Closed driver1998 closed 9 months ago
and can be used to build ISOs with minimal effort
But why, when you can download the full ISOs, and, as opposed to ESB built ISOs, they can be formally validated. Even if you can validate the SHA-1 of the individual components, it doesn't remove the fact that people still need to trust the script, whereas, in its current form, people who don't trust the script can easily validate that it's not doing anything dodgy.
If I were to add ISO from ESD in Fido, I'm pretty sure I'd get quite a few of "Because your script is creating ISOs that can't be formally validated, how can we be sure that Fido is not injecting malware into the resulting ISO?".
I will also very much dispute the "minimal effort", which looks like something someone, who doesn't have to perform the task themselves, and especially will not have to support it for years thereafter, would say. Anything you don't have to do yourself looks like a 5 minutes job.
This is the only way to download official ARM64 installation media from Microsoft
Then complain to Microsoft that they need to release official ISOs for ARM64, like they should have done a long time ago.
There's really no point of adding another route to get from point A to point B when you already have a perfectly suitable road, and I have zero time to inject in what I don't consider to be a needed endeavour. → Rejected.
As the name suggests, these are the files actually downloaded by the Media Creation Tool.
Some valid points:
How to get the file list with MCT:
C:\$Windows.~WS\Sources
, you should seeproducts.cab
, extract it to getproduct.xml
(MCT might already did this)MCT ESD layout: