Jump to: navigation, search
Welcome to the openSUSE JeOS portal! Edit
openSUSE JeOS (pronounced /jo͞os/, just like “juice”) is a slimmed down form factor of openSUSE Leap and Tumbleweed that is ready to run in virtualization environment and cloud. With openSUSE Linux JeOS, you can choose the right sized option to fit your needs. JeOS provides ready to deploy server images for KVM/Xen Fully Virtualized, Xen Paravirtualized, Microsoft Hyper-V, VMware, and OpenStack Cloud.

openSUSE Tumbleweed JeOS can be regarded as the upstream project for the next SUSE Linux Enterprise JeOS.

Topics Edit




jeos-firstboot is a simple firstboot wizard that replaces systemd-firstboot with a more friendly interface. It allows you to choose keyboard layout, shows you the appropriate license, choose your timezone, set the root password and optionally (on RaspberryPi only) can allow you to configure your wireless network.

It is written in shell script and the code can be found here https://github.com/openSUSE/jeos-firstboot

It also supports having this configurations saved in a configuration file that can be copied to any JeOS image so you can avoid any interactive steps, for more information check https://github.com/openSUSE/jeos-firstboot/blob/master/files/usr/share/defaults/jeos-firstboot.conf

Refreshed Leap Images

Refreshed Leap Images

Our openSUSE Leap images are built in a separate project on OBS: [1]. Whenever one of the dependencies receives an update, OBS automatically rebuilds the affected images. Once that's complete, the images are sent to openQAand if the tests pass, builds are automatically published. Releasing builds to openQA and publishing on success is handled by the ToTest-Manager.



openSUSE JeOS image testing takes a part of the baseline distribution testing as the images are usually built along with the installable mediums. Automated monitoring of the specified JeOS build projects allows us to fetch images as soon as they are accessible in The Open Build Service and initiate execution of predefined test suites for each image flavour. For instance, here you may see predefined assets of our interest to be pulled and tested in openQA from openSUSE:Factory project

As of today, we can make use of QEMU hypervisor workers only. QEMU VMs are being spawned with CPU model qemu64, bootable either in EFI or bios_boot, using features of QEMU's user-network and create memory area size of 1GB or 2GB.

Testing scope can be defined among several areas:

  • containers
  • filesystems and utilities
  • server applications
  • pre-selected yast2 modules
  • user customization
  • image properties (size, machine id etc.)

The test status can be seen on the OpenQA UI directly (green/yellow/red) to have a quick overview of what the result is. When a sub-test has failed, the suite is marked as failed and the QA engineers take a look to identify the issue and create a bug if necessary. The logs of each test are uploaded in OpenQA for further troubleshooting.

Here you can see the list of tests that are executed for Leap 15.2: https://openqa.opensuse.org/tests/overview?distri=opensuse&version=15.2&build=31.176&groupid=65&flavor=JeOS-for-kvm-and-xen

If you open one of them (i.e. containers) you can see all the details and output of all the tests.

A set of fixed variables are defined for each job and some other variables can be defined for each flavor which will make the tests behave different according to the needs. For instance, all JeOS jobs will set BOOT_HDD_IMAGE=1 and will boot from an existing image defined in HDD_1 variable. Those variables can be seen in the Settings tab and also in vars.json which can be opened in the Logs&Assets tab.

Main difference between openSUSE and SLE image testing comes from the nature of both environments. SLE is basically a collection of modules containing sets of enterprise packages. Most of the modules become available after successful product registration. Usually we store product registration code in openQA test variable named `SCC_REGCODE`. The rest can be registered additionally using `SUSEConnect` utility although some might required module-specific registration code. The order of module registration matters as the modules come in sort of hierarchy. For instance, if one would like to register SDK module, BASE and DESKTOP APPs modules have to be registered apriori. Usually this can be controlled by openQA test suite variable `SCC_ADDONS` holding a list of modules to be registered by openQA test job. Product under development are using SCC features to test registration, however the returned list of modules and their related URLs cannot be pointing to official update servers as they do not store packages to be tested. In such a case we use so-called fake scc (https://github.com/SUSE/scc-qa-proxy) to redirect repositories to pull test packages from openQA instead of update servers.