tag:github.com,2008:https://github.com/coreos/ignition/releases Release notes from ignition 2024-10-23T13:14:43Z tag:github.com,2008:Repository/33020174/v2.20.0 2024-10-28T15:27:49Z V2.20.0 <p>Features</p> <ul> <li>Support partitioning disk with mounted partitions</li> <li>Support Proxmox VE</li> <li>Support gzipped Akamai user_data</li> </ul> <p>Changes</p> <ul> <li>The Dracut module now installs partx</li> <li>Mark the 3.5.0 config spec as stable</li> <li>No longer accept configs with version 3.5.0-experimental</li> <li>Create new 3.6.0-experimental config spec from 3.5.0</li> </ul> <p>Bug fixes</p> <ul> <li>Fix network race when phoning home on Equinix Metal</li> <li>Fix Akamai Ignition base64 decoding on padded payloads</li> <li>Fix Makefile GOARCH for loongarch64 (<a class="issue-link js-issue-link" data-error-text="Failed to load title" data-id="2524625452" data-permission-text="Title is private" data-url="https://github.com/coreos/ignition/issues/1942" data-hovercard-type="pull_request" data-hovercard-url="/coreos/ignition/pull/1942/hovercard" href="https://github.com/coreos/ignition/pull/1942">#1942</a>)</li> </ul> prestist tag:github.com,2008:Repository/33020174/v2.19.0 2024-06-07T14:49:12Z V2.19.0 <h3>Features</h3> <ul> <li>Support Akamai Connected Cloud (Linode)</li> <li>Support LUKS encryption using IBM CEX secure keys</li> </ul> prestist tag:github.com,2008:Repository/33020174/v2.18.0 2024-03-11T15:22:51Z v2.18.0 <h2>Ignition 2.18.0</h2> <h3>Breaking changes</h3> <ul> <li>Only include dracut module in initramfs if requested (see distributor notes<br> for details)</li> </ul> <h3>Features</h3> <ul> <li>Support Scaleway</li> </ul> <h3>Changes</h3> <ul> <li>Require Go 1.20+</li> </ul> yasminvalim tag:github.com,2008:Repository/33020174/v2.17.0 2023-11-24T13:14:17Z v2.17.0 <p>Starting with this release, ignition-validate binaries are signed with the<br> <a href="https://getfedora.org/security/" rel="nofollow">Fedora 39 key</a>.</p> <h3>Features</h3> <ul> <li>Support the native Apple Hypervisor</li> <li>Support Hetzner Cloud</li> <li>A GRUB configuration suitable for use with <a href="https://github.com/coreos/bootupd">https://github.com/coreos/bootupd</a><br> can now be installed; use <code>make install-grub-for-bootupd</code> to install it</li> </ul> <h3>Changes</h3> <ul> <li>Require Go 1.19+</li> </ul> <h3>Bug fixes</h3> <ul> <li>Prevent races with udev after disk editing</li> <li>Don't fail to wipe partition table if it's corrupted</li> </ul> yasminvalim tag:github.com,2008:Repository/33020174/v2.16.2 2023-07-13T17:56:43Z v2.16.2 <h3>Bug fixes</h3> <ul> <li>Fix Dracut module installation on arches other than x86 and aarch64</li> </ul> bgilbert tag:github.com,2008:Repository/33020174/v2.16.1 2023-07-12T08:28:34Z v2.16.1 <p>Starting with this release, ignition-validate binaries are signed with the <a href="https://getfedora.org/security/" rel="nofollow">Fedora 38 key</a>.</p> <p>Ignition v2.16.0 included a build regression on 32-bit machines and was not released. These notes include all changes since v2.15.0.</p> <h3>Features</h3> <ul> <li>Support Hyper-V platform</li> <li>Automatically generate spec docs</li> </ul> <h3>Changes</h3> <ul> <li>Clarify spec terminology for contents of CA bundles, files, and key files</li> <li>Improve rendering of spec docs on docs site</li> </ul> <h3>Bug fixes</h3> <ul> <li>Fix failure disabling nonexistent unit with systemd ≥ 252</li> <li>Don't relabel a mount point that already exists</li> <li>Document that <code>hash</code> fields describe decompressed data</li> <li>Clarify documentation of <code>passwordHash</code> fields</li> <li>Correctly document Tang <code>advertisement</code> field as optional</li> </ul> <h3>Test changes</h3> <ul> <li>Support and require xfsprogs ≥ 5.19 in blackbox tests</li> </ul> bgilbert tag:github.com,2008:Repository/33020174/v2.16.0 2023-06-29T21:57:44Z v2.16.0 <p>Ignition v2.16.0</p> bgilbert tag:github.com,2008:Repository/33020174/v2.15.0 2023-02-23T16:09:22Z v2.15.0 <p>Starting with this release, ignition-validate binaries are signed with the <a href="https://getfedora.org/security/" rel="nofollow">Fedora 37 key</a>.</p> <h3>Features</h3> <ul> <li>Support offline Tang provisioning via pre-shared advertisement <em>(3.4.0)</em></li> <li>Allow enabling discard passthrough on LUKS devices <em>(3.4.0)</em></li> <li>Allow specifying arbitrary LUKS open options <em>(3.4.0)</em></li> <li>Ship aarch64 macOS ignition-validate binary in GitHub release artifacts</li> </ul> <h3>Changes</h3> <ul> <li>Mark the 3.4.0 config spec as stable</li> <li>No longer accept configs with version 3.4.0-experimental</li> <li>Create new 3.5.0-experimental config spec from 3.4.0</li> <li>Fail if files/links/dirs conflict with systemd units or dropins</li> <li>Warn if template for enabled systemd instance unit has no <code>Install</code> section</li> <li>Warn if filesystem overwrites partitioned disk</li> <li>Warn if <code>wipeTable</code> overwrites a filesystem that would otherwise be reused</li> <li>Warn if <code>user</code>/<code>group</code> specified for hard link</li> <li>Install ignition-apply in <code>/usr/libexec</code></li> <li>Allow distros to add Ignition command-line arguments from a unit drop-in</li> <li>Convert <code>NEWS</code> to Markdown and move to docs site</li> <li>Require Go 1.18+</li> </ul> <h3>Bug fixes</h3> <ul> <li>Don't overwrite LUKS1 volume when <code>storage.luks.wipeVolume</code> is false</li> <li>Request network when custom Clevis config has <code>needsNetwork</code> set</li> <li>Fix creating LUKS volume with custom Clevis config that uses TPM2</li> <li>Avoid logging spurious error when a LUKS volume wasn't previously formatted</li> <li>Fix version string in ignition-validate release container</li> <li>Fix reproducibility of systemd preset file in ignition-apply output</li> <li>Document that <code>user</code>/<code>group</code> fields aren't applied to hard links</li> <li>Clarify spec docs for <code>files</code>/<code>directories</code>/<code>links</code> <code>group</code> fields</li> </ul> bgilbert tag:github.com,2008:Repository/33020174/v2.14.0 2022-05-26T04:43:44Z v2.14.0 <p>Starting with this release, ignition-validate binaries are signed with the <a href="https://getfedora.org/security/" rel="nofollow">Fedora 36 key</a>.</p> <p>Features:</p> <ul> <li>Support <a href="https://kubevirt.io" rel="nofollow">KubeVirt</a> platform</li> <li>Support AWS <code>arn:</code> <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/s3-arn-format.html" rel="nofollow">URLs</a> for S3 objects and access points (3.4.0-exp)</li> <li>Support reading configs from Azure <a href="https://docs.microsoft.com/en-us/azure/virtual-machines/windows/instance-metadata-service?tabs=windows" rel="nofollow">IMDS</a> "user data"</li> <li>Support S3 fetch via IPv6</li> <li>Add ignition-apply entrypoint to apply an Ignition config in a container</li> </ul> <p>Changes:</p> <ul> <li>Delete userdata after provisioning on VirtualBox and VMware by default (see <a href="https://github.com/coreos/ignition/blob/main/docs/operator-notes.md#automatic-config-deletion">operator notes</a> for details) (<a title="GHSA-hj57-j5cw-2mwp" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-hj57-j5cw-2mwp/hovercard" href="https://github.com/advisories/GHSA-hj57-j5cw-2mwp">GHSA-hj57-j5cw-2mwp</a>, <a href="https://access.redhat.com/security/cve/CVE-2022-1706" rel="nofollow">CVE-2022-1706</a>)</li> <li>Support setting setuid/setgid/sticky mode bits (3.4.0-exp)</li> <li>Warn if setuid/setgid/sticky mode bits specified (3.0.0 - 3.3.0)</li> <li>Support UEFI Secure Boot on VMware</li> <li>Add arm64 support to ignition-validate container</li> <li>Document S3 fetch semantics in <a href="https://github.com/coreos/ignition/blob/main/docs/operator-notes.md#aws-s3-access">operator notes</a></li> <li>Document considerations for handling secrets in <a href="https://github.com/coreos/ignition/blob/main/docs/operator-notes.md#secrets">operator notes</a></li> </ul> <p>Bug Fixes:</p> <ul> <li>Fix disabling systemd units with pre-existing enablement symlinks</li> <li>Fix reuse of statically keyed LUKS volumes (2.12.0 regression)</li> <li>Fix <code>gs://</code> fetch in GCE instances configured without a service account</li> <li>Fix error reading VirtualBox guest properties that have flags</li> <li>Fix infinite loop if <code>-root</code> command-line argument is a relative path</li> </ul> prestist tag:github.com,2008:Repository/33020174/v2.13.0 2021-12-01T22:14:16Z v2.13.0 <p>Starting with this release, ignition-validate binaries are signed with the <a href="https://getfedora.org/security/" rel="nofollow">Fedora 35 key</a>.</p> <p>Features:</p> <ul> <li>Add Nutanix provider</li> <li>Switch VirtualBox provider to read from <code>/Ignition/Config</code> guest property</li> </ul> <p>Changes:</p> <ul> <li>Improve QEMU <code>fw_cfg</code> read performance</li> <li>Warn when QEMU <code>fw_cfg</code> config is too large for reasonable performance</li> <li>Move Ignition report to <code>/etc/.ignition-result.json</code></li> <li>Improve resilience to filesystem unmount failures</li> <li>Run <code>mkfs.fat</code> instead of its alias <code>mkfs.vfat</code></li> <li>Refresh supported platform documentation</li> </ul> <p>Bug Fixes:</p> <ul> <li>Make <code>ignition.version</code> required in JSON schema (3.4.0-exp)</li> <li>Disallow null <code>noProxy</code> array entries in JSON schema (3.4.0-exp)</li> </ul> sohankunkerkar