📄️ Bootloader Configuration
For installation and updating, Trident creates and modifies the bootloader of
📄️ Clean Install Safety Check
When trident install is invoked, Trident ensures that it is running from either ramdisk or live media. This is an important safeguard and keeps Trident from overwriting the operating system that Trident is running in.
📄️ Confexts
Confexts (configuration extension images) allow users to extend the base OS filesystem
📄️ Deployment Chroot
When Trident is deploying a target OS, it will mount the target OS's file
📄️ Health Checks
Health checks have been implemented to enable customers to define whether a
📄️ Host Configuration Validation
The Trident binary can validate the syntax and structure of a Host Configuration
📄️ How Trident Consumes COSI
Trident uses a Composable Operating System Image (COSI)
📄️ How Trident Knows What to Do
<!--
📄️ Install Flow
Install Flow
📄️ Limitations of NTFS
Background
📄️ Multiboot
Trident supports installing multiple operating systems on the same device. This
📄️ Network Configuration
Trident uses netplan to configure the network on the
📄️ Offline Initialize
To enable update, Trident requires some state related to how an existing operating system is laid out on disk.
📄️ Operations
In addition to running trident install and trident update fully to
📄️ Partition Adoption
When Trident installs or services an operating system, there are times when
📄️ Partition Size Recommendations
This document provides recommendations for partition sizes in your Trident Host
📄️ Rebuild RAID
RAID and Rebuild-RAID
📄️ Root-Verity
Root data integrity verification, or root-verity, is a specific utilization
📄️ SELinux Configuration
SELinux is an access control system on
📄️ Script Hooks
Trident allows for users to run [custom
📄️ Sysexts
Sysexts (system extension images) allow users to extend the base OS filesystem
📄️ Trident Architecture
<!--
📄️ UEFI Fallback
UEFI provides a mechanism for booting from an EFI file without a corresponding
📄️ UEFI Variables
Trident uses UEFI variables to manage a machine's boot process. There are
📄️ Usr-Verity
Usr data integrity verification, or usr-verity, is a specific utilization