GSoc Project:Qubes live usb

54 views
Skip to first unread message

shubham dubey

unread,
Mar 18, 2017, 5:04:15 AM3/18/17
to qubes-devel
Hello,
I was trying to get more familiar with qubes live usb project then I came across this branch
of qubes-os-installer https://github.com/marmarek/qubes-installer-qubes-os/tree/liveusb.
Right now I have spent my significant time on understanding anaconda installer which qubes use
by default but it is tough to understand the liveusb branch (mentioned above) since there is no documentation
available to understand.

So,I will be really grateful if someone guide me how to proceed or give any reference link where I can read more about
how live usb boot works.

Thanks,
Shubham 

Marek Marczykowski-Górecki

unread,
Mar 18, 2017, 7:18:06 AM3/18/17
to shubham dubey, qubes-devel
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Take a look here:
https://github.com/QubesOS/qubes-issues/issues/1970

Generally, qubes-installer-qubes-os repository contains two somehow
independent parts:
1. Standalone installer:
- anaconda - installation application itself
- pungi+lorax - tools to build bootable image hosting anaconda (*)
- conf/qubes-kickstart.cfg - kickstart file describing that bootable
image

2. Live image creator:
- livecd-tools - tools to build live image(*)
- live - scripts related to live image (qubes-live package)
- conf/liveusb.ks - kickstart file describing Live image

Those two parts can be enabled independently, using ISO_INSTALLER
(default to '1') and ISO_LIVEUSB (default to '0') options in
builder.conf.

Ideally, we'd like to have a single image, which serve both as live image
and installer image, but it's a long way to this goal, with many
challenges on it.


(*) Ideally we'd use upstream tools (pungi, lorax, pykickstart,
livecd-tools) directly, but all those are missing signature verification
of packages downloaded from the internet, sometimes over plain http...
Patches applied there are all sent upstream, but in all the cases were
either ignored or softly rejected ("It is expected that the
distribution's using it will have strong controls on the contents taht
feed into the compose").

- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJYzRdnAAoJENuP0xzK19csAswH/RBWm0gB+X7Yld5MdWS6L/T4
Li2GQKF2KOMKRCYc1PSRCGtwRAoYAqr3Gbcw+V8lFQ/yMKW2f14ROWVf+AzNXmPA
eZT8gK907MW50Ov04QdSbyVtSl/7EJAXL7VyoUT9SdrI0hmHeaj3ab7jSlhoBe0N
cCi87qL5gGF/ahBvRcbBqh3bxuYyVthAofSoKwu/vtcqIxmIgglT/pq6hZ1eVehk
3R2aVJqbAx0vWTEkTHqpt8KHsV9Idu3N8XADKfi6IyC5inYjNKnbItZvmSFg675C
nHBjHHWQgQjg3aIonOZM4IV4c5Z5/ZjxLPhaDub0gPK6z9fzCr9nEElm+bDR7FA=
=beZB
-----END PGP SIGNATURE-----

shubham dubey

unread,
Mar 18, 2017, 7:37:25 AM3/18/17
to qubes-devel, sdub...@gmail.com
Thanks,this is quite useful explanation.I will research more on how qubes version
of live usb work and if I will have any questions then I will ping you again.
Reply all
Reply to author
Forward
0 new messages