You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is a major releases as #877 is a core change of the Kairos boot process.
We replaced the former dracut modules (a set of bash scripts/dracut/systemd services), which were responsible for the immutability management of Kairos, with https://github.com/kairos-io/immucore, a self-contained binary which doesn't have dependencies and can run without dracut and systemd.
debug things more cleanly, have a better testbed, and allow to integrate easily with golang
Besides, we have now full SBOM list attached to images, as part of the release process, and in-toto attestation, allowing you to verify attestation also of SBOM lists, and have full audit of images. We also have integrated grype and trivy in our pipelines, and as such now releases contains also CVE reports, and finally we upload the generated reports as sarif file to GitHub to have notifications and see with more ease the impact of CVEs to the images.
There were also fixes to the Debian flavor (thanks to the community for reporting issues!) and now manual upgrades with private registries are supported, too.
πΊ What's left for release
ποΈ Factory ( #116 )
π¨ UX ( #773 )
π Media/Blog posts ( #774 )
π CoCo/Security (#347)
π± Generic
π Bugfixing:
config_url
is saved as part of the config during netbootΒ #885π¦ Highlights
This is a major releases as #877 is a core change of the Kairos boot process.
We replaced the former dracut modules (a set of bash scripts/dracut/systemd services), which were responsible for the immutability management of Kairos, with https://github.com/kairos-io/immucore, a self-contained binary which doesn't have dependencies and can run without dracut and systemd.
This allows us to:
Besides, we have now full SBOM list attached to images, as part of the release process, and
in-toto
attestation, allowing you to verify attestation also of SBOM lists, and have full audit of images. We also have integratedgrype
andtrivy
in our pipelines, and as such now releases contains also CVE reports, and finally we upload the generated reports as sarif file to GitHub to have notifications and see with more ease the impact of CVEs to the images.There were also fixes to the Debian flavor (thanks to the community for reporting issues!) and now manual upgrades with private registries are supported, too.
Finally, it is also now possible to specify custom bind mounts path to overlay on top of the persistent partition, allowing to easily specify paths that you want to be persistent in the system via the cloud config file: https://kairos.io/docs/advanced/customizing/#customizing-the-file-system-hierarchy-using-custom-mounts .
β Release Checklist
rc
,alpha
, ... based on changes on the CIkairos-io/kairos
.osbuilder
version bumpsCORE_VERSION
file ofkairos-io/provider
to match the release tag ofkairos-io/kairos
provider-kairos
The text was updated successfully, but these errors were encountered: