<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.kinguardproject.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pa</id>
	<title>The Kinguard Project Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.kinguardproject.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pa"/>
	<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Special:Contributions/Pa"/>
	<updated>2026-04-16T10:16:35Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.1</generator>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=126</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=126"/>
		<updated>2020-07-19T11:58:11Z</updated>

		<summary type="html">&lt;p&gt;Pa: updated release links.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 19.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/20.07 Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/20.07/ReleaseNotes_20.07.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For KEEP&#039;&#039;&#039;, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For OPI&#039;&#039;&#039; write the image file (.img) to a uSD card (using Etcher or similar tool), insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete. When the installation is complete replace the installation SD-card with a blank SD card.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Special OPI note when upgradeing&#039;&#039;&#039; from the older OPI software to the newer Kinguard-based version. &#039;&#039;&#039;It is not possible to reuse data directly from an old SD-card&#039;&#039;&#039;. The default procedure is to perform a backup to USB and then do a complete reinstall with a new/newly formatted SD card.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters available. Note that you need to be &amp;quot;root&amp;quot; in order to change these parameters.&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-OPI-Legacy/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-OPI-Legacy/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-KEEP-Legacy Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=105</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=105"/>
		<updated>2018-12-22T15:55:06Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Older releases provided by OpenProducts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For KEEP&#039;&#039;&#039;, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For OPI&#039;&#039;&#039; write the image file (.img) to a uSD card (using Etcher or similar tool), insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete. When the installation is complete replace the installation SD-card with a blank SD card.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Special OPI note when upgradeing&#039;&#039;&#039; from the older OPI software to the newer Kinguard-based version. &#039;&#039;&#039;It is not possible to reuse data directly from an old SD-card&#039;&#039;&#039;. The default procedure is to perform a backup to USB and then do a complete reinstall with a new/newly formatted SD card.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters available. Note that you need to be &amp;quot;root&amp;quot; in order to change these parameters.&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-OPI-Legacy/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-OPI-Legacy/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-KEEP-Legacy Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=103</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=103"/>
		<updated>2018-12-22T15:46:03Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* KEEP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For KEEP&#039;&#039;&#039;, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For OPI&#039;&#039;&#039; write the image file (.img) to a uSD card (using Etcher or similar tool), insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete. When the installation is complete replace the installation SD-card with a blank SD card.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Special OPI note when upgradeing&#039;&#039;&#039; from the older OPI software to the newer Kinguard-based version. &#039;&#039;&#039;It is not possible to reuse data directly from an old SD-card&#039;&#039;&#039;. The default procedure is to perform a backup to USB and then do a complete reinstall with a new/newly formatted SD card.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters available. Note that you need to be &amp;quot;root&amp;quot; in order to change these parameters.&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-OPI/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-OPI/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-KEEP Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=102</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=102"/>
		<updated>2018-12-22T15:45:45Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* OPI */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For KEEP&#039;&#039;&#039;, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For OPI&#039;&#039;&#039; write the image file (.img) to a uSD card (using Etcher or similar tool), insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete. When the installation is complete replace the installation SD-card with a blank SD card.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Special OPI note when upgradeing&#039;&#039;&#039; from the older OPI software to the newer Kinguard-based version. &#039;&#039;&#039;It is not possible to reuse data directly from an old SD-card&#039;&#039;&#039;. The default procedure is to perform a backup to USB and then do a complete reinstall with a new/newly formatted SD card.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters available. Note that you need to be &amp;quot;root&amp;quot; in order to change these parameters.&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-OPI/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-OPI/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=101</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=101"/>
		<updated>2018-12-22T15:43:39Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* OPI */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For KEEP&#039;&#039;&#039;, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For OPI&#039;&#039;&#039; write the image file (.img) to a uSD card (using Etcher or similar tool), insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete. When the installation is complete replace the installation SD-card with a blank SD card.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Special OPI note when upgradeing&#039;&#039;&#039; from the older OPI software to the newer Kinguard-based version. &#039;&#039;&#039;It is not possible to reuse data directly from an old SD-card&#039;&#039;&#039;. The default procedure is to perform a backup to USB and then do a complete reinstall with a new/newly formatted SD card.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters available. Note that you need to be &amp;quot;root&amp;quot; in order to change these parameters.&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-Legacy/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://www.kinguardproject.org/download/releases/OpenProducts-Legacy/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=96</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=96"/>
		<updated>2018-12-09T16:27:31Z</updated>

		<summary type="html">&lt;p&gt;Pa: Clairfication on the need for a new/formatted SD card after OPI install.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For KEEP&#039;&#039;&#039;, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;For OPI&#039;&#039;&#039; write the image file (.img) to a uSD card (using Etcher or similar tool), insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete. When the installation is complete replace the installation SD-card with a blank SD card.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Special OPI note when upgradeing&#039;&#039;&#039; from the older OPI software to the newer Kinguard-based version. &#039;&#039;&#039;It is not possible to reuse data directly from an old SD-card&#039;&#039;&#039;. The default procedure is to perform a backup to USB and then do a complete reinstall with a new/newly formatted SD card.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters available. Note that you need to be &amp;quot;root&amp;quot; in order to change these parameters.&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=95</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=95"/>
		<updated>2018-12-03T12:01:38Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* How to install */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
For KEEP, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
For OPI write the image file (.img) to a uSD card (using Etcher or similar tool), insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Special OPI note&#039;&#039;&#039; regarding upgrading from the older OPI software to the newer Kinguard-based version. It is currently not possible to reuse data directly from an old SD-card. The default procedure is to perform a backup to USB and then do a complete reinstall with a new/newly formatted SD card.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters available. Note that you need to be &amp;quot;root&amp;quot; in order to change these parameters.&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=93</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=93"/>
		<updated>2018-10-08T13:42:00Z</updated>

		<summary type="html">&lt;p&gt;Pa: Update that root-privaliges are needed to edit install parameters.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
For KEEP, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
For OPI write the imate to a uSD card, insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters available. Note that you need to be &amp;quot;root&amp;quot; in order to change these parameters.&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=92</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=92"/>
		<updated>2018-10-08T10:53:34Z</updated>

		<summary type="html">&lt;p&gt;Pa: Added note about rescue mode.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
A simple cross platform tool to write .img files to an SD Card or USB Stick is Etcher. https://etcher.io/&lt;br /&gt;
&lt;br /&gt;
For KEEP, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
For OPI write the imate to a uSD card, insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters avaialbe:&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact. &lt;br /&gt;
&lt;br /&gt;
If set to &#039;0&#039;, the system will boot into a rescue mode, leaving all data on the system intact, but allowing access to the system using ssh and serial console.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=88</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=88"/>
		<updated>2018-10-01T08:59:55Z</updated>

		<summary type="html">&lt;p&gt;Pa: Updated with installation time.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the img-file to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
For KEEP, the installation takes about 3 minutes. Unfortunately there is currently no visual indication that the installation has completed. A hint though is that when the harddrive spins down, the installation is complete. After the completed installation the unit needs to be power cycled.&lt;br /&gt;
&lt;br /&gt;
For OPI write the imate to a uSD card, insert it into OPI and apply power.&lt;br /&gt;
OPI will turn off all LEDs when the installation is complete.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters avaialbe:&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=87</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=87"/>
		<updated>2018-08-30T13:26:41Z</updated>

		<summary type="html">&lt;p&gt;Pa: Added example for StringList&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;dns&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;availabledomains&amp;quot;:[&amp;quot;op-i.me&amp;quot;,&amp;quot;mykeep.net&amp;quot;]&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- vmailbox     path to virtual mailbox mapping, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- vdomains     path to virtual domains file (Which domains to accept mail from), relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- saslpasswd   path to sasl password store file, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- oprelayserver URL to OpenProducts smtp-relay&lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- certpath      the location where signed certificate are stored&lt;br /&gt;
      |- customcert    full path to custom certificate&lt;br /&gt;
      |- customkey     full path to private key for the custom certificate&lt;br /&gt;
      |- defaultcert   full path to default (fallback) certificate&lt;br /&gt;
      |- defaultkey    full path to private key for the default (fallback) certificate&lt;br /&gt;
      |- activecert    path to symlink for the certificate being used&lt;br /&gt;
      |- activekey     path to symlink for key corresponding to activecert&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=86</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=86"/>
		<updated>2018-07-09T07:52:31Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- vmailbox     path to virtual mailbox mapping, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- vdomains     path to virtual domains file (Which domains to accept mail from), relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- saslpasswd   path to sasl password store file, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- oprelayserver URL to OpenProducts smtp-relay&lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- certpath      the location where signed certificate are stored&lt;br /&gt;
      |- customcert    full path to custom certificate&lt;br /&gt;
      |- customkey     full path to private key for the custom certificate&lt;br /&gt;
      |- defaultcert   full path to default (fallback) certificate&lt;br /&gt;
      |- defaultkey    full path to private key for the default (fallback) certificate&lt;br /&gt;
      |- activecert    path to symlink for the certificate being used&lt;br /&gt;
      |- activekey     path to symlink for key corresponding to activecert&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=81</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=81"/>
		<updated>2018-07-04T11:49:39Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount &lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- certpath      the location where signed certificate are stored&lt;br /&gt;
      |- customcert    full path to custom certificate&lt;br /&gt;
      |- customkey     full path to private key for the custom certificate&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=80</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=80"/>
		<updated>2018-07-04T11:24:03Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount &lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- certpath      the location where signed certificate are stored&lt;br /&gt;
      |- usercertpath  the location where user certificate are stored&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=79</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=79"/>
		<updated>2018-07-04T09:57:46Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount &lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- customkey     complete path to file that holds the private key for the custom certificate (If used)&lt;br /&gt;
      |- customcert    complete path to file that holds the custom certificate (If used)&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=78</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=78"/>
		<updated>2018-07-04T09:41:11Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount &lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- defaultkey    complete path to file that holds the private key for the default certificate (If used)&lt;br /&gt;
      |- defaultcert   complete path to file that holds the default certificate (If used)&lt;br /&gt;
      |- customkey     complete path to file that holds the private key for the custom certificate (If used)&lt;br /&gt;
      |- customcert    complete path to file that holds the custom certificate (If used)&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=77</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=77"/>
		<updated>2018-07-04T09:34:27Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount &lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- key           complete path to file that holds the private key for the default certificate (If used)&lt;br /&gt;
      |- cert          complete path to file that holds the default certificate (If used)&lt;br /&gt;
      |- customkey     complete path to file that holds the private key for the custom certificate (If used)&lt;br /&gt;
      |- customcert    complete path to file that holds the custom certificate (If used)&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=76</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=76"/>
		<updated>2018-07-04T08:15:01Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount &lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- key           complete path to file that holds the private key for the custom certificate (If used)&lt;br /&gt;
      |- cert          complete path to file that holds the custom certificate (If used)&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=75</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=75"/>
		<updated>2018-07-04T08:14:38Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
&lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    path to the private key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     path to corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - filesystem&lt;br /&gt;
      |- storagemount  mountpoint of storage volume&lt;br /&gt;
      |- luksdevice    luks-created cryptodevice (If used)&lt;br /&gt;
      |- lvmdevice     lvm-created storage pool (If used)&lt;br /&gt;
      |- lvmvg         lvm-created volume group (If used)&lt;br /&gt;
      |- lvmlv         lvm-created logical volume (If used)&lt;br /&gt;
 &lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid        system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname      the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain        the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile        the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey    the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey     corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - mail&lt;br /&gt;
      |- localmail    configuration file for local mail delivery, relative to filesystem-&amp;gt;storagemount&lt;br /&gt;
      |- virtualalias configuration file for virtual mail aliases, relative to filesystem-&amp;gt;storagemount &lt;br /&gt;
 &lt;br /&gt;
 - setup&lt;br /&gt;
      |- conntesthost  host used for connectivity tests&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
  &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme         the theme used by webapps&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
      |- key           complete path to file that holds the private key for the custom certificate&lt;br /&gt;
      |- cert          complete path to file that holds the custom certificate&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=71</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=71"/>
		<updated>2018-06-29T06:38:40Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Config scopes and variables */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
Very few of these parameters are mandatory. However default behavior for the applications will vary if an expected parameter is missing.&lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid      system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname    the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain      the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile      the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey  the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey   corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
 &lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    the key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
 &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme      the theme used by webapps&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=70</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=70"/>
		<updated>2018-06-29T06:34:49Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
The kinguard system components store all generic none security sensitive configuration in a central configuration file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This file should however never be manually edited it should always be accessed programatically using either [https://github.com/Kinguard/libkgp libkgp] or any wrapper to this library described further down.  &lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
For reference here is the layout of the sysconfig json file. Please read the file for reference but never ever edit it manually.&lt;br /&gt;
&lt;br /&gt;
The complete configuration file is one json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
=== Native access via libkgp ===&lt;br /&gt;
Libkgp is the main library to use when programming locally for the kinguard system it contains c++ objects for managing all kinguard functions. No official documentation exists for this yet but pointers on how it works can be found in the [https://github.com/Kinguard/libkgp/tree/master/test unit tests] and in the applications utilizing them for example [https://github.com/Kinguard/kgp-backend KGP backend] and [https://github.com/Kinguard/kgp-control KGP startup control]&lt;br /&gt;
&lt;br /&gt;
To access the system configuration the [https://github.com/Kinguard/libkgp/blob/master/SysConfig.h SysConfig class]&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;br /&gt;
&lt;br /&gt;
= Config scopes and variables =&lt;br /&gt;
 - hostinfo&lt;br /&gt;
      |- unitid      system id to use as account identifier for service provider backends&lt;br /&gt;
      |- hostname    the &#039;host&#039; part of the [https://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN]&lt;br /&gt;
      |- domain      the &#039;domain&#039; part of the FQDN&lt;br /&gt;
      |- cafile      the ca file used to verify service provider backends&lt;br /&gt;
      |- sysauthkey  the key used to access data on service provider backends&lt;br /&gt;
      |- syspubkey   corresponding public key&lt;br /&gt;
 &lt;br /&gt;
 - upnp&lt;br /&gt;
      |- forwardports  which ports the device shall try to forward from a UPNP gateway&lt;br /&gt;
 &lt;br /&gt;
 - autoupdate&lt;br /&gt;
      |- enabled     turns on and off automatic updates&lt;br /&gt;
 &lt;br /&gt;
 - backup&lt;br /&gt;
      |- backend           which storage backend to use for s3ql &lt;br /&gt;
      |- devicemountpath   where to mount local devices, such as usb memories&lt;br /&gt;
      |- enabled           turns on and off the backup service&lt;br /&gt;
 &lt;br /&gt;
 - dns&lt;br /&gt;
      |- dnsauthkey    the key used for lower level authentication on service provider backends&lt;br /&gt;
      |- dnspubkey     corresponding public key&lt;br /&gt;
      |- enabled       turns on and off dns updates&lt;br /&gt;
      |- provider      backend provider&lt;br /&gt;
 &lt;br /&gt;
 - webcertificate&lt;br /&gt;
      |- backend       backend provider&lt;br /&gt;
      |- enabled       turns on and off generation of web certificates&lt;br /&gt;
 &lt;br /&gt;
 - webapps&lt;br /&gt;
      |- theme      the theme used by webapps&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=66</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=66"/>
		<updated>2018-06-05T13:13:39Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Python */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
Runtime parameters should be saved in the file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Access to the file should be done using [https://github.com/Kinguard/libkgp libkgp (former libopi)], either directly using the shared lib, or by the wrappers for different programming languages.&lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
The configuration file is a json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=65</id>
		<title>Documentation</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=65"/>
		<updated>2018-06-05T13:10:08Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Software Components */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Manual Source ==&lt;br /&gt;
The manual for the is written in latex and located on [https://github.com/Kinguard/manual github]&lt;br /&gt;
Ideally this should be adapted to better suit The Kinguard Project, so feel free to contribute.&lt;br /&gt;
&lt;br /&gt;
In order for this to work, there are separate branches for different products and also a separate branch for a short one-pager.&lt;br /&gt;
&lt;br /&gt;
== OPI ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/opi/documentation/quickstart.pdf as pdf here]&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
The schematics for OPI is available for download [https://download.openproducts.com/opi/documentation/OP-I_1B Rev B .pdf as pdf here]. It is in most aspects a copy of BeageBoneBlack, with the HDMI removed.&lt;br /&gt;
&lt;br /&gt;
== KEEP ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/keep/documentation/keep-quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
KEEP is using a SOM (System On Module) from SolidRun, with 2GB DDR RAM and 8GB eMMC. The carrier board is made by [https://www.openproducts.com OpenProducts]. Schematics and component placement for that board is available [https://download.openproducts.com/keep/documentation/KEEP_R1B.pdf as pdf here].&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/documentation/KEEP_PCB.step A stp-model] for the PCBA is also available for download (~60MB).&lt;br /&gt;
&lt;br /&gt;
== SOFTWARE COMPONENTS ==&lt;br /&gt;
There are a number of software components available in The Kinguard Project, some of them documented here, but most is by comments in source code and available by running the application with &amp;quot;--help&amp;quot;&lt;br /&gt;
* System configuration (sysconfig.json). [[Documentation/sysconfig|Details]]&lt;br /&gt;
* System utilities, (kgp-sysinfo, kgp-notifier) [https://github.com/Kinguard/kinguard-utils Details]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=64</id>
		<title>Documentation</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=64"/>
		<updated>2018-06-05T13:07:43Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Software Components */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Manual Source ==&lt;br /&gt;
The manual for the is written in latex and located on [https://github.com/Kinguard/manual github]&lt;br /&gt;
Ideally this should be adapted to better suit The Kinguard Project, so feel free to contribute.&lt;br /&gt;
&lt;br /&gt;
In order for this to work, there are separate branches for different products and also a separate branch for a short one-pager.&lt;br /&gt;
&lt;br /&gt;
== OPI ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/opi/documentation/quickstart.pdf as pdf here]&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
The schematics for OPI is available for download [https://download.openproducts.com/opi/documentation/OP-I_1B Rev B .pdf as pdf here]. It is in most aspects a copy of BeageBoneBlack, with the HDMI removed.&lt;br /&gt;
&lt;br /&gt;
== KEEP ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/keep/documentation/keep-quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
KEEP is using a SOM (System On Module) from SolidRun, with 2GB DDR RAM and 8GB eMMC. The carrier board is made by [https://www.openproducts.com OpenProducts]. Schematics and component placement for that board is available [https://download.openproducts.com/keep/documentation/KEEP_R1B.pdf as pdf here].&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/documentation/KEEP_PCB.step A stp-model] for the PCBA is also available for download (~60MB).&lt;br /&gt;
&lt;br /&gt;
== Software Components ==&lt;br /&gt;
There are a number of software components available in The Kinguard Project, some of them documented here, but most is by comments in source code and available by running the application with &amp;quot;--help&amp;quot;&lt;br /&gt;
* System configuration (sysconfig.json). [[Documentation/sysconfig|Details]]&lt;br /&gt;
* System utilities, (kgp-sysinfo, kgp-notifier) [https://github.com/Kinguard/kinguard-utils Details]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=63</id>
		<title>Documentation</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=63"/>
		<updated>2018-06-05T13:05:36Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Software Components */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Manual Source ==&lt;br /&gt;
The manual for the is written in latex and located on [https://github.com/Kinguard/manual github]&lt;br /&gt;
Ideally this should be adapted to better suit The Kinguard Project, so feel free to contribute.&lt;br /&gt;
&lt;br /&gt;
In order for this to work, there are separate branches for different products and also a separate branch for a short one-pager.&lt;br /&gt;
&lt;br /&gt;
== OPI ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/opi/documentation/quickstart.pdf as pdf here]&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
The schematics for OPI is available for download [https://download.openproducts.com/opi/documentation/OP-I_1B Rev B .pdf as pdf here]. It is in most aspects a copy of BeageBoneBlack, with the HDMI removed.&lt;br /&gt;
&lt;br /&gt;
== KEEP ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/keep/documentation/keep-quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
KEEP is using a SOM (System On Module) from SolidRun, with 2GB DDR RAM and 8GB eMMC. The carrier board is made by [https://www.openproducts.com OpenProducts]. Schematics and component placement for that board is available [https://download.openproducts.com/keep/documentation/KEEP_R1B.pdf as pdf here].&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/documentation/KEEP_PCB.step A stp-model] for the PCBA is also available for download (~60MB).&lt;br /&gt;
&lt;br /&gt;
== Software Components ==&lt;br /&gt;
There are a number of software components available in The Kinguard Project, some of them documented here, but most is by comments in source code and available by running the application with &amp;quot;--help&amp;quot;&lt;br /&gt;
* System configuration (sysconfig.json). [[Documentation/sysconfig|Details]]&lt;br /&gt;
* System utilities, (kgp-sysinfo, kgp-notifier) [[https://github.com/Kinguard/kinguard-utils|Details]]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=62</id>
		<title>Documentation/sysconfig</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation/sysconfig&amp;diff=62"/>
		<updated>2018-06-05T13:02:33Z</updated>

		<summary type="html">&lt;p&gt;Pa: Initial &amp;#039;sysconfig&amp;#039; documentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=System configuration file=&lt;br /&gt;
&lt;br /&gt;
Runtime parameters should be saved in the file &amp;quot;/etc/kinguard/sysconfig.json&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Access to the file should be done using [https://github.com/Kinguard/libkgp libkgp (former libopi)], either directly using the shared lib, or by the wrappers for different programming languages.&lt;br /&gt;
&lt;br /&gt;
=== File Syntax ===&lt;br /&gt;
The configuration file is a json object (note that javascript object syntax is not permitted).&lt;br /&gt;
&lt;br /&gt;
The file is set up using a &amp;quot;scope&amp;quot; and &amp;quot;key/value&amp;quot; pairs.&lt;br /&gt;
&lt;br /&gt;
All scope and key identifiers shall be lowercase and written with &#039;&#039;&#039;letters and digits only&#039;&#039;&#039;, no &amp;quot;-&amp;quot; or &amp;quot;_&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 {&lt;br /&gt;
   &amp;quot;webapps&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;theme&amp;quot;:&amp;quot;kgp&amp;quot;&lt;br /&gt;
   },&lt;br /&gt;
   &amp;quot;hostinfo&amp;quot;:&lt;br /&gt;
   {&lt;br /&gt;
     &amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;,&lt;br /&gt;
     &amp;quot;hostname&amp;quot;:&amp;quot;myhost&amp;quot;,&lt;br /&gt;
     &amp;quot;domain&amp;quot;:&amp;quot;example.org&amp;quot;&lt;br /&gt;
   }&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Wrappers ===&lt;br /&gt;
Most wrappers can also be used to access other information provided by libkgp, such as the current running system type, information about system storage etc.&lt;br /&gt;
&lt;br /&gt;
===== Shell Scripts =====&lt;br /&gt;
For shell scripts, use &amp;quot;[https://github.com/Kinguard/kinguard-utils kgp-sysinfo]&amp;quot;. Run kgp-sysinfo --help for options.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid -p&lt;br /&gt;
 c79f425c-9af7-4f38-b1ba-d53277b14939&lt;br /&gt;
 &lt;br /&gt;
 # kgp-sysinfo -c hostinfo -k unitid&lt;br /&gt;
 {&amp;quot;unitid&amp;quot;:&amp;quot;c79f425c-9af7-4f38-b1ba-d53277b14939&amp;quot;}&lt;br /&gt;
&lt;br /&gt;
===== Python =====&lt;br /&gt;
For Python3, use the python library &amp;quot;[https://github.com/Kinguard/kgp-pywrap pylibopi]&amp;quot;&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; import pylibopi&lt;br /&gt;
 &amp;gt;&amp;gt;&amp;gt; pylibopi.StorageDevice()&lt;br /&gt;
 &#039;/dev/disk/by-path/platform-f10a8000.sata-ata-2&#039;&lt;br /&gt;
&lt;br /&gt;
===== C =====&lt;br /&gt;
For C programs, [https://github.com/Kinguard/libkgp_wrapper libkgp_wrapper] can be used.&lt;br /&gt;
&lt;br /&gt;
===== PHP =====&lt;br /&gt;
Currently no native PHP wrapper exists, but kgp-sysinfo defaults to output json (see above) that can easily be used in PHP.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=61</id>
		<title>Documentation</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=61"/>
		<updated>2018-06-05T12:25:15Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Manual Source ==&lt;br /&gt;
The manual for the is written in latex and located on [https://github.com/Kinguard/manual github]&lt;br /&gt;
Ideally this should be adapted to better suit The Kinguard Project, so feel free to contribute.&lt;br /&gt;
&lt;br /&gt;
In order for this to work, there are separate branches for different products and also a separate branch for a short one-pager.&lt;br /&gt;
&lt;br /&gt;
== OPI ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/opi/documentation/quickstart.pdf as pdf here]&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
The schematics for OPI is available for download [https://download.openproducts.com/opi/documentation/OP-I_1B Rev B .pdf as pdf here]. It is in most aspects a copy of BeageBoneBlack, with the HDMI removed.&lt;br /&gt;
&lt;br /&gt;
== KEEP ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/keep/documentation/keep-quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
KEEP is using a SOM (System On Module) from SolidRun, with 2GB DDR RAM and 8GB eMMC. The carrier board is made by [https://www.openproducts.com OpenProducts]. Schematics and component placement for that board is available [https://download.openproducts.com/keep/documentation/KEEP_R1B.pdf as pdf here].&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/documentation/KEEP_PCB.step A stp-model] for the PCBA is also available for download (~60MB).&lt;br /&gt;
&lt;br /&gt;
== Software Components ==&lt;br /&gt;
There are a number of software components available in The Kinguard Project, some of them documented here, but most is by comments in source code and available by running the application with &amp;quot;--help&amp;quot;&lt;br /&gt;
* System configuration (sysconfig.json). [[Documentation/sysconfig|Details]]&lt;br /&gt;
* System utilities, (kgp-sysinfo, kgp-notifier) [[Documentation/kinguard-utils|Details]]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=60</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=60"/>
		<updated>2018-05-30T10:08:19Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Install images ===&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the image to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
For OPI write the imate to a uSD card, insert it into OPI and apply power.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters avaialbe:&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=59</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=59"/>
		<updated>2018-05-18T14:14:10Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* How to install */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the image to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
For OPI write the imate to a uSD card, insert it into OPI and apply power.&lt;br /&gt;
&lt;br /&gt;
If data is to be restored from a backup, the recommended way is to make sure that a backup on USB exists (usually faster than downloading from on-line servers), make a clean shutdown of OPI and then leave the USB memory inserted during the setup. The data set can then be chosen during the &amp;quot;Restore&amp;quot; step of the setup procedure.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters avaialbe:&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=58</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=58"/>
		<updated>2018-05-18T13:39:01Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
=== How to install ===&lt;br /&gt;
For KEEP write the image to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
For OPI write the imate to a uSD card, insert it into OPI and apply power.&lt;br /&gt;
&lt;br /&gt;
=== Installer Configuration ===&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters avaialbe:&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=57</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=57"/>
		<updated>2018-05-18T13:09:19Z</updated>

		<summary type="html">&lt;p&gt;Pa: 18.06 release&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Current release ==&lt;br /&gt;
The current release for The Kinguard Project is &amp;quot;Kinguard 18.06&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Install images are provided on the Kinguard [https://www.kinguardproject.org/download/releases/18.06/ Download Area] for both OPI and KEEP.&lt;br /&gt;
&lt;br /&gt;
Please read the [https://www.kinguardproject.org/download/releases/18.06/ReleaseNotes_18.06.pdf ReleseNotes].&lt;br /&gt;
&lt;br /&gt;
For KEEP write the image to a USB stick and press and hold the button for 10 seconds while inserting power.&lt;br /&gt;
&lt;br /&gt;
For OPI write the imate to a uSD card, insert it into OPI and apply power.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters avaialbe:&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;br /&gt;
&lt;br /&gt;
== Older releases provided by OpenProducts ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=56</id>
		<title>Documentation</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=56"/>
		<updated>2018-04-19T10:20:24Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Manual Source ==&lt;br /&gt;
The manual for the is written in latex and located on [https://github.com/Kinguard/manual github]&lt;br /&gt;
Ideally this should be adapted to better suit The Kinguard Project, so feel free to contribute.&lt;br /&gt;
&lt;br /&gt;
In order for this to work, there are separate branches for different products and also a separate branch for a short one-pager.&lt;br /&gt;
&lt;br /&gt;
== OPI ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/opi/documentation/quickstart.pdf as pdf here]&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
The schematics for OPI is available for download [https://download.openproducts.com/opi/documentation/OP-I_1B Rev B .pdf as pdf here]. It is in most aspects a copy of BeageBoneBlack, with the HDMI removed.&lt;br /&gt;
&lt;br /&gt;
== KEEP ==&lt;br /&gt;
&lt;br /&gt;
=== Manual ===&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/keep/documentation/keep-quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
=== Schematics ===&lt;br /&gt;
KEEP is using a SOM (System On Module) from SolidRun, with 2GB DDR RAM and 8GB eMMC. The carrier board is made by [https://www.openproducts.com OpenProducts]. Schematics and component placement for that board is available [https://download.openproducts.com/keep/documentation/KEEP_R1B.pdf as pdf here].&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/documentation/KEEP_PCB.step A stp-model] for the PCBA is also available for download (~60MB).&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Screenshots&amp;diff=55</id>
		<title>Screenshots</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Screenshots&amp;diff=55"/>
		<updated>2018-04-19T09:59:42Z</updated>

		<summary type="html">&lt;p&gt;Pa: Created page with &amp;quot;== Admin UI ==  Start/Status page  KEEP Status Page  User Mangement  KEEP User Management  Local Mail Mangement  F...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Admin UI ==&lt;br /&gt;
&lt;br /&gt;
Start/Status page&lt;br /&gt;
&lt;br /&gt;
[[File:Status Page.png|400px|KEEP Status Page]]&lt;br /&gt;
&lt;br /&gt;
User Mangement&lt;br /&gt;
&lt;br /&gt;
[[File:UserPage.png|400px|KEEP User Management]]&lt;br /&gt;
&lt;br /&gt;
Local Mail Mangement&lt;br /&gt;
&lt;br /&gt;
[[File:LocalMailAccounts.png|400px|Local Mail Mangement]]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=File:LocalMailAccounts.png&amp;diff=54</id>
		<title>File:LocalMailAccounts.png</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=File:LocalMailAccounts.png&amp;diff=54"/>
		<updated>2018-04-19T09:56:54Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Local Mail Management&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=File:UserPage.png&amp;diff=53</id>
		<title>File:UserPage.png</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=File:UserPage.png&amp;diff=53"/>
		<updated>2018-04-19T09:55:12Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;KEEP admin UI user management&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=File:Status_Page.png&amp;diff=52</id>
		<title>File:Status Page.png</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=File:Status_Page.png&amp;diff=52"/>
		<updated>2018-04-19T09:50:35Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;KEEP Status Page&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Enable_serial_console&amp;diff=51</id>
		<title>Enable serial console</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Enable_serial_console&amp;diff=51"/>
		<updated>2018-04-19T09:45:01Z</updated>

		<summary type="html">&lt;p&gt;Pa: Updated with image of serialport connection&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;On both OPI and KEEP, as well as on BeagleBoneBlack, there is a 6-pin header that can be used for debugging the system using a serial cable (not mounted on OPI though), the pinout is compatible with FTDI [http://www.ftdichip.com/Support/Documents/DataSheets/Cables/DS_TTL-232R_CABLES.pdf TTL-232R]&lt;br /&gt;
&lt;br /&gt;
Setting for the serial port is 115200, 8N1.&lt;br /&gt;
&lt;br /&gt;
By default, the boot log is displayed on the console, but it can also be enabled for login by reinstalling the unit. Prior to install edit the file &amp;quot;/etc/kgp-install.conf&amp;quot; on the installation media (disk/usb memory/uSD card) and setting the parameter DO_ADDROOT to 1.&lt;br /&gt;
&lt;br /&gt;
This will make it possible to log into the system with the user &amp;quot;root&amp;quot; and password &amp;quot;op237&amp;quot; on the serial port. Note that this does not enable ssh access, only access using the serial port.&lt;br /&gt;
&lt;br /&gt;
==== Serial port connection ====&lt;br /&gt;
[[File:KEEP serial connection.jpg|thumb|right|TTL to USB serial cable connection]]&lt;br /&gt;
The image shows how to connect the cable mentioned above to KEEP.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=50</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=50"/>
		<updated>2018-04-19T09:43:33Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Currently available downloads ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters avaialbe:&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
How to connect to the serial port is described [[Enable serial console|here]].&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=49</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=49"/>
		<updated>2018-04-19T09:41:35Z</updated>

		<summary type="html">&lt;p&gt;Pa: Updated with install parameters&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Currently available downloads ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
In the installer image there is a configuration file that can be used to alter the behavior of the installer image.&lt;br /&gt;
&lt;br /&gt;
In &amp;quot;/etc/kgp-install.conf&amp;quot; there are few parameters avaialbe:&lt;br /&gt;
&lt;br /&gt;
 DO_INSTALL=1&lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;1&amp;quot;, which will cause the image to basically do a factory reset by formatting the internal eMMC and reinstalling system software. Any data on the data disk will be left intact.&lt;br /&gt;
&lt;br /&gt;
 DO_ADDROOT=0 &lt;br /&gt;
&lt;br /&gt;
By default this parameter is set to &amp;quot;0&amp;quot;. By changing this to &amp;quot;1&amp;quot;, the system will be installed a root account is added with the password &amp;quot;op237&amp;quot;.&lt;br /&gt;
This is only available on the serial port, ssh is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Serial port connection ====&lt;br /&gt;
[[File:KEEP serial connection.jpg|thumb|right|TTL to USB serial cable connection]]&lt;br /&gt;
The image shows how to connect a [http://www.ftdichip.com/Support/Documents/DataSheets/Cables/DS_TTL-232R_CABLES.pdf FTDI DS TTL-232R] cable to KEEP.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=File:KEEP_serial_connection.jpg&amp;diff=48</id>
		<title>File:KEEP serial connection.jpg</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=File:KEEP_serial_connection.jpg&amp;diff=48"/>
		<updated>2018-04-19T09:38:30Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;KEEP serial connection using a TTL to USB cable&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Enable_serial_console&amp;diff=47</id>
		<title>Enable serial console</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Enable_serial_console&amp;diff=47"/>
		<updated>2018-04-13T06:50:27Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;On both OPI and KEEP, as well as on BeableBoneBlack, there is a 6-pin header that can be used for debugging the system using a serial cable (not mounted on OPI though), the pinout is compatible with FTDI [http://www.ftdichip.com/Support/Documents/DataSheets/Cables/DS_TTL-232R_CABLES.pdf TTL-232R]&lt;br /&gt;
&lt;br /&gt;
Setting for the serial port is 115200, 8N1.&lt;br /&gt;
&lt;br /&gt;
By default, the boot log is displayed on the console, but it can also be enabled for login by reinstalling the unit. Prior to install edit the file &amp;quot;/etc/kgp-install.conf&amp;quot; on the installation media (disk/usb memory/uSD card) and setting the parameter DO_ADDROOT to 1.&lt;br /&gt;
&lt;br /&gt;
This will make it possible to log into the system with the user &amp;quot;root&amp;quot; and password &amp;quot;op237&amp;quot; on the serial port. Note that this does not enable ssh access, only access using the serial port.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Enable_serial_console&amp;diff=46</id>
		<title>Enable serial console</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Enable_serial_console&amp;diff=46"/>
		<updated>2018-04-13T06:49:43Z</updated>

		<summary type="html">&lt;p&gt;Pa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;On both OPI and KEEP, as well as on BeableBoneBlack, there is a 6-pin header that can be used for debugging the system using a serial cable, the pinout is compatible with FTDI [http://www.ftdichip.com/Support/Documents/DataSheets/Cables/DS_TTL-232R_CABLES.pdf TTL-232R]&lt;br /&gt;
&lt;br /&gt;
Setting for the serial port is 115200, 8N1.&lt;br /&gt;
&lt;br /&gt;
By default, the boot log is displayed on the console, but it can also be enabled for login by reinstalling the unit. Prior to install edit the file &amp;quot;/etc/kgp-install.conf&amp;quot; on the installation media (disk/usb memory/uSD card) and setting the parameter DO_ADDROOT to 1.&lt;br /&gt;
&lt;br /&gt;
This will make it possible to log into the system with the user &amp;quot;root&amp;quot; and password &amp;quot;op237&amp;quot; on the serial port. Note that this does not enable ssh access, only access using the serial port.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Enable_serial_console&amp;diff=45</id>
		<title>Enable serial console</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Enable_serial_console&amp;diff=45"/>
		<updated>2018-04-13T05:49:32Z</updated>

		<summary type="html">&lt;p&gt;Pa: Created page with &amp;quot;On both OPI and KEEP, as well as on BeableBoneBlack, there is a 6-pin header that can be used for debugging the system using a serial cable, the pinout is compatible with FTDI...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;On both OPI and KEEP, as well as on BeableBoneBlack, there is a 6-pin header that can be used for debugging the system using a serial cable, the pinout is compatible with FTDI [url=http://www.ftdichip.com/Support/Documents/DataSheets/Cables/DS_TTL-232R_CABLES.pdf]TTL-232R[/url].&lt;br /&gt;
&lt;br /&gt;
Setting for the serial port is 115200, 8N1.&lt;br /&gt;
&lt;br /&gt;
By default, the boot log is displayed on the console, but it can also be enabled for login by reinstalling the unit. Prior to install edit the file &amp;quot;/etc/kgp-install.conf&amp;quot; on the installation media (disk/usb memory/uSD card) and setting the parameter DO_ADDROOT to 1.&lt;br /&gt;
&lt;br /&gt;
This will make it possible to log into the system with the user &amp;quot;root&amp;quot; and password &amp;quot;op237&amp;quot; on the serial port. Note that this does not enable ssh access, only access using the serial port.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Tutorials_and_How-tos&amp;diff=44</id>
		<title>Tutorials and How-tos</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Tutorials_and_How-tos&amp;diff=44"/>
		<updated>2018-04-13T05:40:15Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Intermediate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Beginner ==&lt;br /&gt;
&lt;br /&gt;
* [[Access your unit using SSH]]&lt;br /&gt;
* [[SSH access using private/public key pair]]&lt;br /&gt;
* [[Run a backup manually]]&lt;br /&gt;
&lt;br /&gt;
== Intermediate ==&lt;br /&gt;
* [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=750/ Change to a larger SD card on OPI]&lt;br /&gt;
* [[Enable serial console]]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=43</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=43"/>
		<updated>2018-03-06T15:13:26Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* OPI */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Currently available downloads ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of root/op237. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=42</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=42"/>
		<updated>2018-03-06T15:12:58Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* Currently available downloads */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Currently available downloads ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
The rescue image is very similar to the install image, only that the image does not re-install the system. The system will be available both on the serial port and on ssh with the user/password of &#039;root&#039;/&#039;op237&#039;. The root file system can then be accessed and manipulated, but all user data is only available if the encrypted partition in unlocked and mounted by hand.&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=41</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=41"/>
		<updated>2018-03-06T15:07:31Z</updated>

		<summary type="html">&lt;p&gt;Pa: Added link to re-install post on forum.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Currently available downloads ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
Instructions on how to reinstall is available [https://www.kinguardproject.org/forum/viewtopic.php?f=345&amp;amp;t=466 here]&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=40</id>
		<title>Downloads</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Downloads&amp;diff=40"/>
		<updated>2018-03-01T14:31:25Z</updated>

		<summary type="html">&lt;p&gt;Pa: Added KEEP install link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Currently available downloads ==&lt;br /&gt;
&lt;br /&gt;
=== OPI ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/install/ Installation images]&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/opi/rescue/ Rescue images]&lt;br /&gt;
&lt;br /&gt;
=== KEEP ===&lt;br /&gt;
&lt;br /&gt;
[https://download.openproducts.com/keep/install/ Installation images]&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=39</id>
		<title>Documentation</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=39"/>
		<updated>2018-01-09T13:11:27Z</updated>

		<summary type="html">&lt;p&gt;Pa: /* SOURCE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OPI ==&lt;br /&gt;
&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/opi/documentation/quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
== KEEP ==&lt;br /&gt;
&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/keep/documentation/keep-quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
== SOURCE ==&lt;br /&gt;
The manual for the is written in latex and located on [https://github.com/Kinguard/manual github]&lt;br /&gt;
Ideally this should be adapted to better suit The Kinguard Project, so feel free to contribute.&lt;br /&gt;
&lt;br /&gt;
In order for this to work, there are seperate branches for different products and also a separate branch for a short one-pager.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
	<entry>
		<id>https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=38</id>
		<title>Documentation</title>
		<link rel="alternate" type="text/html" href="https://www.kinguardproject.org/wiki/index.php?title=Documentation&amp;diff=38"/>
		<updated>2018-01-09T13:10:06Z</updated>

		<summary type="html">&lt;p&gt;Pa: Added link to KEEP documentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OPI ==&lt;br /&gt;
&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/opi/documentation/quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
== KEEP ==&lt;br /&gt;
&lt;br /&gt;
The latest compiled version is available [https://download.openproducts.com/keep/documentation/keep-quickstart.pdf as pdf here]&lt;br /&gt;
&lt;br /&gt;
== SOURCE ==&lt;br /&gt;
The manual for the is written in latex and located on [https://github.com/Kinguard/manual github]&lt;br /&gt;
Ideally this should be adapted to better suit The Kinguard Project, so feel free to contribute.&lt;/div&gt;</summary>
		<author><name>Pa</name></author>
	</entry>
</feed>