New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Keep website hidden service mirror up-to-date #1352

Open
andrewdavidwong opened this Issue Oct 22, 2015 · 59 comments

Comments

@andrewdavidwong
Member

andrewdavidwong commented Oct 22, 2015

We have a Tor hidden service mirror, thanks to @Nukama. However, it has fallen woefully behind the updates to the canonical website. (As of this writing, most pages on it are inaccessible.) Is there any way to automate the task of keeping it up-to-date? If not, perhaps we shouldn't list it in the footer of the site (at least not without some sort of disclaimer).

For reference, here's the URI: http://qubesosmamapaxpa.onion/

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Oct 22, 2015

Member

@Nukama, I can setup some hook to call when the repository is updated.
On your side this would require exposing some address (either clearnet
or tor service), which will call _utils/update-submodules (or similar). The
script would take care of git tag verification. That exposed hook would
not need to parse any parameters, just fetch updates from github repo.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented Oct 22, 2015

@Nukama, I can setup some hook to call when the repository is updated.
On your side this would require exposing some address (either clearnet
or tor service), which will call _utils/update-submodules (or similar). The
script would take care of git tag verification. That exposed hook would
not need to parse any parameters, just fetch updates from github repo.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@marmarek marmarek added this to the Documentation/website milestone Nov 2, 2015

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Apr 24, 2016

Member

We probably shouldn't wait for a reply from @Nukama on this.

Member

andrewdavidwong commented Apr 24, 2016

We probably shouldn't wait for a reply from @Nukama on this.

andrewdavidwong added a commit that referenced this issue May 31, 2016

andrewdavidwong added a commit that referenced this issue May 31, 2016

Untrack #1352
We're not currently tracking website issues here.
@qubenix

This comment has been minimized.

Show comment
Hide comment
@qubenix

qubenix May 31, 2016

Maybe host the hidden service on the same server as the clearnet site? This will dramatically simplify this process and make an easier workflow for the dev team (if @Nukama will give the private key of course).

qubenix commented May 31, 2016

Maybe host the hidden service on the same server as the clearnet site? This will dramatically simplify this process and make an easier workflow for the dev team (if @Nukama will give the private key of course).

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 31, 2016

Member

Currently clearnet site is hosted on github pages, so not exactly possible to host hidden service from there. But cloning github pages (jekyll) is very simple.

Member

marmarek commented May 31, 2016

Currently clearnet site is hosted on github pages, so not exactly possible to host hidden service from there. But cloning github pages (jekyll) is very simple.

@andrewdavidwong andrewdavidwong changed the title from Keep hidden service mirror up-to-date to Keep website hidden service mirror up-to-date Aug 23, 2016

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 13, 2017

I can probably host this along side Whonix's hidden services. However, if you want to keep the same .onion domain, you'll have to get me the private key somehow. Otherwise, we can have another subdomain on kkkkkkkkkk63ava6.onion.

If it's just a matter of pulling a git repo every so often, that should be pretty easy to do.

I can probably host this along side Whonix's hidden services. However, if you want to keep the same .onion domain, you'll have to get me the private key somehow. Otherwise, we can have another subdomain on kkkkkkkkkk63ava6.onion.

If it's just a matter of pulling a git repo every so often, that should be pretty easy to do.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 13, 2017

Member

I can probably host this along side Whonix's hidden services. However, if you want to keep the same .onion domain, you'll have to get me the private key somehow. Otherwise, we can have another subdomain on kkkkkkkkkk63ava6.onion.

Unfortunately, we don't have private key for the old address :/
@andrewdavidwong do you have any preference as for the address - from the list I've sent you?

If it's just a matter of pulling a git repo every so often, that should be pretty easy to do.

I can also setup github hook for the repository - it will sent a simple POST request to configured URL. Possible problem here: it must be clearnet URL, onion addresses are not supported. If really needed, I could proxy it myself, but not sure if worth the effort.

Member

marmarek commented Jan 13, 2017

I can probably host this along side Whonix's hidden services. However, if you want to keep the same .onion domain, you'll have to get me the private key somehow. Otherwise, we can have another subdomain on kkkkkkkkkk63ava6.onion.

Unfortunately, we don't have private key for the old address :/
@andrewdavidwong do you have any preference as for the address - from the list I've sent you?

If it's just a matter of pulling a git repo every so often, that should be pretty easy to do.

I can also setup github hook for the repository - it will sent a simple POST request to configured URL. Possible problem here: it must be clearnet URL, onion addresses are not supported. If really needed, I could proxy it myself, but not sure if worth the effort.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 13, 2017

Our hidden service and clearnet sites are hosted on the same machine, so having the hook tie back to a clearnet address should be perfectly fine. I don't have too much experience with webhooks, however.

Our hidden service and clearnet sites are hosted on the same machine, so having the hook tie back to a clearnet address should be perfectly fine. I don't have too much experience with webhooks, however.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 13, 2017

Member

It's easy: https://github.com/marmarek/signature-checker/blob/master/github-webhook - expose as CGI.
If unique script could be used for this particular purpose - probably you don't need to parse POST data at all. Some documentation: https://developer.github.com/v3/repos/hooks/#receiving-webhooks
And actual example event for git push: https://developer.github.com/v3/activity/events/types/#pushevent

Member

marmarek commented Jan 13, 2017

It's easy: https://github.com/marmarek/signature-checker/blob/master/github-webhook - expose as CGI.
If unique script could be used for this particular purpose - probably you don't need to parse POST data at all. Some documentation: https://developer.github.com/v3/repos/hooks/#receiving-webhooks
And actual example event for git push: https://developer.github.com/v3/activity/events/types/#pushevent

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Jan 13, 2017

Member

Unfortunately, we don't have private key for the old address :/
@andrewdavidwong do you have any preference as for the address - from the list I've sent you?

No preference. There weren't any outstanding ones. Here were the slightly recognizable addresses:

qubesoseggc4nxja.onion
qubesos4rrrrz6n4.onion
qubesoseaaeexn7o.onion
qubesosxuuxxnkzb.onion
qubesosangieqolx.onion
qubesosnojpylaqe.onion
qubesosxydie7non.onion
qubesosgtgxgxdot.onion
qubesosprrwr4z3h.onion
qubesoscirect6nz.onion

IMO, using a subdomain on kkkkkkkkkk63ava6.onion would also be fine.

Member

andrewdavidwong commented Jan 13, 2017

Unfortunately, we don't have private key for the old address :/
@andrewdavidwong do you have any preference as for the address - from the list I've sent you?

No preference. There weren't any outstanding ones. Here were the slightly recognizable addresses:

qubesoseggc4nxja.onion
qubesos4rrrrz6n4.onion
qubesoseaaeexn7o.onion
qubesosxuuxxnkzb.onion
qubesosangieqolx.onion
qubesosnojpylaqe.onion
qubesosxydie7non.onion
qubesosgtgxgxdot.onion
qubesosprrwr4z3h.onion
qubesoscirect6nz.onion

IMO, using a subdomain on kkkkkkkkkk63ava6.onion would also be fine.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 13, 2017

Member

I think I like qubesos4rrrrz6n4.onion from this list (for me the easiest one to remember). @mfc?

Member

marmarek commented Jan 13, 2017

I think I like qubesos4rrrrz6n4.onion from this list (for me the easiest one to remember). @mfc?

@mfc

This comment has been minimized.

Show comment
Hide comment
@mfc

mfc Jan 13, 2017

Member

yep qubesos4rrrrz6n4.onion sounds good.

Member

mfc commented Jan 13, 2017

yep qubesos4rrrrz6n4.onion sounds good.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 13, 2017

Cool. If you want to email me the private key, my contact info is here: https://www.whonix.org/wiki/contact#For_Website_Issues

Cool. If you want to email me the private key, my contact info is here: https://www.whonix.org/wiki/contact#For_Website_Issues

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 13, 2017

I have qubesos4rrrrz6n4.onion up and running. @marmarek: I sent you an email to get the webhook / automation side part set up as well.

I have qubesos4rrrrz6n4.onion up and running. @marmarek: I sent you an email to get the webhook / automation side part set up as well.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 13, 2017

Member

Ok, webhook enabled. @andrewdavidwong do you have some pending edits to test if automation works?

Member

marmarek commented Jan 13, 2017

Ok, webhook enabled. @andrewdavidwong do you have some pending edits to test if automation works?

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 13, 2017

For full disclosure, the reason I emailed the webhook link directly is to prevent it from getting crawled by search engines and regenerating the site unnecessarily. If you email me directly and provide a half-decent reason for needing the endpoint, I'll happily provide it.

For full disclosure, the reason I emailed the webhook link directly is to prevent it from getting crawled by search engines and regenerating the site unnecessarily. If you email me directly and provide a half-decent reason for needing the endpoint, I'll happily provide it.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 13, 2017

If there are no editorial changes to make, adding a comment to robots.txt would likely work.

If there are no editorial changes to make, adding a comment to robots.txt would likely work.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 13, 2017

Member

If you want to prevent spurious calls, github provide a mechanism for verifying if request really come from github - X-Hub-Signature header: https://developer.github.com/v3/repos/hooks/#webhook-headers
But just for anti-crawlers, you can just check some simple property of received data - like if that is a POST request (very rare for crawlers), if X-GitHub-Event header is present etc.

Anyway, just keeping URL non-public is also some solution.

Member

marmarek commented Jan 13, 2017

If you want to prevent spurious calls, github provide a mechanism for verifying if request really come from github - X-Hub-Signature header: https://developer.github.com/v3/repos/hooks/#webhook-headers
But just for anti-crawlers, you can just check some simple property of received data - like if that is a POST request (very rare for crawlers), if X-GitHub-Event header is present etc.

Anyway, just keeping URL non-public is also some solution.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 13, 2017

Aah, good things to point out. Once we make sure everything's working I may go back and improve the actual webhook receiver, it's a bit inelegant at the moment.

Aah, good things to point out. Once we make sure everything's working I may go back and improve the actual webhook receiver, it's a bit inelegant at the moment.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 14, 2017

Member

If there are no editorial changes to make, adding a comment to robots.txt would likely work.

I'd like to check also submodules update. Just pushed some minor edit.

Member

marmarek commented Jan 14, 2017

If there are no editorial changes to make, adding a comment to robots.txt would likely work.

I'd like to check also submodules update. Just pushed some minor edit.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 14, 2017

Doesn't look like it worked. @marmarek, would you mind hopping in #whonix on OFTC to help me get this debugged?

Doesn't look like it worked. @marmarek, would you mind hopping in #whonix on OFTC to help me get this debugged?

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 14, 2017

I've redone the webhook to essentially use a modified version of the post-receive hook in the readme here. That should deal with the submodules properly.

I've redone the webhook to essentially use a modified version of the post-receive hook in the readme here. That should deal with the submodules properly.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 14, 2017

@marmarek joined me in IRC, and I believe everything is working now. I will make a note to clean up my implementation and potentially add it to _utils in the main repo.

@marmarek joined me in IRC, and I believe everything is working now. I will make a note to clean up my implementation and potentially add it to _utils in the main repo.

andrewdavidwong added a commit to QubesOS/qubesos.github.io that referenced this issue Jan 14, 2017

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Jan 14, 2017

Member

Added a footer link to the new hidden service. Thanks, @fortasse!

Member

andrewdavidwong commented Jan 14, 2017

Added a footer link to the new hidden service. Thanks, @fortasse!

@anonmos1

This comment has been minimized.

Show comment
Hide comment
@anonmos1

anonmos1 Apr 26, 2017

Can we have https://www.qubes-os.org/qubes-issues/ working on the onion too?

Can we have https://www.qubes-os.org/qubes-issues/ working on the onion too?

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Apr 27, 2017

Member

Can we have https://www.qubes-os.org/qubes-issues/ working on the onion too?

That one's hosted from a different repo. The original intention was for it not to share the qubes-os.org domain at all, but because of the way the website is set up, there's an automatic redirect from https://qubesos.github.io/qubes-issues/ to https://www.qubes-os.org/qubes-issues/. Not sure how much trouble it'd be.

CC @fortasse @marmarek

Member

andrewdavidwong commented Apr 27, 2017

Can we have https://www.qubes-os.org/qubes-issues/ working on the onion too?

That one's hosted from a different repo. The original intention was for it not to share the qubes-os.org domain at all, but because of the way the website is set up, there's an automatic redirect from https://qubesos.github.io/qubes-issues/ to https://www.qubes-os.org/qubes-issues/. Not sure how much trouble it'd be.

CC @fortasse @marmarek

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Apr 27, 2017

If we're cool with it just living at qubesos4rrrrz6n4.onion/qubes-issues/ it shouldn't be too much trouble. We can use the existing webhook, I can just update the script to update both repos / folders.

If we're cool with it just living at qubesos4rrrrz6n4.onion/qubes-issues/ it shouldn't be too much trouble. We can use the existing webhook, I can just update the script to update both repos / folders.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Apr 27, 2017

Member

@fortasse: Sounds good to me. Thanks!

Member

andrewdavidwong commented Apr 27, 2017

@fortasse: Sounds good to me. Thanks!

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Apr 27, 2017

@andrewdavidwong: http://qubesos4rrrrz6n4.onion/qubes-issues/ is up. Do you want to confirm the webhook works? It's exactly the same as the old webhook, just with a few more steps to pull and build https://github.com/QubesOS/qubes-issues/tree/gh-pages. I assume it will work fine, but more testing is never a bad thing. :)

@andrewdavidwong: http://qubesos4rrrrz6n4.onion/qubes-issues/ is up. Do you want to confirm the webhook works? It's exactly the same as the old webhook, just with a few more steps to pull and build https://github.com/QubesOS/qubes-issues/tree/gh-pages. I assume it will work fine, but more testing is never a bad thing. :)

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Apr 28, 2017

Member

@fortasse Ok, I've pushed several commits to the gh-pages branch. They're not reflected on the onion version yet, but it might still be too soon.

Member

andrewdavidwong commented Apr 28, 2017

@fortasse Ok, I've pushed several commits to the gh-pages branch. They're not reflected on the onion version yet, but it might still be too soon.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Apr 28, 2017

This might be a stupid question, but did you configure this repo to hit the same webhook as the main website repo? The last hit to the webhook was at 27/Apr/2017:17:49:44 +0200 according to logs.

fortasse commented Apr 28, 2017

This might be a stupid question, but did you configure this repo to hit the same webhook as the main website repo? The last hit to the webhook was at 27/Apr/2017:17:49:44 +0200 according to logs.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Apr 28, 2017

Member

No, I've never done that before. (I think @marmarek did it for the main website repo.) How would I do that? Feel free to point me to documentation.

Member

andrewdavidwong commented Apr 28, 2017

No, I've never done that before. (I think @marmarek did it for the main website repo.) How would I do that? Feel free to point me to documentation.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Apr 28, 2017

https://developer.github.com/webhooks/creating/

TLDR: To set up a repository webhook on GitHub, head over to the Settings page of your repository, and click on Webhooks & services.

You should clone whatever settings are used for the QubesOS/qubes-doc repo, I'm not sure what the exact settings are on the github-side.

https://developer.github.com/webhooks/creating/

TLDR: To set up a repository webhook on GitHub, head over to the Settings page of your repository, and click on Webhooks & services.

You should clone whatever settings are used for the QubesOS/qubes-doc repo, I'm not sure what the exact settings are on the github-side.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Apr 28, 2017

Member

Oh, I don't have admin access to either repo, so I can't even view the Settings page. I think @marmarek will have to do it.

Member

andrewdavidwong commented Apr 28, 2017

Oh, I don't have admin access to either repo, so I can't even view the Settings page. I think @marmarek will have to do it.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Apr 28, 2017

Alright. I just hit the webhook manually, can you confirm the changes are reflected on qubesos4rrrrz6n4.onion/qubes-issues/ as expected? If hitting it manually works, it should have no issues once the webhook config gets updated on Github.

Alright. I just hit the webhook manually, can you confirm the changes are reflected on qubesos4rrrrz6n4.onion/qubes-issues/ as expected? If hitting it manually works, it should have no issues once the webhook config gets updated on Github.

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Apr 28, 2017

I'm 95% sure it should work when the repo config is updated. Let me know if it still doesn't work once the webhook is configured on the github-side.

I'm 95% sure it should work when the repo config is updated. Let me know if it still doesn't work once the webhook is configured on the github-side.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Apr 28, 2017

Member

Yep, looks good. Thanks, @fortasse!

Member

andrewdavidwong commented Apr 28, 2017

Yep, looks good. Thanks, @fortasse!

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 28, 2017

Member

Webhook added. But there is some problem - it failed with "Service timeout", and also the last one for main repo failed at 2017-04-27 17:47:51 (the last one).

Member

marmarek commented Apr 28, 2017

Webhook added. But there is some problem - it failed with "Service timeout", and also the last one for main repo failed at 2017-04-27 17:47:51 (the last one).

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Apr 28, 2017

@anonmos1

This comment has been minimized.

Show comment
Hide comment
@anonmos1

anonmos1 May 5, 2017

onion doesn't have the latest announcement

anonmos1 commented May 5, 2017

onion doesn't have the latest announcement

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse May 5, 2017

fortasse commented May 5, 2017

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 5, 2017

Member

According to github - this is also when the last POST was sent (successfully). And it is after adding an announcement. So, something is wrong with the update script...

Member

marmarek commented May 5, 2017

According to github - this is also when the last POST was sent (successfully). And it is after adding an announcement. So, something is wrong with the update script...

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse May 5, 2017

fortasse commented May 5, 2017

@anonmos1

This comment has been minimized.

Show comment
Hide comment
@anonmos1

anonmos1 Jun 14, 2017

Unfortunately, the onion is not up to date

Unfortunately, the onion is not up to date

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jun 14, 2017

Just updated it manually, and made a couple tweaks to the update
process. Hopefully that will prevent this from happening again.

Sorry for the trouble, and thanks for letting me know.

(Also, it looks like reply-by-email is broken on Github. If this double posts, sorry.)

Just updated it manually, and made a couple tweaks to the update
process. Hopefully that will prevent this from happening again.

Sorry for the trouble, and thanks for letting me know.

(Also, it looks like reply-by-email is broken on Github. If this double posts, sorry.)

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Jun 15, 2017

Member

Thanks for taking care of it, @fortasse!

Member

andrewdavidwong commented Jun 15, 2017

Thanks for taking care of it, @fortasse!

@anonmos1

This comment has been minimized.

Show comment
Hide comment
@anonmos1

anonmos1 Jun 18, 2017

I still cannot see the latest announcements

I still cannot see the latest announcements

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jun 18, 2017

Hm, apparently the --incremental flag for Jekyll doesn't work like I thought. I've removed it, and confirmed the updates are now there. It seems like I was pulling the files from Git properly, but not generating the site completely...

Can you confirm @anonmos1?

Hm, apparently the --incremental flag for Jekyll doesn't work like I thought. I've removed it, and confirmed the updates are now there. It seems like I was pulling the files from Git properly, but not generating the site completely...

Can you confirm @anonmos1?

@anonmos1

This comment has been minimized.

Show comment
Hide comment
@anonmos1

anonmos1 Jun 24, 2017

Yes, all seems to be good

Yes, all seems to be good

@anonmos1

This comment has been minimized.

Show comment
Hide comment
@anonmos1

anonmos1 Jan 12, 2018

Last 4 announcements are missing

Last 4 announcements are missing

@anonmos1

This comment has been minimized.

Show comment
Hide comment
@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Jan 19, 2018

Jekyll decided to be picky. I've got it sorted now, thanks for bringing it to my attention @anonmos1, and sorry for the delay.

Jekyll decided to be picky. I've got it sorted now, thanks for bringing it to my attention @anonmos1, and sorry for the delay.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Feb 12, 2018

Member

FYI @fortasse:

On 2018-02-11 18:57, Gaijin wrote:

The Qubes OS v3 and v2 onion services sites don't appear to have been
updated since January when this announcement was made. Shouldn't they
show the same content as the normal Qubes site?

For example I don't see the news of the 4.0-rc4 release, or recent
changes to the Docs.

Member

andrewdavidwong commented Feb 12, 2018

FYI @fortasse:

On 2018-02-11 18:57, Gaijin wrote:

The Qubes OS v3 and v2 onion services sites don't appear to have been
updated since January when this announcement was made. Shouldn't they
show the same content as the normal Qubes site?

For example I don't see the news of the 4.0-rc4 release, or recent
changes to the Docs.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Mar 13, 2018

Member

Bump/poke @fortasse:

On 2018-03-12 02:26, Gaijin wrote:

On 2018-02-12 01:47, Andrew David Wong wrote:

On 2018-02-11 18:57, Gaijin wrote:

The Qubes OS v3 and v2 onion services sites don't appear to have been
updated since January when this announcement was made. Shouldn't they
show the same content as the normal Qubes site?

For example I don't see the news of the 4.0-rc4 release, or recent
changes to the Docs.

Thanks for the report! Tracking:

#1352 (comment)

FYI: The Onion sites are still not syncing with the Qubes site. They're
still stuck in January 2018...

CC: @adrelanos

Member

andrewdavidwong commented Mar 13, 2018

Bump/poke @fortasse:

On 2018-03-12 02:26, Gaijin wrote:

On 2018-02-12 01:47, Andrew David Wong wrote:

On 2018-02-11 18:57, Gaijin wrote:

The Qubes OS v3 and v2 onion services sites don't appear to have been
updated since January when this announcement was made. Shouldn't they
show the same content as the normal Qubes site?

For example I don't see the news of the 4.0-rc4 release, or recent
changes to the Docs.

Thanks for the report! Tracking:

#1352 (comment)

FYI: The Onion sites are still not syncing with the Qubes site. They're
still stuck in January 2018...

CC: @adrelanos

@fortasse

This comment has been minimized.

Show comment
Hide comment
@fortasse

fortasse Mar 17, 2018

Shoot, thanks again for the heads up - I've adjusted the script to address cases where the gems need upgrading, and to email me when it doesn't exit cleanly. Thanks for your patience!

Shoot, thanks again for the heads up - I've adjusted the script to address cases where the gems need upgrading, and to email me when it doesn't exit cleanly. Thanks for your patience!

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Mar 17, 2018

Member

Thanks!

Member

andrewdavidwong commented Mar 17, 2018

Thanks!

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 22, 2018

Member

Looks like tor onion service is down.

Member

marmarek commented Mar 22, 2018

Looks like tor onion service is down.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Mar 23, 2018

Member

Yes. Not sure if @marmarek is referring to just the website, but the yum and deb onion repos also appear to be down, @fortasse.

Member

andrewdavidwong commented Mar 23, 2018

Yes. Not sure if @marmarek is referring to just the website, but the yum and deb onion repos also appear to be down, @fortasse.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
Member

adrelanos commented Mar 24, 2018

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Mar 24, 2018

Member

That's very sad news. Thank you for letting us know.

In the meantime, I suggest that users who want to update over Tor change their repo definitions to use the non-onion domains (i.e., yum.qubes-os.org and deb.qubes-os.org).

Member

andrewdavidwong commented Mar 24, 2018

That's very sad news. Thank you for letting us know.

In the meantime, I suggest that users who want to update over Tor change their repo definitions to use the non-onion domains (i.e., yum.qubes-os.org and deb.qubes-os.org).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment