Update for 2018
The only thing missing right now is a i386 Tumbleweed JeOS image. With that we should be good. Any help on that is highly appreciated.
Update for 2017
The source code for crouton needs to be fixed up and pushed again to see if it gets accpeted upstream. We should be near (TM).
old description
[edit] After some discussions it seems more reasonable to get crouton to be able to build a openSUSE chroot, so I will look into this. If that's to easy/hard/boring I will fallback to some lowlevel kernel/uboot hacking :) [/edit]
With the chromebook R13 [1] the first arm64 based laptop style HW is available. The idea is to enable openSUSE on it. Lot's of things have to be done here:
- find out how the image has to look like and build an image
- forward port the patches needed to get graphics et al working
- enable the mt8173 SoC in u-boot
[1] https://www.amazon.de/Acer-Chromebook-CB5-312T-K0YK-Convertible-Notebook-Multi-Touch/dp/B01N6JR7UE/ref=sr11?ie=UTF8&qid=1484905877&sr=8-1&keywords=chromebook+r13
No Hackers yet
Looking for hackers with the skills:
This project is part of:
Hack Week 15 Hack Week 16 Hack Week 17
Activity
Comments
Similar Projects
Create openSUSE images for Arm/RISC-V boards by avicenzi
Project Description
Create openSUSE images (or test generic EFI images) for Arm and/or RISC-V boards that are not yet supported.
Goal for this Hackweek
Create bootable images of Tumbleweed for SBCs that currently have no images available or are untested.
Consider generic EFI images where possible, as some boards can hold a bootloader.
Document in the openSUSE Wiki how to flash and use the image for a given board.
Boards that I have around and there are no images:
- Rock 3B
- Nano PC T3 Plus
- Lichee RV D1
- StartFive VisionFive (has some image needs testing)
Hack Week 22
Hack Week 21
Resources
OS self documentation, health check and troubleshooting by roseswe
Project Description
The aim of this hackweek project is to improve the utility "cfg2html" so that it is even more usable under SLES and perhaps also under Rancher.
cfg2html (see also https://github.com/cfg2html/cfg2html) itself is a very mature utility for collecting and documenting information of an operating system like Linux, AIX, HP-UX and others.
Goal for this Hackweek
The aim is to extend cfg2html
- for SLES and SLES-for-SAP apps, high availability
- Improve code for MicroOS 5.x, SUMA, Edge and k8s environments
- fix shellbeauity warnings
- possibly add more plugins
- SUMA/Salt integration to collect.
Resources
Required skills: Bash, shell script and the SUSE products mentioned.
https://github.com/cfg2html/cfg2html
https://www.cfg2html.com/
SUSE Health Check Tools by roseswe
SUSE HC Tools Overview
A collection of tools written in Bash or Go 1.24++ to make life easier with handling of a bunch of tar.xz balls created by supportconfig.
Background: For SUSE HC we receive a bunch of supportconfig tar balls to check them for misconfiguration, areas for improvement or future changes.
Main focus on these HC are High Availability (pacemaker), SLES itself and SAP workloads, esp. around the SUSE best practices.
Goals
- Overall improvement of the tools
- Adding new collectors
- Add support for SLES16
Resources
csv2xls* example.sh go.mod listprodids.txt sumtext* trails.go README.md csv2xls.go exceltest.go go.sum m.sh* sumtext.go vercheck.py* config.ini csvfiles/ getrpm* listprodids* rpmdate.sh* sumxls* verdriver* credtest.go example.py getrpm.go listprodids.go sccfixer.sh* sumxls.go verdriver.go
docollall.sh* extracthtml.go gethostnamectl* go.sum numastat.go cpuvul* extractcluster.go firmwarebug* gethostnamectl.go m.sh* numastattest.go cpuvul.go extracthtml* firmwarebug.go go.mod numastat* xtr_cib.sh*