Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package eksctl for openSUSE:Factory checked in at 2025-11-27 15:20:29 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/eksctl (Old) and /work/SRC/openSUSE:Factory/.eksctl.new.14147 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "eksctl" Thu Nov 27 15:20:29 2025 rev:63 rq:1320277 version:0.219.0 Changes: -------- --- /work/SRC/openSUSE:Factory/eksctl/eksctl.changes 2025-11-25 17:01:33.059901335 +0100 +++ /work/SRC/openSUSE:Factory/.eksctl.new.14147/eksctl.changes 2025-11-27 15:22:12.022597182 +0100 @@ -1,0 +2,13 @@ +Thu Nov 27 05:51:57 UTC 2025 - Johannes Kastl <[email protected]> + +- Update to version 0.219.0: + * Breaking Changes + - Make AL2023 be the default for all k8s version to handle AL2 + deprecation (#8593) + * Features + - support Al2023 on outposts (#8599) + * Improvements + - Make AL2023 be the default for all k8s version to handle AL2 + deprecation (#8593) + +------------------------------------------------------------------- Old: ---- eksctl-0.218.0.obscpio New: ---- eksctl-0.219.0.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ eksctl.spec ++++++ --- /var/tmp/diff_new_pack.Jc9lHk/_old 2025-11-27 15:22:13.842673938 +0100 +++ /var/tmp/diff_new_pack.Jc9lHk/_new 2025-11-27 15:22:13.846674107 +0100 @@ -17,7 +17,7 @@ Name: eksctl -Version: 0.218.0 +Version: 0.219.0 Release: 0 Summary: The official CLI for Amazon EKS License: Apache-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.Jc9lHk/_old 2025-11-27 15:22:13.890675962 +0100 +++ /var/tmp/diff_new_pack.Jc9lHk/_new 2025-11-27 15:22:13.894676131 +0100 @@ -3,7 +3,7 @@ <param name="url">https://github.com/eksctl-io/eksctl</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v0.218.0</param> + <param name="revision">v0.219.0</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> <param name="changesgenerate">enable</param> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.Jc9lHk/_old 2025-11-27 15:22:13.918677144 +0100 +++ /var/tmp/diff_new_pack.Jc9lHk/_new 2025-11-27 15:22:13.918677144 +0100 @@ -3,6 +3,6 @@ <param name="url">https://github.com/weaveworks/eksctl</param> <param name="changesrevision">5b28c17948a1036f26becbbc02d23e61195e8a33</param></service><service name="tar_scm"> <param name="url">https://github.com/eksctl-io/eksctl</param> - <param name="changesrevision">2c98d61aaf5c1c74b1457854e718bacbeb7290c6</param></service></servicedata> + <param name="changesrevision">7ec7c50223cb20dd9f97367f250d2e391f23c1d5</param></service></servicedata> (No newline at EOF) ++++++ eksctl-0.218.0.obscpio -> eksctl-0.219.0.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/docs/release_notes/0.219.0.md new/eksctl-0.219.0/docs/release_notes/0.219.0.md --- old/eksctl-0.218.0/docs/release_notes/0.219.0.md 1970-01-01 01:00:00.000000000 +0100 +++ new/eksctl-0.219.0/docs/release_notes/0.219.0.md 2025-11-27 04:45:11.000000000 +0100 @@ -0,0 +1,18 @@ +# Release v0.219.0 + +## 💥 Breaking Changes + +- Make AL2023 be the default for all k8s version to handle AL2 deprecation (#8593) + +## 🚀 Features + +- support Al2023 on outposts (#8599) + +## 🎯 Improvements + +- Make AL2023 be the default for all k8s version to handle AL2 deprecation (#8593) + +## Acknowledgments + +The eksctl maintainers would like to sincerely thank @NicholasBlaskey. + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/integration/tests/accessentries/accessentries_test.go new/eksctl-0.219.0/integration/tests/accessentries/accessentries_test.go --- old/eksctl-0.218.0/integration/tests/accessentries/accessentries_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/integration/tests/accessentries/accessentries_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -493,7 +493,7 @@ WithArgs( "nodegroup", "--config-file", "-", - "--wait", + "--wait", "--approve", ). WithoutArg("--region", params.Region). WithStdin(clusterutils.Reader(clusterConfig)) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/integration/tests/crud/creategetdelete_test.go new/eksctl-0.219.0/integration/tests/crud/creategetdelete_test.go --- old/eksctl-0.218.0/integration/tests/crud/creategetdelete_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/integration/tests/crud/creategetdelete_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -247,7 +247,7 @@ Expect(descriptions).To(ContainElements( "EKS cluster (dedicated VPC: true, dedicated IAM: true) [created and managed by eksctl]", "EKS Managed Nodes (SSH access: false) [created by eksctl]", - "EKS nodes (AMI family: AmazonLinux2, SSH access: false, private networking: false) [created and managed by eksctl]", + "EKS nodes (AMI family: AmazonLinux2023, SSH access: false, private networking: false) [created and managed by eksctl]", )) }) }) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/integration/tests/dry_run/dry_run_test.go new/eksctl-0.219.0/integration/tests/dry_run/dry_run_test.go --- old/eksctl-0.218.0/integration/tests/dry_run/dry_run_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/integration/tests/dry_run/dry_run_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -287,7 +287,7 @@ Memory: "4", } - }, "--managed=false", "--instance-selector-vcpus=2", "--instance-selector-memory=4"), + }, "--managed=false", "--instance-selector-vcpus=2", "--instance-selector-memory=4", "--node-ami-family=AmazonLinux2"), Entry("instance selector options with managed nodegroup", func(actual, expected *api.ClusterConfig) { Expect(actual.ManagedNodeGroups[0].InstanceTypes).NotTo(BeEmpty()) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/assets/schema.json new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/assets/schema.json --- old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/assets/schema.json 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/assets/schema.json 2025-11-27 04:45:11.000000000 +0100 @@ -1432,12 +1432,12 @@ }, "amiFamily": { "type": "string", - "description": "Valid variants are: `\"AmazonLinux2\"` (default), `\"AmazonLinux2023\"`, `\"UbuntuPro2404\"`, `\"Ubuntu2404\"`, `\"UbuntuPro2204\"`, `\"Ubuntu2204\"`, `\"UbuntuPro2004\"`, `\"Ubuntu2004\"`, `\"Bottlerocket\"`, `\"WindowsServer2019CoreContainer\"`, `\"WindowsServer2019FullContainer\"`, `\"WindowsServer2022CoreContainer\"`, `\"WindowsServer2022FullContainer\"`.", - "x-intellij-html-description": "Valid variants are: <code>"AmazonLinux2"</code> (default), <code>"AmazonLinux2023"</code>, <code>"UbuntuPro2404"</code>, <code>"Ubuntu2404"</code>, <code>"UbuntuPro2204"</code>, <code>"Ubuntu2204"</code>, <code>"UbuntuPro2004"</code>, <code>"Ubuntu2004"</code>, <code>"Bottlerocket"</code>, <code>"WindowsServer2019CoreContainer"</code>, <code>"WindowsServer2019FullContainer"</code>, <code>"WindowsServer2022CoreContainer"</code>, <code>"WindowsServer2022FullContainer"</code>.", - "default": "AmazonLinux2", + "description": "Valid variants are: `\"AmazonLinux2023\"` (default), `\"AmazonLinux2\"`, `\"UbuntuPro2404\"`, `\"Ubuntu2404\"`, `\"UbuntuPro2204\"`, `\"Ubuntu2204\"`, `\"UbuntuPro2004\"`, `\"Ubuntu2004\"`, `\"Bottlerocket\"`, `\"WindowsServer2019CoreContainer\"`, `\"WindowsServer2019FullContainer\"`, `\"WindowsServer2022CoreContainer\"`, `\"WindowsServer2022FullContainer\"`.", + "x-intellij-html-description": "Valid variants are: <code>"AmazonLinux2023"</code> (default), <code>"AmazonLinux2"</code>, <code>"UbuntuPro2404"</code>, <code>"Ubuntu2404"</code>, <code>"UbuntuPro2204"</code>, <code>"Ubuntu2204"</code>, <code>"UbuntuPro2004"</code>, <code>"Ubuntu2004"</code>, <code>"Bottlerocket"</code>, <code>"WindowsServer2019CoreContainer"</code>, <code>"WindowsServer2019FullContainer"</code>, <code>"WindowsServer2022CoreContainer"</code>, <code>"WindowsServer2022FullContainer"</code>.", + "default": "AmazonLinux2023", "enum": [ - "AmazonLinux2", "AmazonLinux2023", + "AmazonLinux2", "UbuntuPro2404", "Ubuntu2404", "UbuntuPro2204", @@ -1782,12 +1782,12 @@ }, "amiFamily": { "type": "string", - "description": "Valid variants are: `\"AmazonLinux2\"` (default), `\"AmazonLinux2023\"`, `\"UbuntuPro2404\"`, `\"Ubuntu2404\"`, `\"UbuntuPro2204\"`, `\"Ubuntu2204\"`, `\"UbuntuPro2004\"`, `\"Ubuntu2004\"`, `\"Bottlerocket\"`, `\"WindowsServer2019CoreContainer\"`, `\"WindowsServer2019FullContainer\"`, `\"WindowsServer2022CoreContainer\"`, `\"WindowsServer2022FullContainer\"`.", - "x-intellij-html-description": "Valid variants are: <code>"AmazonLinux2"</code> (default), <code>"AmazonLinux2023"</code>, <code>"UbuntuPro2404"</code>, <code>"Ubuntu2404"</code>, <code>"UbuntuPro2204"</code>, <code>"Ubuntu2204"</code>, <code>"UbuntuPro2004"</code>, <code>"Ubuntu2004"</code>, <code>"Bottlerocket"</code>, <code>"WindowsServer2019CoreContainer"</code>, <code>"WindowsServer2019FullContainer"</code>, <code>"WindowsServer2022CoreContainer"</code>, <code>"WindowsServer2022FullContainer"</code>.", - "default": "AmazonLinux2", + "description": "Valid variants are: `\"AmazonLinux2023\"` (default), `\"AmazonLinux2\"`, `\"UbuntuPro2404\"`, `\"Ubuntu2404\"`, `\"UbuntuPro2204\"`, `\"Ubuntu2204\"`, `\"UbuntuPro2004\"`, `\"Ubuntu2004\"`, `\"Bottlerocket\"`, `\"WindowsServer2019CoreContainer\"`, `\"WindowsServer2019FullContainer\"`, `\"WindowsServer2022CoreContainer\"`, `\"WindowsServer2022FullContainer\"`.", + "x-intellij-html-description": "Valid variants are: <code>"AmazonLinux2023"</code> (default), <code>"AmazonLinux2"</code>, <code>"UbuntuPro2404"</code>, <code>"Ubuntu2404"</code>, <code>"UbuntuPro2204"</code>, <code>"Ubuntu2204"</code>, <code>"UbuntuPro2004"</code>, <code>"Ubuntu2004"</code>, <code>"Bottlerocket"</code>, <code>"WindowsServer2019CoreContainer"</code>, <code>"WindowsServer2019FullContainer"</code>, <code>"WindowsServer2022CoreContainer"</code>, <code>"WindowsServer2022FullContainer"</code>.", + "default": "AmazonLinux2023", "enum": [ - "AmazonLinux2", "AmazonLinux2023", + "AmazonLinux2", "UbuntuPro2404", "Ubuntu2404", "UbuntuPro2204", diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/defaults.go new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/defaults.go --- old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/defaults.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/defaults.go 2025-11-27 04:45:11.000000000 +0100 @@ -128,16 +128,12 @@ // Set default AMI family depending on Kubernetes version isAL2EOLVersion, _ := utils.IsMinVersion(AmazonLinux2EOLVersion, meta.Version) if isAL2EOLVersion { - // For newer Kubernetes versions, default to AL2023 - if ng.AMIFamily == "" { - ng.AMIFamily = NodeImageFamilyAmazonLinux2023 - } // Since AL2 isn't supported, throw an error if the user explicitly requested AL2 if ng.AMIFamily == NodeImageFamilyAmazonLinux2 { return fmt.Errorf("AmazonLinux2 is not supported for Kubernetes version %s", meta.Version) } } - // Default to AL2 for Kubernetes versions prior to AmazonLinux2EOLVersion + // Default to AL2023 for all Kubernetes versions. if ng.AMIFamily == "" { ng.AMIFamily = DefaultNodeImageFamily } @@ -164,22 +160,17 @@ // Thus, we only set up default AMI family when no custom AMI is being used. isAL2EOLVersion, _ := utils.IsMinVersion(AmazonLinux2EOLVersion, meta.Version) if ng.AMI == "" && isAL2EOLVersion { - // Set default AMI family depending on Kubernetes version - // For newer Kubernetes versions, default to AL2023 + // Default to AL2023 for all Kubernetes versions. if ng.AMIFamily == "" { - ng.AMIFamily = NodeImageFamilyAmazonLinux2023 + ng.AMIFamily = DefaultNodeImageFamily } // Since AL2 isn't supported for this K8s version, throw an error if the user explicitly requested AL2 if ng.AMIFamily == NodeImageFamilyAmazonLinux2 { return fmt.Errorf("AmazonLinux2 is not supported for Kubernetes version %s", meta.Version) } } else if ng.AMI == "" && ng.AMIFamily == "" { - // AL2023 is the default ami type on EKS managed nodegroups after 1.30. - if isMinVer, _ := utils.IsMinVersion(Version1_30, meta.Version); isMinVer { - ng.AMIFamily = NodeImageFamilyAmazonLinux2023 - } else { - ng.AMIFamily = NodeImageFamilyAmazonLinux2 - } + // Default to AL2023 for all Kubernetes versions. + ng.AMIFamily = DefaultNodeImageFamily } if ng.Tags == nil { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/defaults_test.go new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/defaults_test.go --- old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/defaults_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/defaults_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -278,14 +278,6 @@ Context("Container Runtime settings", func() { Context("Kubernetes version 1.23 or lower", func() { - It("defaults to dockerd as a container runtime", func() { - testNodeGroup := NodeGroup{ - NodeGroupBase: &NodeGroupBase{}, - } - err := SetNodeGroupDefaults(&testNodeGroup, &ClusterMeta{Version: Version1_23}, false) - Expect(err).NotTo(HaveOccurred()) - Expect(*testNodeGroup.ContainerRuntime).To(Equal(ContainerRuntimeDockerD)) - }) When("ami family is windows", func() { It("defaults to docker as a container runtime", func() { testNodeGroup := NodeGroup{ @@ -421,8 +413,8 @@ Entry("EKS 1.32 uses AL2023", "1.32", NodeImageFamilyAmazonLinux2023), Entry("EKS 1.31 uses AL2023", "1.31", NodeImageFamilyAmazonLinux2023), Entry("EKS 1.30 uses AL2023", "1.30", NodeImageFamilyAmazonLinux2023), - Entry("EKS 1.29 uses AL2", "1.29", NodeImageFamilyAmazonLinux2), - Entry("EKS 1.28 uses AL2", "1.28", NodeImageFamilyAmazonLinux2), + Entry("EKS 1.29 uses AL2", "1.29", NodeImageFamilyAmazonLinux2023), + Entry("EKS 1.28 uses AL2", "1.28", NodeImageFamilyAmazonLinux2023), ) }) @@ -475,7 +467,7 @@ } err := SetNodeGroupDefaults(ng, &ClusterMeta{Version: "1.32"}, false) Expect(err).NotTo(HaveOccurred()) - Expect(ng.AMIFamily).To(Equal(NodeImageFamilyAmazonLinux2)) + Expect(ng.AMIFamily).To(Equal(NodeImageFamilyAmazonLinux2023)) }) }) @@ -528,7 +520,7 @@ } err := SetManagedNodeGroupDefaults(ng, &ClusterMeta{Version: "1.29"}, false) Expect(err).NotTo(HaveOccurred()) - Expect(ng.AMIFamily).To(Equal(NodeImageFamilyAmazonLinux2)) + Expect(ng.AMIFamily).To(Equal(NodeImageFamilyAmazonLinux2023)) }) }) }) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/managed_nodegroup_test.go new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/managed_nodegroup_test.go --- old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/managed_nodegroup_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/managed_nodegroup_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -1,8 +1,6 @@ package v1alpha5 import ( - "fmt" - "github.com/aws/aws-sdk-go-v2/aws" . "github.com/onsi/ginkgo/v2" @@ -59,15 +57,6 @@ }, errMsg: "when using a custom AMI, amiFamily needs to be explicitly set via config file or via --node-ami-family flag", }), - Entry("Custom AMI without overrideBootstrapCommand", &nodeGroupCase{ - ng: &ManagedNodeGroup{ - NodeGroupBase: &NodeGroupBase{ - AMI: "ami-custom", - AMIFamily: DefaultNodeImageFamily, - }, - }, - errMsg: fmt.Sprintf("overrideBootstrapCommand is required when using a custom AMI based on %s", DefaultNodeImageFamily), - }), Entry("Custom AMI with Windows AMI family without overrideBootstrapCommand", &nodeGroupCase{ ng: &ManagedNodeGroup{ NodeGroupBase: &NodeGroupBase{ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/outposts_validation_test.go new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/outposts_validation_test.go --- old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/outposts_validation_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/outposts_validation_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -199,12 +199,13 @@ }, }, clusterConfig) if shouldFail { - Expect(err).To(MatchError("only AmazonLinux2 is supported on local clusters")) + Expect(err).To(MatchError("only AmazonLinux2 and AmazonLinux2023 is supported on local clusters")) } else { Expect(err).NotTo(HaveOccurred()) } }, Entry("AmazonLinux2", api.NodeImageFamilyAmazonLinux2, false), + Entry("AmazonLinux2023", api.NodeImageFamilyAmazonLinux2, false), Entry("Bottlerocket", api.NodeImageFamilyBottlerocket, true), Entry("Ubuntu2004", api.NodeImageFamilyUbuntu2004, true), Entry("UbuntuPro2004", api.NodeImageFamilyUbuntuPro2004, true), diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/types.go new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/types.go --- old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/types.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/types.go 2025-11-27 04:45:11.000000000 +0100 @@ -204,7 +204,7 @@ // All valid values of supported families should go in this block const ( // DefaultNodeImageFamily (default) - DefaultNodeImageFamily = NodeImageFamilyAmazonLinux2 + DefaultNodeImageFamily = NodeImageFamilyAmazonLinux2023 NodeImageFamilyAmazonLinux2023 = "AmazonLinux2023" NodeImageFamilyAmazonLinux2 = "AmazonLinux2" NodeImageFamilyUbuntuPro2404 = "UbuntuPro2404" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/validation.go new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/validation.go --- old/eksctl-0.218.0/pkg/apis/eksctl.io/v1alpha5/validation.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/apis/eksctl.io/v1alpha5/validation.go 2025-11-27 04:45:11.000000000 +0100 @@ -757,8 +757,8 @@ } return fmt.Errorf("AMI Family %s is not supported - use one of: %s", ng.AMIFamily, strings.Join(SupportedAMIFamilies(), ", ")) } - if controlPlaneOnOutposts && ng.AMIFamily != NodeImageFamilyAmazonLinux2 { - return fmt.Errorf("only %s is supported on local clusters", NodeImageFamilyAmazonLinux2) + if controlPlaneOnOutposts && (ng.AMIFamily != NodeImageFamilyAmazonLinux2 && ng.AMIFamily != NodeImageFamilyAmazonLinux2023) { + return fmt.Errorf("only %s and %s is supported on local clusters", NodeImageFamilyAmazonLinux2, NodeImageFamilyAmazonLinux2023) } } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/ctl/cmdutils/filter/nodegroup_filter_test.go new/eksctl-0.219.0/pkg/ctl/cmdutils/filter/nodegroup_filter_test.go --- old/eksctl-0.218.0/pkg/ctl/cmdutils/filter/nodegroup_filter_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/ctl/cmdutils/filter/nodegroup_filter_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -377,7 +377,7 @@ "nodeGroups": [ { "name": "test-ng1a", - "amiFamily": "AmazonLinux2", + "amiFamily": "AmazonLinux2023", "instanceType": "m5.large", "privateNetworking": false, "securityGroups": { @@ -423,7 +423,7 @@ }, { "name": "test-ng2a", - "amiFamily": "AmazonLinux2", + "amiFamily": "AmazonLinux2023", "instanceType": "m5.large", "privateNetworking": false, "securityGroups": { @@ -468,7 +468,7 @@ }, { "name": "test-ng3a", - "amiFamily": "AmazonLinux2", + "amiFamily": "AmazonLinux2023", "instanceType": "m3.large", "privateNetworking": false, "securityGroups": { @@ -514,7 +514,7 @@ }, { "name": "test-ng1b", - "amiFamily": "AmazonLinux2", + "amiFamily": "AmazonLinux2023", "instanceType": "m5.large", "privateNetworking": false, "securityGroups": { @@ -559,7 +559,7 @@ }, { "name": "test-ng2b", - "amiFamily": "AmazonLinux2", + "amiFamily": "AmazonLinux2023", "instanceType": "m5.xlarge", "privateNetworking": false, "securityGroups": { @@ -608,7 +608,7 @@ }, { "name": "test-ng3b", - "amiFamily": "AmazonLinux2", + "amiFamily": "AmazonLinux2023", "instanceType": "m5.large", "privateNetworking": false, "securityGroups": { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/ctl/create/nodegroup.go new/eksctl-0.219.0/pkg/ctl/create/nodegroup.go --- old/eksctl-0.218.0/pkg/ctl/create/nodegroup.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/ctl/create/nodegroup.go 2025-11-27 04:45:11.000000000 +0100 @@ -21,7 +21,7 @@ ) const ( - amazonLinux2EndOfSupportWarning = "Amazon EKS will no longer publish EKS-optimized Amazon Linux 2 (AL2) AMIs after November 26th, 2025. Additionally, Kubernetes version 1.32 is the last version for which Amazon EKS will release AL2 AMIs. From version 1.33 onwards, Amazon EKS will continue to release AL2023 and Bottlerocket based AMIs. The default AMI family when creating clusters and nodegroups in Eksctl will be changed to AL2023 in the future." + amazonLinux2EndOfSupportWarning = "Amazon EKS stopped publishing EKS-optimized Amazon Linux 2 (AL2) AMIs on November 26, 2025. AL2023 and Bottlerocket based AMIs for Amazon EKS are available for all supported Kubernetes versions including 1.33 and higher." ) func createNodeGroupCmd(cmd *cmdutils.Cmd) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/eks/api_test.go new/eksctl-0.219.0/pkg/eks/api_test.go --- old/eksctl-0.218.0/pkg/eks/api_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/eks/api_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -268,7 +268,7 @@ It("should resolve AMI using SSM Parameter Store by default", func() { provider.MockSSM().On("GetParameter", mock.Anything, &ssm.GetParameterInput{ - Name: aws.String("/aws/service/eks/optimized-ami/1.14/amazon-linux-2/recommended/image_id"), + Name: aws.String("/aws/service/eks/optimized-ami/1.14/amazon-linux-2023/x86_64/standard/recommended/image_id"), }).Return(&ssm.GetParameterOutput{ Parameter: &ssmtypes.Parameter{ Value: aws.String("ami-ssm"), diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/nodebootstrap/al2023.go new/eksctl-0.219.0/pkg/nodebootstrap/al2023.go --- old/eksctl-0.218.0/pkg/nodebootstrap/al2023.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/nodebootstrap/al2023.go 2025-11-27 04:45:11.000000000 +0100 @@ -133,18 +133,24 @@ serviceCIDR = clusterStatus.KubernetesNetworkConfig.ServiceIPv4CIDR } + clusterDetails := nodeadm.ClusterDetails{ + Name: m.cfg.Metadata.Name, + APIServerEndpoint: clusterStatus.Endpoint, + CertificateAuthority: clusterStatus.CertificateAuthorityData, + CIDR: serviceCIDR, + } + if m.cfg.IsControlPlaneOnOutposts() { + clusterDetails.ID = m.cfg.ID() + clusterDetails.EnableOutpost = ptr(true) + } + return &nodeadm.NodeConfig{ TypeMeta: metav1.TypeMeta{ Kind: nodeadmapi.KindNodeConfig, APIVersion: nodeadm.GroupVersion.String(), }, Spec: nodeadm.NodeConfigSpec{ - Cluster: nodeadm.ClusterDetails{ - Name: m.cfg.Metadata.Name, - APIServerEndpoint: clusterStatus.Endpoint, - CertificateAuthority: clusterStatus.CertificateAuthorityData, - CIDR: serviceCIDR, - }, + Cluster: clusterDetails, Kubelet: kubeletOptions, }, }, nil @@ -171,3 +177,5 @@ } return &config, nil } + +func ptr[T any](v T) *T { return &v } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/nodebootstrap/al2023_test.go new/eksctl-0.219.0/pkg/nodebootstrap/al2023_test.go --- old/eksctl-0.218.0/pkg/nodebootstrap/al2023_test.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/nodebootstrap/al2023_test.go 2025-11-27 04:45:11.000000000 +0100 @@ -30,6 +30,9 @@ var _ = DescribeTable("Unmanaged AL2023", func(e al2023Entry) { cfg, dns := makeDefaultClusterSettings() + if e.overrideClusterSettings != nil { + e.overrideClusterSettings(cfg) + } ng := api.NewNodeGroup() makeDefaultNPSettings(ng) @@ -56,6 +59,14 @@ }, expectedUserData: wrapMIMEParts(nodeConfig), }), + Entry("control plane on Outposts", al2023Entry{ + overrideClusterSettings: func(cc *api.ClusterConfig) { + cc.Outpost = &api.Outpost{ + ControlPlaneOutpostARN: "arn:aws:outposts:us-west-2:1234:outpost/op-1234", + } + cc.Status.ID = "51eaebb5-7e52-4e71-baba-e98a6314b10e" + }, expectedUserData: wrapMIMEParts(nodeConfigOutpost), + }), ) var _ = DescribeTable("Managed AL2023", func(e al2023Entry) { @@ -404,6 +415,33 @@ - --node-labels=alpha.eksctl.io/nodegroup-name=al2023-mng-test ` + + nodeConfigOutpost = `--// +Content-Type: application/node.eks.aws + +apiVersion: node.eks.aws/v1alpha1 +kind: NodeConfig +metadata: {} +spec: + cluster: + apiServerEndpoint: https://test.xxx.us-west-2.eks.amazonaws.com + certificateAuthority: dGVzdCBDQQ== + cidr: 10.100.0.0/16 + enableOutpost: true + id: 51eaebb5-7e52-4e71-baba-e98a6314b10e + name: al2023-test + containerd: {} + instance: + localStorage: {} + kubelet: + config: + clusterDNS: + - 10.100.0.10 + flags: + - --node-labels=alpha.eksctl.io/nodegroup-name=al2023-mng-test + +` + managedNodeConfigIPv6 = `--// Content-Type: application/node.eks.aws diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/pkg/version/release.go new/eksctl-0.219.0/pkg/version/release.go --- old/eksctl-0.218.0/pkg/version/release.go 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/pkg/version/release.go 2025-11-27 04:45:11.000000000 +0100 @@ -3,7 +3,7 @@ // This file was generated by release_generate.go; DO NOT EDIT. // Version is the version number in semver format X.Y.Z -var Version = "0.218.0" +var Version = "0.219.0" // PreReleaseID can be empty for releases, "rc.X" for release candidates and "dev" for snapshots var PreReleaseID = "dev" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/eksctl-0.218.0/userdocs/src/usage/outposts.md new/eksctl-0.219.0/userdocs/src/usage/outposts.md --- old/eksctl-0.218.0/userdocs/src/usage/outposts.md 2025-11-24 20:09:40.000000000 +0100 +++ new/eksctl-0.219.0/userdocs/src/usage/outposts.md 2025-11-27 04:45:11.000000000 +0100 @@ -204,7 +204,7 @@ ``` ???+ note - - Only Amazon Linux 2 is supported for nodegroups when the control plane is on Outposts. + - Only Amazon Linux 2023 is supported for nodegroups when the control plane is on Outposts. - Only EBS gp2 volume types are supported for nodegroups on Outposts. ++++++ eksctl.obsinfo ++++++ --- /var/tmp/diff_new_pack.Jc9lHk/_old 2025-11-27 15:22:17.358822221 +0100 +++ /var/tmp/diff_new_pack.Jc9lHk/_new 2025-11-27 15:22:17.366822558 +0100 @@ -1,5 +1,5 @@ name: eksctl -version: 0.218.0 -mtime: 1764011380 -commit: 2c98d61aaf5c1c74b1457854e718bacbeb7290c6 +version: 0.219.0 +mtime: 1764215111 +commit: 7ec7c50223cb20dd9f97367f250d2e391f23c1d5 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/eksctl/vendor.tar.gz /work/SRC/openSUSE:Factory/.eksctl.new.14147/vendor.tar.gz differ: char 13, line 1
