Run 189 + 191 (2026-05-08) both died at the surviving rpm-ostree module: chmod: changing permissions of '/tmp/modules/rpm-ostree/rpm-ostree.sh': Operation not permitted subprocess exited with status 1 Same buildah userns=host bind-mount bug we already worked around for type:files / type:script / type:systemd — BlueBuild's helper script tries to chmod itself inside its own bind-mounted layer and the host's unprivileged user can't change perms on a kernel-mounted overlay path. Workaround: drop the type:rpm-ostree module, fold its 10-package install list into the existing type:containerfile snippet as a raw RUN. Per BB docs each snippets[] entry = its own layer, so all three RUN concerns (repo curl + rpm-ostree install + brand sed + systemctl enable/disable) are merged into ONE snippet = ONE layer to keep the A1b commit-cost collapse intact (~40min/layer wallclock on our fuse-overlayfs runner). Added repo files inside the same RUN — secureblue base ships neither: - https://repository.mullvad.net/rpm/stable/mullvad.repo - https://pkgs.tailscale.com/stable/fedora/tailscale.repo The previous type:rpm-ostree must have been silently failing on these two pkgs (build never got past the chmod gate to find out). Ordering: pkgs first (so systemctl enable yggdrasil / disable tailscaled see their unit files), then brand+units in a best-effort group, then rpm-ostree cleanup -m && ostree container commit to finalize the layer (BB's wrapped rpm-ostree module does this implicitly; raw RUN must do it manually for parity with secureblue / Universal Blue base). Module count: 7 → 6. Expected outcome: build clears past STEP rpm-ostree, no chmod gate left. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
163 lines
8.2 KiB
YAML
163 lines
8.2 KiB
YAML
# veilor-os — BlueBuild recipe (v0.7 spike, 1-day target)
|
||
#
|
||
# Extends secureblue's hardened Kinoite OCI image with veilor branding,
|
||
# threat-model-driven UX choices, and the three-layer mesh stack
|
||
# (Tailscale + Yggdrasil + opt-in Reticulum). This is the OCI image
|
||
# that the v0.7+ kickstart's `ostreecontainer` directive pulls into
|
||
# the target root during the install pass.
|
||
#
|
||
# Build: bluebuild build recipe.yml
|
||
# Test: podman run --rm -it ghcr.io/veilor-org/veilor-os:43 /bin/bash
|
||
# CI: .github/workflows/build-bluebuild.yml signs + pushes to GHCR.
|
||
#
|
||
# Reference: https://blue-build.org/reference/recipe/
|
||
#
|
||
# ── Module collapse history ──────────────────────────────────────
|
||
# Run 183 (2026-05-08) ate 3h10min before runner timeout: each RUN/COPY
|
||
# layer COMMIT under fuse-overlayfs over secureblue's 130-layer hardened
|
||
# base costs ~40min wallclock (STEP 10..13 each 38–43min). Ergo: every
|
||
# saved module = ~40min saved. Collapsed (A1b):
|
||
# - 5× rpm-ostree → 1× (-4 layers)
|
||
# - 2× containerfile (brand sed + systemctl enable) → 1× (-1 layer)
|
||
# - 4× copy left as-is — BlueBuild copy module is one src/dest per
|
||
# entry per https://blue-build.org/reference/modules/copy/
|
||
# Net: 12 → 7 modules, ~5×40min ≈ 3h20min off wallclock budget.
|
||
#
|
||
# Run 189 + 191 (2026-05-08) — surviving rpm-ostree module hit the same
|
||
# `chmod: Operation not permitted` bug we already worked around for
|
||
# type:files / type:script / type:systemd: BlueBuild's helper scripts
|
||
# (here `/tmp/modules/rpm-ostree/rpm-ostree.sh`) try to chmod themselves
|
||
# inside their own buildah bind-mount under userns=host and fail.
|
||
#
|
||
# A1c fix: drop type:rpm-ostree, fold its install list into the existing
|
||
# containerfile module as a raw RUN. Per BB containerfile docs each
|
||
# `snippets:` entry = its own layer, so we MERGE pkg-install + brand +
|
||
# systemctl into ONE snippet (= one RUN, one layer). Ordering: install
|
||
# packages first (yggdrasil/tailscale/etc must exist before systemctl
|
||
# enable/disable touches their units), then brand sed, then unit toggles.
|
||
# `ostree container commit` ends the snippet because BB's rpm-ostree
|
||
# module wraps it implicitly; raw RUN must do it manually for parity.
|
||
# Mullvad + Tailscale repo files curl'd in same RUN — secureblue base
|
||
# does not ship either repo, and the previous type:rpm-ostree must have
|
||
# silently failed earlier (build never got that far in 189/191).
|
||
# Net: 7 → 6 modules, one more layer commit avoided.
|
||
---
|
||
name: veilor-os
|
||
description: Hardened security-branded Fedora KDE on top of secureblue.
|
||
|
||
# Base image: secureblue's hardened Kinoite variant with userns sandboxing.
|
||
# That brings in: sysctl + kargs + custom SELinux policy + USBGuard +
|
||
# hardened-malloc + Unbound DoT + chronyd NTS + Trivalent browser.
|
||
base-image: ghcr.io/secureblue/kinoite-main-hardened
|
||
image-version: latest
|
||
|
||
modules:
|
||
# ── 1. veilor branding overlay ──────────────────────────────────
|
||
# `type: copy` is a low-level direct COPY (no chmod, no script).
|
||
# `type: files` was failing with `chmod: Operation not permitted` on
|
||
# the BlueBuild-shipped /tmp/modules/files/files.sh under buildah +
|
||
# podman privileged in our runner — the script tries to make itself
|
||
# executable inside its own bind-mounted layer.
|
||
#
|
||
# NOTE: Each copy module = one COPY layer (~40min commit on our
|
||
# runner). BlueBuild's copy module accepts a single src/dest pair
|
||
# only, so these four entries are the floor unless we move to a
|
||
# hand-rolled Containerfile.
|
||
- type: copy
|
||
source: ../overlay
|
||
destination: /
|
||
|
||
- type: copy
|
||
source: ../assets
|
||
destination: /usr/share/veilor-os/assets
|
||
|
||
- type: copy
|
||
source: ../scripts
|
||
destination: /usr/share/veilor-os/scripts
|
||
|
||
- type: copy
|
||
source: config/just
|
||
destination: /usr/share/ublue-os/just
|
||
|
||
# ── 2. Packages + branding + unit toggles in ONE RUN snippet ────
|
||
# secureblue removes sudo + replaces with run0 (too disruptive for
|
||
# daily-driver) — restore. Xwayland was disabled for attack-surface
|
||
# reduction — restore for Element/Slack/Qt5 apps. Mullvad Browser
|
||
# layered alongside Trivalent (Trivalent default per STRATEGY.md;
|
||
# Mullvad for pseudonymous browsing). Mesh stack: Tailscale (Layer
|
||
# 1, daily driver, pre-disabled), Yggdrasil-go (Layer 2, idle warm-
|
||
# fallback). Reticulum/RetiNet stays opt-in via ujust. Memory
|
||
# hygiene + ergonomic deps for veilor-postinstall + veilor-doctor.
|
||
#
|
||
# Repos: secureblue base ships neither mullvad nor tailscale repos.
|
||
# curl them into /etc/yum.repos.d/ inside the same RUN, before the
|
||
# rpm-ostree install. Both pinned to upstream stable for Fedora.
|
||
#
|
||
# Branding + unit toggles run in the same RUN (= same layer) AFTER
|
||
# rpm-ostree install so systemctl enable yggdrasil / disable tailscaled
|
||
# see their unit files.
|
||
#
|
||
# Helper-script avoidance: BlueBuild's `type: rpm-ostree` /
|
||
# `type: files` / `type: script` / `type: systemd` modules all hit
|
||
# `chmod: Operation not permitted` on their own bind-mounted helper
|
||
# script under buildah userns=host (run 189 + 191, last-frame error:
|
||
# `chmod: changing permissions of '/tmp/modules/rpm-ostree/rpm-ostree.sh':
|
||
# Operation not permitted`). Raw `type: containerfile` RUN bypasses
|
||
# the whole helper-script layer.
|
||
#
|
||
# ostree container commit at the end mirrors what BB's wrapped
|
||
# rpm-ostree module does implicitly — finalizes the layer for the
|
||
# secureblue / Universal Blue base expectation.
|
||
#
|
||
# brand-leak grep moved to CI smoke-test in build-bluebuild.yml
|
||
# (STEP 14 hung under buildah overlayfs, run 171 2026-05-07).
|
||
- type: containerfile
|
||
snippets:
|
||
- |
|
||
RUN set -euo pipefail ; \
|
||
curl -fsSL https://repository.mullvad.net/rpm/stable/mullvad.repo \
|
||
-o /etc/yum.repos.d/mullvad.repo ; \
|
||
curl -fsSL https://pkgs.tailscale.com/stable/fedora/tailscale.repo \
|
||
-o /etc/yum.repos.d/tailscale.repo ; \
|
||
rpm-ostree install \
|
||
sudo \
|
||
xorg-x11-server-Xwayland \
|
||
mullvad-browser \
|
||
tailscale \
|
||
yggdrasil \
|
||
zram-generator \
|
||
jq \
|
||
vim-enhanced \
|
||
tmux \
|
||
htop ; \
|
||
{ sed -i -e 's|^GRUB_DISTRIBUTOR=.*|GRUB_DISTRIBUTOR="veilor-os"|' /etc/default/grub 2>/dev/null || true ; \
|
||
bash /usr/share/veilor-os/scripts/kde-theme-apply.sh 2>/dev/null || true ; \
|
||
bash /usr/share/veilor-os/scripts/30-apply-v03-theme.sh 2>/dev/null || true ; \
|
||
plymouth-set-default-theme details 2>/dev/null || true ; \
|
||
chmod +x /usr/share/veilor-os/scripts/*.sh \
|
||
/usr/share/veilor-os/scripts/selinux/*.sh \
|
||
/usr/local/bin/veilor-* 2>/dev/null || true ; \
|
||
fc-cache -f 2>/dev/null || true ; \
|
||
if [ -f /etc/os-release ]; then \
|
||
sed -i \
|
||
-e 's|^NAME=.*|NAME="veilor-os"|' \
|
||
-e 's|^PRETTY_NAME=.*|PRETTY_NAME="veilor-os 0.7 (atomic)"|' \
|
||
-e 's|^ID=.*|ID=veilor|' \
|
||
-e 's|^ID_LIKE=.*|ID_LIKE="fedora kinoite"|' \
|
||
/etc/os-release || true ; \
|
||
fi ; \
|
||
systemctl enable yggdrasil.service 2>/dev/null || true ; \
|
||
systemctl disable tailscaled.service 2>/dev/null || true ; \
|
||
systemctl enable veilor-firstboot.service 2>/dev/null || true ; \
|
||
systemctl enable veilor-modules-lock.service 2>/dev/null || true ; \
|
||
systemctl enable veilor-postinstall.service 2>/dev/null || true ; \
|
||
systemctl enable veilor-doctor.timer 2>/dev/null || true ; \
|
||
} ; \
|
||
rpm-ostree cleanup -m ; \
|
||
ostree container commit
|
||
|
||
# ── 4. signing config ───────────────────────────────────────────
|
||
# cosign.pub committed alongside this recipe; cosign.key kept off
|
||
# repo and provided to CI as Forgejo secret COSIGN_PRIVATE_KEY.
|
||
# The action exports it to /tmp at build time.
|
||
- type: signing
|