Compare commits

..

No commits in common. "c10" and "c9-beta" have entirely different histories.
c10 ... c9-beta

9 changed files with 58 additions and 534 deletions

6
.gitignore vendored
View File

@ -1,3 +1,3 @@
coreos-installer-0.24.0-vendor.tar.gz
coreos-installer-0.24.0.crate
coreos-installer-dracut-7181733.tar.gz
SOURCES/coreos-installer-0.24.0-vendor.tar.gz
SOURCES/coreos-installer-0.24.0.crate
SOURCES/coreos-installer-dracut-7181733.tar.gz

View File

@ -0,0 +1,3 @@
307f1eb756f210a77b4b2a01b8faa60ea002fc8e SOURCES/coreos-installer-0.24.0-vendor.tar.gz
5510e9d6acbc963085347e8ba60250b186712da1 SOURCES/coreos-installer-0.24.0.crate
81f96c32efa9e32730e1f3bda5a820d33229f006 SOURCES/coreos-installer-dracut-7181733.tar.gz

View File

@ -1,67 +0,0 @@
From dbc41bad9de728f1d42000c5633e3494126f9d6d Mon Sep 17 00:00:00 2001
From: Dusty Mabe <dusty@dustymabe.com>
Date: Thu, 1 May 2025 17:36:39 -0400
Subject: [PATCH] download: format byte unit with 1 decimal place precision
Prior to v0.24.1 the output when processing a stream of disk image
input the output would write with 1 decimal place of precision:
```
Read disk 118.2 MiB/2.6 GiB (4%)
Read disk 157.0 MiB/2.6 GiB (5%)
Read disk 300.1 MiB/2.6 GiB (11%)
Read disk 450.6 MiB/2.6 GiB (16%)
Read disk 515.2 MiB/2.6 GiB (19%)
```
After v0.24.1 it has many decimal places of precision:
```
Read disk 138.2265625 MiB/2.59765625 GiB (5%)
Read disk 265.6722106933594 MiB/2.59765625 GiB (9%)
Read disk 399.67578125 MiB/2.59765625 GiB (15%)
Read disk 519.40625 MiB/2.59765625 GiB (19%)
Read disk 597.5625 MiB/2.59765625 GiB (22%)
```
This is likely due to 68198d0. Let's get back the previous formatting.
---
docs/release-notes.md | 2 +-
src/download.rs | 6 +++---
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/docs/release-notes.md b/docs/release-notes.md
index 42b4974..19b8324 100644
--- a/docs/release-notes.md
+++ b/docs/release-notes.md
@@ -8,9 +8,9 @@ nav_order: 8
Major changes:
-
Minor changes:
+- Restore formatting of progress reporting to pre 0.24.0 behavior.
Internal changes:
diff --git a/src/download.rs b/src/download.rs
index f57fca3..e5b967c 100644
--- a/src/download.rs
+++ b/src/download.rs
@@ -456,9 +456,9 @@ impl<'a, R: Read> ProgressReader<'a, R> {
/// Format a size in bytes.
fn format_bytes(count: u64) -> String {
- Byte::from_u64(count)
- .get_appropriate_unit(byte_unit::UnitType::Binary)
- .to_string()
+ let adjusted_byte = Byte::from_u64(count).get_appropriate_unit(byte_unit::UnitType::Binary);
+ // Get a string trimmed to 1 decimal place of precision
+ format!("{adjusted_byte:.1}")
}
}
--
2.47.0

View File

@ -1,100 +0,0 @@
From 408459f9af84add0c0e5ab0db1657c8bc7d0a6a5 Mon Sep 17 00:00:00 2001
From: Nikita Dubrovskii <nikita@linux.ibm.com>
Date: Wed, 9 Jul 2025 09:02:07 +0200
Subject: [PATCH] rootmap: use full path for 'root=' karg when rootfs is
directly on multipath
Issue: https://github.com/coreos/fedora-coreos-tracker/issues/1980
This was first observed on s390x builders under high system load, where `ext.config.multipath.resilient`
would intermittently fail during subsequent boot:
```
[ 2.781559] multipathd[321]: sdd [8:48]: path added to devmap 0xcadf6fadb3ee446d
[ 2.853163] multipathd[321]: sdb [8:16]: path added to devmap 0x000000000000000b
[ 3.012431] systemd[1]: Reached target coreos-multipath-wait.target - CoreOS Wait For Multipathed Boot.
[ 3.139605] systemd[1]: Mounting sysroot.mount - /sysroot...
[ 3.450666] mount[806]: mount: /sysroot: fsconfig system call failed: /dev/sdd4: Can't open blockdev.
```
It looks like a race condition between multipathd taking ownership of the root device and systemd trying to
mount /sysroot. This might happen because the udev database isn't ready in time.
Signed-off-by: Nikita Dubrovskii <nikita@linux.ibm.com>
(cherry picked from commit 33a67caa6fd7291c69c1b502d986707bd0d55e23)
---
docs/release-notes.md | 5 +++++
src/bin/rdcore/rootmap.rs | 28 ++++++++++++++++++++++++----
2 files changed, 29 insertions(+), 4 deletions(-)
diff --git a/docs/release-notes.md b/docs/release-notes.md
index 32ee5b8..19e89f3 100644
--- a/docs/release-notes.md
+++ b/docs/release-notes.md
@@ -14,6 +14,11 @@ Minor changes:
Internal changes:
+- Add initial TMT tests and a new workflow to execute tests on PRs
+- Use release profile for smaller binaries in CI testing
+- Support cryptsetup-2.8.0's UUIDs naming of dm-integrity devices
+- rootmap: Inject `root=/dev/disk/by-uuid/dm-mpath-$UUID` when on multipath
+
Packaging changes:
diff --git a/src/bin/rdcore/rootmap.rs b/src/bin/rdcore/rootmap.rs
index 43b466c..7aff0bd 100644
--- a/src/bin/rdcore/rootmap.rs
+++ b/src/bin/rdcore/rootmap.rs
@@ -41,6 +41,8 @@ pub fn rootmap(config: RootmapConfig) -> Result<()> {
// and from that we can collect all the parent backing devices too
let mut backing_devices = get_blkdev_deps_recursing(&device)?;
+ // check if device's parent (last in the list) is a mpath device
+ let on_multipath = is_on_multipath(&backing_devices)?;
backing_devices.push(device);
// for each of those, convert them to kargs
@@ -51,13 +53,22 @@ pub fn rootmap(config: RootmapConfig) -> Result<()> {
}
}
+ // use full path when the rootfs is directly on multipath;
+ // this prevents race condition between systemd's autogenerated sysroot.mount and multipathd/udev,
+ // see also: https://github.com/coreos/fedora-coreos-tracker/issues/1980
+ let root = if on_multipath {
+ // https://github.com/coreos/fedora-coreos-config/blob/testing-devel/overlay.d/05core/usr/lib/udev/rules.d/90-coreos-device-mapper.rules#L25
+ format!(
+ "root=/dev/disk/by-uuid/dm-mpath-{}",
+ physical_mount.get_filesystem_uuid()?
+ )
+ } else {
+ format!("root=UUID={}", physical_mount.get_filesystem_uuid()?)
+ };
// we push the root kargs last, this has the nice property that the final order of kargs goes
// from lowest level to highest; see also
// https://github.com/coreos/fedora-coreos-tracker/issues/465
- kargs.push(format!(
- "root=UUID={}",
- physical_mount.get_filesystem_uuid()?
- ));
+ kargs.push(root);
// we need this because with root= it's systemd that takes care of mounting via
// systemd-fstab-generator, and it defaults to read-only otherwise
@@ -307,3 +318,12 @@ fn write_boot_uuid_grub2_dropin<P: AsRef<Path>>(uuid: &str, p: P) -> Result<()>
std::fs::write(p, format!("set BOOT_UUID=\"{uuid}\"\n"))
.with_context(|| format!("writing {}", p.display()))
}
+
+fn is_on_multipath(backing_devices: &[PathBuf]) -> Result<bool> {
+ let blkinfo = match backing_devices.last() {
+ Some(p) => lsblk_single(p)?,
+ _ => return Ok(false),
+ };
+
+ Ok(blkinfo.get("TYPE").is_some_and(|t| t == "mpath"))
+}
--
2.47.1

