-
Notifications
You must be signed in to change notification settings - Fork 241
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move Ignition-Dracut into Ignition #1039
Commits on Nov 18, 2017
-
Configuration menu - View commit details
-
Copy full SHA for 127bd66 - Browse repository at this point
Copy the full SHA 127bd66View commit details
Commits on Dec 3, 2017
-
Configuration menu - View commit details
-
Copy full SHA for 9495e3b - Browse repository at this point
Copy the full SHA 9495e3bView commit details
Commits on Dec 6, 2017
-
Merge pull request coreos#135 from bgilbert/external-oem-configs
Copy Ignition base/user configs from OEM to Ignition system dir
Configuration menu - View commit details
-
Copy full SHA for 60d29e0 - Browse repository at this point
Copy the full SHA 60d29e0View commit details
Commits on Dec 12, 2017
-
dracut: correctly sequence disk-uuid@ before ignition-setup
The "After=disk-uuid.service" in ignition-setup.service doesn't actually work because disk-uuid.service is templated. Instead, disk-uuid@.service should sequence itself Before units that access device nodes. Sequence disk-uuid@ Before ignition-setup, and remove "After=disk-uuid.service" from Ignition units.
Configuration menu - View commit details
-
Copy full SHA for 760986b - Browse repository at this point
Copy the full SHA 760986bView commit details -
Merge pull request coreos#136 from bgilbert/before
dracut: correctly sequence disk-uuid@ before ignition-setup
Configuration menu - View commit details
-
Copy full SHA for 4d25b96 - Browse repository at this point
Copy the full SHA 4d25b96View commit details
Commits on Dec 19, 2017
-
dracut: ignore Azure SR-IOV VF interface
The kernel will automatically bond it to the synthetic interface, so ensure networkd doesn't try to configure it separately.
Configuration menu - View commit details
-
Copy full SHA for 4df8cff - Browse repository at this point
Copy the full SHA 4df8cffView commit details
Commits on Dec 26, 2017
-
Merge pull request coreos#137 from bgilbert/azure-sriov
dracut: ignore Azure SR-IOV VF interface
Configuration menu - View commit details
-
Copy full SHA for e8c3ebe - Browse repository at this point
Copy the full SHA e8c3ebeView commit details
Commits on Jan 4, 2018
-
Configuration menu - View commit details
-
Copy full SHA for 1626a8e - Browse repository at this point
Copy the full SHA 1626a8eView commit details -
Merge pull request coreos#139 from ericchiang/coc
automated PR: update CoC and legalese
Configuration menu - View commit details
-
Copy full SHA for daa1e80 - Browse repository at this point
Copy the full SHA daa1e80View commit details
Commits on Jan 9, 2018
-
99start-root: drop DEVLINKS from mdadm invocation
The current invocation is broken (should be $env{DEVLINKS}) and pointless, so drop it. The last arguments to the `mdadm --incremental` command are just aliases that can be used in /etc/mdadm.conf (see the "INCREMENTAL MODE" section of man 8 mdadm). We don't use /etc/mdadm.conf in the initramfs, so just drop it.
Andrew Jeddeloh committedJan 9, 2018 Configuration menu - View commit details
-
Copy full SHA for 4189890 - Browse repository at this point
Copy the full SHA 4189890View commit details
Commits on Jan 10, 2018
-
Merge pull request coreos#138 from ajeddeloh/fix-devlinks
99start-root: drop DEVLINKS from mdadm invocation
Configuration menu - View commit details
-
Copy full SHA for 70fcb32 - Browse repository at this point
Copy the full SHA 70fcb32View commit details
Commits on Jan 23, 2018
-
Fixed upstream in systemd/systemd@e1c42e1.
Configuration menu - View commit details
-
Copy full SHA for ca7d8fd - Browse repository at this point
Copy the full SHA ca7d8fdView commit details -
Merge pull request coreos#140 from bgilbert/mtu
dracut: drop obsolete comment
Configuration menu - View commit details
-
Copy full SHA for 142e647 - Browse repository at this point
Copy the full SHA 142e647View commit details
Commits on Mar 27, 2018
-
Configuration menu - View commit details
-
Copy full SHA for 8771128 - Browse repository at this point
Copy the full SHA 8771128View commit details -
Configuration menu - View commit details
-
Copy full SHA for d3d3121 - Browse repository at this point
Copy the full SHA d3d3121View commit details -
Configuration menu - View commit details
-
Copy full SHA for 863a8f6 - Browse repository at this point
Copy the full SHA 863a8f6View commit details -
Configuration menu - View commit details
-
Copy full SHA for fb89798 - Browse repository at this point
Copy the full SHA fb89798View commit details -
Configuration menu - View commit details
-
Copy full SHA for 61f8967 - Browse repository at this point
Copy the full SHA 61f8967View commit details -
Revert "use /etc/machine-id to detect firstboot"
This reverts commit 61f8967.
Configuration menu - View commit details
-
Copy full SHA for 42c1a1b - Browse repository at this point
Copy the full SHA 42c1a1bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 4ea7626 - Browse repository at this point
Copy the full SHA 4ea7626View commit details -
Configuration menu - View commit details
-
Copy full SHA for a9fe234 - Browse repository at this point
Copy the full SHA a9fe234View commit details
Commits on Apr 5, 2018
-
module-setup.sh should install the binaries Ignition depends on
Derek Gonyeo committedApr 5, 2018 Configuration menu - View commit details
-
Copy full SHA for 6a9118d - Browse repository at this point
Copy the full SHA 6a9118dView commit details -
only run Ignition on first boot
Alter ignition-generator to only run ignition when coreos.first_boot is present on the command line, add a base Ignition config that removes coreos.first_boot from the grub config, add coreos.first_boot to the grub config in the instructions in README.txt
Derek Gonyeo committedApr 5, 2018 Configuration menu - View commit details
-
Copy full SHA for d37b56e - Browse repository at this point
Copy the full SHA d37b56eView commit details -
Derek Gonyeo committed
Apr 5, 2018 Configuration menu - View commit details
-
Copy full SHA for a05ce22 - Browse repository at this point
Copy the full SHA a05ce22View commit details
Commits on Apr 6, 2018
-
ignition-quench.clc: add the source for ignition-quench.ign
Also reformat ignition-quench.ign to be more readable
Derek Gonyeo committedApr 6, 2018 Configuration menu - View commit details
-
Copy full SHA for d403fc8 - Browse repository at this point
Copy the full SHA d403fc8View commit details -
Merge pull request coreos#1 from dgonyeo/dusty-fork
Only run on first boot, enable the disks stage
Configuration menu - View commit details
-
Copy full SHA for 03a59a2 - Browse repository at this point
Copy the full SHA 03a59a2View commit details
Commits on Jun 1, 2018
-
Configuration menu - View commit details
-
Copy full SHA for b81cd2f - Browse repository at this point
Copy the full SHA b81cd2fView commit details
Commits on Jun 5, 2018
-
Merge pull request coreos#3 from cgwalters/readme-tweak
README: Note instructions are for classic systems
Configuration menu - View commit details
-
Copy full SHA for 9236987 - Browse repository at this point
Copy the full SHA 9236987View commit details -
Configuration menu - View commit details
-
Copy full SHA for 0609153 - Browse repository at this point
Copy the full SHA 0609153View commit details -
module-setup: update module-setup so deps are pulled in
Added a few binaries and also a few modules.
Configuration menu - View commit details
-
Copy full SHA for 7fd35bc - Browse repository at this point
Copy the full SHA 7fd35bcView commit details -
Configuration menu - View commit details
-
Copy full SHA for e001257 - Browse repository at this point
Copy the full SHA e001257View commit details -
get rid of usr-generator module
It was there for compatibility with some older CL systems and isn't needed AFAICT for RH/Fedora. Migrate the remount-sysroot service to the ignition module as I do think that is still needed.
Configuration menu - View commit details
-
Copy full SHA for 65893e7 - Browse repository at this point
Copy the full SHA 65893e7View commit details -
Configuration menu - View commit details
-
Copy full SHA for f5bad8c - Browse repository at this point
Copy the full SHA f5bad8cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 0c58283 - Browse repository at this point
Copy the full SHA 0c58283View commit details -
Merge pull request coreos#2 from dustymabe/PR
Tidying things up a bit
Configuration menu - View commit details
-
Copy full SHA for 59ebe33 - Browse repository at this point
Copy the full SHA 59ebe33View commit details
Commits on Jun 7, 2018
-
Configuration menu - View commit details
-
Copy full SHA for 1f80d41 - Browse repository at this point
Copy the full SHA 1f80d41View commit details -
Prefix remount-sysroot.service with "ignition-"
Otherwise, it's not obvious that this unit comes from ignition.
Configuration menu - View commit details
-
Copy full SHA for fd31492 - Browse repository at this point
Copy the full SHA fd31492View commit details -
Run ignition-files after ostree-prepare-root.service
The actual `/sysroot` we want `ignition-files` to manage is not the physical root, but our deployment root. So we need to make sure it runs *after* `ostree-prepare-root.service`.
Configuration menu - View commit details
-
Copy full SHA for a071427 - Browse repository at this point
Copy the full SHA a071427View commit details -
Merge pull request coreos#5 from jlebon/pr/after-ostree
ignition-files.service: run after ostree-prepare-root.service
Configuration menu - View commit details
-
Copy full SHA for 25f2f50 - Browse repository at this point
Copy the full SHA 25f2f50View commit details -
no disks for now - boot systemd unit ordering issue
without ignition-disks we get a booting system. This is somehow related to the ordering with ignition and ostree mounting during the initramfs. Disable ignition-disks service for now.
Configuration menu - View commit details
-
Copy full SHA for 11d0ab5 - Browse repository at this point
Copy the full SHA 11d0ab5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 7731f33 - Browse repository at this point
Copy the full SHA 7731f33View commit details -
Add ignition-ask-var-mount.service
This new service file adds a special file in `/run` and runs before `ostree-prepare-root.service` so that the latter mounts `/var` rather than relying on the OSTree generator post-switchroot. This also requires us to remount `/var` read-write so that Ignition can e.g. create new users.
Configuration menu - View commit details
-
Copy full SHA for 7b5bbfa - Browse repository at this point
Copy the full SHA 7b5bbfaView commit details -
Merge pull request coreos#7 from jlebon/pr/ask-var-mount
Add ignition-ask-var-mount.service
Configuration menu - View commit details
-
Copy full SHA for 1e36a6c - Browse repository at this point
Copy the full SHA 1e36a6cView commit details
Commits on Jun 13, 2018
-
ignition-generator: add hack for openstack support
This is another hack like the xen = ec2 one to get RHCOS ignition working in OpenStack for now. A lot of our infra and scripts currently interop well with OpenStack, so I'd like to unblock this to make it easier to hack on and test RHCOS overall.
Configuration menu - View commit details
-
Copy full SHA for 4f985ad - Browse repository at this point
Copy the full SHA 4f985adView commit details -
Merge pull request coreos#8 from jlebon/pr/openstack-oem-id
ignition-generator: add hack for openstack support
Configuration menu - View commit details
-
Copy full SHA for ce6dfe1 - Browse repository at this point
Copy the full SHA ce6dfe1View commit details
Commits on Jun 18, 2018
-
Make ignition work on classic systems
On OSTree systems, we need to remount both `/sysroot` and `/sysroot/var` to read-write for Ignition. On classic systems though, we only need the former. Split out those two remounts into separate units and only run the `/sysroot/var` remount if it's not already read-write.
Configuration menu - View commit details
-
Copy full SHA for 7e250dd - Browse repository at this point
Copy the full SHA 7e250ddView commit details -
Drop 'auto-detect' hacks in generator
We now explicitly stamp images for their respective cloud providers so we no longer need to try to guess.
Configuration menu - View commit details
-
Copy full SHA for b041781 - Browse repository at this point
Copy the full SHA b041781View commit details -
Merge pull request coreos#9 from jlebon/pr/conditional
remount-sysroot: only remount on OSTree systems
Configuration menu - View commit details
-
Copy full SHA for 922ef67 - Browse repository at this point
Copy the full SHA 922ef67View commit details -
Merge pull request coreos#10 from jlebon/pr/drop-hacks
Drop 'auto-detect' hacks in generator
Configuration menu - View commit details
-
Copy full SHA for bf3b454 - Browse repository at this point
Copy the full SHA bf3b454View commit details
Commits on Jun 29, 2018
-
Rework how we run Ignition on first boot
There was an extensive discussion of this on IRC. The basic idea is we have a stamp file in `/boot`, same as CL does. However, we use a GRUB *variable* `$coreos_firstboot` which is hardcoded in the kernel arguments, but evaluates to the empty string if we're not in the first boot. This way we don't have to change the kernel arguments post-boot. We previously had a systemd "quench" unit as a hardcoded Ignition config here - I moved that to a regular installed unit that is part of the package.
Configuration menu - View commit details
-
Copy full SHA for 9d2dd32 - Browse repository at this point
Copy the full SHA 9d2dd32View commit details -
Configuration menu - View commit details
-
Copy full SHA for 6463f60 - Browse repository at this point
Copy the full SHA 6463f60View commit details -
Merge pull request coreos#12 from cgwalters/firstboot-2
Rework how we run Ignition on first boot
Configuration menu - View commit details
-
Copy full SHA for 17a201b - Browse repository at this point
Copy the full SHA 17a201bView commit details
Commits on Jul 20, 2018
-
Add Journald forward to kernel log buffer option
This makes ignition logs show up on ttyS0. Without this option, ignition logs only shows up on tty0.
Configuration menu - View commit details
-
Copy full SHA for 09f16fd - Browse repository at this point
Copy the full SHA 09f16fdView commit details
Commits on Jul 21, 2018
-
Merge pull request coreos#13 from Rahuls0720/tty0_dev
Add Journald 'forward to kernel log buffer' option
Configuration menu - View commit details
-
Copy full SHA for d664657 - Browse repository at this point
Copy the full SHA d664657View commit details
Commits on Aug 17, 2018
-
change the default level of messages send to kmsg
It defaults to notice, which doesn't print out the "info" level information we want to get from ignition.
Configuration menu - View commit details
-
Copy full SHA for 495c13c - Browse repository at this point
Copy the full SHA 495c13cView commit details -
Merge pull request coreos#14 from dustymabe/dusty
change the default level of messages send to kmsg
Configuration menu - View commit details
-
Copy full SHA for 56aa514 - Browse repository at this point
Copy the full SHA 56aa514View commit details
Commits on Aug 28, 2018
-
coreos-firstboot-complete: RemainAfterExit=yes
See ostreedev/ostree#1697 Just noticed this while investigating our services after the recent machine-id regression.
Configuration menu - View commit details
-
Copy full SHA for 92ef9dd - Browse repository at this point
Copy the full SHA 92ef9ddView commit details
Commits on Aug 29, 2018
-
Merge pull request coreos#15 from cgwalters/remain-after-exit
coreos-firstboot-complete: RemainAfterExit=yes
Configuration menu - View commit details
-
Copy full SHA for 2a36c7d - Browse repository at this point
Copy the full SHA 2a36c7dView commit details
Commits on Sep 3, 2018
-
dracut/ignition: remove CL-legacy udev references
This drop some legacy/commented line for installing CL-specific udev rules. We'll likely grow some more bits to install into initramfs in the future, which should not be part of this ignition module.
Configuration menu - View commit details
-
Copy full SHA for 3f41219 - Browse repository at this point
Copy the full SHA 3f41219View commit details
Commits on Sep 4, 2018
-
Merge pull request coreos#16 from lucab/ups/ignition-udev-rules
dracut/ignition: remove CL-legacy udev references
Configuration menu - View commit details
-
Copy full SHA for d056287 - Browse repository at this point
Copy the full SHA d056287View commit details
Commits on Sep 20, 2018
-
journal: Don't log to console AND kmsg
If we do that then we get "double logs" on the console device because both kmsg and console output is getting dumped there.
Configuration menu - View commit details
-
Copy full SHA for 26f2396 - Browse repository at this point
Copy the full SHA 26f2396View commit details
Commits on Sep 21, 2018
-
Merge pull request coreos#19 from dustymabe/dusty
journal: don't log to console AND kmsg
Configuration menu - View commit details
-
Copy full SHA for 8c85eb3 - Browse repository at this point
Copy the full SHA 8c85eb3View commit details
Commits on Sep 25, 2018
-
30ignition: add support for ignition-disks
This adds all relevant bits to run the "disks" stage.
Configuration menu - View commit details
-
Copy full SHA for ce9f648 - Browse repository at this point
Copy the full SHA ce9f648View commit details -
Merge pull request coreos#17 from lucab/ups/ignition-disks
30ignition: add support for ignition-disks
Configuration menu - View commit details
-
Copy full SHA for c09ce6f - Browse repository at this point
Copy the full SHA c09ce6fView commit details
Commits on Oct 12, 2018
-
Configuration menu - View commit details
-
Copy full SHA for 6d0763a - Browse repository at this point
Copy the full SHA 6d0763aView commit details
Commits on Oct 13, 2018
-
Merge pull request coreos#21 from cgwalters/btrfs-optional
module-setup: Make mkfs.btrfs optional
Configuration menu - View commit details
-
Copy full SHA for 4bdfb34 - Browse repository at this point
Copy the full SHA 4bdfb34View commit details
Commits on Oct 16, 2018
-
module-setup.sh: explicitly install qemu_fw_cfg
Make it explicit that we need the `qemu_fw_cfg` kernel module in the initramfs. This works for Fedora right now before I think because we run dracut with `--no-host-only` at compose time. (It's the default if `initramfs-args` isn't in the manifest, as in FCOS, and in FAH we explicitly have it in the manifest). Closes: coreos#22
Configuration menu - View commit details
-
Copy full SHA for ecf5779 - Browse repository at this point
Copy the full SHA ecf5779View commit details -
Merge pull request coreos#25 from jlebon/pr/instmods-qemu-fw
module-setup.sh: explicitly install qemu_fw_cfg
Configuration menu - View commit details
-
Copy full SHA for b7d4424 - Browse repository at this point
Copy the full SHA b7d4424View commit details
Commits on Oct 18, 2018
-
ignition-ask-var-mount.service: use RemainAfterExit=yes
This is important for `Type=oneshot` services that may be depended upon by other services. See ostreedev/ostree#1697.
Configuration menu - View commit details
-
Copy full SHA for a0bc135 - Browse repository at this point
Copy the full SHA a0bc135View commit details -
ignition-disks.service: drop Requires=network.target
Mirror the same requirements as `ignition-files.service`. I.e. we don't strictly *require* networking, but if there is networking, we'd rather run after it so that we can pull down the config. See also coreos#17. (Anyway, I think we want `network-online.target` here instead of `network.target` but I haven't tested that).
Configuration menu - View commit details
-
Copy full SHA for 0301a03 - Browse repository at this point
Copy the full SHA 0301a03View commit details
Commits on Oct 19, 2018
-
Configuration menu - View commit details
-
Copy full SHA for b03d4e2 - Browse repository at this point
Copy the full SHA b03d4e2View commit details
Commits on Oct 24, 2018
-
ignition: run files stage at original CL ordering
We previously messed around with changing the files service to adapt to `ostree-prepare-root.service` running so late in the boot process. Now that OSTree runs at more semantically appropriate times, we can restore ordering here so that it runs right after `initrd-root-fs.target`. This also undoes the hacking around in `ignition-generator` to get the services pulled in by `initrd-switch-root.service` instead of the more appropriate principal target of the initrd (`initrd.target`). Another nice thing about this is that we drop the explicit dependency between `ostree-prepare-root.service` and `ignition-files` since they're now synchronized through `initrd-root-fs.target`. Closes: coreos#20
Configuration menu - View commit details
-
Copy full SHA for 66335f2 - Browse repository at this point
Copy the full SHA 66335f2View commit details -
remove ignition-remount-sysroot.service files
These are no longer needed now that we explicitly pass `rw` on the kernel command-line. For more information, see: systemd/systemd#8268 openshift/os#199
Configuration menu - View commit details
-
Copy full SHA for 3ec0b39 - Browse repository at this point
Copy the full SHA 3ec0b39View commit details
Commits on Oct 25, 2018
-
Merge pull request coreos#26 from jlebon/pr/run-earlier
ignition: run files stage at original CL ordering
Configuration menu - View commit details
-
Copy full SHA for 7ee64ca - Browse repository at this point
Copy the full SHA 7ee64caView commit details -
30ignition: only instmods if module available
Otherwise we'll error out on kernels which have the functionality builtin. This was tested on FCOS (which uses `m`) and RHCOS (which uses `y`). We need to check `/usr/lib/ostree-boot` since on el7 that's the only place where the config is.
Configuration menu - View commit details
-
Copy full SHA for 03d8438 - Browse repository at this point
Copy the full SHA 03d8438View commit details -
Merge pull request coreos#28 from jlebon/pr/fw-cfg
30ignition: only instmods if module available
Configuration menu - View commit details
-
Copy full SHA for decf63f - Browse repository at this point
Copy the full SHA decf63fView commit details
Commits on Nov 20, 2018
-
Rename
coreos.firstboot
kernel cmdline arg toignition.firstboot
to make options more distribution neutral. Update dracut/README.txt to take into account recent changes. Resolves: coreos#24
Configuration menu - View commit details
-
Copy full SHA for 6e41a70 - Browse repository at this point
Copy the full SHA 6e41a70View commit details -
Merge pull request coreos#30 from LorbusChris/master
Rename `coreos.firstboot` kernel cmdline arg to `ignition.firstboot`
Configuration menu - View commit details
-
Copy full SHA for 7b83454 - Browse repository at this point
Copy the full SHA 7b83454View commit details
Commits on Jan 3, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 650d58c - Browse repository at this point
Copy the full SHA 650d58cView commit details -
Merge pull request coreos#36 from cgwalters/firstboot-complete-ro-boot
ignition-firstboot-complete.service: Remount /boot rw
Configuration menu - View commit details
-
Copy full SHA for 996d527 - Browse repository at this point
Copy the full SHA 996d527View commit details
Commits on Jan 9, 2019
-
Remount /sysroot rw (coreos#38)
* Remount /sysroot rw Some Linux Distributions don't pass a rw option on the kernel commandline and thus mount the root filesystem ro by default. In this case, remount /sysroot to rw (issue coreos/ignition-dracut#37)
Configuration menu - View commit details
-
Copy full SHA for a6551f1 - Browse repository at this point
Copy the full SHA a6551f1View commit details
Commits on Jan 25, 2019
-
journal: add clarifying comment for context
It's good to provide some history so that we can know when we can drop these changes.
Configuration menu - View commit details
-
Copy full SHA for 7579b92 - Browse repository at this point
Copy the full SHA 7579b92View commit details -
Merge pull request coreos#40 from coreos/dusty
journal: add clarifying comment for context
Configuration menu - View commit details
-
Copy full SHA for fa7131b - Browse repository at this point
Copy the full SHA fa7131bView commit details
Commits on Feb 4, 2019
-
Add ability to parse config.ign file on boot
Yolanda Robla committedFeb 4, 2019 Configuration menu - View commit details
-
Copy full SHA for b09aeeb - Browse repository at this point
Copy the full SHA b09aeebView commit details -
Yolanda Robla committed
Feb 4, 2019 Configuration menu - View commit details
-
Copy full SHA for 8939597 - Browse repository at this point
Copy the full SHA 8939597View commit details
Commits on Feb 5, 2019
-
Always check for boot, needs to exist
Yolanda Robla committedFeb 5, 2019 Configuration menu - View commit details
-
Copy full SHA for 77ba5bf - Browse repository at this point
Copy the full SHA 77ba5bfView commit details -
Remove the check for OEM partition, not used
Yolanda Robla committedFeb 5, 2019 Configuration menu - View commit details
-
Copy full SHA for 478877e - Browse repository at this point
Copy the full SHA 478877eView commit details
Commits on Feb 8, 2019
-
Merge pull request coreos#42 from yrobla/master
Add ability to parse config.ign file on boot
Configuration menu - View commit details
-
Copy full SHA for 9e18211 - Browse repository at this point
Copy the full SHA 9e18211View commit details -
Configuration menu - View commit details
-
Copy full SHA for 7115ef4 - Browse repository at this point
Copy the full SHA 7115ef4View commit details -
ignition-setup: support boot or platform base/user configs
This adds support for platform base/user configs and also user provided base/user configs that were embedded in the /boot/ partition. Fixes: coreos#32
Configuration menu - View commit details
-
Copy full SHA for 5474018 - Browse repository at this point
Copy the full SHA 5474018View commit details -
generator: RemainAfterExit=yes for ignition-setup
This allows you to query the status of it afterwards.
Configuration menu - View commit details
-
Copy full SHA for a260c4c - Browse repository at this point
Copy the full SHA a260c4cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 7b2ace1 - Browse repository at this point
Copy the full SHA 7b2ace1View commit details -
dracut: add /usr/sbin/ignition-setup to initramfs
Otherwise ignition-setup.service won't work :)
Configuration menu - View commit details
-
Copy full SHA for e1e14dd - Browse repository at this point
Copy the full SHA e1e14ddView commit details -
ignition-setup: mount/unmount boot to grab user.ign
Mount boot partition so that we can see if there are any embedded ignition files in /boot/.
Configuration menu - View commit details
-
Copy full SHA for ff7a3de - Browse repository at this point
Copy the full SHA ff7a3deView commit details
Commits on Feb 14, 2019
-
ignition-setup: changes from code review
- use config.ign for user facing stuff - only support copying config.ign -> user.ign - use /usr/lib/ignition/platform/${OEM_ID} for platforms - only support copying base.ign -> base.ign for platforms
Configuration menu - View commit details
-
Copy full SHA for cf1fab8 - Browse repository at this point
Copy the full SHA cf1fab8View commit details -
ignition-setup: use MountFlags=slave for systemd unit
This will guarantee the /boot mount won't outlast the unit.
Configuration menu - View commit details
-
Copy full SHA for f6f32a0 - Browse repository at this point
Copy the full SHA f6f32a0View commit details
Commits on Feb 15, 2019
-
services: fixup unit deps to more match CL
This makes it so that disks and files stages more explicitly depend on igntion-setup.service similar to the way it is done in CL today.
Configuration menu - View commit details
-
Copy full SHA for 71a2b3a - Browse repository at this point
Copy the full SHA 71a2b3aView commit details -
ignition-setup: rename copy function
copy_file_if_exists is more descriptive of what is going on.
Configuration menu - View commit details
-
Copy full SHA for 11beae9 - Browse repository at this point
Copy the full SHA 11beae9View commit details -
ignition-setup: don't perform umount, rely on systemd
Systemd MountFlags=slave will take care of it for us so let's not risk the error inside the script.
Configuration menu - View commit details
-
Copy full SHA for e4970c0 - Browse repository at this point
Copy the full SHA e4970c0View commit details -
Merge pull request coreos#43 from dustymabe/dusty
support platform configs and user configs in /boot
Configuration menu - View commit details
-
Copy full SHA for 2c69925 - Browse repository at this point
Copy the full SHA 2c69925View commit details
Commits on Feb 26, 2019
-
dracut: adapt for s/oem/platform in Ignition
With coreos#735 merged, we need to fix our service units to use `--platform` here. Also just do the equivalent thing here and start to move away from the oem terminology. Crucially though, we still look for `coreos.oem.id` until downstreams have adapted (notably coreos-assembler). Closes: coreos#31
Configuration menu - View commit details
-
Copy full SHA for 67e092e - Browse repository at this point
Copy the full SHA 67e092eView commit details
Commits on Feb 27, 2019
-
Merge pull request coreos#45 from jlebon/pr/oem-platform
dracut: adapt for s/oem/platform in Ignition
Configuration menu - View commit details
-
Copy full SHA for 9aac3c5 - Browse repository at this point
Copy the full SHA 9aac3c5View commit details
Commits on Feb 28, 2019
-
dracut/30ignition: general hack cleanups
We're past the MVP phase now. Let's reflect that in our codebase by dropping all the telltale signs of quick hacks and experimentations. This makes the tree nicer to hack on as well. Remember, all your code are belong to Git. We can always revive things as needed as we get around to supporting Packet/DO, etc... Though those units will need to be tweaked anyway. Closes: coreos#33
Configuration menu - View commit details
-
Copy full SHA for 95a0f18 - Browse repository at this point
Copy the full SHA 95a0f18View commit details
Commits on Mar 1, 2019
-
Merge pull request coreos#46 from jlebon/pr/cleanups
dracut/30ignition: general hack cleanups
Configuration menu - View commit details
-
Copy full SHA for ca593a1 - Browse repository at this point
Copy the full SHA ca593a1View commit details -
module-setup.sh: Check for module qemu_fw_cfg not build-in, so it wor…
…ks out of box on all arches
Configuration menu - View commit details
-
Copy full SHA for 819e0da - Browse repository at this point
Copy the full SHA 819e0daView commit details
Commits on Mar 4, 2019
-
Merge pull request coreos#49 from jcajka/fwcfg
module-setup.sh: Simplify the qemu_fw_cfg kernel module check
Configuration menu - View commit details
-
Copy full SHA for e3bd9c9 - Browse repository at this point
Copy the full SHA e3bd9c9View commit details
Commits on Mar 5, 2019
-
grub: find boot partition and use it directly
On UEFI systems the grub $root might be the /boot/efi/ partition and not the /boot/ partition so let's search for the partition with the `boot` label and then detect the file directly. Fixes coreos#51
Configuration menu - View commit details
-
Copy full SHA for 552edb5 - Browse repository at this point
Copy the full SHA 552edb5View commit details -
Merge pull request coreos#52 from dustymabe/bootlabel
grub: find boot partition and use it directly
Configuration menu - View commit details
-
Copy full SHA for a66ff6b - Browse repository at this point
Copy the full SHA a66ff6bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 31a3090 - Browse repository at this point
Copy the full SHA 31a3090View commit details -
Merge pull request coreos#53 from dustymabe/dusty
spec2x: grub: find boot partition and use it directly
Configuration menu - View commit details
-
Copy full SHA for 065e72a - Browse repository at this point
Copy the full SHA 065e72aView commit details -
dracut/30ignition: Only write ignition-setup.service on first boot
It's true it's only pulled into the transaction right now by the other services. But just on principle, let's not even write it if we know we're not going to use it.
Configuration menu - View commit details
-
Copy full SHA for cd9ddaf - Browse repository at this point
Copy the full SHA cd9ddafView commit details
Commits on Mar 6, 2019
-
Merge pull request coreos#54 from jlebon/pr/ignition-setup-tweak
dracut/30ignition: Only write ignition-setup.service on first boot
Configuration menu - View commit details
-
Copy full SHA for d4e8899 - Browse repository at this point
Copy the full SHA d4e8899View commit details
Commits on Mar 7, 2019
-
dracut/30ignition: split out ignition-setup.service
There's no need to generate it dynamically, so let's just split it out to be more explicit and easier to hack on.
