Itxaka
3c26c8e272
Move error to warn like in bundles and update go.sum
...
Signed-off-by: Itxaka <itxaka@kairos.io >
2025-03-13 12:39:56 +01:00
Itxaka
d7b0a90d02
Fix hooks under encrypted partitions ( #702 )
...
* Fix hooks under encrypted partitions
We had a mess of mounting and unmounting things around when we try to
copy things to persistent.
Part of the changes (using the by-label to mount the persistent) are due
to the change in kcrypt. As we set the same label to the encrypted fs
and unencrypted fs, our utils.Mount could get mistaken and return the
first hit, which usually its the encrypted one, and we cannot mount that
one.
This patch brings it up to date.
- Makes bundles and logs hooks work when we have encrypted persistent.
It didnt work before.
- Makes both workflows the same.
- Locks everything once its over, to not leave encrypted parts around
- Mounts OEM so kcrypt can read the config if we are using a remote
server for encryption
- Mounts by label so there is not a change of getting the wrong device
- Uses the mount syscall directly. The util can mistake and return the
actual encrypted part if they both have the same label and finds it
first
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
(cherry picked from commit b5869b4017
)
2025-03-13 12:37:30 +01:00
Dimitris Karakasilis
257d0a1c38
Unify --recover and --boot-entry upgrade options in code
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-08-26 16:33:44 +03:00
Dimitris Karakasilis
c589ae1ce3
[WIP] Properly handle single entries in bootentry command
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-08-26 16:32:43 +03:00
Itxaka
02eb9d32a0
Let kcrypt add the allow discards option ( #434 )
2024-07-31 18:00:29 +02:00
Itxaka
0d8d534d5d
Encrypt luks partition with allow-discards ( #423 )
2024-07-29 09:47:03 +02:00
Itxaka
aebc8f6083
Bump kcrypt and adapt hooks ( #385 )
2024-06-20 11:19:29 +02:00
Björn Brauer
54a528a44a
Ensure only numeric part of systemd version is converted to int ( #362 )
2024-06-12 10:08:19 +02:00
Itxaka
91e18dd4b3
Copy extensions to passive as well
...
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-06-10 15:58:44 +02:00
Itxaka
b176b47f56
Copy any found sysextensions into active+passive efi dir ( #372 )
2024-06-07 16:45:50 +02:00
Dimitris Karakasilis
382b1944b3
Move udevadm triggering in kcrypt
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-05-23 16:05:31 +03:00
Itxaka
50c1ebd335
Fix reboot/power off message ( #331 )
...
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-05-13 14:27:47 +00:00
Mauro Morales
c04372868b
Use Overwrites for a payload cloud config ( #320 )
...
Relates to kairos-io/kairos#2492
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com >
2024-05-03 18:26:57 +02:00
Itxaka
d1f65cd334
Centralize uki hooks for encryption reasons ( #309 )
2024-04-24 16:42:51 +02:00
Itxaka
1602276133
Add missing hooks to after install uki ( #307 )
2024-04-23 14:37:21 +02:00
Itxaka
59777eeb3e
Rework prepareConfiguration ( #289 )
2024-04-12 10:40:11 +02:00
Dimitris Karakasilis
1f2d8d89fc
Move the Image() filtering to kairos-sdk
...
https://github.com/kairos-io/kairos-sdk/pull/85/files
Fixes: https://github.com/kairos-io/kairos/issues/2440
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-12 09:40:26 +03:00
Itxaka
15a15a1f0c
Keep logs after reset ( #288 )
2024-04-11 11:35:31 +02:00
Dimitris Karakasilis
d8df60c315
Remove development debug output
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-09 12:53:06 +03:00
Dimitris Karakasilis
804462e272
WIP
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-09 12:53:04 +03:00
Dimitris Karakasilis
7d9accccd7
[WIP] Try to see which code breaks it
...
Fixes https://github.com/kairos-io/kairos/issues/2281
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-09 12:52:12 +03:00
Dimitris Karakasilis
db0a65cf6e
Return only image (skipping sbom, img, etc)
...
Fixes: https://github.com/kairos-io/kairos/issues/2329
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-02 17:15:20 +03:00
Itxaka
b1489daff8
Converge all yaml libs into v3 ( #266 )
...
