LogoopenSUSE Build Service > Projects
Sign Up | Log In

View File root.obscpio of Package SLE-11-JeOS (Project SUSE:Templates:Images:SLE-11-SP4)

070701007E8462000041ED000003E8000000640000000459DCCCB600000000000000080000000200000000000000000000000500000000root070701007E8464000041ED000003E8000000640000000759DCCCB600000000000000080000000200000000000000000000000900000000root/etc070701007E846A000041ED000003E8000000640000000259DCCCB600000000000000080000000200000000000000000000001000000000root/etc/init.d070701007E3581000081ED000003E8000000640000000159DCCCB60000029F000000080000000200000000000000000000001B00000000root/etc/init.d/boot.local#! /bin/sh
#
# Copyright (c) 2002 SuSE Linux AG Nuernberg, Germany.  All rights reserved.
#
# Author: Werner Fink <werner@suse.de>, 1996
#         Burchard Steinbild, 1996
#
# /etc/init.d/boot.local
#
# script with local commands to be executed from init on system startup
#
# Here you should add things, that should happen directly after booting
# before we're going to the first run level.
#

# Execute user-provided boot script, if it exists
if [ -x /studio/suse-studio-custom ]; then
  /studio/suse-studio-custom
fi

# Execute the SUSE Studio first boot script, if it exists
if [ -f /etc/init.d/suse_studio_firstboot ]; then
  sh /etc/init.d/suse_studio_firstboot
fi
070701007E358D000081A4000003E8000000640000000159DCCCB600001079000000080000000200000000000000000000002600000000root/etc/init.d/suse_studio_firstboot# This script is called from /etc/init.d/boot.local. It is intended to run
# only on first boot so it deletes itself after running.

LICENSE_FILE=/etc/YaST2/licenses/license.txt

# ===========================================
# Enable/disable evtouch based on testdrive
# -------------------------------------------

# Fix our xorg.conf.testdrive according to the local keyboard settings
setup_keyboard() {
  # Because we're running before the keyboard selection, we need to hack into the
  # kdb script and do the replacement there. Once we did it, let's restore the
  # original script
  cp /etc/init.d/kbd{,.bkp}
  sed -i "s/rc_exit//" /etc/init.d/kbd
  cat >> /etc/init.d/kbd <<-'EOF'
    if [ -f /etc/X11/xorg.conf -a -x /usr/sbin/sysp ]; then
      echo -n "  -> Setting keyboard layout..."
      /usr/sbin/sysp -s keyboard &> /dev/null
      MODEL=$(/usr/sbin/sysp -q keyboard | grep XkbModel | sed 's/.*: //')
      LAYOUT=$(/usr/sbin/sysp -q keyboard | grep XkbLayout | sed 's/.*: //')
      VARIANT=$(/usr/sbin/sysp -q keyboard | grep XkbVariant | sed 's/.*: //')
      sed -i "s/{XKBLAYOUT}/$LAYOUT/;s/{XKBMODEL}/$MODEL/;s/{XKBVARIANT}/$VARIANT/" /etc/X11/xorg.conf
      echo "done"
    fi
    mv /etc/init.d/kbd{.bkp,}
    rc_exit
EOF
}

# Use the evtouch driver when in testdrive so that the mouse cursor works properly.
setup_evtouch() {
  # use xorg.conf.testdrive
  if [ -f /etc/X11/xorg.conf.testdrive ]; then
    echo -n "  -> Copying '/etc/X11/xorg.conf.testdrive' to '/etc/X11/xorg.conf'... "
    if [ -f /etc/X11/xorg.conf ]; then
      cp /etc/X11/xorg.conf /etc/X11/xorg.conf.tdsave
    fi
    cp /etc/X11/xorg.conf.testdrive /etc/X11/xorg.conf
    echo "done"
  else
    echo "  -> WARNING: '/etc/X11/xorg.conf.testdrive' not found! X startup may fail."
  fi
}

# Run sax2 to setup xorg.conf if it's not already there and we are not in 
# testdrive.
run_sax2() {
  if [ ! -f /etc/X11/xorg.conf ]; then
    echo -n "  -> Running sax2 to generate X configuration... "
    /usr/sbin/sax2 -c 0 -a -i -r &>/dev/null
    echo "done"
  fi
  chvt 1 # Seems like sax2 should do this, but it doesn't.
}

# ===========================================
# Expire passwords based on testdrive 
# -------------------------------------------

# Expire root and custom user passwords on first login when not in testdrive.
# For security.
expire_passwords() {
  for user in root; do
    echo "  -> Expiring password for user '$user'"
    passwd -e -q $user
  done
}

# ============================================
# Prompt for EULA acceptance if on SLE
# --------------------------------------------
if cat /etc/SuSE-release | grep "Enterprise" &>/dev/null && [ -f $LICENSE_FILE ]; then
  stty -nl ixon ignbrk -brkint

  if [ `uname -m` == "s390x" ]; then
    cat $LICENSE_FILE
  else
    less $LICENSE_FILE 2>/dev/null || more $LICENSE_FILE 2>/dev/null || cat $LICENSE_FILE
  fi

  until [ "$answer" == "y" ] || [ "$answer" == "Y" ];
  do
    echo -n "Do you accept the EULA? [y/N] "
    read -e answer
    if [ "$answer" == "n" ] || [ "$answer" == "N" ];then
      halt
    fi
  done
fi

# ===========================================
# Check if we are in testdrive 
# -------------------------------------------

echo -n "Checking if we are in SUSE Studio TestDrive... "
# FIXME surely there's a better way to check if we are in testdrive?
# FIXME: We should detect testdrive for s390 and handle networking, 779053#c9
if dmesg | grep -q "DMI: SUSE Studio Testdrive"; then
    echo "yes"
    setup_keyboard
    setup_evtouch
    sed -i 's|HWCLOCK="--localtime"|HWCLOCK="-u"|g' etc/sysconfig/clock;
    # Force DHCP for all testdrive runs
    sed -i '/^STARTMODE/c STARTMODE=auto' etc/sysconfig/network/ifcfg-eth0
    sed -i '/^BOOTPROTO/c BOOTPROTO=dhcp' etc/sysconfig/network/ifcfg-eth0
    sed -i '/^IPADDR/c IPADDR=' etc/sysconfig/network/ifcfg-eth0
    sed -i '/^NETMASK/c NETMASK=' etc/sysconfig/network/ifcfg-eth0
else
    echo "no"
    if [ `uname -m` != "s390x" ]; then
        run_sax2
    fi
    ## DISABLED FOR NOW (see https://bugzilla.novell.com/show_bug.cgi?id=419469) 
    #expire_passwords
fi 

# delete itself, as we only need this to run on first boot
rm -f /etc/init.d/suse_studio_firstboot

070701007E8469000041ED000003E8000000640000000259DCCCB600000000000000080000000200000000000000000000000D00000000root/etc/X11070701007E8467000041ED000003E8000000640000000359DCCCB600000000000000080000000200000000000000000000000E00000000root/etc/udev070701007E8468000041ED000003E8000000640000000259DCCCB600000000000000080000000200000000000000000000001600000000root/etc/udev/rules.d070701007E357F000081A4000003E8000000640000000159DCCCB600000BA5000000080000000200000000000000000000001100000000root/etc/inittab#
# /etc/inittab
#
# Copyright (c) 1996-2002 SuSE Linux AG, Nuernberg, Germany.  All rights reserved.
#
# Author: Florian La Roche, 1996
# Please send feedback to http://www.suse.de/feedback
#
# This is the main configuration file of /sbin/init, which
# is executed by the kernel on startup. It describes what
# scripts are used for the different run-levels.
#
# All scripts for runlevel changes are in /etc/init.d/.
#
# This file may be modified by SuSEconfig unless CHECK_INITTAB
# in /etc/sysconfig/suseconfig is set to "no"
#

# The default runlevel is defined here
id:3:initdefault:

# First script to be executed, if not booting in emergency (-b) mode
si::bootwait:/etc/init.d/boot

# /etc/init.d/rc takes care of runlevel handling
#
# runlevel 0  is  System halt   (Do not use this for initdefault!)
# runlevel 1  is  Single user mode
# runlevel 2  is  Local multiuser without remote network (e.g. NFS)
# runlevel 3  is  Full multiuser with network
# runlevel 4  is  Not used
# runlevel 5  is  Full multiuser with network and xdm
# runlevel 6  is  System reboot (Do not use this for initdefault!)
#
l0:0:wait:/etc/init.d/rc 0
l1:1:wait:/etc/init.d/rc 1
l2:2:wait:/etc/init.d/rc 2
l3:3:wait:/etc/init.d/rc 3
#l4:4:wait:/etc/init.d/rc 4
l5:5:wait:/etc/init.d/rc 5
l6:6:wait:/etc/init.d/rc 6

# what to do in single-user mode
ls:S:wait:/etc/init.d/rc S
~~:S:respawn:/sbin/sulogin

# what to do when CTRL-ALT-DEL is pressed
ca::ctrlaltdel:/sbin/shutdown -r -t 4 now

# special keyboard request (Alt-UpArrow)
# look into the kbd-0.90 docs for this
kb::kbrequest:/bin/echo "Keyboard Request -- edit /etc/inittab to let this work."

# what to do when power fails/returns
pf::powerwait:/etc/init.d/powerfail start
pn::powerfailnow:/etc/init.d/powerfail now
#pn::powerfail:/etc/init.d/powerfail now
po::powerokwait:/etc/init.d/powerfail stop

# for ARGO UPS
sh:12345:powerfail:/sbin/shutdown -h now THE POWER IS FAILING

# getty-programs for the normal runlevels
# <id>:<runlevels>:<action>:<process>
# The "id" field  MUST be the same as the last
# characters of the device (after "tty").
1:2345:respawn:/sbin/mingetty --noclear tty1
2:2345:respawn:/sbin/mingetty tty2
3:2345:respawn:/sbin/mingetty tty3
4:2345:respawn:/sbin/mingetty tty4
5:2345:respawn:/sbin/mingetty tty5
6:2345:respawn:/sbin/mingetty tty6
#
#S0:12345:respawn:/sbin/agetty -L 9600 ttyS0 vt102
#cons:1235:respawn:/sbin/smart_agetty -L 38400 console

#
#  Note: Do not use tty7 in runlevel 3, this virtual line
#  is occupied by the programm xdm.
#

#  This is for the package xdmsc, after installing and
#  and configuration you should remove the comment character
#  from the following line:
#7:3:respawn:+/etc/init.d/rx tty7


# modem getty.
# mo:235:respawn:/usr/sbin/mgetty -s 38400 modem

# fax getty (hylafax)
# mo:35:respawn:/usr/lib/fax/faxgetty /dev/modem

# vbox (voice box) getty
# I6:35:respawn:/usr/sbin/vboxgetty -d /dev/ttyI6
# I7:35:respawn:/usr/sbin/vboxgetty -d /dev/ttyI7

# end of /etc/inittab
070701007E358E000081A4000003E8000000640000000159DCCCB60000000A000000080000000200000000000000000000001200000000root/etc/HOSTNAMElinux-tcqt070701007E8465000041ED000003E8000000640000000359DCCCB600000000000000080000000200000000000000000000000F00000000root/etc/YaST2070701007E8466000041ED000003E8000000640000000259DCCCB600000000000000080000000200000000000000000000001800000000root/etc/YaST2/licenses070701007E3580000081A4000003E8000000640000000159DCCCB600004861000000080000000200000000000000000000002400000000root/etc/YaST2/licenses/license.txtSUSE(r) Linux Enterprise Server 11 Service Pack 4

SUSE End User License Agreement

PLEASE READ THIS AGREEMENT CAREFULLY.  BY PURCHASING, INSTALLING, DOWNLOADING
OR OTHERWISE USING THE SOFTWARE (INCLUDING ITS COMPONENTS), YOU AGREE TO THE
TERMS OF THIS AGREEMENT.  IF YOU DO NOT AGREE WITH THESE TERMS, YOU ARE NOT
PERMITTED TO DOWNLOAD, INSTALL OR USE THE SOFTWARE AND YOU SHOULD NOTIFY THE
PARTY FROM WHICH YOU PURCHASED THE SOFTWARE TO OBTAIN A REFUND.   AN
INDIVIDUAL ACTING ON BEHALF OF AN ENTITY REPRESENTS THAT HE OR SHE HAS THE
AUTHORITY TO ENTER INTO THIS AGREEMENT ON BEHALF OF THAT ENTITY.

This End User License Agreement ("Agreement") is a legal agreement between You
(an entity or a person) and SUSE LLC ("Licensor").  The software product
identified in the title of this Agreement for which You have acquired
licenses, any media or reproductions (physical or virtual)   and accompanying
documentation (collectively the "Software") is protected by the copyright laws
and treaties of the United States ("U.S.") and other countries and is subject
to the terms of this Agreement.  If the laws of Your principal place of
business require contracts to be in the local language to be enforceable, such
local language version may be obtained from Licensor upon written request and
shall be deemed to govern Your purchase of licenses to the Software.  Any
add-on, update, mobile application, module, adapter or support release to the
Software that You may download or receive that is not accompanied by a license
agreement is Software and governed by this Agreement.  If the Software is an
update or support release, then You must have validly licensed the version and
quantity of the Software being updated or supported in order to install or use
the update or support release.

LICENSED USE

LICENSES.  The Software and each of its components are owned by Licensor or
other licensors and are protected under copyright laws and other applicable
laws. Subject to compliance with the terms and conditions of this Agreement,
Licensor grants to You a perpetual, non-exclusive, non-transferable, worldwide
license to reproduce and use copies of the Software within Your Organization
(as defined below).

"Organization" means a legal entity, excluding subsidiaries and affiliates
with a separate existence for tax purposes or for legal personality purposes.
An example of an Organization in the private sector would be a corporation,
partnership, or trust, excluding any subsidiaries or affiliates of the
organization with a separate tax identification number or company registration
number. A public sector example of an Organization would be a specific
government body or local government authority.

THIRD PARTY/OPEN SOURCE.  Nothing in this Agreement shall restrict, limit or
otherwise affect any rights or obligations You may have, or conditions to
which You may be subject, under any applicable open source licenses to any
open source code contained in the Software.  The Software may include or be
bundled with other software programs licensed under different terms and/or
licensed by a third party other than Licensor.  Use of any software programs
accompanied by a separate license agreement is governed by that separate
license agreement.

SUBSCRIPTION SERVICES.  Licensor has no obligation to provide maintenance or
support unless You purchase a subscription offering that expressly includes
such services.  Licensor sells subscription offerings for the Software that
entitles You to fee based technical support and/or internal use of Software
updates provided on a specified annual period ("Subscription Offering") and
are subject to the terms of the Subscription Offering Terms and Conditions
available https://www.suse.com/products/terms_and_conditions.pdf.

MARKS.  No right or license, express or implied, is granted under this
Agreement with respect to any trademark, trade name or service mark of
Licensor or its affiliates or licensors ("Mark"). This Agreement does not
permit you to distribute the Software or its components using Licensor's
trademarks, regardless of whether the copy has been modified.  You may make a
commercial redistribution of the Programs only if (a) permitted under a
separate written agreement with Licensor authorizing such commercial
redistribution, or (b) you remove and replace all occurrences of any Mark.

RESTRICTIONS

License Restrictions.  The Software and each of its components are owned by
Licensor and/or its licensors and are protected under copyright law and under
other laws as applicable. Title to the Software and any component, or to any
copy, modification, or merged portion shall remain with Licensor and other
licensors, subject to the applicable license.  Licensor reserves all rights
not expressly granted to You.  The Software is licensed for Your internal use
only.  Except as this Agreement expressly allows and without limiting any
rights or obligations set forth in the "Third Party/Open Source" section
above, You may not (1) remove any patent, trademark, copyright, trade secret
or other proprietary notices or labels on the Software or its documentation;
(2) modify, alter, create derivative works, reverse engineer, decompile, or
disassemble the Software except and only to the extent expressly permitted by
applicable law; (3) transfer, assign, pledge, rent, timeshare, host or lease
the Software, or sublicense any of Your license grants or rights under this
Agreement; in whole or in part, without prior written permission of Licensor,
(4) disclose the results of any performance, functional or other evaluation or
benchmarking of the Software to any third party without the prior written
permission of Licensor.

Outsourcing Requirements. Your license to use the Software may be used under
the terms of this Agreement by a third party acting on Your behalf, such as a
third party cloud provider or outsourcing vendor  who manages or hosts (either
remotely or virtually) the Software for You, subject to and conditioned upon
Your adherence to the following:  (1) You remain responsible for all of Your
obligations under this Agreement and  enter into an enforceable agreement with
the third party that contains terms and conditions to protect Licensor's
rights in the Software that are no less restrictive than those contained in
this Agreement, including without limitation the Verification section below;
(2) You prohibit use of the Software by the third party for any purpose other
than Your sole benefit; (3) You are solely responsible to Licensor for any and
all breaches of this Agreement by the third party; and (4) You are and will
remain current on subscription purchases that cover all installations and
deployments of the Software by the third party on Your behalf.

Appliance License.  If, either directly from Licensor or from a third party,
you have received a hardware, software or other appliance that uses the
Software, You acknowledge and agree to use the Software solely for the purpose
of running the appliance and not as a general purpose operating system.

OWNERSHIP

No title to or ownership of the Software is transferred to You.  Licensor
and/or its third party licensors retain all right, title and interest in and
to all intellectual property rights in the Software and Services, including
any adaptations or copies thereof.  The Software is not sold to You, You
acquire only a conditional license to use the Software.  Title, ownership
rights and intellectual property rights in and to the content accessed through
the Software are the property of the applicable content owner and may be
protected by applicable copyright or other law.  This Agreement gives You no
rights to such content.

LIMITED WARRANTY

Licensor warrants that the media that the Software is delivered on will be
free from defects in materials and manufacture under normal use for a period
of sixty (60) days from the date of delivery to you.    THE FOREGOING WARRANTY
IS YOUR SOLE AND EXCLUSIVE REMEDY AND IS IN LIEU OF ALL OTHER WARRANTIES,
EXPRESS OR IMPLIED.  SAVE FOR THE FOREGOING WARRANTY, THE SOFTWARE IS PROVIDED
"AS IS" WITHOUT ANY WARRANTIES OF ANY KIND.

Services.  Licensor warrants that any Services purchased will be supplied in a
professional manner in accordance with generally accepted industry standards.
 This warranty will be effective for thirty (30) days following delivery of
the Services.  Upon any breach of this warranty, Licensor's only obligation is
to either correct the Services so that they comply with this warranty or at
its option refund the amount You paid to Licensor for the portion of the
Services that fail to comply with this warranty.  You agree to take
appropriate measures to isolate and back up Your systems.

THE SOFTWARE IS NOT DESIGNED, MANUFACTURED OR INTENDED FOR USE OR DISTRIBUTION
WITH ON-LINE CONTROL EQUIPMENT IN HAZARDOUS ENVIRONMENTS REQUIRING FAIL-SAFE
PERFORMANCE, SUCH AS IN THE OPERATION OF NUCLEAR FACILITIES, AIRCRAFT
NAVIGATION, COMMUNICATION, OR CONTROL SYSTEMS, DIRECT LIFE SUPPORT MACHINES,
WEAPONS SYSTEMS, OR OTHER USES IN WHICH FAILURE OF THE SOFTWARE COULD LEAD
DIRECTLY TO DEATH, PERSONAL INJURY, OR SEVERE PHYSICAL OR ENVIRONMENTAL
DAMAGE.

Non-Licensor Products.  The Software may include or be bundled with hardware
or other software programs or services licensed or sold by an entity other
than Licensor.  LICENSOR DOES NOT WARRANT NON-LICENSOR PRODUCTS OR SERVICES.
ANY SUCH PRODUCTS OR SERVICES ARE PROVIDED ON AN "AS IS" BASIS.  WARRANTY
SERVICE IF ANY FOR NON-LICENSOR PRODUCTS IS PROVIDED BY THE PRODUCT LICENSOR
IN ACCORDANCE WITH THEIR APPLICABLE WARRANTY.

EXCEPT AS OTHERWISE RESTRICTED BY LAW, LICENSOR DISCLAIMS AND EXCLUDES ANY AND
ALL IMPLIED WARRANTIES INCLUDING ANY WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE, TITLE OR NON-INFRINGEMENT NOR ARE THERE ANY
WARRANTIES CREATED BY COURSE OF DEALING, COURSE OF PERFORMANCE OR TRADE USAGE.
 LICENSOR MAKES NO WARRANTY, REPRESENTATION OR PROMISE NOT EXPRESSLY SET FORTH
IN THIS LIMITED WARRANTY.  LICENSOR DOES NOT WARRANT THAT THE SOFTWARE OR
SERVICES WILL SATISFY YOUR REQUIREMENTS, BE COMPATIBLE WITH ALL OPERATING
SYSTEMS, OR THAT THE OPERATION OF THE SOFTWARE OR SERVICES WILL BE
UNINTERRUPTED OR ERROR-FREE.  THE FOREGOING EXCLUSIONS AND DISCLAIMERS ARE AN
ESSENTIAL PART OF THIS AGREEMENT AND FORMED THE BASIS FOR DETERMINING THE
PRICE CHARGED FOR THE PRODUCTS.  Some jurisdictions do not allow certain
disclaimers and limitations of warranties, so portions of the above
limitations may not apply to You.  This limited warranty gives You specific
rights and You may also have other rights which vary by state or jurisdiction.


LIMITATION OF LIABILITY

Consequential Losses.  NEITHER LICENSOR NOR ANY OF ITS THIRD PARTY LICENSORS,
SUBSIDIARIES, OR EMPLOYEES WILL IN ANY CASE BE LIABLE FOR ANY SPECIAL,
INCIDENTAL, CONSEQUENTIAL, INDIRECT, TORT, ECONOMIC OR PUNITIVE DAMAGES,
WHETHER BASED ON CONTRACT, NEGLIGENCE, STRICTLIABILITY OR OTHER TORT, BREACH
OF ANY STATUTORY DUTY, INDEMNITY OR CONTRIBUTION, INCLUDING WITHOUT LIMITATION
LOSS OF PROFITS, BUSINESS OR DATA, EVEN IF ADVISED OF THE POSSIBILITY OF THOSE
DAMAGES.
Direct Damages.  IN NO EVENT WILL LICENSOR'S AGGREGATE LIABILITY FOR DIRECT
DAMAGES TO PROPERTY OR PERSON (WHETHER IN ONE INSTANCE OR A SERIES OF
INSTANCES) EXCEED 1.25 TIMES THE AMOUNT PAID BY YOU FOR THE SOFTWARE OR
SERVICES OUT OF WHICH SUCH CLAIM AROSE (OR $50 (U.S.) IF YOU RECEIVED THE
SOFTWARE FREE OF CHARGE).  The above exclusions and limitations will not apply
to claims relating to death or personal injury caused by the negligence of
Licensor or its employees, agents or contractors.  In those jurisdictions that
do not allow the exclusion or limitation of damages, including, without
limitation, damages for breach of any implied terms as to title or quiet
enjoyment of any Software obtained pursuant to this Agreement or for
fraudulent misrepresentation, Licensor's liability shall be limited or
excluded to the maximum extent allowed within those jurisdictions.

GENERAL TERMS

Term.  This Agreement becomes effective on the date You legally acquire the
Software and will automatically terminate if You breach any of its terms.
Verification. Licensor has the right to verify Your compliance with this
Agreement. You agree to: (1)  Implement internal safeguards to prevent any
unauthorized copying, distribution, installation, use of, or access to, the
Software or Subscription Offerings; (2)  Keep records sufficient to certify
Your compliance with this Agreement, and, upon request of Licensor, provide
and certify metrics and/or reports based upon such records and account for
both numbers of copies (by product and version) and network architectures as
they may reasonably relate to Your licensing and deployment of the Software or
Subscription Offerings; and  (3)  Allow a Licensor representative or an
independent auditor ("Auditor") to inspect and audit Your (including any
subsidiaries or affiliates or contractors with access), computers and records,
during Your normal business hours, for compliance with the licensing terms for
Licensor's software products and/or Subscription Offerings. Upon Licensor's
and Auditor's presentation of their signed written confidentiality statement
form to safeguard Your confidential information, You shall fully cooperate
with such audit and provide any necessary assistance and access to records and
computers. If an audit reveals that You have or at any time have had
unlicensed installation, use of, or access to the Software or Subscription
Offerings, You will, within 30 days, purchase sufficient licenses or
Subscription Offerings to cover any shortfall without benefit of any otherwise
applicable discount and subject to fees reflecting the duration of the
shortfall. If a shortfall of 5% or more is found, You must reimburse Licensor
for the costs incurred in the audit.
Transfer.  This Agreement and the associated licenses purchased for use of the
Software may not be transferred or assigned without the prior written approval
of Licensor. Any such attempted transfer or assignment shall be void and of no
effect.  Please contact CRC@suse.com to request the transfer of licenses and
assignment of this Agreement.
Law. All matters arising out of or relating to this Agreement will be governed
by the substantive laws of the United States and the State of Utah without
regard to its choice of law provisions. Any suit, action or proceeding arising
out of or relating to this Agreement may only be brought before a federal or
state court of appropriate jurisdiction in Utah.  If a party initiates
Agreement-related legal proceedings, the prevailing party will be entitled to
recover reasonable attorneys' fees.  If, however, Your principal place of
business is a member state of the European Union or the European Free Trade
Association, (1) the courts of Ireland shall have exclusive jurisdiction over
any action of law relating to this Agreement; and (2) where the laws of such
country of Your principal place of business are required to be applied to any
such action of law the laws of that country shall apply.  The application of
the United Nations Convention of Contracts for the International Sale of Goods
is expressly excluded.
Entire Agreement.  This Agreement, together with any other purchase documents
or other agreement between You and Licensor, sets forth the entire
understanding and agreement between You and Licensor and may be amended or
modified only by a written agreement agreed to by You and an authorized
representative of Licensor.  NO THIRD PARTY LICENSOR, DISTRIBUTOR, DEALER,
RETAILER, RESELLER, SALES PERSON, OR EMPLOYEE IS AUTHORIZED TO MODIFY THIS
AGREEMENT OR TO MAKE ANY REPRESENTATION OR PROMISE THAT IS DIFFERENT FROM, OR
IN ADDITION TO, THE TERMS OF THIS AGREEMENT.
Waiver.  No waiver of any right under this Agreement will be effective unless
in writing, signed by a duly authorized representative of the party to be
bound.  No waiver of any past or present right arising from any breach or
failure to perform will be deemed to be a waiver of any future right arising
under this Agreement.
Severability.  If any provision in this Agreement is invalid or unenforceable,
that provision will be construed, limited, modified or, if necessary, severed,
to the extent necessary, to eliminate its invalidity or unenforceability, and
the other provisions of this Agreement will remain unaffected.
Export Compliance.  You acknowledge that Licensor's products and/or technology
are subject to the U.S. Export Administration Regulations (the "EAR") and You
agree to comply with the EAR.  You will not export or re-export Licensor's
products, directly or indirectly, to: (1) any countries that are subject to US
export restrictions; (2) any end user who You know or have reason to know will
utilize Licensor's products in the design, development or production of
nuclear, chemical or biological weapons, or rocket systems, space launch
vehicles, and sounding rockets, or unmanned air vehicle systems, except as
authorized by the relevant government agency by regulation or specific
license; or (3) any end user who has been prohibited from participating in the
US export transactions by any federal agency of the US government. By
downloading or using the Software, You are agreeing to the foregoing and You
are representing and warranting that You are not located in, under the control
of, or a national or resident of any such country or on any such list. In
addition, You are responsible for complying with any local laws in Your
jurisdiction which may impact Your right to import, export or use Licensor's
products.  Please consult the Bureau of Industry and Security web page
www.bis.doc.gov before exporting items subject to the EAR. For more
information on exporting Software, including the applicable Export Control
Classification Number (ECCN) and associated license exception (as applicable),
see www.suse.com/company/legal/. Upon request, Licensor's International Trade
Services Department can provide information regarding applicable export
restrictions for Licensor products. Licensor assumes no responsibility for
Your failure to obtain any necessary export approvals.
U.S. Government Restricted Rights.  Use, duplication, or disclosure of any
Deliverables by the U.S. Government is subject to the restrictions in FAR
52.227-14 (Dec 2007) Alternate III (Dec 2007), FAR  52.227-19 (Dec 2007), or
DFARS 252.227-7013(b)(3) (Nov 1995), or applicable successor clauses.070701007E846B000041ED000003E8000000640000000359DCCCB600000000000000080000000200000000000000000000001300000000root/etc/sysconfig070701007E846C000041ED000003E8000000640000000259DCCCB600000000000000080000000200000000000000000000001B00000000root/etc/sysconfig/network070701007E3590000081A4000003E8000000640000000159DCCCB600006BE3000000080000000200000000000000000000002600000000root/etc/sysconfig/network/ifcfg-eth0## This is a template for a network interface configuration file used with ifup.
## See 'man 8 ifup' for details.
## Additionally to the following variables you can set every variable from the
## interface independent configurations files (config, dhcp, wireless) also in
## the interface configuration file to overwrite the global settings.

## Type: list(auto,hotplug,ifplugd,nfsroot,manual,off,onboot)
## Default: auto
#
# STARTMODE tells ifup when a interface should be set up. Possible values are:
# - auto:    start it as soon as the interface is available. Either when booting
#            or when a device is plugged or initialized at runtime
# - hotplug: alias for auto, only difference is that configurations with that
#            startmode are not considered to be mandatory if list of mandatory
#            devices is derived automatically.
# - ifplugd: interface will be controlled by ifplugd daemon. (If you like to use
#            multiple interfaces mutually exclusive you have to set also
#            IFPLUGD_PRIORITY.)
# - nfsroot: Nearly like 'auto'. But interfaces with this startmode will never
#            be shut down via 'rcnetwork stop'. 'ifdown <iface>' still works.
#            Use this when you have a nfs root filesystem.
# - manual:  start it only when ifup is called manually
# - off:     will not be started at all
# - onboot:  alias for auto, deprecated, only for backward compliance
STARTMODE=auto

## Type:    integer(0:100)
## Default: 0
#
# All interfaces with STARTMODE=ifplugd and with IFPLUGD_PRIORITY != 0 will be
# used mutually exclusive. If more then one of these interfaces is 'plugged'
# then we need a way to decide which interface to take up. Therefore we have to
# set the priority of each interface.
# Note: Connection detection of wireless devices is not very reliable.
# Therefore we currently simple consider a wlan interface as always connected.
# With a lower priority as all other interfaces it will then be set up if no
# other connection is established.
# A value of 0 means no priority set.
#
IFPLUGD_PRIORITY=

## Type:    list(static,dhcp,autoip,dhcp+autoip,6to4)
## Default: static
#
# With BOOTPROTO you can choose in which mode the interface will be set up:
# - static:      Set up static address(es)
# - dhcp:        Start a dhcp client on that interface.
# - autoip:      Automatic search for a free address and assign it statically.
# - dhcp+autoip: Try dhcp and use autoip if dhcp fails.
# - 6to4:        Set up ipv6 over ipv4 tunnel (see man ifcfg-tunnel)
# If you use dhcp or autoip you may additionally specify static address(es).
#
BOOTPROTO=dhcp

## Type:    string
## Default: ""
#
# If using a static configuration you have to set an IP address and a netmask
# or prefix length. The following examples are equivalent:
# 1) IPADDR=192.168.1.1
#    NETMASK=255.255.255.0
# 2) IPADDR=192.168.1.1
#    PREFIXLEN=24              # NETMASK will be ignored
# 3) IPADDR=192.168.1.1/24     # NETMASK and PREFIXLEN will be ignored
#
# For multiple addresses use this variable multiple times and extend them with
# different suffixes. For example IPADDR_1=, IPADDR_2=. See section 'Multiple
# addresses' in manpage ifcfg).
#
IPADDR=


## Type:    string
## Default: ""
#
# Set the network mask for the ip address. This variable will be ignored if a
# prefixlength is set in variable PREFIXLEN in IPADDR.
# For multiple addresses use the same suffixes as with IPADDR.
#
NETMASK=

## Type:    integer(0,64)
## Default: ""
#
# Set the prefixlength of the ip address. This variable will be ignored if a
# prefixlength is set in variable IPADDR.
# For multiple addresses use the same suffixes as with IPADDR.
#
PREFIXLEN=

## Type:    string
## Default: ""
#
# Set the broadcast address of the interface. If you leave it empty a default
# will be used. See DEFAULT_BROADCAST in /etc/sysconfig/network/config.
# For multiple addresses use the same suffixes as with IPADDR.
#
BROADCAST=

## Type:    string
## Default: ""
#
# If you'd like to set up a point to point connection you may specify the
# remote IP here.
# For multiple addresses use the same suffixes as with IPADDR.
#
REMOTE_IPADDR=

## Type:    string
## Default: ""
#
# Set a label for the interface. This may be neccessary if you still use
# ifconfig and configured multiple addresses. (See manpage ifcfg).
# For multiple addresses use the same suffixes as with IPADDR.
#
LABEL=

## Type:    string
## Default: ""
#
# Set the  scope  of the area where this address is valid. 
# See manpage ip for details.
# For multiple addresses use the same suffixes as with IPADDR.
#
SCOPE=

## Type:    string
## Default: ""
#
# Every other option from "ip address add" can be added here.
# See manpage ip for details.
# For multiple addresses use the same suffixes as with IPADDR.
#
IP_OPTIONS=

## Type:    string
## Default: ""
#
# Set the interface type if ifup cannot determine it properly. This may be
# needed if you use unusual interface names for special interfaces like
# modems.
#
INTERFACETYPE=

## Type:    integer
## Default: ""
#
# Set a specific Maximum Transmission Unit (MTU) for this interface.
#
MTU=

## Type:    string
## Default: ""
#
# Set a specific link level address (LLADDR), a.k.a. MAC address or hardware
# address, for this interface (if the driver supports it).
#
LLADDR=

## Type:    string
## Default: ""
#
# Every other option from "ip link set" can be added here.
# Example:
#       LINK_OPTIONS="multicast off"
# See manpage ip for details.
#
LINK_OPTIONS=

## Type:    string
## Default: ""
#
# If this variable is not empty ifup will call ethtool with this options. 
# See the ethtool (8) manual page for available options.
# If the option string starts with a '-' (e.g. '-K iface rx on'), then the 
# second word in the string will be replaced with the current interface name.
# Otherwise (e.g. 'autoneg off speed 10') ifup prepends '-s <interface>'.
#
ETHTOOL_OPTIONS=

## Type:    yesno
## Default: yes
#
# This options defines whether the script /etc/ppp/poll.tcpip is run after
# connecting to the internet via a dialup connection or not. The script
# itself calls various jobs like fetchmail, fetchnews and sendmail.
#
RUN_POLL_TCPIP=

## Type:    yesno
## Default: no
#
# If an interface may be controlled from a user via kinternet or cinternet
# you have to set this variable to yes.
#
USERCONTROL=

## Type:    string
## Default: ""
#
# This string is used as description of the device in YaST.
# This variable is not used in ifup and friends.
#
NAME=

## Type:    string
## Default: ""
#
# Internal variable for YaST. Don't change it.
# This variable is not used in ifup and friends.
#
UNIQUE=

## Type:    string
## Default: ""
#
# Internal variable for YaST. Don't change it.
# This variable is not used in ifup and friends.
#
_nm_name=

## Type:    yesno
## Default: no
#
# If you want the interface to be ignored by NetworkManager and therefore
# control the interface manually with ifup/down you can set this variable
# to 'no'. This variable is ignored if the network is not controlled by
# NetworkManager.
#
NM_CONTROLLED=no


##########################################################################
### FIXME:
### From here one up to 'bridge settings' the file is not up to date


## Multiple addresses
##    You can extend the variable name 'IPADDR' by any string you like (IPADDR_1,
##    IPADDR_FOO, IPADDRxxx, ...) and use these variables for your IP addresses.
##    If you need some additional parameters for these addresses, then just add
##    the same extension to these variable names.
##    IPADDR_AAA=1.2.3.4
##    NETMASK_AAA=255.0.0.0
##    BROADCAST_AAA=1.2.3.55
##    IPADDR_BBB=10.10.2.3/16
##    LABEL_BBB=BBB
##    an so on ...
##
## You do not need to set a label for any address. But then you should not use
## ifconfig any longer; go and use ip. If you want to use ifconfig then omit the
## label for your main address and set a label for every additional address.

## Routing:
## If you need special routes for a configuration, then use a file named
## ifroute-<config> where <config> is the same string as in ifcfg-<config>.
## It has the same syntax like routes except one difference:
## If you omit the interface name (4th field) in the ifroute file it will be
## set to the current interface name when setting up the interface. You need to
## do this with hotpluggable devices, where you do not know which interface name
## they will get at the time when you plug them.
## See man 5 routes.


##########################################################################
## DHCP settings

## Type: list("",yes,no)
## Default: ""
#
# Multiple DHCP clients:
#
# With two or more DHCP clients running, they would concurrently try to replace
# the default route or rewrite resolv.conf, rewrite ntp.conf etc. There are two
# ways of dealing with this conflict (and it is a conflict, because you can
# have only one default route even though routes are stackable, and there can
# only be one resolv.conf file):
#
#  1) allow both clients to do that stuff. This would work in many cases if
#     only one of the interfaces is used at a time. However, it would lead to
#     undefined behaviour.
#
#  2) allow only one of the DHCP clients to do that stuff. This implies
#     that there would be a "primary" interface and a "secondary". This is the
#     assumption the default configuration is based on. But since the system
#     can't guess which interface is "more important" and should have the
#     default route and resolver configuration associated with it, it simply
#     chooses the first interface that is started with DHCP to be
#     "authoritative".  Which one that is can be influenced by adding
#     DHCLIENT_PRIMARY_DEVICE=yes to one of the /etc/sysconfig/network/ifcfg-*
#     files. This can even be added to more than one file, to achieve the
#     behaviour described in 1).  Thus, there is the flexibility to do it
#     either way.
#
# Per default, only the DHCP client that is started first will be allowed to
# change the default route / resolver configuration etc.  All other running
# clients will only configure the interface with an address, but not change
# "global" configuration.
#
# Thus, to specifically allow an interface's DHCP client to change "global"
# configuration, set the following variable to "yes". Or you can make an
# interface's DHCP client never change these settings if you set it to "no".
# If you leave it empty then ifup-dhcp will decide.
#
DHCLIENT_PRIMARY_DEVICE=


## Type:
## Default:
#
# Even more finegrained control can be excerted by setting any of the variables
# from /etc/sysconfig/network/dhcp here:
#DHCLIENT_DEBUG=
#DHCLIENT_SET_HOSTNAME=
#DHCLIENT_SET_DEFAULT_ROUTE=
#DHCLIENT_TIMEOUT=
#DHCLIENT_REBOOT_TIMEOUT=
#DHCLIENT_CLIENT_ID=
#DHCLIENT_HOSTNAME_OPTION=
#DHCLIENT_VENDOR_CLASS_ID=
#DHCLIENT_LEASE_TIME=


##########################################################################
## bridge settings. See ifcfg-bridge(5) and brctl(8) for mor information
## 

## Type:    yesno
## Default: yes
#
# This option must be set to 'yes' to identify this interface as a bridge
# interface.
#
BRIDGE=no

## Type:    string
## Default: 
#
# This variable contains a space-separated list of N interfaces which take part 
# in the bridging.
#
BRIDGE_PORTS=''

## Type:    integer(0:)
## Default: 
#
# This option sets the ethernet address ageing time, in seconds. After <time> 
# seconds of not having seen a frame coming from a certain address, the bridge 
# will delete that address from the forwarding database. Setting ageing time 
# to zero makes all entries permanent.
#
BRIDGE_AGEINGTIME=''

## Type:    integer(0:)
## Default:
#
# Forwarding delay time is the time in seconds spent in each of the listening
# and learning states before the forwarding state is entered. This delay is  
# so that when a new bridge comes onto a busy network it looks at some traffic 
# before participating.
#
BRIDGE_FORWARDDELAY=''

## Type:    integer(0:)
## Default:
#
# Periodically, a hello packet is sent out by the root bridge and the designated 
# bridges. Hello packets are used to communicate information about the topology 
# throughout the entire bridged local area network.
#
BRIDGE_HELLOTIME=''

## Type:    integer(0:)
## Default:
#
# If a another bridge in the spanning tree does not send out a hello packet for
# a long period of time, it is assumed to be dead. This timeout can be set with 
# this variable.
#
BRIDGE_MAXAGE=''

## Type:    string
## Default:
#
# This is a space-separated list of costs corresponding to the interfaces in 
# BRIDGE_PORTS. Each interface in BRIDGE_PORTS could have a different speed 
# and this value is used when deciding which link to use. Faster interfaces
# should have lower costs. 
#
BRIDGE_PATHCOSTS=''

## Type:    string
## Default:
#
# This is a space-separated list of priorities corresponding to the interfaces 
# in BRIDGE_PORTS. The priority value is an unsigned 8-bit quantity (a number 
# between 0 and 255), and has no dimension. This metric is used in the
# designated port and root port selection algorithms.
#
BRIDGE_PORTPRIORITIES=''

## Type:    integer(0:65535)
## Default: 
#
# This option sets the bridge's priority. The priority value is an unsigned 
# 16-bit quantity (a number between 0 and 65535), and has no dimension. Lower 
# priority values are 'better'. The bridge with the lowest priority will be
# elected 'root bridge'.
#
BRIDGE_PRIORITY=''

## Type:    list(on,off)
## Default: off
#
# Multiple ethernet bridges can work together to create even larger networks 
# of ethernets using the IEEE 802.1d spanning tree protocol. This protocol  
# is used for finding the shortest path between  two  ethernets, and for 
# eliminating loops from the topology.
# 
# The spanning tree protocol can also be turned off (for those situations
# where it just doesn't make sense, for example when this linux box is
# the only bridge on the LAN, or when you know that there are no loops in
# the topology.)
#
BRIDGE_STP=''

## Type:	yesno
## Default:	""
#
# Defines whether this interface is wireless or not.  This variable is usually
# not set, WLAN capabilities get auto-detected in this case.  As the WIRELESS
# variable is device speficic and not network specific, it can have no suffix.
WIRELESS=''


## Type:	string
## Default:	"managed"
#
# Set the operating mode of the device, which depends on the network topology.
# Set to ad-hoc for network composed of only one cell and without Access
# Point, managed for network composed of many cells, with roaming or with an
# Access Point, master if you want your system act as an Access Point or
# synchronisation master. If unset, managed will be used.
WIRELESS_MODE=''

## Type:	string
## Default:	""
#
# Set the SSID/ESSID (or Network Name - in some products it may also called
# Domain ID). The ESSID is used to identify cells which are part of the same
# virtual network. If emtpy or set to any the node will connect to the
# Access Point with the best signal strength around (in managed operating
# mode). For WLANs that make use of WPA (see WIRELESS_AUTH_MODE below)
# you need to set your ESSID.
WIRELESS_ESSID=''

