mateusz Urbanek
+
+### Changes
+<details><summary>7 commits</summary>
+<p>
+
+* 
[`755308906`](https://github.com/siderolabs/talos/commit/755308906f3ad3855a2d8755ceeec9d8a8263be8)
 fix: issues with reading GPT
+* 
[`bb1cdc86b`](https://github.com/siderolabs/talos/commit/bb1cdc86b61b1890f1b7ae0da19ef6e6ad14b136)
 fix: issue with volume remount on service restart
+* 
[`e8bbe4a51`](https://github.com/siderolabs/talos/commit/e8bbe4a516ea58d25e1b228df3558780e95c0c32)
 chore: tag aws snapshots created via ci with the image name
+* 
[`e59522577`](https://github.com/siderolabs/talos/commit/e59522577bfabee9381b3073e46730ff0dfbec4b)
 feat: include AMD encrypted mem modules into base
+* 
[`68a485269`](https://github.com/siderolabs/talos/commit/68a4852699160abd56c5218ecfa0b0effc38096a)
 fix: add more bootloader probe logs on upgrade
+* 
[`d76649dd5`](https://github.com/siderolabs/talos/commit/d76649dd570964c55986b3b5739c2b6f42dd9051)
 fix: talos endpoint might not be created in Kubernetes
+* 
[`e62175948`](https://github.com/siderolabs/talos/commit/e62175948c0058b712bac331b2717aa3f2bc16ab)
 feat: update Linux to 6.12.40
+</p>
+</details>
+
+### Changes from siderolabs/gen
+<details><summary>1 commit</summary>
+<p>
+
+* 
[`044d921`](https://github.com/siderolabs/gen/commit/044d921685bbd8b603a64175ea63b07efe9a64a7)
 feat: add xslices.Deduplicate
+</p>
+</details>
+
+### Changes from siderolabs/pkgs
+<details><summary>5 commits</summary>
+<p>
+
+* 
[`2e6dd0a`](https://github.com/siderolabs/pkgs/commit/2e6dd0a3b624b816824cc08716ec90a4f2322d31)
 feat: update Linux to 6.12.40
+* 
[`3657b7d`](https://github.com/siderolabs/pkgs/commit/3657b7d755532a411f24c40c723f4e8456f0898d)
 feat: update Linux to 6.12.38
+* 
[`a8e77ff`](https://github.com/siderolabs/pkgs/commit/a8e77ffa5b52b40b36d8767cf9ffb401a1575aa7)
 feat: enable AMD encrypted memory
+* 
[`8dd783f`](https://github.com/siderolabs/pkgs/commit/8dd783fcf6b4120761dca1236697904e6c76cd4c)
 feat: update Linux to 6.12.36 and firmware
+* 
[`7e49fce`](https://github.com/siderolabs/pkgs/commit/7e49fce6cbb55497c4954878907006ba0f5bf1ad)
 feat: update tools and toolchain
+</p>
+</details>
+
+### Changes from siderolabs/tools
+<details><summary>1 commit</summary>
+<p>
+
+* 
[`31fd099`](https://github.com/siderolabs/tools/commit/31fd099ca3272a75b5402c413b168c2ca7e8270d)
 feat: update Go to 1.24.5
+</p>
+</details>
+
+### Dependency Changes
+
+* **github.com/siderolabs/gen**                v0.8.4 -> v0.8.5
+* **github.com/siderolabs/go-blockdevice/v2**  v2.0.16 -> v2.0.19
+* **github.com/siderolabs/pkgs**               v1.10.0-24-g28fa97d -> 
v1.10.0-29-g2e6dd0a
+* **github.com/siderolabs/tools**              v1.10.0-4-g9d54ed4 -> 
v1.10.0-5-g31fd099
+* **golang.org/x/sync**                        v0.15.0 -> v0.16.0
+* **golang.org/x/sys**                         v0.33.0 -> v0.34.0
+* **golang.org/x/text**                        v0.26.0 -> v0.27.0
+
+Previous release can be found at 
[v1.10.5](https://github.com/siderolabs/talos/releases/tag/v1.10.5)
+
 ## [Talos 1.10.5](https://github.com/siderolabs/talos/releases/tag/v1.10.5) 
(2025-07-03)
 
 Welcome to the v1.10.5 release of Talos!
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/Makefile new/talosctl-1.10.6/Makefile
--- old/talosctl-1.10.5/Makefile        2025-07-03 16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/Makefile        2025-07-31 13:33:32.000000000 +0200
@@ -25,9 +25,9 @@
 EMBED_TARGET ?= embed
 
 TOOLS_PREFIX ?= ghcr.io/siderolabs/tools
-TOOLS ?= v1.10.0-4-g9d54ed4
+TOOLS ?= v1.10.0-5-g31fd099
 PKGS_PREFIX ?= ghcr.io/siderolabs
-PKGS ?= v1.10.0-24-g28fa97d
+PKGS ?= v1.10.0-29-g2e6dd0a
 
