Commit Graph

176 Commits

Author SHA1 Message Date
Itxaka
3c26c8e272 Move error to warn like in bundles and update go.sum
Signed-off-by: Itxaka <itxaka@kairos.io>
2025-03-13 12:39:56 +01:00
Itxaka
d7b0a90d02 Fix hooks under encrypted partitions (#702)
* Fix hooks under encrypted partitions

We had a mess of mounting and unmounting things around when we try to
copy things to persistent.

Part of the changes (using the by-label to mount the persistent) are due
to the change in kcrypt. As we set the same label to the encrypted fs
and unencrypted fs, our utils.Mount could get mistaken and return the
first hit, which usually its the encrypted one, and we cannot mount that
one.

This patch brings it up to date.

 - Makes bundles and logs hooks work when we have encrypted persistent.
   It didnt work before.
 - Makes both workflows the same.
 - Locks everything once its over, to not leave encrypted parts around
 - Mounts OEM so kcrypt can read the config if we are using a remote
   server for encryption
 - Mounts by label so there is not a change of getting the wrong device
 - Uses the mount syscall directly. The util can mistake and return the
   actual encrypted part if they both have the same label and finds it
   first

---------

Signed-off-by: Itxaka <itxaka@kairos.io>
(cherry picked from commit b5869b4017)
2025-03-13 12:37:30 +01:00
Dimitris Karakasilis
257d0a1c38 Unify --recover and --boot-entry upgrade options in code
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-08-26 16:33:44 +03:00
Dimitris Karakasilis
c589ae1ce3 [WIP] Properly handle single entries in bootentry command
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-08-26 16:32:43 +03:00
Itxaka
02eb9d32a0 Let kcrypt add the allow discards option (#434) 2024-07-31 18:00:29 +02:00
Itxaka
0d8d534d5d Encrypt luks partition with allow-discards (#423) 2024-07-29 09:47:03 +02:00
Itxaka
aebc8f6083 Bump kcrypt and adapt hooks (#385) 2024-06-20 11:19:29 +02:00
Björn Brauer
54a528a44a Ensure only numeric part of systemd version is converted to int (#362) 2024-06-12 10:08:19 +02:00
Itxaka
91e18dd4b3 Copy extensions to passive as well
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-06-10 15:58:44 +02:00
Itxaka
b176b47f56 Copy any found sysextensions into active+passive efi dir (#372) 2024-06-07 16:45:50 +02:00
Dimitris Karakasilis
382b1944b3 Move udevadm triggering in kcrypt
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-05-23 16:05:31 +03:00
Itxaka
50c1ebd335 Fix reboot/power off message (#331)
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-05-13 14:27:47 +00:00
Mauro Morales
c04372868b Use Overwrites for a payload cloud config (#320)
Relates to kairos-io/kairos#2492

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-05-03 18:26:57 +02:00
Itxaka
d1f65cd334 Centralize uki hooks for encryption reasons (#309) 2024-04-24 16:42:51 +02:00
Itxaka
1602276133 Add missing hooks to after install uki (#307) 2024-04-23 14:37:21 +02:00
Itxaka
59777eeb3e Rework prepareConfiguration (#289) 2024-04-12 10:40:11 +02:00
Dimitris Karakasilis
1f2d8d89fc Move the Image() filtering to kairos-sdk
https://github.com/kairos-io/kairos-sdk/pull/85/files

Fixes: https://github.com/kairos-io/kairos/issues/2440

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-12 09:40:26 +03:00
Itxaka
15a15a1f0c Keep logs after reset (#288) 2024-04-11 11:35:31 +02:00
Dimitris Karakasilis
d8df60c315 Remove development debug output
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:06 +03:00
Dimitris Karakasilis
804462e272 WIP
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:04 +03:00
Dimitris Karakasilis
7d9accccd7 [WIP] Try to see which code breaks it
Fixes https://github.com/kairos-io/kairos/issues/2281

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:52:12 +03:00
Dimitris Karakasilis
db0a65cf6e Return only image (skipping sbom, img, etc)
Fixes: https://github.com/kairos-io/kairos/issues/2329

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-02 17:15:20 +03:00
Itxaka
b1489daff8 Converge all yaml libs into v3 (#266)
* Converge all yaml libs into v3

