penguins-eggs 25.11.12 → 25.11.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.oclif.manifest.json +161 -140
- package/README.md +811 -4
- package/README.pdf +20763 -3833
- package/addons/eggs/adapt/applications/eggs-adapt.desktop +0 -0
- package/addons/eggs/pve/applications/eggs-pve.desktop +0 -0
- package/addons/eggs/rsupport/applications/eggs-rsupport.desktop +0 -0
- package/addons/eggs/theme/applications/install-system.desktop +0 -0
- package/addons/eggs/theme/livecd/full.grub.main.cfg +39 -4
- package/addons/eggs/theme/livecd/full.isolinux.main.cfg +47 -4
- package/assets/calamares/install-system.sh +0 -0
- package/assets/penguins-eggs.desktop +0 -0
- package/assets/penguins-krill.desktop +0 -0
- package/assets/penguins-links-add.desktop +0 -0
- package/assets/penguins-live-installer.desktop +0 -0
- package/bin/dev.js +0 -0
- package/bin/run.js +11 -0
- package/conf/derivatives.yaml +2 -1
- package/conf/distros/alpine/calamares/calamares-modules/machineid-openrc/machineid-openrc.sh +0 -0
- package/conf/distros/buster/calamares/calamares-modules/cleanup/cleanup.sh +0 -0
- package/conf/distros/buster/calamares/calamares-modules/dpkg-unsafe-io/dpkg-unsafe-io.sh +0 -0
- package/conf/distros/buster/calamares/calamares-modules/sources-yolk/sources-yolk.sh +0 -0
- package/conf/distros/fedora/calamares/calamares-modules/bootloaderspecification/bootloaderspecification.sh +0 -0
- package/conf/distros/focal/calamares/calamares-modules/.keepit +0 -0
- package/conf/distros/focal/calamares/calamares-modules/cleanup/cleanup.sh +20 -0
- package/conf/distros/focal/calamares/calamares-modules/cleanup/module.yml +9 -0
- package/conf/distros/focal/calamares/calamares-modules/sources-yolk/module.yml +8 -0
- package/conf/distros/focal/calamares/calamares-modules/sources-yolk/sources-yolk.sh +50 -0
- package/conf/distros/focal/calamares/calamares-modules/sources-yolk-undo/module.yml +8 -0
- package/conf/distros/focal/calamares/libexec/.keepit +0 -0
- package/conf/distros/focal/calamares/libexec/README.md +5 -0
- package/conf/distros/focal/calamares/libexec/calamares-aptsources.sh +15 -0
- package/conf/distros/focal/calamares/libexec/calamares-l10n-helper.sh +38 -0
- package/conf/distros/focal/calamares/libexec/calamares-logs-helper.sh +34 -0
- package/conf/distros/focal/calamares/libexec/calamares-nomodeset.sh +19 -0
- package/conf/distros/focal/calamares/modules/after_bootloader_context.yml +26 -0
- package/conf/distros/focal/calamares/modules/before_bootloader_context.yml +12 -0
- package/conf/distros/focal/calamares/modules/bootloader.yml +86 -0
- package/conf/distros/focal/calamares/modules/bootloader.yml.old +35 -0
- package/conf/distros/focal/calamares/modules/displaymanager.yml +12 -0
- package/conf/distros/focal/calamares/modules/finished.yml +6 -0
- package/conf/distros/focal/calamares/modules/fstab.yml +63 -0
- package/conf/distros/focal/calamares/modules/grubcfg.yml +51 -0
- package/conf/distros/focal/calamares/modules/keyboard.yml +29 -0
- package/conf/distros/focal/calamares/modules/locale.yml +7 -0
- package/conf/distros/focal/calamares/modules/machineid.yml +10 -0
- package/conf/distros/focal/calamares/modules/mount.yml +20 -0
- package/conf/distros/focal/calamares/modules/netinstall.yml +5 -0
- package/conf/distros/focal/calamares/modules/packages.mustache +5 -0
- package/conf/distros/focal/calamares/modules/partition.yml +21 -0
- package/conf/distros/focal/calamares/modules/removeuser.mustache +3 -0
- package/conf/distros/focal/calamares/modules/shellprocess@aptsources.yml +11 -0
- package/conf/distros/focal/calamares/modules/shellprocess@boot_deploy.yml +9 -0
- package/conf/distros/focal/calamares/modules/shellprocess@boot_reconfigure.yml +15 -0
- package/conf/distros/focal/calamares/modules/shellprocess@install_translations.yml +8 -0
- package/conf/distros/focal/calamares/modules/shellprocess@logs.yml +8 -0
- package/conf/distros/focal/calamares/modules/shellprocess@mkinitramfs.yml +6 -0
- package/conf/distros/focal/calamares/modules/shellprocess@nomodeset.yml +12 -0
- package/conf/distros/focal/calamares/modules/umount.yml +4 -0
- package/conf/distros/focal/calamares/modules/unpackfs.mustache +6 -0
- package/conf/distros/focal/calamares/modules/users.yml +27 -0
- package/conf/distros/focal/calamares/modules/welcome.yml +24 -0
- package/conf/distros/focal/calamares/settings.yml +97 -0
- package/conf/distros/noble/calamares/calamares-modules/cleanup/cleanup.sh +0 -0
- package/conf/distros/noble/calamares/calamares-modules/sources-yolk/sources-yolk.sh +0 -0
- package/conf/distros/noble/calamares/libexec/calamares-aptsources.sh +0 -0
- package/conf/distros/noble/calamares/libexec/calamares-l10n-helper.sh +0 -0
- package/conf/distros/noble/calamares/libexec/calamares-logs-helper.sh +0 -0
- package/conf/distros/noble/calamares/libexec/calamares-nomodeset.sh +0 -0
- package/conf/distros/opensuse/calamares/calamares-modules/bootloaderspecification/bootloaderspecification.sh +0 -0
- package/conf/distros/opensuse/calamares/settings.yml +0 -0
- package/conf/distros/opensuse/calamares/zstd2lzo.sh +0 -0
- package/conf/distros/trixie/calamares/calamares-modules/cleanup/cleanup.sh +0 -0
- package/conf/distros/trixie/calamares/calamares-modules/dpkg-unsafe-io/dpkg-unsafe-io.sh +0 -0
- package/conf/distros/trixie/calamares/calamares-modules/sources-yolk/sources-yolk.sh +0 -0
- package/conf/init/unattended.sh +0 -0
- package/dist/appimage/dependency-manager.d.ts +31 -0
- package/dist/appimage/dependency-manager.js +292 -0
- package/dist/appimage/first-run-check.d.ts +8 -0
- package/dist/appimage/first-run-check.js +13 -0
- package/dist/bin/dev.cmd +3 -0
- package/dist/bin/dev.js +6 -0
- package/dist/bin/run.cmd +3 -0
- package/dist/bin/run.js +16 -0
- package/dist/classes/cli-autologin.js +5 -5
- package/dist/classes/daddy.js +11 -11
- package/dist/classes/diversions.d.ts +5 -0
- package/dist/classes/diversions.js +23 -7
- package/dist/classes/incubation/fisherman-helper/initcpio.d.ts +7 -0
- package/dist/classes/incubation/fisherman-helper/initcpio.js +7 -0
- package/dist/classes/incubation/fisherman.js +0 -2
- package/dist/classes/network.d.ts +1 -1
- package/dist/classes/ovary.d/edit-live-fs.d.ts +1 -1
- package/dist/classes/ovary.d/edit-live-fs.js +129 -93
- package/dist/classes/ovary.d/fertilization.js +1 -1
- package/dist/classes/ovary.d/xorriso-command.js +1 -5
- package/dist/classes/pacman.d.ts +21 -7
- package/dist/classes/pacman.js +59 -39
- package/dist/classes/utils.d.ts +5 -5
- package/dist/classes/utils.js +30 -11
- package/dist/commands/calamares.js +1 -1
- package/dist/commands/config.js +3 -14
- package/dist/commands/cuckoo.js +1 -1
- package/dist/commands/{analyze.d.ts → export/appimage.d.ts} +10 -9
- package/dist/commands/export/appimage.js +76 -0
- package/dist/commands/export/iso.js +1 -1
- package/dist/commands/export/pkg.d.ts +1 -1
- package/dist/commands/export/pkg.js +2 -2
- package/dist/commands/{install.d.ts → krill.d.ts} +3 -4
- package/dist/commands/{install.js → krill.js} +5 -6
- package/dist/commands/produce.js +1 -1
- package/dist/commands/setup/install.d.ts +17 -0
- package/dist/commands/setup/install.js +71 -0
- package/dist/commands/setup/purge.d.ts +17 -0
- package/dist/commands/setup/purge.js +71 -0
- package/dist/commands/tools/repo.d.ts +0 -5
- package/dist/commands/tools/repo.js +205 -127
- package/dist/commands/update.d.ts +16 -1
- package/dist/commands/update.js +140 -63
- package/dist/krill/components/information.js +2 -2
- package/dist/krill/components/title.js +13 -13
- package/dist/lib/utils.d.ts +16 -0
- package/dist/lib/utils.js +5 -32
- package/dracut/create-symlink +0 -0
- package/dracut/export +0 -0
- package/dracut/export-dracut-analysis +0 -0
- package/dracut/export-dracut-log +0 -0
- package/dracut/mkisofs +0 -0
- package/dracut/modules.d/00debug-shell/debug-hook.sh +0 -0
- package/dracut/modules.d/00debug-shell/module-setup.sh +0 -0
- package/dracut/modules.d/90block/block-cmdline.sh +0 -0
- package/dracut/modules.d/90block/module-setup.sh +0 -0
- package/dracut/modules.d/95iso-scan/iso-scan-fallback.sh +0 -0
- package/dracut/modules.d/95iso-scan/iso-scan.sh +0 -0
- package/dracut/modules.d/95iso-scan/module-setup.sh +0 -0
- package/dracut/modules.d/95luks-loop/luks-loop.sh +0 -0
- package/dracut/modules.d/95luks-loop/module-setup.sh +0 -0
- package/dracut/renew-initramfs +0 -0
- package/dracut/sbin2bin +0 -0
- package/dracut/update-dracut-conf-d +0 -0
- package/dracut/update-dracut-modules +0 -0
- package/eui/eui-autostart-cinnamon.desktop +0 -0
- package/eui/eui-autostart-xfce.desktop +0 -0
- package/eui/eui-create-image.sh +0 -0
- package/eui/eui-start.sh +0 -0
- package/manpages/doc/man/eggs.1.gz +0 -0
- package/manpages/doc/man/eggs.html +594 -9
- package/package.json +124 -130
- package/perrisbrewery/scripts/postinst +0 -0
- package/perrisbrewery/scripts/postrm +0 -0
- package/perrisbrewery/scripts/preinst +0 -0
- package/perrisbrewery/scripts/prerm +0 -0
- package/perrisbrewery/template/dependencies.yaml +0 -5
- package/perrisbrewery/template/man.template.md +7 -0
- package/scripts/99clean +0 -0
- package/scripts/_eggs +56 -47
- package/scripts/adapt.sh +0 -0
- package/scripts/bros/waydroid-helper.sh +0 -0
- package/scripts/eggs.bash +4 -4
- package/scripts/lsb_release +0 -0
- package/scripts/mom.sh +0 -0
- package/scripts/pve-live.service +0 -0
- package/scripts/pve-live.sh +0 -0
- package/scripts/resy +0 -0
- package/dist/commands/analyze.js +0 -95
- package/dist/commands/pods.d.ts +0 -22
- package/dist/commands/pods.js +0 -92
- package/scripts/boot-encrypted-root.sh +0 -220
- package/scripts/mount-encrypted-home.sh +0 -324
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
@@ -3,27 +3,62 @@ set theme=/boot/grub/theme.cfg
|
|
|
3
3
|
menuentry "{{{fullname}}} Live/Installation" {
|
|
4
4
|
set gfxpayload=keep
|
|
5
5
|
{{{rmModules}}}
|
|
6
|
-
linux {{{vmlinuz}}} {{{kernel_parameters}}} quiet splash
|
|
6
|
+
linux {{{vmlinuz}}} {{{kernel_parameters}}} auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
7
7
|
initrd {{{initrdImg}}}
|
|
8
8
|
}
|
|
9
9
|
|
|
10
10
|
menuentry "{{{fullname}}} Safe Mode" {
|
|
11
11
|
set gfxpayload=keep
|
|
12
12
|
{{{rmModules}}}
|
|
13
|
-
linux {{{vmlinuz}}} {{{kernel_parameters}}} quiet splash
|
|
13
|
+
linux {{{vmlinuz}}} {{{kernel_parameters}}} auto noprompt nomodeset auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
14
14
|
initrd {{{initrdImg}}}
|
|
15
15
|
}
|
|
16
16
|
|
|
17
17
|
menuentry "{{{fullname}}} Text Mode" {
|
|
18
18
|
set gfxpayload=keep
|
|
19
19
|
{{{rmModules}}}
|
|
20
|
-
linux {{{vmlinuz}}} {{{kernel_parameters}}} quiet splash
|
|
20
|
+
linux {{{vmlinuz}}} {{{kernel_parameters}}} auto noprompt init 3 auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
21
21
|
initrd {{{initrdImg}}}
|
|
22
22
|
}
|
|
23
23
|
|
|
24
|
+
menuentry "{{{fullname}}} Forensics Mode" {
|
|
25
|
+
set gfxpayload=keep
|
|
26
|
+
{{{rmModules}}}
|
|
27
|
+
linux {{{vmlinuz}}} {{{kernel_parameters}}} forensic noautomount noswap toram auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
28
|
+
initrd {{{initrdImg}}}
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
menuentry "{{{fullname}}} NoAcpi Mode" {
|
|
32
|
+
set gfxpayload=keep
|
|
33
|
+
{{{rmModules}}}
|
|
34
|
+
linux {{{vmlinuz}}} {{{kernel_parameters}}} noapic auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
35
|
+
initrd {{{initrdImg}}}
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
menuentry "{{{fullname}}} iommu Mode" {
|
|
39
|
+
set gfxpayload=keep
|
|
40
|
+
{{{rmModules}}}
|
|
41
|
+
linux {{{vmlinuz}}} {{{kernel_parameters}}} iommu=soft auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
42
|
+
initrd {{{initrdImg}}}
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
menuentry "{{{fullname}}} Encrypted Mode" {
|
|
46
|
+
set gfxpayload=keep
|
|
47
|
+
{{{rmModules}}}
|
|
48
|
+
linux {{{vmlinuz}}} {{{kernel_parameters}}} persistent=cryptsetup persistence-encryption=luks persistent persistence auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
49
|
+
initrd {{{initrdImg}}}
|
|
50
|
+
}
|
|
51
|
+
|
|
52
|
+
menuentry "{{{fullname}}} Recovery Mode" {
|
|
53
|
+
set gfxpayload=keep
|
|
54
|
+
{{{rmModules}}}
|
|
55
|
+
linux {{{vmlinuz}}} {{{kernel_parameters}}} recovery nomodeset auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
56
|
+
initrd {{{initrdImg}}}
|
|
57
|
+
}
|
|
58
|
+
|
|
59
|
+
|
|
24
60
|
if [ "$grub_platform" = "efi" ]; then
|
|
25
61
|
menuentry "Boot from local disk" {
|
|
26
62
|
exit 1
|
|
27
63
|
}
|
|
28
64
|
fi
|
|
29
|
-
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
# eggs: isolinux.main.cfg
|
|
1
|
+
# eggs: full.isolinux.main.cfg
|
|
2
2
|
#
|
|
3
3
|
|
|
4
4
|
# search path for the c32 support libraries (libcom32, libutil etc.)
|
|
@@ -12,13 +12,13 @@ label Live
|
|
|
12
12
|
menu label {{{fullname}}} Live/Installation Mode
|
|
13
13
|
say "Booting {{{fullname}}} GNU/Linux (kernel {{{kernel}}})"
|
|
14
14
|
linux {{{vmlinuz}}}
|
|
15
|
-
append initrd={{{initrdImg}}} {{{kernel_parameters}}} priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog
|
|
15
|
+
append initrd={{{initrdImg}}} {{{kernel_parameters}}} auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
16
16
|
|
|
17
17
|
label Safe
|
|
18
18
|
menu label {{{fullname}}} Safe Mode
|
|
19
19
|
say "Booting {{{fullname}}} GNU/Linux (kernel {{{kernel}}})"
|
|
20
20
|
linux {{{vmlinuz}}}
|
|
21
|
-
append initrd={{{initrdImg}}} {{{kernel_parameters}}} priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog
|
|
21
|
+
append initrd={{{initrdImg}}} {{{kernel_parameters}}} noprompt nomodeset auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
22
22
|
|
|
23
23
|
|
|
24
24
|
label Text
|
|
@@ -27,8 +27,51 @@ label Text
|
|
|
27
27
|
linux {{{vmlinuz}}}
|
|
28
28
|
append initrd={{{initrdImg}}} {{{kernel_parameters}}} priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog loglevel=0 fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 audit=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=of quiet splash
|
|
29
29
|
|
|
30
|
+
|
|
31
|
+
label Text
|
|
32
|
+
menu label {{{fullname}}} Text Mode
|
|
33
|
+
say "Booting {{{fullname}}} GNU/Linux (kernel {{{kernel}}})"
|
|
34
|
+
linux {{{vmlinuz}}}
|
|
35
|
+
append initrd={{{initrdImg}}} {{{kernel_parameters}}} init 3 auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
36
|
+
|
|
37
|
+
|
|
38
|
+
label Text
|
|
39
|
+
menu label {{{fullname}}} Forensics Mode
|
|
40
|
+
say "Booting {{{fullname}}} GNU/Linux (kernel {{{kernel}}})"
|
|
41
|
+
linux {{{vmlinuz}}}
|
|
42
|
+
append initrd={{{initrdImg}}} {{{kernel_parameters}}} auto noprompt forensic noautomount noswap toram quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
43
|
+
|
|
44
|
+
|
|
45
|
+
|
|
46
|
+
label Text
|
|
47
|
+
menu label {{{fullname}}} NoAcpi Mode
|
|
48
|
+
say "Booting {{{fullname}}} GNU/Linux (kernel {{{kernel}}})"
|
|
49
|
+
linux {{{vmlinuz}}}
|
|
50
|
+
append initrd={{{initrdImg}}} {{{kernel_parameters}}} noapic auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
51
|
+
|
|
52
|
+
|
|
53
|
+
|
|
54
|
+
label Text
|
|
55
|
+
menu label {{{fullname}}} IOMMU Mode
|
|
56
|
+
say "Booting {{{fullname}}} GNU/Linux (kernel {{{kernel}}})"
|
|
57
|
+
linux {{{vmlinuz}}}
|
|
58
|
+
append initrd={{{initrdImg}}} {{{kernel_parameters}}} iommu=soft auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
59
|
+
|
|
60
|
+
label Text
|
|
61
|
+
menu label {{{fullname}}} Encrypted Mode
|
|
62
|
+
say "Booting {{{fullname}}} GNU/Linux (kernel {{{kernel}}})"
|
|
63
|
+
linux {{{vmlinuz}}}
|
|
64
|
+
append initrd={{{initrdImg}}} {{{kernel_parameters}}} persistent=cryptsetup persistence-encryption=luks persistent persistence auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
65
|
+
|
|
66
|
+
|
|
67
|
+
label Text
|
|
68
|
+
menu label {{{fullname}}} Recovery Mode
|
|
69
|
+
say "Booting {{{fullname}}} GNU/Linux (kernel {{{kernel}}})"
|
|
70
|
+
linux {{{vmlinuz}}}
|
|
71
|
+
append initrd={{{initrdImg}}} {{{kernel_parameters}}} recovery nomodeset auto noprompt quiet splash i915.fastboot=1 elevator=none audit=0 nosmt priority=critical retbleed=off mitigations=off audit=0 amd_pstate.enable=1 amd-pstate=active intel_pstate=enable nowatchdog fsck.mode=skip debugfs=off nmi_watchdog=0 debug=0 show_ssp=0 earlyprintk=off kaslr=off no_pasr cfi=off oops=panic
|
|
72
|
+
|
|
30
73
|
label local
|
|
31
74
|
menu label Boot from local disk
|
|
32
75
|
COM32 chain.c32
|
|
33
76
|
APPEND hd0
|
|
34
|
-
say "Booting from the first hard drive"
|
|
77
|
+
say "Booting from the first hard drive"
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
package/bin/dev.js
CHANGED
|
File without changes
|
package/bin/run.js
CHANGED
|
@@ -2,4 +2,15 @@
|
|
|
2
2
|
|
|
3
3
|
import {execute} from '@oclif/core'
|
|
4
4
|
|
|
5
|
+
if (process.env.APPIMAGE && process.env.APPIMAGE.endsWith('.AppImage')) {
|
|
6
|
+
// process.argv contiene [node_path, script_path, ...argomenti_utente]
|
|
7
|
+
// Se la lunghezza è 2, significa che non ci sono argomenti utente.
