Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Safe root directory #1

Merged
merged 3 commits into from
Nov 22, 2022
Merged

Safe root directory #1

merged 3 commits into from
Nov 22, 2022

Conversation

RaitoBezarius
Copy link
Member

  • Add OpenSSL to the shell
  • Safeize the root directory

@blitz blitz merged commit 9ea8ff1 into master Nov 22, 2022
@blitz blitz deleted the safe-root-directory branch November 27, 2022 10:37
RaitoBezarius added a commit that referenced this pull request Sep 29, 2023
This uses the systemd semantics for automatic enrollment at boot time.

For now, it is very simple, in the future, we can better use this option to push
the proper auth files with names or have Type #1 entries for enrollment. :)

This PR relies on unreleased commits in nixpkgs for the testing framework to detect
properly for EFI resets as for some reason this makes the whole thing hangs otherwise…
RaitoBezarius added a commit that referenced this pull request Oct 30, 2023
This uses the systemd semantics for automatic enrollment at boot time.

For now, it is very simple, in the future, we can better use this option to push
the proper auth files with names or have Type #1 entries for enrollment. :)

This PR relies on unreleased commits in nixpkgs for the testing framework to detect
properly for EFI resets as for some reason this makes the whole thing hangs otherwise…
RaitoBezarius added a commit that referenced this pull request Oct 30, 2023
This uses the systemd semantics for automatic enrollment at boot time.

For now, it is very simple, in the future, we can better use this option to push
the proper auth files with names or have Type #1 entries for enrollment. :)

This PR relies on unreleased commits in nixpkgs for the testing framework to detect
properly for EFI resets as for some reason this makes the whole thing hangs otherwise…
RaitoBezarius added a commit that referenced this pull request Feb 11, 2024
This uses the systemd semantics for automatic enrollment at boot time.

For now, it is very simple, in the future, we can better use this option to push
the proper auth files with names or have Type #1 entries for enrollment. :)
RaitoBezarius added a commit that referenced this pull request Feb 11, 2024
This uses the systemd semantics for automatic enrollment at boot time.

For now, it is very simple, in the future, we can better use this option to push
the proper auth files with names or have Type #1 entries for enrollment. :)
RaitoBezarius added a commit that referenced this pull request Feb 11, 2024
This uses the systemd semantics for automatic enrollment at boot time.

For now, it is very simple, in the future, we can better use this option to push
the proper auth files with names or have Type #1 entries for enrollment. :)
RaitoBezarius added a commit that referenced this pull request Feb 11, 2024
This uses the systemd semantics for automatic enrollment at boot time.

For now, it is very simple, in the future, we can better use this option to push
the proper auth files with names or have Type #1 entries for enrollment. :)
RaitoBezarius added a commit that referenced this pull request Feb 11, 2024
This uses the systemd semantics for automatic enrollment at boot time.

For now, it is very simple, in the future, we can better use this option to push
the proper auth files with names or have Type #1 entries for enrollment. :)
@CertainLach CertainLach mentioned this pull request Aug 29, 2024
5 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants