Fix readme typos

This commit is contained in:
badblocks 2025-04-16 16:41:55 -07:00
parent 87bacc5c35
commit b0f8ae9160

View file

@ -1,4 +1,4 @@
# ublue-custom   [![bluebuild build badge](https://github.com/badbl0cks/ublue-custom/actions/workflows/build.yml/badge.svg)](https://github.com/badbl0cks/ublue-custom/actions/workflows/build.yml) # ublue-custom   [![bluebuild build badge](https://github.com/badbl0cks/bazzite-custom/actions/workflows/build.yml/badge.svg)](https://github.com/badbl0cks/bazzite-custom/actions/workflows/build.yml)
See the [BlueBuild docs](https://blue-build.org/how-to/setup/) for quick setup instructions for setting up your own repository based on this template. See the [BlueBuild docs](https://blue-build.org/how-to/setup/) for quick setup instructions for setting up your own repository based on this template.
@ -13,7 +13,7 @@ To rebase an existing atomic Fedora installation to the latest build:
- First rebase to the unsigned image, to get the proper signing keys and policies installed: - First rebase to the unsigned image, to get the proper signing keys and policies installed:
``` ```
rpm-ostree rebase ostree-unverified-registry:ghcr.io/badbl0cks/ublue-custom:latest rpm-ostree rebase ostree-unverified-registry:ghcr.io/badbl0cks/bazzite-custom:latest
``` ```
- Reboot to complete the rebase: - Reboot to complete the rebase:
``` ```
@ -21,7 +21,7 @@ To rebase an existing atomic Fedora installation to the latest build:
``` ```
- Then rebase to the signed image, like so: - Then rebase to the signed image, like so:
``` ```
rpm-ostree rebase ostree-image-signed:docker://ghcr.io/badbl0cks/ublue-custom:latest rpm-ostree rebase ostree-image-signed:docker://ghcr.io/badbl0cks/bazzite-custom:latest
``` ```
- Reboot again to complete the installation - Reboot again to complete the installation
``` ```
@ -39,5 +39,5 @@ If build on Fedora Atomic, you can generate an offline ISO with the instructions
These images are signed with [Sigstore](https://www.sigstore.dev/)'s [cosign](https://github.com/sigstore/cosign). You can verify the signature by downloading the `cosign.pub` file from this repo and running the following command: These images are signed with [Sigstore](https://www.sigstore.dev/)'s [cosign](https://github.com/sigstore/cosign). You can verify the signature by downloading the `cosign.pub` file from this repo and running the following command:
```bash ```bash
cosign verify --key cosign.pub ghcr.io/badbl0cks/ublue-custom cosign verify --key cosign.pub ghcr.io/badbl0cks/bazzite-custom
``` ```