Fedora and container-based atomic distribution using rpm-ostree and BLueBuild.
Find a file
Aly Raffauf f9f7f11f3e
All checks were successful
bluebuild / Build Custom Image (push) Successful in 1m0s
github: improve interoperability
2025-05-24 11:10:55 -04:00
.github github: improve interoperability 2025-05-24 11:10:55 -04:00
files update gschema based on bazzite 2025-04-08 12:52:24 -04:00
modules Initial commit 2025-03-30 19:27:53 -04:00
recipes recipe: pull gnome extensions from fedora repo where available 2025-04-05 14:58:40 -04:00
.envrc add flake 2025-03-31 19:29:22 -04:00
.gitignore add flake 2025-03-31 19:29:22 -04:00
cosign.pub cosign: update keys 2025-05-24 10:44:51 -04:00
flake.lock add flake 2025-03-31 19:29:22 -04:00
flake.nix add flake 2025-03-31 19:29:22 -04:00
LICENSE Initial commit 2025-03-30 19:27:53 -04:00
README.md chore(automatic): replace all references to template in README 2025-03-30 19:27:55 -04:00

trilby   bluebuild build badge

See the BlueBuild docs for quick setup instructions for setting up your own repository based on this template.

After setup, it is recommended you update this README to describe your custom image.

Installation

Warning

This is an experimental feature, try at your own discretion.

To rebase an existing atomic Fedora installation to the latest build:

  • First rebase to the unsigned image, to get the proper signing keys and policies installed:
    rpm-ostree rebase ostree-unverified-registry:ghcr.io/alyraffauf/trilby:latest
    
  • Reboot to complete the rebase:
    systemctl reboot
    
  • Then rebase to the signed image, like so:
    rpm-ostree rebase ostree-image-signed:docker://ghcr.io/alyraffauf/trilby:latest
    
  • Reboot again to complete the installation
    systemctl reboot
    

The latest tag will automatically point to the latest build. That build will still always use the Fedora version specified in recipe.yml, so you won't get accidentally updated to the next major version.

ISO

If build on Fedora Atomic, you can generate an offline ISO with the instructions available here. These ISOs cannot unfortunately be distributed on GitHub for free due to large sizes, so for public projects something else has to be used for hosting.

Verification

These images are signed with Sigstore's cosign. You can verify the signature by downloading the cosign.pub file from this repo and running the following command:

cosign verify --key cosign.pub ghcr.io/alyraffauf/trilby