Commit Graph

942 Commits

Author SHA1 Message Date
Mauro Morales
027a8800c2
Use existing role names for bootentry command on UKI (#247)
* Use existing role names for bootentry command

Switch from active.conf, passive.conf and recovery.conf to cos, fallback
and recovery respectively

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

* Extended cmdline

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

* Extend tests

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

---------

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-15 09:17:37 +01:00
Ettore Di Giacinto
8b6dde816c
Merge pull request #242 from kairos-io/upgrade_livemedia_nope
Add a check for livemedia when running upgrade
2024-03-14 17:44:05 +01:00
Ettore Di Giacinto
39d5ccf4e7
Merge pull request #245 from kairos-io/2304-run-after-reset-in-uki
Run after reset hook when resetting in UKI mode
2024-03-14 17:43:04 +01:00
Mauro Morales
590e39e97e
Add UKI functionlity to replace titles (#246)
* Add UKI functionlity to replace titles

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

* Move common logic to constants

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

---------

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-13 09:54:12 +01:00
Dimitris Karakasilis
931c908a2e
Run after reset hook when resetting in UKI mode
To allow the workaround described here:
https://github.com/kairos-io/kairos/issues/2304

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-03-11 17:44:41 +02:00
Itxaka
0ae9c04eb4
Make sure kcrypt hook umounts persistent (#244) 2024-03-07 15:11:51 +01:00
Itxaka
6000742887
Try to print more info about the boott mode when loading the config (#243) 2024-03-07 12:46:55 +01:00
Itxaka
009c7a6677 Also refuse to do it on unkown media
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-03-07 12:46:33 +01:00
Itxaka
40da5fa451 Add a check for livemedia when running upgrade
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-03-07 12:10:16 +01:00
Itxaka
2e0af77fbc
Use new logger facilities (#236) 2024-03-01 12:27:26 +01:00
Mauro Morales
d139550b54
Bump SDK to 0.0.26 (#238) 2024-02-29 22:14:45 +01:00
Ettore Di Giacinto
694add86ae
Merge pull request #237 from kairos-io/after-install-hooks
fix(after-install): run after-install hook after partitions are encrypted
2024-02-27 17:56:08 +01:00
mudler
958ae9393d fix(after-install): run after-install hook after partitions are encrypted 2024-02-27 17:28:11 +01:00
Itxaka
2e9c85e63a
Add shim to choose next entry to boot from (#230) 2024-02-21 10:44:32 +01:00
Dimitris Karakasilis
cce432133e
Merge pull request #232 from kairos-io/2051-uki-reset
Move "recovery" to "active" on reset
2024-02-21 10:27:55 +02:00
Dimitris Karakasilis
ca84f82faa Mount EFI partition as RW, to rotate recovery -> active on reset
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 18:16:57 +02:00
Dimitris Karakasilis
a635a7ba08 Move "recovery" to "active" on reset
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 17:54:59 +02:00
Dimitris Karakasilis
8c353a9512
Merge pull request #231 from kairos-io/2263-uki-upgrade-recovery
Implement uki "kairos-agent upgrade --recovery"
2024-02-20 16:19:52 +02:00
Dimitris Karakasilis
c523f48a17 Remove unecessary method parameter
becaues now we have a receiver which already has that field

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 16:07:23 +02:00
Dimitris Karakasilis
88454bdda4
Implement uki "kairos-agent upgrade --recovery"
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 13:30:52 +02:00
Dimitris Karakasilis
58c039194f
Merge pull request #229 from kairos-io/2226-detect-boot-state
2226 detect boot state
2024-02-19 14:09:37 +02:00
Dimitris Karakasilis
c369187e48
Remove "replace" directive from go.mod
and use released tag

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-19 13:43:43 +02:00
Dimitris Karakasilis
78a240d9c5
Handle the filesystem walk error
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-16 17:39:08 +02:00
Mauro Morales
b88d1a70b8
Refactor methods and implement uki upgrade
Signed-off-by: Dimitris Karakasilis <dimitris@spectrocloud.com>
2024-02-16 17:37:40 +02:00
Mauro Morales
bf8e2ba3b0 Make copies for active/passive/recovery
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-02-15 17:48:21 +01:00
Dimitris Karakasilis
d981656715
Install efi files in uki mode using naming convention
replace "artifact" with "active" in conf files and in filenames

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-13 16:12:20 +02:00
Dimitris Karakasilis
75eda111cd
Handle error and extract code to function
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-13 11:16:49 +02:00
Itxaka
5f6bb7884f
Adapt uki install to new rootfsbase (#228) 2024-02-12 10:35:36 +01:00
Ettore Di Giacinto
bd15303f33
Merge pull request #227 from kairos-io/fix_dir_creation
fix: do not try to create a dir
2024-02-09 11:32:05 +01:00
Ettore Di Giacinto
1867523424
Update pkg/uki/install.go 2024-02-09 11:28:48 +01:00
mudler
5bf688b8f9 do not try to create a dir 2024-02-09 11:27:09 +01:00
Ettore Di Giacinto
6933d015e9
Merge pull request #226 from kairos-io/double_mount
fix(mount): check if path is mounted and create /run/initramfs/live if doesn't exist
2024-02-09 11:15:34 +01:00
mudler
b8388782b0 fix(mount): check if path is mounted and create /run/initramfs/live if doesn't exist 2024-02-09 11:11:49 +01:00
Mauro Morales
175b163159
Read /system/oem config (#224)
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-02-08 16:05:34 +01:00
Itxaka
aade2bebb3
Bring uki install up to par with immucore (#225) 2024-02-08 15:21:37 +01:00
Mauro Morales
3dbc7c0ce7
Add default system config dir (#223)
* Add default system config dir

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

* Add elemental dir too

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

---------

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-02-08 12:55:48 +01:00
Itxaka
0119b9cfb2
Fix object dumping (#222) 2024-02-05 11:30:24 +01:00
Itxaka
33c8e8f29c
Add reset for uki (#221) 2024-02-02 13:20:06 +01:00
Itxaka
7efda3d50e Bump sdk
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-02-01 15:27:00 +01:00
Itxaka
0897a79c25
Remove the proper interactive-install entry by default (#220) 2024-01-31 20:58:49 +01:00
Itxaka
9941c786a3
Fix uki upgade path (#219) 2024-01-31 19:38:16 +01:00
Itxaka
1a46f0910f
[uki] Wait for oem to appear after encryption (#216) 2024-01-30 14:28:54 +01:00
Itxaka
3b5ae90dfe
Set proper partition size based on the source (#214) 2024-01-30 10:35:10 +01:00
Itxaka
f6f113128d
Remove entries on install (#213) 2024-01-26 17:41:23 +01:00
Itxaka
8696eb16d2
Do not show devices that cant be used (#212)
during interactive install all devices will appear but some of those are
not desirable as they cannot be used to install.

Skip those in the list

Signed-off-by: Itxaka <itxaka@kairos.io>
2024-01-26 15:09:13 +01:00
renovate[bot]
5014587a3c fix(deps): update dependency alpinejs to v3.13.5 2024-01-24 23:03:07 +00:00
Itxaka
25aa9cf0cb
Bump kcrypt (#208) 2024-01-24 16:44:16 +01:00
renovate[bot]
190fe53d38 fix(deps): update module github.com/nxadm/tail to v1.4.11 2024-01-24 15:21:32 +00:00
renovate[bot]
f9e6641788 fix(deps): update module github.com/distribution/distribution to v2.8.3+incompatible 2024-01-24 13:44:57 +00:00
Ettore Di Giacinto
79a577d0f3
feat(uki-partitioning): respect additional encrypted partition list (#206) 2024-01-24 10:48:33 +01:00