From c22ed7a716ee17c220512b56b91d32d18281df516ad4ee9667c380cfe296bc92 Mon Sep 17 00:00:00 2001 From: Lubos Kocman Date: Wed, 22 May 2024 11:17:43 +0200 Subject: [PATCH] Initial import of kiwi from LEAPM 6.0 --- LICENSE | 17 + Leap.changes | 4 + Leap.kiwi | 776 ++++++++++++++++++++++++++++++++++++++ _constraints | 8 + config.sh | 317 ++++++++++++++++ editbootinstall_pine64.sh | 39 ++ editbootinstall_rpi.sh | 44 +++ 7 files changed, 1205 insertions(+) create mode 100644 LICENSE create mode 100644 Leap.changes create mode 100644 Leap.kiwi create mode 100644 _constraints create mode 100644 config.sh create mode 100644 editbootinstall_pine64.sh create mode 100644 editbootinstall_rpi.sh diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..2b62e4c --- /dev/null +++ b/LICENSE @@ -0,0 +1,17 @@ +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in +all copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/Leap.changes b/Leap.changes new file mode 100644 index 0000000..e0300b4 --- /dev/null +++ b/Leap.changes @@ -0,0 +1,4 @@ +------------------------------------------------------------------- +Wed May 22 09:17:12 UTC 2024 - Lubos Kocman + +- Initial version based on LEAPM 6.0 diff --git a/Leap.kiwi b/Leap.kiwi new file mode 100644 index 0000000..18bd82b --- /dev/null +++ b/Leap.kiwi @@ -0,0 +1,776 @@ + + + + + + + openSUSE + crc@suse.com + openSUSE Leap Micro + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + + + + + 4 + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + + + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + + + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + + 32 + + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + 5 + + + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + 5 + + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + + 24 + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + + + + 32 + + + + + 16.0 + zypper + openSUSE + openSUSE + true + en_US + + + + + + + + + + + + 20 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/_constraints b/_constraints new file mode 100644 index 0000000..422744f --- /dev/null +++ b/_constraints @@ -0,0 +1,8 @@ + + + + 40 + + + + diff --git a/config.sh b/config.sh new file mode 100644 index 0000000..3214755 --- /dev/null +++ b/config.sh @@ -0,0 +1,317 @@ +#!/bin/bash +# Copyright (c) 2023 SUSE LLC +# +# Permission is hereby granted, free of charge, to any person obtaining a copy +# of this software and associated documentation files (the "Software"), to deal +# in the Software without restriction, including without limitation the rights +# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +# copies of the Software, and to permit persons to whom the Software is +# furnished to do so, subject to the following conditions: +# +# The above copyright notice and this permission notice shall be included in +# all copies or substantial portions of the Software. +# +# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +# SOFTWARE. +# +#====================================== +# Functions... +#-------------------------------------- + +test -f /.kconfig && . /.kconfig +test -f /.profile && . /.profile + +set -euxo pipefail + +mkdir /var/lib/misc/reconfig_system + +#====================================== +# Greeting... +#-------------------------------------- +echo "Configure image: [$kiwi_iname]-[$kiwi_profiles]..." + +#====================================== +# This is a workaround - someone, +# somewhere needs to load the xts crypto +# module, otherwise luksOpen will fail while +# creating the image. +#-------------------------------------- +modprobe xts || true + +#====================================== +# add missing fonts +#-------------------------------------- +CONSOLE_FONT="eurlatgr.psfu" + +#====================================== +# prepare for setting root pw, timezone +#-------------------------------------- +echo ** "reset machine settings" +sed -i 's/^root:[^:]*:/root:*:/' /etc/shadow +rm /etc/machine-id +rm /var/lib/zypp/AnonymousUniqueId + +#====================================== +# Setup baseproduct link +#-------------------------------------- +suseSetupProduct + +#====================================== +# Specify default runlevel +#-------------------------------------- +baseSetRunlevel 3 + +#====================================== +# Add missing gpg keys to rpm +#-------------------------------------- +suseImportBuildKey + +#====================================== +# If SELinux is installed, configure it like transactional-update setup-selinux +#-------------------------------------- +if [[ -e /etc/selinux/config ]]; then + # Check if we don't have selinux already enabled. + grep ^GRUB_CMDLINE_LINUX_DEFAULT /etc/default/grub | grep -q security=selinux || \ + sed -i -e 's|\(^GRUB_CMDLINE_LINUX_DEFAULT=.*\)"|\1 security=selinux selinux=1"|g' "/etc/default/grub" + + # Adjust selinux config + sed -i -e 's|^SELINUX=.*|SELINUX=enforcing|g' \ + -e 's|^SELINUXTYPE=.*|SELINUXTYPE=targeted|g' \ + "/etc/selinux/config" + + # Move an /.autorelabel file from initial installation to writeable location + test -f /.autorelabel && mv /.autorelabel /etc/selinux/.autorelabel +fi + +##====================================== +## Enable DHCP on eth0 +##-------------------------------------- +#cat >/etc/sysconfig/network/ifcfg-eth0 <> /etc/vconsole.conf + +# fix security level (boo#1171174) +sed -e '/^PERMISSION_SECURITY=s/easy/paranoid/' /etc/sysconfig/security +chkstat --set --system + +#====================================== +# SSL Certificates Configuration +#-------------------------------------- +echo '** Rehashing SSL Certificates...' +update-ca-certificates + +#====================================== +# Import trusted rpm keys +#-------------------------------------- +for i in /usr/lib/rpm/gnupg/keys/gpg-pubkey*asc; do + # importing can fail if it already exists + rpm --import $i || true +done + +# Temporary workaround for bsc#1212187 +echo "techpreview.ZYPP_MEDIANETWORK=1" >> /etc/zypp/zypp.conf + +#====================================== +# Enable kubelet if installed +#-------------------------------------- +if [ -e /usr/lib/systemd/system/kubelet.service ]; then + suseInsertService kubelet +fi + +# Adjust zypp conf +# https://github.com/openSUSE/libzypp/issues/212 +# in yast that's done in packager/cfa/zypp_conf.rb +sed -i 's/.*solver.onlyRequires.*/solver.onlyRequires = true/g' /etc/zypp/zypp.conf +sed -i 's/.*rpm.install.excludedocs.*/rpm.install.excludedocs = yes/g' /etc/zypp/zypp.conf +sed -i 's/^multiversion =.*/multiversion =/g' /etc/zypp/zypp.conf + +#===================================== +# Configure snapper +#------------------------------------- +if [ "${kiwi_btrfs_root_is_snapshot-false}" = 'true' ]; then + echo "creating initial snapper config ..." + cp /usr/share/snapper/config-templates/default /etc/snapper/configs/root + baseUpdateSysConfig /etc/sysconfig/snapper SNAPPER_CONFIGS root + + # Adjust parameters + sed -i'' 's/^TIMELINE_CREATE=.*$/TIMELINE_CREATE="no"/g' /etc/snapper/configs/root + sed -i'' 's/^NUMBER_LIMIT=.*$/NUMBER_LIMIT="2-10"/g' /etc/snapper/configs/root + sed -i'' 's/^NUMBER_LIMIT_IMPORTANT=.*$/NUMBER_LIMIT_IMPORTANT="4-10"/g' /etc/snapper/configs/root +fi + +# Enable jeos-firstboot if installed, disabled by combustion/ignition +if rpm -q --whatprovides jeos-firstboot >/dev/null; then + mkdir -p /var/lib/YaST2 + touch /var/lib/YaST2/reconfig_system + systemctl enable jeos-firstboot.service +fi + +# Enable cloud-init if installed +if rpm -q --whatprovides cloud-init >/dev/null; then + systemctl enable cloud-init + systemctl enable cloud-init-local +fi + +# The %post script can't edit /etc/fstab sys due to https://github.com/OSInside/kiwi/issues/945 +# so use the kiwi custom hack +cat >/etc/fstab.script <<"EOF" +#!/bin/sh +set -eux + +/usr/sbin/setup-fstab-for-overlayfs +# If /var is on a different partition than /... +if [ "$(findmnt -snT / -o SOURCE)" != "$(findmnt -snT /var -o SOURCE)" ]; then + # ... set options for autoexpanding /var + gawk -i inplace '$2 == "/var" { $4 = $4",x-growpart.grow,x-systemd.growfs" } { print $0 }' /etc/fstab +fi +EOF +chmod a+x /etc/fstab.script + +# To make x-systemd.growfs work from inside the initrd +cat >/etc/dracut.conf.d/50-microos-growfs.conf <<"EOF" +install_items+=" /usr/lib/systemd/systemd-growfs " +EOF + +#====================================== +# Add repos from control.xml +#-------------------------------------- +if [ -x /usr/sbin/add-yast-repos ]; then + add-yast-repos + zypper --non-interactive rm -u live-add-yast-repos +fi + +#====================================== +# Configure SelfInstall specifics +#-------------------------------------- +if [[ "$kiwi_profiles" == *"SelfInstall"* ]]; then + cat > /etc/systemd/system/selfinstallbootloader.service <<-EOF + [Unit] + Description= + After=systemd-machine-id-commit.service + Before=jeos-firstboot.service + + [Service] + Type=oneshot + ExecStart=rm /etc/systemd/system/selfinstallbootloader.service + ExecStart=rm /etc/systemd/system/default.target.wants/selfinstallbootloader.service + ExecStart=/sbin/transactional-update bootloader + ExecStart=/sbin/transactional-update apply + + [Install] + WantedBy=default.target + EOF + ln -s /etc/systemd/system/selfinstallbootloader.service /etc/systemd/system/default.target.wants/selfinstallbootloader.service +fi + +#====================================== +# Boot TimeOut Configuration for iSCSI +#-------------------------------------- +cat > /etc/systemd/system/iscsi-init-delay.service <<-EOF +[Unit] +# Workaround for boo#1198457 delay gen-initiatorname after local-fs +Description=One time delay for the iscsid.service +ConditionPathExists=!/etc/iscsi/initiatorname.iscsi +ConditionPathExists=/sbin/iscsi-gen-initiatorname +DefaultDependencies=no +RequiresMountsFor=/etc/iscsi +After=local-fs.target +Before=iscsi-init.service + +[Install] +WantedBy=default.target + +[Service] +Type=oneshot +RemainAfterExit=no +ExecStart=/sbin/iscsi-gen-initiatorname +EOF +ln -s /etc/systemd/system/iscsi-init-delay.service /etc/systemd/system/default.target.wants/iscsi-init-delay.service + +#====================================== +# Configure Pine64 specifics +#-------------------------------------- +if [[ "$kiwi_profiles" == *"Pine64" ]]; then + echo 'add_drivers+=" fixed sunxi-mmc axp20x-regulator axp20x-rsb "' > /etc/dracut.conf.d/sunxi_modules.conf +fi + +#====================================== +# Configure Raspberry Pi specifics +#-------------------------------------- +if [[ "$kiwi_profiles" == *"RaspberryPi"* ]]; then + # Add necessary kernel modules to initrd (will disappear with bsc#1084272) + echo 'add_drivers+=" bcm2835_dma dwc2 "' > /etc/dracut.conf.d/raspberrypi_modules.conf + + # Add necessary kernel modules to initrd (will disappear with boo#1162669) + echo 'add_drivers+=" pcie-brcmstb "' >> /etc/dracut.conf.d/raspberrypi_modules.conf + + # Work around network issues + cat > /etc/modprobe.d/50-rpi3.conf <<-EOF + # Prevent too many page allocations (bsc#1012449) + options smsc95xx turbo_mode=N + EOF + + cat > /usr/lib/sysctl.d/50-rpi3.conf <<-EOF + # Avoid running out of DMA pages for smsc95xx (bsc#1012449) + vm.min_free_kbytes = 2048 + EOF +fi + +#====================================== +# Configure