Compare commits

...

5 commits

4 changed files with 15 additions and 15 deletions

View file

@ -33,10 +33,10 @@ variables:
tags:
- qubes-template
verify-alpine318:
verify-alpine320:
extends: .verify
variables:
CI_ALPINE_TARGET_RELEASE: alpine318
CI_ALPINE_TARGET_RELEASE: alpine320
.build:
stage: build
@ -75,10 +75,10 @@ verify-alpine318:
tags:
- qubes-template
build-alpine318:
build-alpine320:
extends: .build
variables:
CI_ALPINE_TARGET_RELEASE: alpine318
CI_ALPINE_TARGET_RELEASE: alpine320
release:
stage: release

View file

@ -11,15 +11,8 @@ and packaged in an RPM that is installable by QubesOS.
Alpine Linux as a QubesOS template is still a work and progress. It is highly
encouraged to make bug reports.
#### The yet-to-be-implemented list
Thus the following use cases are still not supported / tested:
* QubesOS r4.2
* Service VMs (sys-net, sys-usb, sys-firewall)
* Firewall (not tested)
* `qubes-builder` hooks (thus no `dom0` template RPM yet, see [here](https://gitlab.alpinelinux.org/ayakael/qubes-builder-alpine) for progress)
* `apk` proxying from within template (thus you must allow internet access to template to install packages)
* `qubes-vm-kernel-support` Not adapted for use on Alpine yet, due to it providing a Dracut module. In most cases, it is not necessary as Qubes provides the kernel.
This package is only neccessary when VM uses its own kernel, thus a hook is added to Dracut to generate the initrd for use within qubes.
### Known issues
Known issues are tracked on the upstream GitLab instance.
#### Issues, recommendations and proposals
**To report an issue or share a recommendation**

View file

@ -23,7 +23,7 @@ GIT_PREFIX := QubesOS/qubes-
# DISTS_VM - Choose the templates to build. Multiple templates can be defined
# to build. Uncomment tempalte dist to build.
DISTS_VM := alpine318
DISTS_VM := alpine320
COMPONENTS += builder-alpine
BUILDER_PLUGINS += builder-alpine

View file

@ -79,8 +79,15 @@ echo "hvc0::respawn:/sbin/getty -L hvc0 115200 vt220" >> "$INSTALLDIR"/etc/initt
# create /lib/modules for qubes-kernel module mount
"${TEMPLATE_CONTENT_DIR}/alpine-chroot" "$INSTALLDIR" mkdir /lib/modules
# lo device
cat > "${INSTALLDIR}/etc/network/interfaces" <<EOF
auto lo
iface lo inet loopback
EOF
# enable services
for i in udev udev-trigger xendriverdomain qubes-qrexec-agent qubes-db qubes-meminfo-writer qubes-sysinit qubes-core-early qubes-core qubes-gui-agent crond acpid; do
for i in udev udev-trigger xendriverdomain qubes-qrexec-agent qubes-db qubes-meminfo-writer qubes-sysinit qubes-core-early qubes-core qubes-gui-agent qubes-updates-proxy-forwarder crond acpid; do
"${TEMPLATE_CONTENT_DIR}/alpine-chroot" "$INSTALLDIR" rc-update add $i default
done
for i in bootmisc hostname hwclock loadkmap modules networking seedrng swap sysctl syslog; do