pmbootstrap, with Synit changes
Go to file
Martijn Braam 0ce23718be Fixed most compiler errors 2017-08-17 13:45:58 +02:00
aports Fixed most compiler errors 2017-08-17 13:45:58 +02:00
keys Hello, there! 2017-05-26 22:08:45 +02:00
pmb Made openiboot compile in native mode instead of distcc 2017-08-17 12:25:20 +02:00
test Fix #271: properly resolve symlinks in all paths (#329) 2017-08-15 14:08:48 +00:00
.gitignore gitignore: Added vim temporary files 2017-06-25 21:40:49 +02:00
.travis.yml Implemented checksum test in the travis script (#298) 2017-07-30 19:43:02 +00:00
CONTRIBUTING.md contributing: fixed typos and added some links (#372) 2017-08-14 14:23:35 +00:00
LICENSE Initial commit 2017-05-26 19:25:48 +00:00
README.md README refactoring (#367) 2017-08-16 20:45:31 +00:00
pmbootstrap.py Close #174: Put frontend functions in extra file (#185) 2017-07-18 19:01:11 +00:00

README.md

pmbootstrap

Introduction | Security Warning | Supported Devices | travis badge

Sophisticated chroot/build/flash tool to develop and install postmarketOS.

For in-depth information please refer to the postmarketOS wiki.

Requirements

  • Linux distribution (x86_64 or aarch64)
  • Python 3.4+
  • OpenSSL

Usage

Assuming you have a supported device, you can build and flash a postmarketOS image by running through the following steps. For new devices check the porting guide.

First, clone the git repository and initialize your pmbootstrap environment:

$ git clone https://github.com/postmarketOS/pmbootstrap
$ cd pmbootstrap
$ ./pmbootstrap.py init

While running any pmbootstrap command, it's always useful to have a log open in a separate window where further details can be seen:

$ ./pmbootstrap.py log

It's now time to run a full build which will create the boot and system images:

$ ./pmbootstrap.py install

Once your device is connected and is ready to be flashed (e.g. via fastboot), you can run a flash of the kernel (boot) and system partitions:

$ ./pmbootstrap.py flasher flash_kernel
$ ./pmbootstrap.py flasher flash_system

After a reboot, the device will provide a USB network interface, which we request an IP from, and telnet into to open the full-disk encryption on the main system partition:

$ dhclient -v enp0s20f0u1
$ telnet 172.16.42.1

Trying 172.16.42.1...
Connected to 172.16.42.1.
Escape character is '^]'.

Enter passphrase for /dev/mapper/mmcblk0p25p2: 
Connection closed by foreign host.

Once the partition has been unlocked it is possible to connect via SSH:

$ ssh user@172.16.42.1

Development

Testing

Install pytest (via your package manager or pip) and run it inside the pmbootstrap folder.

License

GPLv3