1
0
mirror of https://github.com/ostreedev/ostree.git synced 2025-04-04 02:50:40 +03:00

7196 Commits

Author SHA1 Message Date
Colin Walters
1dd64eb264 Release 2025.2
Signed-off-by: Colin Walters <walters@verbum.org>
v2025.2
2025-03-21 08:13:36 -04:00
Colin Walters
75f2f7d50d tests/auto-prune: Don't go negative
- First I kept wondering what the magic of 10000 was here before
  looking above and noticing it matched the number of dtb files.
  Make a shared variable so the connection is more obvious
- Next, I *believe* the intention of this test was to test
  the edge case of bytes vs blocks, but we ended up subtracting
  blocks and I think recent FCOS images happened to get small
  enough that we started going negative here.
  Fix this to convert the bytes into blocks.
2025-03-21 08:13:36 -04:00
Colin Walters
ba2f9a93b2
Merge pull request from ueno/wip/dueno/pkcs8
sign: Support generic "spki" type of commit signatures
2025-03-18 11:02:51 -04:00
Daiki Ueno
79470298bf sign: Support generic "spki" type of commit signatures
The current "ed25519" signing type assumes raw Ed25519 key format for
both public and private keys. This patch generalizes it by adding a
new signature type "spki" which uses the X.509 SubjectPublicKeyInfo
format for public keys. Keys in this format can easily be created with
openssl tools and provide crypto agility[1] as the format embeds
algorithm identifier.

The supposed use-case of this feature is to attach multiple signatures
with different algorithms to a single commit, so even if an algorithm
turned vulnerable, the signatures made with other algorithms can still
be used as a fallback. For instance, signer can create an Ed25519
signature along with a quantum-resistent ML-DSA signature.

The following are a couple of implementation notes:

- The private keys shall be stored in the PKCS#8 format, though future
  extensions may support other format such as opaque key handles on a
  hardware token.

- The "spki" signature type prefers the keys to be encoded in the PEM
  format on disk, while it still accepts base64 encoded keys when given
  through the command-line.

1. https://en.wikipedia.org/wiki/Cryptographic_agility

Signed-off-by: Daiki Ueno <dueno@redhat.com>
2025-03-18 16:22:16 +09:00
Daiki Ueno
86a7a53d86 tests: Use tap_ok/tap_end in test-signed-commit.sh
Signed-off-by: Daiki Ueno <dueno@redhat.com>
2025-03-18 16:21:25 +09:00
Daiki Ueno
1a6165e3ee sign: Add PEM reading facility
This adds a new class OstreePemReader, which reads PEM blocks from an
input stream.  This would be useful for the "x509" signing backend, as
the keys are typically stored in the PEM format.

Signed-off-by: Daiki Ueno <dueno@redhat.com>
2025-03-18 16:21:25 +09:00
Daiki Ueno
65efdf6649 sign: Factor out logic to read key blobs
This defines a new interface OstreeBlobReader, which encapsulates the
key file parsing logic. This would make it easy to support custom file
formats such as PEM.

Signed-off-by: Daiki Ueno <dueno@redhat.com>
2025-03-18 16:21:24 +09:00
Daiki Ueno
867dc0b74d sign: Use explicit_bzero to clear secret key material
Suggested in:
https://github.com/ostreedev/ostree/pull/3278#discussion_r1675696052

Signed-off-by: Daiki Ueno <dueno@redhat.com>
2025-03-18 16:21:00 +09:00
Daiki Ueno
dc1f9fb49b sign: Fix typo in error messages and comments
Signed-off-by: Daiki Ueno <dueno@redhat.com>
2025-03-18 16:21:00 +09:00
Colin Walters
1f82bdeac9
Merge pull request from cgwalters/syncfs-clarification
commit: Clarify that syncfs is of repo/tmp
2025-03-17 21:59:05 -04:00
Colin Walters
688ab1aa8e commit: Clarify that syncfs is of repo/tmp
We saw this in an error message:
```
error: Generating commit from rootfs: syncfs: Not a directory
```

I'm pretty sure it's this function call but let's be a bit
more sure by adding a bit more context.
2025-03-17 19:10:42 -04:00
Colin Walters
a433e44bba
Merge pull request from smcv/debug3386
test-gpg-verify-result: Show what the result was before asserting about it
2025-03-17 09:21:43 -04:00
Colin Walters
09ef571a64
Merge pull request from vmorris/patch-1
Update introduction.md
2025-03-17 08:45:07 -04:00
Colin Walters
a5af07a83d
Merge pull request from champtar/fsfreeze-boot
Use fsfreeze_thaw_cycle(/boot) instead of fsync(/boot)
2025-03-17 08:31:40 -04:00
Vance Morris
11dd917a93
Update introduction.md
slight rewording to remove redundancy
2025-03-16 22:54:54 -05:00
Etienne Champetier
1b3ba40f13 Use fsfreeze_thaw_cycle(/boot) instead of fsync(/boot)
Grub doesn't support replaying XFS journal, so when using
XFS for /boot, fsync() or syncfs() are not enough and can
leave the system in an unbootable state.