Signed-off-by: Itxaka <itxaka@kairos.io>

* go mod tid

Signed-off-by: Itxaka <itxaka@kairos.io>

---------

Signed-off-by: Itxaka <itxaka@kairos.io>
2024-03-20 16:53:42 +01:00
Itxaka
8583d38b68 Retry unlock if we cant find the unlocked partitions (#241) 2024-03-19 09:27:13 +01:00
Itxaka
abf92beac8 Bump to use vfs4 (#240) 2024-03-18 11:57:34 +01:00
Itxaka
0ae9c04eb4 Make sure kcrypt hook umounts persistent (#244) 2024-03-07 15:11:51 +01:00
Itxaka
2e0af77fbc Use new logger facilities (#236) 2024-03-01 12:27:26 +01:00
mudler
958ae9393d fix(after-install): run after-install hook after partitions are encrypted 2024-02-27 17:28:11 +01:00
Itxaka
2e9c85e63a Add shim to choose next entry to boot from (#230) 2024-02-21 10:44:32 +01:00
Dimitris Karakasilis
88454bdda4 Implement uki "kairos-agent upgrade --recovery"
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 13:30:52 +02:00
Dimitris Karakasilis
d981656715 Install efi files in uki mode using naming convention
replace "artifact" with "active" in conf files and in filenames

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-13 16:12:20 +02:00
Itxaka
0119b9cfb2 Fix object dumping (#222) 2024-02-05 11:30:24 +01:00
Itxaka
33c8e8f29c Add reset for uki (#221) 2024-02-02 13:20:06 +01:00
Itxaka
9941c786a3 Fix uki upgade path (#219) 2024-01-31 19:38:16 +01:00
Itxaka
1a46f0910f [uki] Wait for oem to appear after encryption (#216) 2024-01-30 14:28:54 +01:00
Itxaka
8696eb16d2 Do not show devices that cant be used (#212)
during interactive install all devices will appear but some of those are
not desirable as they cannot be used to install.

Skip those in the list

Signed-off-by: Itxaka <itxaka@kairos.io>
2024-01-26 15:09:13 +01:00
Ettore Di Giacinto
79a577d0f3 feat(uki-partitioning): respect additional encrypted partition list (#206) 2024-01-24 10:48:33 +01:00
Itxaka
e80a435c53 Fix --source flag (#205) 2024-01-23 17:05:54 +01:00
Dimitris Karakasilis
9a8c404cfa Add "--all" flag to list-releases to print older releases too
This will allow us to fix the broken test in master and also allow
people to downgrade to older releases.

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-01-11 10:43:45 +02:00
Itxaka
53f49169b1 Fix uki mode detection (#198) 2024-01-10 10:38:31 +01:00
Itxaka
174d69c3ea Merge uki upgrade into the normal upgrade command (#197) 2024-01-09 16:42:49 +01:00
Itxaka
775756f4b6 Run install off the same command (#196) 2024-01-09 15:10:04 +01:00
Itxaka
3254b8a36e Uki upgrade (#182) 2023-12-18 11:38:26 +01:00
Itxaka
7ca39f2729 Encrypt uki partitions after install (#176) 2023-12-12 20:51:55 +00:00
Dimitris Karakasilis
05174fed43 Merge pull request #181 from kairos-io/1999-consume-versioneer
1999 consume versioneer
2023-12-08 14:18:25 +02:00
Dimitris Karakasilis
2412d69e32 Re-enable call-out to provider for releases
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-12-08 10:50:01 +02:00
Dimitris Karakasilis
00ce75b285 Deprecate positional argument and cleanup unused code
because empty source caused an error, because of Sanitize() failing.
handleEmptySource was never called.

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-12-07 18:20:16 +02:00
Dimitris Karakasilis
823343546a Fix "upgrade list-releases" command by consuming kairos-sdk versioneer
Also add TODOs for remaining work

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-12-07 15:00:45 +02:00
Itxaka
e6b3e5092e Exit on install validation if target disk has mounted partitions (#180) 2023-12-07 12:32:41 +01:00
Itxaka
6e1d761ded Fix unwanted reboot from install config in upgrade/reset (#178) 2023-12-05 15:46:11 +01:00