|
Some checks failed
Build veilor-os OCI (BlueBuild) / Build + push OCI (push) Failing after 18s
Walk every action in kickstart/veilor-os.ks %post and map to its v0.7 atomic equivalent: Build-time script additions: - chmod +x /usr/share/veilor-os/scripts/* + /usr/local/bin/veilor-* (BlueBuild type:files sometimes drops perms) - fc-cache -f after Fira Code stamping - os-release brand override (NAME=veilor-os, ID=veilor, ID_LIKE) - brand-leak guard: fail the image build if any onyx/personal data slipped through into shipped state Layered packages: - zram-generator (memory hygiene; replaces dnf install in kickstart) - jq (used by veilor-doctor for `bootc status --json`) - vim-enhanced + tmux + htop (admin essentials, parity with v0.5.x) Systemd unit enables added: - veilor-postinstall.service (first-login TUI; new in A3) - veilor-doctor.timer (weekly drift check; new in A3) Dropped: anaconda transaction_progress.py patch (build-time CI work, not image content); SDDM display-manager symlink (kinoite ships sddm.service already); SELinux module build (secureblue has its own); systemctl set-default multi-user.target (kinoite is graphical.target by design). Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| config/just | ||
| README.md | ||
| recipe.yml | ||
bluebuild/ — v0.7 spike
This directory contains the BlueBuild recipe + supporting config that
builds the veilor-os bootable OCI image. Active on the
v0.7-bluebuild-spike branch only. Does NOT land in v0.5.x main
until the spike passes its success criteria (see
docs/STRATEGY.md).
What's here
bluebuild/
├── recipe.yml # primary BlueBuild recipe
├── config/
│ └── just/
│ └── 60-veilor.just # ujust recipes for opt-in components
└── README.md # this file
The recipe extends
ghcr.io/secureblue/securecore-kinoite-hardened-userns:latest. We
inherit secureblue's hardening (sysctl + kargs + custom SELinux
policy + USBGuard + hardened-malloc + Unbound DoT + chronyd NTS +
Trivalent browser + cosign-signed image chain). On top, we layer:
- veilor branding (overlay/, theme, plymouth, sddm, os-release)
- mullvad-browser (anti-fingerprint companion to Trivalent)
- xorg-x11-server-Xwayland (re-enable; secureblue disables it)
- sudo (re-enable; secureblue replaces with run0)
- tailscale + yggdrasil (mesh stack layer 1 + 2)
- ujust recipes for Reticulum (mesh layer 3) + Thorium (opt-in browser)
Trivalent stays as the default browser (correcting an earlier draft).
Build locally
# Requires bluebuild CLI:
# curl -fsSL https://raw.githubusercontent.com/blue-build/cli/main/install.sh | sh
cd bluebuild
bluebuild build recipe.yml
Output: localhost/veilor-os:43 in podman storage. Push to GHCR
via the workflow.
Test the OCI image
# Smoke-test (boots into the rootfs; no kernel, no init):
podman run --rm -it ghcr.io/veilor-org/veilor-os:43 /bin/bash
# Inside, sanity:
cat /etc/os-release # PRETTY_NAME=veilor-os
which sudo # /usr/bin/sudo (re-enabled)
which trivalent # secureblue's COPR (default browser)
which mullvad-browser # /usr/bin/mullvad-browser
systemctl is-enabled yggdrasil # enabled (idle)
systemctl is-enabled tailscaled # disabled (awaits ujust veilor-mesh-join)
Test the installer ISO
The installer ISO is built separately by livecd-creator (current path)
or bootc-image-builder (v1.0+). Its kickstart's %packages block is
replaced with:
ostreecontainer --url=ghcr.io/veilor-org/veilor-os:43 --transport=registry
That populates the target's / directly from this OCI image during
the install pass. No first-boot rebase. No transition window.
Spike success criteria (1 day)
bluebuild build recipe.ymlexits 0bootc container lintexits 0 on the resulting imagepodman runsmoke-test (commands above) all pass.github/workflows/build-bluebuild.ymlbuilds + cosign-signs + pushes toghcr.io/veilor-org/veilor-os:43- An installer ISO using
ostreecontaineragainst this OCI reaches SDDM with admin login on first boot
If all five land, merge v0.7-bluebuild-spike → main as v0.7.0.
If any fail in ways that aren't trivially fixable, file each as a GH
issue + return to v0.5.x kickstart path.
See also
docs/STRATEGY.md— the strategic decision + override listdocs/ROADMAP.mdv0.7 — full scheduledocs/THREAT-MODEL.md— what we publish before launch- secureblue: https://github.com/secureblue/secureblue
- BlueBuild: https://blue-build.org
- bootc / ostreecontainer: https://docs.fedoraproject.org/en-US/bootc/