Skip to content
generated from blue-build/template

My Operating System - An Atomic Fedora Universal Blue Aurora HWE DX Spin (Bazzite Kernel) w/ Ruby, 1Password, & NordVPN

License

Notifications You must be signed in to change notification settings

pboling/galtzo-os

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

galtzo-os   bluebuild build badge

This image is based on aurora-dx-hwe:latest. A new version / build is released daily.

The linux lineage of this spin therefore looks something like this:

mindmap
  root((Linux))
    Red Hat
      Fedora CoreOS
        Fedora Silverblue
          Universal Blue
            Bazzite
            Bluefin
              Aurora
                Aurora-DX
                  Aurora-DX-HWE
                    Galtzo
                  
    Debian
      Ubuntu
    SLS
      Slackware
    Jurix
      SuSE
    Enoch
      Gentoo
    Arch
Loading

NOTE: HWE images are tailored for a few hardware platforms, including ASUS laptops. They also differ from other aurora builds in that they use the bazzite kernel. The DX means the "Developer Experience" flavor.

If you are unfamiliar with Universal Blue Linux, or Atomic Fedora, start your journey at universal-blue.org, and download an image that suits you.

If you want to jump right into making your own spin (the water is fine!) start with the Blue Build Workshop, a web tool that will create a repo like this one and build your first image.

Or see the BlueBuild docs for quick manual setup instructions.

This particular configuration layers the following onto aurora-dx-hwe:

  • NordVPN (also added to systemd) (config taken from jlandahl/aurora)
  • 1Password
  • Ruby build dependencies (fedora specific)
    • autoconf
    • gcc
    • gcc-c++ (necessary for Ruby < 3.1)
    • rust
    • patch
    • make
    • bzip2
    • openssl-devel
    • libyaml-devel
    • libffi-devel
    • zlib-ng-compat-devel
    • readline-devel
    • gdbm-devel
    • ncurses-devel
    • perl-FindBin # Because of OpenSSL!

Installation

⚠️ Warning This is an experimental feature, try at your own discretion.

To rebase an existing atomic Fedora installation to the latest build:

  • First rebase to the unsigned image, to get the proper signing keys and policies installed:
    rpm-ostree rebase ostree-unverified-registry:ghcr.io/pboling/galtzo-os:latest
    
  • Reboot to complete the rebase:
    systemctl reboot
    
  • Then rebase to the signed image, like so:
    rpm-ostree rebase ostree-image-signed:docker://ghcr.io/pboling/galtzo-os:latest
    
  • Reboot again to complete the installation
    systemctl reboot
    

The latest tag will automatically point to the latest build. That build will still always use the Fedora version specified in recipe.yml, so you won't get accidentally updated to the next major version.

Update

Once you have this image installed updating to the latest is a two step process if you want to do it manually.

ujust update
systemctl reboot

Otherwise if you just reboot periodically updates will simply happen transparently in the background. Generally there won't be more than one build per day, so a daily reboot will keep your system fresh.

ISO

If build on Fedora Atomic, you can generate an offline ISO with the instructions available here. These ISOs cannot unfortunately be distributed on GitHub for free due to large sizes, so for public projects something else has to be used for hosting.

Verification

These images are signed with Sigstore's cosign. You can verify the signature by downloading the cosign.pub file from this repo and running the following command:

cosign verify --key cosign.pub ghcr.io/pboling/galtzo-os

About

My Operating System - An Atomic Fedora Universal Blue Aurora HWE DX Spin (Bazzite Kernel) w/ Ruby, 1Password, & NordVPN

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages