Commit Graph

191 Commits

Author SHA1 Message Date
Itxaka
4975b9b914
Bump yip and diskfs (#717)
* Bump yip and diskfs

---------

Signed-off-by: Itxaka <itxaka@kairos.io>
2025-03-26 11:57:29 +01:00
Itxaka
db703db5e5
Try to fix hooks (#718)
* fix hooks


---------

Signed-off-by: Itxaka <itxaka@kairos.io>
2025-03-24 16:05:39 +01:00
Itxaka
b5869b4017
Fix hooks under encrypted partitions (#702)
* Fix hooks under encrypted partitions

We had a mess of mounting and unmounting things around when we try to
copy things to persistent.

Part of the changes (using the by-label to mount the persistent) are due
to the change in kcrypt. As we set the same label to the encrypted fs
and unencrypted fs, our utils.Mount could get mistaken and return the
first hit, which usually its the encrypted one, and we cannot mount that
one.

This patch brings it up to date.

 - Makes bundles and logs hooks work when we have encrypted persistent.
   It didnt work before.
 - Makes both workflows the same.
 - Locks everything once its over, to not leave encrypted parts around
 - Mounts OEM so kcrypt can read the config if we are using a remote
   server for encryption
 - Mounts by label so there is not a change of getting the wrong device
 - Uses the mount syscall directly. The util can mistake and return the
   actual encrypted part if they both have the same label and finds it
   first

---------

Signed-off-by: Itxaka <itxaka@kairos.io>
2025-03-13 11:22:26 +01:00
Itxaka
488841ebf2
Use extensions dir path as source (#660)
Otherwise it will copy the dir itself and we just want to copy the
contents of the dir

Signed-off-by: Itxaka <itxaka@kairos.io>
2025-01-14 10:59:45 +01:00
Itxaka
895e571bb3
Expose pcrs for uki encryption (#603) 2024-11-20 10:41:52 +01:00
Itxaka
9ea89f7610
Bump nodepair (#592)
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-11-07 09:24:24 +01:00
Itxaka
dcad8beac2
Drop those stupid github and vfs deps bumps (#591) 2024-11-06 12:50:14 +01:00
Itxaka
e2c3a0e638
Read actual system configs during k8s upgrade (#579) 2024-10-16 12:36:19 +02:00
Itxaka
97d25b8993
Check for user+admin validity before actions (#575) 2024-10-15 10:47:09 +02:00
Itxaka
a3aadbbaa9
Allow installing with no users (#574) 2024-10-10 14:18:59 +02:00
Itxaka
e8bb8cf4ff
Move to use kairos-release (#567) 2024-10-07 09:44:05 +00:00
Dimitris Karakasilis
b0b4618f8f
Show sources in config string
and remove directory which is only meant to be used by yip configs (not
user configs read by the kairos-agent).

This needs to be explained in the release notes.

Needs this: https://github.com/kairos-io/kairos-sdk/pull/501

Part of: https://github.com/kairos-io/kairos/issues/2737

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-09-26 12:07:59 +03:00
Itxaka
fbb64f2a82
Run tests in parallel and output github formats on workflow (#543)
* Run tests in parallel and output github formats on workflow

Signed-off-by: Itxaka <itxaka@kairos.io>

* Fix broken parallel tests

We were using a fixed file for the tests which several tests could be
accessing at the same time.

This fixes it by setting a temp random file at the test start

Signed-off-by: Itxaka <itxaka@kairos.io>

* Fix the tests logging to stdout

Signed-off-by: Itxaka <itxaka@kairos.io>

* Drop the verbose

Signed-off-by: Itxaka <itxaka@kairos.io>

* Fix agent test

Signed-off-by: Itxaka <itxaka@kairos.io>

* Let the event consumer create the logfile or whatever

Signed-off-by: Itxaka <itxaka@kairos.io>

* Drop Focus

Signed-off-by: Itxaka <itxaka@kairos.io>

---------

Signed-off-by: Itxaka <itxaka@kairos.io>
2024-09-17 17:51:11 +02:00
Itxaka
3e99d75331
Move to use our ghw clone (#535) 2024-09-17 15:27:31 +02:00
Itxaka
419f09160f
Fail if remote url address doesnt exist (#527) 2024-09-11 15:57:53 +02:00
Itxaka
17699f4d6e
Display net info on QR code page (#525) 2024-09-10 15:50:16 +02:00
Itxaka
8e2c8ebb92
Minimize shelling out (#439)
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-09-10 12:23:15 +02:00
Dimitris Karakasilis
257d0a1c38
Unify --recover and --boot-entry upgrade options in code
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-08-26 16:33:44 +03:00
Dimitris Karakasilis
c589ae1ce3
[WIP] Properly handle single entries in bootentry command
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-08-26 16:32:43 +03:00
Itxaka
02eb9d32a0
Let kcrypt add the allow discards option (#434) 2024-07-31 18:00:29 +02:00
Itxaka
0d8d534d5d
Encrypt luks partition with allow-discards (#423) 2024-07-29 09:47:03 +02:00
Itxaka
aebc8f6083
Bump kcrypt and adapt hooks (#385) 2024-06-20 11:19:29 +02:00
Björn Brauer
54a528a44a
Ensure only numeric part of systemd version is converted to int (#362) 2024-06-12 10:08:19 +02:00
Itxaka
91e18dd4b3 Copy extensions to passive as well
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-06-10 15:58:44 +02:00
Itxaka
b176b47f56
Copy any found sysextensions into active+passive efi dir (#372) 2024-06-07 16:45:50 +02:00
Dimitris Karakasilis
382b1944b3
Move udevadm triggering in kcrypt
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-05-23 16:05:31 +03:00
Itxaka
50c1ebd335
Fix reboot/power off message (#331)
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-05-13 14:27:47 +00:00
Mauro Morales
c04372868b
Use Overwrites for a payload cloud config (#320)
Relates to kairos-io/kairos#2492

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-05-03 18:26:57 +02:00
Itxaka
d1f65cd334
Centralize uki hooks for encryption reasons (#309) 2024-04-24 16:42:51 +02:00
Itxaka
1602276133
Add missing hooks to after install uki (#307) 2024-04-23 14:37:21 +02:00
Itxaka
59777eeb3e
Rework prepareConfiguration (#289) 2024-04-12 10:40:11 +02:00
Dimitris Karakasilis
1f2d8d89fc
Move the Image() filtering to kairos-sdk
https://github.com/kairos-io/kairos-sdk/pull/85/files

Fixes: https://github.com/kairos-io/kairos/issues/2440

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-12 09:40:26 +03:00
Itxaka
15a15a1f0c
Keep logs after reset (#288) 2024-04-11 11:35:31 +02:00
Dimitris Karakasilis
d8df60c315
Remove development debug output
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:06 +03:00
Dimitris Karakasilis
804462e272
WIP
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:04 +03:00
Dimitris Karakasilis
7d9accccd7
[WIP] Try to see which code breaks it
Fixes https://github.com/kairos-io/kairos/issues/2281

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:52:12 +03:00
Dimitris Karakasilis
db0a65cf6e
Return only image (skipping sbom, img, etc)
Fixes: https://github.com/kairos-io/kairos/issues/2329

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-02 17:15:20 +03:00
Itxaka
b1489daff8
Converge all yaml libs into v3 (#266)
* Converge all yaml libs into v3

Signed-off-by: Itxaka <itxaka@kairos.io>

* go mod tid

Signed-off-by: Itxaka <itxaka@kairos.io>

---------

Signed-off-by: Itxaka <itxaka@kairos.io>
2024-03-20 16:53:42 +01:00
Itxaka
8583d38b68
Retry unlock if we cant find the unlocked partitions (#241) 2024-03-19 09:27:13 +01:00
Itxaka
abf92beac8
Bump to use vfs4 (#240) 2024-03-18 11:57:34 +01:00
Itxaka
0ae9c04eb4
Make sure kcrypt hook umounts persistent (#244) 2024-03-07 15:11:51 +01:00
Itxaka
2e0af77fbc
Use new logger facilities (#236) 2024-03-01 12:27:26 +01:00
mudler
958ae9393d fix(after-install): run after-install hook after partitions are encrypted 2024-02-27 17:28:11 +01:00
Itxaka
2e9c85e63a
Add shim to choose next entry to boot from (#230) 2024-02-21 10:44:32 +01:00
Dimitris Karakasilis
88454bdda4
Implement uki "kairos-agent upgrade --recovery"
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 13:30:52 +02:00
Dimitris Karakasilis
d981656715
Install efi files in uki mode using naming convention
replace "artifact" with "active" in conf files and in filenames

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-13 16:12:20 +02:00
Itxaka
0119b9cfb2
Fix object dumping (#222) 2024-02-05 11:30:24 +01:00
Itxaka
33c8e8f29c
Add reset for uki (#221) 2024-02-02 13:20:06 +01:00
Itxaka
9941c786a3
Fix uki upgade path (#219) 2024-01-31 19:38:16 +01:00
Itxaka
1a46f0910f
[uki] Wait for oem to appear after encryption (#216) 2024-01-30 14:28:54 +01:00