Configuration menu - View commit details
-
Copy full SHA for 38a5360 - Browse repository at this point
Copy the full SHA 38a5360View commit details -
dracut/30ignition: add ignition-complete.target
From the comment block of the unit: This target is reached when Ignition finishes running. Note that it gets activated *only* on first boot (or if ignition.firstboot=1 is provided). Thus, it is also an API for units to use so that they are activated only on first boot. Simply add a link under ignition-complete.target.requires in the initrd. Thus, units themselves don't need to add explicit `Requires=`; the canonical way to get pulled into the transaction is through `ignition-complete.target`. This will also be used by the upcoming CoreOS units that are required for separate `/var` support.
Configuration menu - View commit details
-
Copy full SHA for f545dad - Browse repository at this point
Copy the full SHA f545dadView commit details
Commits on Mar 14, 2019
-
Merge pull request coreos#55 from jlebon/pr/ignition-target
Add ignition-complete.target
Configuration menu - View commit details
-
Copy full SHA for f6eb01f - Browse repository at this point
Copy the full SHA f6eb01fView commit details
Commits on Mar 16, 2019
-
dracut/30ignition: expect ignition binary in module directory
The ignition binary is not intended to be run by users or in the real root filesystem, and thus should never be in PATH. Expect distros to install it into the dracut module directory instead.
Configuration menu - View commit details
-
Copy full SHA for 738c676 - Browse repository at this point
Copy the full SHA 738c676View commit details
Commits on Mar 18, 2019
-
02_ignition_firstboot: Enable networking if Ignition will run
Today coreos-assembler is hardcoding the initramfs networking kargs to do DHCP; this is problematic for e.g. bare metal where one often wants to configure static networking. Let's only enable initramfs networking if we're doing Ignition.
Configuration menu - View commit details
-
Copy full SHA for c62a108 - Browse repository at this point
Copy the full SHA c62a108View commit details -
Merge pull request coreos#57 from cgwalters/initramfs-net-ignition
02_ignition_firstboot: Enable networking if Ignition will run
Configuration menu - View commit details
-
Copy full SHA for 8875cbf - Browse repository at this point
Copy the full SHA 8875cbfView commit details -
Merge pull request coreos#56 from bgilbert/unpath
dracut/30ignition: expect ignition binary in module directory
Configuration menu - View commit details
-
Copy full SHA for b11553f - Browse repository at this point
Copy the full SHA b11553fView commit details
Commits on Mar 20, 2019
-
README.md: update documentation
Drop the outdated distro-specific instructions and instead guide folks perusing the repo towards FCOS artifacts and coreos-assembler for how to play with it. Closes: coreos#62
Configuration menu - View commit details
-
Copy full SHA for 1768f12 - Browse repository at this point
Copy the full SHA 1768f12View commit details
Commits on Mar 22, 2019
-
Merge pull request coreos#63 from jlebon/pr/update-docs
README.md: update documentation
Configuration menu - View commit details
-
Copy full SHA for 29a06b2 - Browse repository at this point
Copy the full SHA 29a06b2View commit details -
grub: support overriding network kcmdline args
This allows us to set network kcmdline args by setting the ignition_network_kcmdline variable inside the ignition.firstboot file that resides on the /boot/ filesystem and triggers ignition run on boot. This functionality will allow the coreos-installer to promote static networking arguments that were used during the installer run to the first boot of the real system. After that they are no longer needed as ignition can configure networking as requested by the user.
Configuration menu - View commit details
-
Copy full SHA for a65ec16 - Browse repository at this point
Copy the full SHA a65ec16View commit details -
Merge pull request coreos#65 from dustymabe/dusty
grub: support overriding network kcmdline args
Configuration menu - View commit details
-
Copy full SHA for 2b47c9c - Browse repository at this point
Copy the full SHA 2b47c9cView commit details
Commits on Mar 25, 2019
-
30ignition: drop check for coreos.oem.id
coreos-assembler is going to pass both keys during the transition period, so we don't need to check them both here.
Configuration menu - View commit details
-
Copy full SHA for 3410879 - Browse repository at this point
Copy the full SHA 3410879View commit details -
30ignition: ignore coreos.randomize_disk_guid
The 30disk-uuid module never made it over from bootengine, and it's not clear that we want it. Don't break boot if coreos.randomize_disk_guid is requested.
Configuration menu - View commit details
-
Copy full SHA for 047a5e9 - Browse repository at this point
Copy the full SHA 047a5e9View commit details -
dracut/30ignition: Explicitly add OnFailure=emergency.target
Right now, we enable our services by adding a link in `initrd.target.requires`. However, it seems like systemd doesn't necessarily fail the boot even if `initrd.target` fails. That unit has: OnFailure=emergency.target OnFailureJobMode=replace-irreversibly But looking at the logs, it seems like that can get overridden by the `systemctl isolate initrd-switch-root.target` call that `initrd-cleanup.service` does. Let's just be really explicit here and tell systemd we want to immediately switch to `emergency.target` if any of our units fail.
Configuration menu - View commit details
-
Copy full SHA for 3d2e165 - Browse repository at this point
Copy the full SHA 3d2e165View commit details -
dracut/30ignition: Add mount stage and drop OSTree-specific bits
Add support for the new Ignition `mount` and `umount` stages. The `mount` stage runs *after* the `disks` stage and `initrd-root-fs.target`, since we need to be able to mount under `/sysroot`, but *before* the `files` stage, which will of course drop files under those mounts. Combined with coreos/fedora-coreos-config#70, this allows us to drop all OSTree-specific bits and no longer rely on `ostree-prepare-root.service` to mount `/var` for us.
Configuration menu - View commit details
-
Copy full SHA for 852008f - Browse repository at this point
Copy the full SHA 852008fView commit details
Commits on Mar 26, 2019
-
Merge pull request coreos#67 from bgilbert/cleanups
30ignition: minor cleanups
Configuration menu - View commit details
-
Copy full SHA for 9f4f75f - Browse repository at this point
Copy the full SHA 9f4f75fView commit details -
dracut: add CoreOS integration services
This module is the integration point between Ignition and Fedora CoreOS. Notably, we add two new systemd services in the initrd which mesh with Ignition's own systemd services: 1. `coreos-mount-var.service`, which finds the `/var` stateroot bind mount and mounts it under `/sysroot/var` before `ignition-mount` potentially adds more mounts underneath (or even shadowing `/var` itself). 2. `coreos-populate-var.service`, which sets up `/var` on first boot using `systemd-tmpfiles` before `ignition-files` runs. NOTE: this is a temporary holding place to make packaging easier. Eventually, we will move this module to the FCOS overlay: coreos/fedora-coreos-config#70
Configuration menu - View commit details
-
Copy full SHA for fd25475 - Browse repository at this point
Copy the full SHA fd25475View commit details -
Merge pull request coreos#47 from jlebon/pr/mount-umount
Add mount and umount service units
Configuration menu - View commit details
-
Copy full SHA for ec9a492 - Browse repository at this point
Copy the full SHA ec9a492View commit details
Commits on Apr 3, 2019
-
module_setup: include cdrom rules for openstack
The Ignition openstack platform needs to be able to read from a virtual cdrom and needs to include the uedv rules to create the symlink. Add those rules.
Andrew Jeddeloh committedApr 3, 2019 Configuration menu - View commit details
-
Copy full SHA for 45b8d51 - Browse repository at this point
Copy the full SHA 45b8d51View commit details -
Merge pull request coreos#71 from ajeddeloh/add-cdrom-rules
module_setup: include cdrom rules for openstack
Configuration menu - View commit details
-
Copy full SHA for 8156402 - Browse repository at this point
Copy the full SHA 8156402View commit details
Commits on Apr 4, 2019
-
dracut/30ignition: order ignition-complete.target before initrd.target
I think this was the missing piece in the issues described in coreos#61. Essentially, `ignition-complete.target` wasn't explicitly ordered wrt to `initrd.target`, so its completion was racing against system's `isolate` to `initrd-switch-root.target`. Ordering ourselves before `initrd.target` (which is also the unit that pulls us in through `initrd.target.requires`) ensures that the target can only be reached successfully if we're successful. And if our target fails, then we immediately trigger `emergency.target`.
Configuration menu - View commit details
-
Copy full SHA for 50d1830 - Browse repository at this point
Copy the full SHA 50d1830View commit details -
dracut/30ignition: add missing Before= for mount unit
This is already the case from the fact that it runs before the files stage, but just to be explicit, let's make sure all of Ignition's own systemd units have `Before=ignition-complete.target` so it's clear that all Ignition units must successfully complete for that target to be considered reached.
Configuration menu - View commit details
-
Copy full SHA for 2591950 - Browse repository at this point
Copy the full SHA 2591950View commit details -
dracut/30ignition: re-order directives in remount-sysroot
This is mostly cosmetic, but it helps make it easy to see that all the Ignition units follow the same standard header.
Configuration menu - View commit details
-
Copy full SHA for 499e086 - Browse repository at this point
Copy the full SHA 499e086View commit details -
dracut/30ignition: order ExecStop= units before initrd-switch-root.ta…
…rget The way `isolate` works is interesting. When systemd does `systemctl isolate initrd-switch-root.target`, it does two things: (1) enqueue stop jobs for all the services not required for the new target, and (2) enqueue start jobs for all the services required for the new target. However, there is no default ordering between the stop jobs and start jobs. One would think that systemd by default would first stop all the services, and only then starts the new services. That is not the case (see [1] and [2]). We need to explicitly tell systemd that we want our services to be stopped first before starting the new services. The way to do this is to add an explicit `Before=initrd-switch-root.target` in the units (see [1]). Otherwise, the `ExecStop` in `coreos-mount-var.service` and `ignition-mount.service` may not run before the switch root. (Note systemd does serialize its state across the reexec, but it seems like it doesn't correctly resume the "stop" jobs, presumably because it can't access the systemd units anymore. Regardless, we definitely want to umount everything before the switchroot anyway). Closes: coreos#70 [1] https://systemd-devel.freedesktop.narkive.com/wb1UNand [2] systemd/systemd#3436
Configuration menu - View commit details
-
Copy full SHA for 803fee8 - Browse repository at this point
Copy the full SHA 803fee8View commit details -
dracut/30ignition: add OnFailure= for ExecStop= services
We need these to make sure that failures during `ExecStop=` result in failing the boot. For details, see discussions in: coreos/ignition-dracut#72
Configuration menu - View commit details
-
Copy full SHA for bf24381 - Browse repository at this point
Copy the full SHA bf24381View commit details
Commits on Apr 5, 2019
-
Merge pull request coreos#72 from jlebon/pr/fix-umount
Clean up switching to emergency on error and fix ExecStop= race condition
Configuration menu - View commit details
-
Copy full SHA for 0019df3 - Browse repository at this point
Copy the full SHA 0019df3View commit details -
dracut/30ignition: link to RHBZ in ignition-complete
We shouldn't actually need to do `OnFailure=emergency.target` in `ignition-complete.service` here. Our unit is already a requirement of `initrd.target`, and so once we fail, `initrd.target` should fail, which in turn should trigger *its* `OnFailure=emergency.target`. However, this doesn't work in f29/el8: https://bugzilla.redhat.com/show_bug.cgi?id=1696796 Add a comment about that. See also: coreos/ignition-dracut#61
Configuration menu - View commit details
-
Copy full SHA for 549002e - Browse repository at this point
Copy the full SHA 549002eView commit details -
Merge pull request coreos#74 from jlebon/pr/add-comment
dracut/30ignition: link to RHBZ in ignition-complete
Configuration menu - View commit details
-
Copy full SHA for 85f2e65 - Browse repository at this point
Copy the full SHA 85f2e65View commit details
Commits on May 3, 2019
-
30ignition: drop CoreOS specific bits
Now that things are calmer, let's finish what we started and completely excise the CoreOS-specific services from this repo.
