42a93093dd
Upstream-commit: 7c37bb7bd65ad3a183790ad07344729504bc0930 |
||
---|---|---|
.. | ||
files | ||
clone.sls | ||
clone.top | ||
configure-qubes-executor.sls | ||
configure-qubes-executor.top | ||
configure.sls | ||
configure.top | ||
create.sls | ||
create.top | ||
init.sls | ||
init.top | ||
install-qubes-executor.sls | ||
install-qubes-executor.top | ||
install.sls | ||
install.top | ||
README.md |
qubes-builder
Setup Qubes OS Builder V2 in Qubes OS itself.
Table of Contents
Description
Setup a Builder qube named "qubes-builder" and a disposable template for Qubes Executor named "dvm-qubes-builder". It is possible to use any of the available executors: docker, podman, qubes-executor.
During installation, after cloning the qubes-builderv2 repository, signatures will be verified and the installation will fail if the signatures couldn't be verified. Packages necessary for split operations such as split-gpg2, spit-git and split-ssh-agent will also be installed.
Installation
The template is based on Fedora Minimal and not Debian Minimal due to the Qubes Executor lacking some dependencies on Debian such as mock. Even if the builder qube was Debian based, the executor qube still needs to be a Fedora template.
- Top
qubesctl top.enable qubes-builder
qubesctl --targets=tpl-qubes-builder,dvm-qubes-builder,qubes-builder state.apply
qubesctl top.disable qubes-builder
- State
qubesctl state.apply qubes-builder.create
qubesctl --skip-dom0 --targets=tpl-qubes-builder state.apply qubes-builder.install
qubesctl --skip-dom0 --targets=dvm-qubes-builder state.apply qubes-builder.configure-qubes-executor
qubesctl --skip-dom0 --targets=qubes-builder state.apply qubes-builder.configure
Access Control
The policy is based on qubes-builderv2/rpc/50-qubesbuilder.policy
.
Extra services added are qubes.Gpg2
, qusal.GitInit
, qusal.GitFetch
,
qusal.GitPush
, qusal.SshAgent
. Necessary services are allowed to have an
unattended build.
Usage
The builder qube is named qubes-builder
.
When using the Qubes Executor, configure the builder.yml
dispvm
option to
either dom0
or dvm-qubes-builder
:
executor:
type: qubes
options:
dispvm: "dom0"
#dispvm: "dvm-qubes-builder"
Setting the Disposable VM to Dom0 works because it will use the
default_dispvm
preference of qubes-builder
, which is dvm-qubes-builder
.
If you need to pull new commits, a set of trusted keys is present in
/home/user/.gnupg/qubes-builder
. By default, the provided gitconfig verifies
merges, so pulling new commits will do signature verification of FETCH_HEAD
:
GNUPGHOME="$HOME/.gnupg/qubes-builder" git pull
Commit 7c37bb7 has a good GPG signature by Frédéric Pierret (fepitre)
<frederic.pierret@qubes-os.org>
...
There are no further modifications needed to comply with this package. Consult upstream documentation on how to use the Qubes OS Builder V2.