diff --git a/QubesBuilder.md b/QubesBuilder.md index fdb2f7b3..3f25c478 100644 --- a/QubesBuilder.md +++ b/QubesBuilder.md @@ -7,8 +7,6 @@ permalink: /wiki/QubesBuilder/ Building Qubes from scratch =========================== -(based on [​this post](https://groups.google.com/group/qubes-devel/browse_thread/thread/588399cdd43da28c/496e9eb9ccf31abb)) - We have recently created a fully automated build system for Qubes, that downloads, builds and packages all the Qubes components, and finally should spit out a ready-to-use installation ISO. In order to use it one should use an rpm-based distro, like Fedora :) and should ensure the following packages are installed: @@ -26,8 +24,27 @@ sudo yum install git createrepo rpm-build make The build system creates build environments in chroots and so no other packages are needed on the host. All files created by the build system are contained within the qubes-builder directory. The full build requires some 25GB of free space, so keep that in mind when deciding where to place this directory. +The build system is configured via builder.conf file -- one should copy the attached builder.conf.template, and modify it as needed, e.g.: + +``` {.wiki} +cp builder.conf.default builder.conf +# edit the builder.conf file and set the following variables: +# (make sure to leave no spaces around '=' sign!) +# NO_SIGN="1" +``` + One additional useful requirement is that 'sudo root' work without any prompt, which is default on most distros (e.g. 'sudo bash' brings you the root shell without asking for any password). This is important as the builder needs to switch to root and then back to user several times during the build process. +Additionally, if building with signing enabled (so NO\_SIGN is not set), one must adjust \~/.rpmmacro file so that it point to the GPG key used for package signing, e.g.: + +``` {.wiki} +%_signature gpg +%_gpg_path /home/user/.gnupg +%_gpg_name AC1BF9B3 # <-- Key ID used for signing +``` + +It is also recommended to use an empty passphrase for the private key used for signing. Contrary to a popular belief, this doesn't affect your key or sources security -- if somebody compromised your system, then the game is over, whether you use additional passphrase for the key or not. + So, to build Qubes one would do: ``` {.wiki} @@ -47,7 +64,6 @@ cd qubes-builder cp builder.conf.default builder.conf # edit the builder.conf file and set the following variables: # (make sure to leave no spaces around '=' sign!) -# GIT_SUBDIR="joanna" # NO_SIGN="1" # And now to build all Qubes rpms (this will take a few hours):