{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":123933396,"defaultBranch":"flatcar-master","name":"bootengine","ownerLogin":"flatcar","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2018-03-05T14:42:39.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/36193555?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1726472176.0","currentOid":""},"activityList":{"items":[{"before":"d33a8f0e8ba16a9da632652a1ca152d4777cd575","after":"c9119b31b2e3581a96b767f34c4d2352fd5c7adf","ref":"refs/heads/flatcar-3510-backport","pushedAt":"2024-09-16T12:29:54.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"},"commit":{"message":"dracut: add dependency network to ignition-mount.service\n\nOn some providers (like Equinix Metal), there is a network dependency\nfor the umount stage, network must be still around when ExecStop is\nexecuted.\n\nSigned-off-by: Mathieu Tortuyaux ","shortMessageHtmlLink":"dracut: add dependency network to ignition-mount.service"}},{"before":"52a641e2ae4b40745f4548b85892452e75150ceb","after":null,"ref":"refs/heads/tormath1/ignition","pushedAt":"2024-09-16T07:36:16.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"}},{"before":"d2e22122e8e106a21f64c048992290edc7053384","after":"f3c80fb02fe65dd3be2b0bb4727fc10985acfa9d","ref":"refs/heads/flatcar-master","pushedAt":"2024-09-16T07:36:13.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"},"commit":{"message":"Merge pull request #99 from flatcar/tormath1/ignition\n\nignition: keep network around when umounting","shortMessageHtmlLink":"Merge pull request #99 from flatcar/tormath1/ignition"}},{"before":"9f4be0c3c8aba8baf1a882f8a4066e9ca71ee8da","after":"52a641e2ae4b40745f4548b85892452e75150ceb","ref":"refs/heads/tormath1/ignition","pushedAt":"2024-09-16T07:34:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"},"commit":{"message":"dracut: add dependency network to ignition-mount.service\n\nOn some providers (like Equinix Metal), there is a network dependency\nfor the umount stage, network must be still around when ExecStop is\nexecuted.\n\nSigned-off-by: Mathieu Tortuyaux ","shortMessageHtmlLink":"dracut: add dependency network to ignition-mount.service"}},{"before":null,"after":"9f4be0c3c8aba8baf1a882f8a4066e9ca71ee8da","ref":"refs/heads/tormath1/ignition","pushedAt":"2024-09-12T13:47:58.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"},"commit":{"message":"ignition: keep network around when umounting","shortMessageHtmlLink":"ignition: keep network around when umounting"}},{"before":"0192e16d46defed6f0651bc14927670727034d8c","after":null,"ref":"refs/heads/tormath1/ignition","pushedAt":"2024-09-11T13:41:20.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"}},{"before":null,"after":"0192e16d46defed6f0651bc14927670727034d8c","ref":"refs/heads/tormath1/ignition","pushedAt":"2024-09-11T13:40:03.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"},"commit":{"message":"ignition: umount after files Ignition stage\n\nEquinix Metal has a network dependency at each Ignition stage, we need\nnetwork even when 'unmounting' things.\nNetwork is shutted down in the initrd once ignition is marked as\ncompleted so the ExecStop command was failing to be executed.\n\nSigned-off-by: Mathieu Tortuyaux ","shortMessageHtmlLink":"ignition: umount after files Ignition stage"}},{"before":null,"after":"1181c3e57ecbdbd011a21c2902d55e17452fb6ea","ref":"refs/heads/chewi/dracut-103","pushedAt":"2024-08-29T15:16:55.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"chewi","name":"James Le Cuirot","path":"/chewi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/35072?s=80&v=4"},"commit":{"message":"flatcar-network: As of Dracut 100, net-lib has moved to its own module\n\nSigned-off-by: James Le Cuirot ","shortMessageHtmlLink":"flatcar-network: As of Dracut 100, net-lib has moved to its own module"}},{"before":"12f7ed500cc84c71f7614b46aad2f5debf1235f6","after":null,"ref":"refs/heads/chewi/decrypt-root-udev","pushedAt":"2024-08-22T10:53:56.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"chewi","name":"James Le Cuirot","path":"/chewi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/35072?s=80&v=4"}},{"before":"fb2631ce5e6a21d044c8dca73f59db01f9d5abcf","after":"d2e22122e8e106a21f64c048992290edc7053384","ref":"refs/heads/flatcar-master","pushedAt":"2024-08-22T10:53:53.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"chewi","name":"James Le Cuirot","path":"/chewi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/35072?s=80&v=4"},"commit":{"message":"Merge pull request #98 from flatcar/chewi/decrypt-root-udev\n\ndecrypt-root: Rework around a udev rule to fix slow PXE/ISO boots","shortMessageHtmlLink":"Merge pull request #98 from flatcar/chewi/decrypt-root-udev"}},{"before":"3692281037cfd8c4e75026dd24ef209507172f84","after":"12f7ed500cc84c71f7614b46aad2f5debf1235f6","ref":"refs/heads/chewi/decrypt-root-udev","pushedAt":"2024-08-22T10:53:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"chewi","name":"James Le Cuirot","path":"/chewi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/35072?s=80&v=4"},"commit":{"message":"decrypt-root: Rework around a udev rule to fix slow PXE/ISO boots\n\nPXE and ISO boots were taking over 1m30s because decrypt-root.service\nwas waiting for the ROOT partition to appear just in case it needed to\nbe decrypted.\n\nMaking this service conditional on non-PXE/ISO boots was considered, but\nusers may well want an encrypted ROOT when booting using these methods.\nAdding conditions didn't avoid the delay caused by the `Wants` directive\nin any case.\n\nThis change makes decrypt-root.service more reactive by having it\ntriggered by a udev rule matching a LUKS-encrypted partition named ROOT.\nsystemd knows to wait for `/dev/mapper/rootencrypted` to appear before\nattempting to switch root, making `Before=dracut-initqueue.service`\n(which concerns finding the real root) redundant. There is no guarantee\nthat the rule will trigger before this service starts anyway.\n\nRemoving `WantedBy=ignition-subsequent.target` is necessary because this\ndirective would start the service unconditionally rather than only when\ntriggered by the udev rule.\n\nAdding `After=ignition-disks.service` ensures that the service does not\ntry to decrypt ROOT before Ignition wipes it again due to\n`flatcar.first_boot=1` being given.\n\nThe service itself has been simplified. crypttab is just as happy with a\nblock device path, so there is no need to determine the UUID. The udev\nrule only matches LUKS-encrypted partitions, so there is no need to\ncheck the header either. The rest is simple enough to include in the\nservice unit directly, removing the need for a separate shell script.\nsystemd-cryptsetup-generator can read the crypttab from stdin, avoiding\nthe creation of a temporary file. It is also important to call\ndaemon-reload before attempting to start the generated unit.\n\nCloses: https://github.com/flatcar/Flatcar/issues/1514\nSigned-off-by: James Le Cuirot ","shortMessageHtmlLink":"decrypt-root: Rework around a udev rule to fix slow PXE/ISO boots"}},{"before":null,"after":"3692281037cfd8c4e75026dd24ef209507172f84","ref":"refs/heads/chewi/decrypt-root-udev","pushedAt":"2024-08-20T16:21:15.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"chewi","name":"James Le Cuirot","path":"/chewi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/35072?s=80&v=4"},"commit":{"message":"decrypt-root: Rework around a udev rule to fix slow PXE/ISO boots\n\nPXE and ISO boots were taking over 1m30s because decrypt-root.service\nwas waiting for the ROOT partition to appear just in case it needed to\nbe decrypted.\n\nMaking this service conditional on non-PXE/ISO boots was considered, but\nusers may well want an encrypted ROOT when booting using these methods.\nAdding conditions didn't avoid the delay caused by the `Wants` directive\nin any case.\n\nThis change makes decrypt-root.service more reactive by having it\ntriggered by a udev rule matching a LUKS-encrypted partition named ROOT.\nsystemd knows to wait for `/dev/mapper/rootencrypted` to appear before\nattempting to switch root.\n\nAdding `After=ignition-disks.service` ensures that the service does not\ntry to decrypt ROOT before Ignition wipes it again due to\n`flatcar.first_boot=1` being given.\n\nThe service itself has been simplified. crypttab is just as happy with a\nblock device path, so there is no need to determine the UUID. The udev\nrule only matches LUKS-encrypted partitions, so there is no need to\ncheck the header either. The rest is simple enough to include in the\nservice unit directly, removing the need for a separate shell script.\nsystemd-cryptsetup-generator can read the crypttab from stdin, avoiding\nthe creation of a temporary file. It is also important to call\ndaemon-reload before attempting to start the generated unit.\n\nCloses: https://github.com/flatcar/Flatcar/issues/1514\nSigned-off-by: James Le Cuirot ","shortMessageHtmlLink":"decrypt-root: Rework around a udev rule to fix slow PXE/ISO boots"}},{"before":"700e2174a190c31f07f4dd50366da05b04d087f2","after":"10357a387459fc16a381f70601c44313668076ed","ref":"refs/heads/kai/proxmox-support","pushedAt":"2024-08-17T16:15:26.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"},"commit":{"message":"Draft for Proxmox support\n\nThis makes use of https://github.com/coreos/afterburn/pull/1023\nto set up any static networking from the initrd (for Ignition) and the\nhostname (early enough so that Ignition could overwrite it).","shortMessageHtmlLink":"Draft for Proxmox support"}},{"before":"b53d31af53cc4d181447c6a76c84a92312b4a6d2","after":"f7f1750b68dd6321e1cb963f7190c0a8ce8061ed","ref":"refs/heads/chewi/sd-veritysetup","pushedAt":"2024-08-16T09:46:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"chewi","name":"James Le Cuirot","path":"/chewi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/35072?s=80&v=4"},"commit":{"message":"Drop obsolete parts of usr-generator Dracut module\n\nMost of it was unused as systemd-fstab-generator takes care of this now.\nDespite what the module's description said, some parts are still needed\nto adjust the dependencies and add the norecovery flag.\n\nSigned-off-by: James Le Cuirot ","shortMessageHtmlLink":"Drop obsolete parts of usr-generator Dracut module"}},{"before":"f292b6ef31bee7c54ee1710c5dca5ff439955776","after":"b53d31af53cc4d181447c6a76c84a92312b4a6d2","ref":"refs/heads/chewi/sd-veritysetup","pushedAt":"2024-08-14T16:53:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"chewi","name":"James Le Cuirot","path":"/chewi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/35072?s=80&v=4"},"commit":{"message":"Drop obsolete parts of usr-generator Dracut module\n\nMost of it was unused as systemd-fstab-generator takes care of this now.\nDespite what the module's description said, some parts are still needed\nto adjust the dependencies and add the norecovery flag.\n\nSigned-off-by: James Le Cuirot ","shortMessageHtmlLink":"Drop obsolete parts of usr-generator Dracut module"}},{"before":null,"after":"f292b6ef31bee7c54ee1710c5dca5ff439955776","ref":"refs/heads/chewi/sd-veritysetup","pushedAt":"2024-08-10T22:05:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"chewi","name":"James Le Cuirot","path":"/chewi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/35072?s=80&v=4"},"commit":{"message":"Drop obsolete usr-generator module\n\nWe have used systemd-fstab-generator for a while now.\n\nSigned-off-by: James Le Cuirot ","shortMessageHtmlLink":"Drop obsolete usr-generator module"}},{"before":"d77e5be17e9fece3a812dc8d571161fe9e46995b","after":null,"ref":"refs/heads/krnowak/fix-verity","pushedAt":"2024-06-11T13:23:18.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"krnowak","name":"Krzesimir Nowak","path":"/krnowak","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/96081?s=80&v=4"}},{"before":"4f5b7404c72d7f5789225a7707b39bb6d2d4ab87","after":"d77e5be17e9fece3a812dc8d571161fe9e46995b","ref":"refs/heads/krnowak/fix-verity","pushedAt":"2024-06-03T07:44:06.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"krnowak","name":"Krzesimir Nowak","path":"/krnowak","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/96081?s=80&v=4"},"commit":{"message":"dracut: Insert dm_verity kernel module for veritysetup\n\nFor some reason it stopped being inserted.","shortMessageHtmlLink":"dracut: Insert dm_verity kernel module for veritysetup"}},{"before":null,"after":"4f5b7404c72d7f5789225a7707b39bb6d2d4ab87","ref":"refs/heads/krnowak/fix-verity","pushedAt":"2024-05-31T14:12:04.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"krnowak","name":"Krzesimir Nowak","path":"/krnowak","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/96081?s=80&v=4"},"commit":{"message":"dracut: Insert dm_verity kernel module for veritysetup\n\nFor some reason it stopped being inserted.","shortMessageHtmlLink":"dracut: Insert dm_verity kernel module for veritysetup"}},{"before":"8da532c809c89a9c434ada0fa9532a1c1bf49f4c","after":"fb2631ce5e6a21d044c8dca73f59db01f9d5abcf","ref":"refs/heads/flatcar-master","pushedAt":"2024-05-28T11:58:39.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"},"commit":{"message":"Merge pull request #96 from alejandro-ripoll/flatcar-master\n\nOpenStack: Use config-drive by default and metadata API as fallback","shortMessageHtmlLink":"Merge pull request #96 from alejandro-ripoll/flatcar-master"}},{"before":"80c5a91ca698aea22c7239575174b632d26160ef","after":"11d4eb07ff8cfed38393798458683006a7fa9a0a","ref":"refs/heads/kai/partx","pushedAt":"2024-05-06T13:29:13.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pothos","name":"Kai Lüke","path":"/pothos","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1189130?s=80&v=4"},"commit":{"message":"ignition: Remove partprobe dependency and use partx\n\nPartx is already present, but not explicitly mentioned. We can use it\ninstead of partprobe when adapting the Ignition patch in\nhttps://github.com/flatcar/scripts/pull/1403","shortMessageHtmlLink":"ignition: Remove partprobe dependency and use partx"}},{"before":"8a9d2443c5fb3745875f645b6e080c8c69ceabcb","after":"700e2174a190c31f07f4dd50366da05b04d087f2","ref":"refs/heads/kai/proxmox-support","pushedAt":"2024-05-06T13:18:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"pothos","name":"Kai Lüke","path":"/pothos","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1189130?s=80&v=4"},"commit":{"message":"Draft for Proxmox support\n\nThis makes use of https://github.com/coreos/afterburn/pull/1023\nto set up any static networking from the initrd (for Ignition) and the\nhostname (early enough so that Ignition could overwrite it).","shortMessageHtmlLink":"Draft for Proxmox support"}},{"before":"13f391a1166e649841d83d030b1a760dfbb96ce6","after":null,"ref":"refs/heads/ader1990/kubevirt","pushedAt":"2024-04-29T13:16:05.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"pothos","name":"Kai Lüke","path":"/pothos","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1189130?s=80&v=4"}},{"before":"78d94b311ddb047b280c5ee180410b48ec04ea39","after":"8da532c809c89a9c434ada0fa9532a1c1bf49f4c","ref":"refs/heads/flatcar-master","pushedAt":"2024-04-29T12:58:48.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"ader1990","name":"Adrian Vladu","path":"/ader1990","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1412442?s=80&v=4"},"commit":{"message":"Merge pull request #95 from flatcar/ader1990/kubevirt\n\nafterburn: set hostname for kubevirt OEM","shortMessageHtmlLink":"Merge pull request #95 from flatcar/ader1990/kubevirt"}},{"before":null,"after":"13f391a1166e649841d83d030b1a760dfbb96ce6","ref":"refs/heads/ader1990/kubevirt","pushedAt":"2024-04-29T12:53:54.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ader1990","name":"Adrian Vladu","path":"/ader1990","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1412442?s=80&v=4"},"commit":{"message":"afterburn: set hostname for kubevirt OEM\n\nSigned-off-by: Adrian Vladu ","shortMessageHtmlLink":"afterburn: set hostname for kubevirt OEM"}},{"before":"6c2fba412dbce9a011535a9e57332e1307072855","after":"78d94b311ddb047b280c5ee180410b48ec04ea39","ref":"refs/heads/flatcar-master","pushedAt":"2024-04-16T14:33:34.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"tormath1","name":"Mathieu Tortuyaux","path":"/tormath1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/28657343?s=80&v=4"},"commit":{"message":"Merge pull request #94 from apricote/hetzner\n\nafterburn: set hostname for hetzner OEM","shortMessageHtmlLink":"Merge pull request #94 from apricote/hetzner"}},{"before":"9e5004846c3c4e8c7557e068f943cdff962e208a","after":null,"ref":"refs/heads/kai/systemd-cryptsetup","pushedAt":"2024-03-28T07:53:23.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"pothos","name":"Kai Lüke","path":"/pothos","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1189130?s=80&v=4"}},{"before":"357ca18d4b7e9dcca6070e08874e2e2824858c2a","after":"6c2fba412dbce9a011535a9e57332e1307072855","ref":"refs/heads/flatcar-master","pushedAt":"2024-03-28T07:53:20.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"pothos","name":"Kai Lüke","path":"/pothos","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1189130?s=80&v=4"},"commit":{"message":"Merge pull request #93 from flatcar/kai/systemd-cryptsetup\n\ndracut: Install libcryptsetup-token-systemd-tpm2 plugin","shortMessageHtmlLink":"Merge pull request #93 from flatcar/kai/systemd-cryptsetup"}},{"before":null,"after":"9e5004846c3c4e8c7557e068f943cdff962e208a","ref":"refs/heads/kai/systemd-cryptsetup","pushedAt":"2024-03-28T05:42:37.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"pothos","name":"Kai Lüke","path":"/pothos","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1189130?s=80&v=4"},"commit":{"message":"dracut: Install libcryptsetup-token-systemd-tpm2 plugin\n\nFor unlocking TPM2-backed LUKS volumes that were set up with\nsystemd-cryptenroll we need the plugin library in the initrd.","shortMessageHtmlLink":"dracut: Install libcryptsetup-token-systemd-tpm2 plugin"}},{"before":"224a1724a7b20a0e3cdb3372f0338213787212b6","after":"357ca18d4b7e9dcca6070e08874e2e2824858c2a","ref":"refs/heads/flatcar-master","pushedAt":"2024-03-27T09:15:24.000Z","pushType":"pr_merge","commitsCount":3,"pusher":{"login":"pothos","name":"Kai Lüke","path":"/pothos","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1189130?s=80&v=4"},"commit":{"message":"Merge pull request #90 from simoncampion/root-unlock-generator\n\nAdd service for root disk unlocking","shortMessageHtmlLink":"Merge pull request #90 from simoncampion/root-unlock-generator"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xNlQxMjoyOTo1NC4wMDAwMDBazwAAAAS3ZgbQ","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xNlQxMjoyOTo1NC4wMDAwMDBazwAAAAS3ZgbQ","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wMy0yN1QwOToxNToyNC4wMDAwMDBazwAAAAQgfv-k"}},"title":"Activity · flatcar/bootengine"}