## Type:	list(open,sharedkey,psk,eap)
## Default:	open
#
# Sets authentication mode. The mode depends on the protection technology
# beeing used, WEP or WPA. WEP (Wired Equivalent Privacy) is a system to
# encrypt wireless network traffic, with an optional authentication on the
# basis of the used encryption key. In most cases where WEP is used, open
# mode (no authentication at all) is fine. This does not mean that you can
# not use WEP encryption. Some networks may require sharedkey authentication.
# NOTE: Shared key authentication makes it easier for a potential attacker to
# break into your network. Unless you have specific needs for shared key
# authentication, use the open mode. As WEP has been proved insecure, WPA
# (Wi-Fi Protected Access) was defined to close its security wholes, but not
# every hardware supports WPA. In case you want to use WPA-PSK (WPA preshared
# key authentication, aka WPA "Home"), set this to psk. In case you want
# to use WPA-EAP (WPA with Extensible Authentication Protocol, aka WPA
# "Enterprise"), set this to eap. WPA authentication modes are only
# possible when WIRELESS_MODE is set to managed.
WIRELESS_AUTH_MODE=''

## Type:	string
## Default:	""
#
# When using WPA-PSK authentication, you need to specify your preshared key
# here. The key is used for authentication and encryption purposes. You can
# enter it in hex digits (needs to be exactly 64 digits long) or as passphrase
# getting hashed (8 to 63 ASCII characters long).
WIRELESS_WPA_PSK=''

## Type:	string
## Default:	""
#
# WPA-EAP can use different authentication modes. Supported
# values are TLS, PEAP, and TTLS. Default is to allow any.
# When using WIRELESS_AP_SCANMODE 2, this variable needs to be set.
WIRELESS_EAP_AUTH=''

## Type:	string
## Default:	""
#
# Using this variable you can specify the WPA protocol to be used.
# Valid values are WPA and RSN (aka WPA2, can be also used as synonym).
# Default is to allow both. When using WIRELESS_AP_SCANMODE 2, this
# variable needs to be set, otherwise WPA will be used as fallback.
WIRELESS_WPA_PROTO=''

## Type:	string
## Default:	""
#
# Needs to be set in conjunction with WPA-EAP. Set to your identity as
# configured on the RADIUS server.
WIRELESS_WPA_IDENTITY=''

## Type:	string
## Default:	""
#
# Needs to be set in conjunction with WPA-EAP. Set to your password as
# configured on the RADIUS server.
WIRELESS_WPA_PASSWORD=''

## Type:	string
## Default:	"anonymous"
#
# Sets anonymous identity. Default is "anonymous". The anonymous identity is
# used with WPA-EAP protocols that support different tunnelled identities
# (e.g., TTLS).
WIRELESS_WPA_ANONID=''

## Type:	string
## Default:	""

# Used with WPA-EAP. If you want to check the RADIUS server's authenticity,
# which is highly recommended, you need specify the certificate of the
# CA (Certification Authority) which signed the server's certificate.
# Point this variable to the certificate file including full path.
WIRELESS_CA_CERT=''

## Type:	string
## Default:	""
#
# Used with WPA-EAP. If you are using TLS as authentication protocol you need
# to authenticate yourself through a client certificate. Point this variable
# to the certificate file including full path.
WIRELESS_CLIENT_CERT=''

## Type:	string
## Default:	""
#
# Used with WPA-EAP. Authentication mode TLS uses a public/private key method
# to encrypt negotiation data. Point this variable to the file containing your
# client private key including full path.
WIRELESS_CLIENT_KEY=''

## Type:	string
## Default:	""
#
# Used with WPA-EAP. Set to the passphrase of your client private key file.
WIRELESS_CLIENT_KEY_PASSWORD=''

## Type:	yesno
## Default:	yes
#
# Defines whether hidden SSID scan support should be enabled.  Setting this to
# "no" can speed up scanning and makes the usage of WIRELESS_PRIORITY
# possible. This is only used in conjunction with wpa_supplicant.
WIRELESS_HIDDEN_SSID=''

## Type:	integer
## Default:	""
#
# This variable only makes sense used in conjunction with multiple
# networks. If you want to prefer one configured network for over another, set
# the respecitve WIRELESS_PRIORITY variable (means, with the same suffix) to a
# higher value (integer only). NOTE: This does not work for networks that are
# configured with WIRELESS_HIDDEN_SSID="yes" (which is default). For networks
# with hidden SSID scanning support the suffix number is important.  The
# network with the lowest suffix number gets probed first.
WIRELESS_PRIORITY=''

## Type:	list(0,1,2)
## Default:	1
#
# Defines which SSID scan mode should be used. Mode 0 means the driver
# performs the scan. Mode 1 means wpa_supplicant takes care of scanning.  Mode
# 2 is basically the same as mode 0 but the access point gets chosen by
# security policy and SSID. This mode does not support multiple network
# settings. Default is "1" for most drivers. Try "0" or "2" if you have
# problems associating to your access point. This variable can have no
# suffix. This is only used in conjuntion with wpa_supplicant.
WIRELESS_AP_SCANMODE=''

## Type:	string
## Default:	""
#
# If have configured a WPA mode in WIRELESS_AUTH_MODE you can use this
# variable to supply a custom wpa_supplicant.conf that will be used instead of
# the one ifup would generate. The file has to be specified with full path. Of
# course you can setup any configuration suitable for wpa_supplicant with
# this, not only WPA modes. This variable can have no suffix. If you want to
# have multiple network support, you need to create a wpa_supplicant.conf with
# mulitle network sections (see wpa_supplicant documentation).
WIRELESS_WPA_CONF=''

## Type:	yesno
## Default:	yes
#
# If you configured only one wireless network and are not using WPA, the
# device can be set up without using wpa_supplicant, although it would be
# possible to use it. This variable defines whether wpa_supplicant should be
# used in that case.
PREFER_WPA_SUPPLICANT=''

## Type:	string
## Default:	""
#
# In environments with multiple Access points you may want to define the one
# to connect to by entering its MAC address. Format is 6x2 hex digits,
# seperated by colons, eg 01:02:03:04:05:06.
# See also the iwconfig ap option description in the iwconfig(8) manual page.
#
# Note, that some drivers (mac80211 based) may require to set this variable
# to a specific access point address, 'any' or 'off' to start scanning for
# an appropriate cell, so ifup-wireless sets it to 'any' in Managed and
# Ad-Hoc modes when the variable is empty.
WIRELESS_AP=''

## Type:	yesno
## Default:	no
#
# If set to yes, ifup tries to enable power saving for this device. This is
# not supported by all cards resp. drivers.
WIRELESS_POWER=''

## Type:	string
## Default:	""
# Set the nickname, or the station name. Most 802.11 products do define it,
# but this is not used as far as the protocols (MAC, IP, TCP) are concerned
# and completely accessory as far as configuration goes. If this variable is
# empty the hostname will be used as nick.
WIRELESS_NICK=''

## Type:	string
## Default:	""
#
# Set the Network ID (in some products it is also called Domain ID). As all
# adjacent wireless networks share the same medium, this parameter is used to
# differenciate them (create logical colocated networks) and identify nodes
# belonging to the same cell.
WIRELESS_NWID=''

