Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(container): update ghcr.io/siderolabs/installer ( v1.9.1 → v1.9.2 ) #525

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

commit-commander[bot]
Copy link
Contributor

@commit-commander commit-commander bot commented Jan 20, 2025

This PR contains the following updates:

Package Update Change
ghcr.io/siderolabs/installer patch v1.9.1 -> v1.9.2

Release Notes

siderolabs/talos (ghcr.io/siderolabs/installer)

v1.9.2

Compare Source

Talos 1.9.2 (2025-01-16)

Welcome to the v1.9.2 release of Talos!

Please try out the release binaries and report any issues at
https://github.com/siderolabs/talos/issues.

auditd

Kernel parameter talos.auditd.disabled=1 can be used to disable Talos built-in auditd service.

kube-apiserver Authorization Config

When using .cluster.apiServer.authorizationConfig the user provided order for the authorizers is honoured and Node and RBAC authorizers are always added to the end if not explicitly specified.

Eg: If user provides only Webhook authorizer, the final order will be Webhook, Node, RBAC.

To provide a specific order for Node or RBAC explicitly, user can provide the authorizer in the order they want.

Eg:

cluster:
  apiServer:
    authorizationConfig:
      - type: Node
        name: Node
      - type: Webhook
        name: Webhook
        webhook:
          connectionInfo:
            type: InClusterConfig
        ...
      - type: RBAC
        name: rbac

Usage of authorization-mode CLI argument will not support this form of customization.

Component Updates
  • Linux: 6.12.9
  • runc: 1.2.4
  • containerd: 2.0.2

Talos is built with Go 1.23.4.

Contributors
  • Andrey Smirnov
  • Dmitry Sharshakov
  • L.J. Hanson
  • Noel Georgi
  • Skyler Mäntysaari
  • TomyLobo
Changes
18 commits

Changes from siderolabs/pkgs
6 commits

Dependency Changes
  • github.com/siderolabs/go-blockdevice/v2 v2.0.9 -> v2.0.11
  • github.com/siderolabs/pkgs v1.9.0-15-g45c4ba4 -> v1.9.0-21-gc1f06e5
  • github.com/siderolabs/talos/pkg/machinery v1.9.1 -> v1.9.2

Previous release can be found at v1.9.1

Images
ghcr.io/siderolabs/flannel:v0.26.1
registry.k8s.io/coredns/coredns:v1.12.0
gcr.io/etcd-development/etcd:v3.5.17
registry.k8s.io/kube-apiserver:v1.32.0
registry.k8s.io/kube-controller-manager:v1.32.0
registry.k8s.io/kube-scheduler:v1.32.0
registry.k8s.io/kube-proxy:v1.32.0
ghcr.io/siderolabs/kubelet:v1.32.0
ghcr.io/siderolabs/installer:v1.9.2
registry.k8s.io/pause:3.10

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@commit-commander
Copy link
Contributor Author

--- kubernetes/main/apps/zfs/zfs-scrubber/app Kustomization: flux-system/zfs-scrubber HelmRelease: zfs/zfs-scrubber

+++ kubernetes/main/apps/zfs/zfs-scrubber/app Kustomization: flux-system/zfs-scrubber HelmRelease: zfs/zfs-scrubber

@@ -30,13 +30,13 @@

     controllers:
       zfs-scrubber:
         containers:
           app:
             env:
               PUSHOVER_NOTIFICATION: true
-              TALOS_VERSION: v1.9.1
+              TALOS_VERSION: v1.9.2
               ZFS_POOL: ssd_pool
             envFrom:
             - secretRef:
                 name: zfs-scrubber-secret
             image:
               repository: ghcr.io/heavybullets8/zfs-scrubber
--- kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/system-upgrade-controller-plans

+++ kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/system-upgrade-controller-plans

@@ -20,13 +20,13 @@

   interval: 30m
   path: ./kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans
   postBuild:
     substitute:
       KUBERNETES_VERSION: v1.32.0
       TALOS_SCHEMATIC_ID: db08c29f45bd1057f318b6f7b9ca1f5878dd9a529cbedfa46a54200591e74cbd
-      TALOS_VERSION: v1.9.1
+      TALOS_VERSION: v1.9.2
     substituteFrom:
     - kind: Secret
       name: cluster-secrets
   prune: true
   sourceRef:
     kind: GitRepository
--- kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/zfs-scrubber

+++ kubernetes/main/apps Kustomization: flux-system/cluster-apps Kustomization: flux-system/zfs-scrubber

@@ -16,13 +16,13 @@

     secretRef:
       name: sops-age
   interval: 30m
   path: ./kubernetes/main/apps/zfs/zfs-scrubber/app
   postBuild:
     substitute:
-      TALOS_VERSION: v1.9.1
+      TALOS_VERSION: v1.9.2
     substituteFrom:
     - kind: Secret
       name: cluster-secrets
   prune: true
   sourceRef:
     kind: GitRepository
--- kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: system-upgrade/kubernetes

+++ kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: system-upgrade/kubernetes

@@ -26,13 +26,13 @@

     - --server=true
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   secrets:
   - ignoreUpdates: true
     name: talos
     path: /var/run/secrets/talos.dev
   serviceAccountName: system-upgrade
   tolerations:
@@ -48,9 +48,9 @@

     - --to=$(SYSTEM_UPGRADE_PLAN_LATEST_VERSION)
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   version: v1.32.0
 
--- kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: system-upgrade/talos

+++ kubernetes/main/apps/system-upgrade/system-upgrade-controller/plans Kustomization: flux-system/system-upgrade-controller-plans Plan: system-upgrade/talos

@@ -17,24 +17,24 @@

       operator: In
       values:
       - talos
     - key: feature.node.kubernetes.io/system-os_release.VERSION_ID
       operator: NotIn
       values:
-      - v1.9.1
+      - v1.9.2
   prepare:
     args:
     - --nodes=$(NODE_IP)
     - health
     - --server=true
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
   secrets:
   - ignoreUpdates: true
     name: talos
     path: /var/run/secrets/talos.dev
   serviceAccountName: system-upgrade
   tolerations:
@@ -52,9 +52,9 @@

     - --wait=false
     envs:
     - name: NODE_IP
       valueFrom:
         fieldRef:
           fieldPath: status.hostIP
-    image: ghcr.io/siderolabs/talosctl:v1.9.1
-  version: v1.9.1
+    image: ghcr.io/siderolabs/talosctl:v1.9.2
+  version: v1.9.2
 

@commit-commander
Copy link
Contributor Author

--- HelmRelease: zfs/zfs-scrubber CronJob: zfs/zfs-scrubber

+++ HelmRelease: zfs/zfs-scrubber CronJob: zfs/zfs-scrubber

@@ -36,13 +36,13 @@

           restartPolicy: Never
           containers:
           - env:
             - name: PUSHOVER_NOTIFICATION
               value: 'true'
             - name: TALOS_VERSION
-              value: v1.9.1
+              value: v1.9.2
             - name: ZFS_POOL
               value: ssd_pool
             envFrom:
             - secretRef:
                 name: zfs-scrubber-secret
             image: ghcr.io/heavybullets8/zfs-scrubber:1.0.6@sha256:548a7e1a55088ab2d4738a38708104b264b4401e098348594daa96cad58402bd

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants