Official upstream for the cloud-init: cloud instance initialization
OTHER License
Bot releases are hidden (Show)
Cloud-init release 24.2 is now available
The 24.2 release:
Highlights:
Breaking Changes:
Note for downstream image creators:
Published by TheRealFalcon 5 months ago
Published by TheRealFalcon 5 months ago
Published by blackboxsw 7 months ago
Cloud-init bug fix release against 24.1.
Published by TheRealFalcon 7 months ago
Published by TheRealFalcon 7 months ago
Published by holmanb 7 months ago
Published by holmanb 8 months ago
Cloud-init release 24.1 is now available
The 24.1 release:
cloud-init status
See the full changelog for more details.
Published by TheRealFalcon 8 months ago
Highlights:
Published by TheRealFalcon 9 months ago
Published by aciba90 9 months ago
Highlights:
Published by aciba90 10 months ago
Highlights:
Published by aciba90 11 months ago
General:
Distributions:
AliYun: Allow aliyun ds to fetch data in init-local
Azure:
MAAS: Add datasource to init-local timeframe
NWCS: Update DataSourceNWCS.py
VMware: Fall back to vmtoolsd if vmware-rpctool errs
ConfigModules:
Network:
Schema:
DsIdentify:
Logging:
Docs:
Published by TheRealFalcon 12 months ago
Cloud-init bug fix release 23.3.2:
Published by TheRealFalcon about 1 year ago
Cloud-init bug fix release 23.3.2:
Published by blackboxsw about 1 year ago
Published by aciba90 about 1 year ago
Cloud-init bug fix release 23.2.2:
p.s.: Many thanks to rustydb and anguswilliams for reporting the issues and anyone involved!
Published by blackboxsw over 1 year ago
Cloud-init bug fix release 23.2.1:
p.s.: Many thanks to sorinp
for late breaking regression detection with release 23.2 brought up in IRC.
Published by blackboxsw over 1 year ago
- Alpine: update locale file, use os-release PRETTY_NAME
- FreeBSD:
* user account locking
* growpart resize root partition and grow using growfs onestart
* better identify MBR slices
- RedHat:
* Drop IBM refresh_rmc_and_interfaces config module only
applicable on RHEL7
* Fedora: Enable CA handling
- OpenSUSE:
* Enable SUSE based distros for ca handling
* Remove sysvinit files
- Azure:
* retry fetching metadata up to 300 seconds
* introduce identity module
* add networking check for all source PPS
* improved error reporting, for hosts and DHCP errors
* report success to host and introduce kvp module
- GCE: activate network discovery on every boot
- OpenStack: honor the DNS servers associated with a network
- Oracle: prefer system_cfg over ds network config source
- DataSourceScaleway: upcoming IPv6 support
- NoCloud:
* Use seedfrom protocol to determine mode
* fix kernel commandline semi-colon delimited args
* support `ci.ds=` kernel cmdline key for all datasources
- ntp: add 'peers' and 'allow' directives
- cc_grub_dpkg: Added UEFI support
- DHCP: Refactor dhcp client code for deprecated isc-dclient
- fix netstate getway keyerror for iproutes without gateway
- resolv_conf: Allow > 3 nameservers
- NetworkManager:
* set higher autoconnect priority value 120 for cloud-init
* add method for ipv6 static IP configuration
* generate ipv6 stateful dhcp config at par with sysconfig
- sysconfig: prefer sysconfig when NM ifcfg-rh plugin installed
- macs: ignore duplicate MAC for devs with driver driver qmi_wwan
- do not create dsa and ed25519 host keys when crypto FIPS
- Make user/vendor data sensitive and remove log permissions
- Make user/vendor data sensitive and remove log permissions
- users: schema permit empty list to indicate create no users
- validation of jinja template user-data
- update network configuration path links
- Document use of `ip route append` to add routes
- Update kernel command line docs
Published by TheRealFalcon over 1 year ago
Security release.
Make user/vendor data sensitive and remove log permissions
Because user data and vendor data may contain sensitive information,
this commit ensures that any user data or vendor data written to
instance-data.json gets redacted and is only available to root user.
Also, modify the permissions of cloud-init.log to be 640, so that
sensitive data leaked to the log isn't world readable.
Additionally, remove the logging of user data and vendor data to
cloud-init.log from the Vultr datasource.
LP: #2013967
CVE: CVE-2023-1786