Skip to content

v2.0.0

Compare
Choose a tag to compare
@github-actions github-actions released this 13 Apr 11:48
· 848 commits to master since this release
f445b47


kairos-white-column 5bc2fe34

With Kairos you can build immutable, bootable Kubernetes and OS images for your edge devices as easily as writing a Dockerfile. Optional P2P mesh with distributed ledger automates node bootstrapping and coordination. Updating nodes is as easy as CI/CD: push a new image to your container registry and let secure, risk-free A/B atomic upgrades do the rest.

Documentation

Contribute

📚 Getting started with Kairos
💡 Examples
🎥 Video
👐Engage with the Community
🤖 Support matrix

🙌 CONTRIBUTING.md
🙋 GOVERNANCE
👷Code of conduct

Kairos is a cloud-native meta-Linux distribution that brings the power of public cloud to your on-premises environment. With Kairos, you can build your own cloud with complete control and no vendor lock-in. It allows you to easily spin up a Kubernetes cluster with the Linux distribution of your choice, and manage the entire cluster lifecycle with Kubernetes.

For releases with k3s embedded, see here.

🔦 Highlights

This is a major releases as #877 is a core change of the Kairos boot process.

We replaced the former dracut modules (a set of bash scripts/dracut/systemd services), which were responsible for the immutability management of Kairos, with https://github.com/kairos-io/immucore, a self-contained binary which doesn't have dependencies and can run without dracut and systemd.

This allows us to:

  • not depend anymore on systemd while set up immutability on boot ( allowing us to unblock #653 )
  • have hybrid images (#656), that boots both UKI as a single file image, and as well as pivoting (as we are doing currently)
  • pave the way for things like #873 #119 and much more
  • debug things more cleanly, have a better testbed, and allow to integrate easily with golang

Besides, we have now full SBOM list attached to images, as part of the release process, and in-toto attestation, allowing you to verify attestation also of SBOM lists, and have full audit of images. We also have integrated grype and trivy in our pipelines, and as such now releases contains also CVE reports, and finally we upload the generated reports as sarif file to GitHub to have notifications and see with more ease the impact of CVEs to the images.

There were also fixes to the Debian flavor (thanks to the community for reporting issues!) and now manual upgrades with private registries are supported, too.

Finally, it is also now possible to specify custom bind mounts path to overlay on top of the persistent partition, allowing to easily specify paths that you want to be persistent in the system via the cloud config file: https://kairos.io/docs/advanced/customizing/#customizing-the-file-system-hierarchy-using-custom-mounts .

What's Changed

New Contributors

Full Changelog: v1.6.0...v2.0.0