|
|
8
|
+
if (process.argv.length === 2) {
|
|
9
|
+
console.log('AppImage launched without arguments: launching setup install...');
|
|
10
|
+
// We inject commands for Oclif
|
|
11
|
+
process.argv.push('setup');
|
|
12
|
+
process.argv.push('install');
|
|
13
|
+
}
|
|
14
|
+
}
|
|
15
|
+
|
|
5
16
|
await execute({dir: import.meta.url})
|
package/conf/derivatives.yaml
CHANGED
|
@@ -124,6 +124,7 @@
|
|
|
124
124
|
- wilma # Linuxmint 22
|
|
125
125
|
- xia # Linuxmint 22.1
|
|
126
126
|
- zara # Linuxmint 22.2
|
|
127
|
+
- zena # Linuxmint 22.3
|
|
127
128
|
- nexalinux # Nexa LInux
|
|
128
129
|
- crimson # Deepin 25 crimson
|
|
129
130
|
|
|
@@ -141,4 +142,4 @@
|
|
|
141
142
|
- bluestarlinux
|
|
142
143
|
|
|
143
144
|
# Manjaro
|
|
144
|
-
- zetar
|
|
145
|
+
- zetar
|
package/conf/distros/alpine/calamares/calamares-modules/machineid-openrc/machineid-openrc.sh
CHANGED
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
CHROOT=$(mount | grep proc | grep calamares | awk '{print $3}' | sed -e "s#/proc##g")
|
|
3
|
+
|
|
4
|
+
if [ -f "$CHROOT"/etc/motd ]; then
|
|
5
|
+
sed -i '/^eggs-start-message/,/^\eggs-end-message/{/^#/!{/^\$/!d;};}' "$CHROOT"/etc/motd
|
|
6
|
+
fi
|
|
7
|
+
|
|
8
|
+
if [ -f "$CHROOT"/etc/issue ]; then
|
|
9
|
+
sed -i '/^eggs-start-message/,/^\eggs-end-message/{/^#/!{/^\$/!d;};}' "$CHROOT"/etc/issue
|
|
10
|
+
fi
|
|
11
|
+
|
|
12
|
+
# remove calamares link desktop
|
|
13
|
+
rm -f $CHROOT/usr/share/applications/install-system.desktop
|
|
14
|
+
|
|
15
|
+
# remove CLI autologin if exists
|
|
16
|
+
rm -f $CHROOT/etc/systemd/system/getty@.service.d/override.conf
|
|
17
|
+
|
|
18
|
+
# remove 10-installer if exists
|
|
19
|
+
rm -f $CHROOT/etc/sudoers.d/10-installer
|
|
20
|
+
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
#!/bin/sh
|
|
2
|
+
|
|
3
|
+
#
|
|
4
|
+
# We use just yolk during installation
|
|
5
|
+
#
|
|
6
|
+
# sources-yolk.sh
|
|
7
|
+
# add yolk
|
|
8
|
+
#
|
|
9
|
+
# sources-yolk.sh -u
|
|
10
|
+
# remove yolk
|
|
11
|
+
|
|
12
|
+
#
|
|
13
|
+
#
|
|
14
|
+
#
|
|
15
|
+
main() {
|
|
16
|
+
if [ "$1" = "-u" ]; then
|
|
17
|
+
remove
|
|
18
|
+
else
|
|
19
|
+
add
|
|
20
|
+
fi
|
|
21
|
+
sync
|
|
22
|
+
exit 0
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
|
|
26
|
+
#
|
|
27
|
+
#
|
|
28
|
+
#
|
|
29
|
+
remove() {
|
|
30
|
+
if [ -f "$YOLK_LIST" ]; then
|
|
31
|
+
rm -f "$YOLK_LIST"
|
|
32
|
+
fi
|
|
33
|
+
}
|
|
34
|
+
|
|
35
|
+
#
|
|
36
|
+
#
|
|
37
|
+
#
|
|
38
|
+
add() {
|
|
39
|
+
echo "deb [trusted=yes] file:/var/local/yolk ./" > "$YOLK_LIST"
|
|
40
|
+
chroot "$CHROOT" apt-get --yes update
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
#
|
|
44
|
+
# WE START HERE
|
|
45
|
+
#
|
|
46
|
+
CHROOT=$(mount | grep proc | grep calamares | awk '{print $3}' | sed -e "s#/proc##g")
|
|
47
|
+
YOLK_LIST="$CHROOT/etc/apt/sources.list.d/yolk.list"
|
|
48
|
+
|
|
49
|
+
main "$1"
|
|
50
|
+
|
|
File without changes
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
#!/bin/sh
|
|
2
|
+
# SPDX-License-Identifier: GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
3
|
+
# SPDX-FileCopyrightText: 2020 Harald Sitter <sitter@kde.org>
|
|
4
|
+
|
|
5
|
+
# Carry nomodeset into chroot
|
|
6
|
+
|
|
7
|
+
set -ex
|
|
8
|
+
|
|
9
|
+
echo "Reinstalling ubuntu-keyring"
|
|
10
|
+
|
|
11
|
+
ls /etc/apt/sources.list.d/
|
|
12
|
+
|
|
13
|
+
apt-get install --reinstall ubuntu-keyring
|
|
14
|
+
|
|
15
|
+
ls /etc/apt/sources.list.d/
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
#!/bin/sh
|
|
2
|
+
# SPDX-FileCopyrightText: 2018-2019 Harald Sitter <sitter@kde.org>
|
|
3
|
+
# SPDX-License-Identifier: GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
4
|
+
|
|
5
|
+
# apt install language-selector-common
|
|
6
|
+
|
|
7
|
+
# calamares currently has subpar l10n capabilites.
|
|
8
|
+
# this helper is ment to aid in getting very primitive language support
|
|
9
|
+
# of the ground by using a helper from ubuntu's language-selector-common
|
|
10
|
+
# to retrieve a list of packages required for the chosen system language
|
|
11
|
+
# and then manually installig it.
|
|
12
|
+
# https://github.com/calamares/calamares/issues/924
|
|
13
|
+
|
|
14
|
+
set -ex
|
|
15
|
+
|
|
16
|
+
. /etc/default/locale
|
|
17
|
+
|
|
18
|
+
echo $LANG
|
|
19
|
+
echo $LC_TIME
|
|
20
|
+
without_ext=$(echo $LANG | cut -d. -f1)
|
|
21
|
+
|
|
22
|
+
# Calamares technically should mangle locale.gen, but it's broken
|
|
23
|
+
# https://github.com/calamares/calamares/issues/940
|
|
24
|
+
# To unbreak this call locale-gen manually with LC_TIME. This may be the same
|
|
25
|
+
# as LANG, which gets set up by lang-pack-en-base
|
|
26
|
+
# (installed by check-language-support).
|
|
27
|
+
# But since the pack may be any language and network might not be available
|
|
28
|
+
# we set up both the LANG and LC_TIME so that both are definitely set up
|
|
29
|
+
# regardless of network availablity or calamares bugs.
|
|
30
|
+
# NB: this is a special way of calling it unique to Ubuntu which will mangle
|
|
31
|
+
# the config and enable it in one go
|
|
32
|
+
/usr/sbin/locale-gen --keep-existing "$LANG"
|
|
33
|
+
/usr/sbin/locale-gen --keep-existing "$LC_TIME"
|
|
34
|
+
|
|
35
|
+
apt-get update || true
|
|
36
|
+
# apt-get install language-selector-common || true
|
|
37
|
+
missing=$(check-language-support --language="$without_ext")
|
|
38
|
+
apt-get install -y $missing || true
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
#!/bin/sh
|
|
2
|
+
# SPDX-FileCopyrightText: 2018-2019 Harald Sitter <sitter@kde.org>
|
|
3
|
+
# SPDX-License-Identifier: GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
4
|
+
|
|
5
|
+
set -ex
|
|
6
|
+
|
|
7
|
+
# may fail
|
|
8
|
+
root=$1
|
|
9
|
+
install_dir=$root/var/log/installer
|
|
10
|
+
log_path=".cache/calamares/session.log"
|
|
11
|
+
[ -d $install_dir ] || mkdir -p $install_dir
|
|
12
|
+
|
|
13
|
+
if [ -e $HOME/$log_path ]; then
|
|
14
|
+
cp $HOME/$log_path $install_dir/debug
|
|
15
|
+
elif [ -e /root/$log_path ] ; then
|
|
16
|
+
cp /root/$log_path $install_dir/debug
|
|
17
|
+
else
|
|
18
|
+
echo "WARNING: Cannot find calamares/session.log"
|
|
19
|
+
fi
|
|
20
|
+
|
|
21
|
+
cp __LIVE_MEDIUM_PATH__.disk/info $install_dir/media-info
|
|
22
|
+
#cp /var/log/casper.log $install_dir/casper.log
|
|
23
|
+
cp /var/log/syslog $install_dir/syslog
|
|
24
|
+
|
|
25
|
+
gzip --stdout $root/var/lib/dpkg/status > $install_dir/initial-status.gz
|
|
26
|
+
|
|
27
|
+
# OEM id isn't a thing, when in OEM mode ubiquity would also archive that.
|
|
28
|
+
# https://github.com/calamares/calamares/issues/943
|
|
29
|
+
|
|
30
|
+
chmod -v 600 $install_dir/*
|
|
31
|
+
# Make these world readable, they can absolutely not contain anything relevant
|
|
32
|
+
# to security.
|
|
33
|
+
chmod -v 644 $install_dir/initial-status.gz
|
|
34
|
+
chmod -v 644 $install_dir/media-info
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
#!/bin/sh
|
|
2
|
+
# SPDX-License-Identifier: GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
3
|
+
# SPDX-FileCopyrightText: 2020 Harald Sitter <sitter@kde.org>
|
|
4
|
+
|
|
5
|
+
# Carry nomodeset into chroot
|
|
6
|
+
|
|
7
|
+
set -ex
|
|
8
|
+
|
|
9
|
+
if ! grep -q nomodeset /proc/cmdline; then
|
|
10
|
+
exit 0
|
|
11
|
+
fi
|
|
12
|
+
|
|
13
|
+
echo "Forwarding nomodeset to installed system"
|
|
14
|
+
|
|
15
|
+
cat > /etc/default/grub.d/ubuntu-installation-nomodeset.cfg << 'EOF'
|
|
16
|
+
GRUB_CMDLINE_LINUX_DEFAULT="${GRUB_CMDLINE_LINUX_DEFAULT} nomodeset"
|
|
17
|
+
EOF
|
|
18
|
+
|
|
19
|
+
update-grub
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
# SPDX-FileCopyrightText: 2018-2019 Harald Sitter <sitter@kde.org>
|
|
2
|
+
# SPDX-License-Identifier: GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
3
|
+
#
|
|
4
|
+
# Workaround from ubiquity. Ubuntu's grub will want to look in EFI/ubuntu, so
|
|
5
|
+
# let's make sure it can find something there.
|
|
6
|
+
# This only copies the cfg and doesn't overwrite, this is specifically so
|
|
7
|
+
# this doesn't interfere with an ubuntu installed on the system already.
|
|
8
|
+
#
|
|
9
|
+
# We'll also drop our preinstalled repository at this point if we had one.
|
|
10
|
+
# That way it doesn't litter the final system. The repo is created by
|
|
11
|
+
# livecd-rootfs-neon and contains bootloader packages so we can be installed
|
|
12
|
+
# without internet access. (this is run for both efi and bios types)
|
|
13
|
+
---
|
|
14
|
+
dontChroot: false
|
|
15
|
+
timeout: 120
|
|
16
|
+
firmwareType:
|
|
17
|
+
efi:
|
|
18
|
+
# grub hack
|
|
19
|
+
- -mkdir /boot/efi/EFI/ubuntu
|
|
20
|
+
- -cp /boot/efi/EFI/neon/grub.cfg /boot/efi/EFI/ubuntu/
|
|
21
|
+
- command: -apt-get update
|
|
22
|
+
timeout: 60
|
|
23
|
+
|
|
24
|
+
bios:
|
|
25
|
+
- command: -apt-get update
|
|
26
|
+
timeout: 60
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
# SPDX-FileCopyrightText: 2018-2019 Harald Sitter <sitter@kde.org>
|
|
2
|
+
# SPDX-License-Identifier: GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
3
|
+
#
|
|
4
|
+
# Make sure the correct bootloader package is installed for efi.
|
|
5
|
+
# Also pull in the shim so secureboot has a chance at working.
|
|
6
|
+
---
|
|
7
|
+
firmwareType:
|
|
8
|
+
efi:
|
|
9
|
+
- command: apt install -y --no-upgrade -o Acquire::gpgv::Options::=--ignore-time-conflict grub-efi-amd64-signed
|
|
10
|
+
timeout: 300
|
|
11
|
+
- command: apt install -y --no-upgrade -o Acquire::gpgv::Options::=--ignore-time-conflict shim-signed
|
|
12
|
+
timeout: 300
|
|
@@ -0,0 +1,86 @@
|
|
|
1
|
+
# SPDX-FileCopyrightText: no
|
|
2
|
+
# SPDX-License-Identifier: CC0-1.0
|
|
3
|
+
#
|
|
4
|
+
# Bootloader configuration. The bootloader is installed to allow
|
|
5
|
+
# the system to start (and pick one of the installed operating
|
|
6
|
+
# systems to run).
|
|
7
|
+
#
|
|
8
|
+
# Take note that Debian-derivatives that use unmodified GRUB EFI packages
|
|
9
|
+
# should specifically set *efiBootloaderId* to "debian" because that is
|
|
10
|
+
# hard-coded in `grubx64.efi`.
|
|
11
|
+
---
|
|
12
|
+
# A variable from global storage which overrides the value of efiBootLoader
|
|
13
|
+
#efiBootLoaderVar: "packagechooser_bootloader"
|
|
14
|
+
|
|
15
|
+
# Define which bootloader you want to use for EFI installations
|
|
16
|
+
# Possible options are 'grub', 'sb-shim', 'refind` and 'systemd-boot'.
|
|
17
|
+
efiBootLoader: "grub"
|
|
18
|
+
|
|
19
|
+
# systemd-boot configuration files settings
|
|
20
|
+
|
|
21
|
+
# kernelSearchPath is the path relative to the root of the install to search for kernels
|
|
22
|
+
# A kernel is identified by finding files which match regular expression, kernelPattern
|
|
23
|
+
kernelSearchPath: "/usr/lib/modules"
|
|
24
|
+
kernelPattern: "^vmlinuz.*"
|
|
25
|
+
|
|
26
|
+
# loaderEntries is an array of options to add to loader.conf for systemd-boot
|
|
27
|
+
# please note that the "default" option is added programmatically
|
|
28
|
+
loaderEntries:
|
|
29
|
+
- "timeout 5"
|
|
30
|
+
- "console-mode keep"
|
|
31
|
+
|
|
32
|
+
# systemd-boot and refind support custom kernel params
|
|
33
|
+
kernelParams: [ "quiet" ]
|
|
34
|
+
|
|
35
|
+
# A list of kernel names that refind should accept as kernels
|
|
36
|
+
#refindKernelList: [ "linux","linux-lts","linux-zen","linux-hardened" ]
|
|
37
|
+
|
|
38
|
+
# GRUB 2 binary names and boot directory
|
|
39
|
+
# Some distributions (e.g. Fedora) use grub2-* (resp. /boot/grub2/) names.
|
|
40
|
+
# These names are also used when using sb-shim, since that needs some
|
|
41
|
+
# GRUB functionality (notably grub-probe) to work. As needed, you may use
|
|
42
|
+
# complete paths like `/usr/bin/efibootmgr` for the executables.
|
|
43
|
+
#
|
|
44
|
+
grubInstall: "grub-install"
|
|
45
|
+
grubMkconfig: "grub-mkconfig"
|
|
46
|
+
grubCfg: "/boot/grub/grub.cfg"
|
|
47
|
+
grubProbe: "grub-probe"
|
|
48
|
+
efiBootMgr: "efibootmgr"
|
|
49
|
+
|
|
50
|
+
# Optionally set the bootloader ID to use for EFI. This is passed to
|
|
51
|
+
# grub-install --bootloader-id.
|
|
52
|
+
#
|
|
53
|
+
# If not set here, the value from bootloaderEntryName from branding.desc
|
|
54
|
+
# is used, with problematic characters (space and slash) replaced.
|
|
55
|
+
#
|
|
56
|
+
# The ID is also used as a directory name within the EFI environment,
|
|
57
|
+
# and the bootloader is copied from /boot/efi/EFI/<dirname>/ . When
|
|
58
|
+
# setting the option here, keep in mind that the name is sanitized
|
|
59
|
+
# (problematic characters, see above, are replaced).
|
|
60
|
+
#
|
|
61
|
+
# There are some special words possible at the end of *efiBootloaderId*:
|
|
62
|
+
# ${SERIAL} can be used to obtain a uniquely-numbered suffix
|
|
63
|
+
# that is added to the Id (yielding, e.g., `dirname1` or `dirname72`)
|
|
64
|
+
# ${RANDOM} can be used to obtain a unique 4-digit hex suffix
|
|
65
|
+
# ${PHRASE} can be used to obtain a unique 1-to-3-word suffix
|
|
66
|
+
# from a dictionary of space-themed words
|
|
67
|
+
# These words must be at the **end** of the *efiBootloaderId* value.
|
|
68
|
+
# There must also be at most one of them. If there is none, no suffix-
|
|
69
|
+
# processing is done and the *efiBootloaderId* is used unchanged.
|
|
70
|
+
#
|
|
71
|
+
# NOTE: Debian derivatives that use the unmodified Debian GRUB EFI
|
|
72
|
+
# packages may need to set this to "debian" because that is
|
|
73
|
+
# hard-coded in `grubx64.efi`.
|
|
74
|
+
#
|
|
75
|
+
# efiBootloaderId: "dirname"
|
|
76
|
+
|
|
77
|
+
# Optionally install a copy of the GRUB EFI bootloader as the EFI
|
|
78
|
+
# fallback loader (either bootia32.efi or bootx64.efi depending on
|
|
79
|
+
# the system). This may be needed on certain systems (Intel DH87MC
|
|
80
|
+
# seems to be the only one). If you set this to false, take care
|
|
81
|
+
# to add another module to optionally install the fallback on those
|
|
82
|
+
# boards that need it.
|
|
83
|
+
installEFIFallback: true
|
|
84
|
+
|
|
85
|
+
# Optionally install both BIOS and UEFI GRUB bootloaders.
|
|
86
|
+
installHybridGRUB: false
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
# SPDX-License-Identifier: GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
2
|
+
# SPDX-FileCopyrightText: 2018-2019 Harald Sitter <sitter@kde.org>
|
|
3
|
+
---
|
|
4
|
+
efiBootLoader: "grub"
|
|
5
|
+
|
|
6
|
+
# systemd-boot configuration files settings, set kernel and initramfs file names
|
|
7
|
+
# and amount of time before default selection boots
|
|
8
|
+
kernel: "/vmlinuz-linux"
|
|
9
|
+
img: "/initramfs-linux.img"
|
|
10
|
+
fallback: "/initramfs-linux-fallback.img"
|
|
11
|
+
timeout: "10"
|
|
12
|
+
# Optionally set the menu entry name and kernel name to use in systemd-boot.
|
|
13
|
+
# If not specified here, these settings will be taken from branding.desc.
|
|
14
|
+
# bootloaderEntryName: "Generic GNU/Linux"
|
|
15
|
+
# kernelLine: ", with Stable-Kernel"
|
|
16
|
+
# fallbackKernelLine: ", with Stable-Kernel (fallback initramfs)"
|
|
17
|
+
|
|
18
|
+
# GRUB 2 binary names and boot directory
|
|
19
|
+
# Some distributions (e.g. Fedora) use grub2-* (resp. /boot/grub2/) names.
|
|
20
|
+
grubInstall: "grub-install"
|
|
21
|
+
grubMkconfig: "grub-mkconfig"
|
|
22
|
+
grubCfg: "/boot/grub/grub.cfg"
|
|
23
|
+
|
|
24
|
+
# Optionally set the bootloader ID to use for EFI. This is passed to
|
|
25
|
+
# grub-install --bootloader-id.
|
|
26
|
+
#
|
|
27
|
+
# If not set here, the value from bootloaderEntryName from branding.desc
|
|
28
|
+
# is used, with problematic characters (space and slash) replaced.
|
|
29
|
+
#
|
|
30
|
+
# The ID is also used as a directory name within the EFI environment,
|
|
31
|
+
# and the bootloader is copied from /boot/efi/EFI/<dirname>/ . When
|
|
32
|
+
# setting the option here, take care to use only valid directory
|
|
33
|
+
# names since no sanitizing is done.
|
|
34
|
+
#
|
|
35
|
+
efiBootloaderId: "ubuntu"
|
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
# SPDX-License-Identifier: GPL-3.0-only OR LicenseRef-KDE-Accepted-GPL
|
|
2
|
+
# SPDX-FileCopyrightText: 2019 Harald Sitter <sitter@kde.org>
|
|
3
|
+
# SPDX-FileCopyrightText: 2015-2016 Rohan Garg <rohan@kde.org>
|
|
4
|
+
---
|
|
5
|
+
restartNowMode: user-checked
|
|
6
|
+
restartNowCommand: "systemctl -i reboot"
|