Configuration menu - View commit details
-
Copy full SHA for df88988 - Browse repository at this point
Copy the full SHA df88988View commit details
Commits on Jun 14, 2019
-
dracut: add 99emergency-timeout
If Ignition fails, instead of immediately dropping to an emergency shell, output a message indicating that Ignition failed and point to ignition-validate. Offer to drop to an emergency shell if the user presses Enter. If the user doesn't respond in 5 minutes, reboot to try again. While waiting for the timeout, keep updating the prompt with the time remaining until reboot. Brought forward from the `99emergency-timeout` dracut module present in Container Linux, with minor modifications: https://github.com/coreos/bootengine/tree/c691205c0046e3828a8536d553aea7307ca3abee/dracut/99emergency-timeout Closes: coreos#35
Robert Fairley committedJun 14, 2019 Configuration menu - View commit details
-
Copy full SHA for fe96725 - Browse repository at this point
Copy the full SHA fe96725View commit details
Commits on Jun 25, 2019
-
Merge pull request coreos#85 from rfairley/rfairley-ignition-failure
dracut: add 99emergency-timeout
Configuration menu - View commit details
-
Copy full SHA for 8551bc7 - Browse repository at this point
Copy the full SHA 8551bc7View commit details
Commits on Jul 16, 2019
-
grub: drop 02_ignition_firstboot
Now that FCOS no longer regenerates GRUB2 configs, this logic was moved to the static one in coreos-assembler: coreos/coreos-assembler#616
Configuration menu - View commit details
-
Copy full SHA for f968140 - Browse repository at this point
Copy the full SHA f968140View commit details
Commits on Aug 5, 2019
-
dracut/30ignition: scramble disk uuid on 1st boot
Require that we scramble the guid and fix the gpt header before running ignition.
Andrew Jeddeloh committedAug 5, 2019 Configuration menu - View commit details
-
Copy full SHA for 1f4ef8e - Browse repository at this point
Copy the full SHA 1f4ef8eView commit details
Commits on Aug 6, 2019
-
Merge pull request coreos#93 from ajeddeloh/fix-var
randomize the disk guid and fix the gpt header on boot
Configuration menu - View commit details
-
Copy full SHA for 6eee792 - Browse repository at this point
Copy the full SHA 6eee792View commit details -
ignition: split ignition-setup into base and user
Split ignition-setup into two units/scripts. This allows other distros to override how we fetch user configs without changing how we fetch the base config.
Andrew Jeddeloh committedAug 6, 2019 Configuration menu - View commit details
-
Copy full SHA for e098a6b - Browse repository at this point
Copy the full SHA e098a6bView commit details -
Merge pull request coreos#92 from ajeddeloh/split-boot-units
ignition: split ignition-setup into base and user
Configuration menu - View commit details
-
Copy full SHA for 7f83fa0 - Browse repository at this point
Copy the full SHA 7f83fa0View commit details -
dracut/30ignition: fix typo in module_setup
Given that this isn't causing errors there's probably something else pulling it in by the correct name, but we ought to include it here as well for clarity's sake.
Andrew Jeddeloh committedAug 6, 2019 Configuration menu - View commit details
-
Copy full SHA for 8b7f1a2 - Browse repository at this point
Copy the full SHA 8b7f1a2View commit details -
Merge pull request coreos#95 from ajeddeloh/fix-typo
dracut/30ignition: fix typo in module_setup
Andrew Jeddeloh committedAug 6, 2019 Configuration menu - View commit details
-
Copy full SHA for 343b886 - Browse repository at this point
Copy the full SHA 343b886View commit details
Commits on Aug 21, 2019
-
ignition: fix correct device path when randomizing UUID
The correct path is /dev/disk/by-label/root. Signed-off-by: Tuan Hoang <tmhoang@linux.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for 3a7911b - Browse repository at this point
Copy the full SHA 3a7911bView commit details
Commits on Aug 22, 2019
-
Merge pull request coreos#100 from tuan-hoang1/fix-partlabel
ignition: fix correct device path when randomizing UUID
Andrew Jeddeloh committedAug 22, 2019 Configuration menu - View commit details
-
Copy full SHA for 9330616 - Browse repository at this point
Copy the full SHA 9330616View commit details
Commits on Aug 29, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 9c60150 - Browse repository at this point
Copy the full SHA 9c60150View commit details
Commits on Aug 30, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 5a78e77 - Browse repository at this point
Copy the full SHA 5a78e77View commit details -
Merge pull request coreos#101 from bgilbert/bootengine
update-bootengine: drop file
Configuration menu - View commit details
-
Copy full SHA for b911126 - Browse repository at this point
Copy the full SHA b911126View commit details
Commits on Sep 10, 2019
-
Configuration menu - View commit details
-
Copy full SHA for 19a6ab3 - Browse repository at this point
Copy the full SHA 19a6ab3View commit details
Commits on Sep 16, 2019
-
30ignition: conditionally enable units requiring a boot disk
Add ignition-diskful.target, containing units that expect a writable boot disk. Enable it from the generator unless there's a command "is-live-image" which returns 0.
Configuration menu - View commit details
-
Copy full SHA for 6ea3fab - Browse repository at this point
Copy the full SHA 6ea3fabView commit details -
systemd: don't try to mark live boots complete
In live boots there's no /boot partition with a flag file to remove.
Configuration menu - View commit details
-
Copy full SHA for eb48c18 - Browse repository at this point
Copy the full SHA eb48c18View commit details -
Merge pull request coreos#102 from bgilbert/live
Conditionalize units which require a boot disk
Configuration menu - View commit details
-
Copy full SHA for cbac371 - Browse repository at this point
Copy the full SHA cbac371View commit details -
30ignition: fix double slash in ignition-setup-* dest paths
Minor cleanup; should have no functional consequences.
Configuration menu - View commit details
-
Copy full SHA for 76246ca - Browse repository at this point
Copy the full SHA 76246caView commit details
Commits on Sep 18, 2019
-
30ignition: make ignition-diskful a dependency of ignition-complete
Minor cleanup, with no intended functional change.
Configuration menu - View commit details
-
Copy full SHA for ef73508 - Browse repository at this point
Copy the full SHA ef73508View commit details -
30ignition: on live images, read config.ign from custom initrd
Allow the user to append a custom initrd containing /config.ign, and have ignition-setup-user copy it into place. This means ignition-setup-user.service needs to Require the boot device only on diskful boots, so we need to generate that dependency in ignition-generator.
Configuration menu - View commit details
-
Copy full SHA for 3b0f845 - Browse repository at this point
Copy the full SHA 3b0f845View commit details -
30ignition: move coreos-gpt-setup RemainAfterExit to correct section
It was being ignored.
Configuration menu - View commit details
-
Copy full SHA for 526081f - Browse repository at this point
Copy the full SHA 526081fView commit details -
Merge pull request coreos#105 from bgilbert/live2
On live images, read config.ign from custom initrd
Configuration menu - View commit details
-
Copy full SHA for 1e959d1 - Browse repository at this point
Copy the full SHA 1e959d1View commit details
Commits on Sep 23, 2019
-
Makefile: New file implementing
make install
See https://github.com/cgwalters/build-api With this for example, we can just have the Fedora spec file do `make install DESTDIR=$RPM_BUILD_ROOT` just like everything else; helping to ensure that as much logic as possible remains upstream. Mainly I want this for hacking so I can just `make install DESTDIR=/srv/walters/fcos/overrides/rootfs` without building an RPM or copying files manually.
Configuration menu - View commit details
-
Copy full SHA for f06c020 - Browse repository at this point
Copy the full SHA f06c020View commit details -
Add RemainAfterExit=yes to systemd units of Type=oneshot
Omitting this can cause the unit to be executed multiple times if it's a dependency of another unit (as these are). See ostreedev/ostree#1697 and https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750683
Configuration menu - View commit details
-
Copy full SHA for d166d3a - Browse repository at this point
Copy the full SHA d166d3aView commit details -
Merge pull request coreos#109 from cgwalters/remain
Add RemainAfterExit=yes to systemd units of Type=oneshot
Configuration menu - View commit details
-
Copy full SHA for db047c6 - Browse repository at this point
Copy the full SHA db047c6View commit details
Commits on Sep 24, 2019
-
30ignition: fix sequencing of target dependencies
Ensure dependencies of a target are sequenced Before the target so failures correctly propagate to the target.
Configuration menu - View commit details
-
Copy full SHA for af358bb - Browse repository at this point
Copy the full SHA af358bbView commit details -
30ignition: drop OnFailure handler from ignition-diskful.target
Failures are correctly propagating to the OnFailure handler of ignition-complete.target.
Configuration menu - View commit details
-
Copy full SHA for 496d72e - Browse repository at this point
Copy the full SHA 496d72eView commit details -
dracut: Add an ignition-fetch.service
This invokes the new `fetch` stage which does just that - fetch the Ignition config into `/run/ignition.json` and nothing else. Prep for adding support for redeploying the rootfs, which is an expensive process, so we only want to do it if the fetched Ignition config is replacing the `rootfs`.
Configuration menu - View commit details
-
Copy full SHA for d63f76f - Browse repository at this point
Copy the full SHA d63f76fView commit details
Commits on Sep 25, 2019
-
Merge pull request coreos#110 from cgwalters/fetch-stage
dracut: Add an ignition-fetch.service
Configuration menu - View commit details
-
Copy full SHA for aada644 - Browse repository at this point
Copy the full SHA aada644View commit details
Commits on Oct 1, 2019
-
30ignition: update ignition-complete.target OnFailure comment
Overriding initrd.target to OnFailureJobMode=isolate avoids the problem. I don't think we actually want to do that, and the workaround is localized to one unit now, so let's just update the comment.
Configuration menu - View commit details
-
Copy full SHA for a40e3ea - Browse repository at this point
Copy the full SHA a40e3eaView commit details -
Merge pull request coreos#111 from bgilbert/live3
30ignition: Failure handling improvements
Configuration menu - View commit details
-
Copy full SHA for 07cb575 - Browse repository at this point
Copy the full SHA 07cb575View commit details -
Run ignition-disks earlier to avoid race condition
Make sure to run before the file system checks, as sgdisk will trigger udev events, potentially resulting in race conditions due to disappearing devices. Executing earlier will avoid this (and hopefully similar) problems. Fixes coreos#114.
Configuration menu - View commit details
-
Copy full SHA for 4cdd024 - Browse repository at this point
Copy the full SHA 4cdd024View commit details -
Merge pull request coreos#116 from laenion/master
Run ignition-disks earlier to avoid race condition
Andrew Jeddeloh committedOct 1, 2019 Configuration menu - View commit details
-
Copy full SHA for cefb71c - Browse repository at this point
Copy the full SHA cefb71cView commit details
Commits on Oct 23, 2019
-
ignition-firstboot-complete.service: Run as part of basic.target
See: openshift/installer#2554 Basically the OpenShift installer on vSphere injects a service which reboots the first time, but I believe this could easily race with `ignition-firstboot-complete`. Let's mark the boot complete much earlier.
Configuration menu - View commit details
-
Copy full SHA for 598bbdd - Browse repository at this point
Copy the full SHA 598bbddView commit details -
Merge pull request coreos#124 from cgwalters/firstboot-complete-early
ignition-firstboot-complete.service: Run as part of basic.target
Configuration menu - View commit details
-
Copy full SHA for 9a25a5e - Browse repository at this point
Copy the full SHA 9a25a5eView commit details
Commits on Oct 31, 2019
-
Add
ignition-subsequent.target
for non-Ignition bootsThis is needed for Fedora CoreOS work on reprovisioning the rootfs. We tried to split out a systemd unit to handle mounting the root in this commit: coreos/fedora-coreos-config@a6fe374 with `ignition-ostree-mount-sysroot.service` but the problem is that needs to have different dependencies/ordering if we're doing the "Ignition boot" versus a "subsequent" boot. Add a new target that's queued up if we detect we're doing a "subsequent" boot.
Configuration menu - View commit details
-
Copy full SHA for 3d08487 - Browse repository at this point
Copy the full SHA 3d08487View commit details
Commits on Nov 4, 2019
-
coreos-gpt-setup: workaround old lsblk not having PTUUID
lsblk doesn't have PTUUID in the version on RHEL 8, but we can get it from blkid.
Configuration menu - View commit details
-
Copy full SHA for 207b575 - Browse repository at this point
Copy the full SHA 207b575View commit details -
Merge pull request coreos#133 from dustymabe/dusty
coreos-gpt-setup: workaround old lsblk not having PTUUID
Configuration menu - View commit details
-
Copy full SHA for fed8422 - Browse repository at this point
Copy the full SHA fed8422View commit details
Commits on Nov 6, 2019
-
firstboot-complete: tell zipl to run
zipl records need to be updated, because ignition.firstboot is burned into target disk during coreos-installer As a short-term solution for: coreos/ignition-dracut#84 Depends on: ibm-s390-linux/s390-tools#71 ibm-s390-linux/s390-tools#74 Related: coreos/coreos-installer#61 coreos/coreos-assembler#780
Configuration menu - View commit details
-
Copy full SHA for 38af701 - Browse repository at this point
Copy the full SHA 38af701View commit details
Commits on Nov 7, 2019
-
30ignition/ignition-setup-user: mount /boot partition ro
We don't actually need write access to `/boot` here to pull out any baked Ignition config. Just mount it read-only. This also helps in the case where any other service is concurrently also mounting `/boot`: trying to mount a device as read-write that's already mounted read-only elsewhere will fail. I hit this when playing with FIPS mode, which does this: https://github.com/dracutdevs/dracut/blob/718aefda1374c7b6c3790b08cae27fd6bde505af/modules.d/01fips/fips.sh#L49
Configuration menu - View commit details
-
Copy full SHA for e96e7fc - Browse repository at this point
Copy the full SHA e96e7fcView commit details -
Merge pull request coreos#134 from jlebon/pr/mount-ro
30ignition/ignition-setup-user: mount /boot partition ro
Configuration menu - View commit details
-
Copy full SHA for d9e8a63 - Browse repository at this point
Copy the full SHA d9e8a63View commit details
Commits on Nov 27, 2019
-
This is required by the new relabeling code in Ignition: coreos#846 (This is another good example of why merging this repo into coreos/ignition would be nicer I think.)
Configuration menu - View commit details
-
Copy full SHA for f6b3c1b - Browse repository at this point
Copy the full SHA f6b3c1bView commit details
Commits on Dec 5, 2019
-
Add ConditionPathExists=/etc/initrd-release to targets
I noticed that several of our units appeared to run twice, including `ignition-files.service` (!) and `ignition-ostree-mount-firstboot-sysroot.service`. [Later investigation revealed this was actually a double-logging issue.] Looking deeper into this, I discovered a bit of the initrd that I didn't even know existed, which is `initrd-parse-etc.service` that actually runs `ExecStart=-/usr/bin/systemctl --no-block start initrd-fs.target` *post* switch root, after services that are part of that target have already run (and then been shut down). This adds a big wrinkle to my understanding of system bootup. Then I noticed that `initrd-fs.target` has: `ConditionPathExists=/etc/initrd-release` which will be false post-switchroot. The semantics here are...strange. It seems like the goal is to ensure that the rootfs is definitely still mounted, perhaps in very complex rootfs scenarios? In our case it will still be mounted, we definitely don't want to rerun any of our Ignition units. [We discovered the units aren't actually being rerun, but this still seems like a best practice]
Configuration menu - View commit details
-
Copy full SHA for 8800e42 - Browse repository at this point
Copy the full SHA 8800e42View commit details -
Merge pull request coreos#140 from cgwalters/no-rerun-switchroot
Add ConditionPathExists=/etc/initrd-release to targets
Configuration menu - View commit details
-
Copy full SHA for 8168e4c - Browse repository at this point
Copy the full SHA 8168e4cView commit details
Commits on Dec 6, 2019
-
units: add ConditionPathExists=/etc/initrd-release everywhere
This is standard practice for units that are only meant to run in the initrd. It matches what e.g. `systemd` does for its initrd units. See also: coreos/ignition-dracut#140. I also snuck in `Documentation=` lines in there.
Configuration menu - View commit details
-
Copy full SHA for 736459e - Browse repository at this point
Copy the full SHA 736459eView commit details
Commits on Dec 9, 2019
-
README.md: add details about the branches here
Make it easier to understand what the branches are and how they relate to FCOS/RHCOS.
Configuration menu - View commit details
-
Copy full SHA for ab53b21 - Browse repository at this point
Copy the full SHA ab53b21View commit details
Commits on Dec 11, 2019
-
dracut: add some bins for s390x zVM instalation
To support coreos#865 Reported-by: XiaoMeiZheng <xmzheng@cn.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for c4790bc - Browse repository at this point
Copy the full SHA c4790bcView commit details
Commits on Jan 7, 2020
-
setfiles is only required on systems using SELinux.
Configuration menu - View commit details
-
Copy full SHA for e490517 - Browse repository at this point
Copy the full SHA e490517View commit details
Commits on Jan 22, 2020
-
Merge pull request coreos#91 from jlebon/pr/drop-grub
grub: drop 02_ignition_firstboot
Configuration menu - View commit details
-
Copy full SHA for f58f29c - Browse repository at this point
Copy the full SHA f58f29cView commit details
Commits on Jan 27, 2020
-
Makefile: Remove grub/ install bits
`make install` was failing now that the grub bits are gone.
Configuration menu - View commit details
-
Copy full SHA for c46a7ae - Browse repository at this point
Copy the full SHA c46a7aeView commit details -
Merge pull request coreos#150 from cgwalters/fix-makeinstall
Makefile: Remove grub/ install bits
Configuration menu - View commit details
-
Copy full SHA for ef08dd5 - Browse repository at this point
Copy the full SHA ef08dd5View commit details
Commits on Jan 30, 2020
-
Add ignition-diskful-subsequent.target
This target is a combination of `ignition-subsequent.target` and `ignition-diskful.target` - units here should only run when we have a boot disk and *aren't* doing the first boot. This came out of discussion in coreos/fedora-coreos-config#271 Will be used by FCOS. Suggested-by: @jlebon
Configuration menu - View commit details
-
Copy full SHA for 14808e2 - Browse repository at this point
Copy the full SHA 14808e2View commit details
Commits on Feb 18, 2020
-
This is the first repo that we hook up to the new CoreOS CI interface. And it's sorely needed too, since patches here can easily result in broken boots.
Configuration menu - View commit details
-
Copy full SHA for 16bd0c4 - Browse repository at this point
Copy the full SHA 16bd0c4View commit details
Commits on Mar 23, 2020
-
Dracut pulling in several binaries as dependencies which have long been replaced by native implementations or other mechanisms.
Configuration menu - View commit details
-
Copy full SHA for 09bed78 - Browse repository at this point
Copy the full SHA 09bed78View commit details -
Declare external applications as optional
The Ignition configuration supports quite a few features, from setting the user password over adding systemd services to creating partitions. For a lot of these features external helper applications are called. However not all of these configuration options are available or make sense on all systems - the current code for example lists mkfs.btrfs as an optional dependency, but mkfs.ext4 is declared as mandatory. This is not consistent, so only add those dependencies as mandatory which are required for Ignition to start / process an empty configuration file. All the other applications are declared as optional. If the Ignition configuration is using a feature where the helper application is not installed in the initrd it will boil out with an error.
Configuration menu - View commit details
-
Copy full SHA for 649be85 - Browse repository at this point
Copy the full SHA 649be85View commit details
Commits on Mar 24, 2020
-
Merge pull request coreos#160 from laenion/dracut_dependency_cleanup
Dracut dependency cleanup
Configuration menu - View commit details
-
Copy full SHA for beaece1 - Browse repository at this point
Copy the full SHA beaece1View commit details -
add coreos-teardown-initramfs-network.service
This is a forward port of coreos-teardown-initramfs-network.service from the spec2x branch [1] (used for RHEL CoreOS). When moving to NM in the initrd [2] we decided that we also needed a mechanism to take down the networking between the initramfs and the real root. While we would like to use NetworkManager's logic to do this operation in the future it's currently not easily achieved because NetworkManager is not running persistently in the initramfs [3]. [1] coreos/ignition-dracut#78 [2] coreos/fedora-coreos-tracker#394 [3] https://bugzilla.redhat.com/show_bug.cgi?id=1814038
Configuration menu - View commit details
-
Copy full SHA for 8bdbbbe - Browse repository at this point
Copy the full SHA 8bdbbbeView commit details -
coreos-teardown-initramfs-network: refactor into more functions
This will make it easier for us to add a bit more code into this file.
Configuration menu - View commit details
-
Copy full SHA for 70c7cd5 - Browse repository at this point
Copy the full SHA 70c7cd5View commit details -
coreos-teardown-initramfs-network: also propagate initramfs networkin…
…g if desired The policy here is: - If a networking configuration was provided before this point (most likely via Ignition) and exists in the real root then we do nothing and don't propagate any initramfs networking. - If a user did not provide any networking configuration then we'll propagate the initramfs networking configuration into the real root. See coreos/fedora-coreos-tracker#394 (comment)
Configuration menu - View commit details
-
Copy full SHA for 0d219cb - Browse repository at this point
Copy the full SHA 0d219cbView commit details -
coreos-teardown-initramfs-network: remove state files on switch
Remove the removal of the `/tmp/net.$1.did-setup` (used by network-legacy dracut module) and start removing files under /run/NetworkManager/ instead.
Configuration menu - View commit details
-
Copy full SHA for e0efb09 - Browse repository at this point
Copy the full SHA e0efb09View commit details -
coreos-teardown-initramfs-network: take down teams as well
down_teams() is a placeholder for now to remind us that teams do exist and need to be considered. If we find things that need to be done then we'll add actions to do in the down_teams() function in the future.
Configuration menu - View commit details
-
Copy full SHA for 42b2f06 - Browse repository at this point
Copy the full SHA 42b2f06View commit details -
coreos-teardown-initramfs-network: take down routes too
On recommendation from the NM team let's take down routes as well.
Configuration menu - View commit details
-
Copy full SHA for 03b0035 - Browse repository at this point
Copy the full SHA 03b0035View commit details -
coreos-teardown-initramfs-network: simplify networking takedown
On recommendation from the NM team let's try to delete the device first and if that doesn't work then set it to down and flush any associated addresses. Deleting virtual devices (bonds, teams, bridges, ip-tunnels, etc) will clean up any associated kernel resources, so this makes the logic for bringing down these devices easier. A real device can't be deleted so that will fail and we'll fallback to setting it down and flushing addresses.
Configuration menu - View commit details
-
Copy full SHA for 38c1c35 - Browse repository at this point
Copy the full SHA 38c1c35View commit details -
coreos-teardown-initramfs-network: enable the service statically
Since we have ignition-complete.target we don't need to use the generator to enable the unit.
Configuration menu - View commit details
-
Copy full SHA for 89f2673 - Browse repository at this point
Copy the full SHA 89f2673View commit details -
Merge pull request coreos#159 from dustymabe/dusty-network
add coreos-teardown-initramfs-network.service
Configuration menu - View commit details
-
Copy full SHA for f67d587 - Browse repository at this point
Copy the full SHA f67d587View commit details
Commits on Mar 25, 2020
-
Add
basename
dependency to dracut moduleRequired by coreos-teardown-initramfs-network.service
Configuration menu - View commit details
-
Copy full SHA for ea3bdc9 - Browse repository at this point
Copy the full SHA ea3bdc9View commit details
Commits on Mar 27, 2020
-
Add ignition-virtio-dump-journal.service
Debugging failures in the initrd is annoying; this code looks for a virtio-serial port named `com.coreos.ignition.journal`, and runs as part of `emergency.target`. I plan to change mantle to set up this port by default, so if something fails in the initramfs we'll at least reliably get the journal in a sane parsable format. This is a special targeted subset of coreos#585
Configuration menu - View commit details
-
Copy full SHA for 84c89f4 - Browse repository at this point
Copy the full SHA 84c89f4View commit details
Commits on Mar 30, 2020
-
coreos-teardown-initramfs-network: remove After=ignition-files.service
This isn't needed because the meat of this unit runs in the ExecStop.
Configuration menu - View commit details
-
Copy full SHA for c44670a - Browse repository at this point
Copy the full SHA c44670aView commit details -
coreos-teardown-initramfs-network: order ExecStop after other ignitio…
…n units We want to run the teardown after all other Ignition stages have run because some platforms (like Packet) do remote status reporting for each Ignition stage. Since we are tearing down the networking using an ExecStop we need to make sure we run the ExecStop *after* any other ignition*.service unit's ExecStop. The only other one right now is ignition-mount that has an ExecStop for doing an unmount. Since the ordering for ExecStop is the opposite of ExecStart we need to use `Before=ignition-mount.service`. Partial fix for coreos/fedora-coreos-tracker#440 This would most likely not be necessary if Ignition cached an empty result: coreos#950
Configuration menu - View commit details
-
Copy full SHA for ded5d30 - Browse repository at this point
Copy the full SHA ded5d30View commit details -
Merge pull request coreos#163 from dustymabe/dusty-teardown-ordering
coreos-teardown-initramfs-network: order ExecStop after other ignition units
Configuration menu - View commit details
-
Copy full SHA for 793d0ef - Browse repository at this point
Copy the full SHA 793d0efView commit details
Commits on Mar 31, 2020
-
Merge pull request coreos#146 from cgwalters/failure-qemu-dump
Add ignition-virtio-dump.service
Configuration menu - View commit details
-
Copy full SHA for 6136be3 - Browse repository at this point
Copy the full SHA 6136be3View commit details
Commits on Apr 23, 2020
-
coreos-teardown-initramfs-network: do SELinux relabel on copied files
The files in the real root ended up with unlabled_t file context. I'm suprised we didn't see any issues with this before. Let's fix it now.
Configuration menu - View commit details
-
Copy full SHA for b1604e9 - Browse repository at this point
Copy the full SHA b1604e9View commit details -
coreos-teardown-initramfs-network: also skip local loopback interface
Not skipping it means that we get an extra error message in our output during bootup. Let's skip it.
Configuration menu - View commit details
-
Copy full SHA for 70c2792 - Browse repository at this point
Copy the full SHA 70c2792View commit details -
coreos-teardown-initramfs-network: consider ifcfg files in real root …
…for RHCOS For RHCOS we still support ifcfg files so let's consider the ifcfg directory (/sysroot/etc/sysconfig/network-scripts/) when checking to see if a user has provided networking configuration via Ignition.
Configuration menu - View commit details
-
Copy full SHA for 2cb06d6 - Browse repository at this point
Copy the full SHA 2cb06d6View commit details -
coreos-teardown-initramfs-network: support coreos.no_persist_ip karg
Add coreos.no_persist_ip to allow for explicitly disabling the network config propagation. This is supported on the spec2x branch of ignition-dracut (i.e. for RHCOS) right now so we might as well have it in the master branch so we can keep the maintenance burden lower. Note that this adds two new functions load_dracut_libs() and dracut_func(). We needed to create these new functions in order to wrap in set +/- euo pipefail because dracut was written with set -eu in mind and there are unset variables and commands that fail in a lot of places.
Configuration menu - View commit details
-
Copy full SHA for 0665bbe - Browse repository at this point
Copy the full SHA 0665bbeView commit details -
coreos-teardown-initramfs-network: also propagate hostname
This is a forward port of 1f8184e (coreos#156). If the admin specified a hostname in the ip= karg static networking config and no hostname was specified via Ignition then we'll make sure the hostname from the ip= karg gets applied to the real root (persistently). Ideally in the future there will be better support for this in NetworkManager itself as the `network-legacy` dracut module did at least provide more support for setting the hostname via ip= kargs than `network-manager` currently does. The discussion about this problem is in [1]. The fix for that will most likely implicate changes to the propagation code introduced here. Fixes: coreos/fedora-coreos-tracker#466 [1] https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/419
Configuration menu - View commit details
-
Copy full SHA for d6805df - Browse repository at this point
Copy the full SHA d6805dfView commit details -
Merge pull request coreos#174 from dustymabe/dusty-teardown-network-i…
…mprovements coreos-teardown-initramfs-network: propagate hostname, support coreos.no_persist_ip
Configuration menu - View commit details
-
Copy full SHA for 390779d - Browse repository at this point
Copy the full SHA 390779dView commit details
Commits on Apr 30, 2020
-
dracut: add logging to systemd generator
Outputting stdout and stderr to /dev/kmsg is the only option for logging for generators for now. Let's start using it so we can at least get some messages if we ever have problems with one of our generators.
Configuration menu - View commit details
-
Copy full SHA for accb795 - Browse repository at this point
Copy the full SHA accb795View commit details -
Merge pull request coreos#177 from dustymabe/dusty-systemd-generator
dracut: add logging to systemd generator
Configuration menu - View commit details
-
Copy full SHA for c4bba64 - Browse repository at this point
Copy the full SHA c4bba64View commit details
Commits on May 1, 2020
-
coreos-teardown-initramfs-network: don't run when emergency.target
If another unit failed (like ignition-fetch.service) then don't run the ExecStop when isolating to emergency.target. We can do this by setting IgnoreOnIsolate=true. Otherwise you end up with errors like the following in the logs, which can lead someone investigating a problem in the wrong direction. ``` Stopping Tear down initramfs networking... info: taking down network device: eth0 RTNETLINK answers: Operation not supported info: flushing all routing info: no initramfs hostname information to propagate ls: cannot access '/sysroot/etc/NetworkManager/system-connections/': No such file or directory ls: cannot access '/sysroot/etc/sysconfig/network-scripts/': No such file or directory info: no networking config is defined in the real root info: propagating initramfs networking config to the real root cp: cannot create regular file '/sysroot/etc/NetworkManager/system-connections/': No such file or directory ```
Configuration menu - View commit details
-
Copy full SHA for 5778769 - Browse repository at this point
Copy the full SHA 5778769View commit details -
Merge pull request coreos#180 from dustymabe/dusty-fix-net-teardown-i…
…n-emergency-target coreos-teardown-initramfs-network: don't run when emergency.target
Configuration menu - View commit details
-
Copy full SHA for 6a87a47 - Browse repository at this point
Copy the full SHA 6a87a47View commit details
Commits on May 4, 2020
-
99emergency-timeout: also check ignition-fetch.service for failure
If the config is invalid, the failure will show up here.
Configuration menu - View commit details
-
Copy full SHA for 3949f95 - Browse repository at this point
Copy the full SHA 3949f95View commit details -
99emergency-timeout: improve readability of Ignition failure message
Line-wrap to 80 characters and add some line breaks.
Configuration menu - View commit details
-
Copy full SHA for dc156ba - Browse repository at this point
Copy the full SHA dc156baView commit details -
30ignition: drop hard requirement on qemu_fw_cfg
The original intent here was that on arches where `fw_cfg` is available, then we definitely want to make sure that either it's built into the kernel or if a module, added to the initrd. However, this check has been watered down now to to the point where it's not that useful. In coreos/ignition-dracut#176, there's a reasonable request to support not having the `qemu_fw_cfg` module installed at all even if the architecture would support it. IMO, I think we should just drop this whole logic entirely. The `qemu` module (which we depend on) already does an `instmods qemu_fw_cfg` (without `-c`), and qemu testing is the backbone of our CI testing. So realistically, we would notice very fast if `fw_cfg` support in the initrd went missing. Closes: coreos#176
Configuration menu - View commit details
-
Copy full SHA for e264315 - Browse repository at this point
Copy the full SHA e264315View commit details -
Merge pull request coreos#181 from bgilbert/linewrap
99emergency-timeout: improvements to failure message
Configuration menu - View commit details
-
Copy full SHA for 7ff38d9 - Browse repository at this point
Copy the full SHA 7ff38d9View commit details
Commits on May 12, 2020
-
99emergency-timeout: Dump all failed services
In Fedora CoreOS we have a ton of stuff going on the initramfs; our custom mount units, resizing the rootfs etc. Change this to dump all failed services, but special case Ignition services to note that something may be wrong with the config.
Configuration menu - View commit details
-
Copy full SHA for 4dc5106 - Browse repository at this point
Copy the full SHA 4dc5106View commit details
Commits on May 18, 2020
-
coreos-teardown-initramfs: propagate the automatic multipath conf
Rename coreos-teardown-initramfs-network.* to coreos-teardown-initramfs.* and add function to propigating automatic configuration through to boot. Signed-off-by: Ben Howard <ben.howard@redhat.com>
Ben Howard committedMay 18, 2020 Configuration menu - View commit details
-
Copy full SHA for c8c631a - Browse repository at this point
Copy the full SHA c8c631aView commit details -
Merge pull request coreos#186 from darkmuggle/pr/mpath-redux
coreos-teardown-initramfs: propagate the automatic multipath conf
Ben Howard committedMay 18, 2020 Configuration menu - View commit details
-
Copy full SHA for ee9fcda - Browse repository at this point
Copy the full SHA ee9fcdaView commit details
Commits on May 19, 2020
-
30ignition: clean up Ignition stages ordering
First, put the order of the stages in every unit file. Then, make sure to include both the appropriate `After=` and `Before=` in accordance with the unit's place in the chain. There's redundancy there, but it makes it really obvious and explicit how they go together.
Configuration menu - View commit details
-
Copy full SHA for 142bfda - Browse repository at this point
Copy the full SHA 142bfdaView commit details -
ignition-setup-user.service: run before multipathd
This is required because the unit needs read-only access to `/boot` in order to extract any baked in user-provided config and multipathd might claim ownership. See: coreos/ignition-dracut#183
Configuration menu - View commit details
-
Copy full SHA for 1d34fc2 - Browse repository at this point
Copy the full SHA 1d34fc2View commit details
Commits on Jun 1, 2020
-
Remove OnFailure= from targets, put in services
In systemd v245, which is in f32, the `OnFailure=` directive in target units stopped working. This seems to be by design though: systemd/systemd#14142 If target units were never meant to handle this, this might be why we've had issues like boot loops on failure in the past (see coreos#115). Anyway, let's just pepper our services with the directive instead.
Configuration menu - View commit details
-
Copy full SHA for 8f5d1ec - Browse repository at this point
Copy the full SHA 8f5d1ecView commit details
Commits on Jun 3, 2020
-
Configuration menu - View commit details
-
Copy full SHA for 70afbb3 - Browse repository at this point
Copy the full SHA 70afbb3View commit details -
Merge pull request coreos#190 from bgilbert/wipefs
30ignition: add wipefs to the initramfs
Configuration menu - View commit details
-
Copy full SHA for 93d5d83 - Browse repository at this point
Copy the full SHA 93d5d83View commit details
Commits on Jun 9, 2020
-
30ignition: GPT setup: wait for 'boot' labeled partition
This unit must the first to run when the disk holding the root partition becomes available. To avoid relying on the name of the root partition which is different between RHCOS LUKS setup and current FCOS setup, we wait for the partition labeled 'boot' to become available. This is reliable as we don't have any plan to support re-provisioning/re-writing the /boot partition, This is the only unit where it is safe to wait only on a specific disk label as this will call udevadm settle after the GPT setup. Units that requires the boot and root partitions to be available should order themselves after this unit.
Configuration menu - View commit details
-
Copy full SHA for bdf0a65 - Browse repository at this point
Copy the full SHA bdf0a65View commit details
Commits on Jun 10, 2020
-
ci: test with git master of coreos/ignition
This is symmetrical to coreos#994.
Configuration menu - View commit details
-
Copy full SHA for 2874fda - Browse repository at this point
Copy the full SHA 2874fdaView commit details
Commits on Jun 18, 2020
-
Add new ignition-fetch-offline.service
Make use of the new `fetch-offline` stage: coreos#979 We run this between the `setup` and `fetch` stages (the latter possibly being skipped if networking is not required). We hit the same issue here that `coreos-copy-firstboot-network.service` hit, which is that we can't run before the `cmdline` hook because that runs *before* udev, but we want the `by-*` symlinks for `ignition-setup-user.service`. The hack we do here is to rerun the NM cmdline hook in case ignition dropped a snippet in `/etc/cmdline.d`. As mentioned in coreos/fedora-coreos-config#346, we'll be able to do this more cleanly once we run NM as a systemd service directly.
Configuration menu - View commit details
-
Copy full SHA for 1cfb0dd - Browse repository at this point
Copy the full SHA 1cfb0ddView commit details -
30ignition: make var in dracut_func local
No reason to leak this outside the function.
Configuration menu - View commit details
-
Copy full SHA for 2b669b0 - Browse repository at this point
Copy the full SHA 2b669b0View commit details
Commits on Jun 24, 2020
-
make: install systemd unit as non-executable
This tweaks permissions when installing units in order to avoid the following warning at boot time: ``` systemd[1]: Configuration file /usr/lib/systemd/system/ignition-firstboot-complete.service is marked executable. Please remove executable permission bits. Proceeding anyway. ```
Configuration menu - View commit details
-
Copy full SHA for e081e9e - Browse repository at this point
Copy the full SHA e081e9eView commit details -
Merge pull request coreos#196 from lucab/ups/make-install
make: install systemd unit as non-executable
Luca Bruno committedJun 24, 2020 Configuration menu - View commit details
-
Copy full SHA for 15def21 - Browse repository at this point
Copy the full SHA 15def21View commit details
Commits on Jul 10, 2020
-
dracut/30ignition: add Ignition LUKS
Adds LUKS related binaries to dracut & a udev rule to discover unformatted encrypted devices.
Configuration menu - View commit details
-
Copy full SHA for fdc7e51 - Browse repository at this point
Copy the full SHA fdc7e51View commit details -
Configuration menu - View commit details
-
Copy full SHA for e75fef0 - Browse repository at this point
Copy the full SHA e75fef0View commit details
Commits on Jul 16, 2020
-
dracut/30ignition: fix typo in udev rule
Mistakenly the udev rule is using `:=` which is already being assumed by udev to mean `=`. Change it to stop emitting a warning.
Configuration menu - View commit details
-
Copy full SHA for 6b1d128 - Browse repository at this point
Copy the full SHA 6b1d128View commit details
Commits on Jul 22, 2020
-
30ignition: move conditional network startup out of ignition-dracut
ignition-check-neednet.sh knows too much about distro-level networking configuration. In addition, other things in the initramfs might want to conditionally enable networking, and they'd currently need to reimplement ignition-check-neednet.sh to do so. Instead, let the distro provide its own unit that checks for /run/ignition/neednet. That unit can use dependencies to sequence ignition-fetch-offline.service correctly for its own needs.
Configuration menu - View commit details
-
Copy full SHA for 92661c4 - Browse repository at this point
Copy the full SHA 92661c4View commit details -
Merge pull request coreos#200 from bgilbert/condnet
Move conditional network startup out of ignition-dracut
Configuration menu - View commit details
-
Copy full SHA for 98ed51d - Browse repository at this point
Copy the full SHA 98ed51dView commit details
Commits on Jul 23, 2020
-
Merge Ignition-Dracut into Ignition itself.
Ben Howard committedJul 23, 2020 Configuration menu - View commit details
-
Copy full SHA for a04ea6d - Browse repository at this point
Copy the full SHA a04ea6dView commit details -
Ben Howard committed
Jul 23, 2020 Configuration menu - View commit details
-
Copy full SHA for 629fc6d - Browse repository at this point
Copy the full SHA 629fc6dView commit details -
dracut: remove CoreOS specific modules
The CoreOS specific modules have been moved to https://github.com/coreos/fedora-coreos-config.
Ben Howard committedJul 23, 2020 Configuration menu - View commit details
-
Copy full SHA for 6a5575c - Browse repository at this point
Copy the full SHA 6a5575cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 12edd76 - Browse repository at this point
Copy the full SHA 12edd76View commit details