Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

πŸ“’ Kairos release v2.0.0 #754

Closed
30 of 35 tasks
mudler opened this issue Jan 27, 2023 · 2 comments
Closed
30 of 35 tasks

πŸ“’ Kairos release v2.0.0 #754

mudler opened this issue Jan 27, 2023 · 2 comments
Labels

Comments

@mudler
Copy link
Member

mudler commented Jan 27, 2023

πŸ—Ί What's left for release

πŸ—οΈ Factory ( #116 )

🎨 UX ( #773 )

πŸ“– Media/Blog posts ( #774 )

πŸ”’ CoCo/Security (#347)

🌱 Generic

πŸ› Bugfixing:

πŸ”¦ Highlights

This is a major releases as #877 is a core change of the Kairos boot process.

We replaced the former dracut modules (a set of bash scripts/dracut/systemd services), which were responsible for the immutability management of Kairos, with https://github.com/kairos-io/immucore, a self-contained binary which doesn't have dependencies and can run without dracut and systemd.

This allows us to:

Besides, we have now full SBOM list attached to images, as part of the release process, and in-toto attestation, allowing you to verify attestation also of SBOM lists, and have full audit of images. We also have integrated grype and trivy in our pipelines, and as such now releases contains also CVE reports, and finally we upload the generated reports as sarif file to GitHub to have notifications and see with more ease the impact of CVEs to the images.

There were also fixes to the Debian flavor (thanks to the community for reporting issues!) and now manual upgrades with private registries are supported, too.

Finally, it is also now possible to specify custom bind mounts path to overlay on top of the persistent partition, allowing to easily specify paths that you want to be persistent in the system via the cloud config file: https://kairos.io/docs/advanced/customizing/#customizing-the-file-system-hierarchy-using-custom-mounts .

βœ… Release Checklist

  • Stage 0 - Finishing Touches
    • Check kairos/packages, and for any needed update
    • Make sure CI tests are passing.
    • Consider cutting an rc, alpha, ... based on changes on the CI
  • Stage 1 - Manual testing
    • How: Using the assets from master, make sure that test scenarios not covered by automatic tests are passing, and that docs are still aligned
      • Fedora flavor install, and manual upgrade works
      • ARM images (openSUSE, alpine) boots and manual upgrade works
  • Stage 3 - Release
    • Tag the release on master.
  • Stage 4 - Update provider-kairos
    • Update go mod to consume kairos-io/kairos.
    • Check if any changes on the pipelines and building pieces are required
      • Flavor changes
      • osbuilder version bumps
    • Update the CORE_VERSION file of kairos-io/provider to match the release tag of kairos-io/kairos
    • Tag the release on provider-kairos
  • Stage 5 - Announcement
    • Blog post announcement
@mudler mudler added the release label Jan 27, 2023
@mudler mudler self-assigned this Jan 27, 2023
@mudler mudler changed the title Kairos release v1.6.0 πŸ“’ Kairos release v1.6.0 Jan 27, 2023
@mudler mudler changed the title πŸ“’ Kairos release v1.6.0 πŸ“’ Kairos release v1.7.0 Jan 30, 2023
@mudler mudler changed the title πŸ“’ Kairos release v1.7.0 πŸ“’ Kairos release v2.0.0 Feb 20, 2023
@mudler
Copy link
Member Author

mudler commented Apr 3, 2023

blocked by #1240

@mudler
Copy link
Member Author

mudler commented Apr 14, 2023

2.0.0 is released now, all artifacts are there, announcement blog post too!

@mudler mudler closed this as completed Apr 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: Q1 2023
Archived in project
Development

No branches or pull requests

1 participant