Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upqubes-db does not work after qubes-db package upgrade, breaks qubes-whonix and tb-updater package #2497
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 7, 2016
Member
Looks like qubes-db service is stopped because it's being updated too. qubes-db service in VM can be started/stopped/restarted normally. Is it possible to order qubes-whonix config step (trigger step?) after qubes-db config step (so service will be back running)?
|
Looks like qubes-db service is stopped because it's being updated too. qubes-db service in VM can be started/stopped/restarted normally. Is it possible to order |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 7, 2016
Member
Dunno. Maybe a debian/control Depends: qubesdb would do? (Or perhaps even a Pre-Depends: is required.) qubes-whonix depending on qubesdb seems sane.
(https://www.debian.org/doc/debian-policy/ch-relationships.html)
Should I depend on qubesdb or qubesdb-vm package?
|
Dunno. Maybe a (https://www.debian.org/doc/debian-policy/ch-relationships.html) Should I depend on qubesdb or qubesdb-vm package? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 7, 2016
Member
|
Should I depend on qubesdb or qubesdb-vm package?
Service belongs to qubesdb-vm so that one.
…--
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 7, 2016
Member
This also breaks tb-updater during apt-get upgrades.
I wonder if debian/pkg-name.triggers could be somehow converted to systemd units. Because then we wouldn't have this issue. qubesdb already orders itself very early.
|
This also breaks tb-updater during apt-get upgrades. I wonder if |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 8, 2016
Member
Not sure about that. But even if possible, that would need to be asynchronous (to really wait until qubes-db is started again), which means update may still do something after apt-get finishes. apt-get -y dist-upgrade && poweroff will break things.
|
Not sure about that. But even if possible, that would need to be asynchronous (to really wait until qubes-db is started again), which means update may still do something after |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 8, 2016
Member
There are also various trigger configurations. But I cannot make head or tail of it.
http://man7.org/linux/man-pages/man5/deb-triggers.5.html
Posted two questions on debian-mentors. (Not yet in archive.)
Can debian/pkg.triggers wait for another package's systemd unit file?Convert debian/pkg-name.triggers into systemd unit file?
|
There are also various trigger configurations. But I cannot make head or tail of it. Posted two questions on debian-mentors. (Not yet in archive.)
|
andrewdavidwong
added
C: Whonix
task
labels
Dec 8, 2016
andrewdavidwong
added this to the Release 3.2 updates milestone
Dec 8, 2016
added a commit
to adrelanos/qubes-whonix
that referenced
this issue
Dec 9, 2016
added a commit
to adrelanos/qubes-whonix
that referenced
this issue
Dec 9, 2016
added a commit
to Whonix/qubes-whonix
that referenced
this issue
Dec 9, 2016
added a commit
to Whonix/qubes-whonix
that referenced
this issue
Dec 9, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 9, 2016
Member
qubes-whonix 5.7.2-1 was added to Whonix jessie-proposed-updates and testers repository.
|
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 10, 2016
Member
debian/control Depends: qubesd-vm fixed this. No longer breaking during apt-get dist-upgrade.
|
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
So, closeable? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 10, 2016
Member
follow up issue for Qubes:
#2509
Setting up qubes-core-agent (3.2.13-1+deb8u1) ...
[...]
Job for qubes-whonix-network.service failed. See 'systemctl status qubes-whonix-network.service' and 'journalctl -xn' for details.
Setting up libqubesdb (3.2.3-1+deb8u1) ...
Setting up qubesdb (3.2.3-1+deb8u1) ...
Setting up qubesdb-vm (3.2.3-1+deb8u1) ..
Not breaking anything [at the moment as that script stays as is], but not great, and looking bad. So desirable to fix. I guess it is happening during a "long" systemd start command during debian postinst so there is a good chance #2509 would fix it.
Setting up tb-updater (3:3.7.9-1) ...
Job for tb-updater-first-boot.service failed. See 'systemctl status tb-updater-first-boot.service' and 'journalctl -xn' for details.
Failed connect to local daemon
- tb-updater-first-boot.service failing is cosmetic.
- tb-updater updating Tor Browser in TemplateVM /var/cache/tb-binary is broken which is not critical (in AppVM Tor Browser updates still working; manual run of update-torbrowser in TempalteVM still working), but I want to fix that. Probably by no longer using qubesdb-read but rather /var/run/qubes/this-is-templatevm (qubesdb-read only as fallback for Qubes R3.1 compatibility). [Because tb-updater is a generic package, a dependency on qubesdb-vm would not be great.]
|
follow up issue for Qubes:
Not breaking anything [at the moment as that script stays as is], but not great, and looking bad. So desirable to fix. I guess it is happening during a "long" systemd start command during debian postinst so there is a good chance #2509 would fix it.
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 10, 2016
Member
Probably by no longer using qubesdb-read but rather /var/run/qubes/this-is-templatevm (qubesdb-read only as fallback for Qubes R3.1 compatibility). [Because tb-updater is a generic package, a dependency on qubesdb-vm would not be great.]
Yes, this would be a good solution. If you'd like to keep R3.1 compatibility, check for any /var/run/qubes/this-is-* - if there is none, fallback to qubesdb-read, otherwise proceed with /var/run/qubes/this-is-templatevm
Yes, this would be a good solution. If you'd like to keep R3.1 compatibility, check for any |
added a commit
to adrelanos/tb-updater
that referenced
this issue
Dec 14, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 14, 2016
Member
Yes.
tb-updater is designed not to break upgrading (exit 0) when run from postinst but not from chroot. However, the tool for detection of chroot, ischroot is buggy.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685034
Do we have a more reliable way to detect chroot?
|
Yes. tb-updater is designed not to break upgrading (exit 0) when run from postinst but not from chroot. However, the tool for detection of chroot, https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685034 Do we have a more reliable way to detect chroot? |
added a commit
to adrelanos/tb-updater
that referenced
this issue
Dec 14, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 16, 2016
Member
Various enhancements were backported and pushed to Whonix 13 stable branch.
https://github.com/Whonix/tb-updater/commits/Whonix13
This is now in Whonix jessie-proposed-updates and testers repository.
|
Various enhancements were backported and pushed to Whonix 13 stable branch. This is now in Whonix jessie-proposed-updates and testers repository. |
adrelanos
changed the title from
qubes-db does not work after qubes-db package upgrade, breaks qubes-whonix package
to
qubes-db does not work after qubes-db package upgrade, breaks qubes-whonix and tb-updater package
Dec 16, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Dec 18, 2016
Member
This is now also in Whonix jessie (stable) repository. Therefore, close please.
|
This is now also in Whonix jessie (stable) repository. Therefore, close please. |
adrelanos commentedDec 7, 2016
Impact: Not great but by rerunning
sudo apt-get dist-upgradethe upgrade process eventually completes.Workaround: I should probably push a Whonix stable upgrade to ignore qubes-db failures?
Long term: Will it be possible in future to restart qubes-db without failure?