-
Notifications
You must be signed in to change notification settings - Fork 90
Refactor OSD to Support Custom Catalogs and Controlled Module Updates #284
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Refactor OSD to Support Custom Catalogs and Controlled Module Updates #284
Conversation
ccf5350 to
8a35740
Compare
b0689cf to
d408f92
Compare
|
This looks excellent, and since you're only excluding C: from the search path, it should work with network boot scenarios where no USB drive is present (ie. embedded in the boot.wim at X:\OSDCloud\Catalogs). I would love to be able to define custom paths such as the following, and then leverage the "not yet implemented" cache host variable (see #272), which looks like something we could do with this patch: |
|
Thank you for the feedback! Originally, since the current OSD reloads catalog files from the cache under the module path, we wanted an option to use only company-validated catalogs (Drivers and ESDs) stored in a different location, rather than relying solely on the default module path. While the OSD module regularly updates cached catalog files via GitHub Actions—allowing us to always use the latest versions—there is currently no way to specify and use a particular version of a catalog file. That’s why I proposed this pull request: to optionally allow importing catalog files from drives (excluding C:) under the \OSDCloud\Catalogs path. As you pointed out, this also enables scenarios where the catalog is embedded in the boot.wim (e.g., at X:\OSDCloud\Catalogs) or stored on USB devices. The object list will be generated from the last successfully loaded catalog file, so you can take advantage of this behavior if it fits your use case. Our ultimate goal is to host validated catalog files either on USB or online, and always use the latest version from those sources. I’m also planning to propose another pull request to: We don’t necessarily expect this pull request to be merged as-is, since we are already operating with a patched custom version internally. However, we would greatly appreciate it if equivalent functionality could be considered for inclusion in the official OSD module. |
d408f92 to
60c1fb6
Compare
60c1fb6 to
1f090f0
Compare
|
Hi @KatsuhiroWatanabe, do you happen to have an example user defined OS catalog you could share? EDIT: Sorry for the dumb question. I see this PR is geared towards OSDCloud v1. |
|
Hi @skyblaster, Thanks for your comment! Yes, I can share an example of a user-defined OS catalog. It's a very simple one — just a modified version of the original JSON (cache\archive-cloudoperatingsystems\cache\archive-cloudoperatingsystems) with updated values for the OS download URL and SHA1 hash. Since it's quite straightforward, I didn’t include it here, but I’d be happy to upload it if needed. Also, the catalog should work with both ESD and WIM files. If the image contains only a single edition, OSD defaults to using Index=1, so there's no need to specify the index manually in that case. As you mentioned, this PR is specifically for OSDCloud v1, and it's designed to work with Thanks for pointing out the new GUI in OSD.Workspace invoked via Appreciate your feedback as always! |
Update: Integrated Enhancements from feature/InintStartNet2 (PR:#288)This PR now includes additional enhancements originally proposed in feature/InintStartNet2 (PR:#288), cherry-picked for integration:
These additions complement the offline catalog support introduced in this PR, enabling more deterministic and customizable OSDCloud initialization workflows—especially in offline or controlled environments. By integrating both, we provide a more complete solution for environments requiring strict control over OSD behavior.
|
2a506db to
f809af0
Compare
|
Hi @OSDeploy, Following up on this PR (originally submitted as #278, which was later replaced) and also #288, which builds on this one. I understand things can get busy, so I just wanted to check in and see if there's anything I can do to assist with the review process. I've been continuously rebasing this branch onto the latest Just to clarify — this PR does not alter existing behavior unless the new functionality is explicitly enabled through additional configuration. It should be safe to merge without impacting current users, and I hope it can be considered for inclusion. Appreciate all your work on the project! |
f809af0 to
5190ff1
Compare
|
Hi @OSDeploy, I've been continuously rebasing this branch onto the latest master to keep it up to date and mergeable. Please let me know if any further changes are needed. |
5190ff1 to
0f89962
Compare
|
Hi @OSDeploy, I've been continuously rebasing this branch onto the latest master to keep it up to date and mergeable. Please let me know if any further changes are needed. |
0f89962 to
a0d1f92
Compare
|
Hi @OSDeploy, I've been continuously rebasing this branch onto the latest master to keep it up to date and mergeable. Please let me know if any further changes are needed. |
a0d1f92 to
36cd6d8
Compare
|
I've been continuously rebasing this branch onto the latest master to keep it up to date and mergeable. Please let me know if any further changes are needed. |
36cd6d8 to
a254275
Compare
|
Hi @OSDeploy, |
|
I have reopened this pull request as I mistakenly closed PR #284 instead of PR #288. |
a254275 to
386a9bb
Compare
|
Hi @OSDeploy, |
386a9bb to
9d64fcb
Compare
|
As PR #316 introduces a similar fix and has been merged into master, I’ve decided to remove my changes to keep this PR mergeable. Nonetheless, I believe there’s still room for further enhancement in the HTTP header validation. Just a quick note — unless I’m mistaken, the current implementation using $remote = Invoke-WebRequest -UseBasicParsing -Method Head -Uri $SourceUrl may not handle scenarios where $SourceUrl is invalid or unreachable (e.g., $remote -eq $null). Please disregard if this is already addressed elsewhere. |
a6334b4 to
b963035
Compare
if $SourceUrl is invalid or unreachable, curl.exe will create an empty file and the function will exit, as it did before #316 |
|
Hi @everydayintech, thank you for your clarification regarding the behavior before and after #316. You're absolutely right—your changes in #316 did not alter the core behavior of the function when $SourceUrl is invalid or unreachable, and I appreciate your effort to maintain consistency. That said, I’d like to clarify a subtle but important detail. When curl.exe is invoked after a failed Invoke-WebRequest, and the URL points to a file that has been removed from the vendor’s server (e.g., due to outdated catalog information), the resulting file is not technically empty. In my testing, curl.exe downloads an HTML error page—typically a branded 404 response from the host. For example, I ran the following command: Save-WebFile -SourceUrl "https://download.lenovo.com/pccbbs/mobiles/tp_l13-gen-6_s2-gen-10_l13-2-in-1-gen-6_s2-2-in-1-gen-10_intel_w11_24h2_202508.old" -DestinationName notEmpty.exe -DestinationDirectory C:\Temp\ The result was a 1245-byte .exe file containing HTML content—not an empty file. So while the function exits as it did before #316, the fallback behavior may still produce a non-empty file that contains error markup. This distinction matters because downstream logic might interpret a non-zero file size (with null $remoteLength) as a successful download. I believe this behavior predates #316 and wasn’t introduced by your commit. However, it might be worth documenting or validating to prevent unintended use of such error pages as binaries (e.g., a driver pack)—especially in automated workflows. |
b963035 to
57c66ac
Compare
|
I've been continuously rebasing this branch onto the latest master to keep it up to date and mergeable. Please let me know if any further changes are needed. |
…xecution - Add support for importing offline OS catalogs in - Get-OSDCloudOperatingSystems.ps1 - Get-OSDCloudOperatingSystemsIndexMap.ps1 - Get-OSDCloudOperatingSystemsIndexes.ps1 - Add offline driver catalog support in OSDCloud.DriverPack.ps1 - Add post-network script execution and optional supression of module auto-update in - Initialize-OSDCloudStartNet.ps1 - OSDCloudTemplate.ps1 - removed: Improve Save-WebFile.ps1 by checking HTTP headers before download Due to conflicts with PR OSDeploy#316 affecting Save-WebFile.ps1, my changes have been removed to maintain consistency with the upstream implementation.
57c66ac to
3f7b5b2
Compare
Summary (Revised on 2025-10-06)
This pull request consolidates previous commits and introduces a comprehensive revision to improve clarity and maintainability.
Rather than adding new features, it focuses on preserving the current functionality of OSD while enhancing its customizability for enterprise IT teams.
It introduces support for custom offline catalog files in OSD deployments, along with improvements to post-network initialization and module update control.
These changes provide greater flexibility for enterprise IT teams to tailor the OSD environment.
However, when automatic module updates are suppressed, IT teams must take responsibility for maintaining catalog files manually.
Background
These patches are designed for scenarios involving
Start-OSDCloudGUI.The OSD module published to the PowerShell Gallery is automatically updated up to four times a day, including refreshed OS and DriverPack catalog files (JSON/XML) stored in the cache folder. Because these catalogs are bundled with the module, running
Import-Module -Forceby default updates both the PowerShell scripts and the catalog files.This automation makes it difficult for enterprise IT teams to customize and test the OSD module, as any local modifications are overwritten by the latest version from the PowerShell Gallery.
To address this, the update introduces mechanisms to override default catalogs and suppress automatic module updates.
Key Enhancements
1. Offline Catalog Override
Affected files:
Get-OSDCloudDriverPacks.ps1Get-OSDCloudOperatingSystems.ps1Get-OSDCloudOperatingSystemsIndexMap.ps1Get-OSDCloudOperatingSystemsIndexes.ps1When the
USB\OSDCloud\Catalogsfolder is present, these patched scripts prioritize user-defined catalog files over the default cache.2. Post-Network Script Execution & Suppression of Auto Module Update
Affected files:
Initialize-OSDCloudStartnet.ps1OSDCloudTemplate.ps1Enhancements:
Suppress Automatic Module Updates
Automatic updates can now be disabled by setting
"OSDAutoUpdate": falseinOSDCloud\Config\Initialize-OSDCloudStartnet.json. This allows IT teams to maintain control over catalog versions and avoid unintended overwrites.Execute Custom Script After Network Initialization
A custom PowerShell script can be triggered after a network connection (Wi-Fi or Ethernet) is established.
The script path is defined via a new template variable pointing to
OSDCloud\Config\StartNet2.These enhancements give enterprise IT teams greater control over deployment behavior and catalog management.
3. Non-Intrusive Design
All enhancements are opt-in. Default behavior remains unchanged unless the relevant folders or configuration files are explicitly provided, ensuring full backward compatibility.
Integration Notes
This PR includes cherry-picked changes from PR #288 for integration with existing startup logic.
Revision History
feature/InintStartNet2(PR #288) for integrationSave-WebFile.ps1due to overlap with PR #316