This is the second generation of the Qubes OS builder. This new builder leverages container or disposable qube isolation to perform every stage of the build and release process. From fetching sources to building them, everything is executed inside a "cage" (either a disposable or a container) with the help of what we call an "executor." For every command that needs to perform an action on sources, like cloning and verifying Git repos, rendering a SPEC file, generating SRPM or Debian source packages, a new cage is used. Only the signing, publishing, and uploading processes are executed locally outside a cage. (This will be improved in the future.) For now, only Docker, Podman, Local, and Qubes executors are available.
Fedora:
$ sudo dnf install $(cat dependencies-fedora.txt)
$ test -f /usr/share/qubes/marker-vm && sudo dnf install qubes-gpg-split
Debian:
$ sudo apt install $(cat dependencies-debian.txt)
$ test -f /usr/share/qubes/marker-vm && sudo apt install qubes-gpg-split
Remark: Sequoia packages
sequoia-chameleon-gnupg
is available since Trixie (Debian 13).
Fetch submodules:
$ git submodule update --init
Add user
to the docker
group if you wish to avoid using sudo
:
$ usermod -aG docker user
You may need to sudo su user
to get this to work in the current shell. You
can add this group owner change to /rw/config/rc.local
.
In order to use the Docker executor, you must build the image using the
provided dockerfiles. Docker images are built from scratch
with mock
chroot cache archive. The rational is to use only built-in distribution
tool that take care of verifying content and not third-party content
like Docker images from external registries. As this may not be possible
under Debian as build host, we allow to pull Fedora docker image with
a specific sha256.
In order to ease Docker or Podman image generation, a tool generate-container-image.sh
is provided under tools
directory. It takes as input container engine
and optionally the Mock configuration file path or identifier.
For example, to build a Fedora 36 x86-64 docker image with mock
:
$ tools/generate-container-image.sh docker fedora-36-x86_64
or a Podman image:
$ tools/generate-container-image.sh podman fedora-36-x86_64
If not specifying the mock
configuration, it will simply build the
docker image based on the Fedora docker image.
You may want to customize your mock
build process instead of using generate-container-image.sh
.
First, build Mock chroot according to your own configuration or use default ones provided. For example, to build a Fedora 36 x86-64 mock chroot from scratch:
$ sudo mock --init --no-bootstrap-chroot --config-opts chroot_setup_cmd='install dnf @buildsys-build' -r fedora-36-x86_64
By default, it creates a config.tar.gz
located at /var/cache/mock/fedora-36-x86_64/root_cache/
.
Second, build the docker image:
$ docker build -f dockerfiles/fedora.Dockerfile -t qubes-builder-fedora /var/cache/mock/fedora-36-x86_64/root_cache/
We assume that the template chosen
for building components inside a disposable qube is fedora-39
. Install the
following dependencies inside the template:
$ sudo dnf install $(cat dependencies-fedora-qubes-executor.txt)
Then, clone the disposable template based on Fedora 39, fedora-39-dvm
, to
qubes-builder-dvm
. Set its private volume storage space to at least 30 GB.
Let's assume that the qube hosting qubes-builder
is called work-qubesos
.
(If you're using a different name, make sure to adjust your policies.) In
dom0
, copy rpc/policy/50-qubesbuilder.policy
to /etc/qubes/policy.d
.
