penguins-eggs 10.1.1 → 25.7.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.oclif.manifest.json +1 -1
- package/README.md +55 -60
- package/assets/calamares/install-system.sh +2 -1
- package/conf/derivatives.yaml +5 -1
- package/conf/distros/alpine/calamares/modules/packages.yml +1 -1
- package/conf/distros/alpine/calamares/settings.yml +16 -29
- package/conf/distros/buster/calamares/modules/fstab.yml +1 -1
- package/conf/distros/buster/calamares/modules/mount.yml +4 -12
- package/conf/distros/fedora/calamares/modules/bootloader.yml +46 -17
- package/conf/distros/fedora/calamares/modules/fstab.yml +36 -11
- package/conf/distros/fedora/calamares/modules/mount.yml +101 -39
- package/conf/distros/fedora/calamares/modules/partition.yml +173 -23
- package/conf/distros/fedora/calamares/modules/users.yml +7 -9
- package/conf/distros/openmamba/calamares/settings.yml +0 -2
- package/conf/distros/opensuse/calamares/modules/bootloader.yml +46 -17
- package/conf/distros/opensuse/calamares/modules/displaymanager.yml +9 -5
- package/conf/distros/opensuse/calamares/modules/finished.yml +1 -1
- package/conf/distros/opensuse/calamares/modules/fstab.yml +36 -11
- package/conf/distros/opensuse/calamares/modules/grubcfg.yml +51 -0
- package/conf/distros/opensuse/calamares/modules/mount.yml +104 -39
- package/conf/distros/opensuse/calamares/modules/packages.yml +3 -3
- package/conf/distros/opensuse/calamares/modules/partition.yml +30 -237
- package/conf/distros/opensuse/calamares/modules/removeuser.yml +1 -14
- package/conf/distros/opensuse/calamares/modules/unpackfs.yml +0 -1
- package/conf/distros/opensuse/calamares/modules/users.yml +296 -16
- package/conf/distros/opensuse/calamares/modules/welcome.yml +91 -16
- package/conf/distros/opensuse/calamares/settings.yml +34 -120
- package/conf/distros/opensuse/calamares/zstd2lzo.sh +2 -0
- package/conf/distros/rolling/calamares/modules/shellprocess_sync.yml +5 -0
- package/conf/distros/rolling/calamares/settings.yml +4 -5
- package/dist/classes/bleach.d.ts +5 -0
- package/dist/classes/bleach.js +13 -0
- package/dist/classes/cli-autologin.js +14 -9
- package/dist/classes/daddy.js +9 -1
- package/dist/classes/distro.js +0 -9
- package/dist/classes/incubation/incubator.d/fedora.d.ts +32 -0
- package/dist/classes/incubation/incubator.d/fedora.js +79 -0
- package/dist/classes/incubation/incubator.d/opensuse.js +4 -6
- package/dist/classes/incubation/incubator.d/rolling.js +1 -3
- package/dist/classes/incubation/incubator.js +6 -11
- package/dist/classes/ovary.d/initrd.js +40 -11
- package/dist/classes/ovary.d/make-dot-disk.js +21 -11
- package/dist/classes/ovary.d/make-efi.js +13 -11
- package/dist/classes/ovary.d/merged.d.ts +1 -1
- package/dist/classes/ovary.d/merged.js +3 -2
- package/dist/classes/ovary.d/produce.js +7 -6
- package/dist/classes/ovary.d/user-create-live.js +15 -11
- package/dist/classes/ovary.d.ts +1 -1
- package/dist/classes/ovary.js +1 -1
- package/dist/classes/pacman.d/alpine.js +12 -7
- package/dist/classes/pacman.d/opensuse.js +4 -3
- package/dist/classes/pacman.js +3 -12
- package/dist/classes/pxe.d.ts +21 -18
- package/dist/classes/pxe.js +192 -259
- package/dist/classes/tailor.js +69 -33
- package/dist/classes/utils.d/filesystem.js +2 -0
- package/dist/classes/utils.d/kernel.js +12 -2
- package/dist/classes/utils.d/snapshot.js +1 -1
- package/dist/classes/utils.d/system.js +2 -2
- package/dist/commands/cuckoo.js +4 -6
- package/dist/commands/export/pkg.js +28 -12
- package/dist/commands/wardrobe/wear.js +1 -1
- package/dist/dhcpd-proxy/classes/packet.d.ts +36 -0
- package/dist/dhcpd-proxy/classes/packet.js +124 -0
- package/dist/dhcpd-proxy/index.d.ts +4 -0
- package/dist/dhcpd-proxy/index.js +4 -0
- package/dist/dhcpd-proxy/interfaces/i-pxe.d.ts +45 -0
- package/dist/dhcpd-proxy/interfaces/i-pxe.js +1 -0
- package/dist/dhcpd-proxy/lib/packet/converters.d.ts +11 -0
- package/dist/dhcpd-proxy/lib/packet/converters.js +395 -0
- package/dist/dhcpd-proxy/lib/packet/message-types.d.ts +10 -0
- package/dist/dhcpd-proxy/lib/packet/message-types.js +12 -0
- package/dist/dhcpd-proxy/lib/packet/options.d.ts +8 -0
- package/dist/dhcpd-proxy/lib/packet/options.js +264 -0
- package/dist/dhcpd-proxy/lib/sprintf.d.ts +6 -0
- package/dist/dhcpd-proxy/lib/sprintf.js +130 -0
- package/dist/dhcpd-proxy/lib/utils.d.ts +126 -0
- package/dist/dhcpd-proxy/lib/utils.js +255 -0
- package/dist/dhcpd-proxy/simple-proxy.d.ts +11 -0
- package/dist/dhcpd-proxy/simple-proxy.js +118 -0
- package/dist/interfaces/i-pxe.d.ts +16 -16
- package/dist/krill/classes/sequence.d/add_user.d.ts +3 -3
- package/dist/krill/classes/sequence.d/add_user.js +34 -29
- package/dist/krill/classes/sequence.d/bootloader_config.js +3 -26
- package/dist/krill/classes/sequence.d/fstab.js +10 -22
- package/dist/krill/classes/sequence.d/grubcfg.js +5 -3
- package/dist/krill/classes/sequence.d/mkfs.d.ts +1 -1
- package/dist/krill/classes/sequence.d/mkfs.js +10 -11
- package/dist/krill/classes/sequence.d/partition.d/bios_standard.d.ts +3 -4
- package/dist/krill/classes/sequence.d/partition.d/bios_standard.js +31 -16
- package/dist/krill/classes/sequence.d/partition.d/uefi_standard.js +0 -1
- package/dist/krill/lib/select_filesystem_type.js +2 -1
- package/dist/lib/utils.d.ts +2 -25
- package/dist/lib/utils.js +4 -27
- package/dist/{penguins-eggs_10.1.1-0_amd64.deb → penguins-eggs_25.7.7-1_amd64.deb} +0 -0
- package/dist/penguins-eggs_25.7.7-1_amd64.deb.sha256 +1 -0
- package/dracut/README.md +14 -0
- package/dracut/dracut.conf +3 -3
- package/dracut/dracut.conf.d/10-persistent_policy.conf +1 -0
- package/dracut/dracut.conf.d/{01-live.conf → 50-live.conf} +3 -2
- package/ipxe/grub/acpi.mod +0 -0
- package/ipxe/grub/adler32.mod +0 -0
- package/ipxe/grub/affs.mod +0 -0
- package/ipxe/grub/afs.mod +0 -0
- package/ipxe/grub/afsplitter.mod +0 -0
- package/ipxe/grub/ahci.mod +0 -0
- package/ipxe/grub/all_video.mod +0 -0
- package/ipxe/grub/aout.mod +0 -0
- package/ipxe/grub/appleldr.mod +0 -0
- package/ipxe/grub/archelp.mod +0 -0
- package/ipxe/grub/at_keyboard.mod +0 -0
- package/ipxe/grub/ata.mod +0 -0
- package/ipxe/grub/backtrace.mod +0 -0
- package/ipxe/grub/bfs.mod +0 -0
- package/ipxe/grub/bitmap.mod +0 -0
- package/ipxe/grub/bitmap_scale.mod +0 -0
- package/ipxe/grub/blocklist.mod +0 -0
- package/ipxe/grub/boot.mod +0 -0
- package/ipxe/grub/bsd.mod +0 -0
- package/ipxe/grub/bswap_test.mod +0 -0
- package/ipxe/grub/btrfs.mod +0 -0
- package/ipxe/grub/bufio.mod +0 -0
- package/ipxe/grub/cat.mod +0 -0
- package/ipxe/grub/cbfs.mod +0 -0
- package/ipxe/grub/cbls.mod +0 -0
- package/ipxe/grub/cbmemc.mod +0 -0
- package/ipxe/grub/cbtable.mod +0 -0
- package/ipxe/grub/cbtime.mod +0 -0
- package/ipxe/grub/chain.mod +0 -0
- package/ipxe/grub/cmdline_cat_test.mod +0 -0
- package/ipxe/grub/cmp.mod +0 -0
- package/ipxe/grub/cmp_test.mod +0 -0
- package/ipxe/grub/command.lst +194 -0
- package/ipxe/grub/config.h +69 -0
- package/ipxe/grub/configfile.mod +0 -0
- package/ipxe/grub/cpio.mod +0 -0
- package/ipxe/grub/cpio_be.mod +0 -0
- package/ipxe/grub/cpuid.mod +0 -0
- package/ipxe/grub/crc64.mod +0 -0
- package/ipxe/grub/crypto.lst +45 -0
- package/ipxe/grub/crypto.mod +0 -0
- package/ipxe/grub/cryptodisk.mod +0 -0
- package/ipxe/grub/cs5536.mod +0 -0
- package/ipxe/grub/ctz_test.mod +0 -0
- package/ipxe/grub/date.mod +0 -0
- package/ipxe/grub/datehook.mod +0 -0
- package/ipxe/grub/datetime.mod +0 -0
- package/ipxe/grub/disk.mod +0 -0
- package/ipxe/grub/diskfilter.mod +0 -0
- package/ipxe/grub/div.mod +0 -0
- package/ipxe/grub/div_test.mod +0 -0
- package/ipxe/grub/dm_nv.mod +0 -0
- package/ipxe/grub/echo.mod +0 -0
- package/ipxe/grub/efi_gop.mod +0 -0
- package/ipxe/grub/efi_uga.mod +0 -0
- package/ipxe/grub/efifwsetup.mod +0 -0
- package/ipxe/grub/efinet.mod +0 -0
- package/ipxe/grub/ehci.mod +0 -0
- package/ipxe/grub/elf.mod +0 -0
- package/ipxe/grub/eval.mod +0 -0
- package/ipxe/grub/exfat.mod +0 -0
- package/ipxe/grub/exfctest.mod +0 -0
- package/ipxe/grub/ext2.mod +0 -0
- package/ipxe/grub/extcmd.mod +0 -0
- package/ipxe/grub/f2fs.mod +0 -0
- package/ipxe/grub/fat.mod +0 -0
- package/ipxe/grub/fdt.lst +0 -0
- package/ipxe/grub/file.mod +0 -0
- package/ipxe/grub/fixvideo.mod +0 -0
- package/ipxe/grub/font.mod +0 -0
- package/ipxe/grub/fs.lst +37 -0
- package/ipxe/grub/fshelp.mod +0 -0
- package/ipxe/grub/functional_test.mod +0 -0
- package/ipxe/grub/gcry_arcfour.mod +0 -0
- package/ipxe/grub/gcry_blowfish.mod +0 -0
- package/ipxe/grub/gcry_camellia.mod +0 -0
- package/ipxe/grub/gcry_cast5.mod +0 -0
- package/ipxe/grub/gcry_crc.mod +0 -0
- package/ipxe/grub/gcry_des.mod +0 -0
- package/ipxe/grub/gcry_dsa.mod +0 -0
- package/ipxe/grub/gcry_idea.mod +0 -0
- package/ipxe/grub/gcry_md4.mod +0 -0
- package/ipxe/grub/gcry_md5.mod +0 -0
- package/ipxe/grub/gcry_rfc2268.mod +0 -0
- package/ipxe/grub/gcry_rijndael.mod +0 -0
- package/ipxe/grub/gcry_rmd160.mod +0 -0
- package/ipxe/grub/gcry_rsa.mod +0 -0
- package/ipxe/grub/gcry_seed.mod +0 -0
- package/ipxe/grub/gcry_serpent.mod +0 -0
- package/ipxe/grub/gcry_sha1.mod +0 -0
- package/ipxe/grub/gcry_sha256.mod +0 -0
- package/ipxe/grub/gcry_sha512.mod +0 -0
- package/ipxe/grub/gcry_tiger.mod +0 -0
- package/ipxe/grub/gcry_twofish.mod +0 -0
- package/ipxe/grub/gcry_whirlpool.mod +0 -0
- package/ipxe/grub/geli.mod +0 -0
- package/ipxe/grub/gettext.mod +0 -0
- package/ipxe/grub/gfxmenu.mod +0 -0
- package/ipxe/grub/gfxterm.mod +0 -0
- package/ipxe/grub/gfxterm_background.mod +0 -0
- package/ipxe/grub/gfxterm_menu.mod +0 -0
- package/ipxe/grub/gptsync.mod +0 -0
- package/ipxe/grub/gzio.mod +0 -0
- package/ipxe/grub/halt.mod +0 -0
- package/ipxe/grub/hashsum.mod +0 -0
- package/ipxe/grub/hdparm.mod +0 -0
- package/ipxe/grub/hello.mod +0 -0
- package/ipxe/grub/help.mod +0 -0
- package/ipxe/grub/hexdump.mod +0 -0
- package/ipxe/grub/hfs.mod +0 -0
- package/ipxe/grub/hfsplus.mod +0 -0
- package/ipxe/grub/hfspluscomp.mod +0 -0
- package/ipxe/grub/http.mod +0 -0
- package/ipxe/grub/iorw.mod +0 -0
- package/ipxe/grub/iso9660.mod +0 -0
- package/ipxe/grub/jfs.mod +0 -0
- package/ipxe/grub/jpeg.mod +0 -0
- package/ipxe/grub/json.mod +0 -0
- package/ipxe/grub/kernel.img +0 -0
- package/ipxe/grub/keylayouts.mod +0 -0
- package/ipxe/grub/keystatus.mod +0 -0
- package/ipxe/grub/ldm.mod +0 -0
- package/ipxe/grub/legacy_password_test.mod +0 -0
- package/ipxe/grub/legacycfg.mod +0 -0
- package/ipxe/grub/linux.mod +0 -0
- package/ipxe/grub/linux16.mod +0 -0
- package/ipxe/grub/linuxefi.mod +0 -0
- package/ipxe/grub/loadbios.mod +0 -0
- package/ipxe/grub/loadenv.mod +0 -0
- package/ipxe/grub/loopback.mod +0 -0
- package/ipxe/grub/ls.mod +0 -0
- package/ipxe/grub/lsacpi.mod +0 -0
- package/ipxe/grub/lsefi.mod +0 -0
- package/ipxe/grub/lsefimmap.mod +0 -0
- package/ipxe/grub/lsefisystab.mod +0 -0
- package/ipxe/grub/lsmmap.mod +0 -0
- package/ipxe/grub/lspci.mod +0 -0
- package/ipxe/grub/lssal.mod +0 -0
- package/ipxe/grub/luks.mod +0 -0
- package/ipxe/grub/luks2.mod +0 -0
- package/ipxe/grub/lvm.mod +0 -0
- package/ipxe/grub/lzopio.mod +0 -0
- package/ipxe/grub/macbless.mod +0 -0
- package/ipxe/grub/macho.mod +0 -0
- package/ipxe/grub/mdraid09.mod +0 -0
- package/ipxe/grub/mdraid09_be.mod +0 -0
- package/ipxe/grub/mdraid1x.mod +0 -0
- package/ipxe/grub/memdisk.mod +0 -0
- package/ipxe/grub/memrw.mod +0 -0
- package/ipxe/grub/minicmd.mod +0 -0
- package/ipxe/grub/minix.mod +0 -0
- package/ipxe/grub/minix2.mod +0 -0
- package/ipxe/grub/minix2_be.mod +0 -0
- package/ipxe/grub/minix3.mod +0 -0
- package/ipxe/grub/minix3_be.mod +0 -0
- package/ipxe/grub/minix_be.mod +0 -0
- package/ipxe/grub/mmap.mod +0 -0
- package/ipxe/grub/moddep.lst +267 -0
- package/ipxe/grub/modinfo.sh +40 -0
- package/ipxe/grub/monolithic/gcdx64.efi +0 -0
- package/ipxe/grub/monolithic/grubnetx64-installer.efi +0 -0
- package/ipxe/grub/monolithic/grubnetx64.efi +0 -0
- package/ipxe/grub/monolithic/grubx64.efi +0 -0
- package/ipxe/grub/morse.mod +0 -0
- package/ipxe/grub/mpi.mod +0 -0
- package/ipxe/grub/msdospart.mod +0 -0
- package/ipxe/grub/mul_test.mod +0 -0
- package/ipxe/grub/multiboot.mod +0 -0
- package/ipxe/grub/multiboot2.mod +0 -0
- package/ipxe/grub/nativedisk.mod +0 -0
- package/ipxe/grub/net.mod +0 -0
- package/ipxe/grub/newc.mod +0 -0
- package/ipxe/grub/nilfs2.mod +0 -0
- package/ipxe/grub/normal.mod +0 -0
- package/ipxe/grub/ntfs.mod +0 -0
- package/ipxe/grub/ntfscomp.mod +0 -0
- package/ipxe/grub/odc.mod +0 -0
- package/ipxe/grub/offsetio.mod +0 -0
- package/ipxe/grub/ohci.mod +0 -0
- package/ipxe/grub/part_acorn.mod +0 -0
- package/ipxe/grub/part_amiga.mod +0 -0
- package/ipxe/grub/part_apple.mod +0 -0
- package/ipxe/grub/part_bsd.mod +0 -0
- package/ipxe/grub/part_dfly.mod +0 -0
- package/ipxe/grub/part_dvh.mod +0 -0
- package/ipxe/grub/part_gpt.mod +0 -0
- package/ipxe/grub/part_msdos.mod +0 -0
- package/ipxe/grub/part_plan.mod +0 -0
- package/ipxe/grub/part_sun.mod +0 -0
- package/ipxe/grub/part_sunpc.mod +0 -0
- package/ipxe/grub/partmap.lst +11 -0
- package/ipxe/grub/parttool.lst +1 -0
- package/ipxe/grub/parttool.mod +0 -0
- package/ipxe/grub/password.mod +0 -0
- package/ipxe/grub/password_pbkdf2.mod +0 -0
- package/ipxe/grub/pata.mod +0 -0
- package/ipxe/grub/pbkdf2.mod +0 -0
- package/ipxe/grub/pbkdf2_test.mod +0 -0
- package/ipxe/grub/pcidump.mod +0 -0
- package/ipxe/grub/pgp.mod +0 -0
- package/ipxe/grub/play.mod +0 -0
- package/ipxe/grub/png.mod +0 -0
- package/ipxe/grub/priority_queue.mod +0 -0
- package/ipxe/grub/probe.mod +0 -0
- package/ipxe/grub/procfs.mod +0 -0
- package/ipxe/grub/progress.mod +0 -0
- package/ipxe/grub/raid5rec.mod +0 -0
- package/ipxe/grub/raid6rec.mod +0 -0
- package/ipxe/grub/random.mod +0 -0
- package/ipxe/grub/rdmsr.mod +0 -0
- package/ipxe/grub/read.mod +0 -0
- package/ipxe/grub/reboot.mod +0 -0
- package/ipxe/grub/regexp.mod +0 -0
- package/ipxe/grub/reiserfs.mod +0 -0
- package/ipxe/grub/relocator.mod +0 -0
- package/ipxe/grub/romfs.mod +0 -0
- package/ipxe/grub/scsi.mod +0 -0
- package/ipxe/grub/search.mod +0 -0
- package/ipxe/grub/search_fs_file.mod +0 -0
- package/ipxe/grub/search_fs_uuid.mod +0 -0
- package/ipxe/grub/search_label.mod +0 -0
- package/ipxe/grub/serial.mod +0 -0
- package/ipxe/grub/setjmp.mod +0 -0
- package/ipxe/grub/setjmp_test.mod +0 -0
- package/ipxe/grub/setpci.mod +0 -0
- package/ipxe/grub/sfs.mod +0 -0
- package/ipxe/grub/shift_test.mod +0 -0
- package/ipxe/grub/signature_test.mod +0 -0
- package/ipxe/grub/sleep.mod +0 -0
- package/ipxe/grub/sleep_test.mod +0 -0
- package/ipxe/grub/smbios.mod +0 -0
- package/ipxe/grub/spkmodem.mod +0 -0
- package/ipxe/grub/squash4.mod +0 -0
- package/ipxe/grub/strtoull_test.mod +0 -0
- package/ipxe/grub/syslinuxcfg.mod +0 -0
- package/ipxe/grub/tar.mod +0 -0
- package/ipxe/grub/terminal.lst +9 -0
- package/ipxe/grub/terminal.mod +0 -0
- package/ipxe/grub/terminfo.mod +0 -0
- package/ipxe/grub/test.mod +0 -0
- package/ipxe/grub/test_blockarg.mod +0 -0
- package/ipxe/grub/testload.mod +0 -0
- package/ipxe/grub/testspeed.mod +0 -0
- package/ipxe/grub/tftp.mod +0 -0
- package/ipxe/grub/tga.mod +0 -0
- package/ipxe/grub/time.mod +0 -0
- package/ipxe/grub/tpm.mod +0 -0
- package/ipxe/grub/tr.mod +0 -0
- package/ipxe/grub/trig.mod +0 -0
- package/ipxe/grub/true.mod +0 -0
- package/ipxe/grub/udf.mod +0 -0
- package/ipxe/grub/ufs1.mod +0 -0
- package/ipxe/grub/ufs1_be.mod +0 -0
- package/ipxe/grub/ufs2.mod +0 -0
- package/ipxe/grub/uhci.mod +0 -0
- package/ipxe/grub/usb.mod +0 -0
- package/ipxe/grub/usb_keyboard.mod +0 -0
- package/ipxe/grub/usbms.mod +0 -0
- package/ipxe/grub/usbserial_common.mod +0 -0
- package/ipxe/grub/usbserial_ftdi.mod +0 -0
- package/ipxe/grub/usbserial_pl2303.mod +0 -0
- package/ipxe/grub/usbserial_usbdebug.mod +0 -0
- package/ipxe/grub/usbtest.mod +0 -0
- package/ipxe/grub/video.lst +4 -0
- package/ipxe/grub/video.mod +0 -0
- package/ipxe/grub/video_bochs.mod +0 -0
- package/ipxe/grub/video_cirrus.mod +0 -0
- package/ipxe/grub/video_colors.mod +0 -0
- package/ipxe/grub/video_fb.mod +0 -0
- package/ipxe/grub/videoinfo.mod +0 -0
- package/ipxe/grub/videotest.mod +0 -0
- package/ipxe/grub/videotest_checksum.mod +0 -0
- package/ipxe/grub/wrmsr.mod +0 -0
- package/ipxe/grub/xfs.mod +0 -0
- package/ipxe/grub/xnu.mod +0 -0
- package/ipxe/grub/xnu_uuid.mod +0 -0
- package/ipxe/grub/xnu_uuid_test.mod +0 -0
- package/ipxe/grub/xzio.mod +0 -0
- package/ipxe/grub/zfs.mod +0 -0
- package/ipxe/grub/zfscrypt.mod +0 -0
- package/ipxe/grub/zfsinfo.mod +0 -0
- package/ipxe/grub/zstd.mod +0 -0
- package/ipxe/grubnetx64.efi.signed +0 -0
- package/ipxe/ipxe.pxe +0 -0
- package/ipxe/undionly.kpxe +0 -0
- package/mkinitcpio/arch/live.conf +3 -2
- package/mkinitcpio/manjaro/live.conf +1 -1
- package/mkinitfs/README.md +10 -49
- package/mkinitfs/live.conf +2 -0
- package/package.json +27 -24
- package/pods/ci/minimal/opensuse-container2host.sh +1 -1
- package/scripts/99clean +42 -0
- package/conf/distros/aldos/calamares/modules/bootloader.yml +0 -85
- package/conf/distros/aldos/calamares/modules/displaymanager.yml +0 -22
- package/conf/distros/aldos/calamares/modules/finished.yml +0 -5
- package/conf/distros/aldos/calamares/modules/fstab.yml +0 -12
- package/conf/distros/aldos/calamares/modules/locale.yml +0 -97
- package/conf/distros/aldos/calamares/modules/luksopenswaphookcfg.yml +0 -5
- package/conf/distros/aldos/calamares/modules/machineid.yml +0 -17
- package/conf/distros/aldos/calamares/modules/mount.yml +0 -56
- package/conf/distros/aldos/calamares/modules/packages.yml +0 -6
- package/conf/distros/aldos/calamares/modules/partition.yml +0 -242
- package/conf/distros/aldos/calamares/modules/removeuser.yml +0 -15
- package/conf/distros/aldos/calamares/modules/unpackfs.yml +0 -6
- package/conf/distros/aldos/calamares/modules/users.yml +0 -19
- package/conf/distros/aldos/calamares/modules/welcome.yml +0 -19
- package/conf/distros/aldos/calamares/settings.yml +0 -124
- package/conf/distros/fedora/calamares/modules/bootloader.conf +0 -85
- package/conf/distros/opensuse/calamares/modules/bootloader.conf +0 -86
- package/conf/distros/opensuse/calamares/modules/locale.yml +0 -98
- package/conf/distros/opensuse/calamares/modules/luksopenswaphookcfg.yml +0 -5
- package/conf/distros/opensuse/calamares/modules/machineid.yml +0 -17
- package/conf/distros/rolling/calamares/modules/shellprocess_removelink.yml +0 -8
- package/dist/index_old.d.ts +0 -8
- package/dist/index_old.js +0 -8
- package/dist/penguins-eggs_10.1.1-0_amd64.deb.sha256 +0 -1
- package/dracut/sidecar.sh +0 -19
- package/ipxe/ipxe.efi +0 -0
- package/mkinitfs/initramfs-init.in +0 -1051
- package/mkinitfs/sidecar.sh +0 -52
- /package/dist/classes/ovary.d/{xorriso-commend.d.ts → xorriso-command.d.ts} +0 -0
- /package/dist/classes/ovary.d/{xorriso-commend.js → xorriso-command.js} +0 -0
|
@@ -1,12 +1,37 @@
|
|
|
1
|
-
#
|
|
1
|
+
# SPDX-FileCopyrightText: no
|
|
2
|
+
# SPDX-License-Identifier: CC0-1.0
|
|
3
|
+
#
|
|
4
|
+
# Creates /etc/fstab and /etc/crypttab in the target system.
|
|
5
|
+
# Also creates mount points for all the filesystems.
|
|
6
|
+
#
|
|
7
|
+
# When creating fstab entries for a filesystem, this module
|
|
8
|
+
# uses the options previously defined in the mount module
|
|
2
9
|
---
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
10
|
+
|
|
11
|
+
# Additional options added to each line in /etc/crypttab
|
|
12
|
+
crypttabOptions: luks
|
|
13
|
+
# For Debian and Debian-based distributions, change the above line to:
|
|
14
|
+
# crypttabOptions: luks,keyscript=/bin/cat
|
|
15
|
+
|
|
16
|
+
# Options for handling /tmp in /etc/fstab
|
|
17
|
+
# Currently default (required) and ssd are supported
|
|
18
|
+
# The corresponding string can contain the following variables:
|
|
19
|
+
# tmpfs: true or tmpfs: false to either mount /tmp as tmpfs or not
|
|
20
|
+
# options: "<mount options>"
|
|
21
|
+
#
|
|
22
|
+
# Example:
|
|
23
|
+
#tmpOptions:
|
|
24
|
+
# default:
|
|
25
|
+
# tmpfs: false
|
|
26
|
+
# options: ""
|
|
27
|
+
# ssd:
|
|
28
|
+
# tmpfs: true
|
|
29
|
+
# options: "defaults,noatime,mode=1777"
|
|
30
|
+
#
|
|
31
|
+
tmpOptions:
|
|
32
|
+
default:
|
|
33
|
+
tmpfs: false
|
|
34
|
+
options: ""
|
|
35
|
+
ssd:
|
|
36
|
+
tmpfs: true
|
|
37
|
+
options: "defaults,noatime,mode=1777"
|
|
@@ -1,56 +1,118 @@
|
|
|
1
|
-
#
|
|
1
|
+
# SPDX-FileCopyrightText: no
|
|
2
|
+
# SPDX-License-Identifier: CC0-1.0
|
|
3
|
+
#
|
|
2
4
|
# Mount filesystems in the target (generally, before treating the
|
|
3
5
|
# target as a usable chroot / "live" system). Filesystems are
|
|
4
6
|
# automatically mounted from the partitioning module. Filesystems
|
|
5
7
|
# listed here are **extra**. The filesystems listed in *extraMounts*
|
|
6
|
-
# are mounted in all target systems.
|
|
7
|
-
# *extraMountsEfi* are mounted in the target system **only** if
|
|
8
|
-
# the host machine uses UEFI.
|
|
8
|
+
# are mounted in all target systems.
|
|
9
9
|
---
|
|
10
10
|
# Extra filesystems to mount. The key's value is a list of entries; each
|
|
11
|
-
# entry has
|
|
11
|
+
# entry has five keys:
|
|
12
12
|
# - device The device node to mount
|
|
13
|
-
# - fs
|
|
13
|
+
# - fs (optional) The filesystem type to use
|
|
14
14
|
# - mountPoint Where to mount the filesystem
|
|
15
|
-
# - options (optional)
|
|
15
|
+
# - options (optional) An array of options to pass to mount
|
|
16
|
+
# - efi (optional) A boolean that when true is only mounted for UEFI installs
|
|
17
|
+
#
|
|
18
|
+
# The device is not mounted if the mountPoint is unset or if the fs is
|
|
19
|
+
# set to unformatted.
|
|
16
20
|
#
|
|
17
21
|
extraMounts:
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
22
|
+
- device: proc
|
|
23
|
+
fs: proc
|
|
24
|
+
mountPoint: /proc
|
|
25
|
+
- device: sys
|
|
26
|
+
fs: sysfs
|
|
27
|
+
mountPoint: /sys
|
|
28
|
+
- device: /dev
|
|
29
|
+
mountPoint: /dev
|
|
30
|
+
options: [ bind ]
|
|
31
|
+
- device: tmpfs
|
|
32
|
+
fs: tmpfs
|
|
33
|
+
mountPoint: /run
|
|
34
|
+
- device: /run/udev
|
|
35
|
+
mountPoint: /run/udev
|
|
36
|
+
options: [ bind ]
|
|
37
|
+
- device: efivarfs
|
|
38
|
+
fs: efivarfs
|
|
39
|
+
mountPoint: /sys/firmware/efi/efivars
|
|
40
|
+
efi: true
|
|
33
41
|
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
#
|
|
42
|
+
# Btrfs subvolumes to create if root filesystem is on btrfs volume.
|
|
43
|
+
# If *mountpoint* is mounted already to another partition, it is ignored.
|
|
44
|
+
# Separate subvolume for swapfile is handled separately and automatically.
|
|
45
|
+
#
|
|
46
|
+
# It is possible to prevent subvolume creation -- this is likely only relevant
|
|
47
|
+
# for the root (/) subvolume -- by giving an empty string as a subvolume
|
|
48
|
+
# name. In this case no subvolume will be created.
|
|
49
|
+
#
|
|
40
50
|
btrfsSubvolumes:
|
|
41
51
|
- mountPoint: /
|
|
42
52
|
subvolume: /@
|
|
43
|
-
- mountPoint: /.snapshots
|
|
44
|
-
subvolume: /@snapshots
|
|
45
53
|
- mountPoint: /home
|
|
46
54
|
subvolume: /@home
|
|
47
|
-
- mountPoint: /
|
|
48
|
-
subvolume: /@
|
|
55
|
+
- mountPoint: /var/cache
|
|
56
|
+
subvolume: /@cache
|
|
49
57
|
- mountPoint: /var/log
|
|
50
|
-
subvolume: /@
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
58
|
+
subvolume: /@log
|
|
59
|
+
|
|
60
|
+
# The name of the btrfs subvolume holding the swapfile. This only used when
|
|
61
|
+
# a swapfile is selected and the root filesystem is btrfs
|
|
62
|
+
#
|
|
63
|
+
btrfsSwapSubvol: /@swap
|
|
64
|
+
|
|
65
|
+
# The mount options used to mount each filesystem.
|
|
66
|
+
#
|
|
67
|
+
# filesystem contains the name of the filesystem or on of three special
|
|
68
|
+
# values, "default", efi" and "btrfs_swap". The logic is applied in this manner:
|
|
69
|
+
# - If the partition is the EFI partition, the "efi" entry will be used
|
|
70
|
+
# - If the fs is btrfs and the subvolume is for the swapfile,
|
|
71
|
+
# the "btrfs_swap" entry is used
|
|
72
|
+
# - If the filesystem is an exact match for filesystem, that entry is used
|
|
73
|
+
# - If no match is found in the above, the default entry is used
|
|
74
|
+
# - If there is no match and no default entry, "defaults" is used
|
|
75
|
+
# - If the mountOptions key is not present, "defaults" is used
|
|
76
|
+
#
|
|
77
|
+
# Each filesystem entry contains 3 keys, all of which are optional
|
|
78
|
+
# options - An array of mount options that is used on all disk types
|
|
79
|
+
# ssdOptions - An array of mount options combined with options for ssds
|
|
80
|
+
# hddOptions - An array of mount options combined with options for hdds
|
|
81
|
+
# If combining these options results in an empty array, "defaults" is used
|
|
82
|
+
#
|
|
83
|
+
# Example 1
|
|
84
|
+
# In this example, there are specific options for ext4 and btrfs filesystems,
|
|
85
|
+
# the EFI partition and the subvolume holding the btrfs swapfile. All other
|
|
86
|
+
# filesystems use the default entry. For the btrfs filesystem, there are
|
|
87
|
+
# additional options specific to hdds and ssds
|
|
88
|
+
#
|
|
89
|
+
# mountOptions:
|
|
90
|
+
# - filesystem: default
|
|
91
|
+
# options: [ defaults ]
|
|
92
|
+
# - filesystem: efi
|
|
93
|
+
# options: [ defaults, umask=0077 ]
|
|
94
|
+
# - filesystem: ext4
|
|
95
|
+
# options: [ defaults ]
|
|
96
|
+
# - filesystem: btrfs
|
|
97
|
+
# options: [ defaults, compress=zstd:1 ]
|
|
98
|
+
# ssdOptions: [ discard=async ]
|
|
99
|
+
# hddOptions: [ autodefrag ]
|
|
100
|
+
# - filesystem: btrfs_swap
|
|
101
|
+
# options: [ defaults, noatime ]
|
|
102
|
+
#
|
|
103
|
+
# Example 2
|
|
104
|
+
# In this example there is a single default used by all filesystems
|
|
105
|
+
#
|
|
106
|
+
# mountOptions:
|
|
107
|
+
# - filesystem: default
|
|
108
|
+
# options: [ defaults ]
|
|
109
|
+
#
|
|
110
|
+
mountOptions:
|
|
111
|
+
- filesystem: default
|
|
112
|
+
options: [ defaults ]
|
|
113
|
+
- filesystem: efi
|
|
114
|
+
options: [ defaults, umask=0077 ]
|
|
115
|
+
- filesystem: btrfs
|
|
116
|
+
options: [ defaults, compress=zstd:1 ]
|
|
117
|
+
- filesystem: btrfs_swap
|
|
118
|
+
options: [ defaults, noatime ]
|
|
@@ -1,14 +1,50 @@
|
|
|
1
|
-
#
|
|
2
|
-
#
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
#
|
|
6
|
-
#
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
#
|
|
10
|
-
#
|
|
11
|
-
#
|
|
1
|
+
# SPDX-FileCopyrightText: no
|
|
2
|
+
# SPDX-License-Identifier: CC0-1.0
|
|
3
|
+
#
|
|
4
|
+
|
|
5
|
+
# Options for EFI system partition.
|
|
6
|
+
#
|
|
7
|
+
# - *mountPoint*
|
|
8
|
+
# This setting specifies the mount point of the EFI system partition. Some
|
|
9
|
+
# distributions (Fedora, Debian, Manjaro, etc.) use /boot/efi, others (KaOS,
|
|
10
|
+
# etc.) use just /boot.
|
|
11
|
+
#
|
|
12
|
+
# Defaults to "/boot/efi", may be empty (but weird effects ensue)
|
|
13
|
+
# - *recommendedSize*
|
|
14
|
+
# This optional setting specifies the size of the EFI system partition.
|
|
15
|
+
# If nothing is specified, the default size of 300MiB will be used.
|
|
16
|
+
# When writing quantities here, M is treated as MiB, and if you really
|
|
17
|
+
# want one-million (10^6) bytes, use MB.
|
|
18
|
+
# - *minimumSize*
|
|
19
|
+
# This optional setting specifies the absolute minimum size of the EFI
|
|
20
|
+
# system partition. If nothing is specified, the *recommendedSize*
|
|
21
|
+
# is used instead.
|
|
22
|
+
# - *label*
|
|
23
|
+
# This optional setting specifies the name of the EFI system partition (see
|
|
24
|
+
# PARTLABEL; gpt only; requires KPMCore >= 4.2.0).
|
|
25
|
+
# If nothing is specified, the partition name is left unset.
|
|
26
|
+
#
|
|
27
|
+
# Going below the *recommended* size is allowed, but the user will
|
|
28
|
+
# get a warning that it might not work. Going below the *minimum*
|
|
29
|
+
# size is not allowed and the user will be told it will not work.
|
|
30
|
+
#
|
|
31
|
+
# Both quantities must be at least 32MiB, this is enforced by the EFI
|
|
32
|
+
# spec. If minimum is not specified, it defaults to the recommended
|
|
33
|
+
# size. Distros that allow more user latitude can set the minimum lower.
|
|
34
|
+
efi:
|
|
35
|
+
mountPoint: "/boot/efi"
|
|
36
|
+
recommendedSize: 300MiB
|
|
37
|
+
minimumSize: 32MiB
|
|
38
|
+
label: "EFI"
|
|
39
|
+
|
|
40
|
+
# Deprecated alias of efi.mountPoint
|
|
41
|
+
# efiSystemPartition: "/boot/efi"
|
|
42
|
+
|
|
43
|
+
# Deprecated alias of efi.recommendedSize
|
|
44
|
+
# efiSystemPartitionSize: 300MiB
|
|
45
|
+
|
|
46
|
+
# Deprecated alias of efi.label
|
|
47
|
+
# efiSystemPartitionName: EFI
|
|
12
48
|
|
|
13
49
|
# In autogenerated partitioning, allow the user to select a swap size?
|
|
14
50
|
# If there is exactly one choice, no UI is presented, and the user
|
|
@@ -51,6 +87,30 @@ userSwapChoices:
|
|
|
51
87
|
# ensureSuspendToDisk: true
|
|
52
88
|
# neverCreateSwap: false
|
|
53
89
|
|
|
90
|
+
# This setting specifies the LUKS generation (i.e LUKS1, LUKS2) used internally by
|
|
91
|
+
# cryptsetup when creating an encrypted partition.
|
|
92
|
+
#
|
|
93
|
+
# This option is set to luks1 by default, as grub doesn't support LUKS2 + Argon2id
|
|
94
|
+
# currently. On the other hand grub does support LUKS2 with PBKDF2 and could therefore be
|
|
95
|
+
# also set to luks2. Also there are some patches for grub and Argon2.
|
|
96
|
+
# See: https://aur.archlinux.org/packages/grub-improved-luks2-git
|
|
97
|
+
#
|
|
98
|
+
# Choices: luks1, luks2 (in addition, "luks" means "luks1")
|
|
99
|
+
#
|
|
100
|
+
# The default is luks1
|
|
101
|
+
#
|
|
102
|
+
luksGeneration: luks1
|
|
103
|
+
|
|
104
|
+
# This setting determines if encryption should be allowed when using zfs. This
|
|
105
|
+
# setting has no effect unless zfs support is provided.
|
|
106
|
+
#
|
|
107
|
+
# This setting is to handle the fact that some bootloaders(such as grub) do not
|
|
108
|
+
# support zfs encryption.
|
|
109
|
+
#
|
|
110
|
+
# The default is true
|
|
111
|
+
#
|
|
112
|
+
# allowZfsEncryption: true
|
|
113
|
+
|
|
54
114
|
# Correctly draw nested (e.g. logical) partitions as such.
|
|
55
115
|
drawNestedPartitions: false
|
|
56
116
|
|
|
@@ -67,6 +127,15 @@ alwaysShowPartitionLabels: true
|
|
|
67
127
|
# If nothing is specified, manual partitioning is enabled.
|
|
68
128
|
#allowManualPartitioning: true
|
|
69
129
|
|
|
130
|
+
# Show not encrypted boot partition warning.
|
|
131
|
+
#
|
|
132
|
+
# When set to false, this option does not show the
|
|
133
|
+
# "Boot partition not encrypted" warning when encrypting the
|
|
134
|
+
# root partition but not /boot partition.
|
|
135
|
+
#
|
|
136
|
+
# If nothing is specified, the warning is shown.
|
|
137
|
+
#showNotEncryptedBootMessage: true
|
|
138
|
+
|
|
70
139
|
# Initial selection on the Choice page
|
|
71
140
|
#
|
|
72
141
|
# There are four radio buttons (in principle: erase, replace, alongside, manual),
|
|
@@ -87,6 +156,13 @@ initialPartitioningChoice: none
|
|
|
87
156
|
# one of the items from the options.
|
|
88
157
|
initialSwapChoice: none
|
|
89
158
|
|
|
159
|
+
# armInstall
|
|
160
|
+
#
|
|
161
|
+
# Leaves 16MB empty at the start of a drive when partitioning
|
|
162
|
+
# where usually the u-boot loader goes
|
|
163
|
+
#
|
|
164
|
+
# armInstall: false
|
|
165
|
+
|
|
90
166
|
# Default partition table type, used when a "erase" disk is made.
|
|
91
167
|
#
|
|
92
168
|
# When erasing a disk, a new partition table is created on disk.
|
|
@@ -94,19 +170,28 @@ initialSwapChoice: none
|
|
|
94
170
|
# manual partitioning, this partition table exists already on disk
|
|
95
171
|
# and it is left unmodified.
|
|
96
172
|
#
|
|
97
|
-
#
|
|
173
|
+
# Possible values: gpt, msdos (or other names defined by KPMcore).
|
|
174
|
+
# Names are case-sensitive.
|
|
175
|
+
#
|
|
98
176
|
# If nothing is specified, Calamares defaults to "gpt" if system is
|
|
99
|
-
# efi or "msdos".
|
|
177
|
+
# efi or "msdos" otherwise.
|
|
100
178
|
#
|
|
101
|
-
# Names are case-sensitive and defined by KPMCore.
|
|
102
179
|
# defaultPartitionTableType: msdos
|
|
103
180
|
|
|
181
|
+
# Specify whether to create a partition table layout suitable for a hybrid
|
|
182
|
+
# (BIOS + EFI) bootloader installation. This will prepend both bios-boot and
|
|
183
|
+
# EFI system partitions to the partition layout, regardless of whether the
|
|
184
|
+
# booted system uses BIOS or EFI firmware. Defaults to false.
|
|
185
|
+
#
|
|
186
|
+
# createHybridBootloaderLayout: false
|
|
187
|
+
|
|
104
188
|
# Requirement for partition table type
|
|
105
189
|
#
|
|
106
190
|
# Restrict the installation on disks that match the type of partition
|
|
107
191
|
# tables that are specified.
|
|
108
192
|
#
|
|
109
|
-
# Possible values: msdos, gpt
|
|
193
|
+
# Possible values: msdos, gpt (or other names defined by KPMcore).
|
|
194
|
+
# Names are case-sensitive.
|
|
110
195
|
#
|
|
111
196
|
# If nothing is specified, Calamares defaults to both "msdos" and "gpt".
|
|
112
197
|
#
|
|
@@ -117,8 +202,8 @@ initialSwapChoice: none
|
|
|
117
202
|
|
|
118
203
|
# Default filesystem type, used when a "new" partition is made.
|
|
119
204
|
#
|
|
120
|
-
# When replacing a partition, the
|
|
121
|
-
#
|
|
205
|
+
# When replacing a partition, the new filesystem type will be from the
|
|
206
|
+
# defaultFileSystemType value. In other cases, e.g. Erase and Alongside,
|
|
122
207
|
# as well as when using manual partitioning and creating a new
|
|
123
208
|
# partition, this filesystem type is pre-selected. Note that
|
|
124
209
|
# editing a partition in manual-creation mode will not automatically
|
|
@@ -143,7 +228,57 @@ defaultFileSystemType: "ext4"
|
|
|
143
228
|
#
|
|
144
229
|
# If not specified at all, uses *defaultFileSystemType* without a
|
|
145
230
|
# warning (this matches traditional no-choice-available behavior best).
|
|
146
|
-
availableFileSystemTypes: ["ext4"]
|
|
231
|
+
# availableFileSystemTypes: ["ext4","f2fs"]
|
|
232
|
+
|
|
233
|
+
# Per-directory filesystem restrictions.
|
|
234
|
+
#
|
|
235
|
+
# This optional setting specifies what filesystems the user can and cannot use
|
|
236
|
+
# for various directories and mountpoints when using manual partitioning.
|
|
237
|
+
#
|
|
238
|
+
# If nothing is specified, the only restriction enforced by default is that
|
|
239
|
+
# the EFI system partition must use the fat32 filesystem.
|
|
240
|
+
#
|
|
241
|
+
# Otherwise, the filesystem restrictions are defined as follow:
|
|
242
|
+
#
|
|
243
|
+
# directoryFilesystemRestrictions:
|
|
244
|
+
# - directory: "any"
|
|
245
|
+
# allowedFilesystemTypes: ["all"]
|
|
246
|
+
# - directory: "/"
|
|
247
|
+
# allowedFilesystemTypes: ["ext4","xfs","btrfs","jfs","f2fs"]
|
|
248
|
+
# - mountpoint: "efi"
|
|
249
|
+
# allowedFilesystemTypes: ["fat32"]
|
|
250
|
+
# onlyWhenMountpoint: true
|
|
251
|
+
#
|
|
252
|
+
# There can be any number of mountpoints listed, each entry having the
|
|
253
|
+
# following attributes:
|
|
254
|
+
# - mountpoint: mountpoint's full path
|
|
255
|
+
# or
|
|
256
|
+
# "any" to specify a global whitelist that applies to all
|
|
257
|
+
# mountpoints
|
|
258
|
+
# or
|
|
259
|
+
# "efi" to specify a whitelist specific to the EFI system
|
|
260
|
+
# partition, wherever that partition is located
|
|
261
|
+
# - allowedFilesystemTypes: the list of all filesystems valid for this
|
|
262
|
+
# mountpoint. If the list contains exactly one
|
|
263
|
+
# element, and that element is the special value
|
|
264
|
+
# "any", all filesystem types recognized by
|
|
265
|
+
# Calamares will be allowed.
|
|
266
|
+
# - onlyWhenMountpoint: Whether the restriction should apply only when the
|
|
267
|
+
# specified directory is a mountpoint. When set to
|
|
268
|
+
# true, Calamares will only enforce the listed
|
|
269
|
+
# restrictions when the user makes a separate partition
|
|
270
|
+
# for this directory and assigns the mountpoint
|
|
271
|
+
# accordingly. When set to false, Calamares will
|
|
272
|
+
# ensure this directory uses the specified filesystem
|
|
273
|
+
# even if the directory is part of a filesystem on a
|
|
274
|
+
# different mountpoint. Defaults to false.
|
|
275
|
+
|
|
276
|
+
# The ClearMounts job unmounts / unmaps things before partitioning.
|
|
277
|
+
# Some special entries under /dev/mapper are excepted from this process.
|
|
278
|
+
# The example lists the three hard-coded exceptions which always apply
|
|
279
|
+
# (they don't need to be listed here). Add other names or wildcards (with
|
|
280
|
+
# a trailing '*') to this list if the live-ISO has additional mounts.
|
|
281
|
+
essentialMounts: [ "live-*", "control", "ventoy" ]
|
|
147
282
|
|
|
148
283
|
# Show/hide LUKS related functionality in automated partitioning modes.
|
|
149
284
|
# Disable this if you choose not to deploy early unlocking support in GRUB2
|
|
@@ -164,6 +299,18 @@ availableFileSystemTypes: ["ext4"]
|
|
|
164
299
|
# If nothing is specified, LUKS is enabled in automated modes.
|
|
165
300
|
#enableLuksAutomatedPartitioning: true
|
|
166
301
|
|
|
302
|
+
# When enableLuksAutomatedPartitioning is true, this option will pre-check
|
|
303
|
+
# encryption checkbox. This option is only usefull to help people to not forget
|
|
304
|
+
# to cypher their disk when installing in enterprise (for example).
|
|
305
|
+
#preCheckEncryption: false
|
|
306
|
+
|
|
307
|
+
# LVM support
|
|
308
|
+
#
|
|
309
|
+
# There is only one sub-key available, *enable* (defaults to true)
|
|
310
|
+
# which can be used to show (default) or hide the LVM buttons in the partitioning module.
|
|
311
|
+
lvm:
|
|
312
|
+
enable: true
|
|
313
|
+
|
|
167
314
|
# Partition layout.
|
|
168
315
|
#
|
|
169
316
|
# This optional setting specifies a custom partition layout.
|
|
@@ -172,9 +319,9 @@ availableFileSystemTypes: ["ext4"]
|
|
|
172
319
|
# for root that uses 100% of the space and uses the filesystem defined by
|
|
173
320
|
# defaultFileSystemType.
|
|
174
321
|
#
|
|
175
|
-
# Note: the EFI system partition is
|
|
176
|
-
# needed; the swap partition is appended to the layout if enabled (
|
|
177
|
-
# suspend).
|
|
322
|
+
# Note: the EFI system partition is prepended automatically to the layout if
|
|
323
|
+
# needed; the swap partition is appended to the layout if enabled (selections
|
|
324
|
+
# "small" or "suspend" in *userSwapChoices*).
|
|
178
325
|
#
|
|
179
326
|
# Otherwise, the partition layout is defined as follow:
|
|
180
327
|
#
|
|
@@ -182,14 +329,16 @@ availableFileSystemTypes: ["ext4"]
|
|
|
182
329
|
# - name: "rootfs"
|
|
183
330
|
# type: "4f68bce3-e8cd-4db1-96e7-fbcaf984b709"
|
|
184
331
|
# filesystem: "ext4"
|
|
332
|
+
# noEncrypt: false
|
|
185
333
|
# mountPoint: "/"
|
|
186
334
|
# size: 20%
|
|
187
335
|
# minSize: 500M
|
|
188
336
|
# maxSize: 10G
|
|
189
337
|
# attributes: 0xffff000000000003
|
|
190
338
|
# - name: "home"
|
|
191
|
-
# type
|
|
339
|
+
# type: "933ac7e1-2eb4-4f13-b844-0e14e2aef915"
|
|
192
340
|
# filesystem: "ext4"
|
|
341
|
+
# noEncrypt: false
|
|
193
342
|
# mountPoint: "/home"
|
|
194
343
|
# size: 3G
|
|
195
344
|
# minSize: 1.5G
|
|
@@ -217,6 +366,7 @@ availableFileSystemTypes: ["ext4"]
|
|
|
217
366
|
# - if "unknown" (or an unknown FS name, like "elephant") then the
|
|
218
367
|
# default filesystem type, or the user's choice, will be applied instead
|
|
219
368
|
# of "unknown" (e.g. the user might pick ext4, or xfs).
|
|
369
|
+
# - noEncrypt: whether this partition is exempt from encryption if enabled (optional parameter; default is false)
|
|
220
370
|
# - mountPoint: partition mount point (optional parameter; not mounted if unset)
|
|
221
371
|
# - size: partition size in bytes (append 'K', 'M' or 'G' for KiB, MiB or GiB)
|
|
222
372
|
# or
|
|
@@ -239,4 +389,4 @@ availableFileSystemTypes: ["ext4"]
|
|
|
239
389
|
# BIG FAT WARNING: except for OEM-phase-0 use, you should be using
|
|
240
390
|
# the welcome module, **and** configure this value in
|
|
241
391
|
# `welcome.conf`, not here.
|
|
242
|
-
requiredStorage:
|
|
392
|
+
# requiredStorage: 3.5
|
|
@@ -2,18 +2,16 @@
|
|
|
2
2
|
---
|
|
3
3
|
userGroup: users
|
|
4
4
|
defaultGroups:
|
|
5
|
+
- audio
|
|
5
6
|
- cdrom
|
|
7
|
+
- dialout
|
|
6
8
|
- floppy
|
|
7
|
-
-
|
|
8
|
-
- audio
|
|
9
|
-
- dip
|
|
9
|
+
- users
|
|
10
10
|
- video
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
# lpadmin
|
|
14
|
-
# scanner
|
|
15
|
-
# bluetooth
|
|
11
|
+
# netdev
|
|
12
|
+
# plugdev
|
|
16
13
|
autologinGroup: autologin
|
|
17
14
|
sudoersGroup: sudo
|
|
18
15
|
setRootPassword: true
|
|
19
|
-
doReusePassword: false
|
|
16
|
+
doReusePassword: false
|
|
17
|
+
|
|
@@ -1,25 +1,39 @@
|
|
|
1
|
-
#
|
|
1
|
+
# SPDX-FileCopyrightText: no
|
|
2
|
+
# SPDX-License-Identifier: CC0-1.0
|
|
3
|
+
#
|
|
2
4
|
# Bootloader configuration. The bootloader is installed to allow
|
|
3
5
|
# the system to start (and pick one of the installed operating
|
|
4
6
|
# systems to run).
|
|
7
|
+
#
|
|
8
|
+
# Take note that Debian-derivatives that use unmodified GRUB EFI packages
|
|
9
|
+
# should specifically set *efiBootloaderId* to "debian" because that is
|
|
10
|
+
# hard-coded in `grubx64.efi`.
|
|
5
11
|
---
|
|
12
|
+
# A variable from global storage which overrides the value of efiBootLoader
|
|
13
|
+
#efiBootLoaderVar: "packagechooser_bootloader"
|
|
14
|
+
|
|
6
15
|
# Define which bootloader you want to use for EFI installations
|
|
7
|
-
# Possible options are 'grub', 'sb-shim' and 'systemd-boot'.
|
|
16
|
+
# Possible options are 'grub', 'sb-shim', 'refind` and 'systemd-boot'.
|
|
8
17
|
efiBootLoader: "grub"
|
|
9
18
|
|
|
10
|
-
# systemd-boot configuration files settings
|
|
11
|
-
# and amount of time before default selection boots
|
|
12
|
-
kernel: "/vmlinuz-linux"
|
|
13
|
-
img: "/initramfs-linux.img"
|
|
14
|
-
fallback: "/initramfs-linux-fallback.img"
|
|
15
|
-
timeout: "10"
|
|
19
|
+
# systemd-boot configuration files settings
|
|
16
20
|
|
|
17
|
-
#
|
|
18
|
-
#
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
#
|
|
21
|
+
# kernelSearchPath is the path relative to the root of the install to search for kernels
|
|
22
|
+
# A kernel is identified by finding files which match regular expression, kernelPattern
|
|
23
|
+
kernelSearchPath: "/usr/lib/modules"
|
|
24
|
+
kernelPattern: "^vmlinuz.*"
|
|
25
|
+
|
|
26
|
+
# loaderEntries is an array of options to add to loader.conf for systemd-boot
|
|
27
|
+
# please note that the "default" option is added programmatically
|
|
28
|
+
loaderEntries:
|
|
29
|
+
- "timeout 5"
|
|
30
|
+
- "console-mode keep"
|
|
31
|
+
|
|
32
|
+
# systemd-boot and refind support custom kernel params
|
|
33
|
+
kernelParams: [ "quiet" ]
|
|
34
|
+
|
|
35
|
+
# A list of kernel names that refind should accept as kernels
|
|
36
|
+
#refindKernelList: [ "linux","linux-lts","linux-zen","linux-hardened" ]
|
|
23
37
|
|
|
24
38
|
# GRUB 2 binary names and boot directory
|
|
25
39
|
# Some distributions (e.g. Fedora) use grub2-* (resp. /boot/grub2/) names.
|
|
@@ -29,7 +43,7 @@ timeout: "10"
|
|
|
29
43
|
#
|
|
30
44
|
grubInstall: "grub2-install"
|
|
31
45
|
grubMkconfig: "grub2-mkconfig"
|
|
32
|
-
grubCfg: "/boot/
|
|
46
|
+
grubCfg: "/boot/grub2/grub.cfg"
|
|
33
47
|
grubProbe: "grub2-probe"
|
|
34
48
|
efiBootMgr: "efibootmgr"
|
|
35
49
|
|
|
@@ -44,8 +58,21 @@ efiBootMgr: "efibootmgr"
|
|
|
44
58
|
# setting the option here, keep in mind that the name is sanitized
|
|
45
59
|
# (problematic characters, see above, are replaced).
|
|
46
60
|
#
|
|
61
|
+
# There are some special words possible at the end of *efiBootloaderId*:
|
|
62
|
+
# ${SERIAL} can be used to obtain a uniquely-numbered suffix
|
|
63
|
+
# that is added to the Id (yielding, e.g., `dirname1` or `dirname72`)
|
|
64
|
+
# ${RANDOM} can be used to obtain a unique 4-digit hex suffix
|
|
65
|
+
# ${PHRASE} can be used to obtain a unique 1-to-3-word suffix
|
|
66
|
+
# from a dictionary of space-themed words
|
|
67
|
+
# These words must be at the **end** of the *efiBootloaderId* value.
|
|
68
|
+
# There must also be at most one of them. If there is none, no suffix-
|
|
69
|
+
# processing is done and the *efiBootloaderId* is used unchanged.
|
|
70
|
+
#
|
|
71
|
+
# NOTE: Debian derivatives that use the unmodified Debian GRUB EFI
|
|
72
|
+
# packages may need to set this to "debian" because that is
|
|
73
|
+
# hard-coded in `grubx64.efi`.
|
|
74
|
+
#
|
|
47
75
|
# efiBootloaderId: "dirname"
|
|
48
|
-
efiBootloaderId: "fedora"
|
|
49
76
|
|
|
50
77
|
# Optionally install a copy of the GRUB EFI bootloader as the EFI
|
|
51
78
|
# fallback loader (either bootia32.efi or bootx64.efi depending on
|
|
@@ -53,5 +80,7 @@ efiBootloaderId: "fedora"
|
|
|
53
80
|
# seems to be the only one). If you set this to false, take care
|
|
54
81
|
# to add another module to optionally install the fallback on those
|
|
55
82
|
# boards that need it.
|
|
56
|
-
# NOTE: eggs unti calamres 3.2 was installEFIFallback: false
|
|
57
83
|
installEFIFallback: true
|
|
84
|
+
|
|
85
|
+
# Optionally install both BIOS and UEFI GRUB bootloaders.
|
|
86
|
+
installHybridGRUB: false
|
|
@@ -1,11 +1,15 @@
|
|
|
1
|
-
# OpenSuSE
|
|
2
|
-
# Configure one or more display managers (e.g. SDDM)
|
|
3
|
-
# with a "best effort" approach.
|
|
4
1
|
---
|
|
5
2
|
#The DM module attempts to set up all the DMs found in this list, in that precise order.
|
|
6
3
|
#It also sets up autologin, if the feature is enabled in globalstorage.
|
|
7
4
|
#The displaymanagers list can also be set in globalstorage, and in that case it overrides anything set up here.
|
|
8
|
-
displaymanagers:
|
|
5
|
+
displaymanagers:
|
|
6
|
+
- slim
|
|
7
|
+
- sddm
|
|
8
|
+
- lightdm
|
|
9
|
+
- gdm
|
|
10
|
+
- mdm
|
|
11
|
+
- lxdm
|
|
12
|
+
- kdm
|
|
9
13
|
|
|
10
14
|
#Enable the following settings to force a desktop environment in your displaymanager configuration file:
|
|
11
15
|
#defaultDesktopEnvironment:
|
|
@@ -19,4 +23,4 @@ basicSetup: false
|
|
|
19
23
|
|
|
20
24
|
#If true, setup autologin for openSUSE. This only makes sense on openSUSE
|
|
21
25
|
#derivatives or other systems where /etc/sysconfig/displaymanager exists.
|
|
22
|
-
sysconfigSetup:
|
|
26
|
+
sysconfigSetup: true
|