On Saturday, March 18, 2017 at 4:48:06 PM UTC+5:30, Marek 
Marczykowski-Górecki wrote:
>
> -----BEGIN PGP SIGNED MESSAGE----- 
> Hash: SHA256 
>
> On Sat, Mar 18, 2017 at 02:04:15AM -0700, shubham dubey wrote: 
> > Hello, 
> > I was trying to get more familiar with qubes live usb project then I 
> came 
> > across this branch 
> > of qubes-os-installer 
> > https://github.com/marmarek/qubes-installer-qubes-os/tree/liveusb. 
> > Right now I have spent my significant time on understanding anaconda 
> > installer which qubes use 
> > by default but it is tough to understand the liveusb branch (mentioned 
> > above) since there is no documentation 
> > available to understand. 
> > 
> > So,I will be really grateful if someone guide me how to proceed or give 
> any 
> > reference link where I can read more about 
> > how live usb boot works. 
>
> Take a look here: 
> https://github.com/QubesOS/qubes-issues/issues/1970 
>
> Generally, qubes-installer-qubes-os repository contains two somehow 
> independent parts: 
> 1. Standalone installer: 
>   - anaconda - installation application itself 
>   - pungi+lorax - tools to build bootable image hosting anaconda (*) 
>   - conf/qubes-kickstart.cfg - kickstart file describing that bootable 
>     image 
>
> 2. Live image creator: 
>   - livecd-tools - tools to build live image(*) 
>   - live - scripts related to live image (qubes-live package) 
>   - conf/liveusb.ks - kickstart file describing Live image 
>
> Those two parts can be enabled independently, using ISO_INSTALLER 
> (default to '1') and ISO_LIVEUSB (default to '0') options in 
> builder.conf. 
>
Thanks,this is quite useful explanation.I will research more on how qubes 
version
of live usb work and if I will have any questions then I will ping you 
again. 

>
> Ideally, we'd like to have a single image, which serve both as live image 
> and installer image, but it's a long way to this goal, with many 
> challenges on it. 
>
>
> (*) Ideally we'd use upstream tools (pungi, lorax, pykickstart, 
> livecd-tools) directly, but all those are missing signature verification 
> of packages downloaded from the internet, sometimes over plain http... 
> Patches applied there are all sent upstream, but in all the cases were 
> either ignored or softly rejected ("It is expected that the 
> distribution's using it will have strong controls on the contents taht 
> feed into the compose"). 
>
> - -- 
> Best Regards, 
> Marek Marczykowski-Górecki 
> Invisible Things Lab 
> A: Because it messes up the order in which people normally read text. 
> Q: Why is top-posting such a bad thing? 
> -----BEGIN PGP SIGNATURE----- 
> Version: GnuPG v2 
>
> iQEcBAEBCAAGBQJYzRdnAAoJENuP0xzK19csAswH/RBWm0gB+X7Yld5MdWS6L/T4 
> Li2GQKF2KOMKRCYc1PSRCGtwRAoYAqr3Gbcw+V8lFQ/yMKW2f14ROWVf+AzNXmPA 
> eZT8gK907MW50Ov04QdSbyVtSl/7EJAXL7VyoUT9SdrI0hmHeaj3ab7jSlhoBe0N 
> cCi87qL5gGF/ahBvRcbBqh3bxuYyVthAofSoKwu/vtcqIxmIgglT/pq6hZ1eVehk 
> 3R2aVJqbAx0vWTEkTHqpt8KHsV9Idu3N8XADKfi6IyC5inYjNKnbItZvmSFg675C 
> nHBjHHWQgQjg3aIonOZM4IV4c5Z5/ZjxLPhaDub0gPK6z9fzCr9nEElm+bDR7FA= 
> =beZB 
> -----END PGP SIGNATURE----- 
>
 

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/bc1117db-24ab-4beb-a0e7-31f715ea0c8f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to