Now, start the disposable template qubes-builder-dvm
and create the following
directories:
$ sudo mkdir -p /rw/bind-dirs/builder /rw/config/qubes-bind-dirs.d
Create the file /rw/config/qubes-bind-dirs.d/builder.conf
with the contents:
binds+=('/builder')
Append to /rw/config/rc.local
the following:
mount /builder -o dev,suid,remount
Set qubes-builder-dvm
as the default disposable template for work-qubesos
:
$ qvm-prefs work-qubesos default_dispvm qubes-builder-dvm
The build process consists of the following stages:
- fetch
- prep
- build
- post
- verify
- sign
- publish
- upload
Currently, only these are used:
- fetch (download and verify sources)
- prep (create source packages)
- build (build source packages)
- sign (sign built packages)
- publish (publish signed packages)
- upload (upload published repository to a remote server)
fetch
--- Manages the general fetching of sourcessource
--- Manages general distribution sourcessource_rpm
--- Manages RPM distribution sourcessource_deb
--- Manages Debian distribution sourcesbuild
--- Manages general distribution buildingbuild_rpm
--- Manages RPM distribution buildingbuild_deb
--- Manages Debian distribution buildingsign
--- Manages general distribution signingsign_rpm
--- Manages RPM distribution signingsign_deb
--- Manages Debian distribution signingpublish
--- Manages general distribution publishingpublish_rpm
--- Manages RPM distribution publishingpublish_deb
--- Manages Debian distribution publishingupload
--- Manages general distribution uploadingtemplate
--- Manages general distribution releasestemplate_rpm
--- Manages RPM distribution releasestemplate_deb
--- Manages Debian distribution releasestemplate_whonix
--- Manages Whonix distribution releases
Usage: qb [OPTIONS] COMMAND [ARGS]...
Main CLI
Options:
--verbose / --no-verbose Increase log verbosity.
--debug / --no-debug Print full traceback on exception.
--builder-conf TEXT Path to configuration file (default: builder.yml).
--log-file TEXT Path to log file to be created.
-c, --component TEXT Specify component to treat (can be repeated).
-d, --distribution TEXT Set distribution to treat (can be repeated).
-t, --template TEXT Set template to treat (can be repeated).
-o, --option TEXT Set builder configuration value (can be repeated).
--help Show this message and exit.
Commands:
package Package CLI
template Template CLI
repository Repository CLI
installer Installer CLI
config Config CLI
cleanup Cleanup CLI
Stages:
fetch prep build post verify sign publish upload
Option:
Input value for option is of the form:
1. key=value
2. parent-key:key=value
3. key+value
It allows to set configuration dict values or appending array values.
In the three forms, 'value' can be chained by one of the three forms to
set value at deeper level.
For example:
force-fetch=true
executor:type=qubes
executor:options:dispvm=builder-dvm
components+lvm2
components+kernel:branch=stable-5.15
Remark:
The Qubes OS components are separated into two groups: standard components
and template components. Standard components will produce distribution
packages to be installed in TemplateVMs or StandaloneVMs, while template
components will produce template packages to be installed via qvm-template.
You can use the provided qubes-os-r4.2.yml
configuration file
under example-configs
named builder.yml
in the root of qubes-builderv2
(like the legacy qubes-builder
).
Remark: You can find official configuration files used to build packages and templates at https://github.com/QubesOS/qubes-release-configs.
Artifacts can be found under artifacts
directory:
artifacts/
├── components <- Stage artifacts for each component version and distribution.
├── distfiles <- Extra source files.
├── repository <- Qubes local builder repository (metadata are generated each time inside cages).
├── repository-publish <- Qubes OS repositories that are uploaded to {yum,deb,...}.qubes-os.org.
├── sources <- Qubes components source.
└── templates <- Template artifacts.
You can start building the components defined in this development configuration with:
$ ./qb package fetch prep build
If GPG is set up on your host, specify the key and client to be used inside
builder.yml
. Then, you can test the sign and publish stages:
$ ./qb package sign publish
You can trigger the whole build process as follows:
$ ./qb package all
It is possible to initialize a chroot cache, e.g. for Mock and pbuilder, by calling
Package CLI with stage init-cache
. This particular stage is not included in
the all
alias. Indeed, if a cache is detected at prep
ou build
stages, it
will be used. As cache could be provided either by using init-cache
or any
other method that a user would use, we keep it as dedicated call.
Similarly, you can start building the templates defined in this development configuration with:
$ ./qb template all
The build of an ISO is done in several steps. First, it downloads necessary packages for Anaconda that will be used for Qubes OS installation. Second, it does the same for Lorax, that is responsible to create the installation runtime. Finally, the step of creating the ISO is done without network and uses only the downloaded packages. Download steps are done inside a cage and creating the ISO is done inside a Mock chroot itself inside a cage. As the ISO creation is done offline, it is important to create a cache first for Mock. To perform all these simply do:
$ ./qb installer init-cache all
The builder supports only one host distribution at a time. If multiple is provided in configuration file (e.g. for development purpose), simply call the builder with the wanted host distribution associated to the ISO.
In order to publish to a specific repository, or if you ignored the publish
stage, you can use the repository
command to create a local repository that
is usable by distributions. For example, to publish only the
whonix-gateway-16
template:
./qb -t whonix-gateway-16 repository publish templates-community-testing
Or publish all the templates provided in builder.yml
in
templates-itl-testing
:
./qb repository publish templates-itl-testing
Similar commands are available for packages, for example:
./qb -d host-fc32 -c core-qrexec repository publish current-testing
and
./qb repository publish unstable
It is not possible to publish packages in template repositories or vice versa.
In particular, you cannot publish packages in the template repositories
templates-itl
, templates-itl-testing
, templates-community
, or
templates-community-testing
; and you cannot publish templates in the package
repositories current
, current-testing
, security-testing
, or unstable
. A
built-in filter enforces this behavior.
Normally, everything published in a stable repository, like current
,
templates-itl
, or templates-community
, should first wait in a testing
repository for a minimum of five days. For exceptions in which skipping the
testing period is warranted, you can ignore this rule by using the
--ignore-min-age
option with the publish
command.
Please note that the publish
plugin will not allow publishing to a stable
repository. This is only possible with the repository
command.
If you plan to sign packages with Split
GPG, add the following to your
~/.rpmmacros
:
%__gpg /usr/bin/qubes-gpg-client-wrapper
%__gpg_check_password_cmd %{__gpg} \
gpg --batch --no-verbose -u "%{_gpg_name}" -s
%__gpg_sign_cmd /bin/sh sh -c '/usr/bin/qubes-gpg-client-wrapper \\\
--batch --no-verbose \\\
%{?_gpg_digest_algo:--digest-algo %{_gpg_digest_algo}} \\\
-u "%{_gpg_name}" -sb %{__plaintext_filename} >%{__signature_filename}'
The .qubesbuilder
file is a YAML file placed inside a Qubes OS source
component directory, similar to Makefile.builder
for the legacy Qubes
Builder. It has the following top-level keys:
PACKAGE_SET
PACKAGE_SET-DISTRIBUTION_NAME (= Qubes OS distribution like `host-fc42` or `vm-trixie`)
PLUGIN_ENTRY_POINTS (= Keys providing content to be processed by plugins)
We provide the following list of available keys:
host
---host
package set content.vm
---vm
package set content.rpm
--- RPM plugins content.deb
--- Debian plugins content.source
--- Fetch and source plugins (fetch
,source
,source_rpm
, andsource_deb
) content.build
--- Build plugins content (build
,build_rpm
, andbuild_deb
).create-archive
--- Create source component directory archive (default:True
unlessfiles
is provided and not empty).commands
--- Execute commands before plugin or distribution tools (source_deb
only).modules
--- Declare submodules to be included inside source preparation (source archives creation and placeholders substitution)files
--- List of external files to be downloaded. It has to be provided with the combination of aurl
/git-url
and a verification method. Forurl
, a verification method is either a checksum file or a signature file with public GPG keys. Forgit-url
, it's either GPG key to verity a tag, or explicit commit id.url
--- URL of the external file to download.sha256
--- Path tosha256
checksum file relative to source directory (in combination withurl
).sha512
--- Path tosha256
checksum file relative to source directory (in combination withurl
).signature
--- URL of the signature file of downloaded external file (in combination withurl
andpubkeys
).uncompress
--- Uncompress external file downloaded before verification.pubkeys
--- List of public GPG keys to use for verifying the downloaded signature file (in combination withurl
andsignature
).git-url
--- URL of a repository to fetch and create a tarball from.tag
--- Specific tag to fetch fromgit-url
and verify with a key specified inpubkeys
. Can use@VERSION@
placeholder.commit-id
--- Specific pre-verified commit to fetch fromgit-url
. No extra verification is performed.git-basename
--- Specify basename for archive created out of git repository. This is also used for the top level directory inside the archive. If not set, final component of thegit-url
(minus.git
if applicable), plus a commit id or tag will be used.
Here is a non-exhaustive list of distribution-specific keys:
host-fc32
--- Fedora 32 for thehost
package set content onlyvm-bullseye
--- Bullseye for thevm
package set only
Inside each top level, it defines what plugin entry points like rpm
, deb
,
and source
will take as input. Having both PACKAGE_SET
and
PACKAGE_SET-DISTRIBUTION_NAME
with common keys means that it is up to the
plugin to know in which order to use or consider them. It allows for defining
general or distro-specific options.
In a .qubesbuilder
file, there exist several placeholder values that are
replaced when loading .qubesbuilder
content. Here is the list of
currently-supported placeholders:
@VERSION@
--- Replaced by component version (provided by theversion
file inside the component source directory)@REL@
--- Replaced by component release (provided by therel
file inside the component source directory, if it exists)@BUILDER_DIR@
--- Replaced by/builder
(inside a cage)@BUILD_DIR@
--- Replaced by/builder/build
(inside a cage)@PLUGINS_DIR@
--- Replaced by/builder/plugins
(inside a cage)@DISTFILES_DIR@
--- Replaced by/builder/distfiles
(inside a cage)@SOURCE_DIR@
--- Replaced by/builder/<COMPONENT_NAME>
(inside a cage where,<COMPONENT_NAME>
is the component directory name)
Here is an example for qubes-python-qasync
:
host:
rpm:
build:
- python-qasync.spec
vm:
rpm:
build:
- python-qasync.spec
vm-buster:
deb:
build:
- debian
vm-bullseye:
deb:
build:
- debian
source:
files:
- url: https://files.pythonhosted.org/packages/source/q/qasync/qasync-0.9.4.tar.gz
sha256: qasync-0.9.4.tar.gz.sha256
It defines builds for the host
and vm
package sets for all supported RPM
distributions, like Fedora, CentOS Stream, and soon openSUSE with the rpm
level key. This key instructs RPM plugins to take as input provided spec files
in the build
key. For Debian-related distributions, only the buster
and
bullseye
distributions have builds defined with the level key deb
. Similar
to RPM, it instructs Debian plugins to take as input directories provided in
the build
key.
In the case where deb
would have been defined also in vm
like:
(...)
vm:
rpm:
build:
- python-qasync.spec
deb:
build:
- debian1
- debian2
vm-buster:
deb:
build:
- debian
(...)
The vm-buster
content overrides the general content defined by deb
in vm
,
so for the buster
distribution, we would still build only for the debian
directory.
In this example, the top level key source
instructs plugins responsible for
fetching and preparing the component source to consider the key files
. It is
an array, here only one dict element, for downloading the file at the given
url
and verifying it against its sha256
sum. The checksum file is relative
to the component source directory.
If no external source files are needed, like an internal Qubes OS component
qubes-core-qrexec
,
host:
rpm:
build:
- rpm_spec/qubes-qrexec.spec
- rpm_spec/qubes-qrexec-dom0.spec
vm:
rpm:
build:
- rpm_spec/qubes-qrexec.spec
- rpm_spec/qubes-qrexec-vm.spec
deb:
build:
- debian
archlinux:
build:
- archlinux
we would have no source
key instructing to perform something else other than
standard source preparation steps and creation (SRPM, dsc file, etc.). In this
case, we have globally-defined builds for RPM, Debian-related distributions,
and ArchLinux (archlinux
key providing directories as input similar to
Debian).
Some components need more source preparation and processes like
qubes-linux-kernel
:
host:
rpm:
build:
- kernel.spec
source:
modules:
- linux-utils
- dummy-psu
- dummy-backlight
files:
- url: https://cdn.kernel.org/pub/linux/kernel/v5.x/linux-@VERSION@.tar.xz
signature: https://cdn.kernel.org/pub/linux/kernel/v5.x/linux-@VERSION@.tar.sign
uncompress: true
pubkeys:
- kernel.org-2-key.asc
- kernel.org-1-key.asc
- url: https://github.com/PatrickVerner/macbook12-spi-driver/archive/2905d318d1a3ee1a227052490bf20eddef2592f9.tar.gz#/macbook12-spi-driver-2905d318d1a3ee1a227052490bf20eddef2592f9.tar.gz
uncompress: true
sha256: macbook12-spi-driver-2905d318d1a3ee1a227052490bf20eddef2592f9.tar.sha256
First, the source
key provides modules
that instructs the fetch
and
source
plugins that there exist git
submodules that are needed for builds.
In the case of RPM, the spec file has different Source
macros depending on
archives with submodule content. The source preparation will create an archive
for each submodule and render the spec file according to the submodule archive
names. More precisely, for qubes-linux-kernel
commit hash
b4fdd8cebf77c7d0ecee8c93bfd980a019d81e39
, it will replace placeholders inside
the spec file @linux-utils@
, @dummy-psu@
, and @dummy-backlight@
with
linux-utils-97271ba.tar.gz
, dummy-psu-97271ba.tar.gz
, and
dummy-backlight-3342093.tar.gz
respectively, where 97271ba
, 97271ba
, and
3342093
are short commit hash IDs of submodules.
Second, in the files
key, there is another case where an external file is
needed but the component source directory holds only public keys associated
with archive signatures and not checksums. In that case, url
and signature
are files to be downloaded and pubkeys
are public keys to be used for source
file verification. Moreover, sometimes the signature file contains the
signature of an uncompressed file. The uncompress
key instructs fetch
plugins to uncompress the archive before proceeding to verification.
Reminder: These operations are performed inside several cages. For example, the download is done in one cage, and the verification is done in another cage. This allows for separating processes that may interfere with each other, whether intentionally or not.
For an internal Qubes OS component like qubes-core-qrexec
, the source
plugin handles creating a source archive that will be put side to the packaging
files (spec file, Debian directory, etc.) to build packages. For an external
Qubes OS component like qubes-python-qasync
(same for xen
, linux
,
grub2
, etc.), it uses the external file downloaded (and verified) side to the
packaging files to build packages. Indeed, the original source component is
provided by the archive downloaded and only packaging files are inside the
Qubes source directory. Packaging includes additional content like patches,
configuration files, etc. In very rare cases, the packaging needs both a source
archive of the Qubes OS component directory and external files. This is the
case qubes-vmm-xen-stubdom-linux
:
host:
rpm:
build:
- rpm_spec/xen-hvm-stubdom-linux.spec
source:
create-archive: true
files:
- url: https://download.qemu.org/qemu-6.1.0.tar.xz
signature: https://download.qemu.org/qemu-6.1.0.tar.xz.sig
pubkeys:
- keys/qemu/mdroth.asc
- keys/qemu/pbonzini.asc
- url: https://cdn.kernel.org/pub/linux/kernel/v5.x/linux-5.10.105.tar.xz
signature: https://cdn.kernel.org/pub/linux/kernel/v5.x/linux-5.10.105.tar.sign
uncompress: true
pubkeys:
- keys/linux/greg.asc
- url: https://busybox.net/downloads/busybox-1.31.1.tar.bz2
signature: https://busybox.net/downloads/busybox-1.31.1.tar.bz2.sig
pubkeys:
- keys/busybox/vda_pubkey.asc
- url: https://freedesktop.org/software/pulseaudio/releases/pulseaudio-14.2.tar.xz
sha512: checksums/pulseaudio-14.2.tar.xz.sha512
- url: https://github.com/libusb/libusb/releases/download/v1.0.23/libusb-1.0.23.tar.bz2
sha512: checksums/libusb-1.0.23.tar.bz2.sha512
By default, if files are provided, plugins treat components as external Qubes
OS components, which means that archiving the component source directory is not
performed, because it's useless to package the packaging itself. For this
particular component in Qubes OS, there are several directories needed from
source component directories. Consequently, the packaging has been made in such
a way so as to extract from the source archive only these needed directories.
In order to force archive creation, (or disable it), the create-archive
boolean can be set in the source
keys at the desired value, here true
.
For Debian distributions, it is sometimes necessary to execute a custom command
before source preparation. This is the case, for example, for i3
:
host:
rpm:
build:
- i3.spec
vm:
rpm:
build:
- i3.spec
deb:
build:
- debian-pkg/debian
source:
commands:
- '@PLUGINS_DIR@/source_deb/scripts/debian-quilt @SOURCE_DIR@/series-debian.conf @BUILD_DIR@/debian/patches'
source:
files:
- url: https://i3wm.org/downloads/i3-4.18.2.tar.bz2
sha512: i3-4.18.2.tar.bz2.sha512
Inside the deb
key, there is a command inside the commands
array to execute
the debian-quilt
script provided by the source_deb
plugin with a series of
patch files located in the source directory (path inside a cage) to the
prepared source directory, here the build directory (path inside a cage).
Note: All commands provided are executed before any plugin tools or
distribution tools like dpkg-*
. This is only available for Debian
distributions and not RPM distributions, as similar processing is currently not
needed.
Options available in builder.yml
:
-
git
:baseurl: str
--- Base url of git repos (default: https://github.com).prefix: str
--- Which repository to clone (default: QubesOS/qubes-).suffix: str
--- git suffix (default: .git).branch: str
--- git branch (default: main).maintainers: List[str]
--- List of extra fingerprint allowed for signature verification of git commit and tag. Seekey-dirs
option for providing the public keys.
-
skip-git-fetch: bool
--- When set, do not update already downloaded git repositories (those insources
artifacts dir). New components are still fetched (once). Useful when doing development builds from non-default branches, local modifications etc. -
increment-devel-versions: bool
--- When set, each package built will have local build number appended to package release number. This way, it's easy to update test environment without manually forcing reinstall of packages with unchanged versions. Example versions with devel build number:qubes-core-dom0-4.2.12-1.13.fc37.x86_64
(.13
is the additional version here)qubes-u2f_2.0.1+deb11u1+devel2_all.deb
(+devel2
is the additional version here)
-
artifacts-dir: str
--- Path to artifacts directory. -
plugins-dirs: List[str]
--- List of path to plugin directory. By default, the local plugins directory is prepended to the list. -
backend-vmm: str
--- Backend Virtual Machine (default and only supported value: xen). -
debug: bool
--- Print full traceback on exception (default: False). -
verbose: bool
--- Increase log verbosity (default: False). -
qubes-release: str
--- Qubes OS release e.g. r4.2. -
min-age-days: int
--- Minimum days for testing component or template allowed to reach stable repositories (default: 5). -
gpg-client: str
: GPG client to use, eithergpg
orqubes-gpg-client-wrapper
. -
key-dirs: List[str]
: additional directories with maintainer's keys; keys needs to be named after full fingerprint plus.asc
extension -
template-root-size: str
--- Template root size as an integer and optional unit (example: 10K is 10*1024). Units are K,M,G,T,P,E,Z,Y (powers of 1024) or KB,MB,... (powers of 1000). Binary prefixes can be used, too: KiB=K, MiB=M, and so on. -
iso: Dict
:kickstart: str
--- Image installer kickstart. The path usually points at a file inartifacts/sources/qubes-release
, in aconf/
directory - example value:conf/iso-online-testing.ks
. To use path outside of that directory, either set absolute path, or a path starting with./
(path relative to builder configuration file). Into the kickstart file, it can include other kickstart files using%include
but it is limited to include existing kickstart files insidequbes-release/conf
.comps: str
--- Image installer groups (comps) file. The path usually points at a file inartifacts/sources/qubes-release
, in acomps/
directory - example value:comps/comps-dom0.xml
. To use path outside of that directory, either set absolute path, or a path starting with./
(path relative to builder configuration file).flavor: str
--- Image name will be named asQubes-<iso-version>-<iso-flavor>-<arch>.iso
.use-kernel-latest: bool
--- If True, usekernel-latest
when building installer runtime and superseedkernel
in the installation. It allows to boot installer and QubesOS with the latest drivers provided by stable kernels and not only long term supported ones by default.version: str
--- Define specific version to embed, by default current date is used.is-final: bool
--- Should the ISO be marked as "final" (skip showing warning about development build at the start of the installation).
-
use-qubes-repo: Dict
:version: str
--- Use Qubes packages repository to satisfy build dependents. Set to target version of Qubes you are building packages for (like "4.1", "4.2" etc.).testing: bool
--- When used withuse-qubes-repo:version
, enable testing repository for that version (in addition to stable). -
sign-key: Dict
--- Fingerprint for signing content.rpm: str
--- RPM content.deb: str
--- Debian content.archlinux: str
--- Archlinux content.iso: str
--- ISO content.
-
less-secure-signed-commits-sufficient: list
--- List of component names where signed commits is allowed instead of requiring signed tags. This is less secure because only commits that have been reviewed are tagged. -
timeout: int
: Abort build after given timeout, in seconds. -
repository-publish: Dict
--- Testing repository to use at publish stage.components: str
--- Components . This is eithercurrent-testing
,security-testing
orunstable
.templates: str
--- Testing repository for templates at publish stage. This is eithertemplates-itl-testing
ortemplates-community-testing
.
-
executor: Dict
--- Specify default executor to use.type: str
--- Executor type: qubes, docker, podman or local.options: Dict
:image: str
--- Container image to use. Specific to docker or podman type.dispvm: str
--- Disposable template VM to use (use"@dispvm"
to use the calling qubedefault_dispvm
property or specify a name).directory: str
--- Base directory for local executor to create temporary directories.clean: bool
--- Clean container, disposable qube or temporary local folder (defaulttrue
).clean-on-error: bool
--- Clean container, disposable qube or temporary local folder if any error occurred. Default is value set byclean
.
-
stages: List[str, Dict]
--- List of stages to trigger.<stage_name>: str
--- Stage name.<stage_name>: Dict
--- Stage name provided as dict to override executor to use.executor: Dict
--- Specify executor to use for this stage.
-
distributions: List[Union[str, Dict]]
--- Distribution for packages provided as -.. Default architecture isx86_64
and can be omitted. Some examples: host-fc32, host-fc42.ppc64 or vm-trixie.<distribution_name>
--- Distribution name provided as string.<distribution_name>
: --- Distribution name provided as dict to pass or override values.stages: List[Dict]
--- Allow to override stages options.
-
components: List[Union[str, Dict]]
-- List of components you want to build. See example configs for sensible lists. The order of components is important - it should reflect build dependencies, otherwise build would fail.<component_name>
--- Component name provided as string.<component_name>
: --- Component name provided as dict to pass or override values.branch: str
--- override default git branch.url: str
--- provide the full url of the component.maintainers: List[str]
--- List of extra fingerprint allowed for signature verification of git commit and tag.timeout: int
--- Abort build after given timeout, in seconds.plugin: bool
--- Component being actually an extra plugin. No.qubesbuilder
file is needed.packages: bool
--- Component that generate packages (default: True). If set to False (e.g.builder-rpm
), no.qubesbuilder
file is allowed.verification-mode: str
--- component source code verification mode, supported values are:signed-tag
(this is default),less-secure-signed-commits-sufficient
,insecure-skip-checking
. This option takes precedence over top levelless-secure-signed-commits-sufficient
.stages: List[Dict]
--- Allow to override stages options.distribution_name: List[Dict]
-- Allow to override per distribution, stages options.package_set: List[Dict]
-- Allow to override per distribution package set, stages options.
-
templates: List[Dict]
-- List of templates you want to build. See example configs for sensible lists.<template_name>
: --- Template name.dist: str
--- Underlying distribution, e.g. fc42, bullseye, etc.flavor: str
--- If applies, specify template flavor, e.g. minimal, xfce, whonix-gateway, whonix-workstation, etc.options: List[str]
--- Provides template build options, e.g. minimal, no-recommends, firmware, etc.
-
repository-upload-remote-host: Dict
--- Rsync URL for uploading local repository content.rpm: str
--- RPM content.deb: str
--- Debian content.iso: str
--- ISO content.
-
cache: Dict
--- List of distributions cache options.<distribution_name>: Dict
--- Distribution name provided as indistributions
.packages: List[str]
--- List of packages to download and to put in cache. These packages won't be installed into the base chroot.
templates: List[str]
--- List of template names to download and put in installer cache. They are available based on what is defined in selected kickstart.
-
automatic-upload-on-publish: bool
--- Automatic upload on publish/unpublish. -
mirrors: Dict
--- List of distributions mirrors where key refers to - or . The former overrides the latter.<distribution_name | distribution>: List[str]
--- List of mirrors to be used in builder plugins.
Remark:
mirrors
support is partially implemented for now. It supports ArchLinux and Debian for template build only. With respect to legacy builder, it allows to provide values forARCHLINUX_MIRROR
andDEBIAN_MIRRORS
.
git-run-inplace: bool
--- Rungit
directly on local sources available on the host when callingfetch
stage for components. It overrides the defined executor forfetch
stage by a local executor in order to callgit
directly into sources artifacts directory.
To enable a more detailed control over executor options passed to stages, values are assigned and updated for the stages
parameter according to the following order:
- The primary definition of
stages
at the top level, - Definitions within the context of
distributions
, - The inclusion of
stages
withincomponents
, - The specification of
stages
within a particular package set incomponents
, - The delineation of
stages
within a specific distribution incomponents
.
Assuming part of builder configuration file looks like:
executor:
type: qubes
options:
dispvm: "@dispvm"
clean: False
distributions:
- vm-fc42
- vm-jammy:
stages:
- build:
executor:
options:
dispvm: qubes-builder-debian-dvm
stages:
- fetch
- sign:
executor:
type: local
components:
- linux-kernel:
stages:
- sign:
executor:
type: qubes
options:
dispvm: signing-access-dvm
vm-jammy:
stages:
- prep:
executor:
type: local
options:
directory: /some/path
vm:
stages:
- build:
executor:
type: podman
options:
image: fedoraimg
For the fetch
stage, the Qubes executor with disposable template qubes-builder-debian-dvm
will be used for both vm-fc42
and vm-jammy
.
For the build
stage of vm-fc42
, the Podman executor with container image fedoraimg
will be used.
For the sign
stage, the Qubes executor with disposable template signing-access-dvm
will be used for both vm-fc42
and vm-jammy
For the prep
stage of vm-jammy
, the Local executor with base directory /some/path
will be used.