Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move Ignition-Dracut into Ignition #1039

Merged
merged 536 commits into from
Jul 24, 2020
Merged

Move Ignition-Dracut into Ignition #1039

merged 536 commits into from
Jul 24, 2020
This pull request is big! We’re only showing the most recent 250 commits.

Commits on Nov 18, 2017

  1. dracut: fix comment

    bgilbert committed Nov 18, 2017
    Configuration menu
    Copy the full SHA
    127bd66 View commit details
    Browse the repository at this point in the history

Commits on Dec 3, 2017

  1. Configuration menu
    Copy the full SHA
    9495e3b View commit details
    Browse the repository at this point in the history

Commits on Dec 6, 2017

  1. Merge pull request coreos#135 from bgilbert/external-oem-configs

    Copy Ignition base/user configs from OEM to Ignition system dir
    bgilbert committed Dec 6, 2017
    Configuration menu
    Copy the full SHA
    60d29e0 View commit details
    Browse the repository at this point in the history

Commits on Dec 12, 2017

  1. dracut: correctly sequence disk-uuid@ before ignition-setup

    The "After=disk-uuid.service" in ignition-setup.service doesn't actually
    work because disk-uuid.service is templated. Instead, disk-uuid@.service
    should sequence itself Before units that access device nodes. Sequence
    disk-uuid@ Before ignition-setup, and remove "After=disk-uuid.service"
    from Ignition units.
    bgilbert committed Dec 12, 2017
    Configuration menu
    Copy the full SHA
    760986b View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#136 from bgilbert/before

    dracut: correctly sequence disk-uuid@ before ignition-setup
    bgilbert committed Dec 12, 2017
    Configuration menu
    Copy the full SHA
    4d25b96 View commit details
    Browse the repository at this point in the history

Commits on Dec 19, 2017

  1. dracut: ignore Azure SR-IOV VF interface

    The kernel will automatically bond it to the synthetic interface, so
    ensure networkd doesn't try to configure it separately.
    bgilbert committed Dec 19, 2017
    Configuration menu
    Copy the full SHA
    4df8cff View commit details
    Browse the repository at this point in the history

Commits on Dec 26, 2017

  1. Merge pull request coreos#137 from bgilbert/azure-sriov

    dracut: ignore Azure SR-IOV VF interface
    bgilbert committed Dec 26, 2017
    Configuration menu
    Copy the full SHA
    e8c3ebe View commit details
    Browse the repository at this point in the history

Commits on Jan 4, 2018

  1. update CoC and legalese

    ericchiang committed Jan 4, 2018
    Configuration menu
    Copy the full SHA
    1626a8e View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#139 from ericchiang/coc

    automated PR: update CoC and legalese
    dm0- committed Jan 4, 2018
    Configuration menu
    Copy the full SHA
    daa1e80 View commit details
    Browse the repository at this point in the history

Commits on Jan 9, 2018

  1. 99start-root: drop DEVLINKS from mdadm invocation

    The current invocation is broken (should be $env{DEVLINKS}) and
    pointless, so drop it. The last arguments to the `mdadm --incremental`
    command are just aliases that can be used in /etc/mdadm.conf (see the
    "INCREMENTAL MODE" section of man 8 mdadm). We don't use
    /etc/mdadm.conf in the initramfs, so just drop it.
    Andrew Jeddeloh committed Jan 9, 2018
    Configuration menu
    Copy the full SHA
    4189890 View commit details
    Browse the repository at this point in the history

Commits on Jan 10, 2018

  1. Merge pull request coreos#138 from ajeddeloh/fix-devlinks

    99start-root: drop DEVLINKS from mdadm invocation
    ajeddeloh committed Jan 10, 2018
    Configuration menu
    Copy the full SHA
    70fcb32 View commit details
    Browse the repository at this point in the history

Commits on Jan 23, 2018

  1. dracut: drop obsolete comment

    Fixed upstream in systemd/systemd@e1c42e1.
    bgilbert committed Jan 23, 2018
    Configuration menu
    Copy the full SHA
    ca7d8fd View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#140 from bgilbert/mtu

    dracut: drop obsolete comment
    bgilbert committed Jan 23, 2018
    Configuration menu
    Copy the full SHA
    142e647 View commit details
    Browse the repository at this point in the history

Commits on Mar 27, 2018

  1. remove extra sauce

    dustymabe committed Mar 27, 2018
    Configuration menu
    Copy the full SHA
    8771128 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    d3d3121 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    863a8f6 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    fb89798 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    61f8967 View commit details
    Browse the repository at this point in the history
  6. Revert "use /etc/machine-id to detect firstboot"

    This reverts commit 61f8967.
    dustymabe committed Mar 27, 2018
    Configuration menu
    Copy the full SHA
    42c1a1b View commit details
    Browse the repository at this point in the history
  7. Try to fix problem

    dustymabe committed Mar 27, 2018
    Configuration menu
    Copy the full SHA
    4ea7626 View commit details
    Browse the repository at this point in the history
  8. reset to 863a8f6

    dustymabe committed Mar 27, 2018
    Configuration menu
    Copy the full SHA
    a9fe234 View commit details
    Browse the repository at this point in the history

Commits on Apr 5, 2018

  1. Configuration menu
    Copy the full SHA
    6a9118d View commit details
    Browse the repository at this point in the history
  2. only run Ignition on first boot

    Alter ignition-generator to only run ignition when coreos.first_boot is
    present on the command line, add a base Ignition config that removes
    coreos.first_boot from the grub config, add coreos.first_boot to the
    grub config in the instructions in README.txt
    Derek Gonyeo committed Apr 5, 2018
    Configuration menu
    Copy the full SHA
    d37b56e View commit details
    Browse the repository at this point in the history
  3. add ignition disks stage

    Derek Gonyeo committed Apr 5, 2018
    Configuration menu
    Copy the full SHA
    a05ce22 View commit details
    Browse the repository at this point in the history

Commits on Apr 6, 2018

  1. ignition-quench.clc: add the source for ignition-quench.ign

    Also reformat ignition-quench.ign to be more readable
    Derek Gonyeo committed Apr 6, 2018
    Configuration menu
    Copy the full SHA
    d403fc8 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#1 from dgonyeo/dusty-fork

    Only run on first boot, enable the disks stage
    dustymabe committed Apr 6, 2018
    Configuration menu
    Copy the full SHA
    03a59a2 View commit details
    Browse the repository at this point in the history

Commits on Jun 1, 2018

  1. Configuration menu
    Copy the full SHA
    b81cd2f View commit details
    Browse the repository at this point in the history

Commits on Jun 5, 2018

  1. Merge pull request coreos#3 from cgwalters/readme-tweak

    README: Note instructions are for classic systems
    dustymabe committed Jun 5, 2018
    Configuration menu
    Copy the full SHA
    9236987 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0609153 View commit details
    Browse the repository at this point in the history
  3. module-setup: update module-setup so deps are pulled in

    Added a few binaries and also a few modules.
    dustymabe committed Jun 5, 2018
    Configuration menu
    Copy the full SHA
    7fd35bc View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    e001257 View commit details
    Browse the repository at this point in the history
  5. get rid of usr-generator module

    It was there for compatibility with some older CL systems and
    isn't needed AFAICT for RH/Fedora. Migrate the remount-sysroot
    service to the ignition module as I do think that is still needed.
    dustymabe committed Jun 5, 2018
    Configuration menu
    Copy the full SHA
    65893e7 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    f5bad8c View commit details
    Browse the repository at this point in the history
  7. update README

    dustymabe committed Jun 5, 2018
    Configuration menu
    Copy the full SHA
    0c58283 View commit details
    Browse the repository at this point in the history
  8. Merge pull request coreos#2 from dustymabe/PR

    Tidying things up a bit
    dustymabe committed Jun 5, 2018
    Configuration menu
    Copy the full SHA
    59ebe33 View commit details
    Browse the repository at this point in the history

Commits on Jun 7, 2018

  1. Configuration menu
    Copy the full SHA
    1f80d41 View commit details
    Browse the repository at this point in the history
  2. Prefix remount-sysroot.service with "ignition-"

    Otherwise, it's not obvious that this unit comes from ignition.
    jlebon committed Jun 7, 2018
    Configuration menu
    Copy the full SHA
    fd31492 View commit details
    Browse the repository at this point in the history
  3. Run ignition-files after ostree-prepare-root.service

    The actual `/sysroot` we want `ignition-files` to manage is not the
    physical root, but our deployment root. So we need to make sure it runs
    *after* `ostree-prepare-root.service`.
    jlebon committed Jun 7, 2018
    Configuration menu
    Copy the full SHA
    a071427 View commit details
    Browse the repository at this point in the history
  4. Merge pull request coreos#5 from jlebon/pr/after-ostree

    ignition-files.service: run after ostree-prepare-root.service
    dustymabe committed Jun 7, 2018
    Configuration menu
    Copy the full SHA
    25f2f50 View commit details
    Browse the repository at this point in the history
  5. no disks for now - boot systemd unit ordering issue

    without ignition-disks we get a booting system. This is somehow
    related to the ordering with ignition and ostree mounting during
    the initramfs. Disable ignition-disks service for now.
    dustymabe committed Jun 7, 2018
    Configuration menu
    Copy the full SHA
    11d0ab5 View commit details
    Browse the repository at this point in the history
  6. Merge pull request coreos#6 from dustymabe/check

    no disks
    dustymabe committed Jun 7, 2018
    Configuration menu
    Copy the full SHA
    7731f33 View commit details
    Browse the repository at this point in the history
  7. Add ignition-ask-var-mount.service

    This new service file adds a special file in `/run` and runs before
    `ostree-prepare-root.service` so that the latter mounts `/var` rather
    than relying on the OSTree generator post-switchroot.
    
    This also requires us to remount `/var` read-write so that Ignition can
    e.g. create new users.
    jlebon committed Jun 7, 2018
    Configuration menu
    Copy the full SHA
    7b5bbfa View commit details
    Browse the repository at this point in the history
  8. Merge pull request coreos#7 from jlebon/pr/ask-var-mount

    Add ignition-ask-var-mount.service
    dustymabe committed Jun 7, 2018
    Configuration menu
    Copy the full SHA
    1e36a6c View commit details
    Browse the repository at this point in the history

Commits on Jun 13, 2018

  1. ignition-generator: add hack for openstack support

    This is another hack like the xen = ec2 one to get RHCOS ignition
    working in OpenStack for now. A lot of our infra and scripts currently
    interop well with OpenStack, so I'd like to unblock this to make it
    easier to hack on and test RHCOS overall.
    jlebon committed Jun 13, 2018
    Configuration menu
    Copy the full SHA
    4f985ad View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#8 from jlebon/pr/openstack-oem-id

    ignition-generator: add hack for openstack support
    dustymabe committed Jun 13, 2018
    Configuration menu
    Copy the full SHA
    ce6dfe1 View commit details
    Browse the repository at this point in the history

Commits on Jun 18, 2018

  1. Make ignition work on classic systems

    On OSTree systems, we need to remount both `/sysroot` and `/sysroot/var`
    to read-write for Ignition. On classic systems though, we only need the
    former.
    
    Split out those two remounts into separate units and only run the
    `/sysroot/var` remount if it's not already read-write.
    jlebon committed Jun 18, 2018
    Configuration menu
    Copy the full SHA
    7e250dd View commit details
    Browse the repository at this point in the history
  2. Drop 'auto-detect' hacks in generator

    We now explicitly stamp images for their respective cloud providers so
    we no longer need to try to guess.
    jlebon committed Jun 18, 2018
    Configuration menu
    Copy the full SHA
    b041781 View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#9 from jlebon/pr/conditional

    remount-sysroot: only remount on OSTree systems
    dustymabe committed Jun 18, 2018
    Configuration menu
    Copy the full SHA
    922ef67 View commit details
    Browse the repository at this point in the history
  4. Merge pull request coreos#10 from jlebon/pr/drop-hacks

    Drop 'auto-detect' hacks in generator
    dustymabe committed Jun 18, 2018
    Configuration menu
    Copy the full SHA
    bf3b454 View commit details
    Browse the repository at this point in the history

Commits on Jun 29, 2018

  1. Rework how we run Ignition on first boot

    There was an extensive discussion of this on IRC.  The basic
    idea is we have a stamp file in `/boot`, same as CL does.  However,
    we use a GRUB *variable* `$coreos_firstboot` which is hardcoded in
    the kernel arguments, but evaluates to the empty string if we're
    not in the first boot.
    
    This way we don't have to change the kernel arguments post-boot.
    
    We previously had a systemd "quench" unit as a hardcoded Ignition
    config here - I moved that to a regular installed unit that is
    part of the package.
    Rahuls0720 authored and cgwalters committed Jun 29, 2018
    Configuration menu
    Copy the full SHA
    9d2dd32 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    6463f60 View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#12 from cgwalters/firstboot-2

    Rework how we run Ignition on first boot
    dustymabe committed Jun 29, 2018
    Configuration menu
    Copy the full SHA
    17a201b View commit details
    Browse the repository at this point in the history

Commits on Jul 20, 2018

  1. Add Journald forward to kernel log buffer option

    This makes ignition logs show up on ttyS0. Without
    this option, ignition logs only shows up on tty0.
    Rahuls0720 committed Jul 20, 2018
    Configuration menu
    Copy the full SHA
    09f16fd View commit details
    Browse the repository at this point in the history

Commits on Jul 21, 2018

  1. Merge pull request coreos#13 from Rahuls0720/tty0_dev

    Add Journald 'forward to kernel log buffer' option
    dustymabe committed Jul 21, 2018
    Configuration menu
    Copy the full SHA
    d664657 View commit details
    Browse the repository at this point in the history

Commits on Aug 17, 2018

  1. change the default level of messages send to kmsg

    It defaults to notice, which doesn't print out the "info"
    level information we want to get from ignition.
    dustymabe committed Aug 17, 2018
    Configuration menu
    Copy the full SHA
    495c13c View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#14 from dustymabe/dusty

    change the default level of messages send to kmsg
    dustymabe committed Aug 17, 2018
    Configuration menu
    Copy the full SHA
    56aa514 View commit details
    Browse the repository at this point in the history

Commits on Aug 28, 2018

  1. coreos-firstboot-complete: RemainAfterExit=yes

    See ostreedev/ostree#1697
    
    Just noticed this while investigating our services after the
    recent machine-id regression.
    cgwalters committed Aug 28, 2018
    Configuration menu
    Copy the full SHA
    92ef9dd View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2018

  1. Merge pull request coreos#15 from cgwalters/remain-after-exit

    coreos-firstboot-complete: RemainAfterExit=yes
    dustymabe committed Aug 29, 2018
    Configuration menu
    Copy the full SHA
    2a36c7d View commit details
    Browse the repository at this point in the history

Commits on Sep 3, 2018

  1. dracut/ignition: remove CL-legacy udev references

    This drop some legacy/commented line for installing CL-specific udev
    rules. We'll likely grow some more bits to install into initramfs in
    the future, which should not be part of this ignition module.
    lucab committed Sep 3, 2018
    Configuration menu
    Copy the full SHA
    3f41219 View commit details
    Browse the repository at this point in the history

Commits on Sep 4, 2018

  1. Merge pull request coreos#16 from lucab/ups/ignition-udev-rules

    dracut/ignition: remove CL-legacy udev references
    dustymabe committed Sep 4, 2018
    Configuration menu
    Copy the full SHA
    d056287 View commit details
    Browse the repository at this point in the history

Commits on Sep 20, 2018

  1. journal: Don't log to console AND kmsg

    If we do that then we get "double logs" on the console device
    because both kmsg and console output is getting dumped there.
    dustymabe committed Sep 20, 2018
    Configuration menu
    Copy the full SHA
    26f2396 View commit details
    Browse the repository at this point in the history

Commits on Sep 21, 2018

  1. Merge pull request coreos#19 from dustymabe/dusty

    journal: don't log to console AND kmsg
    dustymabe committed Sep 21, 2018
    Configuration menu
    Copy the full SHA
    8c85eb3 View commit details
    Browse the repository at this point in the history

Commits on Sep 25, 2018

  1. 30ignition: add support for ignition-disks

    This adds all relevant bits to run the "disks" stage.
    lucab committed Sep 25, 2018
    Configuration menu
    Copy the full SHA
    ce9f648 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#17 from lucab/ups/ignition-disks

    30ignition: add support for ignition-disks
    dustymabe committed Sep 25, 2018
    Configuration menu
    Copy the full SHA
    c09ce6f View commit details
    Browse the repository at this point in the history

Commits on Oct 12, 2018

  1. Configuration menu
    Copy the full SHA
    6d0763a View commit details
    Browse the repository at this point in the history

Commits on Oct 13, 2018

  1. Merge pull request coreos#21 from cgwalters/btrfs-optional

    module-setup: Make mkfs.btrfs optional
    dustymabe committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    4bdfb34 View commit details
    Browse the repository at this point in the history

Commits on Oct 16, 2018

  1. module-setup.sh: explicitly install qemu_fw_cfg

    Make it explicit that we need the `qemu_fw_cfg` kernel module in the
    initramfs. This works for Fedora right now before I think because we run
    dracut with `--no-host-only` at compose time. (It's the default if
    `initramfs-args` isn't in the manifest, as in FCOS, and in FAH we
    explicitly have it in the manifest).
    
    Closes: coreos#22
    jlebon committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    ecf5779 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#25 from jlebon/pr/instmods-qemu-fw

    module-setup.sh: explicitly install qemu_fw_cfg
    dustymabe committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    b7d4424 View commit details
    Browse the repository at this point in the history

Commits on Oct 18, 2018

  1. ignition-ask-var-mount.service: use RemainAfterExit=yes

    This is important for `Type=oneshot` services that may be depended upon
    by other services. See ostreedev/ostree#1697.
    jlebon committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    a0bc135 View commit details
    Browse the repository at this point in the history
  2. ignition-disks.service: drop Requires=network.target

    Mirror the same requirements as `ignition-files.service`. I.e. we don't
    strictly *require* networking, but if there is networking, we'd rather
    run after it so that we can pull down the config. See also coreos#17.
    
    (Anyway, I think we want `network-online.target` here instead of
    `network.target` but I haven't tested that).
    jlebon committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    0301a03 View commit details
    Browse the repository at this point in the history

Commits on Oct 19, 2018

  1. Merge pull request coreos#27 from jlebon/pr/prep

    Prep misc patches
    dustymabe committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    b03d4e2 View commit details
    Browse the repository at this point in the history

Commits on Oct 24, 2018

  1. ignition: run files stage at original CL ordering

    We previously messed around with changing the files service to
    adapt to `ostree-prepare-root.service` running so late in the boot
    process. Now that OSTree runs at more semantically appropriate times, we
    can restore ordering here so that it runs right after
    `initrd-root-fs.target`.
    
    This also undoes the hacking around in `ignition-generator` to get the
    services pulled in by `initrd-switch-root.service` instead of the more
    appropriate principal target of the initrd (`initrd.target`).
    
    Another nice thing about this is that we drop the explicit dependency
    between `ostree-prepare-root.service` and `ignition-files` since they're
    now synchronized through `initrd-root-fs.target`.
    
    Closes: coreos#20
    jlebon committed Oct 24, 2018
    Configuration menu
    Copy the full SHA
    66335f2 View commit details
    Browse the repository at this point in the history
  2. remove ignition-remount-sysroot.service files

    These are no longer needed now that we explicitly pass `rw` on the
    kernel command-line. For more information, see:
    
    systemd/systemd#8268
    openshift/os#199
    jlebon committed Oct 24, 2018
    Configuration menu
    Copy the full SHA
    3ec0b39 View commit details
    Browse the repository at this point in the history

Commits on Oct 25, 2018

  1. Merge pull request coreos#26 from jlebon/pr/run-earlier

    ignition: run files stage at original CL ordering
    dustymabe committed Oct 25, 2018
    Configuration menu
    Copy the full SHA
    7ee64ca View commit details
    Browse the repository at this point in the history
  2. 30ignition: only instmods if module available

    Otherwise we'll error out on kernels which have the functionality
    builtin. This was tested on FCOS (which uses `m`) and RHCOS (which uses
    `y`). We need to check `/usr/lib/ostree-boot` since on el7 that's the
    only place where the config is.
    jlebon committed Oct 25, 2018
    Configuration menu
    Copy the full SHA
    03d8438 View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#28 from jlebon/pr/fw-cfg

    30ignition: only instmods if module available
    dustymabe committed Oct 25, 2018
    Configuration menu
    Copy the full SHA
    decf63f View commit details
    Browse the repository at this point in the history

Commits on Nov 20, 2018

  1. Rename coreos.firstboot kernel cmdline arg to ignition.firstboot

    to make options more distribution neutral.
    Update dracut/README.txt to take into account recent changes.
    
    Resolves:  coreos#24
    LorbusChris committed Nov 20, 2018
    Configuration menu
    Copy the full SHA
    6e41a70 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#30 from LorbusChris/master

    Rename `coreos.firstboot` kernel cmdline arg to `ignition.firstboot`
    dustymabe committed Nov 20, 2018
    Configuration menu
    Copy the full SHA
    7b83454 View commit details
    Browse the repository at this point in the history

Commits on Jan 3, 2019

  1. Configuration menu
    Copy the full SHA
    650d58c View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#36 from cgwalters/firstboot-complete-ro-boot

    ignition-firstboot-complete.service: Remount /boot rw
    dustymabe committed Jan 3, 2019
    Configuration menu
    Copy the full SHA
    996d527 View commit details
    Browse the repository at this point in the history

Commits on Jan 9, 2019

  1. Remount /sysroot rw (coreos#38)

    * Remount /sysroot rw
    
    Some Linux Distributions don't pass a rw option on the kernel commandline
    and thus mount the root filesystem ro by default. In this case, remount
    /sysroot to rw (issue coreos/ignition-dracut#37)
    thkukuk authored and dustymabe committed Jan 9, 2019
    Configuration menu
    Copy the full SHA
    a6551f1 View commit details
    Browse the repository at this point in the history

Commits on Jan 25, 2019

  1. journal: add clarifying comment for context

    It's good to provide some history so that we can know
    when we can drop these changes.
    dustymabe committed Jan 25, 2019
    Configuration menu
    Copy the full SHA
    7579b92 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#40 from coreos/dusty

    journal: add clarifying comment for context
    dustymabe committed Jan 25, 2019
    Configuration menu
    Copy the full SHA
    fa7131b View commit details
    Browse the repository at this point in the history

Commits on Feb 4, 2019

  1. Add ability to parse config.ign file on boot

    Yolanda Robla committed Feb 4, 2019
    Configuration menu
    Copy the full SHA
    b09aeeb View commit details
    Browse the repository at this point in the history
  2. Replace OEM with boot

    Yolanda Robla committed Feb 4, 2019
    Configuration menu
    Copy the full SHA
    8939597 View commit details
    Browse the repository at this point in the history

Commits on Feb 5, 2019

  1. Always check for boot, needs to exist

    Yolanda Robla committed Feb 5, 2019
    Configuration menu
    Copy the full SHA
    77ba5bf View commit details
    Browse the repository at this point in the history
  2. Remove the check for OEM partition, not used

    Yolanda Robla committed Feb 5, 2019
    Configuration menu
    Copy the full SHA
    478877e View commit details
    Browse the repository at this point in the history

Commits on Feb 8, 2019

  1. Merge pull request coreos#42 from yrobla/master

    Add ability to parse config.ign file on boot
    dustymabe committed Feb 8, 2019
    Configuration menu
    Copy the full SHA
    9e18211 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    7115ef4 View commit details
    Browse the repository at this point in the history
  3. ignition-setup: support boot or platform base/user configs

    This adds support for platform base/user configs and also user
    provided base/user configs that were embedded in the /boot/
    partition.
    
    Fixes: coreos#32
    dustymabe committed Feb 8, 2019
    Configuration menu
    Copy the full SHA
    5474018 View commit details
    Browse the repository at this point in the history
  4. generator: RemainAfterExit=yes for ignition-setup

    This allows you to query the status of it afterwards.
    dustymabe committed Feb 8, 2019
    Configuration menu
    Copy the full SHA
    a260c4c View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    7b2ace1 View commit details
    Browse the repository at this point in the history
  6. dracut: add /usr/sbin/ignition-setup to initramfs

    Otherwise ignition-setup.service won't work :)
    dustymabe committed Feb 8, 2019
    Configuration menu
    Copy the full SHA
    e1e14dd View commit details
    Browse the repository at this point in the history
  7. ignition-setup: mount/unmount boot to grab user.ign

    Mount boot partition so that we can see if there are
    any embedded ignition files in /boot/.
    dustymabe committed Feb 8, 2019
    Configuration menu
    Copy the full SHA
    ff7a3de View commit details
    Browse the repository at this point in the history

Commits on Feb 14, 2019

  1. ignition-setup: changes from code review

    - use config.ign for user facing stuff
    - only support copying config.ign -> user.ign
    - use /usr/lib/ignition/platform/${OEM_ID} for platforms
    - only support copying base.ign -> base.ign for platforms
    dustymabe committed Feb 14, 2019
    Configuration menu
    Copy the full SHA
    cf1fab8 View commit details
    Browse the repository at this point in the history
  2. ignition-setup: use MountFlags=slave for systemd unit

    This will guarantee the /boot mount won't outlast the unit.
    dustymabe committed Feb 14, 2019
    Configuration menu
    Copy the full SHA
    f6f32a0 View commit details
    Browse the repository at this point in the history

Commits on Feb 15, 2019

  1. services: fixup unit deps to more match CL

    This makes it so that disks and files stages more explicitly
    depend on igntion-setup.service similar to the way it is done
    in CL today.
    dustymabe committed Feb 15, 2019
    Configuration menu
    Copy the full SHA
    71a2b3a View commit details
    Browse the repository at this point in the history
  2. ignition-setup: rename copy function

    copy_file_if_exists is more descriptive of what is going on.
    dustymabe committed Feb 15, 2019
    Configuration menu
    Copy the full SHA
    11beae9 View commit details
    Browse the repository at this point in the history
  3. ignition-setup: don't perform umount, rely on systemd

    Systemd MountFlags=slave will take care of it for us so
    let's not risk the error inside the script.
    dustymabe committed Feb 15, 2019
    Configuration menu
    Copy the full SHA
    e4970c0 View commit details
    Browse the repository at this point in the history
  4. Merge pull request coreos#43 from dustymabe/dusty

    support platform configs and user configs in /boot
    dustymabe committed Feb 15, 2019
    Configuration menu
    Copy the full SHA
    2c69925 View commit details
    Browse the repository at this point in the history

Commits on Feb 26, 2019

  1. dracut: adapt for s/oem/platform in Ignition

    With coreos#735 merged, we need to fix
    our service units to use `--platform` here. Also just do the equivalent
    thing here and start to move away from the oem terminology. Crucially
    though, we still look for `coreos.oem.id` until downstreams have
    adapted (notably coreos-assembler).
    
    Closes: coreos#31
    jlebon committed Feb 26, 2019
    Configuration menu
    Copy the full SHA
    67e092e View commit details
    Browse the repository at this point in the history

Commits on Feb 27, 2019

  1. Merge pull request coreos#45 from jlebon/pr/oem-platform

    dracut: adapt for s/oem/platform in Ignition
    dustymabe committed Feb 27, 2019
    Configuration menu
    Copy the full SHA
    9aac3c5 View commit details
    Browse the repository at this point in the history

Commits on Feb 28, 2019

  1. dracut/30ignition: general hack cleanups

    We're past the MVP phase now. Let's reflect that in our codebase by
    dropping all the telltale signs of quick hacks and experimentations.
    This makes the tree nicer to hack on as well.
    
    Remember, all your code are belong to Git. We can always revive things
    as needed as we get around to supporting Packet/DO, etc... Though those
    units will need to be tweaked anyway.
    
    Closes: coreos#33
    jlebon committed Feb 28, 2019
    Configuration menu
    Copy the full SHA
    95a0f18 View commit details
    Browse the repository at this point in the history

Commits on Mar 1, 2019

  1. Merge pull request coreos#46 from jlebon/pr/cleanups

    dracut/30ignition: general hack cleanups
    dustymabe committed Mar 1, 2019
    Configuration menu
    Copy the full SHA
    ca593a1 View commit details
    Browse the repository at this point in the history
  2. module-setup.sh: Check for module qemu_fw_cfg not build-in, so it wor…

    …ks out of box on all arches
    jcajka committed Mar 1, 2019
    Configuration menu
    Copy the full SHA
    819e0da View commit details
    Browse the repository at this point in the history

Commits on Mar 4, 2019

  1. Merge pull request coreos#49 from jcajka/fwcfg

    module-setup.sh: Simplify the qemu_fw_cfg kernel module check
    dustymabe committed Mar 4, 2019
    Configuration menu
    Copy the full SHA
    e3bd9c9 View commit details
    Browse the repository at this point in the history

Commits on Mar 5, 2019

  1. grub: find boot partition and use it directly

    On UEFI systems the grub $root might be the /boot/efi/
    partition and not the /boot/ partition so let's search
    for the partition with the `boot` label and then detect
    the file directly.
    
    Fixes coreos#51
    dustymabe committed Mar 5, 2019
    Configuration menu
    Copy the full SHA
    552edb5 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#52 from dustymabe/bootlabel

    grub: find boot partition and use it directly
    dustymabe committed Mar 5, 2019
    Configuration menu
    Copy the full SHA
    a66ff6b View commit details
    Browse the repository at this point in the history
  3. grub: find boot partition and use it directly

    On UEFI systems the grub $root might be the /boot/efi/
    partition and not the /boot/ partition so let's search
    for the partition with the `boot` label and then detect
    the file directly.
    
    Fixes coreos#51
    
    (cherry picked from commit 552edb5)
    dustymabe committed Mar 5, 2019
    Configuration menu
    Copy the full SHA
    31a3090 View commit details
    Browse the repository at this point in the history
  4. Merge pull request coreos#53 from dustymabe/dusty

    spec2x: grub: find boot partition and use it directly
    dustymabe committed Mar 5, 2019
    Configuration menu
    Copy the full SHA
    065e72a View commit details
    Browse the repository at this point in the history
  5. dracut/30ignition: Only write ignition-setup.service on first boot

    It's true it's only pulled into the transaction right now by the other
    services. But just on principle, let's not even write it if we know
    we're not going to use it.
    jlebon committed Mar 5, 2019
    Configuration menu
    Copy the full SHA
    cd9ddaf View commit details
    Browse the repository at this point in the history

Commits on Mar 6, 2019

  1. Merge pull request coreos#54 from jlebon/pr/ignition-setup-tweak

    dracut/30ignition: Only write ignition-setup.service on first boot
    dustymabe committed Mar 6, 2019
    Configuration menu
    Copy the full SHA
    d4e8899 View commit details
    Browse the repository at this point in the history

Commits on Mar 7, 2019

  1. dracut/30ignition: split out ignition-setup.service

    There's no need to generate it dynamically, so let's just split it out
    to be more explicit and easier to hack on.
    jlebon committed Mar 7, 2019
    Configuration menu
    Copy the full SHA
    38a5360 View commit details
    Browse the repository at this point in the history
  2. dracut/30ignition: add ignition-complete.target

    From the comment block of the unit:
    
        This target is reached when Ignition finishes running. Note that it
        gets activated *only* on first boot (or if ignition.firstboot=1 is
        provided).  Thus, it is also an API for units to use so that they
        are activated only on first boot. Simply add a link under
        ignition-complete.target.requires in the initrd.
    
    Thus, units themselves don't need to add explicit `Requires=`; the
    canonical way to get pulled into the transaction is through
    `ignition-complete.target`.
    
    This will also be used by the upcoming CoreOS units that are required
    for separate `/var` support.
    jlebon committed Mar 7, 2019
    Configuration menu
    Copy the full SHA
    f545dad View commit details
    Browse the repository at this point in the history

Commits on Mar 14, 2019

  1. Merge pull request coreos#55 from jlebon/pr/ignition-target

    Add ignition-complete.target
    dustymabe committed Mar 14, 2019
    Configuration menu
    Copy the full SHA
    f6eb01f View commit details
    Browse the repository at this point in the history

Commits on Mar 16, 2019

  1. dracut/30ignition: expect ignition binary in module directory

    The ignition binary is not intended to be run by users or in the real
    root filesystem, and thus should never be in PATH.  Expect distros to
    install it into the dracut module directory instead.
    bgilbert committed Mar 16, 2019
    Configuration menu
    Copy the full SHA
    738c676 View commit details
    Browse the repository at this point in the history

Commits on Mar 18, 2019

  1. 02_ignition_firstboot: Enable networking if Ignition will run

    Today coreos-assembler is hardcoding the initramfs networking kargs to
    do DHCP; this is problematic for e.g. bare metal where one often wants
    to configure static networking.
    
    Let's only enable initramfs networking if we're doing Ignition.
    cgwalters committed Mar 18, 2019
    Configuration menu
    Copy the full SHA
    c62a108 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#57 from cgwalters/initramfs-net-ignition

    02_ignition_firstboot: Enable networking if Ignition will run
    dustymabe committed Mar 18, 2019
    Configuration menu
    Copy the full SHA
    8875cbf View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#56 from bgilbert/unpath

    dracut/30ignition: expect ignition binary in module directory
    dustymabe committed Mar 18, 2019
    Configuration menu
    Copy the full SHA
    b11553f View commit details
    Browse the repository at this point in the history

Commits on Mar 20, 2019

  1. README.md: update documentation

    Drop the outdated distro-specific instructions and instead guide folks
    perusing the repo towards FCOS artifacts and coreos-assembler for how to
    play with it.
    
    Closes: coreos#62
    jlebon committed Mar 20, 2019
    Configuration menu
    Copy the full SHA
    1768f12 View commit details
    Browse the repository at this point in the history

Commits on Mar 22, 2019

  1. Merge pull request coreos#63 from jlebon/pr/update-docs

    README.md: update documentation
    dustymabe committed Mar 22, 2019
    Configuration menu
    Copy the full SHA
    29a06b2 View commit details
    Browse the repository at this point in the history
  2. grub: support overriding network kcmdline args

    This allows us to set network kcmdline args by setting the
    ignition_network_kcmdline variable inside the ignition.firstboot
    file that resides on the /boot/ filesystem and triggers ignition
    run on boot.
    
    This functionality will allow the coreos-installer to promote static
    networking arguments that were used during the installer run to the
    first boot of the real system. After that they are no longer needed
    as ignition can configure networking as requested by the user.
    dustymabe committed Mar 22, 2019
    Configuration menu
    Copy the full SHA
    a65ec16 View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#65 from dustymabe/dusty

    grub: support overriding network kcmdline args
    dustymabe committed Mar 22, 2019
    Configuration menu
    Copy the full SHA
    2b47c9c View commit details
    Browse the repository at this point in the history

Commits on Mar 25, 2019

  1. 30ignition: drop check for coreos.oem.id

    coreos-assembler is going to pass both keys during the transition
    period, so we don't need to check them both here.
    bgilbert committed Mar 25, 2019
    Configuration menu
    Copy the full SHA
    3410879 View commit details
    Browse the repository at this point in the history
  2. 30ignition: ignore coreos.randomize_disk_guid

    The 30disk-uuid module never made it over from bootengine, and it's not
    clear that we want it.  Don't break boot if coreos.randomize_disk_guid
    is requested.
    bgilbert committed Mar 25, 2019
    Configuration menu
    Copy the full SHA
    047a5e9 View commit details
    Browse the repository at this point in the history
  3. dracut/30ignition: Explicitly add OnFailure=emergency.target

    Right now, we enable our services by adding a link in
    `initrd.target.requires`. However, it seems like systemd doesn't
    necessarily fail the boot even if `initrd.target` fails. That unit has:
    
        OnFailure=emergency.target
        OnFailureJobMode=replace-irreversibly
    
    But looking at the logs, it seems like that can get overridden by the
    `systemctl isolate initrd-switch-root.target` call that
    `initrd-cleanup.service` does.
    
    Let's just be really explicit here and tell systemd we want to
    immediately switch to `emergency.target` if any of our units fail.
    jlebon committed Mar 25, 2019
    Configuration menu
    Copy the full SHA
    3d2e165 View commit details
    Browse the repository at this point in the history
  4. dracut/30ignition: Add mount stage and drop OSTree-specific bits

    Add support for the new Ignition `mount` and `umount` stages. The
    `mount` stage runs *after* the `disks` stage and
    `initrd-root-fs.target`, since we need to be able to mount under
    `/sysroot`, but *before* the `files` stage, which will of course drop
    files under those mounts.
    
    Combined with coreos/fedora-coreos-config#70,
    this allows us to drop all OSTree-specific bits and no longer rely on
    `ostree-prepare-root.service` to mount `/var` for us.
    jlebon committed Mar 25, 2019
    Configuration menu
    Copy the full SHA
    852008f View commit details
    Browse the repository at this point in the history

Commits on Mar 26, 2019

  1. Merge pull request coreos#67 from bgilbert/cleanups

    30ignition: minor cleanups
    bgilbert committed Mar 26, 2019
    Configuration menu
    Copy the full SHA
    9f4f75f View commit details
    Browse the repository at this point in the history
  2. dracut: add CoreOS integration services

    This module is the integration point between Ignition and Fedora CoreOS.
    Notably, we add two new systemd services in the initrd which mesh with
    Ignition's own systemd services:
    
    1. `coreos-mount-var.service`, which finds the `/var` stateroot bind
       mount and mounts it under `/sysroot/var` before `ignition-mount`
       potentially adds more mounts underneath (or even shadowing `/var`
       itself).
    2. `coreos-populate-var.service`, which sets up `/var` on first boot
       using `systemd-tmpfiles` before `ignition-files` runs.
    
    NOTE: this is a temporary holding place to make packaging easier.
    Eventually, we will move this module to the FCOS overlay:
    coreos/fedora-coreos-config#70
    jlebon committed Mar 26, 2019
    Configuration menu
    Copy the full SHA
    fd25475 View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#47 from jlebon/pr/mount-umount

    Add mount and umount service units
    ajeddeloh committed Mar 26, 2019
    Configuration menu
    Copy the full SHA
    ec9a492 View commit details
    Browse the repository at this point in the history

Commits on Apr 3, 2019

  1. module_setup: include cdrom rules for openstack

    The Ignition openstack platform needs to be able to read from a virtual
    cdrom and needs to include the uedv rules to create the symlink. Add
    those rules.
    Andrew Jeddeloh committed Apr 3, 2019
    Configuration menu
    Copy the full SHA
    45b8d51 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#71 from ajeddeloh/add-cdrom-rules

    module_setup: include cdrom rules for openstack
    jlebon committed Apr 3, 2019
    Configuration menu
    Copy the full SHA
    8156402 View commit details
    Browse the repository at this point in the history

Commits on Apr 4, 2019

  1. dracut/30ignition: order ignition-complete.target before initrd.target

    I think this was the missing piece in the issues described in coreos#61.
    Essentially, `ignition-complete.target` wasn't explicitly ordered wrt to
    `initrd.target`, so its completion was racing against system's `isolate`
    to `initrd-switch-root.target`.
    
    Ordering ourselves before `initrd.target` (which is also the unit that
    pulls us in through `initrd.target.requires`) ensures that the target
    can only be reached successfully if we're successful. And if our target
    fails, then we immediately trigger `emergency.target`.
    jlebon committed Apr 4, 2019
    Configuration menu
    Copy the full SHA
    50d1830 View commit details
    Browse the repository at this point in the history
  2. dracut/30ignition: add missing Before= for mount unit

    This is already the case from the fact that it runs before the files
    stage, but just to be explicit, let's make sure all of Ignition's own
    systemd units have `Before=ignition-complete.target` so it's clear that
    all Ignition units must successfully complete for that target to be
    considered reached.
    jlebon committed Apr 4, 2019
    Configuration menu
    Copy the full SHA
    2591950 View commit details
    Browse the repository at this point in the history
  3. dracut/30ignition: re-order directives in remount-sysroot

    This is mostly cosmetic, but it helps make it easy to see that all the
    Ignition units follow the same standard header.
    jlebon committed Apr 4, 2019
    Configuration menu
    Copy the full SHA
    499e086 View commit details
    Browse the repository at this point in the history
  4. dracut/30ignition: order ExecStop= units before initrd-switch-root.ta…

    …rget
    
    The way `isolate` works is interesting. When systemd does
    `systemctl isolate initrd-switch-root.target`, it does two things: (1)
    enqueue stop jobs for all the services not required for the new target,
    and (2) enqueue start jobs for all the services required for the new
    target.
    
    However, there is no default ordering between the stop jobs and start
    jobs. One would think that systemd by default would first stop all the
    services, and only then starts the new services. That is not the case
    (see [1] and [2]).
    
    We need to explicitly tell systemd that we want our services to be
    stopped first before starting the new services. The way to do this is to
    add an explicit `Before=initrd-switch-root.target` in the units (see
    [1]). Otherwise, the `ExecStop` in `coreos-mount-var.service` and
    `ignition-mount.service` may not run before the switch root.
    
    (Note systemd does serialize its state across the reexec, but it seems
    like it doesn't correctly resume the "stop" jobs, presumably because it
    can't access the systemd units anymore. Regardless, we definitely want
    to umount everything before the switchroot anyway).
    
    Closes: coreos#70
    
    [1] https://systemd-devel.freedesktop.narkive.com/wb1UNand
    [2] systemd/systemd#3436
    jlebon committed Apr 4, 2019
    Configuration menu
    Copy the full SHA
    803fee8 View commit details
    Browse the repository at this point in the history
  5. dracut/30ignition: add OnFailure= for ExecStop= services

    We need these to make sure that failures during `ExecStop=` result in
    failing the boot. For details, see discussions in:
    coreos/ignition-dracut#72
    jlebon committed Apr 4, 2019
    Configuration menu
    Copy the full SHA
    bf24381 View commit details
    Browse the repository at this point in the history

Commits on Apr 5, 2019

  1. Merge pull request coreos#72 from jlebon/pr/fix-umount

    Clean up switching to emergency on error and fix ExecStop= race condition
    jlebon committed Apr 5, 2019
    Configuration menu
    Copy the full SHA
    0019df3 View commit details
    Browse the repository at this point in the history
  2. dracut/30ignition: link to RHBZ in ignition-complete

    We shouldn't actually need to do `OnFailure=emergency.target` in
    `ignition-complete.service` here. Our unit is already a requirement of
    `initrd.target`, and so once we fail, `initrd.target` should fail, which
    in turn should trigger *its* `OnFailure=emergency.target`.
    
    However, this doesn't work in f29/el8:
    https://bugzilla.redhat.com/show_bug.cgi?id=1696796
    
    Add a comment about that.
    
    See also: coreos/ignition-dracut#61
    jlebon committed Apr 5, 2019
    Configuration menu
    Copy the full SHA
    549002e View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#74 from jlebon/pr/add-comment

    dracut/30ignition: link to RHBZ in ignition-complete
    jlebon committed Apr 5, 2019
    Configuration menu
    Copy the full SHA
    85f2e65 View commit details
    Browse the repository at this point in the history

Commits on May 3, 2019

  1. 30ignition: drop CoreOS specific bits

    Now that things are calmer, let's finish what we started and completely
    excise the CoreOS-specific services from this repo.
    jlebon committed May 3, 2019
    Configuration menu
    Copy the full SHA
    df88988 View commit details
    Browse the repository at this point in the history

Commits on Jun 14, 2019

  1. dracut: add 99emergency-timeout

    If Ignition fails, instead of immediately dropping to an emergency
    shell, output a message indicating that Ignition failed and point
    to ignition-validate. Offer to drop to an emergency shell if the
    user presses Enter. If the user doesn't respond in 5 minutes,
    reboot to try again. While waiting for the timeout, keep updating
    the prompt with the time remaining until reboot.
    
    Brought forward from the `99emergency-timeout` dracut module
    present in Container Linux, with minor modifications:
    https://github.com/coreos/bootengine/tree/c691205c0046e3828a8536d553aea7307ca3abee/dracut/99emergency-timeout
    
    Closes: coreos#35
    Robert Fairley committed Jun 14, 2019
    Configuration menu
    Copy the full SHA
    fe96725 View commit details
    Browse the repository at this point in the history

Commits on Jun 25, 2019

  1. Merge pull request coreos#85 from rfairley/rfairley-ignition-failure

    dracut: add 99emergency-timeout
    rfairley committed Jun 25, 2019
    Configuration menu
    Copy the full SHA
    8551bc7 View commit details
    Browse the repository at this point in the history

Commits on Jul 16, 2019

  1. grub: drop 02_ignition_firstboot

    Now that FCOS no longer regenerates GRUB2 configs, this logic was moved
    to the static one in coreos-assembler:
    
    coreos/coreos-assembler#616
    jlebon committed Jul 16, 2019
    Configuration menu
    Copy the full SHA
    f968140 View commit details
    Browse the repository at this point in the history

Commits on Aug 5, 2019

  1. dracut/30ignition: scramble disk uuid on 1st boot

    Require that we scramble the guid and fix the gpt header before running
    ignition.
    Andrew Jeddeloh committed Aug 5, 2019
    Configuration menu
    Copy the full SHA
    1f4ef8e View commit details
    Browse the repository at this point in the history

Commits on Aug 6, 2019

  1. Merge pull request coreos#93 from ajeddeloh/fix-var

    randomize the disk guid and fix the gpt header on boot
    cgwalters committed Aug 6, 2019
    Configuration menu
    Copy the full SHA
    6eee792 View commit details
    Browse the repository at this point in the history
  2. ignition: split ignition-setup into base and user

    Split ignition-setup into two units/scripts. This allows other distros
    to override how we fetch user configs without changing how we fetch the
    base config.
    Andrew Jeddeloh committed Aug 6, 2019
    Configuration menu
    Copy the full SHA
    e098a6b View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#92 from ajeddeloh/split-boot-units

    ignition: split ignition-setup into base and user
    cgwalters committed Aug 6, 2019
    Configuration menu
    Copy the full SHA
    7f83fa0 View commit details
    Browse the repository at this point in the history
  4. dracut/30ignition: fix typo in module_setup

    Given that this isn't causing errors there's probably something else
    pulling it in by the correct name, but we ought to include it here as
    well for clarity's sake.
    Andrew Jeddeloh committed Aug 6, 2019
    Configuration menu
    Copy the full SHA
    8b7f1a2 View commit details
    Browse the repository at this point in the history
  5. Merge pull request coreos#95 from ajeddeloh/fix-typo

    dracut/30ignition: fix typo in module_setup
    Andrew Jeddeloh committed Aug 6, 2019
    Configuration menu
    Copy the full SHA
    343b886 View commit details
    Browse the repository at this point in the history

Commits on Aug 21, 2019

  1. ignition: fix correct device path when randomizing UUID

    The correct path is /dev/disk/by-label/root.
    
    Signed-off-by: Tuan Hoang <tmhoang@linux.ibm.com>
    tuan-hoang1 committed Aug 21, 2019
    Configuration menu
    Copy the full SHA
    3a7911b View commit details
    Browse the repository at this point in the history

Commits on Aug 22, 2019

  1. Merge pull request coreos#100 from tuan-hoang1/fix-partlabel

    ignition: fix correct device path when randomizing UUID
    Andrew Jeddeloh committed Aug 22, 2019
    Configuration menu
    Copy the full SHA
    9330616 View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2019

  1. Configuration menu
    Copy the full SHA
    9c60150 View commit details
    Browse the repository at this point in the history

Commits on Aug 30, 2019

  1. update-bootengine: drop file

    ignition-dracut doesn't use it.
    bgilbert committed Aug 30, 2019
    Configuration menu
    Copy the full SHA
    5a78e77 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#101 from bgilbert/bootengine

    update-bootengine: drop file
    dustymabe committed Aug 30, 2019
    Configuration menu
    Copy the full SHA
    b911126 View commit details
    Browse the repository at this point in the history

Commits on Sep 10, 2019

  1. README.md: fix download link

    spaced authored and jlebon committed Sep 10, 2019
    Configuration menu
    Copy the full SHA
    19a6ab3 View commit details
    Browse the repository at this point in the history

Commits on Sep 16, 2019

  1. 30ignition: conditionally enable units requiring a boot disk

    Add ignition-diskful.target, containing units that expect a writable
    boot disk.  Enable it from the generator unless there's a command
    "is-live-image" which returns 0.
    bgilbert committed Sep 16, 2019
    Configuration menu
    Copy the full SHA
    6ea3fab View commit details
    Browse the repository at this point in the history
  2. systemd: don't try to mark live boots complete

    In live boots there's no /boot partition with a flag file to remove.
    bgilbert committed Sep 16, 2019
    Configuration menu
    Copy the full SHA
    eb48c18 View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#102 from bgilbert/live

    Conditionalize units which require a boot disk
    bgilbert committed Sep 16, 2019
    Configuration menu
    Copy the full SHA
    cbac371 View commit details
    Browse the repository at this point in the history
  4. 30ignition: fix double slash in ignition-setup-* dest paths

    Minor cleanup; should have no functional consequences.
    bgilbert committed Sep 16, 2019
    Configuration menu
    Copy the full SHA
    76246ca View commit details
    Browse the repository at this point in the history

Commits on Sep 18, 2019

  1. 30ignition: make ignition-diskful a dependency of ignition-complete

    Minor cleanup, with no intended functional change.
    bgilbert committed Sep 18, 2019
    Configuration menu
    Copy the full SHA
    ef73508 View commit details
    Browse the repository at this point in the history
  2. 30ignition: on live images, read config.ign from custom initrd

    Allow the user to append a custom initrd containing /config.ign, and
    have ignition-setup-user copy it into place.  This means
    ignition-setup-user.service needs to Require the boot device only on
    diskful boots, so we need to generate that dependency in
    ignition-generator.
    bgilbert committed Sep 18, 2019
    Configuration menu
    Copy the full SHA
    3b0f845 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    526081f View commit details
    Browse the repository at this point in the history
  4. Merge pull request coreos#105 from bgilbert/live2

    On live images, read config.ign from custom initrd
    bgilbert committed Sep 18, 2019
    Configuration menu
    Copy the full SHA
    1e959d1 View commit details
    Browse the repository at this point in the history

Commits on Sep 23, 2019

  1. Makefile: New file implementing make install

    See https://github.com/cgwalters/build-api
    
    With this for example, we can just have the Fedora spec file do
    `make install DESTDIR=$RPM_BUILD_ROOT` just like everything else;
    helping to ensure that as much logic as possible remains upstream.
    
    Mainly I want this for hacking so I can just
    `make install DESTDIR=/srv/walters/fcos/overrides/rootfs`
    without building an RPM or copying files manually.
    cgwalters authored and jlebon committed Sep 23, 2019
    Configuration menu
    Copy the full SHA
    f06c020 View commit details
    Browse the repository at this point in the history
  2. Add RemainAfterExit=yes to systemd units of Type=oneshot

    Omitting this can cause the unit to be executed multiple
    times if it's a dependency of another unit (as these are).
    
    See ostreedev/ostree#1697
    and https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750683
    cgwalters committed Sep 23, 2019
    Configuration menu
    Copy the full SHA
    d166d3a View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#109 from cgwalters/remain

    Add RemainAfterExit=yes to systemd units of Type=oneshot
    cgwalters committed Sep 23, 2019
    Configuration menu
    Copy the full SHA
    db047c6 View commit details
    Browse the repository at this point in the history

Commits on Sep 24, 2019

  1. 30ignition: fix sequencing of target dependencies

    Ensure dependencies of a target are sequenced Before the target so
    failures correctly propagate to the target.
    bgilbert committed Sep 24, 2019
    Configuration menu
    Copy the full SHA
    af358bb View commit details
    Browse the repository at this point in the history
  2. 30ignition: drop OnFailure handler from ignition-diskful.target

    Failures are correctly propagating to the OnFailure handler of
    ignition-complete.target.
    bgilbert committed Sep 24, 2019
    Configuration menu
    Copy the full SHA
    496d72e View commit details
    Browse the repository at this point in the history
  3. dracut: Add an ignition-fetch.service

    This invokes the new `fetch` stage which does just that - fetch
    the Ignition config into `/run/ignition.json` and nothing else.
    
    Prep for adding support for redeploying the rootfs, which is
    an expensive process, so we only want to do it if the fetched
    Ignition config is replacing the `rootfs`.
    cgwalters committed Sep 24, 2019
    Configuration menu
    Copy the full SHA
    d63f76f View commit details
    Browse the repository at this point in the history

Commits on Sep 25, 2019

  1. Merge pull request coreos#110 from cgwalters/fetch-stage

    dracut: Add an ignition-fetch.service
    cgwalters committed Sep 25, 2019
    Configuration menu
    Copy the full SHA
    aada644 View commit details
    Browse the repository at this point in the history

Commits on Oct 1, 2019

  1. 30ignition: update ignition-complete.target OnFailure comment

    Overriding initrd.target to OnFailureJobMode=isolate avoids the problem.
    I don't think we actually want to do that, and the workaround is
    localized to one unit now, so let's just update the comment.
    bgilbert committed Oct 1, 2019
    Configuration menu
    Copy the full SHA
    a40e3ea View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#111 from bgilbert/live3

    30ignition: Failure handling improvements
    bgilbert committed Oct 1, 2019
    Configuration menu
    Copy the full SHA
    07cb575 View commit details
    Browse the repository at this point in the history
  3. Run ignition-disks earlier to avoid race condition

    Make sure to run before the file system checks, as sgdisk will trigger
    udev events, potentially resulting in race conditions due to disappearing
    devices. Executing earlier will avoid this (and hopefully similar) problems.
    
    Fixes coreos#114.
    laenion committed Oct 1, 2019
    Configuration menu
    Copy the full SHA
    4cdd024 View commit details
    Browse the repository at this point in the history
  4. Merge pull request coreos#116 from laenion/master

    Run ignition-disks earlier to avoid race condition
    Andrew Jeddeloh committed Oct 1, 2019
    Configuration menu
    Copy the full SHA
    cefb71c View commit details
    Browse the repository at this point in the history

Commits on Oct 23, 2019

  1. ignition-firstboot-complete.service: Run as part of basic.target

    See: openshift/installer#2554
    
    Basically the OpenShift installer on vSphere injects a service which reboots
    the first time, but I believe this could easily race with `ignition-firstboot-complete`.
    
    Let's mark the boot complete much earlier.
    cgwalters committed Oct 23, 2019
    Configuration menu
    Copy the full SHA
    598bbdd View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#124 from cgwalters/firstboot-complete-early

    ignition-firstboot-complete.service: Run as part of basic.target
    miabbott committed Oct 23, 2019
    Configuration menu
    Copy the full SHA
    9a25a5e View commit details
    Browse the repository at this point in the history

Commits on Oct 31, 2019

  1. Add ignition-subsequent.target for non-Ignition boots

    This is needed for Fedora CoreOS work on reprovisioning
    the rootfs.  We tried to split out a systemd unit to handle
    mounting the root in this commit:
    coreos/fedora-coreos-config@a6fe374
    with `ignition-ostree-mount-sysroot.service` but the problem
    is that needs to have different dependencies/ordering if we're
    doing the "Ignition boot" versus a "subsequent" boot.
    
    Add a new target that's queued up if we detect we're doing
    a "subsequent" boot.
    cgwalters authored and jlebon committed Oct 31, 2019
    Configuration menu
    Copy the full SHA
    3d08487 View commit details
    Browse the repository at this point in the history

Commits on Nov 4, 2019

  1. coreos-gpt-setup: workaround old lsblk not having PTUUID

    lsblk doesn't have PTUUID in the version on RHEL 8, but we
    can get it from blkid.
    dustymabe committed Nov 4, 2019
    Configuration menu
    Copy the full SHA
    207b575 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#133 from dustymabe/dusty

    coreos-gpt-setup: workaround old lsblk not having PTUUID
    dustymabe committed Nov 4, 2019
    Configuration menu
    Copy the full SHA
    fed8422 View commit details
    Browse the repository at this point in the history

Commits on Nov 6, 2019

  1. firstboot-complete: tell zipl to run

    zipl records need to be updated, because ignition.firstboot is burned
    into target disk during coreos-installer
    
    As a short-term solution for:
    coreos/ignition-dracut#84
    
    Depends on:
    ibm-s390-linux/s390-tools#71
    ibm-s390-linux/s390-tools#74
    
    Related:
    coreos/coreos-installer#61
    coreos/coreos-assembler#780
    tuan-hoang1 authored and jlebon committed Nov 6, 2019
    Configuration menu
    Copy the full SHA
    38af701 View commit details
    Browse the repository at this point in the history

Commits on Nov 7, 2019

  1. 30ignition/ignition-setup-user: mount /boot partition ro

    We don't actually need write access to `/boot` here to pull out any
    baked Ignition config. Just mount it read-only.
    
    This also helps in the case where any other service is concurrently also
    mounting `/boot`: trying to mount a device as read-write that's already
    mounted read-only elsewhere will fail. I hit this when playing with FIPS
    mode, which does this:
    
    https://github.com/dracutdevs/dracut/blob/718aefda1374c7b6c3790b08cae27fd6bde505af/modules.d/01fips/fips.sh#L49
    jlebon committed Nov 7, 2019
    Configuration menu
    Copy the full SHA
    e96e7fc View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#134 from jlebon/pr/mount-ro

    30ignition/ignition-setup-user: mount /boot partition ro
    cgwalters committed Nov 7, 2019
    Configuration menu
    Copy the full SHA
    d9e8a63 View commit details
    Browse the repository at this point in the history

Commits on Nov 27, 2019

  1. 30ignition: add setfiles

    This is required by the new relabeling code in Ignition:
    coreos#846
    
    (This is another good example of why merging this repo into
    coreos/ignition would be nicer I think.)
    jlebon committed Nov 27, 2019
    Configuration menu
    Copy the full SHA
    f6b3c1b View commit details
    Browse the repository at this point in the history

Commits on Dec 5, 2019

  1. Add ConditionPathExists=/etc/initrd-release to targets

    I noticed that several of our units appeared to run twice, including
    `ignition-files.service` (!) and `ignition-ostree-mount-firstboot-sysroot.service`.
    
    [Later investigation revealed this was actually a double-logging
    issue.]
    
    Looking deeper into this, I discovered a bit of the initrd that
    I didn't even know existed, which is `initrd-parse-etc.service`
    that actually runs `ExecStart=-/usr/bin/systemctl --no-block start initrd-fs.target`
    *post* switch root, after services that are part of that target
    have already run (and then been shut down).
    
    This adds a big wrinkle to my understanding of system bootup.
    
    Then I noticed that `initrd-fs.target` has:
    `ConditionPathExists=/etc/initrd-release`
    which will be false post-switchroot.
    
    The semantics here are...strange.  It seems like the goal is to ensure
    that the rootfs is definitely still mounted, perhaps in
    very complex rootfs scenarios?  In our case it will still be
    mounted, we definitely don't want to rerun any of our Ignition
    units.
    
    [We discovered the units aren't actually being rerun, but
     this still seems like a best practice]
    cgwalters committed Dec 5, 2019
    Configuration menu
    Copy the full SHA
    8800e42 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#140 from cgwalters/no-rerun-switchroot

    Add ConditionPathExists=/etc/initrd-release to targets
    cgwalters committed Dec 5, 2019
    Configuration menu
    Copy the full SHA
    8168e4c View commit details
    Browse the repository at this point in the history

Commits on Dec 6, 2019

  1. units: add ConditionPathExists=/etc/initrd-release everywhere

    This is standard practice for units that are only meant to run in the
    initrd. It matches what e.g. `systemd` does for its initrd units. See
    also: coreos/ignition-dracut#140.
    
    I also snuck in `Documentation=` lines in there.
    jlebon committed Dec 6, 2019
    Configuration menu
    Copy the full SHA
    736459e View commit details
    Browse the repository at this point in the history

Commits on Dec 9, 2019

  1. README.md: add details about the branches here

    Make it easier to understand what the branches are and how they relate
    to FCOS/RHCOS.
    jlebon committed Dec 9, 2019
    Configuration menu
    Copy the full SHA
    ab53b21 View commit details
    Browse the repository at this point in the history

Commits on Dec 11, 2019

  1. dracut: add some bins for s390x zVM instalation

    To support coreos#865
    
    Reported-by: XiaoMeiZheng <xmzheng@cn.ibm.com>
    tuan-hoang1 authored and jlebon committed Dec 11, 2019
    Configuration menu
    Copy the full SHA
    c4790bc View commit details
    Browse the repository at this point in the history

Commits on Jan 7, 2020

  1. Make setfiles optional

    setfiles is only required on systems using SELinux.
    laenion authored and jlebon committed Jan 7, 2020
    Configuration menu
    Copy the full SHA
    e490517 View commit details
    Browse the repository at this point in the history

Commits on Jan 22, 2020

  1. Merge pull request coreos#91 from jlebon/pr/drop-grub

    grub: drop 02_ignition_firstboot
    cgwalters committed Jan 22, 2020
    Configuration menu
    Copy the full SHA
    f58f29c View commit details
    Browse the repository at this point in the history

Commits on Jan 27, 2020

  1. Makefile: Remove grub/ install bits

    `make install` was failing now that the grub bits are gone.
    cgwalters committed Jan 27, 2020
    Configuration menu
    Copy the full SHA
    c46a7ae View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#150 from cgwalters/fix-makeinstall

    Makefile: Remove grub/ install bits
    cgwalters committed Jan 27, 2020
    Configuration menu
    Copy the full SHA
    ef08dd5 View commit details
    Browse the repository at this point in the history

Commits on Jan 30, 2020

  1. Add ignition-diskful-subsequent.target

    This target is a combination of `ignition-subsequent.target` and
    `ignition-diskful.target` - units here should only run when we have a
    boot disk and *aren't* doing the first boot.
    
    This came out of discussion in
    coreos/fedora-coreos-config#271
    
    Will be used by FCOS.
    
    Suggested-by: @jlebon
    cgwalters authored and jlebon committed Jan 30, 2020
    Configuration menu
    Copy the full SHA
    14808e2 View commit details
    Browse the repository at this point in the history

Commits on Feb 18, 2020

  1. Hook up to CoreOS CI

    This is the first repo that we hook up to the new CoreOS CI interface.
    And it's sorely needed too, since patches here can easily result in
    broken boots.
    jlebon committed Feb 18, 2020
    Configuration menu
    Copy the full SHA
    16bd0c4 View commit details
    Browse the repository at this point in the history

Commits on Mar 23, 2020

  1. Remove obsolete dependencies

    Dracut pulling in several binaries as dependencies which have long been
    replaced by native implementations or other mechanisms.
    laenion committed Mar 23, 2020
    Configuration menu
    Copy the full SHA
    09bed78 View commit details
    Browse the repository at this point in the history
  2. Declare external applications as optional

    The Ignition configuration supports quite a few features, from setting the
    user password over adding systemd services to creating partitions. For a lot of
    these features external helper applications are called. However not all of
    these configuration options are available or make sense on all systems - the
    current code for example lists mkfs.btrfs as an optional dependency, but
    mkfs.ext4 is declared as mandatory.
    
    This is not consistent, so only add those dependencies as mandatory which are
    required for Ignition to start / process an empty configuration file. All the
    other applications are declared as optional.
    
    If the Ignition configuration is using a feature where the helper application
    is not installed in the initrd it will boil out with an error.
    laenion committed Mar 23, 2020
    Configuration menu
    Copy the full SHA
    649be85 View commit details
    Browse the repository at this point in the history

Commits on Mar 24, 2020

  1. Merge pull request coreos#160 from laenion/dracut_dependency_cleanup

    Dracut dependency cleanup
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    beaece1 View commit details
    Browse the repository at this point in the history
  2. add coreos-teardown-initramfs-network.service

    This is a forward port of coreos-teardown-initramfs-network.service
    from the spec2x branch [1] (used for RHEL CoreOS). When moving to NM
    in the initrd [2] we decided that we also needed a mechanism to take down
    the networking between the initramfs and the real root. While we would
    like to use NetworkManager's logic to do this operation in the future
    it's currently not easily achieved because NetworkManager is not running
    persistently in the initramfs [3].
    
    [1] coreos/ignition-dracut#78
    [2] coreos/fedora-coreos-tracker#394
    [3] https://bugzilla.redhat.com/show_bug.cgi?id=1814038
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    8bdbbbe View commit details
    Browse the repository at this point in the history
  3. coreos-teardown-initramfs-network: refactor into more functions

    This will make it easier for us to add a bit more code into this
    file.
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    70c7cd5 View commit details
    Browse the repository at this point in the history
  4. coreos-teardown-initramfs-network: also propagate initramfs networkin…

    …g if desired
    
    The policy here is:
    
       - If a networking configuration was provided before this point
         (most likely via Ignition) and exists in the real root then
         we do nothing and don't propagate any initramfs networking.
       - If a user did not provide any networking configuration
         then we'll propagate the initramfs networking configuration
         into the real root.
    
    See coreos/fedora-coreos-tracker#394 (comment)
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    0d219cb View commit details
    Browse the repository at this point in the history
  5. coreos-teardown-initramfs-network: remove state files on switch

    Remove the removal of the `/tmp/net.$1.did-setup` (used by
    network-legacy dracut module) and start removing files under
    /run/NetworkManager/ instead.
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    e0efb09 View commit details
    Browse the repository at this point in the history
  6. coreos-teardown-initramfs-network: take down teams as well

    down_teams() is a placeholder for now to remind us that teams do
    exist and need to be considered. If we find things that need to be
    done then we'll add actions to do in the down_teams() function in
    the future.
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    42b2f06 View commit details
    Browse the repository at this point in the history
  7. coreos-teardown-initramfs-network: take down routes too

    On recommendation from the NM team let's take down routes as well.
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    03b0035 View commit details
    Browse the repository at this point in the history
  8. coreos-teardown-initramfs-network: simplify networking takedown

    On recommendation from the NM team let's try to delete the device
    first and if that doesn't work then set it to down and flush any
    associated addresses. Deleting virtual devices (bonds, teams, bridges,
    ip-tunnels, etc) will clean up any associated kernel resources, so
    this makes the logic for bringing down these devices easier. A real
    device can't be deleted so that will fail and we'll fallback to setting
    it down and flushing addresses.
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    38c1c35 View commit details
    Browse the repository at this point in the history
  9. coreos-teardown-initramfs-network: enable the service statically

    Since we have ignition-complete.target we don't need to use the
    generator to enable the unit.
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    89f2673 View commit details
    Browse the repository at this point in the history
  10. Merge pull request coreos#159 from dustymabe/dusty-network

    add coreos-teardown-initramfs-network.service
    dustymabe committed Mar 24, 2020
    Configuration menu
    Copy the full SHA
    f67d587 View commit details
    Browse the repository at this point in the history

Commits on Mar 25, 2020

  1. Add basename dependency to dracut module

    Required by coreos-teardown-initramfs-network.service
    laenion authored and jlebon committed Mar 25, 2020
    Configuration menu
    Copy the full SHA
    ea3bdc9 View commit details
    Browse the repository at this point in the history

Commits on Mar 27, 2020

  1. Add ignition-virtio-dump-journal.service

    Debugging failures in the initrd is annoying; this code
    looks for a virtio-serial port named `com.coreos.ignition.journal`,
    and runs as part of `emergency.target`.
    
    I plan to change mantle to set up this port by default, so if
    something fails in the initramfs we'll at least reliably get
    the journal in a sane parsable format.
    
    This is a special targeted subset of
    coreos#585
    cgwalters committed Mar 27, 2020
    Configuration menu
    Copy the full SHA
    84c89f4 View commit details
    Browse the repository at this point in the history

Commits on Mar 30, 2020

  1. coreos-teardown-initramfs-network: remove After=ignition-files.service

    This isn't needed because the meat of this unit runs in the ExecStop.
    dustymabe committed Mar 30, 2020
    Configuration menu
    Copy the full SHA
    c44670a View commit details
    Browse the repository at this point in the history
  2. coreos-teardown-initramfs-network: order ExecStop after other ignitio…

    …n units
    
    We want to run the teardown after all other Ignition stages
    have run because some platforms (like Packet) do remote status
    reporting for each Ignition stage. Since we are tearing down
    the networking using an ExecStop we need to make sure we run
    the ExecStop *after* any other ignition*.service unit's ExecStop.
    The only other one right now is ignition-mount that has an ExecStop
    for doing an unmount. Since the ordering for ExecStop is the
    opposite of ExecStart we need to use `Before=ignition-mount.service`.
    
    Partial fix for coreos/fedora-coreos-tracker#440
    
    This would most likely not be necessary if Ignition cached an
    empty result: coreos#950
    dustymabe committed Mar 30, 2020
    Configuration menu
    Copy the full SHA
    ded5d30 View commit details
    Browse the repository at this point in the history
  3. Merge pull request coreos#163 from dustymabe/dusty-teardown-ordering

    coreos-teardown-initramfs-network: order ExecStop after other ignition units
    dustymabe committed Mar 30, 2020
    Configuration menu
    Copy the full SHA
    793d0ef View commit details
    Browse the repository at this point in the history

Commits on Mar 31, 2020

  1. Merge pull request coreos#146 from cgwalters/failure-qemu-dump

    Add ignition-virtio-dump.service
    cgwalters committed Mar 31, 2020
    Configuration menu
    Copy the full SHA
    6136be3 View commit details
    Browse the repository at this point in the history

Commits on Apr 23, 2020

  1. coreos-teardown-initramfs-network: do SELinux relabel on copied files

    The files in the real root ended up with unlabled_t file context. I'm
    suprised we didn't see any issues with this before. Let's fix it now.
    dustymabe committed Apr 23, 2020
    Configuration menu
    Copy the full SHA
    b1604e9 View commit details
    Browse the repository at this point in the history
  2. coreos-teardown-initramfs-network: also skip local loopback interface

    Not skipping it means that we get an extra error message in our output
    during bootup. Let's skip it.
    dustymabe committed Apr 23, 2020
    Configuration menu
    Copy the full SHA
    70c2792 View commit details
    Browse the repository at this point in the history
  3. coreos-teardown-initramfs-network: consider ifcfg files in real root …

    …for RHCOS
    
    For RHCOS we still support ifcfg files so let's consider the ifcfg
    directory (/sysroot/etc/sysconfig/network-scripts/) when checking to see
    if a user has provided networking configuration via Ignition.
    dustymabe committed Apr 23, 2020
    Configuration menu
    Copy the full SHA
    2cb06d6 View commit details
    Browse the repository at this point in the history
  4. coreos-teardown-initramfs-network: support coreos.no_persist_ip karg

    Add coreos.no_persist_ip to allow for explicitly disabling the network
    config propagation. This is supported on the spec2x branch of
    ignition-dracut (i.e. for RHCOS) right now so we might as well have
    it in the master branch so we can keep the maintenance burden lower.
    
    Note that this adds two new functions load_dracut_libs() and
    dracut_func(). We needed to create these new functions in order to
    wrap in set +/- euo pipefail because dracut was written with set -eu
    in mind and there are unset variables and commands that fail in a
    lot of places.
    dustymabe committed Apr 23, 2020
    Configuration menu
    Copy the full SHA
    0665bbe View commit details
    Browse the repository at this point in the history
  5. coreos-teardown-initramfs-network: also propagate hostname

    This is a forward port of 1f8184e (coreos#156). If the admin specified
    a hostname in the ip= karg static networking config and no hostname
    was specified via Ignition then we'll make sure the hostname from
    the ip= karg gets applied to the real root (persistently).
    
    Ideally in the future there will be better support for this in
    NetworkManager itself as the `network-legacy` dracut module did
    at least provide more support for setting the hostname via ip=
    kargs than `network-manager` currently does. The discussion
    about this problem is in [1]. The fix for that will most likely
    implicate changes to the propagation code introduced here.
    
    Fixes: coreos/fedora-coreos-tracker#466
    
    [1] https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/419
    dustymabe committed Apr 23, 2020
    Configuration menu
    Copy the full SHA
    d6805df View commit details
    Browse the repository at this point in the history
  6. Merge pull request coreos#174 from dustymabe/dusty-teardown-network-i…

    …mprovements
    
    coreos-teardown-initramfs-network: propagate hostname, support coreos.no_persist_ip
    dustymabe committed Apr 23, 2020
    Configuration menu
    Copy the full SHA
    390779d View commit details
    Browse the repository at this point in the history

Commits on Apr 30, 2020

  1. dracut: add logging to systemd generator

    Outputting stdout and stderr to /dev/kmsg is the only option for
    logging for generators for now. Let's start using it so we can at
    least get some messages if we ever have problems with one of our
    generators.
    dustymabe committed Apr 30, 2020
    Configuration menu
    Copy the full SHA
    accb795 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#177 from dustymabe/dusty-systemd-generator

    dracut: add logging to systemd generator
    dustymabe committed Apr 30, 2020
    Configuration menu
    Copy the full SHA
    c4bba64 View commit details
    Browse the repository at this point in the history

Commits on May 1, 2020

  1. coreos-teardown-initramfs-network: don't run when emergency.target

    If another unit failed (like ignition-fetch.service) then don't run
    the ExecStop when isolating to emergency.target. We can do this by
    setting IgnoreOnIsolate=true.
    
    Otherwise you end up with errors like the following in the logs,
    which can lead someone investigating a problem in the wrong direction.
    
    ```
    Stopping Tear down initramfs networking...
    info: taking down network device: eth0
    RTNETLINK answers: Operation not supported
    info: flushing all routing
    info: no initramfs hostname information to propagate
    ls: cannot access '/sysroot/etc/NetworkManager/system-connections/': No such file or directory
    ls: cannot access '/sysroot/etc/sysconfig/network-scripts/': No such file or directory
    info: no networking config is defined in the real root
    info: propagating initramfs networking config to the real root
    cp: cannot create regular file '/sysroot/etc/NetworkManager/system-connections/': No such file or directory
    ```
    dustymabe committed May 1, 2020
    Configuration menu
    Copy the full SHA
    5778769 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#180 from dustymabe/dusty-fix-net-teardown-i…

    …n-emergency-target
    
    coreos-teardown-initramfs-network: don't run when emergency.target
    dustymabe committed May 1, 2020
    Configuration menu
    Copy the full SHA
    6a87a47 View commit details
    Browse the repository at this point in the history

Commits on May 4, 2020

  1. 99emergency-timeout: also check ignition-fetch.service for failure

    If the config is invalid, the failure will show up here.
    bgilbert committed May 4, 2020
    Configuration menu
    Copy the full SHA
    3949f95 View commit details
    Browse the repository at this point in the history
  2. 99emergency-timeout: improve readability of Ignition failure message

    Line-wrap to 80 characters and add some line breaks.
    bgilbert committed May 4, 2020
    Configuration menu
    Copy the full SHA
    dc156ba View commit details
    Browse the repository at this point in the history
  3. 30ignition: drop hard requirement on qemu_fw_cfg

    The original intent here was that on arches where `fw_cfg` is available,
    then we definitely want to make sure that either it's built into the
    kernel or if a module, added to the initrd. However, this check has been
    watered down now to to the point where it's not that useful.
    
    In coreos/ignition-dracut#176, there's a
    reasonable request to support not having the `qemu_fw_cfg` module
    installed at all even if the architecture would support it.
    
    IMO, I think we should just drop this whole logic entirely. The `qemu`
    module (which we depend on) already does an `instmods qemu_fw_cfg`
    (without `-c`), and qemu testing is the backbone of our CI testing. So
    realistically, we would notice very fast if `fw_cfg` support in the
    initrd went missing.
    
    Closes: coreos#176
    jlebon committed May 4, 2020
    Configuration menu
    Copy the full SHA
    e264315 View commit details
    Browse the repository at this point in the history
  4. Merge pull request coreos#181 from bgilbert/linewrap

    99emergency-timeout: improvements to failure message
    bgilbert committed May 4, 2020
    Configuration menu
    Copy the full SHA
    7ff38d9 View commit details
    Browse the repository at this point in the history

Commits on May 12, 2020

  1. 99emergency-timeout: Dump all failed services

    In Fedora CoreOS we have a ton of stuff going on the
    initramfs; our custom mount units, resizing
    the rootfs etc.
    
    Change this to dump all failed services, but special case
    Ignition services to note that something may be wrong with
    the config.
    cgwalters authored and jlebon committed May 12, 2020
    Configuration menu
    Copy the full SHA
    4dc5106 View commit details
    Browse the repository at this point in the history

Commits on May 18, 2020

  1. coreos-teardown-initramfs: propagate the automatic multipath conf

    Rename coreos-teardown-initramfs-network.* to
    coreos-teardown-initramfs.* and add function to propigating automatic
    configuration through to boot.
    
    Signed-off-by: Ben Howard <ben.howard@redhat.com>
    Ben Howard committed May 18, 2020
    Configuration menu
    Copy the full SHA
    c8c631a View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#186 from darkmuggle/pr/mpath-redux

    coreos-teardown-initramfs: propagate the automatic multipath conf
    Ben Howard committed May 18, 2020
    Configuration menu
    Copy the full SHA
    ee9fcda View commit details
    Browse the repository at this point in the history

Commits on May 19, 2020

  1. 30ignition: clean up Ignition stages ordering

    First, put the order of the stages in every unit file. Then, make sure
    to include both the appropriate `After=` and `Before=` in accordance
    with the unit's place in the chain. There's redundancy there, but it
    makes it really obvious and explicit how they go together.
    jlebon committed May 19, 2020
    Configuration menu
    Copy the full SHA
    142bfda View commit details
    Browse the repository at this point in the history
  2. ignition-setup-user.service: run before multipathd

    This is required because the unit needs read-only access to `/boot` in
    order to extract any baked in user-provided config and multipathd might
    claim ownership.
    
    See: coreos/ignition-dracut#183
    jlebon committed May 19, 2020
    Configuration menu
    Copy the full SHA
    1d34fc2 View commit details
    Browse the repository at this point in the history

Commits on Jun 1, 2020

  1. Remove OnFailure= from targets, put in services

    In systemd v245, which is in f32, the `OnFailure=` directive in target
    units stopped working. This seems to be by design though:
    
    systemd/systemd#14142
    
    If target units were never meant to handle this, this might be why we've
    had issues like boot loops on failure in the past (see coreos#115).
    
    Anyway, let's just pepper our services with the directive instead.
    jlebon committed Jun 1, 2020
    Configuration menu
    Copy the full SHA
    8f5d1ec View commit details
    Browse the repository at this point in the history

Commits on Jun 3, 2020

  1. 30ignition: add wipefs to the initramfs

    Needed for coreos#991.
    bgilbert committed Jun 3, 2020
    Configuration menu
    Copy the full SHA
    70afbb3 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#190 from bgilbert/wipefs

    30ignition: add wipefs to the initramfs
    bgilbert committed Jun 3, 2020
    Configuration menu
    Copy the full SHA
    93d5d83 View commit details
    Browse the repository at this point in the history

Commits on Jun 9, 2020

  1. 30ignition: GPT setup: wait for 'boot' labeled partition

    This unit must the first to run when the disk holding the root partition
    becomes available. To avoid relying on the name of the root partition
    which is different between RHCOS LUKS setup and current FCOS setup, we
    wait for the partition labeled 'boot' to become available. This is
    reliable as we don't have any plan to support re-provisioning/re-writing
    the /boot partition,
    
    This is the only unit where it is safe to wait only on a specific disk
    label as this will call udevadm settle after the GPT setup. Units that
    requires the boot and root partitions to be available should order
    themselves after this unit.
    travier authored and jlebon committed Jun 9, 2020
    Configuration menu
    Copy the full SHA
    bdf0a65 View commit details
    Browse the repository at this point in the history

Commits on Jun 10, 2020

  1. ci: test with git master of coreos/ignition

    This is symmetrical to coreos#994.
    jlebon committed Jun 10, 2020
    Configuration menu
    Copy the full SHA
    2874fda View commit details
    Browse the repository at this point in the history

Commits on Jun 18, 2020

  1. Add new ignition-fetch-offline.service

    Make use of the new `fetch-offline` stage:
    
    coreos#979
    
    We run this between the `setup` and `fetch` stages (the latter possibly
    being skipped if networking is not required).
    
    We hit the same issue here that `coreos-copy-firstboot-network.service`
    hit, which is that we can't run before the `cmdline` hook because that
    runs *before* udev, but we want the `by-*` symlinks for
    `ignition-setup-user.service`.
    
    The hack we do here is to rerun the NM cmdline hook in case ignition
    dropped a snippet in `/etc/cmdline.d`. As mentioned in
    coreos/fedora-coreos-config#346, we'll be able
    to do this more cleanly once we run NM as a systemd service directly.
    jlebon committed Jun 18, 2020
    Configuration menu
    Copy the full SHA
    1cfb0dd View commit details
    Browse the repository at this point in the history
  2. 30ignition: make var in dracut_func local

    No reason to leak this outside the function.
    jlebon committed Jun 18, 2020
    Configuration menu
    Copy the full SHA
    2b669b0 View commit details
    Browse the repository at this point in the history

Commits on Jun 24, 2020

  1. make: install systemd unit as non-executable

    This tweaks permissions when installing units in order to avoid
    the following warning at boot time:
    ```
    systemd[1]: Configuration file /usr/lib/systemd/system/ignition-firstboot-complete.service is marked executable.
     Please remove executable permission bits. Proceeding anyway.
    ```
    lucab committed Jun 24, 2020
    Configuration menu
    Copy the full SHA
    e081e9e View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#196 from lucab/ups/make-install

    make: install systemd unit as non-executable
    Luca Bruno committed Jun 24, 2020
    Configuration menu
    Copy the full SHA
    15def21 View commit details
    Browse the repository at this point in the history

Commits on Jul 10, 2020

  1. dracut/30ignition: add Ignition LUKS

    Adds LUKS related binaries to dracut & a udev rule to discover
    unformatted encrypted devices.
    arithx committed Jul 10, 2020
    Configuration menu
    Copy the full SHA
    fdc7e51 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#192 from arithx/luks

    *: add LUKS
    Stephen Lowrie committed Jul 10, 2020
    Configuration menu
    Copy the full SHA
    e75fef0 View commit details
    Browse the repository at this point in the history

Commits on Jul 16, 2020

  1. dracut/30ignition: fix typo in udev rule

    Mistakenly the udev rule is using `:=` which is already being assumed by
    udev to mean `=`. Change it to stop emitting a warning.
    arithx authored and jlebon committed Jul 16, 2020
    Configuration menu
    Copy the full SHA
    6b1d128 View commit details
    Browse the repository at this point in the history

Commits on Jul 22, 2020

  1. 30ignition: move conditional network startup out of ignition-dracut

    ignition-check-neednet.sh knows too much about distro-level networking
    configuration.  In addition, other things in the initramfs might want to
    conditionally enable networking, and they'd currently need to reimplement
    ignition-check-neednet.sh to do so.
    
    Instead, let the distro provide its own unit that checks for
    /run/ignition/neednet.  That unit can use dependencies to sequence
    ignition-fetch-offline.service correctly for its own needs.
    bgilbert committed Jul 22, 2020
    Configuration menu
    Copy the full SHA
    92661c4 View commit details
    Browse the repository at this point in the history
  2. Merge pull request coreos#200 from bgilbert/condnet

    Move conditional network startup out of ignition-dracut
    bgilbert committed Jul 22, 2020
    Configuration menu
    Copy the full SHA
    98ed51d View commit details
    Browse the repository at this point in the history

Commits on Jul 23, 2020

  1. Merge Ignition-Dracut into Ignition itself.

    Ben Howard committed Jul 23, 2020
    Configuration menu
    Copy the full SHA
    a04ea6d View commit details
    Browse the repository at this point in the history
  2. Clean-up post-merge files.

    Ben Howard committed Jul 23, 2020
    Configuration menu
    Copy the full SHA
    629fc6d View commit details
    Browse the repository at this point in the history
  3. dracut: remove CoreOS specific modules

    The CoreOS specific modules have been moved to
    https://github.com/coreos/fedora-coreos-config.
    Ben Howard committed Jul 23, 2020
    Configuration menu
    Copy the full SHA
    6a5575c View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    12edd76 View commit details
    Browse the repository at this point in the history