Signed-off-by: Etienne Champetier <e.champetier@ateme.com>
2025-03-14 16:33:33 -04:00
Colin Walters
8df797d355
Merge pull request from jlebon/pr/drop-finalize-staged-path
boot: Drop ostree-finalize-staged.path
2025-03-10 15:57:54 -04:00
Jonathan Lebon
2b9912e9f9
boot: Drop ostree-finalize-staged.path
This effectively reverts ac1a919f ("boot: Add
ostree-finalize-staged.path").

A bug came in on the OCP side that demonstrates that the way things are
setup right now is racy. If a reboot is triggered quickly after staging
a deployment, the whole pipeline of:

- ostree-finalize-staged.path, which triggers
- ostree-finalize-staged.service, which triggers
- ostree-finalize-staged-hold.service,

may not fully have happened before systemd isolates to `reboot.target`
which will want to kill all pending jobs.

Just directly starting the systemd unit is less elegant but much more
explicit and gets rid of any possible race because it's directly part of
the staging operation.

Fixes: https://issues.redhat.com/browse/OCPBUGS-51150
2025-03-07 17:11:44 -05:00
Simon McVittie
3bdcf24b28 test-gpg-verify-result: Show what the result was before asserting about it
Helps: https://github.com/ostreedev/ostree/issues/3386
Signed-off-by: Simon McVittie <smcv@debian.org>
2025-02-26 19:58:31 +00:00
Colin Walters
364e22f19c
Merge pull request from cgwalters/log-xattr-conflict
core: Fix bare-user xattr canonicalization
2025-02-25 16:42:36 -05:00
Colin Walters
37961d3d9e core: canonicalize bare-user xattrs
Previously we were erroring out if xattrs were provided in
non-canonical (e.g. unsorted) form all the way down to just
the bare-user path. But for archive repos and dirmeta we
canonicalized.

Canonicalize bare-user xattrs on both read and write consistently
instead of erroring.

Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-25 14:58:35 -05:00
Colin Walters
0c55f68006 tests/basic: Add lots of user. xattrs
This exercises our requirement for xattr sorting.

Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-25 14:58:35 -05:00
Colin Walters
b0c4712e0d commit: Add errprefix for bareuser metadata
To aid debugging.

Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-25 14:58:35 -05:00
Colin Walters
ab9a3b02a9 core: Print which xattrs are not sorted
I hit this in the rpm-ostree rechunker flow somehow
and with this change I now get:

`error: Generating commit from rootfs: Processing dir var: Writing content object: Incorrectly sorted xattr name (prev=user.Librepo.checksum.mtime, cur=security.selinux), index=2`

which is more useful, although I still need to figure out
and fix why that's happening (again?).

Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-25 14:58:35 -05:00
Colin Walters
82b660b12d
Merge pull request from alyssais/private
libostree: add private dependencies to pkg-config
2025-02-14 08:34:42 -05:00
Colin Walters
1c0e754f19
Merge pull request from alyssais/libmount
libostree: remove unused libmount include
2025-02-14 08:30:49 -05:00
Alyssa Ross
8afde45f9a
libostree: remove unused libmount include
As far as I can tell, this hasn't been used since
9a526bba ("sysroot: Handle ro /boot but rw /sysroot").
2025-02-14 12:29:46 +01:00
Alyssa Ross
cb1d0ad0b9
libostree: add private dependencies to pkg-config
This makes it possible to use pkg-config to link against libostree as
a static library.  Unlike shared libraries, static libraries don't
encode their dependencies in the library file, so we have to
communicate them via pkg-config.
2025-02-14 12:26:11 +01:00
Jonathan Lebon
1aa381a25d
Merge pull request from cgwalters/set-log-cb
sepolicy: Add ostree_sepolicy_set_null_log
2025-02-10 17:09:54 -05:00
Colin Walters
68d70de6c6 sepolicy: Add ostree_sepolicy_set_null_log
Let's quiet the output of libselinux by default, all we
get is the pointless "regex version mismatch" warnings.
This is what e.g. systemd does.

This is exposed via the library; our binary opts in,
then we expect higher level tools like e.g. bootc to
do this too.

Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-10 15:24:52 -05:00
Colin Walters
303c2a23a2
Merge pull request from cgwalters/log-require-verity
prepare-root: Log when we're mounting with verity required
2025-02-03 13:17:54 -05:00
Colin Walters
5dce6456cc
Merge pull request from nikita-dubrovskii/pvimg
zipl: remove 'sdboot' image before generating new one
2025-02-03 12:40:37 -05:00
Colin Walters
6b4e79ce9e
Merge pull request from cgwalters/update-gir-follow
Update gir followup
2025-02-03 09:50:19 -05:00
Nikita Dubrovskii
0c25931b13 zipl: remove 'sdboot' image before generating new one 2025-02-03 13:31:17 +01:00
Colin Walters
1583090622 rust: Update to glib 0.20
Since we're releasing a new version of our crates,
let's update to the latest.

Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-01 13:49:32 -05:00
Colin Walters
b89f209a09 rust: Regenerate with correct Since
To ensure the recent kexec_load API has a feature gate.

Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-01 13:38:21 -05:00
Colin Walters
533c8b9281 lib: Add missing Since annotations to two recent APIs
On general principle, but specfiically this is needed
to ensure the Rust binding generator correctly handles
feature flags for them.
2025-02-01 13:36:07 -05:00
Colin Walters
968b0b14e2
Merge pull request from Mstrodl/feature/mstrodl/update-gir
Update GIR
2025-02-01 12:53:05 -05:00
Mary Strodl
f8a57baecf Cargo: bump MSRV, need c-string literals
Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-01 10:53:21 -05:00
Mary Strodl
75a2994329 rust-bindings/tests: Display no longer implemented, but Debug is
Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-01 10:53:21 -05:00
Mary Strodl
0c9cf4809c rust-bindings: Regenerate Bindings
Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-01 10:53:21 -05:00
Mary Strodl
3cb8d7932b rust-bindings: upgrade gir and dependencies
Signed-off-by: Colin Walters <walters@verbum.org>
2025-02-01 10:53:21 -05:00
Colin Walters
863890804b prepare-root: Log when we're mounting with verity required
On general principle, but specifically as I wanted to cross-check
this when debugging something else.
2025-02-01 10:23:29 -05:00
Colin Walters
c0f8db17ef
Merge pull request from fossdd/musl
libotutil: Remove redundant import of prctl.h
2025-01-27 13:55:08 -05:00
fossdd
e82bb38adf
libotutil: Remove redundant import of prctl.h
sys/prctl.h already provides prctl.h and adding both imports fails on
musl libc:

	/usr/include/sys/prctl.h:88:8: error: redefinition of 'struct prctl_mm_map'
	   88 | struct prctl_mm_map {
	      |        ^~~~~~~~~~~~
	In file included from src/libotutil/ot-unix-utils.c:33:
	/usr/include/linux/prctl.h:134:8: note: originally defined here
	  134 | struct prctl_mm_map {
	      |        ^~~~~~~~~~~~
2025-01-27 17:49:39 +01:00
Colin Walters
24d47308e9
Merge pull request from igoropaniuk/contribute_updates
docs: update Dockerfile
2025-01-20 15:17:11 -05:00
Colin Walters
1ae8113c2a
Merge pull request from jmarrero/release-2025.1
Release 2025.1
2025-01-16 10:03:22 -05:00
Joseph Marrero Corchado
238192c64f configure: post-release version bump 2025-01-15 13:14:43 -05:00
Joseph Marrero Corchado
372c4444dd Release 2025.1 v2025.1 2025-01-15 13:11:04 -05:00
Igor Opaniuk
12f850a8d3 docs: update Dockerfile
Fix issues in Dockerfile:
1. Update Fedora image to the latest version 41, otherwise docker build
   fails with an error:

   Step 1/7 : FROM registry.fedoraproject.org/fedora:28
   manifest for registry.fedoraproject.org/fedora:28 not found: manifest unknown: manifest unknown

2. Force install python3-yaml package, as it's required for running some
   tests. For example, tests/test-remote-headers.sh will fail without
   it:

   V=$($CMD_PREFIX ostree --version | \
       python3 -c 'import sys, yaml; print(yaml.safe_load(sys.stdin)["libostree"]["Version"])')
   Traceback (most recent call last):
   File "<string>", line 1, in <module>
    import sys, yaml; print(yaml.safe_load(sys.stdin)["libostree"]["Version"])
    ^^^^^^^^^^^^^^^^
   ModuleNotFoundError: No module named 'yaml'

With these fixes `make check` executes successfully in a container:
============================================================================
Testsuite summary for libostree 2024.11
============================================================================
 TOTAL: 935
 PASS:  888
 SKIP:  47
 XFAIL: 0
 FAIL:  0
 XPASS: 0
 ERROR: 0

Signed-off-by: Igor Opaniuk <igor.opaniuk@foundries.io>
2025-01-15 17:16:03 +01:00