Mauro Morales
027a8800c2
Use existing role names for bootentry command on UKI ( #247 )
...
* Use existing role names for bootentry command
Switch from active.conf, passive.conf and recovery.conf to cos, fallback
and recovery respectively
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
* Extended cmdline
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
* Extend tests
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
---------
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-15 09:17:37 +01:00
Ettore Di Giacinto
8b6dde816c
Merge pull request #242 from kairos-io/upgrade_livemedia_nope
...
Add a check for livemedia when running upgrade
2024-03-14 17:44:05 +01:00
Ettore Di Giacinto
39d5ccf4e7
Merge pull request #245 from kairos-io/2304-run-after-reset-in-uki
...
Run after reset hook when resetting in UKI mode
2024-03-14 17:43:04 +01:00
Mauro Morales
590e39e97e
Add UKI functionlity to replace titles ( #246 )
...
* Add UKI functionlity to replace titles
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
* Move common logic to constants
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
---------
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-13 09:54:12 +01:00
Dimitris Karakasilis
931c908a2e
Run after reset hook when resetting in UKI mode
...
To allow the workaround described here:
https://github.com/kairos-io/kairos/issues/2304
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-03-11 17:44:41 +02:00
Itxaka
0ae9c04eb4
Make sure kcrypt hook umounts persistent ( #244 )
2024-03-07 15:11:51 +01:00
Itxaka
6000742887
Try to print more info about the boott mode when loading the config ( #243 )
2024-03-07 12:46:55 +01:00
Itxaka
009c7a6677
Also refuse to do it on unkown media
...
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-03-07 12:46:33 +01:00
Itxaka
40da5fa451
Add a check for livemedia when running upgrade
...
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-03-07 12:10:16 +01:00
Itxaka
2e0af77fbc
Use new logger facilities ( #236 )
2024-03-01 12:27:26 +01:00
Mauro Morales
d139550b54
Bump SDK to 0.0.26 ( #238 )
2024-02-29 22:14:45 +01:00
Ettore Di Giacinto
694add86ae
Merge pull request #237 from kairos-io/after-install-hooks
...
fix(after-install): run after-install hook after partitions are encrypted
2024-02-27 17:56:08 +01:00
mudler
958ae9393d
fix(after-install): run after-install hook after partitions are encrypted
2024-02-27 17:28:11 +01:00
Itxaka
2e9c85e63a
Add shim to choose next entry to boot from ( #230 )
2024-02-21 10:44:32 +01:00
Dimitris Karakasilis
cce432133e
Merge pull request #232 from kairos-io/2051-uki-reset
...
Move "recovery" to "active" on reset
2024-02-21 10:27:55 +02:00
Dimitris Karakasilis
ca84f82faa
Mount EFI partition as RW, to rotate recovery -> active on reset
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 18:16:57 +02:00
Dimitris Karakasilis
a635a7ba08
Move "recovery" to "active" on reset
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 17:54:59 +02:00
Dimitris Karakasilis
8c353a9512
Merge pull request #231 from kairos-io/2263-uki-upgrade-recovery
...
Implement uki "kairos-agent upgrade --recovery"
2024-02-20 16:19:52 +02:00
Dimitris Karakasilis
c523f48a17
Remove unecessary method parameter
...
becaues now we have a receiver which already has that field
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 16:07:23 +02:00
Dimitris Karakasilis
88454bdda4
Implement uki "kairos-agent upgrade --recovery"
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-20 13:30:52 +02:00
Dimitris Karakasilis
58c039194f
Merge pull request #229 from kairos-io/2226-detect-boot-state
...
2226 detect boot state
2024-02-19 14:09:37 +02:00
Dimitris Karakasilis
c369187e48
Remove "replace" directive from go.mod
...
and use released tag
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-19 13:43:43 +02:00
Dimitris Karakasilis
78a240d9c5
Handle the filesystem walk error
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-16 17:39:08 +02:00
Mauro Morales
b88d1a70b8
Refactor methods and implement uki upgrade
...
Signed-off-by: Dimitris Karakasilis <dimitris@spectrocloud.com>
2024-02-16 17:37:40 +02:00
Mauro Morales
bf8e2ba3b0
Make copies for active/passive/recovery
...
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-02-15 17:48:21 +01:00
Dimitris Karakasilis
d981656715
Install efi files in uki mode using naming convention
...
replace "artifact" with "active" in conf files and in filenames
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-13 16:12:20 +02:00
Dimitris Karakasilis
75eda111cd
Handle error and extract code to function
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-02-13 11:16:49 +02:00
Itxaka
5f6bb7884f
Adapt uki install to new rootfsbase ( #228 )
2024-02-12 10:35:36 +01:00
Ettore Di Giacinto
bd15303f33
Merge pull request #227 from kairos-io/fix_dir_creation
...
fix: do not try to create a dir
2024-02-09 11:32:05 +01:00
Ettore Di Giacinto
1867523424
Update pkg/uki/install.go
2024-02-09 11:28:48 +01:00
mudler
5bf688b8f9
do not try to create a dir
2024-02-09 11:27:09 +01:00
Ettore Di Giacinto
6933d015e9
Merge pull request #226 from kairos-io/double_mount
...
fix(mount): check if path is mounted and create /run/initramfs/live if doesn't exist
2024-02-09 11:15:34 +01:00
mudler
b8388782b0
fix(mount): check if path is mounted and create /run/initramfs/live if doesn't exist
2024-02-09 11:11:49 +01:00
Mauro Morales
175b163159
Read /system/oem config ( #224 )
...
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-02-08 16:05:34 +01:00
Itxaka
aade2bebb3
Bring uki install up to par with immucore ( #225 )
2024-02-08 15:21:37 +01:00
Mauro Morales
3dbc7c0ce7
Add default system config dir ( #223 )
...
* Add default system config dir
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
* Add elemental dir too
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
---------
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-02-08 12:55:48 +01:00
Itxaka
0119b9cfb2
Fix object dumping ( #222 )
2024-02-05 11:30:24 +01:00
Itxaka
33c8e8f29c
Add reset for uki ( #221 )
2024-02-02 13:20:06 +01:00
Itxaka
7efda3d50e
Bump sdk
...
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-02-01 15:27:00 +01:00
Itxaka
0897a79c25
Remove the proper interactive-install entry by default ( #220 )
2024-01-31 20:58:49 +01:00
Itxaka
9941c786a3
Fix uki upgade path ( #219 )
2024-01-31 19:38:16 +01:00
Itxaka
1a46f0910f
[uki] Wait for oem to appear after encryption ( #216 )
2024-01-30 14:28:54 +01:00
Itxaka
3b5ae90dfe
Set proper partition size based on the source ( #214 )
2024-01-30 10:35:10 +01:00
Itxaka
f6f113128d
Remove entries on install ( #213 )
2024-01-26 17:41:23 +01:00
Itxaka
8696eb16d2
Do not show devices that cant be used ( #212 )
...
during interactive install all devices will appear but some of those are
not desirable as they cannot be used to install.
Skip those in the list
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-01-26 15:09:13 +01:00
renovate[bot]
5014587a3c
fix(deps): update dependency alpinejs to v3.13.5
2024-01-24 23:03:07 +00:00
Itxaka
25aa9cf0cb
Bump kcrypt ( #208 )
2024-01-24 16:44:16 +01:00
renovate[bot]
190fe53d38
fix(deps): update module github.com/nxadm/tail to v1.4.11
2024-01-24 15:21:32 +00:00
renovate[bot]
f9e6641788
fix(deps): update module github.com/distribution/distribution to v2.8.3+incompatible
2024-01-24 13:44:57 +00:00
Ettore Di Giacinto
79a577d0f3
feat(uki-partitioning): respect additional encrypted partition list ( #206 )
2024-01-24 10:48:33 +01:00