Compare commits

...

4 commits
r4.2 ... r4.1

4 changed files with 15 additions and 15 deletions

View file

@ -33,10 +33,10 @@ variables:
tags: tags:
- qubes-template - qubes-template
verify-alpine318: verify-alpine319:
extends: .verify extends: .verify
variables: variables:
CI_ALPINE_TARGET_RELEASE: alpine318 CI_ALPINE_TARGET_RELEASE: alpine319
.build: .build:
stage: build stage: build
@ -75,10 +75,10 @@ verify-alpine318:
tags: tags:
- qubes-template - qubes-template
build-alpine318: build-alpine319:
extends: .build extends: .build
variables: variables:
CI_ALPINE_TARGET_RELEASE: alpine318 CI_ALPINE_TARGET_RELEASE: alpine319
release: release:
stage: release stage: release

View file

@ -11,15 +11,8 @@ and packaged in an RPM that is installable by QubesOS.
Alpine Linux as a QubesOS template is still a work and progress. It is highly Alpine Linux as a QubesOS template is still a work and progress. It is highly
encouraged to make bug reports. encouraged to make bug reports.
#### The yet-to-be-implemented list ### Known issues
Thus the following use cases are still not supported / tested: Known issues are tracked on the upstream GitLab instance.
* QubesOS r4.2
* Service VMs (sys-net, sys-usb, sys-firewall)
* Firewall (not tested)
* `qubes-builder` hooks (thus no `dom0` template RPM yet, see [here](https://gitlab.alpinelinux.org/ayakael/qubes-builder-alpine) for progress)
* `apk` proxying from within template (thus you must allow internet access to template to install packages)
* `qubes-vm-kernel-support` Not adapted for use on Alpine yet, due to it providing a Dracut module. In most cases, it is not necessary as Qubes provides the kernel.
This package is only neccessary when VM uses its own kernel, thus a hook is added to Dracut to generate the initrd for use within qubes.
#### Issues, recommendations and proposals #### Issues, recommendations and proposals
**To report an issue or share a recommendation** **To report an issue or share a recommendation**

View file

@ -23,7 +23,7 @@ GIT_PREFIX := QubesOS/qubes-
# DISTS_VM - Choose the templates to build. Multiple templates can be defined # DISTS_VM - Choose the templates to build. Multiple templates can be defined
# to build. Uncomment tempalte dist to build. # to build. Uncomment tempalte dist to build.
DISTS_VM := alpine318 DISTS_VM := alpine319
COMPONENTS += builder-alpine COMPONENTS += builder-alpine
BUILDER_PLUGINS += builder-alpine BUILDER_PLUGINS += builder-alpine

View file

@ -79,8 +79,15 @@ echo "hvc0::respawn:/sbin/getty -L hvc0 115200 vt220" >> "$INSTALLDIR"/etc/initt
# create /lib/modules for qubes-kernel module mount # create /lib/modules for qubes-kernel module mount
"${TEMPLATE_CONTENT_DIR}/alpine-chroot" "$INSTALLDIR" mkdir /lib/modules "${TEMPLATE_CONTENT_DIR}/alpine-chroot" "$INSTALLDIR" mkdir /lib/modules
# lo device
cat > "${INSTALLDIR}/etc/network/interfaces" <<EOF
auto lo
iface lo inet loopback
EOF
# enable services # enable services
for i in udev udev-trigger xendriverdomain qubes-qrexec-agent qubes-db qubes-meminfo-writer qubes-sysinit qubes-core-early qubes-core qubes-gui-agent crond acpid; do for i in udev udev-trigger xendriverdomain qubes-qrexec-agent qubes-db qubes-meminfo-writer qubes-sysinit qubes-core-early qubes-core qubes-gui-agent qubes-updates-proxy-forwarder crond acpid; do
"${TEMPLATE_CONTENT_DIR}/alpine-chroot" "$INSTALLDIR" rc-update add $i default "${TEMPLATE_CONTENT_DIR}/alpine-chroot" "$INSTALLDIR" rc-update add $i default
done done
for i in bootmisc hostname hwclock loadkmap modules networking seedrng swap sysctl syslog; do for i in bootmisc hostname hwclock loadkmap modules networking seedrng swap sysctl syslog; do