New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

suspend / resume scripts needed for NetVM and ProxyVM? #1663

Closed
clayt0nk opened this Issue Jan 20, 2016 · 35 comments

Comments

@clayt0nk

I currently have a tinc VPN daemon running in NetVM / Qubes 3.1 (R3.1), and the VPN route disappears every time I resume from sleep. Currently the only way fix that is a manual restart of the tinc daemon.

A script that runs automatically on resume from sleep would be nice.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 11, 2016

Member

I wonder if I could implement this to speed up having this feature. (Required to fix #1764.)

What would be the way to implement this? The qrexec service is probably simple to figure out. Is there a hook to get this going?

Dropping a trivial, executive script into /etc/pm/sleep.d, which does not work for a unknown reason.

Member

adrelanos commented Mar 11, 2016

I wonder if I could implement this to speed up having this feature. (Required to fix #1764.)

What would be the way to implement this? The qrexec service is probably simple to figure out. Is there a hook to get this going?

Dropping a trivial, executive script into /etc/pm/sleep.d, which does not work for a unknown reason.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 11, 2016

Member

qubes.SuspendPre/qubes.SuspendPost is called from https://github.com/QubesOS/qubes-core-admin-linux/blob/master/pm-utils/51qubes-suspend-netvm. Only in VMs with PCI device.
I wonder what would happen if it will be called in every VM. VM part is in https://github.com/QubesOS/qubes-core-agent-linux/blob/master/qubes-rpc/prepare-suspend. It looks like qubes.suspendPre will disable eth1 dummy interface for example.
So, here we need (1):

  • change prepare-suspend script to not break non-NetVM
  • add an option to call additional scripts from there

And only then (2):

  • enable qubes.SuspendPre/qubes.SuspendPost for all the VMs

Since we can't enforce synchronous update dom0 and template (do (2) only after (1)), this is no-go in stable releases. We need something else. Two ideas:

  • introduce another service, which will handle (1), call only the new one in (2) (keep calling the old one for NetVMs)
  • assume that qubes.SuspendPost is safe to call in every VM (reading the script it is sane assumption, but needs testing), and call only this one in every VM (keep calling qubes.SuspendPre only in NetVMs)

What do you think?

Member

marmarek commented Mar 11, 2016

qubes.SuspendPre/qubes.SuspendPost is called from https://github.com/QubesOS/qubes-core-admin-linux/blob/master/pm-utils/51qubes-suspend-netvm. Only in VMs with PCI device.
I wonder what would happen if it will be called in every VM. VM part is in https://github.com/QubesOS/qubes-core-agent-linux/blob/master/qubes-rpc/prepare-suspend. It looks like qubes.suspendPre will disable eth1 dummy interface for example.
So, here we need (1):

  • change prepare-suspend script to not break non-NetVM
  • add an option to call additional scripts from there

And only then (2):

  • enable qubes.SuspendPre/qubes.SuspendPost for all the VMs

Since we can't enforce synchronous update dom0 and template (do (2) only after (1)), this is no-go in stable releases. We need something else. Two ideas:

  • introduce another service, which will handle (1), call only the new one in (2) (keep calling the old one for NetVMs)
  • assume that qubes.SuspendPost is safe to call in every VM (reading the script it is sane assumption, but needs testing), and call only this one in every VM (keep calling qubes.SuspendPre only in NetVMs)

What do you think?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 11, 2016

Member

Perhaps not touch qubes.SuspendPre / qubes.SuspendPost at all to avoid breakage. And add an additional

  • qubes.SuspendPostAll
  • qubes.SuspendPreAll

? Or would that be too unclean?

If so... Just wondering which would should run first...?

Member

adrelanos commented Mar 11, 2016

Perhaps not touch qubes.SuspendPre / qubes.SuspendPost at all to avoid breakage. And add an additional

  • qubes.SuspendPostAll
  • qubes.SuspendPreAll

? Or would that be too unclean?

If so... Just wondering which would should run first...?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

I think qubes.SuspendPostAll (running before qubes.SuspendPost') /qubes.SuspendPreAll(running afterqubes.SuspendPre) makes sense. Wondering about VM interface. What do you think about/etc/qubes/suspend-pre.dand/etc/qubes/suspend-post.d`? Some details needs to be worked out:

  • whether run script, or source them
  • all of them, or only *.sh, or all executable

I'd run them (not source) and only *.sh (to ignore *.dpkg-*, *.rpm*, editor backups etc).
@adrelanos any preference?

Member

marmarek commented Mar 15, 2016

I think qubes.SuspendPostAll (running before qubes.SuspendPost') /qubes.SuspendPreAll(running afterqubes.SuspendPre) makes sense. Wondering about VM interface. What do you think about/etc/qubes/suspend-pre.dand/etc/qubes/suspend-post.d`? Some details needs to be worked out:

  • whether run script, or source them
  • all of them, or only *.sh, or all executable

I'd run them (not source) and only *.sh (to ignore *.dpkg-*, *.rpm*, editor backups etc).
@adrelanos any preference?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 15, 2016

Member

Marek Marczykowski-Górecki:

I think qubes.SuspendPostAll (running before qubes.SuspendPost') /qubes.SuspendPreAll(running afterqubes.SuspendPre`) makes sense.

Ok.

Wondering about VM interface. What do you think about /etc/qubes/suspend-pre.d and /etc/qubes/suspend-post.d?

[1]
I think we should rather create a new ticket to implement
/etc/qubes-rpc.d to have a generic solution. There might be already,
there likely will be other qubes-rpc where one might wish to have
several handlers, right? Being invoked before/after the stock one. To
allow modifying the handlers without interfering with upstream Qubes
default qubes-rpc script upgrades. What do you think?

Some details needs to be worked out:

  • whether run script, or source them

Can you imagine situations where it's better to source them?

  • all of them, or only *.sh, or all executable

*.sh only. While users should still be free to use bash, python, etc.
(Which is a bit strange but I wouldn't know how it could be implemented
more correctly due to lack of examples.)

I'd run them (not source) and only *.sh

For now I also think running them makes more sense than sourceing.

(FYI: grub has both, a .d folder that is being executed and a .d
folder that is being sourceed. systemd also has a drop-in snippnett
folder to extend existing units and systemd unit files are being dropped
into a folder also.)

When we are being presented later with a compelling argument why we
additionally also sourceing we can still go for it. Related to [1].

(to ignore *.dpkg-*, *.rpm*, editor backups etc).

Very important indeed.

Member

adrelanos commented Mar 15, 2016

Marek Marczykowski-Górecki:

I think qubes.SuspendPostAll (running before qubes.SuspendPost') /qubes.SuspendPreAll(running afterqubes.SuspendPre`) makes sense.

Ok.

Wondering about VM interface. What do you think about /etc/qubes/suspend-pre.d and /etc/qubes/suspend-post.d?

[1]
I think we should rather create a new ticket to implement
/etc/qubes-rpc.d to have a generic solution. There might be already,
there likely will be other qubes-rpc where one might wish to have
several handlers, right? Being invoked before/after the stock one. To
allow modifying the handlers without interfering with upstream Qubes
default qubes-rpc script upgrades. What do you think?

Some details needs to be worked out:

  • whether run script, or source them

Can you imagine situations where it's better to source them?

  • all of them, or only *.sh, or all executable

*.sh only. While users should still be free to use bash, python, etc.
(Which is a bit strange but I wouldn't know how it could be implemented
more correctly due to lack of examples.)

I'd run them (not source) and only *.sh

For now I also think running them makes more sense than sourceing.

(FYI: grub has both, a .d folder that is being executed and a .d
folder that is being sourceed. systemd also has a drop-in snippnett
folder to extend existing units and systemd unit files are being dropped
into a folder also.)

When we are being presented later with a compelling argument why we
additionally also sourceing we can still go for it. Related to [1].

(to ignore *.dpkg-*, *.rpm*, editor backups etc).

Very important indeed.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

I think we should rather create a new ticket to implement /etc/qubes-rpc.d to have a generic solution. There might be already, there likely will be other qubes-rpc where one might wish to have several handlers, right? Being invoked before/after the stock one. To allow modifying the handlers without interfering with upstream Qubes default qubes-rpc script upgrades. What do you think?

Good idea. Worth a separate ticket. Not something I'm comfortable with changing in stable release...
Also, this may be the case where sourceing will makes sense - to set some env variables.

*.sh only.
For now I also think running them makes more sense than sourceing.

Ok.

Member

marmarek commented Mar 15, 2016

I think we should rather create a new ticket to implement /etc/qubes-rpc.d to have a generic solution. There might be already, there likely will be other qubes-rpc where one might wish to have several handlers, right? Being invoked before/after the stock one. To allow modifying the handlers without interfering with upstream Qubes default qubes-rpc script upgrades. What do you think?

Good idea. Worth a separate ticket. Not something I'm comfortable with changing in stable release...
Also, this may be the case where sourceing will makes sense - to set some env variables.

*.sh only.
For now I also think running them makes more sense than sourceing.

Ok.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

@adrelanos do you work on this? If not, I'll take care of it. In fact I have dom0 part ready to commit and starting working on VM part.

Member

marmarek commented Mar 15, 2016

@adrelanos do you work on this? If not, I'll take care of it. In fact I have dom0 part ready to commit and starting working on VM part.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 15, 2016

Member
Member

adrelanos commented Mar 15, 2016

marmarek added a commit to marmarek/qubes-core-admin-linux that referenced this issue Mar 15, 2016

pm-utils: call qubes.SuspendPreAll/qubes.SuspendPostAll services
Host suspend notification may be useful not only to driver domains. For
example Whonix needs to resync time after suspend.

Thanks @adrelanos for help.

Fixes QubesOS/qubes-issues#1663

marmarek added a commit to QubesOS/qubes-core-agent-linux that referenced this issue Mar 15, 2016

qubes.SuspendPreAll and qubes.SuspendPostAll services
Those services are called just before/after host suspend.

Thanks @adrelanos for help.
Fixes QubesOS/qubes-issues#1663

(cherry picked from commit 7301a89)
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

Automated announcement from builder-github

The package qubes-core-agent_3.1.15-1+deb8u1 has been pushed to the r3.1 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Mar 15, 2016

Automated announcement from builder-github

The package qubes-core-agent_3.1.15-1+deb8u1 has been pushed to the r3.1 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

Automated announcement from builder-github

The package qubes-core-agent_3.1.15-1+deb9u1 has been pushed to the r3.1 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Mar 15, 2016

Automated announcement from builder-github

The package qubes-core-agent_3.1.15-1+deb9u1 has been pushed to the r3.1 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.15-1.fc21 has been pushed to the r3.1 testing repository for the Fedora fc21 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

Member

marmarek commented Mar 15, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.15-1.fc21 has been pushed to the r3.1 testing repository for the Fedora fc21 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.15-1.fc22 has been pushed to the r3.1 testing repository for the Fedora fc22 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

Member

marmarek commented Mar 15, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.15-1.fc22 has been pushed to the r3.1 testing repository for the Fedora fc22 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.15-1.fc23 has been pushed to the r3.1 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

Member

marmarek commented Mar 15, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.15-1.fc23 has been pushed to the r3.1 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.1-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

Automated announcement from builder-github

The package qubes-core-dom0-linux-3.1.10-1.fc20 has been pushed to the r3.1 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Member

marmarek commented Mar 15, 2016

Automated announcement from builder-github

The package qubes-core-dom0-linux-3.1.10-1.fc20 has been pushed to the r3.1 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 15, 2016

Member

Automated announcement from builder-github

The package qubes-core-agent_3.1.15-1+deb7u1 has been pushed to the r3.1 testing repository for the Debian wheezy template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing wheezy-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Mar 15, 2016

Automated announcement from builder-github

The package qubes-core-agent_3.1.15-1+deb7u1 has been pushed to the r3.1 testing repository for the Debian wheezy template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing wheezy-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 16, 2016

Member

Good idea. Worth a separate ticket.

generic qubes qrexec rpc '.d' "/etc/qubes-rpc.d" drop-in folder:
#1844

Member

adrelanos commented Mar 16, 2016

Good idea. Worth a separate ticket.

generic qubes qrexec rpc '.d' "/etc/qubes-rpc.d" drop-in folder:
#1844

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 19, 2016

Member

This won't be triggered when using suspend / resume VM in QVMM?

From POV of the VM, Is suspend / resume in QVMM different from real host system suspend / resume?

Member

adrelanos commented Mar 19, 2016

This won't be triggered when using suspend / resume VM in QVMM?

From POV of the VM, Is suspend / resume in QVMM different from real host system suspend / resume?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 19, 2016

Member

This won't be triggered when using suspend / resume VM in QVMM?

No. Only on real host suspend/resume. It is probably possible to simulate all that (for example call those services manually).

From POV of the VM, Is suspend / resume in QVMM different from real host system suspend / resume?

Not really, but those scripts are called only on host suspend / resume, not VM suspend/resume.

Member

marmarek commented Mar 19, 2016

This won't be triggered when using suspend / resume VM in QVMM?

No. Only on real host suspend/resume. It is probably possible to simulate all that (for example call those services manually).

From POV of the VM, Is suspend / resume in QVMM different from real host system suspend / resume?

Not really, but those scripts are called only on host suspend / resume, not VM suspend/resume.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 19, 2016

Member

Created #1855 for that.

Member

adrelanos commented Mar 19, 2016

Created #1855 for that.

@clayt0nk

This comment has been minimized.

Show comment
Hide comment
@clayt0nk

clayt0nk Mar 22, 2016

Just tried it and so far it works great, solves my problem! Thanks guys. :)

Just tried it and so far it works great, solves my problem! Thanks guys. :)

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 19, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.16-1.fc21 has been pushed to the r3.1 stable repository for the Fedora fc21 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Apr 19, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.16-1.fc21 has been pushed to the r3.1 stable repository for the Fedora fc21 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 19, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.16-1.fc22 has been pushed to the r3.1 stable repository for the Fedora fc22 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Apr 19, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.16-1.fc22 has been pushed to the r3.1 stable repository for the Fedora fc22 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 19, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.16-1.fc23 has been pushed to the r3.1 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Member

marmarek commented Apr 19, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.1.16-1.fc23 has been pushed to the r3.1 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 19, 2016

Member

Automated announcement from builder-github

The package qubes-core-dom0-linux-3.1.10-1.fc20 has been pushed to the r3.1 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Member

marmarek commented Apr 19, 2016

Automated announcement from builder-github

The package qubes-core-dom0-linux-3.1.10-1.fc20 has been pushed to the r3.1 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 19, 2016

Member

Automated announcement from builder-github

The package qubes-core-agent_3.1.16-1+deb8u1 has been pushed to the r3.1 stable repository for the Debian jessie template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Apr 19, 2016

Automated announcement from builder-github

The package qubes-core-agent_3.1.16-1+deb8u1 has been pushed to the r3.1 stable repository for the Debian jessie template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 19, 2016

Member

Automated announcement from builder-github

The package qubes-core-agent_3.1.16-1+deb9u1 has been pushed to the r3.1 stable repository for the Debian stretch template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Apr 19, 2016

Automated announcement from builder-github

The package qubes-core-agent_3.1.16-1+deb9u1 has been pushed to the r3.1 stable repository for the Debian stretch template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 19, 2016

Member

Automated announcement from builder-github

The package qubes-core-agent_3.1.16-1+deb7u1 has been pushed to the r3.1 stable repository for the Debian wheezy template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented Apr 19, 2016

Automated announcement from builder-github

The package qubes-core-agent_3.1.16-1+deb7u1 has been pushed to the r3.1 stable repository for the Debian wheezy template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

marmarek added a commit to QubesOS/qubes-core-admin-linux that referenced this issue May 1, 2016

pm-utils: call qubes.SuspendPreAll/qubes.SuspendPostAll services
Host suspend notification may be useful not only to driver domains. For
example Whonix needs to resync time after suspend.

Thanks @adrelanos for help.

Fixes QubesOS/qubes-issues#1663

(cherry picked from commit e0c875a)

marmarek added a commit to QubesOS/qubes-core-agent-linux that referenced this issue May 1, 2016

qubes.SuspendPreAll and qubes.SuspendPostAll services
Those services are called just before/after host suspend.

Thanks @adrelanos for help.
Fixes QubesOS/qubes-issues#1663

(cherry picked from commit 7301a89)
(cherry picked from commit 7979e40)
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 1, 2016

Member

Automated announcement from builder-github

The package qubes-core-agent_3.0.26-1+deb8u1 has been pushed to the r3.0 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented May 1, 2016

Automated announcement from builder-github

The package qubes-core-agent_3.0.26-1+deb8u1 has been pushed to the r3.0 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 1, 2016

Member

Automated announcement from builder-github

The package qubes-core-agent_3.0.26-1+deb7u1 has been pushed to the r3.0 testing repository for the Debian wheezy template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing wheezy-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Member

marmarek commented May 1, 2016

Automated announcement from builder-github

The package qubes-core-agent_3.0.26-1+deb7u1 has been pushed to the r3.0 testing repository for the Debian wheezy template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing wheezy-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 2, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.0.26-1.fc20 has been pushed to the r3.0 testing repository for the Fedora fc20 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.0-current-testing

Changes included in this update

Member

marmarek commented May 2, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.0.26-1.fc20 has been pushed to the r3.0 testing repository for the Fedora fc20 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.0-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 2, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.0.26-1.fc21 has been pushed to the r3.0 testing repository for the Fedora fc21 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.0-current-testing

Changes included in this update

Member

marmarek commented May 2, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.0.26-1.fc21 has been pushed to the r3.0 testing repository for the Fedora fc21 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.0-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 2, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.0.26-1.fc22 has been pushed to the r3.0 testing repository for the Fedora fc22 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.0-current-testing

Changes included in this update

Member

marmarek commented May 2, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.0.26-1.fc22 has been pushed to the r3.0 testing repository for the Fedora fc22 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.0-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 2, 2016

Member

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.0.26-1.fc23 has been pushed to the r3.0 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.0-current-testing

Changes included in this update

Member

marmarek commented May 2, 2016

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-3.0.26-1.fc23 has been pushed to the r3.0 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r3.0-current-testing

Changes included in this update

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 2, 2016

Member

Automated announcement from builder-github

The package qubes-core-dom0-linux-3.0.20-1.fc20 has been pushed to the r3.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Member

marmarek commented May 2, 2016

Automated announcement from builder-github

The package qubes-core-dom0-linux-3.0.20-1.fc20 has been pushed to the r3.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment