Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package talosctl for openSUSE:Factory checked in at 2025-05-31 19:17:16 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/talosctl (Old) and /work/SRC/openSUSE:Factory/.talosctl.new.16005 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "talosctl" Sat May 31 19:17:16 2025 rev:29 rq:1281587 version:1.10.3 Changes: -------- --- /work/SRC/openSUSE:Factory/talosctl/talosctl.changes 2025-05-20 09:38:02.721233841 +0200 +++ /work/SRC/openSUSE:Factory/.talosctl.new.16005/talosctl.changes 2025-05-31 19:18:15.730222116 +0200 @@ -1,0 +2,7 @@ +Sat May 31 06:41:20 UTC 2025 - Johannes Kastl <opensuse_buildserv...@ojkastl.de> + +- update to 1.10.3: + https://github.com/siderolabs/talos/releases/tag/v1.10.3 + * no CLI-related changes in the Changelog + +------------------------------------------------------------------- Old: ---- talosctl-1.10.2.obscpio New: ---- talosctl-1.10.3.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ talosctl.spec ++++++ --- /var/tmp/diff_new_pack.m4d7kt/_old 2025-05-31 19:18:16.718263737 +0200 +++ /var/tmp/diff_new_pack.m4d7kt/_new 2025-05-31 19:18:16.718263737 +0200 @@ -17,7 +17,7 @@ Name: talosctl -Version: 1.10.2 +Version: 1.10.3 Release: 0 Summary: CLI to interact with Talos Linux License: MPL-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.m4d7kt/_old 2025-05-31 19:18:16.758265421 +0200 +++ /var/tmp/diff_new_pack.m4d7kt/_new 2025-05-31 19:18:16.762265590 +0200 @@ -4,7 +4,7 @@ <param name="scm">git</param> <param name="exclude">.git</param> <param name="exclude">go.work</param> - <param name="revision">v1.10.2</param> + <param name="revision">v1.10.3</param> <param name="match-tag">v*</param> <param name="versionformat">@PARENT_TAG@</param> <param name="versionrewrite-pattern">v(.*)</param> ++++++ talosctl-1.10.2.obscpio -> talosctl-1.10.3.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/CHANGELOG.md new/talosctl-1.10.3/CHANGELOG.md --- old/talosctl-1.10.2/CHANGELOG.md 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/CHANGELOG.md 2025-05-29 08:34:28.000000000 +0200 @@ -1,3 +1,77 @@ +## [Talos 1.10.3](https://github.com/siderolabs/talos/releases/tag/v1.10.3) (2025-05-29) + +Welcome to the v1.10.3 release of Talos! + + + +Please try out the release binaries and report any issues at +https://github.com/siderolabs/talos/issues. + +### Component Updates + +Linux: 6.12.28 +Kubernetes: 1.33.1 + +Talos is built with Go 1.24.3. + + +### Contributors + +* Andrey Smirnov +* Noel Georgi + +### Changes +<details><summary>9 commits</summary> +<p> + +* [`85110deec`](https://github.com/siderolabs/talos/commit/85110deec25d0fbfe1cdfc4eec2189ad48bec8ad) fix(ci): reproducibility test +* [`64609aad5`](https://github.com/siderolabs/talos/commit/64609aad5c7986d0051e9ff2a1d0e232a65ee16b) fix(ci): iso reproducibility file permissions +* [`d24ef442b`](https://github.com/siderolabs/talos/commit/d24ef442bce8d3b09e7a839e992fb55b113c4300) fix: nocloud metadata for hostname +* [`d4eaf78dc`](https://github.com/siderolabs/talos/commit/d4eaf78dc6685072d98e31ab5cf4e9af37d3fd8d) fix: allow any PKI in Talos API +* [`2b5f34a41`](https://github.com/siderolabs/talos/commit/2b5f34a4127478c5aa46df85c44780bfd7cee9b0) fix: metal-iso reproducibility +* [`3692f6fef`](https://github.com/siderolabs/talos/commit/3692f6fefa8bc68337067505970013d3af531d64) fix: bump apid memory limit +* [`284ffe9cb`](https://github.com/siderolabs/talos/commit/284ffe9cbe5b933aacf5b3ae1434ca82296a00cf) feat: update default Kubernetes to v1.33.1 +* [`ecdac8802`](https://github.com/siderolabs/talos/commit/ecdac88029129a1e3ce6099ff64da333de4a0244) chore: clean up `/usr/bin` +* [`e9a6ba902`](https://github.com/siderolabs/talos/commit/e9a6ba902049f8608da984e8c0c101618cdab178) feat: update Linux to 6.12.28 +</p> +</details> + +### Changes from siderolabs/crypto +<details><summary>2 commits</summary> +<p> + +* [`17107ae`](https://github.com/siderolabs/crypto/commit/17107ae45403a2bcd4fecfb4660b60276652b00d) fix: add generic CSR generator and OpenSSL interop +* [`53659fc`](https://github.com/siderolabs/crypto/commit/53659fc35f6abd4ada7ffa22ef1b148cf93c0f28) refactor: split into files +</p> +</details> + +### Changes from siderolabs/pkgs +<details><summary>4 commits</summary> +<p> + +* [`39b9c9f`](https://github.com/siderolabs/pkgs/commit/39b9c9f841cb786f46a791ac392c66945c218eca) fix: drop pcre2 binaries +* [`b622793`](https://github.com/siderolabs/pkgs/commit/b6227930a0f68f9da7cd95b6928419c546b17ada) fix: drop broken symlinks +* [`ca63fc8`](https://github.com/siderolabs/pkgs/commit/ca63fc87df90a1fd1c44bc5b9c223f367843897f) fix: clean up some binaries +* [`1ff9dc5`](https://github.com/siderolabs/pkgs/commit/1ff9dc5cd64e43949e661e4eb3b6e6a92f063a8b) feat: update Linux 6.12.28, firmware +</p> +</details> + +### Dependency Changes + +* **github.com/siderolabs/crypto** v0.5.1 -> v0.6.0 +* **github.com/siderolabs/pkgs** v1.10.0-12-gb425b44 -> v1.10.0-16-g39b9c9f +* **k8s.io/api** v0.33.0 -> v0.33.1 +* **k8s.io/apimachinery** v0.33.0 -> v0.33.1 +* **k8s.io/apiserver** v0.33.0 -> v0.33.1 +* **k8s.io/client-go** v0.33.0 -> v0.33.1 +* **k8s.io/component-base** v0.33.0 -> v0.33.1 +* **k8s.io/kube-scheduler** v0.33.0 -> v0.33.1 +* **k8s.io/kubectl** v0.33.0 -> v0.33.1 +* **k8s.io/kubelet** v0.33.0 -> v0.33.1 +* **k8s.io/pod-security-admission** v0.33.0 -> v0.33.1 + +Previous release can be found at [v1.10.2](https://github.com/siderolabs/talos/releases/tag/v1.10.2) + ## [Talos 1.10.2](https://github.com/siderolabs/talos/releases/tag/v1.10.2) (2025-05-16) Welcome to the v1.10.2 release of Talos! diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/Makefile new/talosctl-1.10.3/Makefile --- old/talosctl-1.10.2/Makefile 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/Makefile 2025-05-29 08:34:28.000000000 +0200 @@ -27,7 +27,7 @@ TOOLS_PREFIX ?= ghcr.io/siderolabs/tools TOOLS ?= v1.10.0-2-gfa51331 PKGS_PREFIX ?= ghcr.io/siderolabs -PKGS ?= v1.10.0-12-gb425b44 +PKGS ?= v1.10.0-16-g39b9c9f KRES_IMAGE ?= ghcr.io/siderolabs/kres:latest CONFORMANCE_IMAGE ?= ghcr.io/siderolabs/conform:latest @@ -125,7 +125,7 @@ INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM) INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM) # renovate: datasource=github-releases depName=kubernetes/kubernetes -KUBECTL_VERSION ?= v1.33.0 +KUBECTL_VERSION ?= v1.33.1 # renovate: datasource=github-releases depName=kastenhq/kubestr KUBESTR_VERSION ?= v0.4.48 # renovate: datasource=github-releases depName=helm/helm @@ -338,6 +338,9 @@ # Build Abstractions +$(ARTIFACTS): + @mkdir -p $(ARTIFACTS) + .PHONY: base target-%: ## Builds the specified target defined in the Dockerfile. The build result will only remain in the build cache. @$(BUILD) \ @@ -570,23 +573,19 @@ $(ARTIFACTS)/$(INTEGRATION_TEST_PROVISION_DEFAULT_TARGET)-amd64: @$(MAKE) local-$(INTEGRATION_TEST_PROVISION_DEFAULT_TARGET) DEST=$(ARTIFACTS) PLATFORM=linux/amd64 WITH_RACE=true -$(ARTIFACTS)/kubectl: - @mkdir -p $(ARTIFACTS) +$(ARTIFACTS)/kubectl: $(ARTIFACTS) @curl -L -o $(ARTIFACTS)/kubectl "$(KUBECTL_URL)" @chmod +x $(ARTIFACTS)/kubectl -$(ARTIFACTS)/kubestr: - @mkdir -p $(ARTIFACTS) +$(ARTIFACTS)/kubestr: $(ARTIFACTS) @curl -L "$(KUBESTR_URL)" | tar xzf - -C $(ARTIFACTS) kubestr @chmod +x $(ARTIFACTS)/kubestr -$(ARTIFACTS)/helm: - @mkdir -p $(ARTIFACTS) +$(ARTIFACTS)/helm: $(ARTIFACTS) @curl -L "$(HELM_URL)" | tar xzf - -C $(ARTIFACTS) --strip-components=1 linux-amd64/helm @chmod +x $(ARTIFACTS)/helm -$(ARTIFACTS)/cilium: - @mkdir -p $(ARTIFACTS) +$(ARTIFACTS)/cilium: $(ARTIFACTS) @curl -L "$(CILIUM_CLI_URL)" | tar xzf - -C $(ARTIFACTS) cilium @chmod +x $(ARTIFACTS)/cilium @@ -704,12 +703,13 @@ done .PHONY: reproducibility-test -reproducibility-test: +reproducibility-test: $(ARTIFACTS) @$(MAKE) reproducibility-test-local-initramfs @$(MAKE) reproducibility-test-docker-installer-base INSTALLER_ARCH=targetarch PLATFORM=$(OPERATING_SYSTEM)/$(ARCH) @$(MAKE) reproducibility-test-docker-talos reproducibility-test-docker-imager reproducibility-test-docker-talosctl PLATFORM=$(OPERATING_SYSTEM)/$(ARCH) + @$(MAKE) reproducibility-test-iso -reproducibility-test-docker-%: +reproducibility-test-docker-%: $(ARTIFACTS) @rm -rf _out1/ _out2/ @mkdir -p _out1/ _out2/ @$(MAKE) docker-$* DEST=_out1/ @@ -717,7 +717,7 @@ @find _out1/ -type f | xargs -IFILE diffoscope FILE `echo FILE | sed 's/_out1/_out2/'` @rm -rf _out1/ _out2/ -reproducibility-test-local-%: +reproducibility-test-local-%: $(ARTIFACTS) @rm -rf _out1/ _out2/ @mkdir -p _out1/ _out2/ @$(MAKE) local-$* DEST=_out1/ @@ -725,6 +725,13 @@ @find _out1/ -type f | xargs -IFILE diffoscope FILE `echo FILE | sed 's/_out1/_out2/'` @rm -rf _out1/ _out2/ +reproducibility-test-iso: $(ARTIFACTS) + @$(MAKE) iso + mv $(ARTIFACTS)/metal-amd64.iso $(ARTIFACTS)/metal-amd64.iso.orig + @$(MAKE) iso + @diffoscope $(ARTIFACTS)/metal-amd64.iso.orig $(ARTIFACTS)/metal-amd64.iso + @rm -rf $(ARTIFACTS)/metal-amd64.iso.orig + .PHONY: ci-temp-release-tag ci-temp-release-tag: ## Generates a temporary release tag for CI run. @if [ -n "$(CI_RELEASE_TAG)" -a -n "$${GITHUB_ENV}" ]; then \ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/go.mod new/talosctl-1.10.3/go.mod --- old/talosctl-1.10.2/go.mod 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/go.mod 2025-05-29 08:34:28.000000000 +0200 @@ -35,16 +35,16 @@ // Kubernetes dependencies sharing the same version. require ( - k8s.io/api v0.33.0 - k8s.io/apimachinery v0.33.0 - k8s.io/apiserver v0.33.0 - k8s.io/client-go v0.33.0 - k8s.io/component-base v0.33.0 - k8s.io/cri-api v0.33.0 - k8s.io/kube-scheduler v0.33.0 - k8s.io/kubectl v0.33.0 - k8s.io/kubelet v0.33.0 - k8s.io/pod-security-admission v0.33.0 + k8s.io/api v0.33.1 + k8s.io/apimachinery v0.33.1 + k8s.io/apiserver v0.33.1 + k8s.io/client-go v0.33.1 + k8s.io/component-base v0.33.1 + k8s.io/cri-api v0.33.1 + k8s.io/kube-scheduler v0.33.1 + k8s.io/kubectl v0.33.1 + k8s.io/kubelet v0.33.1 + k8s.io/pod-security-admission v0.33.1 ) require ( @@ -138,7 +138,7 @@ github.com/ryanuber/go-glob v1.0.0 github.com/safchain/ethtool v0.5.10 github.com/scaleway/scaleway-sdk-go v1.0.0-beta.33 - github.com/siderolabs/crypto v0.5.1 + github.com/siderolabs/crypto v0.6.0 github.com/siderolabs/discovery-api v0.1.6 github.com/siderolabs/discovery-client v0.1.11 github.com/siderolabs/gen v0.8.0 @@ -165,7 +165,7 @@ github.com/siderolabs/net v0.4.0 github.com/siderolabs/proto-codec v0.1.2 github.com/siderolabs/siderolink v0.3.13 - github.com/siderolabs/talos/pkg/machinery v1.10.2 + github.com/siderolabs/talos/pkg/machinery v1.10.3 github.com/sirupsen/logrus v1.9.3 github.com/spf13/cobra v1.9.1 github.com/spf13/pflag v1.0.6 @@ -364,7 +364,7 @@ gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect - k8s.io/cli-runtime v0.33.0 // indirect + k8s.io/cli-runtime v0.33.1 // indirect k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff // indirect k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e // indirect kernel.org/pub/linux/libs/security/libcap/psx v1.2.76 // indirect diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/go.sum new/talosctl-1.10.3/go.sum --- old/talosctl-1.10.2/go.sum 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/go.sum 2025-05-29 08:34:28.000000000 +0200 @@ -619,8 +619,8 @@ github.com/sergi/go-diff v1.2.0/go.mod h1:STckp+ISIX8hZLjrqAeVduY0gWCT9IjLuqbuNXdaHfM= github.com/siderolabs/coredns v1.12.52 h1:t4jcCc9HKAE/5X+gzzlvVRwBYuLyFurRjzrYjs456JU= github.com/siderolabs/coredns v1.12.52/go.mod h1:PZ37h5Mk/Mv0a1ldG5x95AnOgchBNljj4MD1DKQr4gM= -github.com/siderolabs/crypto v0.5.1 h1:aZEUTZBoP8rH+0TqQAlUgazriPh89MrXf4R+th+m6ps= -github.com/siderolabs/crypto v0.5.1/go.mod h1:7RHC7eUKBx6RLS2lDaNXrQ83zY9iPH/aQSTxk1I4/j4= +github.com/siderolabs/crypto v0.6.0 h1:s33hNOneGhlxCI3fLKj2hgopeJkeRO7UYo3KL0HNVu4= +github.com/siderolabs/crypto v0.6.0/go.mod h1:7RHC7eUKBx6RLS2lDaNXrQ83zY9iPH/aQSTxk1I4/j4= github.com/siderolabs/discovery-api v0.1.6 h1:/LhsF1ytqFEfWwV0UKfUgn90k9fk5+rhYMJ9yeUB2yc= github.com/siderolabs/discovery-api v0.1.6/go.mod h1:s5CnTyRMGid/vJNSJs8Jw9I4tnKHu/2SGqP2ytTaePQ= github.com/siderolabs/discovery-client v0.1.11 h1:Au+7QZ+CIB6g4C7ZCC4m5Ai5Uso1g/I3/E4bSUElzF8= @@ -1103,32 +1103,32 @@ honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -k8s.io/api v0.33.0 h1:yTgZVn1XEe6opVpP1FylmNrIFWuDqe2H0V8CT5gxfIU= -k8s.io/api v0.33.0/go.mod h1:CTO61ECK/KU7haa3qq8sarQ0biLq2ju405IZAd9zsiM= -k8s.io/apimachinery v0.33.0 h1:1a6kHrJxb2hs4t8EE5wuR/WxKDwGN1FKH3JvDtA0CIQ= -k8s.io/apimachinery v0.33.0/go.mod h1:BHW0YOu7n22fFv/JkYOEfkUYNRN0fj0BlvMFWA7b+SM= -k8s.io/apiserver v0.33.0 h1:QqcM6c+qEEjkOODHppFXRiw/cE2zP85704YrQ9YaBbc= -k8s.io/apiserver v0.33.0/go.mod h1:EixYOit0YTxt8zrO2kBU7ixAtxFce9gKGq367nFmqI8= -k8s.io/cli-runtime v0.33.0 h1:Lbl/pq/1o8BaIuyn+aVLdEPHVN665tBAXUePs8wjX7c= -k8s.io/cli-runtime v0.33.0/go.mod h1:QcA+r43HeUM9jXFJx7A+yiTPfCooau/iCcP1wQh4NFw= -k8s.io/client-go v0.33.0 h1:UASR0sAYVUzs2kYuKn/ZakZlcs2bEHaizrrHUZg0G98= -k8s.io/client-go v0.33.0/go.mod h1:kGkd+l/gNGg8GYWAPr0xF1rRKvVWvzh9vmZAMXtaKOg= -k8s.io/component-base v0.33.0 h1:Ot4PyJI+0JAD9covDhwLp9UNkUja209OzsJ4FzScBNk= -k8s.io/component-base v0.33.0/go.mod h1:aXYZLbw3kihdkOPMDhWbjGCO6sg+luw554KP51t8qCU= -k8s.io/cri-api v0.33.0 h1:YyGNgWmuSREqFPlP3XCstlHLilYdW898KwtKoaTYwBs= -k8s.io/cri-api v0.33.0/go.mod h1:OLQvT45OpIA+tv91ZrpuFIGY+Y2Ho23poS7n115Aocs= +k8s.io/api v0.33.1 h1:tA6Cf3bHnLIrUK4IqEgb2v++/GYUtqiu9sRVk3iBXyw= +k8s.io/api v0.33.1/go.mod h1:87esjTn9DRSRTD4fWMXamiXxJhpOIREjWOSjsW1kEHw= +k8s.io/apimachinery v0.33.1 h1:mzqXWV8tW9Rw4VeW9rEkqvnxj59k1ezDUl20tFK/oM4= +k8s.io/apimachinery v0.33.1/go.mod h1:BHW0YOu7n22fFv/JkYOEfkUYNRN0fj0BlvMFWA7b+SM= +k8s.io/apiserver v0.33.1 h1:yLgLUPDVC6tHbNcw5uE9mo1T6ELhJj7B0geifra3Qdo= +k8s.io/apiserver v0.33.1/go.mod h1:VMbE4ArWYLO01omz+k8hFjAdYfc3GVAYPrhP2tTKccs= +k8s.io/cli-runtime v0.33.1 h1:TvpjEtF71ViFmPeYMj1baZMJR4iWUEplklsUQ7D3quA= +k8s.io/cli-runtime v0.33.1/go.mod h1:9dz5Q4Uh8io4OWCLiEf/217DXwqNgiTS/IOuza99VZE= +k8s.io/client-go v0.33.1 h1:ZZV/Ks2g92cyxWkRRnfUDsnhNn28eFpt26aGc8KbXF4= +k8s.io/client-go v0.33.1/go.mod h1:JAsUrl1ArO7uRVFWfcj6kOomSlCv+JpvIsp6usAGefA= +k8s.io/component-base v0.33.1 h1:EoJ0xA+wr77T+G8p6T3l4efT2oNwbqBVKR71E0tBIaI= +k8s.io/component-base v0.33.1/go.mod h1:guT/w/6piyPfTgq7gfvgetyXMIh10zuXA6cRRm3rDuY= +k8s.io/cri-api v0.33.1 h1:CEvLiHZm/uTTp/5qsesU8/OG1a56RPnwMk4Ae73bUvs= +k8s.io/cri-api v0.33.1/go.mod h1:OLQvT45OpIA+tv91ZrpuFIGY+Y2Ho23poS7n115Aocs= k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk= k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE= k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff h1:/usPimJzUKKu+m+TE36gUyGcf03XZEP0ZIKgKj35LS4= k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff/go.mod h1:5jIi+8yX4RIb8wk3XwBo5Pq2ccx4FP10ohkbSKCZoK8= -k8s.io/kube-scheduler v0.33.0 h1:G5psn7ynB5Vjfo0ia8uz32Gv46TRa5RgTq4PTm+yjR0= -k8s.io/kube-scheduler v0.33.0/go.mod h1:I+0aqwJ3G9f9pyfKfoN5b0uP9M6MinNpxXRlCXkM17E= -k8s.io/kubectl v0.33.0 h1:HiRb1yqibBSCqic4pRZP+viiOBAnIdwYDpzUFejs07g= -k8s.io/kubectl v0.33.0/go.mod h1:gAlGBuS1Jq1fYZ9AjGWbI/5Vk3M/VW2DK4g10Fpyn/0= -k8s.io/kubelet v0.33.0 h1:4pJA2Ge6Rp0kDNV76KH7pTBiaV2T1a1874QHMcubuSU= -k8s.io/kubelet v0.33.0/go.mod h1:iDnxbJQMy9DUNaML5L/WUlt3uJtNLWh7ZAe0JSp4Yi0= -k8s.io/pod-security-admission v0.33.0 h1:di/iicB5plCq+iQeqgf2s1N5DOSzTDiOOv5OiAbuYWE= -k8s.io/pod-security-admission v0.33.0/go.mod h1:McuUMtSclLNxQdCkDTTWqKR79jnpHT/022GuanVU/Wg= +k8s.io/kube-scheduler v0.33.1 h1:0WfBGqrfy3HzqgIVxIRpq+iYQKMgh24vcmAlvDYRkzo= +k8s.io/kube-scheduler v0.33.1/go.mod h1:Gz6+HUJcGvIkRk1PRLVniVwYasVvNhjhTbZWPh2gJ+8= +k8s.io/kubectl v0.33.1 h1:OJUXa6FV5bap6iRy345ezEjU9dTLxqv1zFTVqmeHb6A= +k8s.io/kubectl v0.33.1/go.mod h1:Z07pGqXoP4NgITlPRrnmiM3qnoo1QrK1zjw85Aiz8J0= +k8s.io/kubelet v0.33.1 h1:x4LCw1/iZVWOKA4RoITnuB8gMHnw31HPB3S0EF0EexE= +k8s.io/kubelet v0.33.1/go.mod h1:8WpdC9M95VmsqIdGSQrajXooTfT5otEj8pGWOm+KKfQ= +k8s.io/pod-security-admission v0.33.1 h1:amePfcTDgLHB1wpZFIO7chW3Pc/ikeYbniuMTQEcaB4= +k8s.io/pod-security-admission v0.33.1/go.mod h1:3gSyP5JPgte2EHjQheA81299vISL6D7DDvk2m9RQj6k= k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e h1:KqK5c/ghOm8xkHYhlodbp6i6+r+ChV2vuAuVRdFbLro= k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0= kernel.org/pub/linux/libs/security/libcap/cap v1.2.76 h1:mrdLPj8ujM6eIKGtd1PkkuCIodpFFDM42Cfm0YODkIM= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/hack/cleanup.sh new/talosctl-1.10.3/hack/cleanup.sh --- old/talosctl-1.10.2/hack/cleanup.sh 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/hack/cleanup.sh 2025-05-29 08:34:28.000000000 +0200 @@ -1,20 +1,6 @@ #!/bin/bash PREFIX="${1}" -function remove_symlinks() { - set +e - for l in $(find ${PREFIX} -type l); do - readlink $l | grep -q /toolchain - if [ $? == 0 ]; then - unlink $l - fi - done - set -e -} - -# Remove any symlinks that might have been need at build time. -remove_symlinks - # Remove any archives as we do not need them since everything is dynamically linked. find ${PREFIX} -type f -name \*.a -delete find ${PREFIX} -type f -name \*.la -delete @@ -33,6 +19,5 @@ ${PREFIX}/usr/libexec/getconf \ ${PREFIX}/var/db -# Remove contents of /usr/bin except for udevadm -# TODO: do not install these files in the first place. -# find ${PREFIX}/usr/bin \( -type f -o -type l \) ! -name udevadm -delete +# Drop broken symlinks. +find ${PREFIX} -xtype l -print -delete diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/hack/release.toml new/talosctl-1.10.3/hack/release.toml --- old/talosctl-1.10.2/hack/release.toml 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/hack/release.toml 2025-05-29 08:34:28.000000000 +0200 @@ -7,7 +7,7 @@ ignore_deps = ["github.com/coredns/coredns"] # previous release -previous = "v1.10.1" +previous = "v1.10.2" pre_release = false @@ -19,7 +19,8 @@ [notes.updates] title = "Component Updates" description = """ -Linux: 6.12.27 +Linux: 6.12.28 +Kubernetes: 1.33.1 Talos is built with Go 1.24.3. """ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/hack/test/e2e.sh new/talosctl-1.10.3/hack/test/e2e.sh --- old/talosctl-1.10.2/hack/test/e2e.sh 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/hack/test/e2e.sh 2025-05-29 08:34:28.000000000 +0200 @@ -33,7 +33,7 @@ # Kubernetes export KUBECONFIG="${TMP}/kubeconfig" -export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.0} +export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.33.1} export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}" export TIMEOUT=1200 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/controllers/secrets/api.go new/talosctl-1.10.3/internal/app/machined/pkg/controllers/secrets/api.go --- old/talosctl-1.10.2/internal/app/machined/pkg/controllers/secrets/api.go 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/app/machined/pkg/controllers/secrets/api.go 2025-05-29 08:34:28.000000000 +0200 @@ -345,7 +345,18 @@ defer remoteGen.Close() //nolint:errcheck - serverCSR, serverCert, err := x509.NewEd25519CSRAndIdentity( + // use the last CA in the list of accepted CAs as a template + if len(rootSpec.AcceptedCAs) == 0 { + return errors.New("no accepted CAs") + } + + acceptedCA, err := rootSpec.AcceptedCAs[len(rootSpec.AcceptedCAs)-1].GetCert() + if err != nil { + return fmt.Errorf("failed to parse CA certificate: %w", err) + } + + serverCSR, serverCert, err := x509.NewCSRAndIdentityFromCA( + acceptedCA, x509.IPAddresses(certSANs.StdIPs()), x509.DNSNames(certSANs.DNSNames), x509.CommonName(certSANs.FQDN), diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/metadata.go new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/metadata.go --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/metadata.go 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/metadata.go 2025-05-29 08:34:28.000000000 +0200 @@ -129,8 +129,8 @@ // MetadataConfig holds meta info. type MetadataConfig struct { Hostname string `yaml:"hostname,omitempty"` - InternalDNS string `json:"local-hostname,omitempty"` - ExternalDNS string `json:"public-hostname,omitempty"` + InternalDNS string `yaml:"local-hostname,omitempty"` + ExternalDNS string `yaml:"public-hostname,omitempty"` InstanceID string `yaml:"instance-id,omitempty"` InstanceType string `yaml:"instance-type,omitempty"` ProviderID string `yaml:"provider-id,omitempty"` diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/nocloud_test.go new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/nocloud_test.go --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/nocloud_test.go 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/nocloud_test.go 2025-05-29 08:34:28.000000000 +0200 @@ -25,20 +25,20 @@ "github.com/siderolabs/talos/pkg/machinery/resources/runtime" ) -//go:embed testdata/metadata-v1.yaml -var rawMetadataV1 []byte +//go:embed testdata/in-v1.yaml +var rawNetworkConfigV1 []byte -//go:embed testdata/metadata-v1-pnap.yaml -var rawMetadataV1Pnap []byte +//go:embed testdata/in-v1-pnap.yaml +var rawNetworkConfigV1Pnap []byte -//go:embed testdata/metadata-v2-nocloud.yaml -var rawMetadataV2Nocloud []byte +//go:embed testdata/in-v2-nocloud.yaml +var rawNetworkConfigV2Nocloud []byte -//go:embed testdata/metadata-v2-cloud-init.yaml -var rawMetadataV2CloudInit []byte +//go:embed testdata/in-v2-cloud-init.yaml +var rawNetworkConfigV2CloudInit []byte -//go:embed testdata/metadata-v2-serverscom.yaml -var rawMetadataV2Serverscom []byte +//go:embed testdata/in-v2-serverscom.yaml +var rawNetworkConfigV2Serverscom []byte //go:embed testdata/expected-v1.yaml var expectedNetworkConfigV1 string @@ -52,7 +52,7 @@ //go:embed testdata/expected-v2-serverscom.yaml var expectedNetworkConfigV2Serverscom string -func TestParseMetadata(t *testing.T) { +func TestParseNetworkConfig(t *testing.T) { t.Parallel() for _, tt := range []struct { @@ -64,29 +64,29 @@ }{ { name: "V1", - raw: rawMetadataV1, + raw: rawNetworkConfigV1, expected: expectedNetworkConfigV1, }, { name: "V1-pnap", - raw: rawMetadataV1Pnap, + raw: rawNetworkConfigV1Pnap, expected: expectedNetworkConfigV1Pnap, }, { name: "V2-nocloud", - raw: rawMetadataV2Nocloud, + raw: rawNetworkConfigV2Nocloud, expected: expectedNetworkConfigV2, expectedNeedsRecocile: true, }, { name: "V2-cloud-init", - raw: rawMetadataV2CloudInit, + raw: rawNetworkConfigV2CloudInit, expected: expectedNetworkConfigV2, expectedNeedsRecocile: true, }, { name: "V2-servers.com", - raw: rawMetadataV2Serverscom, + raw: rawNetworkConfigV2Serverscom, expected: expectedNetworkConfigV2Serverscom, }, } { @@ -172,3 +172,20 @@ }) } } + +//go:embed testdata/metadata-nocloud.yaml +var rawMetadataNocloud []byte + +func TestMedatada(t *testing.T) { + t.Parallel() + + var md nocloud.MetadataConfig + + err := yaml.Unmarshal(rawMetadataNocloud, &md) + require.NoError(t, err) + + assert.Equal(t, nocloud.MetadataConfig{ + InstanceID: "80d6927ecb30c1707b12f38ed1211535930ff16e", + InternalDNS: "talos-worker-3", + }, md) +} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v1-pnap.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v1-pnap.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v1-pnap.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v1-pnap.yaml 2025-05-29 08:34:28.000000000 +0200 @@ -0,0 +1,53 @@ +version: 1 +config: + +- type: physical + name: eno1np0 + mac_address: "3c:ec:ef:e0:45:28" + mtu: 9000 + +- type: physical + name: eno2np1 + mac_address: "3c:ec:ef:e0:45:29" + mtu: 9000 + +- type: bond + name: bond0 + mac_address: "3c:ec:ef:e0:45:28" + mtu: 9000 + bond_interfaces: + - eno1np0 + - eno2np1 + params: + bond-lacp-rate: fast + bond-miimon: 100 + bond-mode: 802.3ad + bond-xmit-hash-policy: layer3+4 + up-delay: 0 + down-delay: 0 + +# public frontend MERGED_FRONTEND vlan 2 +- type: vlan + name: bond0.2 + mtu: 9000 + vlan_id: 2 + vlan_link: bond0 + subnets: + - address: 1.2.3.4/29 + gateway: 1.2.3.5 + type: static + +# private backend vlan 4 +- type: vlan + mtu: 9000 + name: bond0.4 + vlan_id: 4 + vlan_link: bond0 + subnets: + - type: static + address: 10.0.0.11/24 + +- type: nameserver + address: + - 8.8.8.8 + - 8.8.4.4 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v1.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v1.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v1.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v1.yaml 2025-05-29 08:34:28.000000000 +0200 @@ -0,0 +1,29 @@ +version: 1 +config: + - type: physical + name: eth0 + mac_address: '68:05:ca:b8:f1:f7' + subnets: + - type: static + address: '192.168.1.11' + netmask: '255.255.255.0' + gateway: '192.168.1.1' + - type: static6 + address: '2001:2:3:4:5:6:7:f7/64' + gateway: 'fe80::1' + - type: physical + name: eth1 + mac_address: '68:05:ca:b8:f1:f9' + subnets: + - type: static + address: '192.168.2.11' + netmask: '255.255.255.0' + gateway: '192.168.2.1' + - type: static6 + address: '2001:2:3:4:5:6:7:f9/64' + gateway: 'fe80::2' + - type: nameserver + address: + - '192.168.1.1' + search: + - 'lan' diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-cloud-init.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-cloud-init.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-cloud-init.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-cloud-init.yaml 2025-05-29 08:34:28.000000000 +0200 @@ -0,0 +1,70 @@ +network: + version: 2 + ethernets: + eth0: + match: + macaddress: "00:20:6e:1f:f9:a8" + dhcp4: true + addresses: + - 192.168.14.2/24 + - 2001:1::1/64 + gateway4: 192.168.14.1 + gateway6: 2001:1::2 + nameservers: + search: [foo.local, bar.local] + addresses: [8.8.8.8] + eth1: + match: + macaddress: '00:20:6e:1f:f9:a9' + addresses: + - 10.22.14.2/32 + nameservers: + search: [ foo.local, bar.local ] + routes: + - to: "0.0.0.0/0" + via: "192.168.14.1" + metric: 100 + on-link: true + + ext1: + match: + macaddress: 68:05:ca:b8:f1:f8 + ext2: + match: + macaddress: 68:05:ca:b8:f1:f9 + + bonds: + bond0: + interfaces: + - ext1 + - ext2 + macaddress: e4:3d:1a:4d:6a:28 + mtu: 1500 + parameters: + mode: 802.3ad + mii-monitor-interval: 100 + down-delay: 200 + up-delay: 200 + lacp-rate: fast + transmit-hash-policy: layer3+4 + addresses: + - 10.10.4.140/29 + nameservers: + addresses: + - 1.1.1.1 + - 2.2.2.2 + routes: + - to: 10.0.0.0/8 + via: 10.10.4.147 + - to: 192.168.0.0/16 + via: 10.10.4.147 + - to: 188.42.208.0/21 + via: 10.10.4.147 + + vlans: + bond0.4: + id: 4 + link: bond0 + mtu: 1500 + addresses: + - 192.34.34.34/32 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-nocloud.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-nocloud.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-nocloud.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-nocloud.yaml 2025-05-29 08:34:28.000000000 +0200 @@ -0,0 +1,69 @@ +version: 2 +ethernets: + eth0: + match: + macaddress: "00:20:6e:1f:f9:a8" + dhcp4: true + addresses: + - 192.168.14.2/24 + - 2001:1::1/64 + gateway4: 192.168.14.1 + gateway6: 2001:1::2 + nameservers: + search: [foo.local, bar.local] + addresses: [8.8.8.8] + eth1: + match: + macaddress: '00:20:6e:1f:f9:a9' + addresses: + - 10.22.14.2/32 + nameservers: + search: [ foo.local, bar.local ] + routes: + - to: "0.0.0.0/0" + via: "192.168.14.1" + metric: 100 + on-link: true + + ext1: + match: + macaddress: 68:05:ca:b8:f1:f8 + ext2: + match: + macaddress: 68:05:ca:b8:f1:f9 + +bonds: + bond0: + interfaces: + - ext1 + - ext2 + macaddress: e4:3d:1a:4d:6a:28 + mtu: 1500 + parameters: + mode: 802.3ad + mii-monitor-interval: 100 + down-delay: 200 + up-delay: 200 + lacp-rate: fast + transmit-hash-policy: layer3+4 + addresses: + - 10.10.4.140/29 + nameservers: + addresses: + - 1.1.1.1 + - 2.2.2.2 + routes: + - to: 10.0.0.0/8 + via: 10.10.4.147 + - to: 192.168.0.0/16 + via: 10.10.4.147 + - to: 188.42.208.0/21 + via: 10.10.4.147 + +vlans: + bond0.4: + id: 4 + link: bond0 + mtu: 1500 + addresses: + - 192.34.34.34/32 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-serverscom.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-serverscom.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-serverscom.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/in-v2-serverscom.yaml 2025-05-29 08:34:28.000000000 +0200 @@ -0,0 +1,49 @@ +version: 2 +bonds: + aggi: + interfaces: + - int0 + - int1 + addresses: + - 10.26.98.92/29 + parameters: + mode: 802.3ad + lacp-rate: slow + mii-monitor-interval: 100 + up-delay: 200 + down-delay: 200 + transmit-hash-policy: layer3+4 + routes: + - to: 10.0.0.0/8 + via: 10.26.98.91 + - to: 192.168.0.0/16 + via: 10.26.98.91 + - to: 188.42.208.0/21 + via: 10.26.98.91 + agge: + interfaces: + - ext0 + - ext1 + addresses: + - 188.42.48.188/29 + parameters: + mode: 802.3ad + lacp-rate: slow + mii-monitor-interval: 100 + up-delay: 200 + down-delay: 200 + transmit-hash-policy: layer3+4 + gateway4: 188.42.48.187 +ethernets: + int0: + match: + macaddress: 68:05:ca:b8:f1:f8 + int1: + match: + macaddress: 68:05:ca:b8:f1:f9 + ext0: + match: + macaddress: 3c:ec:EF:e0:45:28 + ext1: + match: + macaddress: 3c:EC:ef:e0:45:29 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-nocloud.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-nocloud.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-nocloud.yaml 1970-01-01 01:00:00.000000000 +0100 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-nocloud.yaml 2025-05-29 08:34:28.000000000 +0200 @@ -0,0 +1,2 @@ +instance-id: 80d6927ecb30c1707b12f38ed1211535930ff16e +local-hostname: talos-worker-3 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v1-pnap.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v1-pnap.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v1-pnap.yaml 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v1-pnap.yaml 1970-01-01 01:00:00.000000000 +0100 @@ -1,53 +0,0 @@ -version: 1 -config: - -- type: physical - name: eno1np0 - mac_address: "3c:ec:ef:e0:45:28" - mtu: 9000 - -- type: physical - name: eno2np1 - mac_address: "3c:ec:ef:e0:45:29" - mtu: 9000 - -- type: bond - name: bond0 - mac_address: "3c:ec:ef:e0:45:28" - mtu: 9000 - bond_interfaces: - - eno1np0 - - eno2np1 - params: - bond-lacp-rate: fast - bond-miimon: 100 - bond-mode: 802.3ad - bond-xmit-hash-policy: layer3+4 - up-delay: 0 - down-delay: 0 - -# public frontend MERGED_FRONTEND vlan 2 -- type: vlan - name: bond0.2 - mtu: 9000 - vlan_id: 2 - vlan_link: bond0 - subnets: - - address: 1.2.3.4/29 - gateway: 1.2.3.5 - type: static - -# private backend vlan 4 -- type: vlan - mtu: 9000 - name: bond0.4 - vlan_id: 4 - vlan_link: bond0 - subnets: - - type: static - address: 10.0.0.11/24 - -- type: nameserver - address: - - 8.8.8.8 - - 8.8.4.4 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v1.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v1.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v1.yaml 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v1.yaml 1970-01-01 01:00:00.000000000 +0100 @@ -1,29 +0,0 @@ -version: 1 -config: - - type: physical - name: eth0 - mac_address: '68:05:ca:b8:f1:f7' - subnets: - - type: static - address: '192.168.1.11' - netmask: '255.255.255.0' - gateway: '192.168.1.1' - - type: static6 - address: '2001:2:3:4:5:6:7:f7/64' - gateway: 'fe80::1' - - type: physical - name: eth1 - mac_address: '68:05:ca:b8:f1:f9' - subnets: - - type: static - address: '192.168.2.11' - netmask: '255.255.255.0' - gateway: '192.168.2.1' - - type: static6 - address: '2001:2:3:4:5:6:7:f9/64' - gateway: 'fe80::2' - - type: nameserver - address: - - '192.168.1.1' - search: - - 'lan' diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-cloud-init.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-cloud-init.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-cloud-init.yaml 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-cloud-init.yaml 1970-01-01 01:00:00.000000000 +0100 @@ -1,70 +0,0 @@ -network: - version: 2 - ethernets: - eth0: - match: - macaddress: "00:20:6e:1f:f9:a8" - dhcp4: true - addresses: - - 192.168.14.2/24 - - 2001:1::1/64 - gateway4: 192.168.14.1 - gateway6: 2001:1::2 - nameservers: - search: [foo.local, bar.local] - addresses: [8.8.8.8] - eth1: - match: - macaddress: '00:20:6e:1f:f9:a9' - addresses: - - 10.22.14.2/32 - nameservers: - search: [ foo.local, bar.local ] - routes: - - to: "0.0.0.0/0" - via: "192.168.14.1" - metric: 100 - on-link: true - - ext1: - match: - macaddress: 68:05:ca:b8:f1:f8 - ext2: - match: - macaddress: 68:05:ca:b8:f1:f9 - - bonds: - bond0: - interfaces: - - ext1 - - ext2 - macaddress: e4:3d:1a:4d:6a:28 - mtu: 1500 - parameters: - mode: 802.3ad - mii-monitor-interval: 100 - down-delay: 200 - up-delay: 200 - lacp-rate: fast - transmit-hash-policy: layer3+4 - addresses: - - 10.10.4.140/29 - nameservers: - addresses: - - 1.1.1.1 - - 2.2.2.2 - routes: - - to: 10.0.0.0/8 - via: 10.10.4.147 - - to: 192.168.0.0/16 - via: 10.10.4.147 - - to: 188.42.208.0/21 - via: 10.10.4.147 - - vlans: - bond0.4: - id: 4 - link: bond0 - mtu: 1500 - addresses: - - 192.34.34.34/32 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-nocloud.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-nocloud.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-nocloud.yaml 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-nocloud.yaml 1970-01-01 01:00:00.000000000 +0100 @@ -1,69 +0,0 @@ -version: 2 -ethernets: - eth0: - match: - macaddress: "00:20:6e:1f:f9:a8" - dhcp4: true - addresses: - - 192.168.14.2/24 - - 2001:1::1/64 - gateway4: 192.168.14.1 - gateway6: 2001:1::2 - nameservers: - search: [foo.local, bar.local] - addresses: [8.8.8.8] - eth1: - match: - macaddress: '00:20:6e:1f:f9:a9' - addresses: - - 10.22.14.2/32 - nameservers: - search: [ foo.local, bar.local ] - routes: - - to: "0.0.0.0/0" - via: "192.168.14.1" - metric: 100 - on-link: true - - ext1: - match: - macaddress: 68:05:ca:b8:f1:f8 - ext2: - match: - macaddress: 68:05:ca:b8:f1:f9 - -bonds: - bond0: - interfaces: - - ext1 - - ext2 - macaddress: e4:3d:1a:4d:6a:28 - mtu: 1500 - parameters: - mode: 802.3ad - mii-monitor-interval: 100 - down-delay: 200 - up-delay: 200 - lacp-rate: fast - transmit-hash-policy: layer3+4 - addresses: - - 10.10.4.140/29 - nameservers: - addresses: - - 1.1.1.1 - - 2.2.2.2 - routes: - - to: 10.0.0.0/8 - via: 10.10.4.147 - - to: 192.168.0.0/16 - via: 10.10.4.147 - - to: 188.42.208.0/21 - via: 10.10.4.147 - -vlans: - bond0.4: - id: 4 - link: bond0 - mtu: 1500 - addresses: - - 192.34.34.34/32 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-serverscom.yaml new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-serverscom.yaml --- old/talosctl-1.10.2/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-serverscom.yaml 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/app/machined/pkg/runtime/v1alpha1/platform/nocloud/testdata/metadata-v2-serverscom.yaml 1970-01-01 01:00:00.000000000 +0100 @@ -1,49 +0,0 @@ -version: 2 -bonds: - aggi: - interfaces: - - int0 - - int1 - addresses: - - 10.26.98.92/29 - parameters: - mode: 802.3ad - lacp-rate: slow - mii-monitor-interval: 100 - up-delay: 200 - down-delay: 200 - transmit-hash-policy: layer3+4 - routes: - - to: 10.0.0.0/8 - via: 10.26.98.91 - - to: 192.168.0.0/16 - via: 10.26.98.91 - - to: 188.42.208.0/21 - via: 10.26.98.91 - agge: - interfaces: - - ext0 - - ext1 - addresses: - - 188.42.48.188/29 - parameters: - mode: 802.3ad - lacp-rate: slow - mii-monitor-interval: 100 - up-delay: 200 - down-delay: 200 - transmit-hash-policy: layer3+4 - gateway4: 188.42.48.187 -ethernets: - int0: - match: - macaddress: 68:05:ca:b8:f1:f8 - int1: - match: - macaddress: 68:05:ca:b8:f1:f9 - ext0: - match: - macaddress: 3c:ec:EF:e0:45:28 - ext1: - match: - macaddress: 3c:EC:ef:e0:45:29 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/internal/integration/api/apid.go new/talosctl-1.10.3/internal/integration/api/apid.go --- old/talosctl-1.10.2/internal/integration/api/apid.go 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/internal/integration/api/apid.go 2025-05-29 08:34:28.000000000 +0200 @@ -7,15 +7,22 @@ package api import ( + "bytes" "context" + "slices" + "testing" "time" "github.com/cosi-project/runtime/pkg/safe" + "github.com/dustin/go-humanize" "google.golang.org/grpc/codes" "github.com/siderolabs/talos/internal/integration/base" + machineapi "github.com/siderolabs/talos/pkg/machinery/api/machine" "github.com/siderolabs/talos/pkg/machinery/client" "github.com/siderolabs/talos/pkg/machinery/config/machine" + "github.com/siderolabs/talos/pkg/machinery/constants" + "github.com/siderolabs/talos/pkg/machinery/resources/config" "github.com/siderolabs/talos/pkg/machinery/resources/network" ) @@ -35,15 +42,7 @@ // SetupTest ... func (suite *ApidSuite) SetupTest() { // make sure API calls have timeout - suite.ctx, suite.ctxCancel = context.WithTimeout(context.Background(), 15*time.Second) - - if suite.Cluster == nil { - suite.T().Skip("information about routable endpoints is not available") - } - - if suite.APISuite.Endpoint != "" { - suite.T().Skip("test skipped as custom endpoint is set") - } + suite.ctx, suite.ctxCancel = context.WithTimeout(context.Background(), time.Minute) } // TearDownTest ... @@ -55,6 +54,14 @@ // TestControlPlaneRouting verify access to all nodes via each control plane node as an endpoints. func (suite *ApidSuite) TestControlPlaneRouting() { + if suite.Cluster == nil { + suite.T().Skip("information about routable endpoints is not available") + } + + if suite.APISuite.Endpoint != "" { + suite.T().Skip("test skipped as custom endpoint is set") + } + endpoints := suite.DiscoverNodeInternalIPsByType(suite.ctx, machine.TypeControlPlane) nodes := suite.DiscoverNodeInternalIPs(suite.ctx) @@ -97,6 +104,14 @@ // TestWorkerNoRouting verifies that worker nodes perform no routing. func (suite *ApidSuite) TestWorkerNoRouting() { + if suite.Cluster == nil { + suite.T().Skip("information about routable endpoints is not available") + } + + if suite.APISuite.Endpoint != "" { + suite.T().Skip("test skipped as custom endpoint is set") + } + endpoints := suite.DiscoverNodeInternalIPsByType(suite.ctx, machine.TypeWorker) nodes := suite.DiscoverNodeInternalIPs(suite.ctx) @@ -155,6 +170,68 @@ } } +// TestBigPayload verifies that big payloads are handled correctly. +func (suite *ApidSuite) TestBigPayload() { + if testing.Short() { + suite.T().Skip("skipping test in short mode") + } + + node := suite.RandomDiscoveredNodeInternalIP(machine.TypeWorker) + nodeCtx := client.WithNode(suite.ctx, node) + + suite.T().Logf("testing big payload on node %s", node) + + // we are going to simulate a big payload by making machine configuration big enough + cfg, err := safe.StateGetByID[*config.MachineConfig](nodeCtx, suite.Client.COSI, config.ActiveID) + suite.Require().NoError(err) + + originalCfg, err := cfg.Container().Bytes() + suite.Require().NoError(err) + + // the config is encoded twice in the resource gRPC message, so ensure that we can get to the one third of the size + const targetConfigSize = constants.GRPCMaxMessageSize / 3 + + suite.T().Logf("original config size: %d (%s), target size is %d (%s)", + len(originalCfg), humanize.Bytes(uint64(len(originalCfg))), targetConfigSize, humanize.Bytes(uint64(targetConfigSize)), + ) + + bytesToAdd := targetConfigSize - len(originalCfg) + if bytesToAdd <= 0 { + suite.T().Skip("configuration is already big enough") + } + + const commentLine = "# this is a comment line added to make the config bigger and bigger and bigger and bigger all the way\n" + + newConfig := slices.Concat(originalCfg, bytes.Repeat([]byte(commentLine), bytesToAdd/len(commentLine)+1)) + + suite.Assert().Greater(len(newConfig), targetConfigSize) + + _, err = suite.Client.ApplyConfiguration(nodeCtx, &machineapi.ApplyConfigurationRequest{ + Data: newConfig, + Mode: machineapi.ApplyConfigurationRequest_NO_REBOOT, + }) + suite.Require().NoError(err) + + // now get the machine configuration back several times + for range 5 { + cfg, err = safe.StateGetByID[*config.MachineConfig](nodeCtx, suite.Client.COSI, config.ActiveID) + suite.Require().NoError(err) + + // check that the configuration is the same + newCfg, err := cfg.Container().Bytes() + suite.Require().NoError(err) + + suite.Assert().Equal(newConfig, newCfg) + } + + // revert the configuration + _, err = suite.Client.ApplyConfiguration(nodeCtx, &machineapi.ApplyConfigurationRequest{ + Data: originalCfg, + Mode: machineapi.ApplyConfigurationRequest_NO_REBOOT, + }) + suite.Require().NoError(err) +} + func init() { allSuites = append(allSuites, new(ApidSuite)) } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/pkg/imager/iso/uefi.go new/talosctl-1.10.3/pkg/imager/iso/uefi.go --- old/talosctl-1.10.2/pkg/imager/iso/uefi.go 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/pkg/imager/iso/uefi.go 2025-05-29 08:34:28.000000000 +0200 @@ -171,6 +171,11 @@ } } + // fixup directory timestamps recursively + if err := utils.TouchFiles(printf, options.ScratchDir); err != nil { + return nil, err + } + if _, err := cmd.Run( "mcopy", "-s", // recursive @@ -186,11 +191,6 @@ return nil, err } - // fixup directory timestamps recursively - if err := utils.TouchFiles(printf, options.ScratchDir); err != nil { - return nil, err - } - printf("creating ISO image") return &ExecutorOptions{ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/pkg/machinery/constants/constants.go new/talosctl-1.10.3/pkg/machinery/constants/constants.go --- old/talosctl-1.10.2/pkg/machinery/constants/constants.go 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/pkg/machinery/constants/constants.go 2025-05-29 08:34:28.000000000 +0200 @@ -14,7 +14,7 @@ const ( // DefaultKernelVersion is the default Linux kernel version. - DefaultKernelVersion = "6.12.27-talos" + DefaultKernelVersion = "6.12.28-talos" // KernelParamConfig is the kernel parameter name for specifying the URL. // to the config. @@ -389,7 +389,7 @@ // DefaultKubernetesVersion is the default target version of the control plane. // renovate: datasource=github-releases depName=kubernetes/kubernetes - DefaultKubernetesVersion = "1.33.0" + DefaultKubernetesVersion = "1.33.1" // SupportedKubernetesVersions is the number of Kubernetes versions supported by Talos starting from DefaultKubernesVersion going backwards. SupportedKubernetesVersions = 6 @@ -796,7 +796,7 @@ CgroupApidReservedMemory = 16 * 1024 * 1024 // CgroupApidMaxMemory is the hard memory limit for the apid process. - CgroupApidMaxMemory = 40 * 1024 * 1024 + CgroupApidMaxMemory = 128 * 1024 * 1024 // CgroupApidMillicores is the CPU weight for the apid process. CgroupApidMillicores = 500 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/pkg/machinery/gendata/data/pkgs new/talosctl-1.10.3/pkg/machinery/gendata/data/pkgs --- old/talosctl-1.10.2/pkg/machinery/gendata/data/pkgs 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/pkg/machinery/gendata/data/pkgs 