Commit Graph

38 Commits

Author SHA1 Message Date
Dimitris Karakasilis
571f10d900 Remove unecessary assignments and add NoFormat to UKI
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:06 +03:00
Dimitris Karakasilis
d8df60c315 Remove development debug output
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:06 +03:00
Dimitris Karakasilis
9df8781d23 Detect the preconfigured device when no-format is true
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:53:05 +03:00
Dimitris Karakasilis
7d9accccd7 [WIP] Try to see which code breaks it
Fixes https://github.com/kairos-io/kairos/issues/2281

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2024-04-09 12:52:12 +03:00
Mauro Morales
8f68b870d3 Bad refactoring, these should be active not cos (#278)
* Bad refactoring, these should be active not cos

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

* State should be called statereset everywhere

autoreset was introduced with UKI but we want parity with GRUB

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

---------

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-29 16:12:23 +01:00
Mauro Morales
69756e3020 Fix bootentry (#277)
* Fix bootentry

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

* Use same naming as in GRUB

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

---------

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-29 12:49:07 +01:00
Itxaka
64b9548049 Add an autoreset entry (#267) 2024-03-22 13:21:58 +01:00
Itxaka
abf92beac8 Bump to use vfs4 (#240) 2024-03-18 11:57:34 +01:00
Mauro Morales
3328a2987f After upgrade or recovery, set bootentry to "cos" (#251) 2024-03-16 16:27:29 +01:00
Itxaka
0c06b1b183 Mount efi partition if not mounted for bootentries (#250) 2024-03-15 14:32:17 +00:00
Itxaka
f6466698fc Fix bootentries grub in opensuse
Signed-off-by: Itxaka <itxaka@kairos.io>
2024-03-15 14:34:37 +01:00
Mauro Morales
027a8800c2 Use existing role names for bootentry command on UKI (#247)
* Use existing role names for bootentry command

Switch from active.conf, passive.conf and recovery.conf to cos, fallback
and recovery respectively

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

* Extended cmdline

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

* Extend tests

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>

---------

Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com>
2024-03-15 09:17:37 +01:00
Itxaka
2e0af77fbc Use new logger facilities (#236) 2024-03-01 12:27:26 +01:00
mudler
958ae9393d fix(after-install): run after-install hook after partitions are encrypted 2024-02-27 17:28:11 +01:00
Itxaka
2e9c85e63a Add shim to choose next entry to boot from (#230) 2024-02-21 10:44:32 +01:00
Itxaka
775756f4b6 Run install off the same command (#196) 2024-01-09 15:10:04 +01:00
Dimitris Karakasilis
f26a517eab remove copyright to SUSE 2023-10-20 10:39:50 +03:00
Denis Luchkin-Zhou
234bb4b36e Add command to render a Go template with config and state as data context
Signed-off-by: Denis Luchkin-Zhou <wyvernzora@gmail.com>
2023-10-18 08:37:45 -07:00
Dimitris Karakasilis
80f83ba676 Run sanitization outside the spec building functions
To limit responsibility or those functions and to keep the tests passing
(because they assumed no sanitization)

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-10-02 10:57:11 +03:00
Dimitris Karakasilis
d1e84c186c Fix minor syntax and linting issues
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-10-02 10:43:18 +03:00
Itxaka
442973526e Track active/passive boot for upgrade workflow (#133)
* Track active/passive boot for upgrade workflow

Track what are we booting from during upgrade in order to not backup
active into passive if we are booting from passive.

If we are booting from active or recovery the workflow keeps as it was,
backup active into passive, and then move the transition image into
active.

Signed-off-by: Itxaka <itxaka@kairos.io>
2023-09-01 15:19:28 +02:00
Itxaka
28dd23c4f4 Adjust size to take into account upgrades (#130) 2023-08-18 12:18:10 +02:00
Itxaka
dffef50ca0 Several improvements for size calculation (#129) 2023-08-17 13:53:45 +02:00
Itxaka
3e9befa230 Add recovery upgrade flag to upgrade command + msg (#123) 2023-08-07 16:11:13 +02:00
Itxaka
26140a46d3 Tests and improve createExtraDirsInRootfs (#111) 2023-08-03 12:16:35 +02:00
Itxaka
f5f3d3f221 Allow creating dirs in rootfs via cc (#109) 2023-08-02 19:11:25 +02:00
Itxaka
3c2697a6ad Fix config loading, install device and call sanitize (#103)
* Fix config loading, install device and call sanitize

Syncs the cfg.install.device to the installspec.target
As on manual-install the device can actually come from a flag and its
not on the cloud-config, we need to initialize the InstallSpec with the
value of the cfg.Install.Device as by that time we already have the
final value of the install target.

Also calls sanitize on config and specs and warns if anything goes wrong

Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>

* Fix platform override and tests

The sanitize method for Config was never called so we never noticed that
its overriding the platform, even if we pass the WithPLatform option.

This patch fixes it by only overriding platform by default on sanitize
if the platform is empty, otherwise leave the platform on it values.

Also fixes the tests to use test facilities and a small fix to not try
to load the platform values form yaml

Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>

* Init the Install in the Config init

Just in case something tries to access it so they dont find a nil

Also adjusts some more tests

Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>

---------

Signed-off-by: Itxaka <itxaka.garcia@spectrocloud.com>
2023-07-25 19:36:01 +02:00
Itxaka
f7bdba2dda Merge elemental config into agent config (#102) 2023-07-25 15:21:34 +02:00
Itxaka
5b945303c9 Drop runconfig in favour of config (#101) 2023-07-25 11:08:27 +02:00
Itxaka
956f86f99c Rework reboot/shutdown to use the hooks (#96) 2023-07-24 12:28:59 +02:00
Itxaka
4bc5ea1cfc Fix oem mountpoint not available on upgrade (#85) 2023-07-19 07:46:30 +00:00
Itxaka
9c5731baa2 Rename go module kairos-agent (#81) 2023-07-10 14:39:48 +02:00
Itxaka
9dd1dbddbe Fix getting lvm recovery (#70) 2023-06-23 14:49:38 +02:00
Dimitris Karakasilis
f225315a5a Use lsblk to detect partitions
like we did here:

https://github.com/kairos-io/kairos-sdk/pull/28/files

because ghw doesn't play well with lvm

Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me>
2023-06-21 10:52:08 +03:00
Itxaka
b126f7ab00 Drop --local flag for image sources (#63) 2023-06-21 09:39:59 +02:00
Dimitris Karakasilis
a113147f8a 1225 config collector elemental (#32)
Co-authored-by: Mauro Morales <mauro.morales@spectrocloud.com>
Co-authored-by: Itxaka <itxaka.garcia@spectrocloud.com>
Co-authored-by: Dimitris Karakasilis <dimitris@spectrocloud.com>
2023-06-07 11:28:37 +02:00
Itxaka
ddfa30a4c6 Drop luet, image extractor, drop build code and multiarch images (#20)
Co-authored-by: Mauro Morales <mauro.morales@spectrocloud.com>
2023-05-16 16:06:49 +02:00
Itxaka
002b8ba51f Bring elemental-cli code into the agent (#13) 2023-05-05 18:43:21 +02:00