From c14b4462292bd7e6088fce35d6880a9b2b56335c Mon Sep 17 00:00:00 2001 From: Andrey Smirnov Date: Wed, 16 Oct 2024 21:20:52 +0400 Subject: [PATCH] feat: update Kubernetes to v1.32.0-alpha.1 Talos 1.9 is going to be shipped with Kubernetes v1.32 by default. Signed-off-by: Andrey Smirnov --- .github/workflows/ci.yaml | 5 +- .../integration-provision-0-cron.yaml | 3 +- .../integration-provision-1-cron.yaml | 3 +- .../integration-provision-2-cron.yaml | 3 +- .kres.yaml | 5 +- Makefile | 2 +- go.mod | 31 +++++----- go.sum | 62 +++++++++---------- hack/release.toml | 1 + hack/test/e2e.sh | 2 +- pkg/machinery/constants/constants.go | 2 +- website/content/v1.9/_index.md | 2 +- website/content/v1.9/reference/cli.md | 6 +- .../configuration/v1alpha1/config.md | 30 ++++----- 14 files changed, 82 insertions(+), 75 deletions(-) diff --git a/.github/workflows/ci.yaml b/.github/workflows/ci.yaml index 62ed89d892..34e5812be4 100644 --- a/.github/workflows/ci.yaml +++ b/.github/workflows/ci.yaml @@ -1,6 +1,6 @@ # THIS FILE WAS AUTOMATICALLY GENERATED, PLEASE DO NOT EDIT. # -# Generated on 2024-10-16T13:22:04Z by kres 34e72ac. +# Generated on 2024-10-18T16:27:22Z by kres 34e72ac. name: default concurrency: @@ -2491,6 +2491,7 @@ jobs: make provision-tests-prepare - name: provision-tests-track-0 env: + GRPC_ENFORCE_ALPN_ENABLED: "false" IMAGE_REGISTRY: registry.dev.siderolabs.io run: | sudo -E make provision-tests-track-0 @@ -2585,6 +2586,7 @@ jobs: make provision-tests-prepare - name: provision-tests-track-1 env: + GRPC_ENFORCE_ALPN_ENABLED: "false" IMAGE_REGISTRY: registry.dev.siderolabs.io run: | sudo -E make provision-tests-track-1 @@ -2679,6 +2681,7 @@ jobs: make provision-tests-prepare - name: provision-tests-track-2 env: + GRPC_ENFORCE_ALPN_ENABLED: "false" IMAGE_REGISTRY: registry.dev.siderolabs.io run: | sudo -E make provision-tests-track-2 diff --git a/.github/workflows/integration-provision-0-cron.yaml b/.github/workflows/integration-provision-0-cron.yaml index 474d9144aa..4ecfc9fefd 100644 --- a/.github/workflows/integration-provision-0-cron.yaml +++ b/.github/workflows/integration-provision-0-cron.yaml @@ -1,6 +1,6 @@ # THIS FILE WAS AUTOMATICALLY GENERATED, PLEASE DO NOT EDIT. # -# Generated on 2024-09-09T13:58:35Z by kres 8be5fa7. +# Generated on 2024-10-18T16:27:22Z by kres 34e72ac. name: integration-provision-0-cron concurrency: @@ -83,6 +83,7 @@ jobs: make provision-tests-prepare - name: provision-tests-track-0 env: + GRPC_ENFORCE_ALPN_ENABLED: "false" IMAGE_REGISTRY: registry.dev.siderolabs.io run: | sudo -E make provision-tests-track-0 diff --git a/.github/workflows/integration-provision-1-cron.yaml b/.github/workflows/integration-provision-1-cron.yaml index 4e430fe573..c4e7c15026 100644 --- a/.github/workflows/integration-provision-1-cron.yaml +++ b/.github/workflows/integration-provision-1-cron.yaml @@ -1,6 +1,6 @@ # THIS FILE WAS AUTOMATICALLY GENERATED, PLEASE DO NOT EDIT. # -# Generated on 2024-09-09T13:58:35Z by kres 8be5fa7. +# Generated on 2024-10-18T16:27:22Z by kres 34e72ac. name: integration-provision-1-cron concurrency: @@ -83,6 +83,7 @@ jobs: make provision-tests-prepare - name: provision-tests-track-1 env: + GRPC_ENFORCE_ALPN_ENABLED: "false" IMAGE_REGISTRY: registry.dev.siderolabs.io run: | sudo -E make provision-tests-track-1 diff --git a/.github/workflows/integration-provision-2-cron.yaml b/.github/workflows/integration-provision-2-cron.yaml index ff2c089552..6bf82858d1 100644 --- a/.github/workflows/integration-provision-2-cron.yaml +++ b/.github/workflows/integration-provision-2-cron.yaml @@ -1,6 +1,6 @@ # THIS FILE WAS AUTOMATICALLY GENERATED, PLEASE DO NOT EDIT. # -# Generated on 2024-09-09T13:58:35Z by kres 8be5fa7. +# Generated on 2024-10-18T16:27:22Z by kres 34e72ac. name: integration-provision-2-cron concurrency: @@ -83,6 +83,7 @@ jobs: make provision-tests-prepare - name: provision-tests-track-2 env: + GRPC_ENFORCE_ALPN_ENABLED: "false" IMAGE_REGISTRY: registry.dev.siderolabs.io run: | sudo -E make provision-tests-track-2 diff --git a/.kres.yaml b/.kres.yaml index 38d2e6f5d7..3919d0c047 100644 --- a/.kres.yaml +++ b/.kres.yaml @@ -29,7 +29,7 @@ spec: - kernel - security - ci - - ^v1.8 + - ^v1.9 licenseChecks: - skipPaths: - .git/ @@ -507,6 +507,7 @@ spec: withSudo: true environment: IMAGE_REGISTRY: registry.dev.siderolabs.io + GRPC_ENFORCE_ALPN_ENABLED: "false" - name: save-talos-logs conditions: - always @@ -557,6 +558,7 @@ spec: withSudo: true environment: IMAGE_REGISTRY: registry.dev.siderolabs.io + GRPC_ENFORCE_ALPN_ENABLED: "false" - name: save-talos-logs conditions: - always @@ -607,6 +609,7 @@ spec: withSudo: true environment: IMAGE_REGISTRY: registry.dev.siderolabs.io + GRPC_ENFORCE_ALPN_ENABLED: "false" - name: save-talos-logs conditions: - always diff --git a/Makefile b/Makefile index fb254e62ab..b64c57f6e7 100644 --- a/Makefile +++ b/Makefile @@ -102,7 +102,7 @@ INTEGRATION_TEST := integration-test INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM) INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM) # renovate: datasource=github-releases depName=kubernetes/kubernetes -KUBECTL_VERSION ?= v1.31.1 +KUBECTL_VERSION ?= v1.32.0-alpha.1 # renovate: datasource=github-releases depName=kastenhq/kubestr KUBESTR_VERSION ?= v0.4.46 # renovate: datasource=github-releases depName=helm/helm diff --git a/go.mod b/go.mod index 5bb0a52ba6..9abb8450e5 100644 --- a/go.mod +++ b/go.mod @@ -40,16 +40,16 @@ replace ( // Kubernetes dependencies sharing the same version. require ( - k8s.io/api v0.31.1 - k8s.io/apimachinery v0.31.1 - k8s.io/apiserver v0.31.1 - k8s.io/client-go v0.31.1 - k8s.io/component-base v0.31.1 - k8s.io/cri-api v0.32.0-alpha.0 - k8s.io/kube-scheduler v0.31.1 - k8s.io/kubectl v0.31.1 - k8s.io/kubelet v0.31.1 - k8s.io/pod-security-admission v0.31.1 + k8s.io/api v0.32.0-alpha.1 + k8s.io/apimachinery v0.32.0-alpha.1 + k8s.io/apiserver v0.32.0-alpha.1 + k8s.io/client-go v0.32.0-alpha.1 + k8s.io/component-base v0.32.0-alpha.1 + k8s.io/cri-api v0.32.0-alpha.1 + k8s.io/kube-scheduler v0.32.0-alpha.1 + k8s.io/kubectl v0.32.0-alpha.1 + k8s.io/kubelet v0.32.0-alpha.1 + k8s.io/pod-security-admission v0.32.0-alpha.1 ) require ( @@ -259,9 +259,9 @@ require ( github.com/go-errors/errors v1.4.2 // indirect github.com/go-logr/logr v1.4.2 // indirect github.com/go-logr/stdr v1.2.2 // indirect - github.com/go-openapi/jsonpointer v0.20.2 // indirect + github.com/go-openapi/jsonpointer v0.21.0 // indirect github.com/go-openapi/jsonreference v0.20.4 // indirect - github.com/go-openapi/swag v0.22.9 // indirect + github.com/go-openapi/swag v0.23.0 // indirect github.com/go-resty/resty/v2 v2.9.1 // indirect github.com/gogo/protobuf v1.3.2 // indirect github.com/golang-jwt/jwt/v4 v4.5.0 // indirect @@ -282,7 +282,6 @@ require ( github.com/hashicorp/go-safetemp v1.0.0 // indirect github.com/hashicorp/go-version v1.6.0 // indirect github.com/hexops/gotextdiff v1.0.3 // indirect - github.com/imdario/mergo v0.3.16 // indirect github.com/inconshreveable/mousetrap v1.1.0 // indirect github.com/jonboulle/clockwork v0.2.2 // indirect github.com/josharian/intern v1.0.0 // indirect @@ -356,7 +355,7 @@ require ( go.starlark.net v0.0.0-20230525235612-a134d8f9ddca // indirect go.uber.org/multierr v1.11.0 // indirect golang.org/x/crypto v0.28.0 // indirect - golang.org/x/exp v0.0.0-20240506185415-9bf2ced13842 // indirect + golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 // indirect golang.org/x/mod v0.21.0 // indirect golang.org/x/tools v0.24.0 // indirect golang.zx2c4.com/wintun v0.0.0-20230126152724-0fa3db229ce2 // indirect @@ -366,8 +365,8 @@ require ( gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect - k8s.io/cli-runtime v0.31.1 // indirect - k8s.io/kube-openapi v0.0.0-20240709000822-3c01b740850f // indirect + k8s.io/cli-runtime v0.32.0-alpha.1 // indirect + k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2 // indirect k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 // indirect kernel.org/pub/linux/libs/security/libcap/psx v1.2.70 // indirect rsc.io/qr v0.2.0 // indirect diff --git a/go.sum b/go.sum index 7885247df3..4ec641b84a 100644 --- a/go.sum +++ b/go.sum @@ -246,12 +246,12 @@ github.com/go-logr/logr v1.4.2 h1:6pFjapn8bFcIbiKo3XT4j/BhANplGihG6tvd+8rYgrY= github.com/go-logr/logr v1.4.2/go.mod h1:9T104GzyrTigFIr8wt5mBrctHMim0Nb2HLGrmQ40KvY= github.com/go-logr/stdr v1.2.2 h1:hSWxHoqTgW2S2qGc0LTAI563KZ5YKYRhT3MFKZMbjag= github.com/go-logr/stdr v1.2.2/go.mod h1:mMo/vtBO5dYbehREoey6XUKy/eSumjCCveDpRre4VKE= -github.com/go-openapi/jsonpointer v0.20.2 h1:mQc3nmndL8ZBzStEo3JYF8wzmeWffDH4VbXz58sAx6Q= -github.com/go-openapi/jsonpointer v0.20.2/go.mod h1:bHen+N0u1KEO3YlmqOjTT9Adn1RfD91Ar825/PuiRVs= +github.com/go-openapi/jsonpointer v0.21.0 h1:YgdVicSA9vH5RiHs9TZW5oyafXZFc6+2Vc1rr/O9oNQ= +github.com/go-openapi/jsonpointer v0.21.0/go.mod h1:IUyH9l/+uyhIYQ/PXVA41Rexl+kOkAPDdXEYns6fzUY= github.com/go-openapi/jsonreference v0.20.4 h1:bKlDxQxQJgwpUSgOENiMPzCTBVuc7vTdXSSgNeAhojU= github.com/go-openapi/jsonreference v0.20.4/go.mod h1:5pZJyJP2MnYCpoeoMAql78cCHauHj0V9Lhc506VOpw4= -github.com/go-openapi/swag v0.22.9 h1:XX2DssF+mQKM2DHsbgZK74y/zj4mo9I99+89xUmuZCE= -github.com/go-openapi/swag v0.22.9/go.mod h1:3/OXnFfnMAwBD099SwYRk7GD3xOrr1iL7d/XNLXVVwE= +github.com/go-openapi/swag v0.23.0 h1:vsEVJDUo2hPJ2tu0/Xc+4noaxyEffXNIs3cOULZ+GrE= +github.com/go-openapi/swag v0.23.0/go.mod h1:esZ8ITTYEsH1V2trKHjAN8Ai7xHb8RV+YSZ577vPjgQ= github.com/go-resty/resty/v2 v2.9.1 h1:PIgGx4VrHvag0juCJ4dDv3MiFRlDmP0vicBucwf+gLM= github.com/go-resty/resty/v2 v2.9.1/go.mod h1:4/GYJVjh9nhkhGR6AUNW3XhpDYNUr+Uvy9gV/VGZIy4= github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 h1:tfuBGBXKqDEevZMzYi5KSi8KkcZtzBcTgAUUtapy0OI= @@ -376,8 +376,6 @@ github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714 h1:/jC7qQFrv8 github.com/hugelgupf/socketpair v0.0.0-20190730060125-05d35a94e714/go.mod h1:2Goc3h8EklBH5mspfHFxBnEoURQCGzQQH1ga9Myjvis= github.com/hugelgupf/vmtest v0.0.0-20240216064925-0561770280a1 h1:jWoR2Yqg8tzM0v6LAiP7i1bikZJu3gxpgvu3g1Lw+a0= github.com/hugelgupf/vmtest v0.0.0-20240216064925-0561770280a1/go.mod h1:B63hDJMhTupLWCHwopAyEo7wRFowx9kOc8m8j1sfOqE= -github.com/imdario/mergo v0.3.16 h1:wwQJbIsHYGMUyLSPrEq1CT16AhnhNJQ51+4fdHUnCl4= -github.com/imdario/mergo v0.3.16/go.mod h1:WBLT9ZmE3lPoWsEzCh9LPo3TiwVN+ZKEjmz+hD27ysY= github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8= github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw= github.com/jeromer/syslogparser v1.1.0 h1:HES0EviO9iPvCu56LjVFVhbM3o0BckDlIbQfkkaRJAw= @@ -793,8 +791,8 @@ golang.org/x/crypto v0.13.0/go.mod h1:y6Z2r+Rw4iayiXXAIxJIDAJ1zMW4yaTpebo8fPOliY golang.org/x/crypto v0.28.0 h1:GBDwsMXVQi34v5CCYUm2jkJvu4cbtru2U4TN2PSyQnw= golang.org/x/crypto v0.28.0/go.mod h1:rmgy+3RHxRZMyY0jjAJShp2zgEdOqj2AO7U0pYmeQ7U= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= -golang.org/x/exp v0.0.0-20240506185415-9bf2ced13842 h1:vr/HnozRka3pE4EsMEg1lgkXJkTFJCVUX+S/ZT6wYzM= -golang.org/x/exp v0.0.0-20240506185415-9bf2ced13842/go.mod h1:XtvwrStGgqGPLc4cjQfWqZHG1YFdYs6swckp8vpsjnc= +golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 h1:2dVuKD2vS7b0QIHQbpyTISPd0LeHDbnYEryqj5Q1ug8= +golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56/go.mod h1:M4RDyNAINzryxdtnbRXRL/OHtkFuWGRjvuhBJpk2IlY= golang.org/x/lint v0.0.0-20181026193005-c67002cb31c3/go.mod h1:UVdnD1Gm6xHRNCYTkRU2/jEulfH38KcIWyp/GAMgvoE= golang.org/x/lint v0.0.0-20190227174305-5b3e6a55c961/go.mod h1:wehouNa3lNwaWXcvxsM5YxQ5yQlVC4a0KAMCusXpPoU= golang.org/x/lint v0.0.0-20190313153728-d0100b6bd8b3/go.mod h1:6SW0HCj/g11FgYtHlgUYUwCkIfeOF89ocIRzGO/8vkc= @@ -1052,32 +1050,32 @@ gvisor.dev/gvisor v0.0.0-20240331093104-8c9cbf0d9090/go.mod h1:NQHVAzMwvZ+Qe3ElS honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -k8s.io/api v0.31.1 h1:Xe1hX/fPW3PXYYv8BlozYqw63ytA92snr96zMW9gWTU= -k8s.io/api v0.31.1/go.mod h1:sbN1g6eY6XVLeqNsZGLnI5FwVseTrZX7Fv3O26rhAaI= -k8s.io/apimachinery v0.31.1 h1:mhcUBbj7KUjaVhyXILglcVjuS4nYXiwC+KKFBgIVy7U= -k8s.io/apimachinery v0.31.1/go.mod h1:rsPdaZJfTfLsNJSQzNHQvYoTmxhoOEofxtOsF3rtsMo= -k8s.io/apiserver v0.31.1 h1:Sars5ejQDCRBY5f7R3QFHdqN3s61nhkpaX8/k1iEw1c= -k8s.io/apiserver v0.31.1/go.mod h1:lzDhpeToamVZJmmFlaLwdYZwd7zB+WYRYIboqA1kGxM= -k8s.io/cli-runtime v0.31.1 h1:/ZmKhmZ6hNqDM+yf9s3Y4KEYakNXUn5sod2LWGGwCuk= -k8s.io/cli-runtime v0.31.1/go.mod h1:pKv1cDIaq7ehWGuXQ+A//1OIF+7DI+xudXtExMCbe9U= -k8s.io/client-go v0.31.1 h1:f0ugtWSbWpxHR7sjVpQwuvw9a3ZKLXX0u0itkFXufb0= -k8s.io/client-go v0.31.1/go.mod h1:sKI8871MJN2OyeqRlmA4W4KM9KBdBUpDLu/43eGemCg= -k8s.io/component-base v0.31.1 h1:UpOepcrX3rQ3ab5NB6g5iP0tvsgJWzxTyAo20sgYSy8= -k8s.io/component-base v0.31.1/go.mod h1:WGeaw7t/kTsqpVTaCoVEtillbqAhF2/JgvO0LDOMa0w= -k8s.io/cri-api v0.32.0-alpha.0 h1:Rs9prajcHWZAdy9ueQdD2R+OOnDD3rKYbM9hQ90iEQU= -k8s.io/cri-api v0.32.0-alpha.0/go.mod h1:Po3TMAYH/+KrZabi7QiwQI4a692oZcUOUThd/rqwxrI= +k8s.io/api v0.32.0-alpha.1 h1:IouDRwpvuSiAJYsnCd5ygwZEJ6fXjTCrv1ucDjANQxE= +k8s.io/api v0.32.0-alpha.1/go.mod h1:dsKOyESAQh5qN2gci8jE1kwo5wqnf1lgCZgj39TFVx4= +k8s.io/apimachinery v0.32.0-alpha.1 h1:tDR19SzOmCOKVWtNhFbUtz1Axrt/1JJu7MRFiaEEhF4= +k8s.io/apimachinery v0.32.0-alpha.1/go.mod h1:5rKPDwwN9qm//xASFCZ83nyYEanHxxhc7pZ8AC4lukY= +k8s.io/apiserver v0.32.0-alpha.1 h1:kDhkgEZfBJJ/eUU7t+rKVnK0pefFzrBtgP5NmvYT/nc= +k8s.io/apiserver v0.32.0-alpha.1/go.mod h1:6hIV0h8oudByTWLG3+SrwdnbED3dmIulHAqhkK88aUc= +k8s.io/cli-runtime v0.32.0-alpha.1 h1:TCXGLXMvXhhkvg8K4jUWnAZeFyzu8BN26YU+pXX20WA= +k8s.io/cli-runtime v0.32.0-alpha.1/go.mod h1:+z3Jx6QVkjDni/B34Li8Ye/hiAxhIyGHTH9C+GSR2SM= +k8s.io/client-go v0.32.0-alpha.1 h1:gxkLX3+Hs+srzwRdJ/ftK7OwoOHJgZ8AXipPYrXpVs4= +k8s.io/client-go v0.32.0-alpha.1/go.mod h1:WEgsM/Ayjy21IdfXaOosEpnl3CeMppYOiB7dOESK+zo= +k8s.io/component-base v0.32.0-alpha.1 h1:6OazM8bKt6yxuKUxB+zCRQQiKEXf+3JaHnilE37y3yU= +k8s.io/component-base v0.32.0-alpha.1/go.mod h1:bftd507toxdzXbnudsf/aPOuQqNR13/3FOeBTA2B0pY= +k8s.io/cri-api v0.32.0-alpha.1 h1:OcxewPupuPDqNTwDuP7k1Mk+0laswF1sw9Yox3928tA= +k8s.io/cri-api v0.32.0-alpha.1/go.mod h1:ZNgivL6OHSDAQphiTGgYuAgIFv+JKfaNWJX433tIVPY= k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk= k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE= -k8s.io/kube-openapi v0.0.0-20240709000822-3c01b740850f h1:2sXuKesAYbRHxL3aE2PN6zX/gcJr22cjrsej+W784Tc= -k8s.io/kube-openapi v0.0.0-20240709000822-3c01b740850f/go.mod h1:UxDHUPsUwTOOxSU+oXURfFBcAS6JwiRXTYqYwfuGowc= -k8s.io/kube-scheduler v0.31.1 h1:hbTiOUqEgPuXa85/J2ZYzIK7aYZruuOaQAirv5TQXjQ= -k8s.io/kube-scheduler v0.31.1/go.mod h1:pJKhtHJthZbxXpF+Mecb0wPXecYxsiMJbhuNi0xUsrE= -k8s.io/kubectl v0.31.1 h1:ih4JQJHxsEggFqDJEHSOdJ69ZxZftgeZvYo7M/cpp24= -k8s.io/kubectl v0.31.1/go.mod h1:aNuQoR43W6MLAtXQ/Bu4GDmoHlbhHKuyD49lmTC8eJM= -k8s.io/kubelet v0.31.1 h1:aAxwVxGzbbMKKk/FnSjvkN52K3LdHhjhzmYcyGBuE0c= -k8s.io/kubelet v0.31.1/go.mod h1:8ZbexYHqUO946gXEfFmnMZiK2UKRGhk7LlGvJ71p2Ig= -k8s.io/pod-security-admission v0.31.1 h1:j++ISpfQU0mWpKhoS4tY06Wm5EKdn65teL4lPJhEMIM= -k8s.io/pod-security-admission v0.31.1/go.mod h1:0aE5T6MGm/50Nr/diBrC6+wwpxsT2E7NECe+TepUuEg= +k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2 h1:GKE9U8BH16uynoxQii0auTjmmmuZ3O0LFMN6S0lPPhI= +k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2/go.mod h1:coRQXBK9NxO98XUv3ZD6AK3xzHCxV6+b7lrquKwaKzA= +k8s.io/kube-scheduler v0.32.0-alpha.1 h1:rAlnKUirUWFodfdF9foCCIaSGmm+qPbGuYSvFYNRJjg= +k8s.io/kube-scheduler v0.32.0-alpha.1/go.mod h1:VtayrGLYuDnunin+EixicoaWFLaazK3bxM14P57LO9I= +k8s.io/kubectl v0.32.0-alpha.1 h1:UL+rOTrb0NbfEYyLdrm01Jn43wrJPPTSgSszrn/k56I= +k8s.io/kubectl v0.32.0-alpha.1/go.mod h1:VArBNFJ1LobJYoGKqiq/SSBK9ZgrA0S4xLr5LfbkqPw= +k8s.io/kubelet v0.32.0-alpha.1 h1:3okTljbY1GrwV2kfku196xo74xIGRCSS2eP5dBfQbbY= +k8s.io/kubelet v0.32.0-alpha.1/go.mod h1:Go64LdFTD12fPCsLLkjRPZrVCj7km3Ms+aLzyK4ayyo= +k8s.io/pod-security-admission v0.32.0-alpha.1 h1:31w3KEDHUGzlv+jIb6IOJwijLd2Odoe33SnT5rEK15w= +k8s.io/pod-security-admission v0.32.0-alpha.1/go.mod h1:k2s4P50XQfZygSzc88HBHvj4kPTNWK0w1QzG4tB9OkM= k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 h1:pUdcCO1Lk/tbT5ztQWOBi5HBgbBP1J8+AsQnQCKsi8A= k8s.io/utils v0.0.0-20240711033017-18e509b52bc8/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0= kernel.org/pub/linux/libs/security/libcap/cap v1.2.70 h1:QnLPkuDWWbD5C+3DUA2IUXai5TK6w2zff+MAGccqdsw= diff --git a/hack/release.toml b/hack/release.toml index 8e33fbef68..e22b28bf3e 100644 --- a/hack/release.toml +++ b/hack/release.toml @@ -21,6 +21,7 @@ preface = """ Linux: 6.6.57 containerd: 2.0.0-rc.5 Flannel: 0.25.7 +Kubernetes: 1.32.0-alpha.1 Talos is built with Go 1.23.2. """ diff --git a/hack/test/e2e.sh b/hack/test/e2e.sh index ebfaa07576..91e569e66d 100755 --- a/hack/test/e2e.sh +++ b/hack/test/e2e.sh @@ -33,7 +33,7 @@ export TALOS_VERSION # Kubernetes export KUBECONFIG="${TMP}/kubeconfig" -export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.31.1} +export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.32.0-alpha.1} export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}" export TIMEOUT=1200 diff --git a/pkg/machinery/constants/constants.go b/pkg/machinery/constants/constants.go index 5a35f1c4e9..023bd437b9 100644 --- a/pkg/machinery/constants/constants.go +++ b/pkg/machinery/constants/constants.go @@ -354,7 +354,7 @@ const ( // DefaultKubernetesVersion is the default target version of the control plane. // renovate: datasource=github-releases depName=kubernetes/kubernetes - DefaultKubernetesVersion = "1.31.1" + DefaultKubernetesVersion = "1.32.0-alpha.1" // SupportedKubernetesVersions is the number of Kubernetes versions supported by Talos starting from DefaultKubernesVersion going backwards. SupportedKubernetesVersions = 6 diff --git a/website/content/v1.9/_index.md b/website/content/v1.9/_index.md index 6894652f63..3a7b837d2e 100644 --- a/website/content/v1.9/_index.md +++ b/website/content/v1.9/_index.md @@ -6,7 +6,7 @@ images: ["images/talos-dev-banner.png"] cascade: type: docs lastRelease: v1.9.0-alpha.0 -kubernetesRelease: "1.31.1" +kubernetesRelease: "1.32.0-alpha.1" prevKubernetesRelease: "1.31.1" nvidiaContainerToolkitRelease: "v1.16.1" nvidiaDriverRelease: "535.183.06" diff --git a/website/content/v1.9/reference/cli.md b/website/content/v1.9/reference/cli.md index ba7ec5f080..8a4a88c120 100644 --- a/website/content/v1.9/reference/cli.md +++ b/website/content/v1.9/reference/cli.md @@ -184,7 +184,7 @@ talosctl cluster create [flags] --ipxe-boot-script string iPXE boot script (URL) to use --iso-path string the ISO path to use for the initial boot (VM only) --kubeprism-port int KubePrism port (set to 0 to disable) (default 7445) - --kubernetes-version string desired kubernetes version to run (default "1.31.1") + --kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.1") --memory int the limit on memory usage in MB (each control plane/VM) (default 2048) --memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048) --mtu int MTU of the cluster network (default 1500) @@ -1384,7 +1384,7 @@ talosctl gen config [flags] -h, --help help for config --install-disk string the disk to install to (default "/dev/sda") --install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest") - --kubernetes-version string desired kubernetes version to run (default "1.31.1") + --kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.1") -o, --output string destination to output generated files. when multiple output types are specified, it must be a directory. for a single output type, it must either be a file path, or "-" for stdout -t, --output-types strings types of outputs to be generated. valid types are: ["controlplane" "worker" "talosconfig"] (default [controlplane,worker,talosconfig]) -p, --persist the desired persist value for configs (default true) @@ -2997,7 +2997,7 @@ talosctl upgrade-k8s [flags] --pre-pull-images pre-pull images before upgrade (default true) --proxy-image string kube-proxy image to use (default "registry.k8s.io/kube-proxy") --scheduler-image string kube-scheduler image to use (default "registry.k8s.io/kube-scheduler") - --to string the Kubernetes control plane version to upgrade to (default "1.31.1") + --to string the Kubernetes control plane version to upgrade to (default "1.32.0-alpha.1") --upgrade-kubelet upgrade kubelet service (default true) --with-docs patch all machine configs adding the documentation for each field (default true) --with-examples patch all machine configs with the commented examples (default true) diff --git a/website/content/v1.9/reference/configuration/v1alpha1/config.md b/website/content/v1.9/reference/configuration/v1alpha1/config.md index 402b9c043e..be663010b5 100644 --- a/website/content/v1.9/reference/configuration/v1alpha1/config.md +++ b/website/content/v1.9/reference/configuration/v1alpha1/config.md @@ -90,7 +90,7 @@ controlPlane: {{< /highlight >}} | | |`kubelet` |KubeletConfig |Used to provide additional options to the kubelet.
Show example(s){{< highlight yaml >}} kubelet: - image: ghcr.io/siderolabs/kubelet:v1.31.1 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.1 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -503,7 +503,7 @@ KubeletConfig represents the kubelet config values. {{< highlight yaml >}} machine: kubelet: - image: ghcr.io/siderolabs/kubelet:v1.31.1 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.1 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -556,7 +556,7 @@ machine: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The `image` field is an optional reference to an alternative kubelet image.
Show example(s){{< highlight yaml >}} -image: ghcr.io/siderolabs/kubelet:v1.31.1 +image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.1 {{< /highlight >}}
| | |`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list.
Show example(s){{< highlight yaml >}} clusterDNS: @@ -2912,7 +2912,7 @@ serviceAccount: {{< /highlight >}}
| | |`apiServer` |APIServerConfig |API server specific configuration options.
Show example(s){{< highlight yaml >}} apiServer: - image: registry.k8s.io/kube-apiserver:v1.31.1 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.1 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -2951,14 +2951,14 @@ apiServer: {{< /highlight >}}
| | |`controllerManager` |ControllerManagerConfig |Controller manager server specific configuration options.
Show example(s){{< highlight yaml >}} controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.31.1 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.1 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true {{< /highlight >}}
| | |`proxy` |ProxyConfig |Kube-proxy server-specific configuration options
Show example(s){{< highlight yaml >}} proxy: - image: registry.k8s.io/kube-proxy:v1.31.1 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.32.0-alpha.1 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -2969,7 +2969,7 @@ proxy: {{< /highlight >}}
| | |`scheduler` |SchedulerConfig |Scheduler server specific configuration options.
Show example(s){{< highlight yaml >}} scheduler: - image: registry.k8s.io/kube-scheduler:v1.31.1 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.1 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3213,7 +3213,7 @@ APIServerConfig represents the kube apiserver configuration options. {{< highlight yaml >}} cluster: apiServer: - image: registry.k8s.io/kube-apiserver:v1.31.1 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.1 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -3255,7 +3255,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the API server manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-apiserver:v1.31.1 +image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.1 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the API server. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the API server static pod. | | @@ -3394,7 +3394,7 @@ ControllerManagerConfig represents the kube controller manager configuration opt {{< highlight yaml >}} cluster: controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.31.1 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.1 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true @@ -3404,7 +3404,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the controller manager manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-controller-manager:v1.31.1 +image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.1 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the controller manager static pod. | | @@ -3474,7 +3474,7 @@ ProxyConfig represents the kube proxy configuration options. {{< highlight yaml >}} cluster: proxy: - image: registry.k8s.io/kube-proxy:v1.31.1 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.32.0-alpha.1 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -3491,7 +3491,7 @@ cluster: disabled: false {{< /highlight >}}
| | |`image` |string |The container image used in the kube-proxy manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-proxy:v1.31.1 +image: registry.k8s.io/kube-proxy:v1.32.0-alpha.1 {{< /highlight >}}
| | |`mode` |string |
proxy mode of kube-proxy.The default is 'iptables'.
| | |`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | | @@ -3510,7 +3510,7 @@ SchedulerConfig represents the kube scheduler configuration options. {{< highlight yaml >}} cluster: scheduler: - image: registry.k8s.io/kube-scheduler:v1.31.1 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.1 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3520,7 +3520,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the scheduler manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-scheduler:v1.31.1 +image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.1 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the scheduler static pod. | |