Permalink
Commits on Jun 14, 2018
  1. SW: add dislocker to GRML_FULL

    mika committed Jun 14, 2018
    Thanks: f0
    Closes grml/grml#60
Commits on Jun 8, 2018
  1. SW: add qemu-guest-agent to GRML_FULL

    mika committed Jun 8, 2018
    With qemu-guest-agent service being present we support retrieving
    network information from a VM, as supported with e.g. Proxmox
    v5.2 (verified with qemu-guest-agent v1:2.8+dfsg-6 on grml64-full
    2017.05).
    
    Adding only to GRML_FULL as on GRML_SMALL it would pull in
    libglib2.0-0 and add ~6MB of disk space, while on GRML_FULL
    it's only ~1MB total.
Commits on Jun 1, 2018
  1. Release new version 0.32.0

    mika committed Jun 1, 2018
  2. SW: add thin-provisioning-tools to GRML_FULL

    mika committed Jun 1, 2018
    Quoting from the bugreport:
    
    | In order to activate lvm volumes which use lvm caching,
    | /usr/sbin/cache_check (provided by thin-provisioning-tools) needs
    | to be installed (see https://bugs.debian.org/773731). As grml
    | currently does not include thin-provisioning-tools, volumes which
    | use caching cannot be activated on startup (e.g. via the lvm boot
    | option), not activated manually (naturally one can install
    | thin-provisioning-tools via apt, but that doesn't help with
    | activating on startup).
    
    Closes grml/grml#81
    Thanks: James Tocknell
Commits on May 30, 2018
  1. Update GRUB test for Secure Boot support

    mika committed May 29, 2018
    cpuid with the recent Ubuntu GRUB no longer fails,
    so instead let's invoke `probe` with an incomplete
    command line, which returns fine in SecureBoot
    boot environment while it fails in full GRUB
    session with an error message.
  2. templates/EFI: use files from Ubuntu 18.04

    paulmenzel authored and mika committed May 23, 2018
    Currently, the shim cannot be loaded with TianoCore (using
    /usr/share/edk2.git/ovmf-x64/OVMF-pure-efi.fd from
    https://www.kraxel.org/repos/jenkins/edk2/edk2.git-ovmf-x64-0-20180508.84.g7cd8a57599.noarch.rpm)
    and also fails on several systems like on the Dell XPS 13 9360 and 9370,
    Dell r640 (see http://ml.grml.org/pipermail/grml/2018-May/011734.html)
    and HP EliteBook 820 G3.
    
    Error message during boot:
    
    | Reloc 0 block size 2756420659 is invalid
    | Relocation failed: Unsupported
Commits on May 25, 2018
  1. Release new version 0.31.3

    mika committed May 25, 2018
  2. Bump Standards-Version to 4.1.4

    mika committed May 25, 2018
  3. add placeholder and explanation inviting local patches to isolinux.cfg

    Marc Haber authored and mika committed Mar 19, 2018
    this closes grml/grml-live #45
    
    This is unfortunately completely untested, since to multiple issues, one
    of them being grml/grml-live #44 and grml/grml-live #46 are still
    unaddressed, I cannot currently reliably build grml images. As it is a
    comment-only patch, this can be safely applied and I'll happily test a
    daily image afterwards.
Commits on May 13, 2018
  1. SW: add restic

    mika committed May 13, 2018
    As suggested by Frank Terbeck <ft@grml.org>
Commits on Apr 27, 2018
  1. Release new version 0.31.2

    mika committed Apr 27, 2018
  2. updatebase.GRMLBASE: no longer install aptitude

    mika committed Apr 27, 2018
    We sitched from aptitude to apt-get as package manager in FAI's
    package list back in commit 121b348, so we shouldn't strictly
    need aptitude any longer. The ongoing ncurses transition is
    failing our builds currently, so that's a good chance to make
    this change.
  3. Replace /etc/apt/grml.key with /etc/apt/trusted.gpg.d/grml-archive-ke…

    mika committed Apr 27, 2018
    …yring.gpg
    
    /etc/apt/grml.key was a PGP public key block Public-Key (old) and
    required installation via apt-key.
    
    By instead placing a `GPG key public ring` into
    /etc/apt/trusted.gpg.d/grml-archive-keyring.gpg we don't need
    this extra apt-key invocation any longer, which might actually
    fail with:
    
    | E: gnupg, gnupg2 and gnupg1 do not seem to be installed, but one of them is required for this operation
    
    Installation of gnupg isn't enough though, since then we run
    into:
    
    | 10:45:56 Warning: apt-key output should not be parsed (stdout is not a terminal)
    | 10:45:58 gpg: can't connect to the agent: IPC connect call failed
    
    Drop old /etc/grml/fai/config/files/etc/apt/grml.key/GRMLBASE via maintscript
    
    Thanks: Antoine Beaupré <anarcat@debian.org> for a related PR
    in grml/grml-debian-keyring#3
  4. SW: replace iproute with iproute2

    mika committed Apr 27, 2018
    iproute is a transitional package for iproute2 since Debian/jessie
    and no longer exists starting with Debian/buster.
  5. SW: drop apt-transport-https from GRMLBASE

    mika committed Apr 27, 2018
    apt-transport-https is a transitional package starting with
    Debian/buster, so the package is no longer relevant for builds
    against Debian/testing + sid/unstable nowadays.
    
    If someone needs this package in grml-live builds using
    Debian/stretch or older Debian releases then the package should
    be included in local configurations.
Commits on Mar 28, 2018
  1. Use stretch-backports instead of jessie-backports for stable

    Markus Lindberg
    Markus Lindberg committed Mar 28, 2018
Commits on Mar 14, 2018
  1. GRMLBASE/98-clean-chroot: execute resolvconf workarounds also for sys…

    mika committed Mar 14, 2018
    …temd
    
    /etc/resolvconf/resolv.conf.d/original leaks data from the environment
    the ISO was built in, and /etc/resolv.conf should be empty and be filled
    with data from DHCP.
    
    Thanks: András Korn
Commits on Feb 20, 2018
  1. Release new version 0.31.1

    mika committed Feb 20, 2018
Commits on Feb 15, 2018
  1. Do not handle lid switch

    marcosfrm committed Feb 15, 2018
Commits on Dec 1, 2017
  1. ssh service: set RuntimeDirectory=sshd to work with recent openssh ve…

    mika committed Dec 1, 2017
    …rsions
    
    We need to set RuntimeDirectory=sshd, otherwise /run/sshd doesn't
    exist and service startup fails with:
    
    | grml sshd[1845]: Missing privilege separation directory: /run/sshd
    
    While at it sync our ssh service file with Debian's openssh
    package 1:7.6p1-2 and drop the unused ssh-bootoption.service
    file (we currently start ssh service via grml-autoconfig).
    
    Also see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864190
    
    Closes grml/grml#80
    
    Thanks: sl0n for bugreport
    Thanks: Darshaka Pathirana <dpat@grml.org> for feedback
Commits on Nov 22, 2017
  1. GRMLBASE/93-update-usbids: test for new update-usbids location in /us…

    mika committed Nov 22, 2017
    …r/sbin
    
    "Recent" versions of usbutils ship the update-usbids
    binary in /usr/sbin and no longer in /usr/bin.
  2. GRMLBASE/91-update-pciids: test for new update-pciids location in /us…

    mika committed Nov 22, 2017
    …r/sbin
    
    Since pciutils v1:3.2.0-1 the update-pciids binary lives in
    /usr/sbin and no longer in /usr/bin.
Commits on Nov 16, 2017
  1. GRMLBASE/52-mdadm: fix path for 64-md-raid-assembly.rules

    mika committed Nov 16, 2017
    This should be /lib/udev/rules.d/64-md-raid-assembly.rules
    and not /usr/lib/udev/rules.d/64-md-raid-assembly.rules
    
    While at it use the same approach as for GRMLBASE/50-lvm
    in the previous commit, by creating an empty file
    instead of just removing it.
  2. Generate empty /lib/udev/rules.d/69-lvm-metad.rules instead of removi…

    mika committed Nov 16, 2017
    …ng the file
    
    Since lvm2 2.02.176-4 initramfs generation fails if
    neither /etc/udev/rules.d/69-lvm-metad.rules nor
    /lib/udev/rules.d/69-lvm-metad.rules exists.
    So instead of removing the file just create an empty one.
    
    See http://bugs.debian.org/881916
Commits on Oct 6, 2017
  1. SW: add ldnsutils to GRML_SMALL

    mika committed Oct 6, 2017
    dig would be nice to have, though pulls in ~41MB of disk space.
    drill from ldnsutils is a nice alternative.
    
    See grml/grml/#56
  2. SW: add x11vnc to GRML_FULL to properly support vnc boot option

    mika committed Oct 6, 2017
    Closes grml/grml#62
    
    Thanks: luke2261git for the bugreport
Commits on Sep 23, 2017
  1. Fix a bunch of typos

    mika committed Sep 23, 2017
    s/and and/and/
    s/simplier/simpler/
    s/dependancy/dependency/
    s/mesages/messages/
    s/retreive/retrieve/
    s/to to/to/
    s/specifed/specified/
Commits on Sep 7, 2017
  1. Release new version 0.31.0

    mika committed Sep 7, 2017
  2. scripts/generate_netboot_package.sh: use net.ifnames=0 as default boo…

    mika committed Sep 7, 2017
    …t option
    
    Otherwise we end up with arbitrary network device names which
    aren't properly supported (yet).
    
    See grml/grml#65
Commits on Sep 6, 2017
  1. Secure Boot GRUB template: be more dynamic + don't overwrite with emp…

    mika committed Sep 6, 2017
    …ty variable
    
    By searching for grmlenv.cfg we can make it more dynamic
    instead of having to hardcode (hd0) which might be wrong
    in the grml2usb situation.
    
    There's also no need to set root/prefix multiple times, especially
    since we depend on 'root=(hd0)' for the default ISO boot anyway.
    
    Don't overwrite prefix if the grml_orig_prefix variable is empty.
    
    Secure Boot enabled ISOs generated with grml-live >=0.31.0 are supported
    with grml2usb >=0.16.0.
Commits on Sep 1, 2017
  1. SW: add btrfs-progs to GRML_SMALL

    mika committed Sep 1, 2017
Commits on Aug 31, 2017
  1. Secure Boot support

    mika committed Aug 31, 2017
    Thanks to the way the signed GRUB by Ubuntu works we seem to be
    able to keep our common EFI GRUB configs working next to the new
    Secure Boot related EFI GRUB configs. If Secure Boot is enabled
    we get the same look and feel like with common EFI boot, though
    with a Secure Boot specific boot menu (since e.g. the linux16
    command isn't available under Secure Boot). If EFI is running
    with Secure Boot *disabled* it continues to look like it used to
    do so far. If this is working out as planned there's no visible
    change from a user point of view on systems with Secure Boot
    disabled.
    
    With this change we also get rid of some magic with grml-live
    relying on behavior of
    /etc/grml/fai/config/scripts/GRMLBASE/45-grub-images, including
    moving files around.
    
    We also no longer skip the boot stage during rebuilds. This has
    been a source of frustration and annoying debugging sessions when
    files inside grml_cd/boot/ didn't receive changes during rebuilds
    and the user in front of the system is ignoring the according
    "skip" notice or forgot to remove grml_cd/boot.
    
    While at it rewrite debian/copyright in
    http://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
    
    Thanks: Michael Schierl <schierlm@gmx.de> for help regarding the Secure Boot setup
Commits on Aug 30, 2017
  1. SW: add whois to GRML_SMALL

    mika committed Aug 30, 2017
    It adds only 346kb of additional disk space.
    
    Debian's mkpasswd is part of the whois package.
    It's the mkpassword that can generate salted hashes suitable for /etc/shadow.
    
    Thanks: Marc Haber for the suggestion
    Closes grml/grml#66