-
Notifications
You must be signed in to change notification settings - Fork 789
feat(templates): add amazonlinux-2023 distro #4454
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
feat(templates): add amazonlinux-2023 distro #4454
Conversation
|
Testing it with: Correct os-release Info: Correct uname: Correct repos: |
|
It's weird, but the only problem is that the backspace does not work. I don't know if Lima uses SSH underneath, but I'll investigate the debug logs by re-shelling to the VM. [Update] Yep, it looks like it uses SSH. Then I believe it could be an issue with SendEnv. [Update 2] The --preserve-env did not work either. Plus, I realised that the mountpoint did not work. I believe there has to be a directory called /Users/gokhankocmarli, which is my $HOME on the host machine. |
|
Previous attempt with this (Amazon Linux) was: I think it also failed to automate the updating? |
Thank you for the info! I have reviewed the comments there and see that two concerns are in common:
I'll spend some time fixing those. However, I believe that we can move this template to experimental ones and start iteratively on fixing stuff. Some folks may not need mounts or be happy with just having AL2023 with Lima without the latest image since it's possible to easily update the system using We could easily patch it by adding a run-script when the image is initialised and upgrading the system to the latest. Wdyt? |
|
You can "fix" the mount problems by excluding the methods that don't work, like 9p (check other templates for examples) But it's a problem if there is no download URL. Maybe something that upstream can provide, if you ask them? |
0f476bd to
e33f646
Compare
I used the same mount point restrictions as the previous PR, the issue still exists but I'm investigating it.
I added a new update-template script under hack/ directory. This script automatically fetches the latest version and updates the template. I used the trick of following the URL endpoint /latest and parsing its 302 response to resolve the latest version number (including .1/.0 at the end). I don't know who calls them in what frequency, but I see that it's the common and agreed approach. |
9dba5e5 to
897084e
Compare
|
Update: The mount problem is gone, and it's possible to update the image to the latest one within a new script under I'll check the unit test and the lining stuff later. Does it look OK to you? |
b48521f to
dedcd61
Compare
c5fd2b5 to
2130e26
Compare
This commit adds a simple template for the Amazon Linux 2023 operating system's 2025-12-08 version. The OS is scheduled to release every two weeks, therefore, a new script called hack/update-template-amazonlinux.sh is added next to the other template updater scripts. Find the latest images here: cdn.amazonlinux.com/al2023/os-images/latest/ This patch: - Adds amazonlinux-2023 template with 2025-12-08 release by default (fallback). - Resolves mount issues on AL2023 with host OS. - Introduces a script on VM init where it updates the system to latest release. - Adds update-template-amazonlinux.sh script to help maintainers automatically update the verison. Signed-off-by: Gyokhan Kochmarla <gokhan.kocmarli@gmail.com>
2130e26 to
6935a63
Compare
| script: | | ||
| #!/bin/bash | ||
| set -eux -o pipefail | ||
| # Update to the latest release on the first boot |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should use upgradePackages instead, if desired
Then cloud-init will call dnf, and reboot if required
This commit adds a simple template for the Amazon Linux 2023 operating system's latest version. The OS is scheduled to release every two weeks, therefore, we need to find a way to automatically update it from the following AWS website: