From 7d90cdef7d9d180394918cbc0aeb11b68d54401d Mon Sep 17 00:00:00 2001 From: Mohamed C <65728018+Moe1369@users.noreply.github.com> Date: Thu, 20 Jun 2024 07:20:25 +0200 Subject: [PATCH] Update README.md --- README.md | 20 ++------------------ 1 file changed, 2 insertions(+), 18 deletions(-) diff --git a/README.md b/README.md index 80169e9..da52c5b 100644 --- a/README.md +++ b/README.md @@ -1,14 +1,10 @@ # moe-os   [![build-ublue](https://github.com/moe1369/moe-os/actions/workflows/build.yml/badge.svg)](https://github.com/moe1369/moe-os/actions/workflows/build.yml) -See the [BlueBuild docs](https://blue-build.org/how-to/setup/) for quick setup instructions for setting up your own repository based on this template. - -After setup, it is recommended you update this README to describe your custom image. +Custom Fedora Image made with [BlueBuild](https://blue-build.org). +For personal use based on [ublue-os Kinoite main Variant](https://github.com/ublue-os/main/) ## Installation -> **Warning** -> [This is an experimental feature](https://www.fedoraproject.org/wiki/Changes/OstreeNativeContainerStable), try at your own discretion. - To rebase an existing atomic Fedora installation to the latest build: - First rebase to the unsigned image, to get the proper signing keys and policies installed: @@ -29,15 +25,3 @@ To rebase an existing atomic Fedora installation to the latest build: ``` The `latest` tag will automatically point to the latest build. That build will still always use the Fedora version specified in `recipe.yml`, so you won't get accidentally updated to the next major version. - -## ISO - -If build on Fedora Atomic, you can generate an offline ISO with the instructions available [here](https://blue-build.org/learn/universal-blue/#fresh-install-from-an-iso). These ISOs cannot unfortunately be distributed on GitHub for free due to large sizes, so for public projects something else has to be used for hosting. - -## Verification - -These images are signed with [Sigstore](https://www.sigstore.dev/)'s [cosign](https://github.com/sigstore/cosign). You can verify the signature by downloading the `cosign.pub` file from this repo and running the following command: - -```bash -cosign verify --key cosign.pub ghcr.io/moe1369/moe-os -```