This image is based on aurora-dx-hwe:latest. A new version / build is released daily.
The linux lineage of this spin therefore looks something like this:
mindmap
root((Linux))
Red Hat
Fedora CoreOS
Fedora Silverblue
Universal Blue
Bazzite
Bluefin
Aurora
Aurora-DX
Aurora-DX-HWE
Galtzo
Debian
Ubuntu
SLS
Slackware
Jurix
SuSE
Enoch
Gentoo
Arch
NOTE: HWE images are tailored for a few hardware platforms, including ASUS laptops. They also differ from other aurora builds in that they use the bazzite kernel. The DX means the "Developer Experience" flavor.
If you are unfamiliar with Universal Blue Linux, or Atomic Fedora, start your journey at universal-blue.org, and download an image that suits you.
If you want to jump right into making your own spin (the water is fine!) start with the Blue Build Workshop, a web tool that will create a repo like this one and build your first image.
Or see the BlueBuild docs for quick manual setup instructions.
This particular configuration layers the following onto aurora-dx-hwe:
- NordVPN (also added to systemd) (config taken from jlandahl/aurora)
- 1Password
- Ruby build dependencies (fedora specific)
- autoconf
- gcc
- gcc-c++ (necessary for Ruby < 3.1)
- rust
- patch
- make
- bzip2
- openssl-devel
- libyaml-devel
- libffi-devel
- zlib-ng-compat-devel
- readline-devel
- gdbm-devel
- ncurses-devel
- perl-FindBin # Because of OpenSSL!
| This is an experimental feature, try at your own discretion. |
|---|
To rebase an existing atomic Fedora installation to the latest build:
- First rebase to the unsigned image, to get the proper signing keys and policies installed:
rpm-ostree rebase ostree-unverified-registry:ghcr.io/pboling/galtzo-os:latest - Reboot to complete the rebase:
systemctl reboot - Then rebase to the signed image, like so:
rpm-ostree rebase ostree-image-signed:docker://ghcr.io/pboling/galtzo-os:latest - Reboot again to complete the installation
systemctl reboot
The latest tag will automatically point to the latest build. That build will still always use the Fedora version specified in recipe.yml, so you won't get accidentally updated to the next major version.
Once you have this image installed updating to the latest is a two step process if you want to do it manually.
ujust update
systemctl rebootOtherwise if you just reboot periodically updates will simply happen transparently in the background. Generally there won't be more than one build per day, so a daily reboot will keep your system fresh.
If build on Fedora Atomic, you can generate an offline ISO with the instructions available here. These ISOs cannot unfortunately be distributed on GitHub for free due to large sizes, so for public projects something else has to be used for hosting.
These images are signed with Sigstore's cosign. You can verify the signature by downloading the cosign.pub file from this repo and running the following command:
cosign verify --key cosign.pub ghcr.io/pboling/galtzo-os