 KRES_IMAGE ?= ghcr.io/siderolabs/kres:latest
 CONFORMANCE_IMAGE ?= ghcr.io/siderolabs/conform:latest
@@ -125,7 +125,7 @@
 INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM)
 INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := 
integration-test-provision-$(OPERATING_SYSTEM)
 # renovate: datasource=github-releases depName=kubernetes/kubernetes
-KUBECTL_VERSION ?= v1.33.2
+KUBECTL_VERSION ?= v1.33.3
 # renovate: datasource=github-releases depName=kastenhq/kubestr
 KUBESTR_VERSION ?= v0.4.48
 # renovate: datasource=github-releases depName=helm/helm
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/cmd/installer/pkg/install/install.go 
new/talosctl-1.10.6/cmd/installer/pkg/install/install.go
--- old/talosctl-1.10.5/cmd/installer/pkg/install/install.go    2025-07-03 
16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/cmd/installer/pkg/install/install.go    2025-07-31 
13:33:32.000000000 +0200
@@ -338,6 +338,7 @@
                        BlockProbeOptions: []blkid.ProbeOption{
                                blkid.WithSkipLocking(true),
                        },
+                       Logger: log.Printf,
                })
                if err != nil {
                        return fmt.Errorf("failed to probe bootloader on 
upgrade: %w", err)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/go.mod new/talosctl-1.10.6/go.mod
--- old/talosctl-1.10.5/go.mod  2025-07-03 16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/go.mod  2025-07-31 13:33:32.000000000 +0200
@@ -141,10 +141,10 @@
        github.com/siderolabs/crypto v0.6.0
        github.com/siderolabs/discovery-api v0.1.6
        github.com/siderolabs/discovery-client v0.1.11
-       github.com/siderolabs/gen v0.8.4
+       github.com/siderolabs/gen v0.8.5
        github.com/siderolabs/go-api-signature v0.3.6
        github.com/siderolabs/go-blockdevice v0.4.8
-       github.com/siderolabs/go-blockdevice/v2 v2.0.16
+       github.com/siderolabs/go-blockdevice/v2 v2.0.19
        github.com/siderolabs/go-circular v0.2.2
        github.com/siderolabs/go-cmd v0.1.3
        github.com/siderolabs/go-copy v0.1.0
@@ -165,7 +165,7 @@
        github.com/siderolabs/net v0.4.0
        github.com/siderolabs/proto-codec v0.1.2
        github.com/siderolabs/siderolink v0.3.15
-       github.com/siderolabs/talos/pkg/machinery v1.10.5
+       github.com/siderolabs/talos/pkg/machinery v1.10.6
        github.com/sirupsen/logrus v1.9.3
        github.com/spf13/cobra v1.9.1
        github.com/spf13/pflag v1.0.6
@@ -184,10 +184,10 @@
        go4.org/netipx v0.0.0-20231129151722-fdeea329fbba
        golang.org/x/net v0.41.0
        golang.org/x/oauth2 v0.30.0
-       golang.org/x/sync v0.15.0
-       golang.org/x/sys v0.33.0
+       golang.org/x/sync v0.16.0
+       golang.org/x/sys v0.34.0
        golang.org/x/term v0.32.0
-       golang.org/x/text v0.26.0
+       golang.org/x/text v0.27.0
        golang.org/x/time v0.11.0
        golang.zx2c4.com/wireguard/wgctrl v0.0.0-20241231184526-a9ab2273dd10
        google.golang.org/grpc v1.71.3
@@ -356,7 +356,7 @@
        golang.org/x/crypto v0.39.0 // indirect
        golang.org/x/exp v0.0.0-20250128182459-e0ece0dbea4c // indirect
        golang.org/x/mod v0.25.0 // indirect
-       golang.org/x/tools v0.33.0 // indirect
+       golang.org/x/tools v0.34.0 // indirect
        golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 // indirect
        golang.zx2c4.com/wireguard v0.0.0-20231211153847-12269c276173 // 
indirect
        google.golang.org/genproto/googleapis/api 
v0.0.0-20250409194420-de1ac958c67a // indirect
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/go.sum new/talosctl-1.10.6/go.sum
--- old/talosctl-1.10.5/go.sum  2025-07-03 16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/go.sum  2025-07-31 13:33:32.000000000 +0200
@@ -628,14 +628,14 @@
 github.com/siderolabs/ethtool v0.4.0-sidero 
h1:Ls/M4bFUjfcB1RDVviPZlL3kWcXaEVVSbKke+EZ2A9U=
 github.com/siderolabs/ethtool v0.4.0-sidero/go.mod 
h1:nOIR88fiFTdBfakYLEUAhxdy75Ih/fgnSlsSKAHRpfc=
 github.com/siderolabs/gen v0.8.0/go.mod 
h1:an3a2Y53O7kUjnnK8Bfu3gewtvnIOu5RTU6HalFtXQQ=
-github.com/siderolabs/gen v0.8.4 
h1:1Xj/YvKTXgpnr9ZC7heKcskJo5wHvWOybwjQSCfEmsQ=
-github.com/siderolabs/gen v0.8.4/go.mod 
h1:CRrktDXQf3yDJI7xKv+cDYhBbKdfd/YE16OpgcHoT9E=
+github.com/siderolabs/gen v0.8.5 
h1:xlWXTynnGD/epaj7uplvKvmAkBH+Fp51bLnw1JC0xME=
+github.com/siderolabs/gen v0.8.5/go.mod 
h1:CRrktDXQf3yDJI7xKv+cDYhBbKdfd/YE16OpgcHoT9E=
 github.com/siderolabs/go-api-signature v0.3.6 
h1:wDIsXbpl7Oa/FXvxB6uz4VL9INA9fmr3EbmjEZYFJrU=
 github.com/siderolabs/go-api-signature v0.3.6/go.mod 
h1:hoH13AfunHflxbXfh+NoploqV13ZTDfQ1mQJWNVSW9U=
 github.com/siderolabs/go-blockdevice v0.4.8 
h1:KfdWvIx0Jft5YVuCsFIJFwjWEF1oqtzkgX9PeU9cX4c=
 github.com/siderolabs/go-blockdevice v0.4.8/go.mod 
h1:4PeOuk71pReJj1JQEXDE7kIIQJPVe8a+HZQa+qjxSEA=
-github.com/siderolabs/go-blockdevice/v2 v2.0.16 
h1:QeQ72S7M/rwXV1nah/uzyBPeF/PLCEwuSqj1hFeZYQU=
-github.com/siderolabs/go-blockdevice/v2 v2.0.16/go.mod 
h1:74htzCV913UzaLZ4H+NBXkwWlYnBJIq5m/379ZEcu8w=
+github.com/siderolabs/go-blockdevice/v2 v2.0.19 
h1:V2a7HHzXlgMcZWUxpYp6BdapnwJGDAs/oGy1zkPicNA=
+github.com/siderolabs/go-blockdevice/v2 v2.0.19/go.mod 
h1:nqUmQxOSex/Sg70x+QyhdE/VtXZ6Q53Z4FoR2RFBzZU=
 github.com/siderolabs/go-circular v0.2.2 
h1:Q+bA7Ogboh2zDS2zapBirLGIlEcVcqimsQ0DdjxmsAw=
 github.com/siderolabs/go-circular v0.2.2/go.mod 
h1:NFcac49cEhUQnuU3lf4HbT0NLS0iaIx4veWfGaA2FDs=
 github.com/siderolabs/go-cmd v0.1.3 
h1:JrgZwqhJQeoec3QRON0LK+fv+0y7d0DyY7zsfkO6ciw=
@@ -899,8 +899,8 @@
 golang.org/x/sync v0.6.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
 golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
 golang.org/x/sync v0.10.0/go.mod 
h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk=
-golang.org/x/sync v0.15.0 h1:KWH3jNZsfyT6xfAfKiz6MRNmd46ByHDYaZ7KSkCtdW8=
-golang.org/x/sync v0.15.0/go.mod 
h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA=
+golang.org/x/sync v0.16.0 h1:ycBJEhp9p4vXvUZNszeOq0kGTPghopOL8q0fq3vstxw=
+golang.org/x/sync v0.16.0/go.mod 
h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA=
 golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod 
h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
 golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod 
h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY=
 golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod 
h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
@@ -958,8 +958,8 @@
 golang.org/x/sys v0.20.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
 golang.org/x/sys v0.29.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA=
 golang.org/x/sys v0.32.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
-golang.org/x/sys v0.33.0 h1:q3i8TbbEz+JRD9ywIRlyRAQbM0qF7hu24q3teo2hbuw=
-golang.org/x/sys v0.33.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
+golang.org/x/sys v0.34.0 h1:H5Y5sJ2L2JRdyv7ROF1he/lPdvFsd0mJHFw2ThKHxLA=
+golang.org/x/sys v0.34.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k=
 golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2/go.mod 
h1:TeRTkGYfJXctD9OcfyVLyj2J3IxLnKwHJR8f4D8a3YE=
 golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod 
h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
 golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod 
h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
@@ -985,8 +985,8 @@
 golang.org/x/text v0.14.0/go.mod 
h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
 golang.org/x/text v0.15.0/go.mod 
h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU=
 golang.org/x/text v0.21.0/go.mod 
h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ=
-golang.org/x/text v0.26.0 h1:P42AVeLghgTYr4+xUnTRKDMqpar+PtX7KWuNQL21L8M=
-golang.org/x/text v0.26.0/go.mod 
h1:QK15LZJUUQVJxhz7wXgxSy/CJaTFjd0G+YLonydOVQA=
+golang.org/x/text v0.27.0 h1:4fGWRpyh641NLlecmyl4LOe6yDdfaYNrGb2zdfo4JV4=
+golang.org/x/text v0.27.0/go.mod 
h1:1D28KMCvyooCX9hBiosv5Tz/+YLxj0j7XhWjpSUF7CU=
 golang.org/x/time v0.11.0 h1:/bpjEDfN9tkoN/ryeYHnv5hcMlc8ncjMcM4XBk5NWV0=
 golang.org/x/time v0.11.0/go.mod 
h1:CDIdPxbZBQxdj6cxyCIdrNogrJKMJ7pr37NYpMcMDSg=
 golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod 
h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
@@ -1009,8 +1009,8 @@
 golang.org/x/tools v0.6.0/go.mod 
h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU=
 golang.org/x/tools v0.13.0/go.mod 
h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58=
 golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d/go.mod 
h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk=
-golang.org/x/tools v0.33.0 h1:4qz2S3zmRxbGIhDIAgjxvFutSvH5EfnsYrRBj0UI0bc=
-golang.org/x/tools v0.33.0/go.mod 
h1:CIJMaWEY88juyUfo7UbgPqbC8rU2OqfAV1h2Qp0oMYI=
+golang.org/x/tools v0.34.0 h1:qIpSLOxeCYGg9TrcJokLBG4KFA6d795g0xkBkiESGlo=
+golang.org/x/tools v0.34.0/go.mod 
h1:pAP9OwEaY1CAW3HOmg3hLZC5Z0CCmzjAF2UQMSqNARg=
 golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
 golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
 golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod 
h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/hack/cloud-image-uploader/aws.go 
new/talosctl-1.10.6/hack/cloud-image-uploader/aws.go
--- old/talosctl-1.10.5/hack/cloud-image-uploader/aws.go        2025-07-03 
16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/hack/cloud-image-uploader/aws.go        2025-07-31 
13:33:32.000000000 +0200
@@ -260,6 +260,24 @@
 }
 
 //nolint:gocyclo
+func (au *AWSUploader) tagSnapshot(ctx context.Context, svc *ec2.Client, 
snapshotID, imageName string) {
+       if snapshotID == "" {
+               return
+       }
+
+       _, tagErr := svc.CreateTags(ctx, &ec2.CreateTagsInput{
+               Resources: []string{snapshotID},
+               Tags: []types.Tag{{
+                       Key:   pointer.To("Name"),
+                       Value: pointer.To(imageName),
+               }},
+       })
+       if tagErr != nil {
+               log.Printf("WARNING: failed to tag snapshot %s: %v", 
snapshotID, tagErr)
+       }
+}
+
+//nolint:gocyclo
 func (au *AWSUploader) registerAMIArch(ctx context.Context, region string, svc 
*ec2.Client, arch, bucketName string, uploader *manager.Uploader) error {
        err := retry.Constant(30*time.Minute, retry.WithUnits(time.Second), 
retry.WithErrorLogging(true)).RetryWithContext(ctx, func(ctx context.Context) 
error {
                source, err := os.Open(au.Options.AWSImage(arch))
@@ -359,6 +377,8 @@
                imageName = fmt.Sprintf("%s-%s-%s-%s", au.Options.NamePrefix, 
au.Options.Tag, region, arch)
        }
 
+       au.tagSnapshot(ctx, svc, snapshotID, imageName)
+
        imageResp, err := svc.DescribeImages(ctx, &ec2.DescribeImagesInput{
                Filters: []types.Filter{
                        {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/hack/modules-amd64.txt 
new/talosctl-1.10.6/hack/modules-amd64.txt
--- old/talosctl-1.10.5/hack/modules-amd64.txt  2025-07-03 16:21:40.000000000 
+0200
+++ new/talosctl-1.10.6/hack/modules-amd64.txt  2025-07-31 13:33:32.000000000 
+0200
@@ -175,6 +175,8 @@
 kernel/drivers/vfio/pci/vfio-pci.ko
 kernel/drivers/vfio/vfio.ko
 kernel/drivers/vfio/vfio_iommu_type1.ko
+kernel/drivers/virt/coco/sev-guest/sev-guest.ko
+kernel/drivers/virt/coco/tsm.ko
 kernel/drivers/virtio/virtio_balloon.ko
 kernel/drivers/virtio/virtio_input.ko
 kernel/drivers/virtio/virtio_mmio.ko
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/hack/release.toml 
new/talosctl-1.10.6/hack/release.toml
--- old/talosctl-1.10.5/hack/release.toml       2025-07-03 16:21:40.000000000 
+0200
+++ new/talosctl-1.10.6/hack/release.toml       2025-07-31 13:33:32.000000000 
+0200
@@ -7,7 +7,7 @@
 ignore_deps = ["github.com/coredns/coredns"]
 
 # previous release
-previous = "v1.10.4"
+previous = "v1.10.5"
 
 pre_release = false
 
@@ -19,17 +19,10 @@
     [notes.updates]
         title = "Component Updates"
         description = """\
-Linux: 6.12.35
-Kubernetes: 1.33.2
+Linux: 6.12.40
+Kubernetes: 1.33.3
 
-Talos is built with Go 1.24.4.
-"""
-
-    [notes.azure]
-        title = "Azure"
-        description = """\
-Talos on Azure now defaults to MTU of 1400 bytes for the `eth0` interface to 
avoid packet fragmentation issues.
-The default MTU can be overriden with machine configuration.
+Talos is built with Go 1.24.5.
 """
 
 [make_deps]
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/hack/test/e2e.sh 
new/talosctl-1.10.6/hack/test/e2e.sh
--- old/talosctl-1.10.5/hack/test/e2e.sh        2025-07-03 16:21:40.000000000 
+0200
+++ new/talosctl-1.10.6/hack/test/e2e.sh        2025-07-31 13:33:32.000000000 
+0200
@@ -33,7 +33,7 @@
 # Kubernetes
 
 export KUBECONFIG="${TMP}/kubeconfig"
-export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.2}
+export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.3}
 
 export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}"
 export TIMEOUT=1200
@@ -96,9 +96,10 @@
 
   "${INTEGRATION_TEST}" \
     -test.v \
+    -talos.failfast \
     -talos.talosctlpath "${TALOSCTL}" \
     -talos.kubectlpath "${KUBECTL}" \
-     -talos.helmpath "${HELM}" \
+    -talos.helmpath "${HELM}" \
     -talos.kubestrpath "${KUBESTR}" \
     -talos.provisioner "${PROVISIONER}" \
     -talos.name "${CLUSTER_NAME}" \
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/manifest.go 
new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/manifest.go
--- old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/manifest.go   
2025-07-03 16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/manifest.go   
2025-07-31 13:33:32.000000000 +0200
@@ -229,7 +229,6 @@
        if cfg.TalosAPIServiceEnabled {
                defaultManifests = slices.Concat(defaultManifests,
                        []manifestDesc{
-                               {"12-talos-api-service", talosAPIService},
                                {"13-talos-service-account-crd", 
talosServiceAccountCRDTemplate},
                        },
                )
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/templates/talos-api-service-template.yaml
 
new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/templates/talos-api-service-template.yaml
--- 
old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/templates/talos-api-service-template.yaml
     2025-07-03 16:21:40.000000000 +0200
+++ 
new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/templates/talos-api-service-template.yaml
     1970-01-01 01:00:00.000000000 +0100
@@ -1,14 +0,0 @@
-apiVersion: v1
-kind: Service
-metadata:
-  labels:
-    component: apid
-    provider: talos
-  name: {{ .KubernetesTalosAPIServiceName }}
-  namespace: {{ .KubernetesTalosAPIServiceNamespace }}
-spec:
-  ports:
-  - name: apid
-    port: {{ .ApidPort }}
-    protocol: TCP
-    targetPort: {{ .ApidPort }}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/templates.go 
new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/templates.go
--- old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/templates.go  
2025-07-03 16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/templates.go  
2025-07-31 13:33:32.000000000 +0200
@@ -71,12 +71,6 @@
 //go:embed templates/pod-security-policy-template.yaml
 var podSecurityPolicy string
 
-// talosAPIService is the service to access Talos API from Kubernetes.
-// Service exposes the Endpoints which are managed by controllers.
-//
-//go:embed templates/talos-api-service-template.yaml
-var talosAPIService string
-
 var flannelTemplate = string(flannel.Template)
 
 // talosServiceAccountCRDTemplate is the template of the CRD which
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/controllers/kubeaccess/endpoint.go
 
new/talosctl-1.10.6/internal/app/machined/pkg/controllers/kubeaccess/endpoint.go
--- 
old/talosctl-1.10.5/internal/app/machined/pkg/controllers/kubeaccess/endpoint.go
    2025-07-03 16:21:40.000000000 +0200
+++ 
new/talosctl-1.10.6/internal/app/machined/pkg/controllers/kubeaccess/endpoint.go
    2025-07-31 13:33:32.000000000 +0200
@@ -18,6 +18,7 @@
        corev1 "k8s.io/api/core/v1"
        apierrors "k8s.io/apimachinery/pkg/api/errors"
        metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
+       "k8s.io/apimachinery/pkg/util/intstr"
        "k8s.io/client-go/rest"
        "k8s.io/client-go/tools/clientcmd"
        clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
@@ -125,7 +126,7 @@
                        return fmt.Errorf("error loading kubeconfig: %w", err)
                }
 
-               if err = ctrl.updateTalosEndpoints(ctx, logger, kubeconfig, 
endpointAddrs); err != nil {
+               if err = ctrl.manageEndpoints(ctx, logger, kubeconfig, 
endpointAddrs); err != nil {
                        return err
                }
 
@@ -133,8 +134,7 @@
        }
 }
 
-//nolint:gocyclo
-func (ctrl *EndpointController) updateTalosEndpoints(ctx context.Context, 
logger *zap.Logger, kubeconfig *rest.Config, endpointAddrs k8s.EndpointList) 
error {
+func (ctrl *EndpointController) manageEndpoints(ctx context.Context, logger 
*zap.Logger, kubeconfig *rest.Config, endpointAddrs k8s.EndpointList) error {
        client, err := kubernetes.NewForConfig(kubeconfig)
        if err != nil {
                return fmt.Errorf("error building Kubernetes client: %w", err)
@@ -142,6 +142,62 @@
 
        defer client.Close() //nolint:errcheck
 
+       // create the Service before creating the Endpoints, as Kubernetes 
EndpointController will clean up orphaned Endpoints
+       if err = ctrl.ensureTalosService(ctx, client); err != nil {
+               return fmt.Errorf("error ensuring Talos API service: %w", err)
+       }
+
+       // now create or update the Endpoints resource
+       if err = ctrl.ensureTalosEndpoints(ctx, logger, client, endpointAddrs); 
err != nil {
+               return fmt.Errorf("error ensuring Talos API endpoints: %w", err)
+       }
+
+       return nil
+}
+
+func (ctrl *EndpointController) ensureTalosService(ctx context.Context, client 
*kubernetes.Client) error {
+       _, err := 
client.CoreV1().Services(constants.KubernetesTalosAPIServiceNamespace).Get(ctx, 
constants.KubernetesTalosAPIServiceName, metav1.GetOptions{})
+       if err == nil {
+               // service already exists, nothing to do
+               return nil
+       }
+
+       if !apierrors.IsNotFound(err) {
+               return fmt.Errorf("error getting Talos API service: %w", err)
+       }
+
+       // create the service if it does not exist
+       newService := &corev1.Service{
+               ObjectMeta: metav1.ObjectMeta{
+                       Name:      constants.KubernetesTalosAPIServiceName,
+                       Namespace: constants.KubernetesTalosAPIServiceNamespace,
+                       Labels: map[string]string{
+                               "provider":  constants.KubernetesTalosProvider,
+                               "component": "apid",
+                       },
+               },
+               Spec: corev1.ServiceSpec{
+                       Ports: []corev1.ServicePort{
+                               {
+                                       Name:       "apid",
+                                       Port:       constants.ApidPort,
+                                       Protocol:   corev1.ProtocolTCP,
+                                       TargetPort: 
intstr.FromInt(constants.ApidPort),
+                               },
+                       },
+               },
+       }
+
+       _, err = 
client.CoreV1().Services(constants.KubernetesTalosAPIServiceNamespace).Create(ctx,
 newService, metav1.CreateOptions{})
+       if err != nil && !apierrors.IsAlreadyExists(err) {
+               return fmt.Errorf("error creating Talos API service: %w", err)
+       }
+
+       return nil
+}
+
+//nolint:gocyclo
+func (ctrl *EndpointController) ensureTalosEndpoints(ctx context.Context, 
logger *zap.Logger, client *kubernetes.Client, endpointAddrs k8s.EndpointList) 
error {
        for {
                oldEndpoints, err := 
client.CoreV1().Endpoints(constants.KubernetesTalosAPIServiceNamespace).Get(ctx,
 constants.KubernetesTalosAPIServiceName, metav1.GetOptions{})
                if err != nil && !apierrors.IsNotFound(err) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/bootloader.go
 
new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/bootloader.go
--- 
old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/bootloader.go
     2025-07-03 16:21:40.000000000 +0200
+++ 
new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/bootloader.go
     2025-07-31 13:33:32.000000000 +0200
@@ -44,12 +44,16 @@
 //
 // Returns nil if it cannot detect any supported bootloader.
 func Probe(disk string, options options.ProbeOptions) (Bootloader, error) {
+       options.Log("probing bootloader on %q", disk)
+
        grubBootloader, err := grub.Probe(disk, options)
        if err != nil {
                return nil, err
        }
 
        if grubBootloader != nil {
+               options.Log("found GRUB bootloader on %q", disk)
+
                return grubBootloader, nil
        }
 
@@ -59,6 +63,8 @@
        }
 
        if sdbootBootloader != nil {
+               options.Log("found sd-boot bootloader on %q", disk)
+
                return sdbootBootloader, nil
        }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/grub/probe.go
 
new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/grub/probe.go
--- 
old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/grub/probe.go
     2025-07-03 16:21:40.000000000 +0200
+++ 
new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/grub/probe.go
     2025-07-31 13:33:32.000000000 +0200
@@ -40,6 +40,10 @@
                                return callback(grubConf)
                        }
 
+                       if grubConf == nil {
+                               options.Log("GRUB: config not found")
+                       }
+
                        return nil
                },
                options.BlockProbeOptions,
@@ -53,6 +57,8 @@
        ); err != nil {
                if xerrors.TagIs[mount.NotFoundTag](err) {
                        // if partitions are not found, it means GRUB is not 
installed
+                       options.Log("GRUB: BOOT partition not found, skipping 
probing")
+
                        return nil, nil
                }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/options/options.go
 
new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/options/options.go
--- 
old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/options/options.go
        2025-07-03 16:21:40.000000000 +0200
+++ 
new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/options/options.go
        2025-07-31 13:33:32.000000000 +0200
@@ -98,4 +98,14 @@
 // ProbeOptions configures bootloader probing.
 type ProbeOptions struct {
        BlockProbeOptions []blkid.ProbeOption
+       Logger            func(format string, v ...any)
+}
+
+// Log logs the message using the provided logger.
+func (options *ProbeOptions) Log(format string, v ...any) {
+       if options.Logger == nil {
+               return
+       }
+
+       options.Logger(format, v...)
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/sdboot/sdboot.go
 
new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/sdboot/sdboot.go
--- 
old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/sdboot/sdboot.go
  2025-07-03 16:21:40.000000000 +0200
+++ 
new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/sdboot/sdboot.go
  2025-07-31 13:33:32.000000000 +0200
@@ -18,6 +18,7 @@
        "github.com/ecks/uefi/efi/efivario"
        "github.com/foxboron/go-uefi/efi"
        "github.com/siderolabs/gen/xerrors"
+       "github.com/siderolabs/gen/xslices"
        "github.com/siderolabs/go-blockdevice/v2/blkid"
        "golang.org/x/sys/unix"
 
@@ -72,6 +73,8 @@
 func ProbeWithCallback(disk string, options options.ProbeOptions, callback 
func(*Config) error) (*Config, error) {
        // if not UEFI boot, nothing to do
        if !IsUEFIBoot() {
+               options.Log("sd-boot: not booted using UEFI, skipping probing")
+
                return nil, nil
        }
 
@@ -88,6 +91,8 @@
                return nil, err
        }
 
+       options.Log("sd-boot: booted entry: %q", bootedEntry)
+
        var sdbootConf *Config
 
        // read /boot/EFI and find if sd-boot is already being used
@@ -118,9 +123,13 @@
                                return err
                        }
 
+                       options.Log("sd-boot: found UKI files: %v", 
xslices.Map(ukiFiles, filepath.Base))
+
                        // here we handle a case when we boot of just 
kernel+initrd/uki/iso and we don't have a booted entry
                        // then we know we're booted of UKI
                        if bootedEntry == "" && len(ukiFiles) == 1 {
+                               options.Log("sd-boot: no booted entry found, 
assuming the only UKI file: %s", ukiFiles[0])
+
                                sdbootConf = &Config{
                                        Default: filepath.Base(ukiFiles[0]),
                                }
@@ -128,6 +137,8 @@
 
                        for _, ukiFile := range ukiFiles {
                                if strings.EqualFold(filepath.Base(ukiFile), 
bootedEntry) {
+                                       options.Log("sd-boot: default entry 
matched as %q", bootedEntry)
+
                                        sdbootConf = &Config{
                                                Default: bootedEntry,
                                        }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/internal/app/machined/pkg/system/volumes.go 
new/talosctl-1.10.6/internal/app/machined/pkg/system/volumes.go
--- old/talosctl-1.10.5/internal/app/machined/pkg/system/volumes.go     
2025-07-03 16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/internal/app/machined/pkg/system/volumes.go     
2025-07-31 13:33:32.000000000 +0200
@@ -8,6 +8,7 @@
        "context"
        "fmt"
 
+       "github.com/cosi-project/runtime/pkg/resource"
        "github.com/cosi-project/runtime/pkg/state"
 
        "github.com/siderolabs/talos/pkg/conditions"
@@ -69,7 +70,11 @@
        ctx, cancel := context.WithCancel(ctx)
        defer cancel()
 
-       _, err := cond.st.WatchFor(ctx, 
block.NewVolumeMountStatus(block.NamespaceName, cond.id).Metadata(), 
state.WithEventTypes(state.Created, state.Updated))
+       _, err := cond.st.WatchFor(ctx,
+               block.NewVolumeMountStatus(block.NamespaceName, 
cond.id).Metadata(),
+               state.WithEventTypes(state.Created, state.Updated),
+               state.WithPhases(resource.PhaseRunning),
+       )
        if err != nil {
                return err
        }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/constants/constants.go 
new/talosctl-1.10.6/pkg/machinery/constants/constants.go
--- old/talosctl-1.10.5/pkg/machinery/constants/constants.go    2025-07-03 
16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/pkg/machinery/constants/constants.go    2025-07-31 
13:33:32.000000000 +0200
@@ -14,7 +14,7 @@
 
 const (
        // DefaultKernelVersion is the default Linux kernel version.
-       DefaultKernelVersion = "6.12.35-talos"
+       DefaultKernelVersion = "6.12.40-talos"
 
        // KernelParamConfig is the kernel parameter name for specifying the 
URL.
        // to the config.
@@ -389,7 +389,7 @@
 
        // DefaultKubernetesVersion is the default target version of the 
control plane.
        // renovate: datasource=github-releases depName=kubernetes/kubernetes
-       DefaultKubernetesVersion = "1.33.2"
+       DefaultKubernetesVersion = "1.33.3"
 
        // SupportedKubernetesVersions is the number of Kubernetes versions 
supported by Talos starting from DefaultKubernesVersion going backwards.
        SupportedKubernetesVersions = 6
@@ -1097,7 +1097,7 @@
        DBusClientSocketLabel = "system_u:object_r:dbus_client_socket_t:s0"
 
        // GoVersion is the version of Go compiler this release was built with.
-       GoVersion = "go1.24.4"
+       GoVersion = "go1.24.5"
 
        // KubernetesTalosAPIServiceName is the name of the Kubernetes service 
to access Talos API.
        KubernetesTalosAPIServiceName = "talos"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/gendata/data/pkgs 
new/talosctl-1.10.6/pkg/machinery/gendata/data/pkgs
--- old/talosctl-1.10.5/pkg/machinery/gendata/data/pkgs 2025-07-03 
16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/pkg/machinery/gendata/data/pkgs 2025-07-31 
13:33:32.000000000 +0200
@@ -1 +1 @@
-v1.10.0-24-g28fa97d
\ No newline at end of file
+v1.10.0-29-g2e6dd0a
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/gendata/data/tag 
new/talosctl-1.10.6/pkg/machinery/gendata/data/tag
--- old/talosctl-1.10.5/pkg/machinery/gendata/data/tag  2025-07-03 
16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/pkg/machinery/gendata/data/tag  2025-07-31 
13:33:32.000000000 +0200
@@ -1 +1 @@
-v1.10.5
\ No newline at end of file
+v1.10.6
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/gendata/data/tools 
new/talosctl-1.10.6/pkg/machinery/gendata/data/tools
--- old/talosctl-1.10.5/pkg/machinery/gendata/data/tools        2025-07-03 
16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/pkg/machinery/gendata/data/tools        2025-07-31 
13:33:32.000000000 +0200
@@ -1 +1 @@
-v1.10.0-4-g9d54ed4
\ No newline at end of file
+v1.10.0-5-g31fd099
\ No newline at end of file
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/version/os-release 
new/talosctl-1.10.6/pkg/machinery/version/os-release
--- old/talosctl-1.10.5/pkg/machinery/version/os-release        2025-07-03 
16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/pkg/machinery/version/os-release        2025-07-31 
13:33:32.000000000 +0200
@@ -1,7 +1,7 @@
 NAME="Talos"
 ID=talos
-VERSION_ID=v1.10.5
-PRETTY_NAME="Talos (v1.10.5)"
+VERSION_ID=v1.10.6
+PRETTY_NAME="Talos (v1.10.6)"
 HOME_URL="https://www.talos.dev/";
 BUG_REPORT_URL="https://github.com/siderolabs/talos/issues";
 VENDOR_NAME="Sidero Labs"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/website/content/v1.10/reference/cli.md 
new/talosctl-1.10.6/website/content/v1.10/reference/cli.md
--- old/talosctl-1.10.5/website/content/v1.10/reference/cli.md  2025-07-03 
16:21:40.000000000 +0200
+++ new/talosctl-1.10.6/website/content/v1.10/reference/cli.md  2025-07-31 
13:33:32.000000000 +0200
@@ -144,7 +144,7 @@
       --bad-rtc                                  launch VM with bad RTC state 
(QEMU only)
       --cidr string                              CIDR of the cluster network 
(IPv4, ULA network for IPv6 is derived in automated way) (default "10.5.0.0/24")
       --cni-bin-path strings                     search path for CNI binaries 
(VM only) (default [/home/user/.talos/cni/bin])
-      --cni-bundle-url string                    URL to download CNI bundle 
from (VM only) (default 
"https://github.com/siderolabs/talos/releases/download/v1.10.5/talosctl-cni-bundle-${ARCH}.tar.gz";)
+      --cni-bundle-url string                    URL to download CNI bundle 
from (VM only) (default 
"https://github.com/siderolabs/talos/releases/download/v1.10.6/talosctl-cni-bundle-${ARCH}.tar.gz";)
       --cni-cache-dir string                     CNI cache directory path (VM 
only) (default "/home/user/.talos/cni/cache")
       --cni-conf-dir string                      CNI config directory path (VM 
only) (default "/home/user/.talos/cni/conf.d")
       --config-injection-method string           a method to inject machine 
config: default is HTTP server, 'metal-iso' to mount an ISO (QEMU only)
@@ -186,7 +186,7 @@
       --ipxe-boot-script string                  iPXE boot script (URL) to use
       --iso-path string                          the ISO path to use for the 
initial boot (VM only)
       --kubeprism-port int                       KubePrism port (set to 0 to 
disable) (default 7445)
-      --kubernetes-version string                desired kubernetes version to 
run (default "1.33.2")
+      --kubernetes-version string                desired kubernetes version to 
run (default "1.33.3")
       --memory int                               the limit on memory usage in 
MB (each control plane/VM) (default 2048)
       --memory-workers int                       the limit on memory usage in 
MB (each worker/VM) (default 2048)
       --mount mount                              attach a mount to the 
container (Docker only)
@@ -1364,7 +1364,7 @@
   -h, --help                                     help for config
       --install-disk string                      the disk to install to 
(default "/dev/sda")
       --install-image string                     the image used to perform an 
installation (default "ghcr.io/siderolabs/installer:latest")
-      --kubernetes-version string                desired kubernetes version to 
run (default "1.33.2")
+      --kubernetes-version string                desired kubernetes version to 
run (default "1.33.3")
   -o, --output string                            destination to output 
generated files. when multiple output types are specified, it must be a 
directory. for a single output type, it must either be a file path, or "-" for 
stdout
   -t, --output-types strings                     types of outputs to be 
generated. valid types are: ["controlplane" "worker" "talosconfig"] (default 
[controlplane,worker,talosconfig])
   -p, --persist                                  the desired persist value for 
configs (default true)
@@ -1797,7 +1797,7 @@
 ### Examples
 
 ```
-talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.2 
--image-cache-path=/tmp/talos-image-cache
+talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.3 
--image-cache-path=/tmp/talos-image-cache
 
 Alternatively, stdin can be piped to the command:
 talosctl images default | talosctl images cache-create 
--image-cache-path=/tmp/talos-image-cache --images=-
@@ -2982,7 +2982,7 @@
       --debug                debug operation from kernel logs. --wait is set 
to true when this flag is set
   -f, --force                force the upgrade (skip checks on etcd health and 
members, might lead to data loss)
   -h, --help                 help for upgrade
-  -i, --image string         the container image to use for performing the 
install (default "ghcr.io/siderolabs/installer:v1.10.5")
+  -i, --image string         the container image to use for performing the 
install (default "ghcr.io/siderolabs/installer:v1.10.6")
       --insecure             upgrade using the insecure (encrypted with no 
auth) maintenance service
   -m, --reboot-mode string   select the reboot mode during upgrade. Mode 
"powercycle" bypasses kexec. Valid values are: ["default" "powercycle"]. 
(default "default")
   -s, --stage                stage the upgrade to perform it after a reboot
@@ -3029,7 +3029,7 @@
       --pre-pull-images                   pre-pull images before upgrade 
(default true)
       --proxy-image string                kube-proxy image to use (default 
"registry.k8s.io/kube-proxy")
       --scheduler-image string            kube-scheduler image to use (default 
"registry.k8s.io/kube-scheduler")
-      --to string                         the Kubernetes control plane version 
to upgrade to (default "1.33.2")
+      --to string                         the Kubernetes control plane version 
to upgrade to (default "1.33.3")
       --upgrade-kubelet                   upgrade kubelet service (default 
true)
       --with-docs                         patch all machine configs adding the 
documentation for each field (default true)
       --with-examples                     patch all machine configs with the 
commented examples (default true)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/talosctl-1.10.5/website/content/v1.10/reference/configuration/v1alpha1/config.md
 
new/talosctl-1.10.6/website/content/v1.10/reference/configuration/v1alpha1/config.md
--- 
old/talosctl-1.10.5/website/content/v1.10/reference/configuration/v1alpha1/config.md
        2025-07-03 16:21:40.000000000 +0200
+++ 
new/talosctl-1.10.6/website/content/v1.10/reference/configuration/v1alpha1/config.md
        2025-07-31 13:33:32.000000000 +0200
@@ -86,7 +86,7 @@
 {{< /highlight >}}</details> | |
 |`kubelet` |<a href="#Config.machine.kubelet">KubeletConfig</a> |Used to 
provide additional options to the kubelet. <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 kubelet:
-    image: ghcr.io/siderolabs/kubelet:v1.33.2 # The `image` field is an 
optional reference to an alternative kubelet image.
+    image: ghcr.io/siderolabs/kubelet:v1.33.3 # The `image` field is an 
optional reference to an alternative kubelet image.
     # The `extraArgs` field is used to provide additional flags to the kubelet.
     extraArgs:
         feature-gates: ServerSideApply=true
@@ -497,7 +497,7 @@
 {{< highlight yaml >}}
 machine:
     kubelet:
-        image: ghcr.io/siderolabs/kubelet:v1.33.2 # The `image` field is an 
optional reference to an alternative kubelet image.
+        image: ghcr.io/siderolabs/kubelet:v1.33.3 # The `image` field is an 
optional reference to an alternative kubelet image.
         # The `extraArgs` field is used to provide additional flags to the 
kubelet.
         extraArgs:
             feature-gates: ServerSideApply=true
@@ -550,7 +550,7 @@
 | Field | Type | Description | Value(s) |
 |-------|------|-------------|----------|
 |`image` |string |The `image` field is an optional reference to an alternative 
kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: ghcr.io/siderolabs/kubelet:v1.33.2
+image: ghcr.io/siderolabs/kubelet:v1.33.3
 {{< /highlight >}}</details> | |
 |`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an 
alternative kubelet clusterDNS ip list. <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 clusterDNS:
@@ -2889,7 +2889,7 @@
 {{< /highlight >}}</details> | |
 |`apiServer` |<a href="#Config.cluster.apiServer">APIServerConfig</a> |API 
server specific configuration options. <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 apiServer:
-    image: registry.k8s.io/kube-apiserver:v1.33.2 # The container image used 
in the API server manifest.
+    image: registry.k8s.io/kube-apiserver:v1.33.3 # The container image used 
in the API server manifest.
     # Extra arguments to supply to the API server.
     extraArgs:
         feature-gates: ServerSideApply=true
@@ -2954,14 +2954,14 @@
 {{< /highlight >}}</details> | |
 |`controllerManager` |<a 
href="#Config.cluster.controllerManager">ControllerManagerConfig</a> 
|Controller manager server specific configuration options. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
 controllerManager:
-    image: registry.k8s.io/kube-controller-manager:v1.33.2 # The container 
image used in the controller manager manifest.
+    image: registry.k8s.io/kube-controller-manager:v1.33.3 # The container 
image used in the controller manager manifest.
     # Extra arguments to supply to the controller manager.
     extraArgs:
         feature-gates: ServerSideApply=true
 {{< /highlight >}}</details> | |
 |`proxy` |<a href="#Config.cluster.proxy">ProxyConfig</a> |Kube-proxy 
server-specific configuration options <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 proxy:
-    image: registry.k8s.io/kube-proxy:v1.33.2 # The container image used in 
the kube-proxy manifest.
+    image: registry.k8s.io/kube-proxy:v1.33.3 # The container image used in 
the kube-proxy manifest.
     mode: ipvs # proxy mode of kube-proxy.
     # Extra arguments to supply to kube-proxy.
     extraArgs:
@@ -2972,7 +2972,7 @@
 {{< /highlight >}}</details> | |
 |`scheduler` |<a href="#Config.cluster.scheduler">SchedulerConfig</a> 
|Scheduler server specific configuration options. <details><summary>Show 
example(s)</summary>{{< highlight yaml >}}
 scheduler:
-    image: registry.k8s.io/kube-scheduler:v1.33.2 # The container image used 
in the scheduler manifest.
+    image: registry.k8s.io/kube-scheduler:v1.33.3 # The container image used 
in the scheduler manifest.
     # Extra arguments to supply to the scheduler.
     extraArgs:
         feature-gates: AllBeta=true
@@ -3216,7 +3216,7 @@
 {{< highlight yaml >}}
 cluster:
     apiServer:
-        image: registry.k8s.io/kube-apiserver:v1.33.2 # The container image 
used in the API server manifest.
+        image: registry.k8s.io/kube-apiserver:v1.33.3 # The container image 
used in the API server manifest.
         # Extra arguments to supply to the API server.
         extraArgs:
             feature-gates: ServerSideApply=true
@@ -3284,7 +3284,7 @@
 | Field | Type | Description | Value(s) |
 |-------|------|-------------|----------|
 |`image` |string |The container image used in the API server manifest. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: registry.k8s.io/kube-apiserver:v1.33.2
+image: registry.k8s.io/kube-apiserver:v1.33.3
 {{< /highlight >}}</details> | |
 |`extraArgs` |map[string]string |Extra arguments to supply to the API server.  
| |
 |`extraVolumes` |<a 
href="#Config.cluster.apiServer.extraVolumes.">[]VolumeMountConfig</a> |Extra 
volumes to mount to the API server static pod.  | |
@@ -3496,7 +3496,7 @@
 {{< highlight yaml >}}
 cluster:
     controllerManager:
-        image: registry.k8s.io/kube-controller-manager:v1.33.2 # The container 
image used in the controller manager manifest.
+        image: registry.k8s.io/kube-controller-manager:v1.33.3 # The container 
image used in the controller manager manifest.
         # Extra arguments to supply to the controller manager.
         extraArgs:
             feature-gates: ServerSideApply=true
@@ -3506,7 +3506,7 @@
 | Field | Type | Description | Value(s) |
 |-------|------|-------------|----------|
 |`image` |string |The container image used in the controller manager manifest. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: registry.k8s.io/kube-controller-manager:v1.33.2
+image: registry.k8s.io/kube-controller-manager:v1.33.3
 {{< /highlight >}}</details> | |
 |`extraArgs` |map[string]string |Extra arguments to supply to the controller 
manager.  | |
 |`extraVolumes` |<a 
href="#Config.cluster.controllerManager.extraVolumes.">[]VolumeMountConfig</a> 
|Extra volumes to mount to the controller manager static pod.  | |
@@ -3576,7 +3576,7 @@
 {{< highlight yaml >}}
 cluster:
     proxy:
-        image: registry.k8s.io/kube-proxy:v1.33.2 # The container image used 
in the kube-proxy manifest.
+        image: registry.k8s.io/kube-proxy:v1.33.3 # The container image used 
in the kube-proxy manifest.
         mode: ipvs # proxy mode of kube-proxy.
         # Extra arguments to supply to kube-proxy.
         extraArgs:
@@ -3593,7 +3593,7 @@
 disabled: false
 {{< /highlight >}}</details> | |
 |`image` |string |The container image used in the kube-proxy manifest. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: registry.k8s.io/kube-proxy:v1.33.2
+image: registry.k8s.io/kube-proxy:v1.33.3
 {{< /highlight >}}</details> | |
 |`mode` |string |<details><summary>proxy mode of kube-proxy.</summary>The 
default is 'iptables'.</details>  | |
 |`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy.  | |
@@ -3612,7 +3612,7 @@
 {{< highlight yaml >}}
 cluster:
     scheduler:
-        image: registry.k8s.io/kube-scheduler:v1.33.2 # The container image 
used in the scheduler manifest.
+        image: registry.k8s.io/kube-scheduler:v1.33.3 # The container image 
used in the scheduler manifest.
         # Extra arguments to supply to the scheduler.
         extraArgs:
             feature-gates: AllBeta=true
@@ -3622,7 +3622,7 @@
 | Field | Type | Description | Value(s) |
 |-------|------|-------------|----------|
 |`image` |string |The container image used in the scheduler manifest. 
<details><summary>Show example(s)</summary>{{< highlight yaml >}}
-image: registry.k8s.io/kube-scheduler:v1.33.2
+image: registry.k8s.io/kube-scheduler:v1.33.3
 {{< /highlight >}}</details> | |
 |`extraArgs` |map[string]string |Extra arguments to supply to the scheduler.  
| |
 |`extraVolumes` |<a 
href="#Config.cluster.scheduler.extraVolumes.">[]VolumeMountConfig</a> |Extra 
volumes to mount to the scheduler static pod.  | |

++++++ talosctl.obsinfo ++++++
--- /var/tmp/diff_new_pack.peKEbx/_old  2025-08-02 00:44:22.077066637 +0200
+++ /var/tmp/diff_new_pack.peKEbx/_new  2025-08-02 00:44:22.081066804 +0200
@@ -1,5 +1,5 @@
 name: talosctl
-version: 1.10.5
-mtime: 1751552500
-commit: 55fc623313ca69e47b31471c6024a7b05f6b3833
+version: 1.10.6
+mtime: 1753961612
+commit: cfa6c98cec12a4bc513d44ecffc47e70515481d1
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/talosctl/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.talosctl.new.1085/vendor.tar.gz differ: char 85, 
line 1

Reply via email to