Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(container): update ghcr.io/siderolabs/installer ( v1.9.1 → v1.9.2 ) #3546

Merged
merged 1 commit into from
Jan 16, 2025

Conversation

smurf-bot[bot]
Copy link
Contributor

@smurf-bot smurf-bot bot commented Jan 16, 2025

This PR contains the following updates:

Package Update Change
ghcr.io/siderolabs/installer patch v1.9.1 -> v1.9.2

Release Notes

siderolabs/talos (ghcr.io/siderolabs/installer)

v1.9.2

Compare Source

Talos 1.9.2 (2025-01-16)

Welcome to the v1.9.2 release of Talos!

Please try out the release binaries and report any issues at
https://github.com/siderolabs/talos/issues.

auditd

Kernel parameter talos.auditd.disabled=1 can be used to disable Talos built-in auditd service.

kube-apiserver Authorization Config

When using .cluster.apiServer.authorizationConfig the user provided order for the authorizers is honoured and Node and RBAC authorizers are always added to the end if not explicitly specified.

Eg: If user provides only Webhook authorizer, the final order will be Webhook, Node, RBAC.

To provide a specific order for Node or RBAC explicitly, user can provide the authorizer in the order they want.

Eg:

cluster:
  apiServer:
    authorizationConfig:
      - type: Node
        name: Node
      - type: Webhook
        name: Webhook
        webhook:
          connectionInfo:
            type: InClusterConfig
        ...
      - type: RBAC
        name: rbac

Usage of authorization-mode CLI argument will not support this form of customization.

Component Updates
  • Linux: 6.12.9
  • runc: 1.2.4
  • containerd: 2.0.2

Talos is built with Go 1.23.4.

Contributors
  • Andrey Smirnov
  • Dmitry Sharshakov
  • L.J. Hanson
  • Noel Georgi
  • Skyler Mäntysaari
  • TomyLobo
Changes
18 commits

Changes from siderolabs/pkgs
6 commits

Dependency Changes
  • github.com/siderolabs/go-blockdevice/v2 v2.0.9 -> v2.0.11
  • github.com/siderolabs/pkgs v1.9.0-15-g45c4ba4 -> v1.9.0-21-gc1f06e5
  • github.com/siderolabs/talos/pkg/machinery v1.9.1 -> v1.9.2

Previous release can be found at v1.9.1

Images
ghcr.io/siderolabs/flannel:v0.26.1
registry.k8s.io/coredns/coredns:v1.12.0
gcr.io/etcd-development/etcd:v3.5.17
registry.k8s.io/kube-apiserver:v1.32.0
registry.k8s.io/kube-controller-manager:v1.32.0
registry.k8s.io/kube-scheduler:v1.32.0
registry.k8s.io/kube-proxy:v1.32.0
ghcr.io/siderolabs/kubelet:v1.32.0
ghcr.io/siderolabs/installer:v1.9.2
registry.k8s.io/pause:3.10

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

| datasource | package                      | from   | to     |
| ---------- | ---------------------------- | ------ | ------ |
| docker     | ghcr.io/siderolabs/installer | v1.9.1 | v1.9.2 |
@smurf-bot
Copy link
Contributor Author

smurf-bot bot commented Jan 16, 2025

--- kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/system-upgrade-controller-plans

+++ kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/system-upgrade-controller-plans

@@ -20,13 +20,13 @@

   interval: 30m
   path: ./kubernetes/main/apps/kube-tools/system-upgrade-controller/plans
   postBuild:
     substitute:
       KUBERNETES_VERSION: v1.32.1
       TALOS_SCHEMATIC_ID: 97bf8e92fc6bba0f03928b859c08295d7615737b29db06a97be51dc63004e403
-      TALOS_VERSION: v1.9.1
+      TALOS_VERSION: v1.9.2
     substituteFrom:
     - kind: ConfigMap
       name: cluster-settings
       optional: true
     - kind: ConfigMap
       name: cluster-settings-main
--- kubernetes/main/apps/kube-tools/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: kube-tools/kubernetes

+++ kubernetes/main/apps/kube-tools/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: kube-tools/kubernetes

@@ -26,13 +26,13 @@

     - --server=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   secrets:
   - ignoreUpdates: true
     name: talos
     path: /var/run/secrets/talos.dev
   serviceAccountName: system-upgrade
   tolerations:
@@ -48,9 +48,9 @@

     - --to=$(SYSTEM_UPGRADE_PLAN_LATEST_VERSION)
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   version: v1.32.1
 
--- kubernetes/main/apps/kube-tools/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: kube-tools/talos

+++ kubernetes/main/apps/kube-tools/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: kube-tools/talos

@@ -17,24 +17,24 @@

       operator: In
       values:
       - talos
     - key: feature.node.kubernetes.io/system-os_release.VERSION_ID
       operator: NotIn
       values:
-      - v1.9.1
+      - v1.9.2
   prepare:
     args:
     - --nodes=$(NODE_IP)
     - health
     - --server=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   secrets:
   - ignoreUpdates: true
     name: talos
     path: /var/run/secrets/talos.dev
   serviceAccountName: system-upgrade
   tolerations:
@@ -52,9 +52,9 @@

     - --wait=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
-  version: v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
+  version: v1.9.2
 

@smurf-bot
Copy link
Contributor Author

smurf-bot bot commented Jan 16, 2025

--- kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/system-upgrade-controller-plans

+++ kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/system-upgrade-controller-plans

@@ -20,13 +20,13 @@

   interval: 30m
   path: ./kubernetes/main/apps/kube-tools/system-upgrade-controller/plans
   postBuild:
     substitute:
       KUBERNETES_VERSION: v1.32.1
       TALOS_SCHEMATIC_ID: 97bf8e92fc6bba0f03928b859c08295d7615737b29db06a97be51dc63004e403
-      TALOS_VERSION: v1.9.1
+      TALOS_VERSION: v1.9.2
     substituteFrom:
     - kind: ConfigMap
       name: cluster-settings
       optional: true
     - kind: ConfigMap
       name: cluster-settings-main
--- kubernetes/main/apps/kube-tools/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: kube-tools/kubernetes

+++ kubernetes/main/apps/kube-tools/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: kube-tools/kubernetes

@@ -26,13 +26,13 @@

     - --server=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   secrets:
   - ignoreUpdates: true
     name: talos
     path: /var/run/secrets/talos.dev
   serviceAccountName: system-upgrade
   tolerations:
@@ -48,9 +48,9 @@

     - --to=$(SYSTEM_UPGRADE_PLAN_LATEST_VERSION)
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   version: v1.32.1
 
--- kubernetes/main/apps/kube-tools/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: kube-tools/talos

+++ kubernetes/main/apps/kube-tools/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: kube-tools/talos

@@ -17,24 +17,24 @@

       operator: In
       values:
       - talos
     - key: feature.node.kubernetes.io/system-os_release.VERSION_ID
       operator: NotIn
       values:
-      - v1.9.1
+      - v1.9.2
   prepare:
     args:
     - --nodes=$(NODE_IP)
     - health
     - --server=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   secrets:
   - ignoreUpdates: true
     name: talos
     path: /var/run/secrets/talos.dev
   serviceAccountName: system-upgrade
   tolerations:
@@ -52,9 +52,9 @@

     - --wait=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
-  version: v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
+  version: v1.9.2
 

@joryirving joryirving force-pushed the main branch 2 times, most recently from abe5d98 to 5db19f8 Compare January 16, 2025 17:28
@joryirving joryirving merged commit e511341 into main Jan 16, 2025
15 checks passed
@joryirving joryirving deleted the renovate/patch-talos branch January 16, 2025 17:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant