-
Notifications
You must be signed in to change notification settings - Fork 2.6k
[release-1.34] Backports for 2025-12 #13251
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
brandond
wants to merge
12
commits into
k3s-io:release-1.34
Choose a base branch
from
brandond:2025-12-backports_release-1.34
base: release-1.34
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
[release-1.34] Backports for 2025-12 #13251
brandond
wants to merge
12
commits into
k3s-io:release-1.34
from
brandond:2025-12-backports_release-1.34
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Signed-off-by: Derek Nola <[email protected]> (cherry picked from commit cfcc9ef) Signed-off-by: Brad Davidson <[email protected]>
* Pass GOOS into Dockerfile.local build args Fixes issue with build-windows job not actually building for windows * Remove `go generate` from package-cli We no longer use codegen in this repo * Fix go:embed path separator on Windows * Bump hcsshim for containerd 2.1 compat on windows * Include failing lister in error message * Bump k3s-io/api and k3s-io/helm-controller for embedded CRD windows path fix Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit ed57fb5) Signed-off-by: Brad Davidson <[email protected]>
* tunnel: handle pod IP reuse a valid tunnel/session may be deleted when an IP is reused while a Complete pod (for example a job) was using that IP but is being gc'ed. This causes timeouts to webhooks after directDial is attempted because session was removed. Solution is to track the owner of the IP and delete the entry only when the the owner pod is deleted. Signed-off-by: Julian Vassev <[email protected]> (cherry picked from commit 9130056) Signed-off-by: Brad Davidson <[email protected]>
Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit f0d5452) Signed-off-by: Brad Davidson <[email protected]>
Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit 9806524) Signed-off-by: Brad Davidson <[email protected]>
Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit 1037dcb) Signed-off-by: Brad Davidson <[email protected]>
Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit af441c2) Signed-off-by: Brad Davidson <[email protected]>
It is hidden and undocumented, but also apparently broken. Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit f783052) Signed-off-by: Brad Davidson <[email protected]>
The legacy Docker snapshotter flattens application/vnd.docker.distribution.manifest.v2+json manifests to application/vnd.oci.image.manifest.v1+json when saving. Switching to the containerd snapshotter allows us to keep the original manifest digest when pulling and saving image tarballs. Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit 74088f5) Signed-off-by: Brad Davidson <[email protected]>
Remove optional tools from runners to make space available for docker/vagrant Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit f726966) Signed-off-by: Brad Davidson <[email protected]>
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## release-1.34 #13251 +/- ##
================================================
- Coverage 21.92% 21.78% -0.14%
================================================
Files 186 186
Lines 15171 15259 +88
================================================
- Hits 3326 3324 -2
- Misses 11406 11496 +90
Partials 439 439
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
vitorsavian
approved these changes
Nov 21, 2025
farazkhawaja
approved these changes
Nov 25, 2025
cwayne18
approved these changes
Nov 25, 2025
We do not use any vulnerable code from this project, but we should bump it anyway to pacify scanners Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit 3de0888) Signed-off-by: Brad Davidson <[email protected]>
Signed-off-by: Brad Davidson <[email protected]> (cherry picked from commit 96ed439) Signed-off-by: Brad Davidson <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Proposed Changes
Backports:
Types of Changes
backports
Verification
see linked issues
Testing
Linked Issues
User-Facing Change
Further Comments