Vagrant specifics +#-------------------------------------- +if [[ "$kiwi_profiles" == *"Vagrant"* ]]; then + # create vagrant user + useradd vagrant + # allow password-less sudo + echo "vagrant ALL=(ALL)NOPASSWD:ALL" > /etc/sudoers.d/vagrant + # add vagrant's insecure key + mkdir -p /home/vagrant/.ssh + chmod 0700 /home/vagrant/.ssh + cat > /home/vagrant/.ssh/authorized_keys << EOF +ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6NF8iallvQVp22WDkTkyrtvp9eWW6A8YVr+kz4TjGYe7gHzIw+niNltGEFHzD8+v1I2YJ6oXevct1YeS0o9HZyN1Q9qgCgzUFtdOKLv6IedplqoPkcmF0aYet2PkEDo3MlTBckFXPITAMzF8dJSIFo9D8HfdOV0IAdx4O7PtixWKn5y2hMNG0zQPyUecp4pzC6kivAIhyfHilFR61RGL+GPXQ2MWZWFYbAGjyiYJnAmCP3NOTd0jMZEnDkbUvxhMmBYSdETk1rRgm+R4LOzFUGaHqHDLKLX+FIPKcF96hrucXzcWyLbIbEgE98OHlnVYCzRdK8jlqm8tehUc9c9WhQ== vagrant insecure public key +EOF + chmod 0600 /home/vagrant/.ssh/authorized_keys + chown -R vagrant /home/vagrant +fi + +#====================================== +# cloud-init specific settings +#-------------------------------------- +# We do not want cloud-init to run in an environment when there is no data +# source found. bsc#1222113 +if [[ "$kiwi_profiles" =~ ^(x86-qcow|x86-vmware|aarch64-qcow)$ ]]; then + echo "policy: search,found=all,maybe=disabled,notfound=disabled" > /etc/cloud/ds-identify.cfg +fi + +exit 0 diff --git a/editbootinstall_pine64.sh b/editbootinstall_pine64.sh new file mode 100644 index 0000000..fbeae23 --- /dev/null +++ b/editbootinstall_pine64.sh @@ -0,0 +1,39 @@ +#!/bin/bash +set -euxo pipefail + +diskname=$1 +devname="$2" +loopname="${devname%*p?}" +loopdev=/dev/${loopname#/dev/mapper/*} + +#========================================== +# The GPT spans the first 33 sectors, but we need to write our +# at sector 16. Shrink the GPT to only span 5 sectors +# (16 partitions) to give us some space. +#------------------------------------------ +# echo -e 'x\ns\n16\nw\ny' > gdisk.tmp +# Shrink GPT does not work anymore, so let's use legacy MBR for now +cat > gdisk.tmp <<-'EOF' + x + r + g + t + 1 + c + w + y + EOF +dd if=$loopdev of=mbrid.bin bs=1 skip=440 count=4 +gdisk $loopdev < gdisk.tmp +dd of=$loopdev if=mbrid.bin bs=1 seek=440 count=4 +rm -f mbrid.bin +rm -f gdisk.tmp + +#========================================== +# Installing All-in-one U-Boot/SPL +#------------------------------------------ +echo "Installing All-in-one U-Boot/SPL..." +if ! dd if=boot/u-boot-sunxi-with-spl.bin of=$diskname bs=1024 seek=8 conv=notrunc; then + echo "Couldn't install SPL on $diskname" + exit 1 +fi diff --git a/editbootinstall_rpi.sh b/editbootinstall_rpi.sh new file mode 100644 index 0000000..e62dd41 --- /dev/null +++ b/editbootinstall_rpi.sh @@ -0,0 +1,44 @@ +#!/bin/bash +set -euxo pipefail + +diskname=$1 +devname="$2" +loopname="${devname%*p?}" +loopdev=/dev/${loopname#/dev/*} + +#========================================== +# copy Raspberry Pi firmware to EFI partition +#------------------------------------------ +echo "RPi EFI system, installing firmware on ESP" +mkdir -p ./mnt-pi +mount ${loopname}p1 ./mnt-pi +( cd boot/vc; tar c . ) | ( cd ./mnt-pi/; tar x ) +umount ./mnt-pi +rmdir ./mnt-pi + +#========================================== +# Change partition label type to MBR +#------------------------------------------ +# +# The target system doesn't support GPT, so let's move it to +# MBR partition layout instead. +# +# Also make sure to set the ESP partition to type 0xc so that +# broken firmware (Rpi) detects it as FAT. +# +# Use tabs, "<<-" strips tabs, but no other whitespace! +cat > gdisk.tmp <<-'EOF' + x + r + g + t + 1 + c + w + y + EOF +dd if=$loopdev of=mbrid.bin bs=1 skip=440 count=4 +gdisk $loopdev < gdisk.tmp +dd of=$loopdev if=mbrid.bin bs=1 seek=440 count=4 +rm -f mbrid.bin +rm -f gdisk.tmp