You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For those interested, I wrote (with help) a very small script to help extract the contents of an AppImage when --appimage-extract is broken. This can happen when...
The .AppImage file was compiled for another architecture (e.g. ARM64)
Working on #7252 I've been switching OSs and architectures a lot, so this tool allows me to inspect the structure of the AppImage without having the same platform that it was built for.
How it works:
It reads the ELF headers using either python3 or readelf to calculate the byte offset of the payload and then passes that value to unsquashfs.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
For those interested, I wrote (with help) a very small script to help extract the contents of an AppImage when
--appimage-extract
is broken. This can happen when....AppImage
file was compiled for another architecture (e.g. ARM64)https://github.com/tresf/appimage-extract
Usage:
Purpose:
Working on #7252 I've been switching OSs and architectures a lot, so this tool allows me to inspect the structure of the AppImage without having the same platform that it was built for.
How it works:
It reads the ELF headers using either
python3
orreadelf
to calculate the byte offset of the payload and then passes that value tounsquashfs
.Beta Was this translation helpful? Give feedback.
All reactions