2025-05-29 08:34:28.000000000 +0200 @@ -1 +1 @@ -v1.10.0-12-gb425b44 \ No newline at end of file +v1.10.0-16-g39b9c9f \ No newline at end of file diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/pkg/machinery/gendata/data/tag new/talosctl-1.10.3/pkg/machinery/gendata/data/tag --- old/talosctl-1.10.2/pkg/machinery/gendata/data/tag 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/pkg/machinery/gendata/data/tag 2025-05-29 08:34:28.000000000 +0200 @@ -1 +1 @@ -v1.10.2 \ No newline at end of file +v1.10.3 \ No newline at end of file diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/pkg/machinery/go.mod new/talosctl-1.10.3/pkg/machinery/go.mod --- old/talosctl-1.10.2/pkg/machinery/go.mod 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/pkg/machinery/go.mod 2025-05-29 08:34:28.000000000 +0200 @@ -29,7 +29,7 @@ github.com/planetscale/vtprotobuf v0.6.1-0.20241121165744-79df5c4772f2 github.com/ryanuber/go-glob v1.0.0 github.com/santhosh-tekuri/jsonschema/v5 v5.3.1 - github.com/siderolabs/crypto v0.5.1 + github.com/siderolabs/crypto v0.6.0 github.com/siderolabs/gen v0.8.0 github.com/siderolabs/go-api-signature v0.3.6 github.com/siderolabs/go-pointer v1.0.1 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/pkg/machinery/go.sum new/talosctl-1.10.3/pkg/machinery/go.sum --- old/talosctl-1.10.2/pkg/machinery/go.sum 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/pkg/machinery/go.sum 2025-05-29 08:34:28.000000000 +0200 @@ -109,8 +109,8 @@ github.com/santhosh-tekuri/jsonschema/v5 v5.3.1/go.mod h1:uToXkOrWAZ6/Oc07xWQrPOhJotwFIyu2bBVN41fcDUY= github.com/sasha-s/go-deadlock v0.3.5 h1:tNCOEEDG6tBqrNDOX35j/7hL5FcFViG6awUGROb2NsU= github.com/sasha-s/go-deadlock v0.3.5/go.mod h1:bugP6EGbdGYObIlx7pUZtWqlvo8k9H6vCBBsiChJQ5U= -github.com/siderolabs/crypto v0.5.1 h1:aZEUTZBoP8rH+0TqQAlUgazriPh89MrXf4R+th+m6ps= -github.com/siderolabs/crypto v0.5.1/go.mod h1:7RHC7eUKBx6RLS2lDaNXrQ83zY9iPH/aQSTxk1I4/j4= +github.com/siderolabs/crypto v0.6.0 h1:s33hNOneGhlxCI3fLKj2hgopeJkeRO7UYo3KL0HNVu4= +github.com/siderolabs/crypto v0.6.0/go.mod h1:7RHC7eUKBx6RLS2lDaNXrQ83zY9iPH/aQSTxk1I4/j4= github.com/siderolabs/ethtool v0.4.0-sidero h1:Ls/M4bFUjfcB1RDVviPZlL3kWcXaEVVSbKke+EZ2A9U= github.com/siderolabs/ethtool v0.4.0-sidero/go.mod h1:nOIR88fiFTdBfakYLEUAhxdy75Ih/fgnSlsSKAHRpfc= github.com/siderolabs/gen v0.8.0 h1:Pj93+hexkk5hQ7izjJ6YXnEWc8vlzOmDwFz13/VzS7o= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/pkg/machinery/version/os-release new/talosctl-1.10.3/pkg/machinery/version/os-release --- old/talosctl-1.10.2/pkg/machinery/version/os-release 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/pkg/machinery/version/os-release 2025-05-29 08:34:28.000000000 +0200 @@ -1,7 +1,7 @@ NAME="Talos" ID=talos -VERSION_ID=v1.10.2 -PRETTY_NAME="Talos (v1.10.2)" +VERSION_ID=v1.10.3 +PRETTY_NAME="Talos (v1.10.3)" HOME_URL="https://www.talos.dev/" BUG_REPORT_URL="https://github.com/siderolabs/talos/issues" VENDOR_NAME="Sidero Labs" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/pkg/makefs/xfs_test.go new/talosctl-1.10.3/pkg/makefs/xfs_test.go --- old/talosctl-1.10.2/pkg/makefs/xfs_test.go 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/pkg/makefs/xfs_test.go 2025-05-29 08:34:28.000000000 +0200 @@ -104,7 +104,7 @@ var stdout bytes.Buffer - cmd := exec.Command("xfs_info", tempFile) + cmd := exec.Command("xfs_db", "-p", "xfs_info", "-c", "info", tempFile) cmd.Stdout = &stdout require.NoError(t, cmd.Run()) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/website/content/v1.10/reference/cli.md new/talosctl-1.10.3/website/content/v1.10/reference/cli.md --- old/talosctl-1.10.2/website/content/v1.10/reference/cli.md 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/website/content/v1.10/reference/cli.md 2025-05-29 08:34:28.000000000 +0200 @@ -144,7 +144,7 @@ --bad-rtc launch VM with bad RTC state (QEMU only) --cidr string CIDR of the cluster network (IPv4, ULA network for IPv6 is derived in automated way) (default "10.5.0.0/24") --cni-bin-path strings search path for CNI binaries (VM only) (default [/home/user/.talos/cni/bin]) - --cni-bundle-url string URL to download CNI bundle from (VM only) (default "https://github.com/siderolabs/talos/releases/download/v1.10.2/talosctl-cni-bundle-${ARCH}.tar.gz") + --cni-bundle-url string URL to download CNI bundle from (VM only) (default "https://github.com/siderolabs/talos/releases/download/v1.10.3/talosctl-cni-bundle-${ARCH}.tar.gz") --cni-cache-dir string CNI cache directory path (VM only) (default "/home/user/.talos/cni/cache") --cni-conf-dir string CNI config directory path (VM only) (default "/home/user/.talos/cni/conf.d") --config-injection-method string a method to inject machine config: default is HTTP server, 'metal-iso' to mount an ISO (QEMU only) @@ -186,7 +186,7 @@ --ipxe-boot-script string iPXE boot script (URL) to use --iso-path string the ISO path to use for the initial boot (VM only) --kubeprism-port int KubePrism port (set to 0 to disable) (default 7445) - --kubernetes-version string desired kubernetes version to run (default "1.33.0") + --kubernetes-version string desired kubernetes version to run (default "1.33.1") --memory int the limit on memory usage in MB (each control plane/VM) (default 2048) --memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048) --mount mount attach a mount to the container (Docker only) @@ -1364,7 +1364,7 @@ -h, --help help for config --install-disk string the disk to install to (default "/dev/sda") --install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest") - --kubernetes-version string desired kubernetes version to run (default "1.33.0") + --kubernetes-version string desired kubernetes version to run (default "1.33.1") -o, --output string destination to output generated files. when multiple output types are specified, it must be a directory. for a single output type, it must either be a file path, or "-" for stdout -t, --output-types strings types of outputs to be generated. valid types are: ["controlplane" "worker" "talosconfig"] (default [controlplane,worker,talosconfig]) -p, --persist the desired persist value for configs (default true) @@ -1797,7 +1797,7 @@ ### Examples ``` -talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.0 --image-cache-path=/tmp/talos-image-cache +talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:v1.33.1 --image-cache-path=/tmp/talos-image-cache Alternatively, stdin can be piped to the command: talosctl images default | talosctl images cache-create --image-cache-path=/tmp/talos-image-cache --images=- @@ -2982,7 +2982,7 @@ --debug debug operation from kernel logs. --wait is set to true when this flag is set -f, --force force the upgrade (skip checks on etcd health and members, might lead to data loss) -h, --help help for upgrade - -i, --image string the container image to use for performing the install (default "ghcr.io/siderolabs/installer:v1.10.2") + -i, --image string the container image to use for performing the install (default "ghcr.io/siderolabs/installer:v1.10.3") --insecure upgrade using the insecure (encrypted with no auth) maintenance service -m, --reboot-mode string select the reboot mode during upgrade. Mode "powercycle" bypasses kexec. Valid values are: ["default" "powercycle"]. (default "default") -s, --stage stage the upgrade to perform it after a reboot @@ -3029,7 +3029,7 @@ --pre-pull-images pre-pull images before upgrade (default true) --proxy-image string kube-proxy image to use (default "registry.k8s.io/kube-proxy") --scheduler-image string kube-scheduler image to use (default "registry.k8s.io/kube-scheduler") - --to string the Kubernetes control plane version to upgrade to (default "1.33.0") + --to string the Kubernetes control plane version to upgrade to (default "1.33.1") --upgrade-kubelet upgrade kubelet service (default true) --with-docs patch all machine configs adding the documentation for each field (default true) --with-examples patch all machine configs with the commented examples (default true) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/talosctl-1.10.2/website/content/v1.10/reference/configuration/v1alpha1/config.md new/talosctl-1.10.3/website/content/v1.10/reference/configuration/v1alpha1/config.md --- old/talosctl-1.10.2/website/content/v1.10/reference/configuration/v1alpha1/config.md 2025-05-16 16:04:24.000000000 +0200 +++ new/talosctl-1.10.3/website/content/v1.10/reference/configuration/v1alpha1/config.md 2025-05-29 08:34:28.000000000 +0200 @@ -86,7 +86,7 @@ {{< /highlight >}}</details> | | |`kubelet` |<a href="#Config.machine.kubelet">KubeletConfig</a> |Used to provide additional options to the kubelet. <details><summary>Show example(s)</summary>{{< highlight yaml >}} kubelet: - image: ghcr.io/siderolabs/kubelet:v1.33.0 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.33.1 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -497,7 +497,7 @@ {{< highlight yaml >}} machine: kubelet: - image: ghcr.io/siderolabs/kubelet:v1.33.0 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.33.1 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -550,7 +550,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The `image` field is an optional reference to an alternative kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: ghcr.io/siderolabs/kubelet:v1.33.0 +image: ghcr.io/siderolabs/kubelet:v1.33.1 {{< /highlight >}}</details> | | |`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list. <details><summary>Show example(s)</summary>{{< highlight yaml >}} clusterDNS: @@ -2889,7 +2889,7 @@ {{< /highlight >}}</details> | | |`apiServer` |<a href="#Config.cluster.apiServer">APIServerConfig</a> |API server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} apiServer: - image: registry.k8s.io/kube-apiserver:v1.33.0 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.33.1 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -2954,14 +2954,14 @@ {{< /highlight >}}</details> | | |`controllerManager` |<a href="#Config.cluster.controllerManager">ControllerManagerConfig</a> |Controller manager server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.33.0 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.33.1 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true {{< /highlight >}}</details> | | |`proxy` |<a href="#Config.cluster.proxy">ProxyConfig</a> |Kube-proxy server-specific configuration options <details><summary>Show example(s)</summary>{{< highlight yaml >}} proxy: - image: registry.k8s.io/kube-proxy:v1.33.0 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.33.1 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -2972,7 +2972,7 @@ {{< /highlight >}}</details> | | |`scheduler` |<a href="#Config.cluster.scheduler">SchedulerConfig</a> |Scheduler server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} scheduler: - image: registry.k8s.io/kube-scheduler:v1.33.0 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.33.1 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3216,7 +3216,7 @@ {{< highlight yaml >}} cluster: apiServer: - image: registry.k8s.io/kube-apiserver:v1.33.0 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.33.1 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -3284,7 +3284,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the API server manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-apiserver:v1.33.0 +image: registry.k8s.io/kube-apiserver:v1.33.1 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the API server. | | |`extraVolumes` |<a href="#Config.cluster.apiServer.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the API server static pod. | | @@ -3496,7 +3496,7 @@ {{< highlight yaml >}} cluster: controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.33.0 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.33.1 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true @@ -3506,7 +3506,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the controller manager manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-controller-manager:v1.33.0 +image: registry.k8s.io/kube-controller-manager:v1.33.1 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | | |`extraVolumes` |<a href="#Config.cluster.controllerManager.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the controller manager static pod. | | @@ -3576,7 +3576,7 @@ {{< highlight yaml >}} cluster: proxy: - image: registry.k8s.io/kube-proxy:v1.33.0 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.33.1 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -3593,7 +3593,7 @@ disabled: false {{< /highlight >}}</details> | | |`image` |string |The container image used in the kube-proxy manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-proxy:v1.33.0 +image: registry.k8s.io/kube-proxy:v1.33.1 {{< /highlight >}}</details> | | |`mode` |string |<details><summary>proxy mode of kube-proxy.</summary>The default is 'iptables'.</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | | @@ -3612,7 +3612,7 @@ {{< highlight yaml >}} cluster: scheduler: - image: registry.k8s.io/kube-scheduler:v1.33.0 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.33.1 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3622,7 +3622,7 @@ | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the scheduler manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}} -image: registry.k8s.io/kube-scheduler:v1.33.0 +image: registry.k8s.io/kube-scheduler:v1.33.1 {{< /highlight >}}</details> | | |`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | | |`extraVolumes` |<a href="#Config.cluster.scheduler.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the scheduler static pod. | | ++++++ talosctl.obsinfo ++++++ --- /var/tmp/diff_new_pack.m4d7kt/_old 2025-05-31 19:18:19.126365176 +0200 +++ /var/tmp/diff_new_pack.m4d7kt/_new 2025-05-31 19:18:19.130365345 +0200 @@ -1,5 +1,5 @@ name: talosctl -version: 1.10.2 -mtime: 1747404264 -commit: 1cf5914b6e9c7ff9ffd1576602e6beafcffc147b +version: 1.10.3 +mtime: 1748500468 +commit: dde2cebce8e0eb690e8d272d49f1543065e3d889 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/talosctl/vendor.tar.gz /work/SRC/openSUSE:Factory/.talosctl.new.16005/vendor.tar.gz differ: char 117, line 1