* Converge all yaml libs into v3
Signed-off-by: Itxaka <itxaka@kairos.io >
* go mod tid
Signed-off-by: Itxaka <itxaka@kairos.io >
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-03-20 16:53:42 +01:00
Itxaka
8583d38b68
Retry unlock if we cant find the unlocked partitions ( #241 )
2024-03-19 09:27:13 +01:00
Itxaka
abf92beac8
Bump to use vfs4 ( #240 )
2024-03-18 11:57:34 +01:00
Itxaka
0ae9c04eb4
Make sure kcrypt hook umounts persistent ( #244 )
2024-03-07 15:11:51 +01:00
Itxaka
2e0af77fbc
Use new logger facilities ( #236 )
2024-03-01 12:27:26 +01:00
mudler
958ae9393d
fix(after-install): run after-install hook after partitions are encrypted
2024-02-27 17:28:11 +01:00
Itxaka
2e9c85e63a
Add shim to choose next entry to boot from ( #230 )
2024-02-21 10:44:32 +01:00
Dimitris Karakasilis
88454bdda4
Implement uki "kairos-agent upgrade --recovery"
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-02-20 13:30:52 +02:00
Dimitris Karakasilis
d981656715
Install efi files in uki mode using naming convention
...
replace "artifact" with "active" in conf files and in filenames
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-02-13 16:12:20 +02:00
Itxaka
0119b9cfb2
Fix object dumping ( #222 )
2024-02-05 11:30:24 +01:00
Itxaka
33c8e8f29c
Add reset for uki ( #221 )
2024-02-02 13:20:06 +01:00
Itxaka
9941c786a3
Fix uki upgade path ( #219 )
2024-01-31 19:38:16 +01:00
Itxaka
1a46f0910f
[uki] Wait for oem to appear after encryption ( #216 )
2024-01-30 14:28:54 +01:00
Itxaka
8696eb16d2
Do not show devices that cant be used ( #212 )
...
during interactive install all devices will appear but some of those are
not desirable as they cannot be used to install.
Skip those in the list
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-01-26 15:09:13 +01:00
Ettore Di Giacinto
79a577d0f3
feat(uki-partitioning): respect additional encrypted partition list ( #206 )
2024-01-24 10:48:33 +01:00
Itxaka
e80a435c53
Fix --source flag ( #205 )
2024-01-23 17:05:54 +01:00
Dimitris Karakasilis
9a8c404cfa
Add "--all" flag to list-releases to print older releases too
...
This will allow us to fix the broken test in master and also allow
people to downgrade to older releases.
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-01-11 10:43:45 +02:00
Itxaka
53f49169b1
Fix uki mode detection ( #198 )
2024-01-10 10:38:31 +01:00
Itxaka
174d69c3ea
Merge uki upgrade into the normal upgrade command ( #197 )
2024-01-09 16:42:49 +01:00
Itxaka
775756f4b6
Run install off the same command ( #196 )
2024-01-09 15:10:04 +01:00
Itxaka
3254b8a36e
Uki upgrade ( #182 )
2023-12-18 11:38:26 +01:00
Itxaka
7ca39f2729
Encrypt uki partitions after install ( #176 )
2023-12-12 20:51:55 +00:00
Dimitris Karakasilis
05174fed43
Merge pull request #181 from kairos-io/1999-consume-versioneer
...
1999 consume versioneer
2023-12-08 14:18:25 +02:00
Dimitris Karakasilis
2412d69e32
Re-enable call-out to provider for releases
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2023-12-08 10:50:01 +02:00
Dimitris Karakasilis
00ce75b285
Deprecate positional argument and cleanup unused code
...
because empty source caused an error, because of Sanitize() failing.
handleEmptySource was never called.
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2023-12-07 18:20:16 +02:00
Dimitris Karakasilis
823343546a
Fix "upgrade list-releases" command by consuming kairos-sdk versioneer
...
Also add TODOs for remaining work
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2023-12-07 15:00:45 +02:00
Itxaka
e6b3e5092e
Exit on install validation if target disk has mounted partitions ( #180 )
2023-12-07 12:32:41 +01:00
Itxaka
6e1d761ded
Fix unwanted reboot from install config in upgrade/reset ( #178 )
2023-12-05 15:46:11 +01:00