View File

@ -1,39 +0,0 @@
From 2ad7b108babe11da86bbce62bd4892b4e25b4211 Mon Sep 17 00:00:00 2001
From: yasminvalim <ydesouza@redhat.com>
Date: Mon, 13 Oct 2025 10:44:55 -0300
Subject: [PATCH 1/2] install: check if firstboot args are defined and add them
manually if necessary
---
src/cmdline/install.rs | 8 +++++++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/src/cmdline/install.rs b/src/cmdline/install.rs
index 885ca73..206d602 100644
--- a/src/cmdline/install.rs
+++ b/src/cmdline/install.rs
@@ -272,7 +272,7 @@ impl InstallConfig {
return Ok(self);
}
- let args = self
+ let mut args = self
.config_file
.iter()
.map(|path| {
@@ -295,6 +295,12 @@ impl InstallConfig {
)
.collect::<Vec<_>>();
+ // If firstboot-args is defined, add it manually
+ if let Some(firstboot_args) = &self.firstboot_args {
+ args.push("--firstboot-args".to_string());
+ args.push(firstboot_args.clone());
+ }
+
println!("Running with arguments: {}", args.join(" "));
Self::from_args(&args)
}
--
2.51.0

View File

@ -1,47 +0,0 @@
From ef0bc1f08a110eac3279f59d9a7defeac0dd31db Mon Sep 17 00:00:00 2001
From: yasminvalim <ydesouza@redhat.com>
Date: Mon, 13 Oct 2025 11:42:48 -0300
Subject: [PATCH 2/2] install: add unit tests
---
src/cmdline/install.rs | 26 ++++++++++++++++++++++++++
1 file changed, 26 insertions(+)
diff --git a/src/cmdline/install.rs b/src/cmdline/install.rs
index 206d602..915db59 100644
--- a/src/cmdline/install.rs
+++ b/src/cmdline/install.rs
@@ -584,4 +584,30 @@ dest-device: u
.expand_config_files()
.unwrap_err();
}
+
+ /// Test that firstboot-args is manually added to args list when defined
+ #[test]
+ fn test_firstboot_args_manually_added() {
+ let mut f = NamedTempFile::new().unwrap();
+ f.as_file_mut().write_all(b"dest-device: /dev/sda").unwrap();
+
+ let config = InstallConfig::from_args(&[
+ "--config-file",
+ f.path().to_str().unwrap(),
+ "--firstboot-args",
+ "ip=dhcp",
+ ])
+ .unwrap();
+
+ // Verify firstboot-args is defined
+ assert!(config.firstboot_args.is_some());
+ assert_eq!(config.firstboot_args.as_ref().unwrap(), "ip=dhcp");
+
+ // Test expand_config_files to verify manual addition
+ let expanded = config.expand_config_files().unwrap();
+
+ // Should still have firstboot-args
+ assert!(expanded.firstboot_args.is_some());
+ assert_eq!(expanded.firstboot_args.unwrap(), "ip=dhcp");
+ }
}
--
2.51.0

View File

@ -1,92 +0,0 @@
From e28753c71eefd55142358e88511147d7de3d0975 Mon Sep 17 00:00:00 2001
From: Renata Ravanelli <rravanel@redhat.com>
Date: Mon, 9 Jun 2025 15:48:48 -0300
Subject: [PATCH] OCPBUGS-56597: Fix multipath configuration
- To ensure multipath continues working even if a
path fails, the WWID must be specified both as a
kernel argument and in /etc/multipath/wwids.
Without these, multipath may fail to detect
devices when paths go down, leading to device
mapping issues.
- This PR adds mpath.wwid kernel argument needed
for the installer.
Signed-off-by: Renata Ravanelli <rravanel@redhat.com>
---
docs/release-notes.md | 1 +
src/bin/rdcore/rootmap.rs | 42 ++++++++++++++++++++++++++++++++++++++-
2 files changed, 42 insertions(+), 1 deletion(-)
diff --git a/docs/release-notes.md b/docs/release-notes.md
index a1ba96a..93870d3 100644
--- a/docs/release-notes.md
+++ b/docs/release-notes.md
@@ -20,6 +20,7 @@ Internal changes:
- Use release profile for smaller binaries in CI testing
- Support cryptsetup-2.8.0's UUIDs naming of dm-integrity devices
- rootmap: Inject `root=/dev/disk/by-uuid/dm-mpath-$UUID` when on multipath
+- rootmap: Inject `mpath.wwid=$WWID` when on multipath
Packaging changes:
diff --git a/src/bin/rdcore/rootmap.rs b/src/bin/rdcore/rootmap.rs
index 7aff0bd..5d3030b 100644
--- a/src/bin/rdcore/rootmap.rs
+++ b/src/bin/rdcore/rootmap.rs
@@ -135,7 +135,9 @@ fn device_to_kargs(root: &Mount, device: PathBuf) -> Result<Option<Vec<String>>>
} else {
Ok(Some(get_luks_kargs(root, &device)?))
}
- } else if blktype == "part" || blktype == "disk" || blktype == "mpath" {
+ } else if blktype == "mpath" {
+ Ok(Some(get_multipath_kargs(&device)?))
+ } else if blktype == "part" || blktype == "disk" {
Ok(None)
} else {
bail!("unknown block device type {}", blktype)
@@ -327,3 +329,41 @@ fn is_on_multipath(backing_devices: &[PathBuf]) -> Result<bool> {
Ok(blkinfo.get("TYPE").is_some_and(|t| t == "mpath"))
}
+
+fn get_multipath_kargs(device: &Path) -> Result<Vec<String>> {
+ let mut kargs = Vec::new();
+
+ let canonical = std::fs::canonicalize(device)
+ .with_context(|| format!("failed to canonicalize device path: {}", device.display()))?;
+ let device_name = canonical
+ .file_name()
+ .and_then(|s| s.to_str())
+ .with_context(|| {
+ format!(
+ "failed to extract device name from canonical path: {}",
+ canonical.display()
+ )
+ })?;
+
+ let mpathd_output = runcmd_output!("multipathd", "show", "maps", "raw", "format", "%d %w")?;
+ let devices: HashMap<&str, &str> = mpathd_output
+ .lines()
+ .filter_map(|s| {
+ let mut parts = s.trim().split_whitespace();
+ Some((parts.next()?, parts.next()?))
+ })
+ .collect();
+
+ let wwid = devices
+ .get(device_name)
+ .map(|w| w.to_string())
+ .with_context(|| {
+ format!(
+ "failed to find WWID in multipathd output for {}",
+ device_name
+ )
+ })?;
+
+ kargs.push(format!("mpath.wwid={}", wwid));
+ Ok(kargs)
+}
--
2.51.0

