Skip to content

Conversation

jimmykarily
Copy link
Contributor

@jimmykarily jimmykarily self-assigned this Oct 8, 2025
@jimmykarily jimmykarily moved this to In Progress 🏃 in 🧙Issue tracking board Oct 8, 2025
jimmykarily added a commit to kairos-io/kcrypt-discovery-challenger that referenced this pull request Oct 8, 2025
because when COS_OEM is encrypted, we can't read it from there.
Needs: kairos-io/kairos-agent#988

Signed-off-by: Dimitris Karakasilis <[email protected]>
}

for _, args := range triggerCmds {
cmd := exec.Command(args[0], args[1:]...)

Check failure

Code scanning / gosec

Subprocess launched with a potential tainted input or cmd arguments Error

Subprocess launched with a potential tainted input or cmd arguments
@codecov
Copy link

codecov bot commented Oct 8, 2025

Codecov Report

❌ Patch coverage is 0% with 176 lines in your changes missing coverage. Please review.
✅ Project coverage is 42.28%. Comparing base (50a19de) to head (c8b4ab0).
⚠️ Report is 4 commits behind head on main.

Files with missing lines Patch % Lines
internal/agent/hooks/gruboptions.go 0.00% 106 Missing ⚠️
internal/agent/hooks/finish.go 0.00% 70 Missing ⚠️

❌ Your project check has failed because the head coverage (7.59%) is below the target coverage (75.00%). You can increase the head coverage or adjust the target coverage.

Additional details and impacted files
@@            Coverage Diff             @@
##             main     #988      +/-   ##
==========================================
- Coverage   43.38%   42.28%   -1.10%     
==========================================
  Files          60       60              
  Lines        7678     7863     +185     
==========================================
- Hits         3331     3325       -6     
- Misses       4023     4211     +188     
- Partials      324      327       +3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

Signed-off-by: Dimitris Karakasilis <[email protected]>
because when COS_OEM is encrypted, we cannot read the KMS configuration
until it's decrypted and we cannot decrypt it unless we read the
configuration. We now store the relevant configuration on the cmdline
automatically for non-UKI so that on the next boot, we can decrypt
COS_OEM. For UKI, the user will have to set these values on the cmdline
(for now manually, we'll provide docs).

Signed-off-by: Dimitris Karakasilis <[email protected]>
because when we encrypt the partition, the data on it is gone. We didn't
care up to now because we didn't support encrypting OEM. Now we do.

Signed-off-by: Dimitris Karakasilis <[email protected]>
because we don't use grup in uki mode

Signed-off-by: Dimitris Karakasilis <[email protected]>
Signed-off-by: Dimitris Karakasilis <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Status: In Progress 🏃

Development

Successfully merging this pull request may close these issues.

1 participant