[Config]
MinimumVersion=23~devel
-InitrdInclude=mkosi.initrd/
Dependencies=
exitrd
+ initrd
minimal-base
minimal-0
minimal-1
%O/minimal-base:/usr/share/TEST-13-NSPAWN-container-template
%O/exitrd:/exitrd
+Initrds=%O/initrd
+
Environment=
SYSTEMD_REPART_OVERRIDE_FSTYPE_ROOT=%F
KernelModulesInitrdExclude=.*
KernelModulesInitrdInclude=default
-InitrdPackages=
- findutils
- grep
- sed
-
Packages=
acl
attr
tgt
tpm2-tools
vim
-
-InitrdPackages=
- btrfs-progs
- tpm2-tools
-
-InitrdVolatilePackages=
- systemd
- systemd-libs
- systemd-sysvcompat
util-linux
veritysetup
vim-common
-
-InitrdPackages=
- tpm2-tools
-
-InitrdVolatilePackages=
- systemd
- systemd-udev
tpm2-tools
tzdata
xxd
-
-InitrdPackages=
- btrfs-progs
- tpm2-tools
-
-InitrdVolatilePackages=
- systemd
- systemd-cryptsetup
- systemd-repart
- udev
rpmautospec
sbsigntools
scsi-target-utils
-
-InitrdPackages=
- btrfs-progs
+++ /dev/null
-#!/bin/bash
-# SPDX-License-Identifier: LGPL-2.1-or-later
-set -e
-
-# OpenSUSE insists on blacklisting erofs by default because its supposedly a legacy filesystem.
-# See https://github.com/openSUSE/suse-module-tools/pull/71
-rm -f "$BUILDROOT/usr/lib/modprobe.d/60-blacklist_fs-erofs.conf"
[Match]
Distribution=opensuse
-[Config]
-InitrdInclude=initrd/
-
[Distribution]
Release=tumbleweed
Repositories=non-oss
vim
xz
zypper
-
-InitrdPackages=
- btrfs-progs
- kmod
- tpm2.0-tools
-
-InitrdVolatilePackages=
- systemd
- udev
- systemd-experimental
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Config]
+Include=
+ mkosi-initrd
+ %D/mkosi.sanitizers
+
+[Content]
+ExtraTrees=
+ %D/mkosi.leak-sanitizer-suppressions:/usr/lib/systemd/leak-sanitizer-suppressions
+ %D/mkosi.coredump-journal-storage.conf:/usr/lib/systemd/coredump.conf.d/10-coredump-journal-storage.conf
+
+Packages=
+ findutils
+ grep
+ sed
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Match]
+Distribution=arch
+
+[Content]
+Packages=
+ btrfs-progs
+ tpm2-tools
+
+VolatilePackages=
+ systemd
+ systemd-libs
+ systemd-sysvcompat
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+# Add a dependency on the build image unless NO_BUILD=1.
+
+[Match]
+Environment=!NO_BUILD=1
+
+[Config]
+Dependencies=build
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Match]
+Distribution=|centos
+Distribution=|fedora
+
+[Content]
+Packages=
+ tpm2-tools
+
+VolatilePackages=
+ systemd
+ systemd-udev
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Match]
+Distribution=|debian
+Distribution=|ubuntu
+
+[Content]
+Packages=
+ btrfs-progs
+ tpm2-tools
+
+VolatilePackages=
+ systemd
+ systemd-cryptsetup
+ systemd-repart
+ udev
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Match]
+Distribution=fedora
+
+[Content]
+Packages=
+ btrfs-progs
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Match]
+Distribution=opensuse
+
+[Content]
+Packages=
+ btrfs-progs
+ kmod
+ tpm2.0-tools
+
+VolatilePackages=
+ systemd
+ udev
+ systemd-experimental
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Partition]
+Type=var
+# This label is the partition's label. The filesystem inside may have its own label.
+Label=varcrypt
+# This UUID is the decrypted partition UUID, there are also filesystem and luks UUIDs.
+# The original test finds the partition by this UUID, but it doesn't appear
+# since the luks UUID, which is derived by hash of this UUID, is different
+# and the luks UUID is needed before the decrypted partition UUID.
+# The resulting luks UUID is 0d318174-56b0-4d6e-a324-ac1e7e7d235d.
+UUID=deadbeef-dead-dead-beef-000000000000
+Format=ext4
+Encrypt=key-file
+SizeMinBytes=1G
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Unit]
+Description=Add encrypted var partition to root disk
+Documentation=man:systemd-repart.service(8)
+
+ConditionVirtualization=!container
+
+DefaultDependencies=no
+Wants=modprobe@loop.service modprobe@dm_mod.service
+After=modprobe@loop.service modprobe@dm_mod.service sysroot.mount
+Before=initrd-root-fs.target
+Conflicts=shutdown.target initrd-switch-root.target
+Before=shutdown.target initrd-switch-root.target
+
+[Service]
+Type=oneshot
+RemainAfterExit=yes
+ExecStart=systemd-repart --definitions /usr/lib/encrypted-var.repart.d --key-file %d/keyfile --dry-run=no /sysroot
+ImportCredential=keyfile
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Unit]
+Description=Create a mount in /run that should survive the transition from initrd
+
+[Service]
+Type=oneshot
+RemainAfterExit=yes
+ExecStart=mkdir /run/initrd-mount-source /run/initrd-mount-target
+ExecStart=mount -v --bind /run/initrd-mount-source /run/initrd-mount-target
+ExecStart=cp -v /etc/initrd-release /run/initrd-mount-target/hello-world
--- /dev/null
+# SPDX-License-Identifier: LGPL-2.1-or-later
+
+[Unit]
+Description=populate initrd credential dir for TEST-54-CREDS
+
+[Service]
+Type=oneshot
+RemainAfterExit=yes
+ExecStart=sh -c "mkdir -m 0755 -p /run/credentials && mkdir -m 0700 /run/credentials/@initrd && umask 0077 && echo guatemala > /run/credentials/@initrd/myinitrdcred"
+++ /dev/null
-# SPDX-License-Identifier: LGPL-2.1-or-later
-
-[Content]
-ExtraTrees=
- ../mkosi.leak-sanitizer-suppressions:/usr/lib/systemd/leak-sanitizer-suppressions
- ../mkosi.coredump-journal-storage.conf:/usr/lib/systemd/coredump.conf.d/10-coredump-journal-storage.conf
-
-[Config]
-Include=../mkosi.sanitizers
+++ /dev/null
-# SPDX-License-Identifier: LGPL-2.1-or-later
-
-[Partition]
-Type=var
-# This label is the partition's label. The filesystem inside may have its own label.
-Label=varcrypt
-# This UUID is the decrypted partition UUID, there are also filesystem and luks UUIDs.
-# The original test finds the partition by this UUID, but it doesn't appear
-# since the luks UUID, which is derived by hash of this UUID, is different
-# and the luks UUID is needed before the decrypted partition UUID.
-# The resulting luks UUID is 0d318174-56b0-4d6e-a324-ac1e7e7d235d.
-UUID=deadbeef-dead-dead-beef-000000000000
-Format=ext4
-Encrypt=key-file
-SizeMinBytes=1G
+++ /dev/null
-# SPDX-License-Identifier: LGPL-2.1-or-later
-
-[Unit]
-Description=Add encrypted var partition to root disk
-Documentation=man:systemd-repart.service(8)
-
-ConditionVirtualization=!container
-
-DefaultDependencies=no
-Wants=modprobe@loop.service modprobe@dm_mod.service
-After=modprobe@loop.service modprobe@dm_mod.service sysroot.mount
-Before=initrd-root-fs.target
-Conflicts=shutdown.target initrd-switch-root.target
-Before=shutdown.target initrd-switch-root.target
-
-[Service]
-Type=oneshot
-RemainAfterExit=yes
-ExecStart=systemd-repart --definitions /usr/lib/encrypted-var.repart.d --key-file %d/keyfile --dry-run=no /sysroot
-ImportCredential=keyfile
+++ /dev/null
-# SPDX-License-Identifier: LGPL-2.1-or-later
-
-[Unit]
-Description=Create a mount in /run that should survive the transition from initrd
-
-[Service]
-Type=oneshot
-RemainAfterExit=yes
-ExecStart=mkdir /run/initrd-mount-source /run/initrd-mount-target
-ExecStart=mount -v --bind /run/initrd-mount-source /run/initrd-mount-target
-ExecStart=cp -v /etc/initrd-release /run/initrd-mount-target/hello-world
+++ /dev/null
-# SPDX-License-Identifier: LGPL-2.1-or-later
-
-[Unit]
-Description=populate initrd credential dir for TEST-54-CREDS
-
-[Service]
-Type=oneshot
-RemainAfterExit=yes
-ExecStart=sh -c "mkdir -m 0755 -p /run/credentials && mkdir -m 0700 /run/credentials/@initrd && umask 0077 && echo guatemala > /run/credentials/@initrd/myinitrdcred"