Dimitris Karakasilis
774547e150
Address PR comments
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-09-04 12:51:19 +03:00
Dimitris Karakasilis
f9b6a529f3
Use cli options to set the upgrade entry
...
so that we check if this works (fixed bug)
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-09-03 15:30:55 +03:00
Dimitris Karakasilis
3c9ba426e6
Fix test
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-09-03 15:16:57 +03:00
Dimitris Karakasilis
2570a1848b
Extract login into a method
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-09-03 13:52:12 +03:00
Dimitris Karakasilis
773b1e7d59
Add test for image size calculation and respect --recovery flag
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-09-03 13:38:47 +03:00
Dimitris Karakasilis
c0c419cce8
Fix unit tests
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-08-26 16:33:46 +03:00
Dimitris Karakasilis
257d0a1c38
Unify --recover and --boot-entry upgrade options in code
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-08-26 16:33:44 +03:00
Dimitris Karakasilis
c589ae1ce3
[WIP] Properly handle single entries in bootentry command
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-08-26 16:32:43 +03:00
mudler
75ff3cbdd4
feat(installation): allow to abort installation if sentinel file is present
...
Signed-off-by: mudler <mudler@localai.io>
2024-08-21 09:27:35 +02:00
Itxaka
0d8d534d5d
Encrypt luks partition with allow-discards ( #423 )
2024-07-29 09:47:03 +02:00
Dimitris Karakasilis
536c401f3c
Make test more robust
...
because on some workers machineID may come empty making the test fail
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-07-26 14:22:17 +03:00
Dimitris Karakasilis
571f10d900
Remove unecessary assignments and add NoFormat to UKI
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:06 +03:00
Dimitris Karakasilis
d8df60c315
Remove development debug output
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:06 +03:00
Dimitris Karakasilis
9df8781d23
Detect the preconfigured device when no-format is true
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:05 +03:00
Dimitris Karakasilis
7d9accccd7
[WIP] Try to see which code breaks it
...
Fixes https://github.com/kairos-io/kairos/issues/2281
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:52:12 +03:00
Mauro Morales
8f68b870d3
Bad refactoring, these should be active not cos ( #278 )
...
* Bad refactoring, these should be active not cos
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
* State should be called statereset everywhere
autoreset was introduced with UKI but we want parity with GRUB
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
---------
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-29 16:12:23 +01:00
Mauro Morales
69756e3020
Fix bootentry ( #277 )
...
* Fix bootentry
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
* Use same naming as in GRUB
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
---------
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-29 12:49:07 +01:00
Itxaka
64b9548049
Add an autoreset entry ( #267 )
2024-03-22 13:21:58 +01:00
Itxaka
abf92beac8
Bump to use vfs4 ( #240 )
2024-03-18 11:57:34 +01:00
Mauro Morales
3328a2987f
After upgrade or recovery, set bootentry to "cos" ( #251 )
2024-03-16 16:27:29 +01:00
Itxaka
0c06b1b183
Mount efi partition if not mounted for bootentries ( #250 )
2024-03-15 14:32:17 +00:00
Itxaka
f6466698fc
Fix bootentries grub in opensuse
...
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-03-15 14:34:37 +01:00
Mauro Morales
027a8800c2
Use existing role names for bootentry command on UKI ( #247 )
...
* Use existing role names for bootentry command
Switch from active.conf, passive.conf and recovery.conf to cos, fallback
and recovery respectively
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
* Extended cmdline
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
* Extend tests
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
---------
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-15 09:17:37 +01:00
Itxaka
2e0af77fbc
Use new logger facilities ( #236 )
2024-03-01 12:27:26 +01:00
mudler
958ae9393d
fix(after-install): run after-install hook after partitions are encrypted
2024-02-27 17:28:11 +01:00
Itxaka
2e9c85e63a
Add shim to choose next entry to boot from ( #230 )
2024-02-21 10:44:32 +01:00
Itxaka
775756f4b6
Run install off the same command ( #196 )
2024-01-09 15:10:04 +01:00
Dimitris Karakasilis
f26a517eab
remove copyright to SUSE
2023-10-20 10:39:50 +03:00
Denis Luchkin-Zhou
234bb4b36e
Add command to render a Go template with config and state as data context
...
Signed-off-by: Denis Luchkin-Zhou <wyvernzora@gmail.com>
2023-10-18 08:37:45 -07:00
Dimitris Karakasilis
80f83ba676
Run sanitization outside the spec building functions
...
To limit responsibility or those functions and to keep the tests passing
(because they assumed no sanitization)
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-10-02 10:57:11 +03:00
Dimitris Karakasilis
d1e84c186c
Fix minor syntax and linting issues
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-10-02 10:43:18 +03:00
Itxaka
442973526e
Track active/passive boot for upgrade workflow ( #133 )
...
* Track active/passive boot for upgrade workflow
Track what are we booting from during upgrade in order to not backup
active into passive if we are booting from passive.
If we are booting from active or recovery the workflow keeps as it was,
backup active into passive, and then move the transition image into
active.
Signed-off-by: Itxaka <itxaka@kairos.io>
2023-09-01 15:19:28 +02:00
Itxaka
28dd23c4f4
Adjust size to take into account upgrades ( #130 )
2023-08-18 12:18:10 +02:00
Itxaka
dffef50ca0
Several improvements for size calculation ( #129 )
2023-08-17 13:53:45 +02:00
Itxaka
3e9befa230
Add recovery upgrade flag to upgrade command + msg ( #123 )
2023-08-07 16:11:13 +02:00
Itxaka
26140a46d3
Tests and improve createExtraDirsInRootfs ( #111 )
2023-08-03 12:16:35 +02:00
Itxaka
f5f3d3f221
Allow creating dirs in rootfs via cc ( #109 )
2023-08-02 19:11:25 +02:00
Itxaka
3c2697a6ad
Fix config loading, install device and call sanitize ( #103 )
...
* Fix config loading, install device and call sanitize
Syncs the cfg.install.device to the installspec.target
As on manual-install the device can actually come from a flag and its
not on the cloud-config, we need to initialize the InstallSpec with the
value of the cfg.Install.Device as by that time we already have the
final value of the install target.
Also calls sanitize on config and specs and warns if anything goes wrong
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* Fix platform override and tests
The sanitize method for Config was never called so we never noticed that
its overriding the platform, even if we pass the WithPLatform option.
This patch fixes it by only overriding platform by default on sanitize
if the platform is empty, otherwise leave the platform on it values.
Also fixes the tests to use test facilities and a small fix to not try
to load the platform values form yaml
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
* Init the Install in the Config init
Just in case something tries to access it so they dont find a nil
Also adjusts some more tests
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
---------
Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
2023-07-25 19:36:01 +02:00
Itxaka
f7bdba2dda
Merge elemental config into agent config ( #102 )
2023-07-25 15:21:34 +02:00
Itxaka
5b945303c9
Drop runconfig in favour of config ( #101 )
2023-07-25 11:08:27 +02:00
Itxaka
956f86f99c
Rework reboot/shutdown to use the hooks ( #96 )
2023-07-24 12:28:59 +02:00
Itxaka
4bc5ea1cfc
Fix oem mountpoint not available on upgrade ( #85 )
2023-07-19 07:46:30 +00:00
Itxaka
9c5731baa2
Rename go module kairos-agent ( #81 )
2023-07-10 14:39:48 +02:00
Itxaka
9dd1dbddbe
Fix getting lvm recovery ( #70 )
2023-06-23 14:49:38 +02:00
Dimitris Karakasilis
f225315a5a
Use lsblk to detect partitions
...
like we did here:
https://github.com/kairos-io/kairos-sdk/pull/28/files
because ghw doesn't play well with lvm
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-06-21 10:52:08 +03:00
Itxaka
b126f7ab00
Drop --local flag for image sources ( #63 )
2023-06-21 09:39:59 +02:00
Dimitris Karakasilis
a113147f8a
1225 config collector elemental ( #32 )
...
Co-authored-by: Mauro Morales <mauro.morales@spectrocloud.com>
Co-authored-by: Itxaka <itxaka.garcia@spectrocloud.com>
Co-authored-by: Dimitris Karakasilis <dimitris@spectrocloud.com>
2023-06-07 11:28:37 +02:00
Itxaka
ddfa30a4c6
Drop luet, image extractor, drop build code and multiarch images ( #20 )
...
Co-authored-by: Mauro Morales <mauro.morales@spectrocloud.com>
2023-05-16 16:06:49 +02:00
Itxaka
002b8ba51f
Bring elemental-cli code into the agent ( #13 )
2023-05-05 18:43:21 +02:00