anchor_bucket: - "#!/bin/sh\nif [ -f /etc/apt/apt.conf.d/20auto-upgrades ] ; then\n echo \"Disabling\ \ automatic security updates...\";\n /bin/sed -i 's/\"1\"/\"0\"/g' /etc/apt/apt.conf.d/20auto-upgrades;\n\ \ echo \"Done.\";\nfi;\n" - '#!/bin/sh echo "Setting up sudoers..."; echo "ubuntu ALL=(ALL) NOPASSWD: ALL" >> /etc/sudoers.d/maas ; chmod 0440 /etc/sudoers.d/maas; echo "Done."; ' - echo "Installing certfication tools..."; echo " Running apt-get update..."; apt-get update; echo " Installing checkbox certification..."; apt-get install -y --allow-unauthenticated canonical-certification-server sendmail; apt-get install dmidecode; sleep 60; echo "Done."; - "#!/bin/sh\necho \"Setting up to use KVM image on MAAS server...\";\n. /etc/lsb-release;\n\ arch=$(dpkg --print-architecture);\nmaas_ip=$(/sbin/ip route | awk '/default/ {\ \ print $3 }');\nrm -rf /tmp/index.html;\nwget -P /tmp/ http://$maas_ip/cloud/;\n\ if [ \"$arch\" = \"arm64\" ] || [ \"$arch\" = \"armhf\" ] ; then\n filename_pattern=\"\ server-cloudimg-$arch.tar.gz\";\nelse\n filename_pattern=\"server-cloudimg-$arch(-disk1)?.img\"\ ;\nfi\nfilename_line=$(egrep \"$DISTRIB_CODENAME-$filename_pattern\" /tmp/index.html\ \ | head -n 1);\nif [ ! -z \"$filename_line\" ] ; then\n filename=$(echo $filename_line\ \ | grep -Po '(?<=href=\")[^\"]*(?=\")');\nelse\n filename_line=$(egrep \"$filename_pattern\"\ \ /tmp/index.html | head -n 1);\n filename=$(echo $filename_line | grep -Po '(?<=href=\"\ )[^\"]*(?=\")');\nfi;\nif [ ! -z \"$filename\" ] ; then\n sed -i \"s/#KVM_TIMEOUT/KVM_TIMEOUT/g\"\ \ /etc/xdg/canonical-certification.conf;\n sed -i \"s/#KVM_IMAGE = \\/path\\\ /to\\/cloudimage-filename.img/KVM_IMAGE = http:\\/\\/$maas_ip\\/cloud\\/$filename/g\"\ \ /etc/xdg/canonical-certification.conf;\nfi;\nrm -f /tmp/index.html;\n" - "#!/bin/sh\necho \"Setting up to use LXD images on MAAS server...\";\n. /etc/lsb-release;\n\ arch=$(dpkg --print-architecture);\nmaas_ip=$(/sbin/ip route | awk '/default/ {\ \ print $3 }');\nrm -rf /tmp/index.html;\nwget -P /tmp/ http://$maas_ip/cloud/;\n\ template_line=$(egrep \"$DISTRIB_CODENAME-server-cloudimg-$arch-lxd.tar.xz\" /tmp/index.html\ \ | head -n 1);\nif [ ! -z \"$template_line\" ] ; then\n templatefile=$(echo\ \ $template_line | grep -Po '(?<=href=\")[^\"]*(?=\")');\n echo \"Setting template\ \ file to: $templatefile\";\nfi;\nrootfs_line=$(egrep \"$DISTRIB_CODENAME-server-cloudimg-$arch\"\ \ /tmp/index.html | egrep \"root|squashfs\" | head -n 1);\nif [ ! -z \"$rootfs_line\"\ \ ] ; then\n rootfsfile=$(echo $rootfs_line | grep -Po '(?<=href=\")[^\"]*(?=\"\ )');\n echo \"Setting rootfs file to: $rootfsfile\";\nfi;\nif [ ! -z \"$templatefile\"\ \ ] && [ ! -z \"$rootfsfile\" ]; then\n sed -i \"s/#LXD_ROOTFS = http:\\/\\/server_url\\\ /path\\/to\\/bionic-server-cloudimg-amd64.squashfs/LXD_ROOTFS = http:\\/\\/$maas_ip\\\ /cloud\\/$rootfsfile/g\" /etc/xdg/canonical-certification.conf;\n sed -i \"s/#LXD_TEMPLATE\ \ = http:\\/\\/server_url\\/path\\/to\\/bionic-server-cloudimg-amd64-lxd.tar.xz/LXD_TEMPLATE\ \ = http:\\/\\/$maas_ip\\/cloud\\/$templatefile/g\" /etc/xdg/canonical-certification.conf;\n\ fi;\nrm -f /tmp/index.html;\n" - echo "Setting up iperf..."; /bin/sed -i '/^#TEST_TARGET_FTP /s/^#//' /etc/xdg/canonical-certification.conf; /bin/sed -i '/^#TEST_USER /s/^#//' /etc/xdg/canonical-certification.conf; /bin/sed -i '/^#TEST_PASS /s/^#//' /etc/xdg/canonical-certification.conf; /bin/sed -i '/^#TEST_TARGET_IPERF /s/^#//' /etc/xdg/canonical-certification.conf; if [ "gateway" = "gateway" ] ; then maas_ip=$(/sbin/ip route | awk '/default/ { print $3 }'); sed -i 's/ your-iperf-server.example.com/'"$maas_ip"'/g' /etc/xdg/canonical-certification.conf; else sed -i 's/ your-iperf-server.example.com/gateway/g' /etc/xdg/canonical-certification.conf; fi; echo "Done."; - '#!/bin/sh echo "Setting ubuntu password..." echo "#cloud-config\nsystem_info:\n default_user:\n lock_passwd: False\n plain_text_passwd: ''ubuntu''" > /etc/cloud/cloud.cfg.d/ubuntu-user-defaults.cfg echo "Done."; ' - "# This script is looking for the SecureID in the following syntax as a tag in MAAS:\ \ secure_id-a00d000000abcde\n#!/bin/sh\nIFS=,\nfor i in `echo '['secure_id-a00D000000dpNfPIAU']'`\n\ \ do\n if echo $i |grep -q \"secure_id-\"\n then secureid=$(echo $i|awk -F\ \ 'secure_id-' '{print $2}'|sed -e 's/\\[//g;s/\\]//g')\n sudo sed -i \"s/#\\\ [transport:c3\\]/\\[transport:c3\\]/g\" /etc/xdg/canonical-certification.conf\n\ \ sudo sed -i \"s/#secure_id =.*/secure_id = $secureid/g\" /etc/xdg/canonical-certification.conf\n\ \ fi\ndone;\nsleep 5;\n" apt: preserve_sources_list: false primary: - arches: - default uri: http://nessus.rodsbooks.com/ubuntu proxy: http://172.24.124.2:8000/ security: - arches: - default uri: http://nessus.rodsbooks.com/ubuntu sources: firmware_test_suite_-_stable_4: key: '-----BEGIN PGP PUBLIC KEY BLOCK----- Version: SKS 1.1.6 Comment: Hostname: keyserver.ubuntu.com mI0ETBoYMQEEANoh7yVnJlADmjMatYKmCOw3u3BUB/G/bQQbdOVq73oFIYdVtfmF142tcQUh TunPcbSQIGHh5U8KoCoet5pyzRnOX5w+/yMfIrF5Lptk5/HUQ8+JbZJcOV06uhoZ7UADzZ33 9A4RlYIKU/KB2wgpPFx2vkr4uj7rWIX+6QzlZ5ZTABEBAAG0HUxhdW5jaHBhZCBGaXJtd2Fy ZSBUZXN0IFN1aXRliLYEEwECACAFAkwaGDECGwMGCwkIBwMCBBUCCAMEFgIDAQIeAQIXgAAK CRCh4rCSDDLnxtyKBADZj9SDBZtr3oVwl6lOjBp6fenPVruxnoEWUNDZ2YrccSeqje1NrACE qBVICuW5JINuTzBTAJepQjz2RgNhsC8/E95P2hWMjrQFtz4GsMBXdi2mxVNE4yVBjBpm2lvn +gjQ9O7Ii8/oQ287mQLrW7IbUUXBF0PmOI2zXopEV2agNA== =jZn4 -----END PGP PUBLIC KEY BLOCK-----' source: ppa:firmware-testing-team/ppa-fwts-stable hardware_certification_-_development_5: key: '-----BEGIN PGP PUBLIC KEY BLOCK----- Version: SKS 1.1.6 Comment: Hostname: keyserver.ubuntu.com mI0ESZRIGAEEALihBkS1+WPsmLIq/y9i1Gc5vyPy7dqJVUscP38cjFsCnG8O+4FeP6mD/uJf VNBTcR3NjQ1jxwLISaIKndGu4J6n8xVPLWb/sesYy75WjgwUKC5lQnA61UElBm4AJfydKOob WTMq2X4Gw71+uwtjdnujn3uJGYDmrARHYCkAT7snABEBAAG0JUxhdW5jaHBhZCBQUEEgZm9y IENoZWNrYm94IERldmVsb3BlcnOItgQTAQIAIAUCSZRIGAIbAwYLCQgHAwIEFQIIAwQWAgMB Ah4BAheAAAoJEBtLay0rvfK9XKAEAJqorKQxdRidJTxMEirFmhaVD9plAqO/5uNXYFsVU0kS EEsk5Ps4F4lvLqWoupbPHuha6ngtNJf5HFNoCivFWSLawTA4tfF9RGuPozDHEpTbdLPqfpOK pFd1I9KMiGEhzCrQDp8cYjZkdMDEPsO9A87S5BxpB9rwBj9cnYnpvbw5 =JBdy -----END PGP PUBLIC KEY BLOCK-----' source: ppa:checkbox-dev/ppa cloudconfig: maas-cloud-config: content: "#cloud-config\ndatasource:\n MAAS: {consumer_key: AqRAZRAbbDRQ3v4qEJ,\ \ metadata_url: 'http://172.24.124.2:5240/MAAS/metadata/',\n token_key: yHym8yLHTLUxZLmkfm,\ \ token_secret: yy3JMHmmyyRzubsZHd8DesRcqhnR2cXa}\n" path: /etc/cloud/cloud.cfg.d/90_maas_cloud_config.cfg maas-datasource: content: 'datasource_list: [ MAAS ]' path: /etc/cloud/cloud.cfg.d/90_maas_datasource.cfg maas-reporting: content: "#cloud-config\nreporting:\n maas: {consumer_key: AqRAZRAbbDRQ3v4qEJ,\ \ endpoint: 'http://172.24.124.2:5240/MAAS/metadata/status/sxm6cd',\n token_key:\ \ yHym8yLHTLUxZLmkfm, token_secret: yy3JMHmmyyRzubsZHd8DesRcqhnR2cXa,\n type:\ \ webhook}\n" path: /etc/cloud/cloud.cfg.d/90_maas_cloud_init_reporting.cfg maas-ubuntu-sso: content: '#cloud-config snappy: {email: maas-admin@example.com} ' path: /etc/cloud/cloud.cfg.d/90_maas_ubuntu_sso.cfg debconf_selections: grub2: grub2 grub2/update_nvram boolean false maas: 'cloud-init cloud-init/datasources multiselect MAAS cloud-init cloud-init/maas-metadata-url string http://172.24.124.2:5240/MAAS/metadata/ cloud-init cloud-init/maas-metadata-credentials string oauth_consumer_key=AqRAZRAbbDRQ3v4qEJ&oauth_token_key=yHym8yLHTLUxZLmkfm&oauth_token_secret=yy3JMHmmyyRzubsZHd8DesRcqhnR2cXa cloud-init cloud-init/local-cloud-config string apt:\n preserve_sources_list: false\n primary:\n - arches: [default]\n uri: http://nessus.rodsbooks.com/ubuntu\n proxy: http://172.24.124.2:8000/\n security:\n - arches: [default]\n uri: http://nessus.rodsbooks.com/ubuntu\n sources:\n firmware_test_suite_-_stable_4: {key: ''-----BEGIN PGP PUBLIC KEY BLOCK-----\n\n Version: SKS 1.1.6\n\n Comment: Hostname: keyserver.ubuntu.com\n\n\n mI0ETBoYMQEEANoh7yVnJlADmjMatYKmCOw3u3BUB/G/bQQbdOVq73oFIYdVtfmF142tcQUh\n\n TunPcbSQIGHh5U8KoCoet5pyzRnOX5w+/yMfIrF5Lptk5/HUQ8+JbZJcOV06uhoZ7UADzZ33\n\n 9A4RlYIKU/KB2wgpPFx2vkr4uj7rWIX+6QzlZ5ZTABEBAAG0HUxhdW5jaHBhZCBGaXJtd2Fy\n\n ZSBUZXN0IFN1aXRliLYEEwECACAFAkwaGDECGwMGCwkIBwMCBBUCCAMEFgIDAQIeAQIXgAAK\n\n CRCh4rCSDDLnxtyKBADZj9SDBZtr3oVwl6lOjBp6fenPVruxnoEWUNDZ2YrccSeqje1NrACE\n\n qBVICuW5JINuTzBTAJepQjz2RgNhsC8/E95P2hWMjrQFtz4GsMBXdi2mxVNE4yVBjBpm2lvn\n\n +gjQ9O7Ii8/oQ287mQLrW7IbUUXBF0PmOI2zXopEV2agNA==\n\n =jZn4\n\n -----END PGP PUBLIC KEY BLOCK-----'', source: ''ppa:firmware-testing-team/ppa-fwts-stable''}\n hardware_certification_-_development_5: {key: ''-----BEGIN PGP PUBLIC KEY BLOCK-----\n\n Version: SKS 1.1.6\n\n Comment: Hostname: keyserver.ubuntu.com\n\n\n mI0ESZRIGAEEALihBkS1+WPsmLIq/y9i1Gc5vyPy7dqJVUscP38cjFsCnG8O+4FeP6mD/uJf\n\n VNBTcR3NjQ1jxwLISaIKndGu4J6n8xVPLWb/sesYy75WjgwUKC5lQnA61UElBm4AJfydKOob\n\n WTMq2X4Gw71+uwtjdnujn3uJGYDmrARHYCkAT7snABEBAAG0JUxhdW5jaHBhZCBQUEEgZm9y\n\n IENoZWNrYm94IERldmVsb3BlcnOItgQTAQIAIAUCSZRIGAIbAwYLCQgHAwIEFQIIAwQWAgMB\n\n Ah4BAheAAAoJEBtLay0rvfK9XKAEAJqorKQxdRidJTxMEirFmhaVD9plAqO/5uNXYFsVU0kS\n\n EEsk5Ps4F4lvLqWoupbPHuha6ngtNJf5HFNoCivFWSLawTA4tfF9RGuPozDHEpTbdLPqfpOK\n\n pFd1I9KMiGEhzCrQDp8cYjZkdMDEPsO9A87S5BxpB9rwBj9cnYnpvbw5\n\n =JBdy\n\n -----END PGP PUBLIC KEY BLOCK-----'', source: ''ppa:checkbox-dev/ppa''}\napt_preserve_sources_list: true\napt_proxy: http://172.24.124.2:8000/\nmanage_etc_hosts: false\nmanual_cache_clean: true\nreporting:\n maas: {consumer_key: AqRAZRAbbDRQ3v4qEJ, endpoint: ''http://172.24.124.2:5240/MAAS/metadata/status/sxm6cd'',\n token_key: yHym8yLHTLUxZLmkfm, token_secret: yy3JMHmmyyRzubsZHd8DesRcqhnR2cXa,\n type: webhook}\nsystem_info:\n package_mirrors:\n - arches: [i386, amd64]\n failsafe: {primary: ''http://archive.ubuntu.com/ubuntu'', security: ''http://security.ubuntu.com/ubuntu''}\n search:\n primary: [''http://nessus.rodsbooks.com/ubuntu'']\n security: [''http://nessus.rodsbooks.com/ubuntu'']\n - arches: [default]\n failsafe: {primary: ''http://ports.ubuntu.com/ubuntu-ports'', security: ''http://ports.ubuntu.com/ubuntu-ports''}\n search:\n primary: [''http://ports.ubuntu.com/ubuntu-ports'']\n security: [''http://ports.ubuntu.com/ubuntu-ports'']\n ' install: error_tarfile: /tmp/curtin-logs.tar log_file: /tmp/install.log post_files: - /tmp/install.log - /tmp/curtin-logs.tar kernel: mapping: {} package: linux-signed-generic-hwe-18.04 late_commands: maas: - wget - --no-proxy - http://172.24.124.2:5240/MAAS/metadata/latest/by-id/sxm6cd/ - --post-data - op=netboot_off - -O - /dev/null set_maas_version: - curtin - in-target - -- - sh - -c - /bin/echo 2.4.2-7034-g2f5deb8b8-0ubuntu1 > /etc/installed-by-maas zs_cert_install: - curtin - in-target - -- - sh - -c - "#!/bin/sh\nif [ -f /etc/apt/apt.conf.d/20auto-upgrades ] ; then\n echo \"\ Disabling automatic security updates...\";\n /bin/sed -i 's/\"1\"/\"0\"/g'\ \ /etc/apt/apt.conf.d/20auto-upgrades;\n echo \"Done.\";\nfi;\n" zt_cert_install: - curtin - in-target - -- - sh - -c - '#!/bin/sh echo "Setting up sudoers..."; echo "ubuntu ALL=(ALL) NOPASSWD: ALL" >> /etc/sudoers.d/maas ; chmod 0440 /etc/sudoers.d/maas; echo "Done."; ' zu_cert_install: - curtin - in-target - -- - sh - -c - echo "Installing certfication tools..."; echo " Running apt-get update..."; apt-get update; echo " Installing checkbox certification..."; apt-get install -y --allow-unauthenticated canonical-certification-server sendmail; apt-get install dmidecode; sleep 60; echo "Done."; zv_cert_install: - curtin - in-target - -- - sh - -c - "#!/bin/sh\necho \"Setting up to use KVM image on MAAS server...\";\n. /etc/lsb-release;\n\ arch=$(dpkg --print-architecture);\nmaas_ip=$(/sbin/ip route | awk '/default/\ \ { print $3 }');\nrm -rf /tmp/index.html;\nwget -P /tmp/ http://$maas_ip/cloud/;\n\ if [ \"$arch\" = \"arm64\" ] || [ \"$arch\" = \"armhf\" ] ; then\n filename_pattern=\"\ server-cloudimg-$arch.tar.gz\";\nelse\n filename_pattern=\"server-cloudimg-$arch(-disk1)?.img\"\ ;\nfi\nfilename_line=$(egrep \"$DISTRIB_CODENAME-$filename_pattern\" /tmp/index.html\ \ | head -n 1);\nif [ ! -z \"$filename_line\" ] ; then\n filename=$(echo $filename_line\ \ | grep -Po '(?<=href=\")[^\"]*(?=\")');\nelse\n filename_line=$(egrep \"\ $filename_pattern\" /tmp/index.html | head -n 1);\n filename=$(echo $filename_line\ \ | grep -Po '(?<=href=\")[^\"]*(?=\")');\nfi;\nif [ ! -z \"$filename\" ] ; then\n\ \ sed -i \"s/#KVM_TIMEOUT/KVM_TIMEOUT/g\" /etc/xdg/canonical-certification.conf;\n\ \ sed -i \"s/#KVM_IMAGE = \\/path\\/to\\/cloudimage-filename.img/KVM_IMAGE\ \ = http:\\/\\/$maas_ip\\/cloud\\/$filename/g\" /etc/xdg/canonical-certification.conf;\n\ fi;\nrm -f /tmp/index.html;\n" zw_cert_install: - curtin - in-target - -- - sh - -c - "#!/bin/sh\necho \"Setting up to use LXD images on MAAS server...\";\n. /etc/lsb-release;\n\ arch=$(dpkg --print-architecture);\nmaas_ip=$(/sbin/ip route | awk '/default/\ \ { print $3 }');\nrm -rf /tmp/index.html;\nwget -P /tmp/ http://$maas_ip/cloud/;\n\ template_line=$(egrep \"$DISTRIB_CODENAME-server-cloudimg-$arch-lxd.tar.xz\" /tmp/index.html\ \ | head -n 1);\nif [ ! -z \"$template_line\" ] ; then\n templatefile=$(echo\ \ $template_line | grep -Po '(?<=href=\")[^\"]*(?=\")');\n echo \"Setting template\ \ file to: $templatefile\";\nfi;\nrootfs_line=$(egrep \"$DISTRIB_CODENAME-server-cloudimg-$arch\"\ \ /tmp/index.html | egrep \"root|squashfs\" | head -n 1);\nif [ ! -z \"$rootfs_line\"\ \ ] ; then\n rootfsfile=$(echo $rootfs_line | grep -Po '(?<=href=\")[^\"]*(?=\"\ )');\n echo \"Setting rootfs file to: $rootfsfile\";\nfi;\nif [ ! -z \"$templatefile\"\ \ ] && [ ! -z \"$rootfsfile\" ]; then\n sed -i \"s/#LXD_ROOTFS = http:\\/\\\ /server_url\\/path\\/to\\/bionic-server-cloudimg-amd64.squashfs/LXD_ROOTFS = http:\\\ /\\/$maas_ip\\/cloud\\/$rootfsfile/g\" /etc/xdg/canonical-certification.conf;\n\ \ sed -i \"s/#LXD_TEMPLATE = http:\\/\\/server_url\\/path\\/to\\/bionic-server-cloudimg-amd64-lxd.tar.xz/LXD_TEMPLATE\ \ = http:\\/\\/$maas_ip\\/cloud\\/$templatefile/g\" /etc/xdg/canonical-certification.conf;\n\ fi;\nrm -f /tmp/index.html;\n" zx_cert_install: - curtin - in-target - -- - sh - -c - echo "Setting up iperf..."; /bin/sed -i '/^#TEST_TARGET_FTP /s/^#//' /etc/xdg/canonical-certification.conf; /bin/sed -i '/^#TEST_USER /s/^#//' /etc/xdg/canonical-certification.conf; /bin/sed -i '/^#TEST_PASS /s/^#//' /etc/xdg/canonical-certification.conf; /bin/sed -i '/^#TEST_TARGET_IPERF /s/^#//' /etc/xdg/canonical-certification.conf; if [ "gateway" = "gateway" ] ; then maas_ip=$(/sbin/ip route | awk '/default/ { print $3 }'); sed -i 's/ your-iperf-server.example.com/'"$maas_ip"'/g' /etc/xdg/canonical-certification.conf; else sed -i 's/ your-iperf-server.example.com/gateway/g' /etc/xdg/canonical-certification.conf; fi; echo "Done."; zy_cert_install: - curtin - in-target - -- - sh - -c - '#!/bin/sh echo "Setting ubuntu password..." echo "#cloud-config\nsystem_info:\n default_user:\n lock_passwd: False\n plain_text_passwd: ''ubuntu''" > /etc/cloud/cloud.cfg.d/ubuntu-user-defaults.cfg echo "Done."; ' zz_cert_install: - curtin - in-target - -- - sh - -c - "# This script is looking for the SecureID in the following syntax as a tag in\ \ MAAS: secure_id-a00d000000abcde\n#!/bin/sh\nIFS=,\nfor i in `echo '['secure_id-a00D000000dpNfPIAU']'`\n\ \ do\n if echo $i |grep -q \"secure_id-\"\n then secureid=$(echo $i|awk\ \ -F 'secure_id-' '{print $2}'|sed -e 's/\\[//g;s/\\]//g')\n sudo sed -i \"\ s/#\\[transport:c3\\]/\\[transport:c3\\]/g\" /etc/xdg/canonical-certification.conf\n\ \ sudo sed -i \"s/#secure_id =.*/secure_id = $secureid/g\" /etc/xdg/canonical-certification.conf\n\ \ fi\ndone;\nsleep 5;\n" network: config: - id: eno1 mac_address: ec:a8:6b:ff:33:ad mtu: 1500 name: eno1 subnets: - address: 172.24.126.9/22 gateway: 172.24.124.2 type: static type: physical - address: - 172.24.124.2 search: - maas type: nameserver version: 1 network_commands: builtin: - curtin - net-meta - custom partitioning_commands: builtin: - curtin - block-meta - custom reporting: maas: consumer_key: AqRAZRAbbDRQ3v4qEJ endpoint: http://172.24.124.2:5240/MAAS/metadata/status/sxm6cd token_key: yHym8yLHTLUxZLmkfm token_secret: yy3JMHmmyyRzubsZHd8DesRcqhnR2cXa type: webhook showtrace: true storage: config: - grub_device: true id: sda model: C400-MTFDDAT064M name: sda ptable: gpt serial: MSA1727018J type: disk wipe: superblock - device: sda flag: boot id: sda-part1 name: sda-part1 number: 1 offset: 4194304B size: 536870912B type: partition uuid: 45741015-86bc-492b-96aa-339efcbdbd96 wipe: superblock - device: sda id: sda-part2 name: sda-part2 number: 2 size: 63480791040B type: partition uuid: cacb7fb9-a97b-469e-93db-99ceaff1d231 wipe: superblock - fstype: fat32 id: sda-part1_format label: efi type: format uuid: 6516bf1f-534c-4334-bdf0-70fda96c0439 volume: sda-part1 - fstype: ext4 id: sda-part2_format label: root type: format uuid: 561f5056-2be3-46db-a069-b7b7693577d5 volume: sda-part2 - device: sda-part2_format id: sda-part2_mount path: / type: mount - device: sda-part1_format id: sda-part1_mount path: /boot/efi type: mount version: 1 verbosity: 3