-
Notifications
You must be signed in to change notification settings - Fork 100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
suc-script needs to mount /sys for UKI upgrades #2586
Comments
The suc scripts:
let's make sure, our docs and script work both for UKI and non-UKI cases. @nianyush you also have a version of the suc script that works with UKI. Can you link to it here? |
Sure I can help to add an example |
For uki, we built an image based on ubuntu and addded efi files into it. So basically its an ubuntu image + /trusted-boot folder which looks like
SUC plan to work with this
|
And for non uki, we just use the kairos rootfs image as the plan image instead of using ubuntu image like how kairos docs is doing nowadays. The benefit would be that we can leverage k8s functionalities to manage registry secrets and containerd for caching.
|
Since
|
I created a draft PR for docs to add all the missing bits from this ticket: https://github.com/kairos-io/kairos-docs/pull/207/files (won't merge until everything is done). |
The system-upgrade-controller tries to dain the node if a Also the system-upgrade-controller instructions on how to install it mention this command:
which doesn't work because |
I only had to remove I'm not sure if we want to change the script to also work for @nianyush 's case. I don't see how "k8s functionalities to manage registry secrets and containerd for caching" are actually used. Is this something the provider does? (in which case the default Kairos provider doesn't do?). |
Clarified in planning: What we want to avoid is running kairos-agent with source being So we need an image that can be started as a Pod and already has the artifacts for the upgrade. |
Sorry missed your msg earlier @jimmykarily this is exactly what I was talking about, kairos-agent with remote oci image won't work in private registry case. And for multiple upgrades case, containerd would probably cache some layers of the images so it might be faster and more efficient. |
Went with docs. It's now merged. Closing. |
Seems we have a discrepancy in the docs: https://kairos.io/docs/upgrade/trustedboot/
We create a separate suc-script, and seems also it is needed to mount /sys as well before performing the upgrade.
This card is about unifying the suc-script so it works with both UKI and non-UKI environment, or alternatively have two separate scripts that are documented, installed in the system and in the packages repository.
The text was updated successfully, but these errors were encountered: