mirror of
https://github.com/kairos-io/packages.git
synced 2025-05-06 23:16:19 +00:00
Merge branch 'main' into efi_drivers
This commit is contained in:
commit
6f4e3fbd12
.github/workflows
packages
alpine
dracut/immucore
firmware/opensuse
k8s/k3s
static/kairos-overlay-files
collection.yaml
files
system
immucore
kairos-agent
kcrypt-challenger
kcrypt
provider-kairos
systemd
toolchain-go
utils
earthly
edgevpn
goreleaser
helm
k9s
kube-vip
kubectl
nerdctl
operator-sdk
tools/bump-validator
35
.github/workflows/autoapprove.yml
vendored
Normal file
35
.github/workflows/autoapprove.yml
vendored
Normal file
@ -0,0 +1,35 @@
|
||||
name: ci-robbot auto-approve
|
||||
on:
|
||||
- pull_request_target
|
||||
|
||||
permissions:
|
||||
contents: write
|
||||
pull-requests: write
|
||||
packages: read
|
||||
|
||||
jobs:
|
||||
auto-approve:
|
||||
runs-on: ubuntu-latest
|
||||
if: ${{ github.actor == 'ci-robbot' }}
|
||||
steps:
|
||||
- name: Checkout repository
|
||||
uses: actions/checkout@v4
|
||||
|
||||
- name: Approve a PR if not already approved
|
||||
run: |
|
||||
gh pr checkout "$PR_URL"
|
||||
if [ "$(gh pr status --json reviewDecision -q .currentBranch.reviewDecision)" != "APPROVED" ];
|
||||
then
|
||||
gh pr review --approve "$PR_URL"
|
||||
else
|
||||
echo "PR already approved.";
|
||||
fi
|
||||
env:
|
||||
PR_URL: ${{github.event.pull_request.html_url}}
|
||||
GITHUB_TOKEN: ${{secrets.GITHUB_TOKEN}}
|
||||
|
||||
- name: Enable auto-merge for Dependabot PRs
|
||||
run: gh pr merge --auto --squash "$PR_URL"
|
||||
env:
|
||||
PR_URL: ${{github.event.pull_request.html_url}}
|
||||
GITHUB_TOKEN: ${{secrets.GITHUB_TOKEN}}
|
1
.github/workflows/build-arm64.yaml
vendored
1
.github/workflows/build-arm64.yaml
vendored
@ -92,3 +92,4 @@ jobs:
|
||||
REPOSITORY_TYPE: docker
|
||||
createRepo: true
|
||||
pushCache: true
|
||||
revisionSHA: true
|
||||
|
1
.github/workflows/build.yaml
vendored
1
.github/workflows/build.yaml
vendored
@ -83,3 +83,4 @@ jobs:
|
||||
REPOSITORY_TYPE: docker
|
||||
createRepo: true
|
||||
pushCache: true
|
||||
revisionSHA: true
|
||||
|
1
.github/workflows/one.yaml
vendored
1
.github/workflows/one.yaml
vendored
@ -69,3 +69,4 @@ jobs:
|
||||
REPOSITORY_TYPE: docker
|
||||
createRepo: true
|
||||
pushCache: true
|
||||
revisionSHA: true
|
||||
|
16
.github/workflows/pr.yaml
vendored
16
.github/workflows/pr.yaml
vendored
@ -14,13 +14,13 @@ jobs:
|
||||
fetch-depth: 0
|
||||
- name: Get changed files
|
||||
id: changed-files
|
||||
uses: tj-actions/changed-files@v42
|
||||
uses: tj-actions/changed-files@v44
|
||||
with:
|
||||
files: packages/**
|
||||
- name: Set up Go
|
||||
uses: actions/setup-go@v4
|
||||
uses: actions/setup-go@v5
|
||||
with:
|
||||
go-version: 1.21.1
|
||||
go-version-file: tools/bump-validator/go.mod
|
||||
- name: Validate changed packages bump version
|
||||
if: steps.changed-files.outputs.any_changed == 'true'
|
||||
env:
|
||||
@ -44,9 +44,9 @@ jobs:
|
||||
platforms: all
|
||||
- name: Set up Docker Buildx
|
||||
id: buildx
|
||||
uses: docker/setup-buildx-action@v3.0.0
|
||||
uses: docker/setup-buildx-action@v3.3.0
|
||||
- name: Download meta 🔧
|
||||
uses: luet-lab/luet-github-action@v0.1.2
|
||||
uses: luet-lab/luet-github-action@v0.2.1
|
||||
with:
|
||||
FINAL_REPO: quay.io/kairos/packages-arm64
|
||||
REPOSITORY_TYPE: docker
|
||||
@ -54,7 +54,7 @@ jobs:
|
||||
downloadFromList: true
|
||||
downloadMeta: true
|
||||
- name: Build packages 🔧
|
||||
uses: luet-lab/luet-github-action@v0.1.2
|
||||
uses: luet-lab/luet-github-action@v0.2.1
|
||||
with:
|
||||
build: true
|
||||
fromIndex: true
|
||||
@ -78,7 +78,7 @@ jobs:
|
||||
git fetch --prune --unshallow
|
||||
mkdir build
|
||||
- name: Download meta 🔧
|
||||
uses: luet-lab/luet-github-action@v0.1.2
|
||||
uses: luet-lab/luet-github-action@v0.2.1
|
||||
with:
|
||||
FINAL_REPO: quay.io/kairos/packages
|
||||
REPOSITORY_TYPE: docker
|
||||
@ -86,7 +86,7 @@ jobs:
|
||||
downloadFromList: true
|
||||
downloadMeta: true
|
||||
- name: Build packages 🔧
|
||||
uses: luet-lab/luet-github-action@v0.1.2
|
||||
uses: luet-lab/luet-github-action@v0.2.1
|
||||
with:
|
||||
build: true
|
||||
fromIndex: true
|
||||
|
35
.github/workflows/renovate_auto.yml
vendored
Normal file
35
.github/workflows/renovate_auto.yml
vendored
Normal file
@ -0,0 +1,35 @@
|
||||
name: Renovate auto-merge
|
||||
on:
|
||||
- pull_request_target
|
||||
|
||||
permissions:
|
||||
contents: write
|
||||
pull-requests: write
|
||||
packages: read
|
||||
|
||||
jobs:
|
||||
dependabot:
|
||||
runs-on: ubuntu-latest
|
||||
if: ${{ github.actor == 'renovate[bot]' }}
|
||||
steps:
|
||||
- name: Checkout repository
|
||||
uses: actions/checkout@v4
|
||||
|
||||
- name: Approve a PR if not already approved
|
||||
run: |
|
||||
gh pr checkout "$PR_URL"
|
||||
if [ "$(gh pr status --json reviewDecision -q .currentBranch.reviewDecision)" != "APPROVED" ];
|
||||
then
|
||||
gh pr review --approve "$PR_URL"
|
||||
else
|
||||
echo "PR already approved.";
|
||||
fi
|
||||
env:
|
||||
PR_URL: ${{github.event.pull_request.html_url}}
|
||||
GITHUB_TOKEN: ${{secrets.GITHUB_TOKEN}}
|
||||
|
||||
- name: Enable auto-merge for Renovate PRs
|
||||
run: gh pr merge --auto --squash "$PR_URL"
|
||||
env:
|
||||
PR_URL: ${{github.event.pull_request.html_url}}
|
||||
GITHUB_TOKEN: ${{secrets.GITHUB_TOKEN}}
|
@ -1,7 +1,7 @@
|
||||
packages:
|
||||
- name: "alpine"
|
||||
category: "initrd"
|
||||
version: "3.8.1+2"
|
||||
version: "3.8.1+4"
|
||||
description: "Provides custom initrd scripts for alpine"
|
||||
# This syncs with the alpine version at https://gitlab.alpinelinux.org/alpine/mkinitfs/-/blob/master/initramfs-init.in?ref_type=heads
|
||||
# any changes to the initramfs-init.in file should be looked at and backported if necessary
|
@ -1,6 +1,6 @@
|
||||
#!/bin/sh
|
||||
|
||||
VERSION=3.8.1-kairos1
|
||||
VERSION=3.8.1-kairos2
|
||||
INIT=/sbin/init
|
||||
sysroot="$ROOT"/sysroot
|
||||
|
||||
@ -393,19 +393,20 @@ fi
|
||||
# Path for booting from livecd
|
||||
if grep -q cdroot /proc/cmdline ;then
|
||||
rd_break pre-livecd
|
||||
echo "Mounting LiveCD"
|
||||
echo "Mounting Live Media"
|
||||
sync
|
||||
label=$(grep -o CDLABEL.* /proc/cmdline | cut -f 1 -d ' ' | cut -f 2 -d '=' )
|
||||
# Create mountpoints
|
||||
ebegin "Create mountpoints"
|
||||
mkdir -p /media/root-ro /media/root-rw /run/rootfsbase $sysroot/media/root-ro $sysroot/media/root-rw $sysroot/run/rootfsbase
|
||||
eend $?
|
||||
# Between udev starting, we loading the modules and the cdrom appearing sometimes there is a delay, so lets wait a bit here
|
||||
ebegin "Waiting for cdrom to be available"
|
||||
retry 10 test -e /dev/sr0
|
||||
ebegin "Waiting for Live Media to be available"
|
||||
retry 10 test -e /dev/disk/by-label/$label
|
||||
eend
|
||||
# Mount read-only livecd
|
||||
ebegin "Mount LiveCD RO"
|
||||
retry 10 mount /dev/sr0 /media/root-ro
|
||||
ebegin "Mount Live Media RO"
|
||||
retry 10 mount /dev/disk/by-label/$label /media/root-ro
|
||||
eend $?
|
||||
sync
|
||||
# Mount squashfs into loop device
|
||||
|
@ -1,18 +0,0 @@
|
||||
image: "alpine"
|
||||
|
||||
prelude:
|
||||
- apk add git
|
||||
- |
|
||||
PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && \
|
||||
git clone https://github.com/${GITHUB_ORG}/{{ .Values.name }}.git && cd {{.Values.name}} && git checkout v"${PACKAGE_VERSION}"
|
||||
|
||||
steps:
|
||||
- mkdir -p /package/usr/lib/dracut/modules.d
|
||||
- mkdir -p /package/etc/dracut.conf.d/
|
||||
- cp -r {{.Values.name}}/dracut/28immucore /package/usr/lib/dracut/modules.d/28immucore
|
||||
- cp {{.Values.name}}/dracut/*.conf /package/etc/dracut.conf.d/
|
||||
|
||||
env:
|
||||
- GITHUB_ORG={{ ( index .Values.labels "github.owner" ) }}
|
||||
|
||||
package_dir: "/package"
|
@ -1,11 +0,0 @@
|
||||
name: "immucore"
|
||||
category: "dracut"
|
||||
version: "0.1.14"
|
||||
labels:
|
||||
github.repo: "immucore"
|
||||
autobump.revdeps: "true"
|
||||
github.owner: "kairos-io"
|
||||
uri:
|
||||
- https://github.com/kairos-io/kcrypt
|
||||
license: "Apache License v2"
|
||||
description: "Dracut module for immucore"
|
@ -4,7 +4,7 @@ packages:
|
||||
version: "20170419-5.220"
|
||||
- name: "u-boot-rpi64"
|
||||
category: "firmware"
|
||||
version: "2024.01-1.1"
|
||||
version: "2024.04-2.1"
|
||||
labels:
|
||||
autobump.strategy: "custom"
|
||||
autobump.string_replace: '{ "prefix": "" }'
|
||||
@ -16,11 +16,11 @@ packages:
|
||||
# We do assume that checksum is sha256
|
||||
autobump.checksum_hook: |
|
||||
curl -s -L https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/$(curl -s -L https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/repodata/repomd.xml | dasel -r xml 'repomd.data.[0].location.-href') | zstd -d - | dasel -r xml -w json | jq '.metadata.package[] | select(.name=="u-boot-rpiarm64") | select(.arch!="src").checksum."#text"' -r | tail -n1
|
||||
package.version: "2024.01-1.1"
|
||||
package.checksum: "3315453834d23201afc0945fa759742a46671ef972513c5999e951465694c662c910868bf3ab0dbd92297e154e2d0eae477e2aa968b99fdec942c3e67e4b270d"
|
||||
package.version: "2024.04-2.1"
|
||||
package.checksum: "c590b4820a8f325bfe41bc1302ea4066d9de8621bb3718a988f3f1373ff8c503356374f33aca3835832e1336367eb802c94f21d726053304ac88d11a1efd6404"
|
||||
- name: "raspberrypi-firmware"
|
||||
category: "firmware"
|
||||
version: "2023.11.21-1.1"
|
||||
version: "2024.03.27-1.1"
|
||||
labels:
|
||||
autobump.strategy: "custom"
|
||||
autobump.string_replace: '{ "prefix": "" }'
|
||||
@ -32,11 +32,11 @@ packages:
|
||||
# We do assume that checksum is sha256
|
||||
autobump.checksum_hook: |
|
||||
curl -s -L https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/$(curl -s -L https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/repodata/repomd.xml | dasel -r xml 'repomd.data.[0].location.-href') | zstd -d - | dasel -r xml -w json | jq '.metadata.package[] | select(.name=="raspberrypi-firmware") | select(.arch!="src").checksum."#text"' -r | tail -n1
|
||||
package.version: "2023.11.21-1.1"
|
||||
package.checksum: "f21f510b968f8b49ca98250f4985b2d5c5382a6d18fa088272826fe19834287cc5027de2041752b2a9d3c8ea284cc165f882410ebbc5327ae6c3969b91912058"
|
||||
package.version: "2024.03.27-1.1"
|
||||
package.checksum: "b557423675f8aadaa7a48c29e27dcbf2dc8a990fcc13fa7b2839dfc6afe281e54a0326bb881b244f77412d09f93df46a648abd3fb7c85716f2f207b8729e1219"
|
||||
- name: "raspberrypi-firmware-config"
|
||||
category: "firmware"
|
||||
version: "2023.11.21-1.1"
|
||||
version: "2024.03.27-1.1"
|
||||
labels:
|
||||
autobump.strategy: "custom"
|
||||
autobump.string_replace: '{ "prefix": "" }'
|
||||
@ -48,11 +48,11 @@ packages:
|
||||
# We do assume that checksum is sha256
|
||||
autobump.checksum_hook: |
|
||||
curl -s -L https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/$(curl -s -L https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/repodata/repomd.xml | dasel -r xml 'repomd.data.[0].location.-href') | zstd -d - | dasel -r xml -w json | jq '.metadata.package[] | select(.name=="raspberrypi-firmware-config") | select(.arch!="src").checksum."#text"' -r | tail -n1
|
||||
package.version: "2023.11.21-1.1"
|
||||
package.checksum: "022aaea609c6f4503c46a9b72203e60220bd2a9792ca413f55b1e1e6736626781f89ed20a18e33fdafd0ffb0c7bd1a405deae87fb295ab6ef3adb4dd88ece6f1"
|
||||
package.version: "2024.03.27-1.1"
|
||||
package.checksum: "93514ec07d396888f4f09712c8c96258d857dba0321c30dfe827ebeb6887f5904f080a0947e51f269868530ac6a67b9054caf97abd57b12ce3984cc721d58bee"
|
||||
- name: "raspberrypi-firmware-dt"
|
||||
category: "firmware"
|
||||
version: "2023.11.21-2.1"
|
||||
version: "2023.11.21-3.3"
|
||||
labels:
|
||||
autobump.strategy: "custom"
|
||||
autobump.string_replace: '{ "prefix": "" }'
|
||||
@ -64,5 +64,5 @@ packages:
|
||||
# We do assume that checksum is sha256
|
||||
autobump.checksum_hook: |
|
||||
curl -s -L https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/$(curl -s -L https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/repodata/repomd.xml | dasel -r xml 'repomd.data.[0].location.-href') | zstd -d - | dasel -r xml -w json | jq '.metadata.package[] | select(.name=="raspberrypi-firmware-dt") | select(.arch!="src").checksum."#text"' -r | tail -n1
|
||||
package.version: "2023.11.21-2.1"
|
||||
package.checksum: "36539b4b9270139fb313971e8c7851f3015fcc87f5a271f20a0cee92f4ff3f0ceeb620dd847f8e38469d3c216635c0d492bb553e44bfb41b74ea8a83850e51d0"
|
||||
package.version: "2023.11.21-3.3"
|
||||
package.checksum: "efbe401a3e2fdec4fb73d59ebfac9175f933b8e74416cdf5867eae3b04cbb3fff07ba8fa2d0b2782ae607a82df2f465fe210334780cf19d7bc3ca5c90c49811b"
|
||||
|
@ -1,5 +1,5 @@
|
||||
requires:
|
||||
- name: "toolchain-go"
|
||||
- name: "toolchain-go-ubuntu"
|
||||
category: "development"
|
||||
version: ">=0"
|
||||
env:
|
||||
@ -31,18 +31,10 @@ steps:
|
||||
- bash installer.sh agent
|
||||
- rm -rf installer.sh
|
||||
- chmod +x /usr/bin/k3s
|
||||
- TAG=$INSTALL_K3S_VERSION ./fetch-template.sh
|
||||
- mkdir -p /usr/share/config/kairos/k3s/
|
||||
- mv config.toml.tmpl /usr/share/config/kairos/k3s/containerd-config.toml.tmpl
|
||||
- upx -1 /usr/bin/k3s
|
||||
|
||||
includes:
|
||||
- ^/usr/bin/k3s
|
||||
- ^/usr$
|
||||
- ^/usr/share$
|
||||
- ^/usr/share/config$
|
||||
- ^/usr/share/config/kairos$
|
||||
- ^/usr/share/config/kairos/k3s$
|
||||
- ^/usr/share/config/kairos/k3s/containerd-config.toml.tmpl$
|
||||
{{ if eq .Values.name "k3s-openrc" }}
|
||||
- ^/etc/init.d/$
|
||||
- ^/etc/init.d/k3s.*
|
||||
|
@ -1,77 +1,78 @@
|
||||
packages:
|
||||
- name: k3s-openrc
|
||||
category: k8s
|
||||
version: "1.29.0+2"
|
||||
version: "1.29.3"
|
||||
k3s_version: "2"
|
||||
labels:
|
||||
github.owner: "k3s-io"
|
||||
github.repo: "k3s"
|
||||
autobump.sed_script: 's/\+k3s1//g'
|
||||
autobump.skip_if_contains: '["rc"]'
|
||||
uri:
|
||||
- https://github.com/k3s-io/k3s
|
||||
license: "APL-2"
|
||||
description: " Lightweight Kubernetes "
|
||||
|
||||
- name: k3s-openrc
|
||||
category: k8s
|
||||
version: "1.28.5+2"
|
||||
version: "1.28.5+4"
|
||||
k3s_version: "2"
|
||||
labels:
|
||||
github.owner: "k3s-io"
|
||||
github.repo: "k3s"
|
||||
autobump.sed_script: 's/\+k3s1//g'
|
||||
autobump.skip_if_contains: '["rc"]'
|
||||
uri:
|
||||
- https://github.com/k3s-io/k3s
|
||||
license: "APL-2"
|
||||
description: " Lightweight Kubernetes "
|
||||
|
||||
- name: k3s-openrc
|
||||
category: k8s
|
||||
version: "1.27.9+2"
|
||||
version: "1.27.9+4"
|
||||
k3s_version: "2"
|
||||
labels:
|
||||
github.owner: "k3s-io"
|
||||
github.repo: "k3s"
|
||||
autobump.sed_script: 's/\+k3s1//g'
|
||||
autobump.skip_if_contains: '["rc"]'
|
||||
uri:
|
||||
- https://github.com/k3s-io/k3s
|
||||
license: "APL-2"
|
||||
description: " Lightweight Kubernetes "
|
||||
|
||||
- name: k3s-systemd
|
||||
category: k8s
|
||||
version: "1.29.0+2"
|
||||
version: "1.29.3"
|
||||
k3s_version: "2"
|
||||
labels:
|
||||
github.owner: "k3s-io"
|
||||
github.repo: "k3s"
|
||||
autobump.sed_script: 's/\+k3s1//g'
|
||||
autobump.skip_if_contains: '["rc"]'
|
||||
uri:
|
||||
- https://github.com/k3s-io/k3s
|
||||
license: "APL-2"
|
||||
description: " Lightweight Kubernetes "
|
||||
|
||||
- name: k3s-systemd
|
||||
category: k8s
|
||||
version: "1.28.5+2"
|
||||
version: "1.28.5+4"
|
||||
k3s_version: "2"
|
||||
labels:
|
||||
github.owner: "k3s-io"
|
||||
github.repo: "k3s"
|
||||
autobump.sed_script: 's/\+k3s1//g'
|
||||
autobump.skip_if_contains: '["rc"]'
|
||||
uri:
|
||||
- https://github.com/k3s-io/k3s
|
||||
license: "APL-2"
|
||||
description: " Lightweight Kubernetes "
|
||||
|
||||
- name: k3s-systemd
|
||||
category: k8s
|
||||
version: "1.27.9+2"
|
||||
version: "1.27.9+4"
|
||||
k3s_version: "2"
|
||||
labels:
|
||||
github.owner: "k3s-io"
|
||||
github.repo: "k3s"
|
||||
autobump.sed_script: 's/\+k3s1//g'
|
||||
autobump.skip_if_contains: '["rc"]'
|
||||
uri:
|
||||
- https://github.com/k3s-io/k3s
|
||||
license: "APL-2"
|
||||
|
@ -1,43 +0,0 @@
|
||||
#!/bin/bash
|
||||
|
||||
set -e
|
||||
|
||||
if [[ -z $TAG ]]; then
|
||||
echo "TAG should be set"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
cleanup() {
|
||||
echo "Cleaning up..."
|
||||
rm -rf "$tmp_dir"
|
||||
}
|
||||
trap cleanup EXIT
|
||||
|
||||
SCRIPT_DIR=$( cd -- "$( dirname -- "${BASH_SOURCE[0]}" )" &> /dev/null && pwd )
|
||||
|
||||
TMPDIR=$(mktemp -d)
|
||||
cd $TMPDIR
|
||||
echo $TMPDIR
|
||||
|
||||
git clone --depth 1 --branch $TAG https://github.com/k3s-io/k3s.git
|
||||
cd $TMPDIR/k3s
|
||||
|
||||
cat << EOF > main.go
|
||||
package main
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
|
||||
"github.com/k3s-io/k3s/pkg/agent/templates"
|
||||
)
|
||||
|
||||
func main() {
|
||||
fmt.Printf(templates.ContainerdConfigTemplate)
|
||||
}
|
||||
EOF
|
||||
|
||||
go run . > $SCRIPT_DIR/config.toml.tmpl
|
||||
|
||||
sed -i '/runc.options/a\
|
||||
NoPivotRoot = true
|
||||
' $SCRIPT_DIR/config.toml.tmpl
|
@ -1,4 +1,4 @@
|
||||
packages:
|
||||
- name: "kairos-overlay-files"
|
||||
category: "static"
|
||||
version: "1.1.29"
|
||||
version: "1.1.32"
|
||||
|
@ -1,11 +1,11 @@
|
||||
menuentry "Kairos remote recovery" --id remoterecovery {
|
||||
if search.file /cOS/recovery.squashfs ; then
|
||||
search --no-floppy --label --set=root COS_RECOVERY
|
||||
if [ test -s /cOS/recovery.squashfs ]; then
|
||||
set img=/cOS/recovery.squashfs
|
||||
set recoverylabel=COS_RECOVERY
|
||||
else
|
||||
set img=/cOS/recovery.img
|
||||
fi
|
||||
search.fs_label COS_RECOVERY root
|
||||
set label=COS_SYSTEM
|
||||
loopback loop0 /$img
|
||||
set root=($root)
|
||||
@ -15,13 +15,13 @@ menuentry "Kairos remote recovery" --id remoterecovery {
|
||||
}
|
||||
|
||||
menuentry "Kairos state reset (auto)" --id statereset {
|
||||
if search.file /cOS/recovery.squashfs ; then
|
||||
search --no-floppy --label --set=root COS_RECOVERY
|
||||
if [ test -s /cOS/recovery.squashfs ]; then
|
||||
set img=/cOS/recovery.squashfs
|
||||
set recoverylabel=COS_RECOVERY
|
||||
else
|
||||
set img=/cOS/recovery.img
|
||||
fi
|
||||
search.fs_label COS_RECOVERY root
|
||||
set label=COS_SYSTEM
|
||||
loopback loop0 /$img
|
||||
set root=($root)
|
||||
|
@ -8,7 +8,7 @@
|
||||
name: "Rootfs Layout Settings for UKI"
|
||||
stages:
|
||||
rootfs:
|
||||
- if: '[ -e "/run/cos/uki_boot_mode" ] && [ ! -e "/run/cos/recovery_mode" ]'
|
||||
- if: '[ -e "/run/cos/uki_boot_mode" ] && [ ! -e "/run/cos/recovery_mode" ] && [ ! -e "/run/cos/autoreset_mode" ]'
|
||||
name: "Layout configuration for UKI boot"
|
||||
environment_file: /run/cos/cos-layout.env
|
||||
environment:
|
||||
@ -46,9 +46,9 @@ stages:
|
||||
/var/lib/wicked
|
||||
/var/log
|
||||
/var/snap
|
||||
- if: '[ -e "/run/cos/uki_boot_mode" ] && [ -e "/run/cos/recovery_mode" ]'
|
||||
# omit the persistent partition on recovery mode
|
||||
name: "Layout configuration for recovery mode on UKI"
|
||||
- if: '[ -e "/run/cos/uki_boot_mode" ] && ([ -e "/run/cos/recovery_mode" ] || [ -e "/run/cos/autoreset_mode" ])'
|
||||
# omit the persistent partition on recovery mode/autoreset
|
||||
name: "Layout configuration for recovery/autoreset mode on UKI"
|
||||
environment_file: /run/cos/cos-layout.env
|
||||
environment:
|
||||
OVERLAY: "tmpfs:25%"
|
||||
|
@ -3,7 +3,7 @@ stages:
|
||||
initramfs:
|
||||
- name: "Starts kairos-reset for systemd based systems"
|
||||
if: |
|
||||
grep -q "kairos.reset" /proc/cmdline && \
|
||||
(grep -q "kairos.reset" /proc/cmdline || [ -f /run/cos/autoreset_mode ]) && \
|
||||
( [ -e "/sbin/systemctl" ] || [ -e "/usr/bin/systemctl" ] || [ -e "/usr/sbin/systemctl" ] || [ -e "/usr/bin/systemctl" ] )
|
||||
commands:
|
||||
- systemctl disable getty@tty1
|
||||
@ -14,4 +14,4 @@ stages:
|
||||
if: grep -q "kairos.reset" /proc/cmdline && [ -f "/sbin/openrc" ]
|
||||
commands:
|
||||
- sed -i -e 's/tty1.*//g' /etc/inittab
|
||||
- echo "tty1::respawn:/usr/bin/kairos-agent reset tty1" >> /etc/inittab
|
||||
- echo "tty1::respawn:/usr/bin/kairos-agent reset --unattended --reboot tty1" >> /etc/inittab
|
||||
|
@ -1,7 +0,0 @@
|
||||
name: "k3s configuration"
|
||||
stages:
|
||||
boot:
|
||||
- if: '[ ! -f "/run/cos/recovery_mode" ] && [ ! -e "/run/cos/uki_install_mode" ] && [[ $(source /etc/os-release; echo "$KAIROS_VARIANT") == "standard" ]]'
|
||||
commands:
|
||||
- mkdir -p /var/lib/rancher/k3s/agent/etc/containerd
|
||||
- cp /usr/share/config/kairos/k3s/containerd-config.toml.tmpl /var/lib/rancher/k3s/agent/etc/containerd/config.toml.tmpl
|
@ -2,7 +2,7 @@
|
||||
requires:
|
||||
- name: "toolchain-go-ubuntu"
|
||||
category: "fips"
|
||||
version: ">=0"
|
||||
version: ">=1.19.10+1"
|
||||
{{else}}
|
||||
requires:
|
||||
- name: "toolchain-go-ubuntu"
|
||||
@ -34,5 +34,11 @@ steps:
|
||||
{{if or (eq .Values.category "fips") (eq .Values.category "fips-static")}}
|
||||
- /usr/bin/{{.Values.name}} version | grep -i boringcrypto
|
||||
{{end}}
|
||||
- mkdir -p /usr/lib/dracut/modules.d
|
||||
- mkdir -p /etc/dracut.conf.d/
|
||||
- cp -r go/src/github.com/${GITHUB_ORG}/{{.Values.name}}/dracut/28immucore /usr/lib/dracut/modules.d/28immucore
|
||||
- cp go/src/github.com/${GITHUB_ORG}/{{.Values.name}}/dracut/10-immucore.conf /etc/dracut.conf.d/10-immucore.conf
|
||||
includes:
|
||||
- /usr/bin/{{.Values.name}}
|
||||
- /usr/lib/dracut/modules.d/28immucore
|
||||
- /etc/dracut.conf.d/10-immucore.conf
|
||||
|
@ -1,7 +1,18 @@
|
||||
packages:
|
||||
- name: "immucore"
|
||||
category: "system"
|
||||
version: "0.1.14"
|
||||
version: "0.1.25"
|
||||
labels:
|
||||
github.repo: "immucore"
|
||||
autobump.revdeps: "true"
|
||||
github.owner: "kairos-io"
|
||||
uri:
|
||||
- https://github.com/kairos-io/immucore
|
||||
license: "Apache License v2"
|
||||
description: "The Kairos immutability management interface"
|
||||
- name: "immucore"
|
||||
category: "system"
|
||||
version: "0.1.17-3"
|
||||
labels:
|
||||
github.repo: "immucore"
|
||||
autobump.revdeps: "true"
|
||||
@ -12,7 +23,7 @@ packages:
|
||||
description: "The Kairos immutability management interface"
|
||||
- name: "immucore"
|
||||
category: "fips"
|
||||
version: "0.1.14"
|
||||
version: "0.1.25"
|
||||
labels:
|
||||
github.repo: "immucore"
|
||||
autobump.revdeps: "true"
|
||||
@ -21,16 +32,3 @@ packages:
|
||||
- https://github.com/kairos-io/immucore
|
||||
license: "Apache License v2"
|
||||
description: "The Kairos immutability management interface"
|
||||
# doesnt build so disable for now
|
||||
#- name: "immucore"
|
||||
#category: "fips-static"
|
||||
#ldflags: "-linkmode external -extldflags -static"
|
||||
#version: "0.1.6"
|
||||
#labels:
|
||||
# github.repo: "immucore"
|
||||
# autobump.revdeps: "true"
|
||||
# github.owner: "kairos-io"
|
||||
#uri:
|
||||
# - https://github.com/kairos-io/immucore
|
||||
#license: "Apache License v2"
|
||||
#description: "The Kairos immutability management interface"
|
||||
|
@ -15,39 +15,27 @@ prelude:
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && cd /go/src/github.com/${GITHUB_ORG}/ && git clone --branch v${PACKAGE_VERSION} https://github.com/${GITHUB_ORG}/{{ .Values.name }}.git
|
||||
env:
|
||||
- GITHUB_ORG={{ ( index .Values.labels "github.owner" ) }}
|
||||
- HUGO_VERSION=0.110.0
|
||||
- HUGO_VERSION=0.113.0
|
||||
- LDFLAGS="-s -w -X github.com/kairos-io/kairos-agent/v2/internal/common.VERSION=v${PACKAGE_VERSION} {{with .Values.ldflags}}{{.}}{{end}}"
|
||||
{{if or (eq .Values.category "fips") (eq .Values.category "fips-static")}}
|
||||
- CGO_ENABLED=1
|
||||
- GOEXPERIMENT=boringcrypto
|
||||
# Because we don't track the compiled-with version on the agent we need to keep the symbols in order to checks FIPS compliance
|
||||
- LDFLAGS="-w -X github.com/kairos-io/kairos-agent/v2/internal/common.VERSION=v${PACKAGE_VERSION} {{with .Values.ldflags}}{{.}}{{end}}"
|
||||
{{else}}
|
||||
- CGO_ENABLED=0
|
||||
- LDFLAGS="-s -w -X github.com/kairos-io/kairos-agent/v2/internal/common.VERSION=v${PACKAGE_VERSION} {{with .Values.ldflags}}{{.}}{{end}}"
|
||||
{{end}}
|
||||
copy:
|
||||
- package:
|
||||
category: "static"
|
||||
name: "kairos-docs"
|
||||
version: ">=0"
|
||||
source: "/usr/share/doc/kairos"
|
||||
destination: "/kairos-docs/"
|
||||
steps:
|
||||
# Docs for webui, copy them from the package
|
||||
- mkdir -p /go/src/github.com/${GITHUB_ORG}/{{ .Values.name }}/internal/webui/public/local
|
||||
- cp -r /kairos-docs/* /go/src/github.com/${GITHUB_ORG}/{{ .Values.name }}/internal/webui/public/local/
|
||||
# Deps for webui
|
||||
# Deps for webui
|
||||
- cd /go/src/github.com/${GITHUB_ORG}/{{ .Values.name }}/internal/webui/public && npm install
|
||||
# Now for the real binary with everything bundled!
|
||||
steps:
|
||||
- |
|
||||
PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && \
|
||||
cd /go/src/github.com/${GITHUB_ORG}/{{ .Values.name }}/ && \
|
||||
go build -ldflags="${LDFLAGS}" -o /usr/bin/{{ .Values.name }}
|
||||
- upx -1 /usr/bin/{{.Values.name}}
|
||||
- chmod +x /usr/bin/{{.Values.name}}
|
||||
{{if or (eq .Values.category "fips") (eq .Values.category "fips-static")}}
|
||||
{{ if .Values.arch }}
|
||||
{{ if eq .Values.arch "amd64" }}
|
||||
- go tool nm /usr/bin/{{.Values.name}} | grep -i "FIPS_mode"
|
||||
- /usr/bin/{{.Values.name}} version --long | grep -i "boringcrypto"
|
||||
{{end}}
|
||||
{{end}}
|
||||
{{end}}
|
||||
|
@ -1,7 +1,7 @@
|
||||
packages:
|
||||
- name: "kairos-agent"
|
||||
category: "system"
|
||||
version: "2.7.13"
|
||||
version: "2.9.1"
|
||||
labels:
|
||||
github.repo: "kairos-agent"
|
||||
autobump.revdeps: "true"
|
||||
@ -12,7 +12,7 @@ packages:
|
||||
description: "Lifecycle agent for kairos"
|
||||
- name: "kairos-agent"
|
||||
category: "fips"
|
||||
version: "2.7.13"
|
||||
version: "2.9.1"
|
||||
labels:
|
||||
github.repo: "kairos-agent"
|
||||
autobump.revdeps: "true"
|
||||
|
@ -10,15 +10,9 @@ requires:
|
||||
version: ">=0"
|
||||
{{end}}
|
||||
prelude:
|
||||
{{if or (eq .Values.category "fips") (eq .Values.category "fips-static")}}
|
||||
- apt-get update && apt-get install -y gcc
|
||||
{{end}}
|
||||
- mkdir go/src/github.com/${GITHUB_ORG}/ -p
|
||||
- apt-get update && apt-get install -y gcc libssl-dev
|
||||
- mkdir go/src/github.com/${GITHUB_ORG}/ -p
|
||||
- cd go/src/github.com/${GITHUB_ORG}/ && git clone https://github.com/${GITHUB_ORG}/{{ .Values.name }}.git
|
||||
{{ if ne .Values.live "yes" }}
|
||||
- cd go/src/github.com/${GITHUB_ORG}/ && git checkout 3912abcec424521725ccd335181f2fde90510081 -b build
|
||||
{{ end }}
|
||||
env:
|
||||
- GOPATH=/luetbuild/go/
|
||||
- DEBIAN_FRONTEND=noninteractive
|
||||
@ -27,22 +21,25 @@ env:
|
||||
{{if or (eq .Values.category "fips") (eq .Values.category "fips-static")}}
|
||||
- CGO_ENABLED=1
|
||||
- GOEXPERIMENT=boringcrypto
|
||||
- LDFLAGS="-w {{with .Values.ldflags}}{{.}}{{end}}"
|
||||
{{else}}
|
||||
- CGO_ENABLED=0
|
||||
- LDFLAGS="-s -w {{with .Values.ldflags}}{{.}}{{end}}"
|
||||
{{end}}
|
||||
|
||||
steps:
|
||||
- |
|
||||
PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && \
|
||||
mkdir -p /system/discovery && \
|
||||
cd go/src/github.com/${GITHUB_ORG}/{{ .Values.name }}/ && go build -ldflags="{{with .Values.ldflags}}{{.}}{{end}}" -o {{ .Values.binary_name }} ./cmd/discovery/main.go && mv {{ .Values.binary_name }} /system/discovery
|
||||
- chmod +x /system/discovery/{{ .Values.binary_name }}
|
||||
cd go/src/github.com/${GITHUB_ORG}/{{ .Values.name }}/ && go build -ldflags="${LDFLAGS}" -o {{ .Values.binary_name }} ./cmd/discovery/main.go && mv {{ .Values.binary_name }} /system/discovery
|
||||
{{if or (eq .Values.category "fips") (eq .Values.category "fips-static")}}
|
||||
{{ if .Values.arch }}
|
||||
{{ if eq .Values.arch "amd64" }}
|
||||
- go tool nm /system/discovery/{{ .Values.binary_name }} | grep -i "FIPS_mode"
|
||||
{{end}}
|
||||
{{end}}
|
||||
- upx -1 /system/discovery/{{ .Values.binary_name }}
|
||||
- chmod +x /system/discovery/{{ .Values.binary_name }}
|
||||
{{end}}
|
||||
includes:
|
||||
- /system/discovery/{{ .Values.binary_name }}
|
||||
|
@ -2,8 +2,7 @@ packages:
|
||||
- name: kcrypt-challenger
|
||||
binary_name: kcrypt-discovery-challenger
|
||||
category: system
|
||||
live: "yes"
|
||||
version: "0.7.0"
|
||||
version: "0.8.0"
|
||||
labels:
|
||||
github.repo: "kcrypt-challenger"
|
||||
github.owner: "kairos-io"
|
||||
@ -14,8 +13,7 @@ packages:
|
||||
- name: kcrypt-challenger
|
||||
binary_name: kcrypt-discovery-challenger
|
||||
category: fips
|
||||
live: "yes"
|
||||
version: "0.7.0"
|
||||
version: "0.8.0"
|
||||
labels:
|
||||
github.repo: "kcrypt-challenger"
|
||||
github.owner: "kairos-io"
|
||||
@ -23,16 +21,3 @@ packages:
|
||||
- https://github.com/kairos-io/kcrypt-challenger
|
||||
license: "Apache License v2"
|
||||
description: "Cloud native guardian for persistent data in the edge"
|
||||
#- name: kcrypt-challenger
|
||||
#binary_name: kcrypt-discovery-challenger
|
||||
#ldflags: "-linkmode external -extldflags -static"
|
||||
#category: fips-static
|
||||
#live: "yes"
|
||||
#version: "0.5.0"
|
||||
#labels:
|
||||
#github.repo: "kcrypt-challenger"
|
||||
#github.owner: "kairos-io"
|
||||
#uri:
|
||||
#- https://github.com/kairos-io/kcrypt-challenger
|
||||
#license: "Apache License v2"
|
||||
#description: "Cloud native guardian for persistent data in the edge"
|
||||
|
@ -30,7 +30,6 @@ steps:
|
||||
- |
|
||||
PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && \
|
||||
cd go/src/github.com/${GITHUB_ORG}/{{ .Values.name }}/ && git checkout v"${PACKAGE_VERSION}" -b build && go build -ldflags="${LDFLAGS}" && mv {{.Values.name}} /usr/bin/
|
||||
- chmod +x /usr/bin/{{.Values.name}}
|
||||
{{if or (eq .Values.category "fips") (eq .Values.category "fips-static")}}
|
||||
{{ if .Values.arch }}
|
||||
{{ if eq .Values.arch "amd64" }}
|
||||
@ -38,5 +37,7 @@ steps:
|
||||
{{end}}
|
||||
{{end}}
|
||||
{{end}}
|
||||
- upx -1 /usr/bin/{{.Values.name}}
|
||||
- chmod +x /usr/bin/{{.Values.name}}
|
||||
includes:
|
||||
- /usr/bin/{{.Values.name}}
|
||||
|
@ -12,7 +12,7 @@ packages:
|
||||
description: "Cloud native guardian for persistent data in the edge"
|
||||
- name: kcrypt
|
||||
category: fips
|
||||
version: "0.9.1"
|
||||
version: "0.10.0"
|
||||
labels:
|
||||
github.repo: "kcrypt"
|
||||
autobump.revdeps: "true"
|
||||
|
@ -1,10 +1,13 @@
|
||||
image: golang:1.20
|
||||
requires:
|
||||
- name: "toolchain-go-ubuntu"
|
||||
category: "development"
|
||||
version: ">=0"
|
||||
env:
|
||||
- CGO_ENABLED=0
|
||||
- LDFLAGS="-s -w -X 'github.com/kairos-io/provider-kairos/v2/internal/cli.VERSION={{ .Values.version }}'"
|
||||
- PACKAGE_VERSION={{ .Values.tag }}
|
||||
- LDFLAGS="-s -w -X 'github.com/kairos-io/provider-kairos/v2/internal/cli.VERSION={{ .Values.tag }}'"
|
||||
prelude:
|
||||
- apt-get update
|
||||
- apt-get install -y git
|
||||
- apt-get update && apt-get install -y git
|
||||
- git clone https://github.com/kairos-io/provider-kairos
|
||||
- |
|
||||
PACKAGE_VERSION=${PACKAGE_VERSION%\-*} && \
|
||||
@ -13,6 +16,7 @@ steps:
|
||||
- mkdir -p /system/providers
|
||||
- cd provider-kairos && go build -ldflags "${LDFLAGS}" -o agent-provider-kairos
|
||||
- mv provider-kairos/agent-provider-kairos /system/providers/agent-provider-kairos
|
||||
- upx -1 /system/providers/agent-provider-kairos
|
||||
- ln -s /system/providers/agent-provider-kairos /usr/bin/kairos
|
||||
|
||||
includes:
|
||||
|
@ -1,7 +1,8 @@
|
||||
packages:
|
||||
- name: "provider-kairos"
|
||||
category: "system"
|
||||
version: "2.6.3"
|
||||
version: "2.6.4"
|
||||
tag: "2.6.4"
|
||||
labels:
|
||||
github.repo: "provider-kairos"
|
||||
github.owner: "kairos-io"
|
||||
|
@ -36,7 +36,7 @@ prelude:
|
||||
- zypper ref && zypper in -y gcc13 git ninja gperf libpcap libpcap-devel libcap-devel cmake libmount-devel rsync diffutils openssl-devel tpm2-* python311-pip python311-cryptography
|
||||
- update-alternatives --install /usr/bin/python3 python3 /usr/bin/python3.11 1
|
||||
- mkdir -p src/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && cd src/ && git clone --branch v${PACKAGE_VERSION} https://github.com/systemd/systemd.git
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\-*} && cd src/ && git clone --branch v${PACKAGE_VERSION} https://github.com/systemd/systemd.git
|
||||
|
||||
steps:
|
||||
# Minimal systemd build, remove almost everything, we only interested in the efi boot files
|
||||
@ -49,7 +49,7 @@ steps:
|
||||
- pip3 install -r ukify-requirements.txt
|
||||
# install dev tools
|
||||
- pip3 install meson ninja2
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && cd src/systemd && env CC=gcc-13 meson setup build -Dmode=release -Dbootloader=true -Defi=true -Dukify=true -Dblkid=true -Dopenssl=true -Dshared-lib-tag=${PACKAGE_VERSION}-kairos -Dsbat-distro="Kairos" -Dsbat-distro-url="kairos.io" -Dsbat-distro-summary="Kairos" -Dsbat-distro-version="kairos-${PACKAGE_VERSION}" -Ddns-servers='' -Dsysvinit-path= -Dsysvrcnd-path= -Dtpm=false -Dinstall-tests=false -Dnss-resolve=disabled -Dlogind=false -Dcoredump=false -Dhomed=disabled -Dfirstboot=false -Dhostnamed=false -Dhibernate=false -Dinitrd=false -Dimportd=false -Dkernel-install=false -Dlocaled=false -Dmachined=false -Dnetworkd=false -Dnss-myhostname=false -Dnss-mymachines=false -Dnss-systemd=false -Doomd=false -Dportabled=false -Dhwdb=false -Dpstore=false -Dquotacheck=false -Drandomseed=false -Drepart=false -Dresolve=false -Drfkill=false -Dsysext=false -Danalyze=false -Dsysupdate=false -Dsysusers=false -Dstoragetm=false -Dtimedated=false -Dtimesyncd=false -Dtmpfiles=false -Duserdb=false -Dvconsole=false -Dxdg-autostart=false -Didn=false -Dpolkit=false -Dnscd=false -Dkmod=false -Ddbus=false -Dglib=false -Dbacklight=false -Dldconfig=false -Dgshadow=false -Dwheel-group=false -Dadm-group=false -Dxkbcommon=false -Dzstd=false -Dlz4=false -Dutmp=false -Dlink-udev-shared=false -Dlink-systemctl-shared=false -Dlink-networkd-shared=false -Dlink-timesyncd-shared=false -Dlink-journalctl-shared=false -Dlink-boot-shared=false -Dlink-portabled-shared=false -Denvironment-d=false -Dqrencode=false -Dpwquality=false -Dlibcurl=false -Dfdisk=false -Dlibidn2=false -Dlibiptc=false -Ddns-over-tls=false -Didn=false -Dgnutls=false -Dp11kit=false -Dlibidn=false -Dlibidn2=false -Dgcrypt=false -Dxz=false -Dzlib=false -Dbzip2=false
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\-*} && cd src/systemd && env CC=gcc-13 meson setup build -Dmode=release -Dbootloader=true -Defi=true -Dukify=true -Dblkid=true -Dopenssl=true -Dshared-lib-tag=${PACKAGE_VERSION}-kairos -Dsbat-distro="Kairos" -Dsbat-distro-url="kairos.io" -Dsbat-distro-summary="Kairos" -Dsbat-distro-version="kairos-${PACKAGE_VERSION}" -Ddns-servers='' -Dsysvinit-path= -Dsysvrcnd-path= -Dtpm=false -Dinstall-tests=false -Dnss-resolve=disabled -Dlogind=false -Dcoredump=false -Dhomed=disabled -Dfirstboot=false -Dhostnamed=false -Dhibernate=false -Dinitrd=false -Dimportd=false -Dkernel-install=false -Dlocaled=false -Dmachined=false -Dnetworkd=false -Dnss-myhostname=false -Dnss-mymachines=false -Dnss-systemd=false -Doomd=false -Dportabled=false -Dhwdb=false -Dpstore=false -Dquotacheck=false -Drandomseed=false -Drepart=false -Dresolve=false -Drfkill=false -Dsysext=false -Danalyze=false -Dsysupdate=false -Dsysusers=false -Dstoragetm=false -Dtimedated=false -Dtimesyncd=false -Dtmpfiles=false -Duserdb=false -Dvconsole=false -Dxdg-autostart=false -Didn=false -Dpolkit=false -Dnscd=false -Dkmod=false -Ddbus=false -Dglib=false -Dbacklight=false -Dldconfig=false -Dgshadow=false -Dwheel-group=false -Dadm-group=false -Dxkbcommon=false -Dzstd=false -Dlz4=false -Dutmp=false -Dlink-udev-shared=false -Dlink-systemctl-shared=false -Dlink-networkd-shared=false -Dlink-timesyncd-shared=false -Dlink-journalctl-shared=false -Dlink-boot-shared=false -Dlink-portabled-shared=false -Denvironment-d=false -Dqrencode=false -Dpwquality=false -Dlibcurl=false -Dfdisk=false -Dlibidn2=false -Dlibiptc=false -Ddns-over-tls=false -Didn=false -Dgnutls=false -Dp11kit=false -Dlibidn=false -Dlibidn2=false -Dgcrypt=false -Dxz=false -Dzlib=false -Dbzip2=false
|
||||
- cd src/systemd && ninja -C build
|
||||
- mkdir -p /package/usr/kairos/
|
||||
- mkdir -p /package/usr/lib/systemd/
|
||||
@ -62,10 +62,10 @@ steps:
|
||||
- cp src/systemd/build/systemd-measure /package/usr/lib64/systemd/
|
||||
- cp src/systemd/build/systemd-measure /package/lib/
|
||||
- cp src/systemd/build/systemd-measure /package/lib64/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && cp src/systemd/build/src/shared/libsystemd-shared-${PACKAGE_VERSION}-kairos.so /package/usr/lib/systemd/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && cp src/systemd/build/src/shared/libsystemd-shared-${PACKAGE_VERSION}-kairos.so /package/usr/lib64/systemd/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && cp src/systemd/build/src/shared/libsystemd-shared-${PACKAGE_VERSION}-kairos.so /package/lib/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && cp src/systemd/build/src/shared/libsystemd-shared-${PACKAGE_VERSION}-kairos.so /package/lib64/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\-*} && cp src/systemd/build/src/shared/libsystemd-shared-${PACKAGE_VERSION}-kairos.so /package/usr/lib/systemd/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\-*} && cp src/systemd/build/src/shared/libsystemd-shared-${PACKAGE_VERSION}-kairos.so /package/usr/lib64/systemd/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\-*} && cp src/systemd/build/src/shared/libsystemd-shared-${PACKAGE_VERSION}-kairos.so /package/lib/
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\-*} && cp src/systemd/build/src/shared/libsystemd-shared-${PACKAGE_VERSION}-kairos.so /package/lib64/
|
||||
# ukify is copied in two places according to upstream, I guess to maintain backwards compatibility
|
||||
- src/systemd/build/ukify --version
|
||||
- cp src/systemd/build/ukify /package/usr/bin/
|
||||
|
@ -1,14 +1,14 @@
|
||||
packages:
|
||||
- name: "systemd-boot"
|
||||
category: "system"
|
||||
version: "255+6"
|
||||
version: "255-6"
|
||||
labels:
|
||||
github.repo: "systemd"
|
||||
autobump.revdeps: "true"
|
||||
github.owner: "systemd"
|
||||
- name: "systemd-ukify"
|
||||
category: "system"
|
||||
version: "255+3"
|
||||
version: "255-5"
|
||||
labels:
|
||||
github.repo: "systemd"
|
||||
autobump.revdeps: "true"
|
||||
|
@ -1,11 +1,22 @@
|
||||
{{ if .Values.variant }}
|
||||
image: "golang:{{.Values.version}}-{{.Values.variant}}"
|
||||
image: "golang:{{.Values.tag}}-{{.Values.variant}}"
|
||||
{{ else }}
|
||||
image: "golang:{{.Values.version}}"
|
||||
image: "golang:{{.Values.tag}}"
|
||||
{{ end }}
|
||||
|
||||
{{ if eq .Values.variant "alpine" }}
|
||||
prelude:
|
||||
{{ if eq .Values.variant "alpine" }}
|
||||
- apk update
|
||||
- apk add curl make git bash
|
||||
{{ end }}
|
||||
{{ if eq .Values.variant "bookworm" }}
|
||||
- apt-get update && apt-get install -y curl xz-utils
|
||||
- curl -LO https://github.com/upx/upx/releases/download/v4.2.2/upx-4.2.2-{{ .Values.arch }}_linux.tar.xz
|
||||
- tar -xvf upx-4.2.2-{{ .Values.arch }}_linux.tar.xz
|
||||
- mv upx-4.2.2-{{ .Values.arch }}_linux/upx /usr/bin/
|
||||
- rm -rf upx-4.2.2-{{ .Values.arch }}_linux
|
||||
- chmod +x /usr/bin/upx
|
||||
{{ end }}
|
||||
{{ if eq .Values.variant "bullseye" }}
|
||||
- apt-get update && apt-get install -y curl xz-utils upx
|
||||
{{ end }}
|
@ -2,7 +2,8 @@ packages:
|
||||
- name: toolchain-go
|
||||
category: development
|
||||
variant: "alpine"
|
||||
version: "1.21.6"
|
||||
version: "1.22.2"
|
||||
tag: "1.21.6"
|
||||
hidden: true
|
||||
labels:
|
||||
autobump.revdeps: "false"
|
||||
@ -13,11 +14,12 @@ packages:
|
||||
curl -s -L "https://go.dev/dl/?mode=json" |jq -r '.[0].version'| sed 's/go//g'
|
||||
autobump.version_hook: |
|
||||
curl -s -L "https://go.dev/dl/?mode=json" |jq -r '.[0].version'| sed 's/go//g'
|
||||
package.version: "1.21.6"
|
||||
package.version: "1.22.2"
|
||||
- name: toolchain-go-ubuntu
|
||||
variant: ""
|
||||
variant: "bookworm"
|
||||
category: development
|
||||
version: "1.21.6"
|
||||
version: "1.22.2"
|
||||
tag: "1.21.7"
|
||||
hidden: true
|
||||
labels:
|
||||
autobump.revdeps: "false"
|
||||
@ -28,11 +30,12 @@ packages:
|
||||
curl -s -L "https://go.dev/dl/?mode=json" |jq -r '.[0].version'| sed 's/go//g'
|
||||
autobump.version_hook: |
|
||||
curl -s -L "https://go.dev/dl/?mode=json" |jq -r '.[0].version'| sed 's/go//g'
|
||||
package.version: "1.21.6"
|
||||
package.version: "1.22.2"
|
||||
- name: toolchain-go
|
||||
category: development
|
||||
variant: "alpine"
|
||||
version: "1.20.2"
|
||||
tag: "1.20.2"
|
||||
hidden: true
|
||||
labels:
|
||||
autobump.revdeps: "false"
|
||||
@ -44,9 +47,10 @@ packages:
|
||||
autobump.version_hook: |
|
||||
curl -s -L "https://go.dev/dl/?mode=json" |jq -r '.[0].version'| sed 's/go//g'
|
||||
- name: toolchain-go-ubuntu
|
||||
variant: ""
|
||||
variant: "bookworm"
|
||||
category: development
|
||||
version: "1.20.2"
|
||||
tag: "1.20.2"
|
||||
hidden: true
|
||||
labels:
|
||||
autobump.revdeps: "false"
|
||||
@ -63,12 +67,6 @@ packages:
|
||||
version: "1.19.10"
|
||||
tag: "1.19.10"
|
||||
hidden: true
|
||||
- name: toolchain-go-ubuntu
|
||||
variant: ""
|
||||
category: fips
|
||||
version: "1.19.10"
|
||||
tag: "1.19.10"
|
||||
hidden: true
|
||||
- name: toolchain-go
|
||||
category: fips
|
||||
variant: "alpine"
|
||||
@ -76,8 +74,8 @@ packages:
|
||||
tag: "1.19.10"
|
||||
hidden: true
|
||||
- name: toolchain-go-ubuntu
|
||||
variant: ""
|
||||
variant: "bullseye"
|
||||
category: fips
|
||||
version: "1.19.10"
|
||||
version: "1.19.10+1"
|
||||
tag: "1.19.10"
|
||||
hidden: true
|
||||
|
@ -1,7 +1,7 @@
|
||||
name: earthly
|
||||
category: utils
|
||||
arch: "amd64"
|
||||
version: "0.8.3"
|
||||
version: "0.8.8"
|
||||
labels:
|
||||
github.repo: "earthly"
|
||||
github.owner: "earthly"
|
||||
|
@ -1,5 +1,5 @@
|
||||
requires:
|
||||
- name: "toolchain-go"
|
||||
- name: "toolchain-go-ubuntu"
|
||||
category: "development"
|
||||
version: ">=0"
|
||||
prelude:
|
||||
@ -9,10 +9,12 @@ env:
|
||||
- GOPATH=/luetbuild/go/
|
||||
- GITHUB_ORG={{ ( index .Values.labels "github.owner" ) }}
|
||||
- CGO_ENABLED=0
|
||||
- PACKAGE_VERSION={{ .Values.tag }}
|
||||
steps:
|
||||
- |
|
||||
PACKAGE_VERSION=${PACKAGE_VERSION%\-*} && \
|
||||
cd go/src/github.com/${GITHUB_ORG}/{{ .Values.name }}/ && git checkout v"${PACKAGE_VERSION}" -b build && go build -ldflags="-w -s -X github.com/mudler/edgevpn/internal.Version=v$PACKAGE_VERSION" && mv {{.Values.name}} /usr/bin/
|
||||
- upx -1 /usr/bin/{{.Values.name}}
|
||||
- chmod +x /usr/bin/{{.Values.name}}
|
||||
includes:
|
||||
- /usr/bin/{{.Values.name}}
|
||||
|
@ -1,6 +1,7 @@
|
||||
name: edgevpn
|
||||
category: utils
|
||||
version: "0.24.6"
|
||||
version: "0.25.2"
|
||||
tag: "0.24.6"
|
||||
labels:
|
||||
github.repo: "edgevpn"
|
||||
github.owner: "mudler"
|
||||
|
@ -1,6 +1,6 @@
|
||||
name: goreleaser
|
||||
category: utils
|
||||
version: "1.24.0"
|
||||
version: "1.25.1"
|
||||
description: "Deliver Go binaries as fast and easily as possible"
|
||||
labels:
|
||||
github.repo: "goreleaser"
|
||||
|
@ -1,6 +1,6 @@
|
||||
name: "helm"
|
||||
category: "utils"
|
||||
version: "3.14.0"
|
||||
version: "3.14.4"
|
||||
description: "The Kubernetes Package Manager"
|
||||
license: "Apache-2.0"
|
||||
labels:
|
||||
|
@ -1,10 +1,11 @@
|
||||
requires:
|
||||
- name: "toolchain-go"
|
||||
- name: "toolchain-go-ubuntu"
|
||||
category: "development"
|
||||
version: ">=0"
|
||||
env:
|
||||
- PATH=$PATH:/usr/local/go/bin
|
||||
- CGO_ENABLED=0
|
||||
- PACKAGE_VERSION={{ .Values.tag }}
|
||||
prelude:
|
||||
- |
|
||||
PACKAGE_VERSION=v${PACKAGE_VERSION%\-*} && \
|
||||
@ -13,6 +14,8 @@ steps:
|
||||
- |
|
||||
cd k9s && \
|
||||
make build && \
|
||||
cp execs/k9s /usr/bin
|
||||
cp execs/k9s /usr/bin && \
|
||||
upx /usr/bin/k9s
|
||||
|
||||
includes:
|
||||
- /usr/bin/k9s
|
@ -1,6 +1,7 @@
|
||||
name: "k9s"
|
||||
category: "utils"
|
||||
version: "0.31.7"
|
||||
version: "0.32.4"
|
||||
tag: "0.31.7"
|
||||
platform: Linux
|
||||
labels:
|
||||
github.repo: "k9s"
|
||||
|
@ -1,6 +1,6 @@
|
||||
name: kube-vip
|
||||
category: utils
|
||||
version: "0.7.0"
|
||||
version: "0.8.0"
|
||||
labels:
|
||||
github.repo: "kube-vip"
|
||||
github.owner: "kube-vip"
|
||||
|
@ -1,12 +1,13 @@
|
||||
requires:
|
||||
- category: "development"
|
||||
name: "toolchain-go"
|
||||
name: "toolchain-go-ubuntu"
|
||||
version: ">=0"
|
||||
|
||||
package_dir: /kubectl
|
||||
env:
|
||||
- PACKAGE_VERSION={{ .Values.tag }}
|
||||
|
||||
steps:
|
||||
- apk add bash
|
||||
- mkdir -p /kubectl/usr/bin
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && curl -LO "https://dl.k8s.io/release/v$PACKAGE_VERSION/bin/linux/{{.Values.arch}}/kubectl"
|
||||
- PACKAGE_VERSION=${PACKAGE_VERSION%\+*} && curl -LO "https://dl.k8s.io/release/v$PACKAGE_VERSION/bin/linux/{{.Values.arch}}/kubectl.sha256"
|
||||
@ -16,3 +17,4 @@ steps:
|
||||
- /bin/bash -c 'echo "$(<kubectl.sha256) kubectl" | sha256sum -c'
|
||||
- mv kubectl /kubectl/usr/bin
|
||||
- chmod +x /kubectl/usr/bin/kubectl
|
||||
- upx -1 /kubectl/usr/bin/kubectl
|
||||
|
@ -1,6 +1,7 @@
|
||||
name: kubectl
|
||||
category: container
|
||||
version: "1.29.1"
|
||||
version: "1.30.0"
|
||||
tag: "1.29.1"
|
||||
arch: "amd64"
|
||||
labels:
|
||||
github.repo: "kubectl"
|
||||
@ -10,7 +11,7 @@ labels:
|
||||
autobump.prefix: "prefix"
|
||||
autobump.hook: "curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt | sed 's/v//'"
|
||||
autobump.version_hook: "curl -s https://storage.googleapis.com/kubernetes-release/release/stable.txt | sed 's/v//'"
|
||||
package.version: "1.29.1"
|
||||
package.version: "1.30.0"
|
||||
uri:
|
||||
- https://github.com/kubernetes/kubernetes
|
||||
- https://kubernetes.io
|
||||
|
@ -1,10 +1,11 @@
|
||||
requires:
|
||||
- name: "toolchain-go"
|
||||
- name: "toolchain-go-ubuntu"
|
||||
category: "development"
|
||||
version: ">=0"
|
||||
env:
|
||||
- PATH=$PATH:/usr/local/go/bin
|
||||
- CGO_ENABLED=0
|
||||
- PACKAGE_VERSION={{ .Values.tag }}
|
||||
prelude:
|
||||
- |
|
||||
PACKAGE_VERSION=v${PACKAGE_VERSION%\-*} && \
|
||||
@ -13,6 +14,7 @@ steps:
|
||||
- |
|
||||
cd nerdctl && \
|
||||
make binaries && \
|
||||
make BINDIR=/usr/bin install
|
||||
make BINDIR=/usr/bin install && \
|
||||
upx -1 /usr/bin/nerdctl
|
||||
includes:
|
||||
- /usr/bin/nerdctl
|
@ -1,6 +1,7 @@
|
||||
name: "nerdctl"
|
||||
category: "utils"
|
||||
version: "1.7.2"
|
||||
version: "2.0.0-beta.4"
|
||||
tag: "1.7.2"
|
||||
platform: linux
|
||||
labels:
|
||||
github.repo: "nerdctl"
|
||||
|
@ -1,6 +1,6 @@
|
||||
name: operator-sdk
|
||||
category: utils
|
||||
version: "1.33.0"
|
||||
version: "1.34.1"
|
||||
description: " SDK for building Kubernetes applications. Provides high level APIs, useful abstractions, and project scaffolding. "
|
||||
labels:
|
||||
github.repo: "operator-sdk"
|
||||
|
@ -1,3 +1,3 @@
|
||||
module github.com/kairos-io/packages/tools/bump-validator
|
||||
|
||||
go 1.21.1
|
||||
go 1.22.2
|
||||
|
Loading…
Reference in New Issue
Block a user