## Type:	string
## Default:	""
#
# With this variable you can define the channel being used. This is only
# applicable to ad-hoc and master operating modes. Channels are usually
# numbered starting at 1, and you may use iwpriv(8) to get the total number of
# channels and list the available frequencies. Depending on regulations, some
# frequencies/channels may not be available.
WIRELESS_CHANNEL=''

## Type:	integer
## Default:	""
#
# Set the sensitivity threshold. This is the lowest signal level for which we
# attempt a packet reception, signal lower than this are not received. This
# is used to avoid receiving background noise.
WIRELESS_SENS=''

## Type:	string
## Default:	"auto"
#
# Usually the highest bitrate available gets used. If you have specific needs
# to set a bitrate, you can do it here (rates are in Mbit/s). Bitrates above
# 11 are only available for cards compliant to 802.11a or 802.11g standards.
WIRELESS_RATE=''

## Type:	string
## Default:	""
#
# You can define up to 4 WEP encryption keys. You can use WEP with open and
# sharedkey authentication. The key can be entered in different formats:
# Either directly in hex digits, with or without dashes, or in the key's ASCII
# representation (prefix s: ), or as a passphrase which will be hashed (prefix
# h: ). The amount of hex digits resp. length of the ASCII key depends on the
# key size being used: 10 hex digits or 5 ASCII characters for 64 bit keys, 26
# hex digits or 6 to 13 ASCII characters for 128 bit keys (see
# WIRELESS_KEY_LENGTH below). Examples:
#
# WIRELESS_KEY_0="0123-4567-89"
# WIRELESS_KEY_0-"s:hello"
# WIRELESS_KEY_0="h:mysecretphrase"
#
# You  can also use 1, 2, or 3 as suffix for multiple key settings. This
# is usually not necessary. Leave empty if you do not want WEP.
WIRELESS_KEY=''

## Type:	list(40,104)
## Default:	104
#
# Defines the length in bits for all keys used. There are currently 40 and 104
# bit keys supported. Sometimes they are also called 64 resp. 128 bits
# (depends on whether you count the 24 bit initialization vetor or not).
# This variable is only meaningful if you enter the key as passphrase.
WIRELESS_KEY_LENGTH=''

## Type:	list(0,1,2,3)
## Default:	0

# Sets the default WEP key. The default key is used to encrypt outgoing
# packets, incoming ones are decrypted with the key number specified in the
# packet. This defaults to 0.
WIRELESS_DEFAULT_KEY=''



## Type:	string
## Default:	"off"
#
# RTS/CTS adds a handshake before each packet transmission to make sure that
# the channel is clear. This adds overhead, but increase performance in case
# of hidden nodes or large number of active nodes. Possible values: any
# integer (representing the size of the smallest packet for which the node
# sends RTS), auto, fixed, or off.
WIRELESS_RTS=''

## Type:	string
## Default:	"off"
#
# Fragmentation allow to split a IP packet in a burst of smaller fragments
# transmitted on the medium. In most cases this adds overhead, but in very
# noisy environment this reduce the error penalty. Possible values: any
# integer (representing the maximum fragment size), auto, fixed, or off.
WIRELESS_FRAG=''

## Type:	string
## Default:	""
#
# If you need other options for iwconfig, then write the complete option string
# as you would append it to iwconfig but without the interface name to the
# variables below. For multiple options you may (but need not) add linebreaks in
# the string.
WIRELESS_IWCONFIG_OPTIONS=''

## Type:	string
## Default:	""
#
# If you need to set options for iwspy, then write the complete option string as
# you would append it to iwspy but without the interface name to the variables
# below. For multiple options you may (but need not) add linebreaks in the
# string.
WIRELESS_IWSPY_OPTIONS=''

## Type:	string
## Default:	''
#
# If you need to set options for iwpriv then write the complete option string as
# you would append it to iwpriv but without the interface name to the variables
# below. For multiple options you may (but need not) add linebreaks in the
# string.
WIRELESS_IWPRIV_OPTIONS=''

## Type:	string
## Default:	''
#

## Type:	string
## Default:	''
#
# WPA modes support two different encryption systems, TKIP and
# CCMP. This variable defines which to use for unicast communication.
# Default is to allow both. In case you want to restrict it to one
# protocol, set this variable. When using WIRELESS_AP_SCANMODE 2, this
# variable needs to be set, otherwise TKIP will be used as fallback.
WIRELESS_CIPHER_PAIRWISE=''

## Type:	string
## Default:	''
#
# WPA modes support two different encryption systems, TKIP and
# CCMP. This variable defines which to use for broad-/multicast
# communication.  Default is to allow both. In case you want to
# restrict it to one protocol, set this variable. When using
# WIRELESS_AP_SCANMODE 2, this variable needs to be set, otherwise
# TKIP will be used as fallback.
WIRELESS_CIPHER_GROUP=''

## Type:	string
## Default:	''
#
# When using WPA-EAP with PEAP authentication, you can use
# this variable to force which PEAP version (0 or 1) to be used.
# Default is to allow both.
WIRELESS_PEAP_VERSION=''
070701007E358F000081A4000003E8000000640000000159DCCCB600000248000000080000000200000000000000000000002000000000root/etc/sysconfig/network/dhcpDHCLIENT_DEBUG="no"
DHCLIENT_SET_HOSTNAME="yes"
DHCLIENT_MODIFY_RESOLV_CONF="yes"
DHCLIENT_SET_DEFAULT_ROUTE="yes"
DHCLIENT_MODIFY_NTP_CONF="no"
DHCLIENT_MODIFY_NIS_CONF="no"
DHCLIENT_SET_DOMAINNAME="no"
DHCLIENT_KEEP_SEARCHLIST="no"
DHCLIENT_LEASE_TIME=""
DHCLIENT_TIMEOUT="999999"
DHCLIENT_REBOOT_TIMEOUT=""
DHCLIENT_HOSTNAME_OPTION="AUTO"
DHCLIENT_CLIENT_ID=""
DHCLIENT_VENDOR_CLASS_ID=""
DHCLIENT_RELEASE_BEFORE_QUIT="no"
DHCLIENT_SCRIPT_EXE=""
DHCLIENT_ADDITIONAL_OPTIONS=""
DHCLIENT_SLEEP="0"
DHCLIENT_WAIT_AT_BOOT="15"
DHCLIENT_UDP_CHECKSUM="no"
DHCLIENT_MODIFY_SMB_CONF="yes"
070701007E8463000041ED000003E8000000640000000259DCCF0A00000000000000080000000200000000000000000000000C00000000root/studio070701007E357E000081A4000003E8000000640000000159DCCCB60000030A000000080000000200000000000000000000001900000000root/studio/build-custom#!/bin/bash -e
#
# This script is executed at the end of appliance creation.  Here you can do
# one-time actions to modify your appliance before it is ever used, like
# removing files and directories to make it smaller, creating symlinks,
# generating indexes, etc.
#
# The 'kiwi_type' variable will contain the format of the appliance
# (oem = disk image, vmx = VMware, iso = CD/DVD, xen = Xen).
#

# read in some variables
. /studio/profile

# read in KIWI utility functions
. /.kconfig

#======================================
# Prune extraneous files
#--------------------------------------
# Remove all documentation
docfiles=`find /usr/share/doc/packages -type f |grep -iv "copying\|license\|copyright"`
rm -f $docfiles
rm -rf /usr/share/info
rm -rf /usr/share/man

exit 007070100000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000B00000000TRAILER!!!