View File

@ -12,7 +12,7 @@
Name: rust-%{crate}
Version: 0.24.0
Release: 5%{?dist}
Release: 1%{?dist}
Summary: Installer for Fedora CoreOS and RHEL CoreOS
# Upstream license specification: Apache-2.0
@ -23,16 +23,6 @@ Source0: https://crates.io/api/v1/crates/%{crate}/%{version}/download#/%{
Source1: https://github.com/coreos/%{crate}/releases/download/v%{version}/%{crate}-%{version}-vendor.tar.gz
Source2: https://github.com/coreos/coreos-installer-dracut/archive/%{dracutcommit}/coreos-installer-dracut-%{dracutshortcommit}.tar.gz
# https://github.com/coreos/coreos-installer/pull/1654
Patch0: 0001-download-format-byte-unit-with-1-decimal-place-preci.patch
# https://github.com/coreos/coreos-installer/pull/1677
Patch1: 0002-rootmap-use-full-path-for-root-karg-when-rootfs-is-d.patch
# https://github.com/coreos/coreos-installer/pull/1699
Patch2: 0003-install-check-if-firstboot-args-are-defined-and-add-.patch
Patch3: 0004-install-add-unit-tests.patch
# https://github.com/coreos/coreos-installer/pull/1676/commits/a40af0a3ec13c4fd49b34317e80f6c0bc845b46a
Patch4: 0005-OCPBUGS-56597-Fix-multipath-configuration.patch
ExclusiveArch: %{rust_arches}
%if 0%{?rhel} && !0%{?eln}
BuildRequires: rust-toolset
@ -183,209 +173,88 @@ from the initramfs.
%endif
%changelog
* Wed Nov 19 2025 Huijing Hei <hhei@redhat.com> - 0.24.0-5
- rootmap: Inject `mpath.wwid=$WWID` when on multipath
Backport https://github.com/coreos/coreos-installer/pull/1676/commits/a40af0a3ec13c4fd49b34317e80f6c0bc845b46a
Resolves RHEL-127858
* Mon Nov 3 2025 Yasmin Valim <ydesouza@redhat.com> - 0.24.0-4
- Check if firstboot args are defined and add them manually
Backport https://github.com/coreos/coreos-installer/pull/1699
* Wed Jul 23 2025 Joel Capitao <jcapitao@redhat.com> - 0.24.0-3
- Use the full path for the 'root=' kernel arg when rootfs on mpath
Backport https://github.com/coreos/coreos-installer/pull/1677
* Fri Jul 18 2025 Aashish Radhakrishnan <aaradhak@redhat.com> - 0.24.0-2
- Restore single-decimal precision to stream output
Backport https://github.com/coreos/coreos-installer/pull/1654
* Wed Apr 16 2025 Joel Capitao <jcapitao@redhat.com> - 0.24.0-1
- Update to latest upstream
* Thu Nov 14 2024 Steven Presti <spresti@redhat.com> - 0.23.0-1
- new version
* Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - 0.22.1-3
- Bump release for October 2024 mass rebuild:
Resolves: RHEL-64018
* Wed Jul 31 2024 Steven Presti <spresti@redhat.com> - 0.22.1-2
- Rebuild for correct jira, resolves RHEL-52233
* Fri Jul 26 2024 Packit <hello@packit.dev> - 0.22.1-1
- New upstream release
* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 0.20.0-5
- Bump release for June 2024 mass rebuild
* Mon Feb 26 2024 Steven Presti <spresti@redhat.com> - 0.21.0-1
- New release
* Sun Feb 04 2024 Yaakov Selkowitz <yselkowi@redhat.com> - 0.20.0-4
- Update Rust macro usage
* Fri Jan 26 2024 Fedora Release Engineering <releng@fedoraproject.org> - 0.20.0-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Tue Jan 09 2024 Fabio Valentini <decathorpe@gmail.com> - 0.20.0-2
- Refresh for latest Rust package template; update license tag for SPDX.
* Wed Dec 20 2023 Packit <hello@packit.dev> - 0.20.0-1
- New upstream release
* Thu Dec 07 2023 Steven Presti <spresti@redhat.com> - 0.18.0-3
* Thu Jan 04 2024 Steven Presti <spresti@redhat.com> - 0.20.0-1
- New version
- Remove rdcore patch, and move its logic into %prep
* Fri Dec 01 2023 Fabio Valentini <decathorpe@gmail.com> - 0.18.0-2
- Rebuild for openssl crate >= v0.10.60 (RUSTSEC-2023-0044, RUSTSEC-2023-0072)
* Tue Nov 28 2023 Steven Presti <spresti@redhat.com> - 0.18.0-1
- New version
* Fri Sep 8 2023 Nikita Dubrovskii <nikita@linux.ibm.com> - 0.18.0-1
* Mon Sep 11 2023 Antonio Murdaca <antoniomurdaca@gmail.com> - 0.17.0-4
- rebuilt to use rhel-target=exception
* Fri Sep 08 2023 Antonio Murdaca <antoniomurdaca@gmail.com> - 0.17.0-3
- rebuilt to hopefully fix up builds for 9.3
* Fri Sep 01 2023 Antonio Murdaca <antoniomurdaca@gmail.com> - 0.17.0-2
- Fix rhbz#2236826
* Tue Mar 14 2023 Benjamin Gilbert <bgilbert@redhat.com> - 0.17.0-1
- New release
* Mon Aug 14 2023 Aashish Radhakrishnan <aaradhak@redhat.com> - 0.17.0-5
- Backport patch that adds F40 signing key
* Wed Dec 07 2022 Irene Diez <idiez@redhat.com> - 0.16.1-2
- Add ignition support to coi-dracut
- Fix usb installation
* Fri Jul 21 2023 Fedora Release Engineering <releng@fedoraproject.org> - 0.17.0-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
* Wed May 03 2023 Fabio Valentini <decathorpe@gmail.com> - 0.17.0-3
- Rebuild for tokio, h2, and openssl crate security updates
* Tue Apr 11 2023 Irene Diez <idiez@redhat.com> - 0.17.0-2
- Update dracut/scripts: no need to mount the filesystem
https://github.com/coreos/coreos-installer-dracut/pull/30
* Fri Mar 10 2023 Benjamin Gilbert <bgilbert@redhat.com> - 0.17.0-1
- New release
* Tue Feb 21 2023 Paul Whalen <pwhalen@fedoraproject.org> - 0.16.1-6
- Enable coreos-installer-dracut in Fedora
* Fri Feb 17 2023 Jonathan Lebon <jonathan@jlebon.com> - 0.16.1-5
- Backport patch that adds F39 signing key
* Sat Feb 04 2023 Fabio Valentini <decathorpe@gmail.com> - 0.16.1-4
- Rebuild for fixed frame pointer compiler flags in Rust RPM macros.
* Fri Jan 20 2023 Fedora Release Engineering <releng@fedoraproject.org> - 0.16.1-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
* Fri Oct 14 2022 Benjamin Gilbert <bgilbert@redhat.com> - 0.16.1-2
- Build with mbrman 0.5.0
* Mon Sep 19 2022 Benjamin Gilbert <bgilbert@redhat.com> - 0.16.1-1
- New release
- Sync coreos-installer-dracut with CentOS Stream 9
* Thu Sep 15 2022 Steven Presti <spresti@redhat.com> - 0.16.0-1
- New release
* Wed Sep 21 2022 Steven Presti <spresti@redhat.com> - 0.16.1-1
- new version
- Add libzstd dependency
* Mon Aug 22 2022 Dusty Mabe <dusty@dustymabe.com> - 0.15.0-5
- Backport patch that adds F38 signing key
* Thu Aug 18 2022 Antonio Murdaca <runcom@linux.com> - 0.15.0-2
- update coi-dracut to support LVM backed growfs service
* Tue Aug 02 2022 Benjamin Gilbert <bgilbert@redhat.com> - 0.15.0-4
- Fix build with rust-bytes 1.2.0
* Sat Jul 23 2022 Fedora Release Engineering <releng@fedoraproject.org> - 0.15.0-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Sun Jul 10 2022 Benjamin Gilbert <bgilbert@redhat.com> - 0.15.0-2
- Sync coreos-installer-dracut with CentOS Stream 9
- Fix build with rust-regex 1.6.0
* Fri Jun 17 2022 Michael Armijo <marmijo@redhat.com> - 0.15.0-1
* Tue Jul 12 2022 Michael Armijo <marmijo@redhat.com> - 0.15.0-1
- New release
- Install non-binary files using Makefile install targets
- Add man pages
- Sync with Fedora package
- Install coreos-installer-dracut with "make install"
* Wed Apr 27 2022 Jonathan Lebon <jonathan@jlebon.com> - 0.14.0-1
* Thu Feb 24 2022 Antonio Murdaca <runcom@linux.com> - 0.11.0-4
- update coi-dracut to fix growfs service Before
* Thu Feb 10 2022 Antonio Murdaca <runcom@linux.com> - 0.11.0-3
- update coi-dracut to support default poweroff behavior
* Wed Jan 26 2022 Antonio Murdaca <runcom@linux.com> - 0.11.0-2
- Bump coreos-installer-dracut to support encrypted rootfs
* Wed Dec 15 2021 Sohan Kunkerkar <skunkerk@redhat.com> - 0.11.0-1
- New release
* Wed Mar 23 2022 Jonathan Lebon <jonathan@jlebon.com> - 0.13.1-3
- Backport "blockdev: rework EFI vendor dir checking"
https://github.com/coreos/coreos-installer/pull/802 for
https://github.com/coreos/fedora-coreos-tracker/issues/1116
* Tue Feb 15 2022 Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> - 0.13.1-2
- Rebuild with package notes
* Sun Feb 13 2022 Jonathan Lebon <jonathan@jlebon.com> - 0.13.1-1
- New release
* Thu Feb 10 2022 Jonathan Lebon <jonathan@jlebon.com> - 0.12.0-4
- Backport "signing-keys: regular Fedora cycle rotation of keys"
https://github.com/coreos/coreos-installer/pull/770
