cloud-initramfs-tools 0.48 source package in Ubuntu
Changelog
cloud-initramfs-tools (0.48) noble; urgency=medium [ Brian Murray ] * debian/control Fix a typo. [ grozzly ] * overlayroot: add 'nofail' to the list of inherited mount options (LP: #2049271) [ Paride Legovini ] * d/copyright: fix duplicate globbing pattern * d/copyright: use secure (https) Format URI * d/copyright: trim trailing whitespaces * d/control: specify Rules-Requires-Root: no * d/control: switch to dh compat level 13 via debhelper-compat. No changes needed. * d/copyright: coalesce identically licensed debian/ stanzas * d/copyright: add Canonical Ltd. to the debian/* stanza * d/control: bump Standards-Version to 4.6.2 (no changes needed) * d/cloud-initramfs-copymods.l-o: override empty directory warning. The empty directory is created on purpose. -- Paride Legovini <email address hidden> Fri, 26 Jan 2024 11:49:48 +0100
Upload details
- Uploaded by:
- Paride Legovini
- Uploaded to:
- Noble
- Original maintainer:
- Scott Moser
- Architectures:
- all
- Section:
- admin
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Noble | release | main | admin |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
cloud-initramfs-tools_0.48.tar.xz | 41.0 KiB | 1a86958fe57cd9a911e704d2407c1f926eedd95a07918f693d966f514f5a459a |
cloud-initramfs-tools_0.48.dsc | 1.7 KiB | 1f412bdd4f11494d417272eec33894b5a4fa0eee223c11aeeee2891bfe94f510 |
Available diffs
- diff from 0.47ubuntu1 to 0.48 (2.1 KiB)
Binary packages built by this source
- cloud-initramfs-copymods: copy initramfs modules into root filesystem for later use
When booting with an external-to-root kernel and initramfs, you need
to ensure that /lib/modules contains any necessary modules not already
loaded.
.
This package arranges for the modules in the initramfs to be placed
into /lib/modules after the switchroot is done.
- cloud-initramfs-dyn-netconf: write a network interface file in /run for BOOTIF
This package provides an initramfs module that will write a simple
network interfaces formatted file to /run/network/interfaces with
entries for any devices that were configured during initramfs.
- cloud-initramfs-growroot: automatically resize the root partition on first boot
This package adds functionality to an initramfs built by initramfs-tools.
When installed, the initramfs will repartition a disk to make the
root volume consume all space that follows it.
.
You most likely do not want this package unless you know what you are
doing. It is primarily interesting in a virtualized environment when
a disk can be provisioned with a size larger than its original size.
In this case, with this package installed, you can automatically use
the new space without requiring a reboot to re-read the partition table.
- cloud-initramfs-rescuevol: boot off a rescue volume rather than root filesystem
This package adds functionality to an initramfs built by initramfs-tools.
When installed the initramfs will check to see if any partitions
with a label of 'RESCUE_VOL' are attached. If such a volume is attached,
it will boot off that volume rather than the root volume.
.
This is useful in a cloud environment, when the user is able to attach
and detach volumes to a running system, but has no other mechanism
for interrupting of fixing a failed boot. It is analogous to inserting
a rescue CD into a system to recover from failure.
- cloud-initramfs-rooturl: use a tarball or squashfs image in a url as the root filesystem
Allows user to pass in root=http://
example. com/your. tar.gz
Root filesystem will be tmpfs from that url.
- cloud-initramfs-updateroot: extract a tarball over root filesystem before pivot
Allows kernel command line updateroot=http://
your.tar. gz
And then tarball will be pulled and extracted over the root.
- overlayroot: use an overlayfs on top of a read-only root filesystem
This package adds functionality to an initramfs built by initramfs-tools.
When installed and configured, the initramfs will mount an overlayfs
filesystem on top of a read-only root volume.
.
The changes can be written to a in-memory temporary filesystem, a
filesystem on an existing block device, or a dmcrypt encrypted block
device.