Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package talosctl for openSUSE:Factory checked in at 2025-08-02 00:42:56 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/talosctl (Old) and /work/SRC/openSUSE:Factory/.talosctl.new.1085 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "talosctl" Sat Aug 2 00:42:56 2025 rev:32 rq:1297053 version:1.10.6 Changes: -------- --- /work/SRC/openSUSE:Factory/talosctl/talosctl.changes 2025-07-06 17:17:59.131966619 +0200 +++ /work/SRC/openSUSE:Factory/.talosctl.new.1085/talosctl.changes 2025-08-02 00:44:13.740720180 +0200 @@ -1,0 +2,18 @@ +Fri Aug 1 11:59:24 UTC 2025 - Johannes Kastl <[email protected]> + +- update to 1.10.6: + https://github.com/siderolabs/talos/releases/tag/v1.10.6 + * no CLI-related changes in the Changelog + * Dependency changes + - github.com/siderolabs/gen v0.8.4 -> v0.8.5 + - github.com/siderolabs/go-blockdevice/v2 v2.0.16 -> v2.0.19 + - github.com/siderolabs/pkgs v1.10.0-24-g28fa97d -> + v1.10.0-29-g2e6dd0a + - github.com/siderolabs/talos/pkg/machinery v1.10.5 -> v1.10.6 + - github.com/siderolabs/tools v1.10.0-4-g9d54ed4 -> + v1.10.0-5-g31fd099 + - golang.org/x/sync v0.15.0 -> v0.16.0 + - golang.org/x/sys v0.33.0 -> v0.34.0 + - golang.org/x/text v0.26.0 -> v0.27.0 + +------------------------------------------------------------------- Old: ---- talosctl-1.10.5.obscpio New: ---- talosctl-1.10.6.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ talosctl.spec ++++++ --- /var/tmp/diff_new_pack.peKEbx/_old 2025-08-02 00:44:17.080858996 +0200 +++ /var/tmp/diff_new_pack.peKEbx/_new 2025-08-02 00:44:17.100859827 +0200 @@ -17,7 +17,7 @@ Name: talosctl -Version: 1.10.5 +Version: 1.10.6 Release: 0 Summary: CLI to interact with Talos Linux License: MPL-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.peKEbx/_old 2025-08-02 00:44:17.484875787 +0200 +++ /var/tmp/diff_new_pack.peKEbx/_new 2025-08-02 00:44:17.540878114 +0200 @@ -4,7 +4,7 @@ <param name="scm">git</param> <param name="exclude">.git</param> <param name="exclude">go.work</param> - <param name="revision">v1.10.5</param> + <param name="revision">v1.10.6</param> <param name="match-tag">v*</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> ++++++ talosctl-1.10.5.obscpio -> talosctl-1.10.6.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/CHANGELOG.md new/talosctl-1.10.6/CHANGELOG.md --- old/talosctl-1.10.5/CHANGELOG.md 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/CHANGELOG.md 2025-07-31 13:33:32.000000000 +0200 @@ -1,3 +1,80 @@ +## [Talos 1.10.6](https://github.com/siderolabs/talos/releases/tag/v1.10.6) (2025-07-31) + +Welcome to the v1.10.6 release of Talos! + + + +Please try out the release binaries and report any issues at +https://github.com/siderolabs/talos/issues. + +### Component Updates + +Linux: 6.12.40 +Kubernetes: 1.33.3 + +Talos is built with Go 1.24.5. + + +### Contributors + +* Andrey Smirnov +* Andrew Longwill +* Mateusz Urbanek + +### Changes +<details><summary>7 commits</summary> +<p> + +* [`755308906`](https://github.com/siderolabs/talos/commit/755308906f3ad3855a2d8755ceeec9d8a8263be8) fix: issues with reading GPT +* [`bb1cdc86b`](https://github.com/siderolabs/talos/commit/bb1cdc86b61b1890f1b7ae0da19ef6e6ad14b136) fix: issue with volume remount on service restart +* [`e8bbe4a51`](https://github.com/siderolabs/talos/commit/e8bbe4a516ea58d25e1b228df3558780e95c0c32) chore: tag aws snapshots created via ci with the image name +* [`e59522577`](https://github.com/siderolabs/talos/commit/e59522577bfabee9381b3073e46730ff0dfbec4b) feat: include AMD encrypted mem modules into base +* [`68a485269`](https://github.com/siderolabs/talos/commit/68a4852699160abd56c5218ecfa0b0effc38096a) fix: add more bootloader probe logs on upgrade +* [`d76649dd5`](https://github.com/siderolabs/talos/commit/d76649dd570964c55986b3b5739c2b6f42dd9051) fix: talos endpoint might not be created in Kubernetes +* [`e62175948`](https://github.com/siderolabs/talos/commit/e62175948c0058b712bac331b2717aa3f2bc16ab) feat: update Linux to 6.12.40 +</p> +</details> + +### Changes from siderolabs/gen +<details><summary>1 commit</summary> +<p> + +* [`044d921`](https://github.com/siderolabs/gen/commit/044d921685bbd8b603a64175ea63b07efe9a64a7) feat: add xslices.Deduplicate +</p> +</details> + +### Changes from siderolabs/pkgs +<details><summary>5 commits</summary> +<p> + +* [`2e6dd0a`](https://github.com/siderolabs/pkgs/commit/2e6dd0a3b624b816824cc08716ec90a4f2322d31) feat: update Linux to 6.12.40 +* [`3657b7d`](https://github.com/siderolabs/pkgs/commit/3657b7d755532a411f24c40c723f4e8456f0898d) feat: update Linux to 6.12.38 +* [`a8e77ff`](https://github.com/siderolabs/pkgs/commit/a8e77ffa5b52b40b36d8767cf9ffb401a1575aa7) feat: enable AMD encrypted memory +* [`8dd783f`](https://github.com/siderolabs/pkgs/commit/8dd783fcf6b4120761dca1236697904e6c76cd4c) feat: update Linux to 6.12.36 and firmware +* [`7e49fce`](https://github.com/siderolabs/pkgs/commit/7e49fce6cbb55497c4954878907006ba0f5bf1ad) feat: update tools and toolchain +</p> +</details> + +### Changes from siderolabs/tools +<details><summary>1 commit</summary> +<p> + +* [`31fd099`](https://github.com/siderolabs/tools/commit/31fd099ca3272a75b5402c413b168c2ca7e8270d) feat: update Go to 1.24.5 +</p> +</details> + +### Dependency Changes + +* **github.com/siderolabs/gen** v0.8.4 -> v0.8.5 +* **github.com/siderolabs/go-blockdevice/v2** v2.0.16 -> v2.0.19 +* **github.com/siderolabs/pkgs** v1.10.0-24-g28fa97d -> v1.10.0-29-g2e6dd0a +* **github.com/siderolabs/tools** v1.10.0-4-g9d54ed4 -> v1.10.0-5-g31fd099 +* **golang.org/x/sync** v0.15.0 -> v0.16.0 +* **golang.org/x/sys** v0.33.0 -> v0.34.0 +* **golang.org/x/text** v0.26.0 -> v0.27.0 + +Previous release can be found at [v1.10.5](https://github.com/siderolabs/talos/releases/tag/v1.10.5) + ## [Talos 1.10.5](https://github.com/siderolabs/talos/releases/tag/v1.10.5) (2025-07-03) Welcome to the v1.10.5 release of Talos! diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/Makefile new/talosctl-1.10.6/Makefile --- old/talosctl-1.10.5/Makefile 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/Makefile 2025-07-31 13:33:32.000000000 +0200 @@ -25,9 +25,9 @@ EMBED_TARGET ?= embed TOOLS_PREFIX ?= ghcr.io/siderolabs/tools -TOOLS ?= v1.10.0-4-g9d54ed4 +TOOLS ?= v1.10.0-5-g31fd099 PKGS_PREFIX ?= ghcr.io/siderolabs -PKGS ?= v1.10.0-24-g28fa97d +PKGS ?= v1.10.0-29-g2e6dd0a KRES_IMAGE ?= ghcr.io/siderolabs/kres:latest CONFORMANCE_IMAGE ?= ghcr.io/siderolabs/conform:latest @@ -125,7 +125,7 @@ INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM) INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM) # renovate: datasource=github-releases depName=kubernetes/kubernetes -KUBECTL_VERSION ?= v1.33.2 +KUBECTL_VERSION ?= v1.33.3 # renovate: datasource=github-releases depName=kastenhq/kubestr KUBESTR_VERSION ?= v0.4.48 # renovate: datasource=github-releases depName=helm/helm diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/cmd/installer/pkg/install/install.go new/talosctl-1.10.6/cmd/installer/pkg/install/install.go --- old/talosctl-1.10.5/cmd/installer/pkg/install/install.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/cmd/installer/pkg/install/install.go 2025-07-31 13:33:32.000000000 +0200 @@ -338,6 +338,7 @@ BlockProbeOptions: []blkid.ProbeOption{ blkid.WithSkipLocking(true), }, + Logger: log.Printf, }) if err != nil { return fmt.Errorf("failed to probe bootloader on upgrade: %w", err) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/go.mod new/talosctl-1.10.6/go.mod --- old/talosctl-1.10.5/go.mod 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/go.mod 2025-07-31 13:33:32.000000000 +0200 @@ -141,10 +141,10 @@ github.com/siderolabs/crypto v0.6.0 github.com/siderolabs/discovery-api v0.1.6 github.com/siderolabs/discovery-client v0.1.11 - github.com/siderolabs/gen v0.8.4 + github.com/siderolabs/gen v0.8.5 github.com/siderolabs/go-api-signature v0.3.6 github.com/siderolabs/go-blockdevice v0.4.8 - github.com/siderolabs/go-blockdevice/v2 v2.0.16 + github.com/siderolabs/go-blockdevice/v2 v2.0.19 github.com/siderolabs/go-circular v0.2.2 github.com/siderolabs/go-cmd v0.1.3 github.com/siderolabs/go-copy v0.1.0 @@ -165,7 +165,7 @@ github.com/siderolabs/net v0.4.0 github.com/siderolabs/proto-codec v0.1.2 github.com/siderolabs/siderolink v0.3.15 - github.com/siderolabs/talos/pkg/machinery v1.10.5 + github.com/siderolabs/talos/pkg/machinery v1.10.6 github.com/sirupsen/logrus v1.9.3 github.com/spf13/cobra v1.9.1 github.com/spf13/pflag v1.0.6 @@ -184,10 +184,10 @@ go4.org/netipx v0.0.0-20231129151722-fdeea329fbba golang.org/x/net v0.41.0 golang.org/x/oauth2 v0.30.0 - golang.org/x/sync v0.15.0 - golang.org/x/sys v0.33.0 + golang.org/x/sync v0.16.0 + golang.org/x/sys v0.34.0 golang.org/x/term v0.32.0 - golang.org/x/text v0.26.0 + golang.org/x/text v0.27.0 golang.org/x/time v0.11.0 golang.zx2c4.com/wireguard/wgctrl v0.0.0-20241231184526-a9ab2273dd10 google.golang.org/grpc v1.71.3 @@ -356,7 +356,7 @@ golang.org/x/crypto v0.39.0 // indirect golang.org/x/exp v0.0.0-20250128182459-e0ece0dbea4c // indirect golang.org/x/mod v0.25.0 // indirect - golang.org/x/tools v0.33.0 // indirect + golang.org/x/tools v0.34.0 // indirect golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 // indirect golang.zx2c4.com/wireguard v0.0.0-20231211153847-12269c276173 // indirect google.golang.org/genproto/googleapis/api v0.0.0-20250409194420-de1ac958c67a // indirect diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/go.sum new/talosctl-1.10.6/go.sum --- old/talosctl-1.10.5/go.sum 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/go.sum 2025-07-31 13:33:32.000000000 +0200 @@ -628,14 +628,14 @@ github.com/siderolabs/ethtool v0.4.0-sidero h1:Ls/M4bFUjfcB1RDVviPZlL3kWcXaEVVSbKke+EZ2A9U= github.com/siderolabs/ethtool v0.4.0-sidero/go.mod h1:nOIR88fiFTdBfakYLEUAhxdy75Ih/fgnSlsSKAHRpfc= github.com/siderolabs/gen v0.8.0/go.mod h1:an3a2Y53O7kUjnnK8Bfu3gewtvnIOu5RTU6HalFtXQQ= -github.com/siderolabs/gen v0.8.4 h1:1Xj/YvKTXgpnr9ZC7heKcskJo5wHvWOybwjQSCfEmsQ= -github.com/siderolabs/gen v0.8.4/go.mod h1:CRrktDXQf3yDJI7xKv+cDYhBbKdfd/YE16OpgcHoT9E= +github.com/siderolabs/gen v0.8.5 h1:xlWXTynnGD/epaj7uplvKvmAkBH+Fp51bLnw1JC0xME= +github.com/siderolabs/gen v0.8.5/go.mod h1:CRrktDXQf3yDJI7xKv+cDYhBbKdfd/YE16OpgcHoT9E= github.com/siderolabs/go-api-signature v0.3.6 h1:wDIsXbpl7Oa/FXvxB6uz4VL9INA9fmr3EbmjEZYFJrU= github.com/siderolabs/go-api-signature v0.3.6/go.mod h1:hoH13AfunHflxbXfh+NoploqV13ZTDfQ1mQJWNVSW9U= github.com/siderolabs/go-blockdevice v0.4.8 h1:KfdWvIx0Jft5YVuCsFIJFwjWEF1oqtzkgX9PeU9cX4c= github.com/siderolabs/go-blockdevice v0.4.8/go.mod h1:4PeOuk71pReJj1JQEXDE7kIIQJPVe8a+HZQa+qjxSEA= -github.com/siderolabs/go-blockdevice/v2 v2.0.16 h1:QeQ72S7M/rwXV1nah/uzyBPeF/PLCEwuSqj1hFeZYQU= -github.com/siderolabs/go-blockdevice/v2 v2.0.16/go.mod h1:74htzCV913UzaLZ4H+NBXkwWlYnBJIq5m/379ZEcu8w= +github.com/siderolabs/go-blockdevice/v2 v2.0.19 h1:V2a7HHzXlgMcZWUxpYp6BdapnwJGDAs/oGy1zkPicNA= +github.com/siderolabs/go-blockdevice/v2 v2.0.19/go.mod h1:nqUmQxOSex/Sg70x+QyhdE/VtXZ6Q53Z4FoR2RFBzZU= github.com/siderolabs/go-circular v0.2.2 h1:Q+bA7Ogboh2zDS2zapBirLGIlEcVcqimsQ0DdjxmsAw= github.com/siderolabs/go-circular v0.2.2/go.mod h1:NFcac49cEhUQnuU3lf4HbT0NLS0iaIx4veWfGaA2FDs= github.com/siderolabs/go-cmd v0.1.3 h1:JrgZwqhJQeoec3QRON0LK+fv+0y7d0DyY7zsfkO6ciw= @@ -899,8 +899,8 @@ golang.org/x/sync v0.6.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk= golang.org/x/sync v0.7.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk= golang.org/x/sync v0.10.0/go.mod h1:Czt+wKu1gCyEFDUtn0jG5QVvpJ6rzVqr5aXyt9drQfk= -golang.org/x/sync v0.15.0 h1:KWH3jNZsfyT6xfAfKiz6MRNmd46ByHDYaZ7KSkCtdW8= -golang.org/x/sync v0.15.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA= +golang.org/x/sync v0.16.0 h1:ycBJEhp9p4vXvUZNszeOq0kGTPghopOL8q0fq3vstxw= +golang.org/x/sync v0.16.0/go.mod h1:1dzgHSNfp02xaA81J2MS99Qcpr2w7fw1gpm99rleRqA= golang.org/x/sys v0.0.0-20180830151530-49385e6e1522/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190215142949-d0b11bdaac8a/go.mod h1:STP8DvDyc/dI5b8T5hshtkjS+E42TnysNCUPdjciGhY= golang.org/x/sys v0.0.0-20190312061237-fead79001313/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= @@ -958,8 +958,8 @@ golang.org/x/sys v0.20.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/sys v0.29.0/go.mod h1:/VUhepiaJMQUp4+oa/7Zr1D23ma6VTLIYjOOTFZPUcA= golang.org/x/sys v0.32.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k= -golang.org/x/sys v0.33.0 h1:q3i8TbbEz+JRD9ywIRlyRAQbM0qF7hu24q3teo2hbuw= -golang.org/x/sys v0.33.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k= +golang.org/x/sys v0.34.0 h1:H5Y5sJ2L2JRdyv7ROF1he/lPdvFsd0mJHFw2ThKHxLA= +golang.org/x/sys v0.34.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k= golang.org/x/telemetry v0.0.0-20240228155512-f48c80bd79b2/go.mod h1:TeRTkGYfJXctD9OcfyVLyj2J3IxLnKwHJR8f4D8a3YE= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8= @@ -985,8 +985,8 @@ golang.org/x/text v0.14.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU= golang.org/x/text v0.15.0/go.mod h1:18ZOQIKpY8NJVqYksKHtTdi31H5itFRjB5/qKTNYzSU= golang.org/x/text v0.21.0/go.mod h1:4IBbMaMmOPCJ8SecivzSH54+73PCFmPWxNTLm+vZkEQ= -golang.org/x/text v0.26.0 h1:P42AVeLghgTYr4+xUnTRKDMqpar+PtX7KWuNQL21L8M= -golang.org/x/text v0.26.0/go.mod h1:QK15LZJUUQVJxhz7wXgxSy/CJaTFjd0G+YLonydOVQA= +golang.org/x/text v0.27.0 h1:4fGWRpyh641NLlecmyl4LOe6yDdfaYNrGb2zdfo4JV4= +golang.org/x/text v0.27.0/go.mod h1:1D28KMCvyooCX9hBiosv5Tz/+YLxj0j7XhWjpSUF7CU= golang.org/x/time v0.11.0 h1:/bpjEDfN9tkoN/ryeYHnv5hcMlc8ncjMcM4XBk5NWV0= golang.org/x/time v0.11.0/go.mod h1:CDIdPxbZBQxdj6cxyCIdrNogrJKMJ7pr37NYpMcMDSg= golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ= @@ -1009,8 +1009,8 @@ golang.org/x/tools v0.6.0/go.mod h1:Xwgl3UAJ/d3gWutnCtw505GrjyAbvKui8lOU390QaIU= golang.org/x/tools v0.13.0/go.mod h1:HvlwmtVNQAhOuCjW7xxvovg8wbNq7LwfXh/k7wXUl58= golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d/go.mod h1:aiJjzUbINMkxbQROHiO6hDPo2LHcIPhhQsa9DLh0yGk= -golang.org/x/tools v0.33.0 h1:4qz2S3zmRxbGIhDIAgjxvFutSvH5EfnsYrRBj0UI0bc= -golang.org/x/tools v0.33.0/go.mod h1:CIJMaWEY88juyUfo7UbgPqbC8rU2OqfAV1h2Qp0oMYI= +golang.org/x/tools v0.34.0 h1:qIpSLOxeCYGg9TrcJokLBG4KFA6d795g0xkBkiESGlo= +golang.org/x/tools v0.34.0/go.mod h1:pAP9OwEaY1CAW3HOmg3hLZC5Z0CCmzjAF2UQMSqNARg= golang.org/x/xerrors v0.0.0-20190717185122-a985d3407aa7/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191011141410-1b5146add898/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= golang.org/x/xerrors v0.0.0-20191204190536-9bdfabe68543/go.mod h1:I/5z698sn9Ka8TeJc9MKroUUfqBBauWjQqLJ2OPfmY0= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/hack/cloud-image-uploader/aws.go new/talosctl-1.10.6/hack/cloud-image-uploader/aws.go --- old/talosctl-1.10.5/hack/cloud-image-uploader/aws.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/hack/cloud-image-uploader/aws.go 2025-07-31 13:33:32.000000000 +0200 @@ -260,6 +260,24 @@ } //nolint:gocyclo +func (au *AWSUploader) tagSnapshot(ctx context.Context, svc *ec2.Client, snapshotID, imageName string) { + if snapshotID == "" { + return + } + + _, tagErr := svc.CreateTags(ctx, &ec2.CreateTagsInput{ + Resources: []string{snapshotID}, + Tags: []types.Tag{{ + Key: pointer.To("Name"), + Value: pointer.To(imageName), + }}, + }) + if tagErr != nil { + log.Printf("WARNING: failed to tag snapshot %s: %v", snapshotID, tagErr) + } +} + +//nolint:gocyclo func (au *AWSUploader) registerAMIArch(ctx context.Context, region string, svc *ec2.Client, arch, bucketName string, uploader *manager.Uploader) error { err := retry.Constant(30*time.Minute, retry.WithUnits(time.Second), retry.WithErrorLogging(true)).RetryWithContext(ctx, func(ctx context.Context) error { source, err := os.Open(au.Options.AWSImage(arch)) @@ -359,6 +377,8 @@ imageName = fmt.Sprintf("%s-%s-%s-%s", au.Options.NamePrefix, au.Options.Tag, region, arch) } + au.tagSnapshot(ctx, svc, snapshotID, imageName) + imageResp, err := svc.DescribeImages(ctx, &ec2.DescribeImagesInput{ Filters: []types.Filter{ { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/hack/modules-amd64.txt new/talosctl-1.10.6/hack/modules-amd64.txt --- old/talosctl-1.10.5/hack/modules-amd64.txt 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/hack/modules-amd64.txt 2025-07-31 13:33:32.000000000 +0200 @@ -175,6 +175,8 @@ kernel/drivers/vfio/pci/vfio-pci.ko kernel/drivers/vfio/vfio.ko kernel/drivers/vfio/vfio_iommu_type1.ko +kernel/drivers/virt/coco/sev-guest/sev-guest.ko +kernel/drivers/virt/coco/tsm.ko kernel/drivers/virtio/virtio_balloon.ko kernel/drivers/virtio/virtio_input.ko kernel/drivers/virtio/virtio_mmio.ko diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/hack/release.toml new/talosctl-1.10.6/hack/release.toml --- old/talosctl-1.10.5/hack/release.toml 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/hack/release.toml 2025-07-31 13:33:32.000000000 +0200 @@ -7,7 +7,7 @@ ignore_deps = ["github.com/coredns/coredns"] # previous release -previous = "v1.10.4" +previous = "v1.10.5" pre_release = false @@ -19,17 +19,10 @@ [notes.updates] title = "Component Updates" description = """\ -Linux: 6.12.35 -Kubernetes: 1.33.2 +Linux: 6.12.40 +Kubernetes: 1.33.3 -Talos is built with Go 1.24.4. -""" - - [notes.azure] - title = "Azure" - description = """\ -Talos on Azure now defaults to MTU of 1400 bytes for the `eth0` interface to avoid packet fragmentation issues. -The default MTU can be overriden with machine configuration. +Talos is built with Go 1.24.5. """ [make_deps] diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/hack/test/e2e.sh new/talosctl-1.10.6/hack/test/e2e.sh --- old/talosctl-1.10.5/hack/test/e2e.sh 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/hack/test/e2e.sh 2025-07-31 13:33:32.000000000 +0200 @@ -33,7 +33,7 @@ # Kubernetes export KUBECONFIG="${TMP}/kubeconfig" -export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.2} +export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.3} export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}" export TIMEOUT=1200 @@ -96,9 +96,10 @@ "${INTEGRATION_TEST}" \ -test.v \ + -talos.failfast \ -talos.talosctlpath "${TALOSCTL}" \ -talos.kubectlpath "${KUBECTL}" \ - -talos.helmpath "${HELM}" \ + -talos.helmpath "${HELM}" \ -talos.kubestrpath "${KUBESTR}" \ -talos.provisioner "${PROVISIONER}" \ -talos.name "${CLUSTER_NAME}" \ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/manifest.go new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/manifest.go --- old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/manifest.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/manifest.go 2025-07-31 13:33:32.000000000 +0200 @@ -229,7 +229,6 @@ if cfg.TalosAPIServiceEnabled { defaultManifests = slices.Concat(defaultManifests, []manifestDesc{ - {"12-talos-api-service", talosAPIService}, {"13-talos-service-account-crd", talosServiceAccountCRDTemplate}, }, ) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/templates/talos-api-service-template.yaml new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/templates/talos-api-service-template.yaml --- old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/templates/talos-api-service-template.yaml 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/templates/talos-api-service-template.yaml 1970-01-01 01:00:00.000000000 +0100 @@ -1,14 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - labels: - component: apid - provider: talos - name: {{ .KubernetesTalosAPIServiceName }} - namespace: {{ .KubernetesTalosAPIServiceNamespace }} -spec: - ports: - - name: apid - port: {{ .ApidPort }} - protocol: TCP - targetPort: {{ .ApidPort }} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/templates.go new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/templates.go --- old/talosctl-1.10.5/internal/app/machined/pkg/controllers/k8s/templates.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/controllers/k8s/templates.go 2025-07-31 13:33:32.000000000 +0200 @@ -71,12 +71,6 @@ //go:embed templates/pod-security-policy-template.yaml var podSecurityPolicy string -// talosAPIService is the service to access Talos API from Kubernetes. -// Service exposes the Endpoints which are managed by controllers. -// -//go:embed templates/talos-api-service-template.yaml -var talosAPIService string - var flannelTemplate = string(flannel.Template) // talosServiceAccountCRDTemplate is the template of the CRD which diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/controllers/kubeaccess/endpoint.go new/talosctl-1.10.6/internal/app/machined/pkg/controllers/kubeaccess/endpoint.go --- old/talosctl-1.10.5/internal/app/machined/pkg/controllers/kubeaccess/endpoint.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/controllers/kubeaccess/endpoint.go 2025-07-31 13:33:32.000000000 +0200 @@ -18,6 +18,7 @@ corev1 "k8s.io/api/core/v1" apierrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" + "k8s.io/apimachinery/pkg/util/intstr" "k8s.io/client-go/rest" "k8s.io/client-go/tools/clientcmd" clientcmdapi "k8s.io/client-go/tools/clientcmd/api" @@ -125,7 +126,7 @@ return fmt.Errorf("error loading kubeconfig: %w", err) } - if err = ctrl.updateTalosEndpoints(ctx, logger, kubeconfig, endpointAddrs); err != nil { + if err = ctrl.manageEndpoints(ctx, logger, kubeconfig, endpointAddrs); err != nil { return err } @@ -133,8 +134,7 @@ } } -//nolint:gocyclo -func (ctrl *EndpointController) updateTalosEndpoints(ctx context.Context, logger *zap.Logger, kubeconfig *rest.Config, endpointAddrs k8s.EndpointList) error { +func (ctrl *EndpointController) manageEndpoints(ctx context.Context, logger *zap.Logger, kubeconfig *rest.Config, endpointAddrs k8s.EndpointList) error { client, err := kubernetes.NewForConfig(kubeconfig) if err != nil { return fmt.Errorf("error building Kubernetes client: %w", err) @@ -142,6 +142,62 @@ defer client.Close() //nolint:errcheck + // create the Service before creating the Endpoints, as Kubernetes EndpointController will clean up orphaned Endpoints + if err = ctrl.ensureTalosService(ctx, client); err != nil { + return fmt.Errorf("error ensuring Talos API service: %w", err) + } + + // now create or update the Endpoints resource + if err = ctrl.ensureTalosEndpoints(ctx, logger, client, endpointAddrs); err != nil { + return fmt.Errorf("error ensuring Talos API endpoints: %w", err) + } + + return nil +} + +func (ctrl *EndpointController) ensureTalosService(ctx context.Context, client *kubernetes.Client) error { + _, err := client.CoreV1().Services(constants.KubernetesTalosAPIServiceNamespace).Get(ctx, constants.KubernetesTalosAPIServiceName, metav1.GetOptions{}) + if err == nil { + // service already exists, nothing to do + return nil + } + + if !apierrors.IsNotFound(err) { + return fmt.Errorf("error getting Talos API service: %w", err) + } + + // create the service if it does not exist + newService := &corev1.Service{ + ObjectMeta: metav1.ObjectMeta{ + Name: constants.KubernetesTalosAPIServiceName, + Namespace: constants.KubernetesTalosAPIServiceNamespace, + Labels: map[string]string{ + "provider": constants.KubernetesTalosProvider, + "component": "apid", + }, + }, + Spec: corev1.ServiceSpec{ + Ports: []corev1.ServicePort{ + { + Name: "apid", + Port: constants.ApidPort, + Protocol: corev1.ProtocolTCP, + TargetPort: intstr.FromInt(constants.ApidPort), + }, + }, + }, + } + + _, err = client.CoreV1().Services(constants.KubernetesTalosAPIServiceNamespace).Create(ctx, newService, metav1.CreateOptions{}) + if err != nil && !apierrors.IsAlreadyExists(err) { + return fmt.Errorf("error creating Talos API service: %w", err) + } + + return nil +} + +//nolint:gocyclo +func (ctrl *EndpointController) ensureTalosEndpoints(ctx context.Context, logger *zap.Logger, client *kubernetes.Client, endpointAddrs k8s.EndpointList) error { for { oldEndpoints, err := client.CoreV1().Endpoints(constants.KubernetesTalosAPIServiceNamespace).Get(ctx, constants.KubernetesTalosAPIServiceName, metav1.GetOptions{}) if err != nil && !apierrors.IsNotFound(err) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/bootloader.go new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/bootloader.go --- old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/bootloader.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/bootloader.go 2025-07-31 13:33:32.000000000 +0200 @@ -44,12 +44,16 @@ // // Returns nil if it cannot detect any supported bootloader. func Probe(disk string, options options.ProbeOptions) (Bootloader, error) { + options.Log("probing bootloader on %q", disk) + grubBootloader, err := grub.Probe(disk, options) if err != nil { return nil, err } if grubBootloader != nil { + options.Log("found GRUB bootloader on %q", disk) + return grubBootloader, nil } @@ -59,6 +63,8 @@ } if sdbootBootloader != nil { + options.Log("found sd-boot bootloader on %q", disk) + return sdbootBootloader, nil } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/grub/probe.go new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/grub/probe.go --- old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/grub/probe.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/grub/probe.go 2025-07-31 13:33:32.000000000 +0200 @@ -40,6 +40,10 @@ return callback(grubConf) } + if grubConf == nil { + options.Log("GRUB: config not found") + } + return nil }, options.BlockProbeOptions, @@ -53,6 +57,8 @@ ); err != nil { if xerrors.TagIs[mount.NotFoundTag](err) { // if partitions are not found, it means GRUB is not installed + options.Log("GRUB: BOOT partition not found, skipping probing") + return nil, nil } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/options/options.go new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/options/options.go --- old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/options/options.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/options/options.go 2025-07-31 13:33:32.000000000 +0200 @@ -98,4 +98,14 @@ // ProbeOptions configures bootloader probing. type ProbeOptions struct { BlockProbeOptions []blkid.ProbeOption + Logger func(format string, v ...any) +} + +// Log logs the message using the provided logger. +func (options *ProbeOptions) Log(format string, v ...any) { + if options.Logger == nil { + return + } + + options.Logger(format, v...) } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/sdboot/sdboot.go new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/sdboot/sdboot.go --- old/talosctl-1.10.5/internal/app/machined/pkg/runtime/v1alpha1/bootloader/sdboot/sdboot.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/runtime/v1alpha1/bootloader/sdboot/sdboot.go 2025-07-31 13:33:32.000000000 +0200 @@ -18,6 +18,7 @@ "github.com/ecks/uefi/efi/efivario" "github.com/foxboron/go-uefi/efi" "github.com/siderolabs/gen/xerrors" + "github.com/siderolabs/gen/xslices" "github.com/siderolabs/go-blockdevice/v2/blkid" "golang.org/x/sys/unix" @@ -72,6 +73,8 @@ func ProbeWithCallback(disk string, options options.ProbeOptions, callback func(*Config) error) (*Config, error) { // if not UEFI boot, nothing to do if !IsUEFIBoot() { + options.Log("sd-boot: not booted using UEFI, skipping probing") + return nil, nil } @@ -88,6 +91,8 @@ return nil, err } + options.Log("sd-boot: booted entry: %q", bootedEntry) + var sdbootConf *Config // read /boot/EFI and find if sd-boot is already being used @@ -118,9 +123,13 @@ return err } + options.Log("sd-boot: found UKI files: %v", xslices.Map(ukiFiles, filepath.Base)) + // here we handle a case when we boot of just kernel+initrd/uki/iso and we don't have a booted entry // then we know we're booted of UKI if bootedEntry == "" && len(ukiFiles) == 1 { + options.Log("sd-boot: no booted entry found, assuming the only UKI file: %s", ukiFiles[0]) + sdbootConf = &Config{ Default: filepath.Base(ukiFiles[0]), } @@ -128,6 +137,8 @@ for _, ukiFile := range ukiFiles { if strings.EqualFold(filepath.Base(ukiFile), bootedEntry) { + options.Log("sd-boot: default entry matched as %q", bootedEntry) + sdbootConf = &Config{ Default: bootedEntry, } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/internal/app/machined/pkg/system/volumes.go new/talosctl-1.10.6/internal/app/machined/pkg/system/volumes.go --- old/talosctl-1.10.5/internal/app/machined/pkg/system/volumes.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/internal/app/machined/pkg/system/volumes.go 2025-07-31 13:33:32.000000000 +0200 @@ -8,6 +8,7 @@ "context" "fmt" + "github.com/cosi-project/runtime/pkg/resource" "github.com/cosi-project/runtime/pkg/state" "github.com/siderolabs/talos/pkg/conditions" @@ -69,7 +70,11 @@ ctx, cancel := context.WithCancel(ctx) defer cancel() - _, err := cond.st.WatchFor(ctx, block.NewVolumeMountStatus(block.NamespaceName, cond.id).Metadata(), state.WithEventTypes(state.Created, state.Updated)) + _, err := cond.st.WatchFor(ctx, + block.NewVolumeMountStatus(block.NamespaceName, cond.id).Metadata(), + state.WithEventTypes(state.Created, state.Updated), + state.WithPhases(resource.PhaseRunning), + ) if err != nil { return err } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/constants/constants.go new/talosctl-1.10.6/pkg/machinery/constants/constants.go --- old/talosctl-1.10.5/pkg/machinery/constants/constants.go 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/pkg/machinery/constants/constants.go 2025-07-31 13:33:32.000000000 +0200 @@ -14,7 +14,7 @@ const ( // DefaultKernelVersion is the default Linux kernel version. - DefaultKernelVersion = "6.12.35-talos" + DefaultKernelVersion = "6.12.40-talos" // KernelParamConfig is the kernel parameter name for specifying the URL. // to the config. @@ -389,7 +389,7 @@ // DefaultKubernetesVersion is the default target version of the control plane. // renovate: datasource=github-releases depName=kubernetes/kubernetes - DefaultKubernetesVersion = "1.33.2" + DefaultKubernetesVersion = "1.33.3" // SupportedKubernetesVersions is the number of Kubernetes versions supported by Talos starting from DefaultKubernesVersion going backwards. SupportedKubernetesVersions = 6 @@ -1097,7 +1097,7 @@ DBusClientSocketLabel = "system_u:object_r:dbus_client_socket_t:s0" // GoVersion is the version of Go compiler this release was built with. - GoVersion = "go1.24.4" + GoVersion = "go1.24.5" // KubernetesTalosAPIServiceName is the name of the Kubernetes service to access Talos API. KubernetesTalosAPIServiceName = "talos" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/gendata/data/pkgs new/talosctl-1.10.6/pkg/machinery/gendata/data/pkgs --- old/talosctl-1.10.5/pkg/machinery/gendata/data/pkgs 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/pkg/machinery/gendata/data/pkgs 2025-07-31 13:33:32.000000000 +0200 @@ -1 +1 @@ -v1.10.0-24-g28fa97d \ No newline at end of file +v1.10.0-29-g2e6dd0a \ No newline at end of file diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/gendata/data/tag new/talosctl-1.10.6/pkg/machinery/gendata/data/tag --- old/talosctl-1.10.5/pkg/machinery/gendata/data/tag 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/pkg/machinery/gendata/data/tag 2025-07-31 13:33:32.000000000 +0200 @@ -1 +1 @@ -v1.10.5 \ No newline at end of file +v1.10.6 \ No newline at end of file diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/gendata/data/tools new/talosctl-1.10.6/pkg/machinery/gendata/data/tools --- old/talosctl-1.10.5/pkg/machinery/gendata/data/tools 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/pkg/machinery/gendata/data/tools 2025-07-31 13:33:32.000000000 +0200 @@ -1 +1 @@ -v1.10.0-4-g9d54ed4 \ No newline at end of file +v1.10.0-5-g31fd099 \ No newline at end of file diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/pkg/machinery/version/os-release new/talosctl-1.10.6/pkg/machinery/version/os-release --- old/talosctl-1.10.5/pkg/machinery/version/os-release 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/pkg/machinery/version/os-release 2025-07-31 13:33:32.000000000 +0200 @@ -1,7 +1,7 @@ NAME="Talos" ID=talos -VERSION_ID=v1.10.5 -PRETTY_NAME="Talos (v1.10.5)" +VERSION_ID=v1.10.6 +PRETTY_NAME="Talos (v1.10.6)" HOME_URL="https://www.talos.dev/" BUG_REPORT_URL="https://github.com/siderolabs/talos/issues" VENDOR_NAME="Sidero Labs" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/website/content/v1.10/reference/cli.md new/talosctl-1.10.6/website/content/v1.10/reference/cli.md --- old/talosctl-1.10.5/website/content/v1.10/reference/cli.md 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/website/content/v1.10/reference/cli.md 2025-07-31 13:33:32.000000000 +0200 @@ -144,7 +144,7 @@ --bad-rtc launch VM with bad RTC state (QEMU only) --cidr string CIDR of the cluster network (IPv4, ULA network for IPv6 is derived in automated way) (default "10.5.0.0/24") --cni-bin-path strings search path for CNI binaries (VM only) (default [/home/user/.talos/cni/bin]) - --cni-bundle-url string URL to download CNI bundle from (VM only) (default "https://github.com/siderolabs/talos/releases/download/v1.10.5/talosctl-cni-bundle-${ARCH}.tar.gz") + --cni-bundle-url string URL to download CNI bundle from (VM only) (default "https://github.com/siderolabs/talos/releases/download/v1.10.6/talosctl-cni-bundle-${ARCH}.tar.gz") --cni-cache-dir string CNI cache directory path (VM only) (default "/home/user/.talos/cni/cache") --cni-conf-dir string CNI config directory path (VM only) (default "/home/user/.talos/cni/conf.d") --config-injection-method string a method to inject machine config: default is HTTP server, 'metal-iso' to mount an ISO (QEMU only) @@ -186,7 +186,7 @@ --ipxe-boot-script string iPXE boot script (URL) to use --iso-path string the ISO path to use for the initial boot (VM only) --kubeprism-port int KubePrism port (set to 0 to disable) (default 7445) - --kubernetes-version string desired kubernetes version to run (default "1.33.2") + --kubernetes-version string desired kubernetes version to run (default "1.33.3") --memory int the limit on memory usage in MB (each control plane/VM) (default 2048) --memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048) --mount mount attach a mount to the container (Docker only) @@ -1364,7 +1364,7 @@ -h, --help help for config --install-disk string the disk to install to (default "/dev/sda") --install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest") - --kubernetes-version string desired kubernetes version to run (default "1.33.2") + --kubernetes-version string desired kubernetes version to run (default "1.33.3") -o, --output string destination to output generated files. when multiple output types are specified, it must be a directory. for a single output type, it must either be a file path, or "-" for stdout -t, --output-types strings types of outputs to be generated. valid types are: ["controlplane" "worker" "talosconfig"] (default [controlplane,worker,talosconfig]) -p, --persist the desired persist value for configs (default true) @@ -1797,7 +1797,7 @@ ### Examples ``` -talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.2 --image-cache-path=/tmp/talos-image-cache +talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.3 --image-cache-path=/tmp/talos-image-cache Alternatively, stdin can be piped to the command: talosctl images default | talosctl images cache-create --image-cache-path=/tmp/talos-image-cache --images=- @@ -2982,7 +2982,7 @@ --debug debug operation from kernel logs. --wait is set to true when this flag is set -f, --force force the upgrade (skip checks on etcd health and members, might lead to data loss) -h, --help help for upgrade - -i, --image string the container image to use for performing the install (default "ghcr.io/siderolabs/installer:v1.10.5") + -i, --image string the container image to use for performing the install (default "ghcr.io/siderolabs/installer:v1.10.6") --insecure upgrade using the insecure (encrypted with no auth) maintenance service -m, --reboot-mode string select the reboot mode during upgrade. Mode "powercycle" bypasses kexec. Valid values are: ["default" "powercycle"]. (default "default") -s, --stage stage the upgrade to perform it after a reboot @@ -3029,7 +3029,7 @@ --pre-pull-images pre-pull images before upgrade (default true) --proxy-image string kube-proxy image to use (default "registry.k8s.io/kube-proxy") --scheduler-image string kube-scheduler image to use (default "registry.k8s.io/kube-scheduler") - --to string the Kubernetes control plane version to upgrade to (default "1.33.2") + --to string the Kubernetes control plane version to upgrade to (default "1.33.3") --upgrade-kubelet upgrade kubelet service (default true) --with-docs patch all machine configs adding the documentation for each field (default true) --with-examples patch all machine configs with the commented examples (default true) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.5/website/content/v1.10/reference/configuration/v1alpha1/config.md new/talosctl-1.10.6/website/content/v1.10/reference/configuration/v1alpha1/config.md --- old/talosctl-1.10.5/website/content/v1.10/reference/configuration/v1alpha1/config.md 2025-07-03 16:21:40.000000000 +0200 +++ new/talosctl-1.10.6/website/content/v1.10/reference/configuration/v1alpha1/config.md 2025-07-31 13:33:32.000000000 +0200 @@ -86,7 +86,7 @@ {{< /highlight >}}</details> | | |`kubelet` |<a href="#Config.machine.kubelet">KubeletConfig</a> |Used to provide additional options to the kubelet. <details><summary>Show example(s)</summary>{{< highlight yaml >}} kubelet: - image: ghcr.io/siderolabs/kubelet:v1.33.2 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.33.3 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -497,7 +497,7 @@ {{< highlight yaml >}} machine: kubelet: - image: ghcr.io/siderolabs/kubelet:v1.33.2 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.33.3 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -550,7 +550,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The `image` field is an optional reference to an alternative kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: ghcr.io/siderolabs/kubelet:v1.33.2 +image: ghcr.io/siderolabs/kubelet:v1.33.3 {{< /highlight >}}</details> | | |`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list. <details><summary>Show example(s)</summary>{{< highlight yaml >}} clusterDNS: @@ -2889,7 +2889,7 @@ {{< /highlight >}}</details> | | |`apiServer` |<a href="#Config.cluster.apiServer">APIServerConfig</a> |API server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} apiServer: - image: registry.k8s.io/kube-apiserver:v1.33.2 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.33.3 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -2954,14 +2954,14 @@ {{< /highlight >}}</details> | | |`controllerManager` |<a href="#Config.cluster.controllerManager">ControllerManagerConfig</a> |Controller manager server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.33.2 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.33.3 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true {{< /highlight >}}</details> | | |`proxy` |<a href="#Config.cluster.proxy">ProxyConfig</a> |Kube-proxy server-specific configuration options <details><summary>Show example(s)</summary>{{< highlight yaml >}} proxy: - image: registry.k8s.io/kube-proxy:v1.33.2 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.33.3 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -2972,7 +2972,7 @@ {{< /highlight >}}</details> | | |`scheduler` |<a href="#Config.cluster.scheduler">SchedulerConfig</a> |Scheduler server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} scheduler: - image: registry.k8s.io/kube-scheduler:v1.33.2 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.33.3 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3216,7 +3216,7 @@ {{< highlight yaml >}} cluster: apiServer: - image: registry.k8s.io/kube-apiserver:v1.33.2 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.33.3 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -3284,7 +3284,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the API server manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-apiserver:v1.33.2 +image: registry.k8s.io/kube-apiserver:v1.33.3 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the API server. | | |`extraVolumes` |<a href="#Config.cluster.apiServer.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the API server static pod. | | @@ -3496,7 +3496,7 @@ {{< highlight yaml >}} cluster: controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.33.2 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.33.3 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true @@ -3506,7 +3506,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the controller manager manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-controller-manager:v1.33.2 +image: registry.k8s.io/kube-controller-manager:v1.33.3 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | | |`extraVolumes` |<a href="#Config.cluster.controllerManager.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the controller manager static pod. | | @@ -3576,7 +3576,7 @@ {{< highlight yaml >}} cluster: proxy: - image: registry.k8s.io/kube-proxy:v1.33.2 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.33.3 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -3593,7 +3593,7 @@ disabled: false {{< /highlight >}}</details> | | |`image` |string |The container image used in the kube-proxy manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-proxy:v1.33.2 +image: registry.k8s.io/kube-proxy:v1.33.3 {{< /highlight >}}</details> | | |`mode` |string |<details><summary>proxy mode of kube-proxy.</summary>The default is 'iptables'.</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | | @@ -3612,7 +3612,7 @@ {{< highlight yaml >}} cluster: scheduler: - image: registry.k8s.io/kube-scheduler:v1.33.2 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.33.3 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3622,7 +3622,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the scheduler manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-scheduler:v1.33.2 +image: registry.k8s.io/kube-scheduler:v1.33.3 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | | |`extraVolumes` |<a href="#Config.cluster.scheduler.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the scheduler static pod. | | ++++++ talosctl.obsinfo ++++++ --- /var/tmp/diff_new_pack.peKEbx/_old 2025-08-02 00:44:22.077066637 +0200 +++ /var/tmp/diff_new_pack.peKEbx/_new 2025-08-02 00:44:22.081066804 +0200 @@ -1,5 +1,5 @@ name: talosctl -version: 1.10.5 -mtime: 1751552500 -commit: 55fc623313ca69e47b31471c6024a7b05f6b3833 +version: 1.10.6 +mtime: 1753961612 +commit: cfa6c98cec12a4bc513d44ecffc47e70515481d1 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/talosctl/vendor.tar.gz /work/SRC/openSUSE:Factory/.talosctl.new.1085/vendor.tar.gz differ: char 85, line 1