* Fri Jan 21 2022 Fedora Release Engineering <releng@fedoraproject.org> - 0.12.0-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Mon Dec 20 2021 Benjamin Gilbert <bgilbert@redhat.com> - 0.12.0-2
- Unbundle serde_with and its dependencies
* Fri Dec 17 2021 Benjamin Gilbert <bgilbert@redhat.com> - 0.12.0-1
- New release
- Temporarily bundle serde_with and its dependencies
- Disable LTO to fix armv7hl builds
* Wed Dec 15 2021 Sohan Kunkerkar <skunkerk@redhat.com> - 0.11.0-3
- Remove conditional around sourcing the vendor tarball
- Fix inadvertent inclusion of coreos-installer-dracut in -bootinfra on RHEL
- Have -dracut own 51coreos-installer directory on RHEL
- Bump coreos-installer-dracut
* Mon Nov 29 2021 Jonathan Lebon <jonathan@jlebon.com> - 0.11.0-2
- Backport "miniso: handle hardlinked files"
https://github.com/coreos/coreos-installer/pull/694
* Thu Nov 18 2021 Benjamin Gilbert <bgilbert@redhat.com> - 0.11.0-1
- New release
* Thu Nov 04 2021 Sohan Kunkerkar <skunkerk@redhat.com> - 0.10.1-3
* Tue Nov 30 2021 Sohan Kunkerkar <skunkerk@redhat.com> - 0.10.1-6
- Vendor rust dependencies on RHEL only
- Add coreos-installer-dracut subpackage on RHEL only
* Tue Oct 12 2021 Benjamin Gilbert <bgilbert@redhat.com> - 0.10.1-2
- Rebuild for F33 bump
* Fri Nov 26 2021 Antonio Murdaca <runcom@linux.com> - 0.10.1-5
- fix https://bugzilla.redhat.com/show_bug.cgi?id=2027255
* Mon Oct 11 2021 Benjamin Gilbert <bgilbert@redhat.com> - 0.10.1-1
* Thu Nov 18 2021 Antonio Murdaca <runcom@linux.com> - 0.10.1-4
- fix dracut module dependencies
* Wed Nov 17 2021 Antonio Murdaca <runcom@linux.com> - 0.10.1-3
- fix dracut module installation target
* Tue Oct 26 2021 Antonio Murdaca <runcom@linux.com> - 0.10.1-2
- rebuilt
* Mon Oct 25 2021 Antonio Murdaca <runcom@linux.com> - 0.10.1-1
- New release
* Tue Sep 14 2021 Sahana Prasad <sahana@redhat.com> - 0.10.0-3
- Rebuilt with OpenSSL 3.0.0
* Tue Aug 17 2021 Dusty Mabe <dusty@dustymabe.com> - 0.10.0-2
- Add F36 signing key
* Wed Aug 04 2021 Jonathan Lebon <jonathan@jlebon.com> - 0.10.0-1
- New release
* Fri Jul 23 2021 Fedora Release Engineering <releng@fedoraproject.org> - 0.9.1-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Tue Jul 13 2021 Jonathan Lebon <jonathan@jlebon.com> - 0.9.1-2
- Backport "install: restrict access permissions on /boot/ignition{,/config.ign}"
https://github.com/coreos/coreos-installer/pull/571
* Mon May 17 2021 Sohan Kunkerkar <skunkerk@redhat.com> - 0.9.1-1
- New release
* Thu Apr 08 2021 Sohan Kunkerkar <skunkerk@redhat.com> - 0.9.0-2
- Fix dracut library path
* Thu Apr 08 2021 Sohan Kunkerkar <skunkerk@redhat.com> - 0.9.0-1
- New release
- Fix hardcoded library path
* Tue Mar 16 2021 Sohan Kunkerkar <skunkerk@redhat.com> - 0.8.0-1
- New release
* Mon Mar 01 2021 Fabio Valentini <decathorpe@gmail.com> - 0.7.2-5
- Backport trivial commit d94715c to allow building with nix 0.20.
* Wed Jan 27 2021 Fedora Release Engineering <releng@fedoraproject.org> - 0.7.2-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Mon Jan 04 2021 Benjamin Gilbert <bgilbert@redhat.com> - 0.7.2-3
- Add Requires for programs invoked by coreos-installer
* Thu Sep 16 11:20:52 CET 2021 Antonio Murdaca <amurdaca@redhat.com> - 0.10.0-1
- New bumped release
* Mon Dec 28 13:28:50 CET 2020 Igor Raits <ignatenkobrain@fedoraproject.org> - 0.7.2-2
- Rebuild

View File

@ -1,3 +0,0 @@
SHA512 (coreos-installer-0.24.0-vendor.tar.gz) = edfc61e105e8fb68e66f3857f3f77037c5f34b9e1b3def5855fdf31fda03daefce78b802c42a96c3fdb9aee93918e8cc0f55a6b36c3056297a793ecacd53d344
SHA512 (coreos-installer-0.24.0.crate) = 4c18467daabb8bb66b1dd959dd0f392153648eaa7591df1e640b7aad5baac70dd269e4bd17f277463c55ca4e19d16b720b95a0ba0aa89920c0147c32f6b6e27b
SHA512 (coreos-installer-dracut-7181733.tar.gz) = a03e3e90f355690eda974335e2189c69837f7f0ceb456a449b2de6ce4b24ca098d3f0ea51ddcab35ab354a5070e4b0525188dfbbff8056cfc62bbcdded10647c