Itxaka
8fc921c406
Always umount+mount oem ( #804 )
2025-06-05 16:28:19 +02:00
Itxaka
14e33f375f
Fix mountpoint in grub hook ( #803 )
2025-06-05 09:29:24 +02:00
Itxaka
24f88fa7a4
Fix the hooks order, unmounting and such ( #801 )
...
* Fix the hooks order, unmounting and such
Signed-off-by: Itxaka <itxaka@kairos.io >
* Update internal/agent/hooks/finish.go
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com >
* Update internal/agent/hooks/bundles.go
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com >
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com >
2025-06-04 19:14:54 +02:00
Itxaka
7231150ac8
Fix grub after install hook ( #797 )
2025-06-04 09:25:11 +02:00
Itxaka
a6f34820fb
Revert "Pxe uki ( #791 )" ( #795 )
2025-05-28 12:18:52 +02:00
Itxaka
7842ad8059
Pxe uki ( #791 )
2025-05-23 11:48:26 +02:00
Itxaka
79cd5620c5
Drop kcrypt, use sdk ( #769 )
2025-05-06 09:02:44 +00:00
Itxaka
d0f0710c78
Use grub binaries and libs from rootfs ( #760 )
2025-04-25 10:43:21 +02:00
Itxaka
d83f78047f
Bump sdk ( #733 )
...
* Bump sdk
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
2025-04-02 14:47:05 +02:00
Itxaka
4975b9b914
Bump yip and diskfs ( #717 )
...
* Bump yip and diskfs
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
2025-03-26 11:57:29 +01:00
Itxaka
db703db5e5
Try to fix hooks ( #718 )
...
* fix hooks
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
2025-03-24 16:05:39 +01:00
Itxaka
b5869b4017
Fix hooks under encrypted partitions ( #702 )
...
* Fix hooks under encrypted partitions
We had a mess of mounting and unmounting things around when we try to
copy things to persistent.
Part of the changes (using the by-label to mount the persistent) are due
to the change in kcrypt. As we set the same label to the encrypted fs
and unencrypted fs, our utils.Mount could get mistaken and return the
first hit, which usually its the encrypted one, and we cannot mount that
one.
This patch brings it up to date.
- Makes bundles and logs hooks work when we have encrypted persistent.
It didnt work before.
- Makes both workflows the same.
- Locks everything once its over, to not leave encrypted parts around
- Mounts OEM so kcrypt can read the config if we are using a remote
server for encryption
- Mounts by label so there is not a change of getting the wrong device
- Uses the mount syscall directly. The util can mistake and return the
actual encrypted part if they both have the same label and finds it
first
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
2025-03-13 11:22:26 +01:00
Itxaka
488841ebf2
Use extensions dir path as source ( #660 )
...
Otherwise it will copy the dir itself and we just want to copy the
contents of the dir
Signed-off-by: Itxaka <itxaka@kairos.io >
2025-01-14 10:59:45 +01:00
Itxaka
895e571bb3
Expose pcrs for uki encryption ( #603 )
2024-11-20 10:41:52 +01:00
Itxaka
9ea89f7610
Bump nodepair ( #592 )
...
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-11-07 09:24:24 +01:00
Itxaka
dcad8beac2
Drop those stupid github and vfs deps bumps ( #591 )
2024-11-06 12:50:14 +01:00
Itxaka
e2c3a0e638
Read actual system configs during k8s upgrade ( #579 )
2024-10-16 12:36:19 +02:00
Itxaka
97d25b8993
Check for user+admin validity before actions ( #575 )
2024-10-15 10:47:09 +02:00
Itxaka
a3aadbbaa9
Allow installing with no users ( #574 )
2024-10-10 14:18:59 +02:00
Itxaka
e8bb8cf4ff
Move to use kairos-release ( #567 )
2024-10-07 09:44:05 +00:00
Dimitris Karakasilis
b0b4618f8f
Show sources in config string
...
and remove directory which is only meant to be used by yip configs (not
user configs read by the kairos-agent).
This needs to be explained in the release notes.
Needs this: https://github.com/kairos-io/kairos-sdk/pull/501
Part of: https://github.com/kairos-io/kairos/issues/2737
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-09-26 12:07:59 +03:00
Itxaka
fbb64f2a82
Run tests in parallel and output github formats on workflow ( #543 )
...
* Run tests in parallel and output github formats on workflow
Signed-off-by: Itxaka <itxaka@kairos.io >
* Fix broken parallel tests
We were using a fixed file for the tests which several tests could be
accessing at the same time.
This fixes it by setting a temp random file at the test start
Signed-off-by: Itxaka <itxaka@kairos.io >
* Fix the tests logging to stdout
Signed-off-by: Itxaka <itxaka@kairos.io >
* Drop the verbose
Signed-off-by: Itxaka <itxaka@kairos.io >
* Fix agent test
Signed-off-by: Itxaka <itxaka@kairos.io >
* Let the event consumer create the logfile or whatever
Signed-off-by: Itxaka <itxaka@kairos.io >
* Drop Focus
Signed-off-by: Itxaka <itxaka@kairos.io >
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-09-17 17:51:11 +02:00
Itxaka
3e99d75331
Move to use our ghw clone ( #535 )
2024-09-17 15:27:31 +02:00
Itxaka
419f09160f
Fail if remote url address doesnt exist ( #527 )
2024-09-11 15:57:53 +02:00
Itxaka
17699f4d6e
Display net info on QR code page ( #525 )
2024-09-10 15:50:16 +02:00
Itxaka
8e2c8ebb92
Minimize shelling out ( #439 )
...
Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Co-authored-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-09-10 12:23:15 +02:00
Dimitris Karakasilis
257d0a1c38
Unify --recover and --boot-entry upgrade options in code
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-08-26 16:33:44 +03:00
Dimitris Karakasilis
c589ae1ce3
[WIP] Properly handle single entries in bootentry command
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-08-26 16:32:43 +03:00
Itxaka
02eb9d32a0
Let kcrypt add the allow discards option ( #434 )
2024-07-31 18:00:29 +02:00
Itxaka
0d8d534d5d
Encrypt luks partition with allow-discards ( #423 )
2024-07-29 09:47:03 +02:00
Itxaka
aebc8f6083
Bump kcrypt and adapt hooks ( #385 )
2024-06-20 11:19:29 +02:00
Björn Brauer
54a528a44a
Ensure only numeric part of systemd version is converted to int ( #362 )
2024-06-12 10:08:19 +02:00
Itxaka
91e18dd4b3
Copy extensions to passive as well
...
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-06-10 15:58:44 +02:00
Itxaka
b176b47f56
Copy any found sysextensions into active+passive efi dir ( #372 )
2024-06-07 16:45:50 +02:00
Dimitris Karakasilis
382b1944b3
Move udevadm triggering in kcrypt
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-05-23 16:05:31 +03:00
Itxaka
50c1ebd335
Fix reboot/power off message ( #331 )
...
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-05-13 14:27:47 +00:00
Mauro Morales
c04372868b
Use Overwrites for a payload cloud config ( #320 )
...
Relates to kairos-io/kairos#2492
Signed-off-by: Mauro Morales <mauro.morales@spectrocloud.com >
2024-05-03 18:26:57 +02:00
Itxaka
d1f65cd334
Centralize uki hooks for encryption reasons ( #309 )
2024-04-24 16:42:51 +02:00
Itxaka
1602276133
Add missing hooks to after install uki ( #307 )
2024-04-23 14:37:21 +02:00
Itxaka
59777eeb3e
Rework prepareConfiguration ( #289 )
2024-04-12 10:40:11 +02:00
Dimitris Karakasilis
1f2d8d89fc
Move the Image() filtering to kairos-sdk
...
https://github.com/kairos-io/kairos-sdk/pull/85/files
Fixes: https://github.com/kairos-io/kairos/issues/2440
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-12 09:40:26 +03:00
Itxaka
15a15a1f0c
Keep logs after reset ( #288 )
2024-04-11 11:35:31 +02:00
Dimitris Karakasilis
d8df60c315
Remove development debug output
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-09 12:53:06 +03:00
Dimitris Karakasilis
804462e272
WIP
...
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-09 12:53:04 +03:00
Dimitris Karakasilis
7d9accccd7
[WIP] Try to see which code breaks it
...
Fixes https://github.com/kairos-io/kairos/issues/2281
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-09 12:52:12 +03:00
Dimitris Karakasilis
db0a65cf6e
Return only image (skipping sbom, img, etc)
...
Fixes: https://github.com/kairos-io/kairos/issues/2329
Signed-off-by: Dimitris Karakasilis <dimitris@karakasilis.me >
2024-04-02 17:15:20 +03:00
Itxaka
b1489daff8
Converge all yaml libs into v3 ( #266 )
...
* Converge all yaml libs into v3
Signed-off-by: Itxaka <itxaka@kairos.io >
* go mod tid
Signed-off-by: Itxaka <itxaka@kairos.io >
---------
Signed-off-by: Itxaka <itxaka@kairos.io >
2024-03-20 16:53:42 +01:00
Itxaka
8583d38b68
Retry unlock if we cant find the unlocked partitions ( #241 )
2024-03-19 09:27:13 +01:00
Itxaka
abf92beac8
Bump to use vfs4 ( #240 )
2024-03-18 11:57:34 +01:00
Itxaka
0ae9c04eb4
Make sure kcrypt hook umounts persistent ( #244 )
2024-03-07 15:11:51 +01:00