Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Documentation/build_qubes_packages.md: add procedure for building qub… #7

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

miczyg1
Copy link

@miczyg1 miczyg1 commented Dec 19, 2022

…es packages

Signed-off-by: Michał Żygowski [email protected]
Signed-off-by: Tomasz Żyjewski [email protected]

…es packages

Signed-off-by: Michał Żygowski <[email protected]>
Signed-off-by: Tomasz Żyjewski <[email protected]>
[getfedora](https://getfedora.org/en/workstation/download/), later the Fedora
37 will probable be stored in
[archive](https://archives.fedoraproject.org/pub/archive/fedora/linux/releases/).

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

redundant empty lines

@@ -0,0 +1,320 @@
# Qubes OS Packages
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How this documentation can be found?

  • there is not mention of it in README
  • maybe reference in TrenchBoot Documentation which is published https://trenchboot.org/ should be considered?

TrenchBoot as Qubes OS AEM should gain more visibility on TrenchBoot website.

Also whenever we have some progress to share it is worthy to try engage community on #trenchboot channel at OSFW slack (and in Dasharo Matrix Space).

[Qubes builder](https://www.qubes-os.org/doc/qubes-builder/) can be used to
prepare new ISO image but also to build customized packages. To do the latter
we will need PC with Fedora installed (may be any version as builder prepare
fc32 chroot itself).
Copy link
Member

@pietrushnic pietrushnic Dec 19, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This paragraph sound more like requirements. Also I wonder about new qubes-builder which was announced at Qubes OS Summit, are we using it, and if not then the question is why?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AFAIK new builder should not be OS-dependent because it leverage containers

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

dunno which one was announced at summit, but we used one pointed in documentation https://www.qubes-os.org/doc/qubes-builder/ which says In order to use it, you should use an rpm-based distro, like Fedora

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@TomaszAIR I guess there are plans to enable builder for other OSes (docker-based solution IIRC). I tried to test it during Qubes OS summit, but had issues with it: https://github.com/QubesOS/qubes-builderv2

Anyway, if for now we use v1 which is recommended it is ok, but in long run I would appreciate to support also Debian-based environment which many community members use.

qubes-src/grub2/pkgs/dom0-fc32/x86_64/grub2-tools-extra-debuginfo-2.06-0.1.fc32.x86_64.rpm
qubes-src/grub2/pkgs/dom0-fc32/x86_64/grub2-tools-minimal-2.06-0.1.fc32.x86_64.rpm
qubes-src/grub2/pkgs/dom0-fc32/x86_64/grub2-tools-minimal-debuginfo-2.06-0.1.fc32.x86_64.rpm
```
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

And what when I will have packages? What I can do with those? How to use them?

our fork). To fetch manually run following command.

```bash
$ FETCH_CMD="curl --proto '=https' --proto-redir '=https' --tlsv1.2 --http1.1 -sSfL -o" make get-sources

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You can call make get-sources-extra COMPONENTS="vmm-xen grub2" from qubes-builder dir, to avoid specifying this manually.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@TomaszAIR can you try it out?

@SergiiDmytruk
Copy link
Member

Cleanup: do we want to proceed with this PR?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants