New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add meta-packages for installing Qubes related packages in VMs #2572

Closed
marmarek opened this Issue Jan 12, 2017 · 24 comments

Comments

Projects
None yet
6 participants
@marmarek
Member

marmarek commented Jan 12, 2017

Currently builder plugins have hardcoded list of packages to install in templates and additional packages are installed as dependencies of qubes-core-agent/qubes-core-vm package. This is sub optimal for various reasons:

  1. Makes hard for builder plugins to support multiple Qubes versions at the same time (for example builder-debian master branch currently can't build R3.1 template, because qubes-mgmt-salt-vm-connector package isn't available there)
  2. Unrelated packages are pulled in as dependencies for qubes-core-agent, which make it hard to remove them - for example to make minimal template (for Fedora minimal template we have "stub" package to install instead of some "required" packages, which is really awful hack)

The second point additionally would require splitting qubes-core-agent package as a next step. But lets start with something.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 12, 2017

Member

@adrelanos any recommendations here? I see Whonix have https://github.com/Whonix/anon-meta-packages
I think we need just two packages:

  • qubes-meta-required
  • qubes-meta-recommended

(or maybe different names? like qubes-vm-required?)

Member

marmarek commented Jan 12, 2017

@adrelanos any recommendations here? I see Whonix have https://github.com/Whonix/anon-meta-packages
I think we need just two packages:

  • qubes-meta-required
  • qubes-meta-recommended

(or maybe different names? like qubes-vm-required?)

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jan 13, 2017

Member
  • qubes-dom0-dependencies
  • qubes-dom0-recommended
  • qubes-vm-dependencies
  • qubes-vm-recommended
  • And also a package that depends on both of them, qubes-dom0 / qubes-vm?

There is one major issue with meta packages in Debian. There is no such thing as weak dependencies in Debian.

It depends on which packages end up in status "manually installed". Let's say qubes-vm has status "manually installed" and qubes-vm-required not. Once users remove some package that is listed as dependency of qubes-vm-recommended, it will remove qubes-dom0-recommended. So far so good. But it would also remove qubes-vm. And then qubes-vm-required would not have status "manually installed". During the next run of apt-get autoremove that package and all packages it depends on would be uninstalled and thereby breaking Qubes.

This mess is described a bit more in detail here:
https://www.whonix.org/wiki/Whonix_Debian_Packages

Member

adrelanos commented Jan 13, 2017

  • qubes-dom0-dependencies
  • qubes-dom0-recommended
  • qubes-vm-dependencies
  • qubes-vm-recommended
  • And also a package that depends on both of them, qubes-dom0 / qubes-vm?

There is one major issue with meta packages in Debian. There is no such thing as weak dependencies in Debian.

It depends on which packages end up in status "manually installed". Let's say qubes-vm has status "manually installed" and qubes-vm-required not. Once users remove some package that is listed as dependency of qubes-vm-recommended, it will remove qubes-dom0-recommended. So far so good. But it would also remove qubes-vm. And then qubes-vm-required would not have status "manually installed". During the next run of apt-get autoremove that package and all packages it depends on would be uninstalled and thereby breaking Qubes.

This mess is described a bit more in detail here:
https://www.whonix.org/wiki/Whonix_Debian_Packages

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 13, 2017

Member

What about using Recommends: or Suggests: dependencies?
Recently something similar was introduced in Fedora.
Anyway, this is partially the reason why I've listed only -recommended and -required (or -dependencies), without meta package over them - to install both of them by template builder/installer so both will have status "manually installed" and will mitigate this problem. And probably for minimal template, only -dependencies will be installed.

Member

marmarek commented Jan 13, 2017

What about using Recommends: or Suggests: dependencies?
Recently something similar was introduced in Fedora.
Anyway, this is partially the reason why I've listed only -recommended and -required (or -dependencies), without meta package over them - to install both of them by template builder/installer so both will have status "manually installed" and will mitigate this problem. And probably for minimal template, only -dependencies will be installed.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jan 13, 2017

Member
Member

adrelanos commented Jan 13, 2017

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 13, 2017

Member
Member

marmarek commented Jan 13, 2017

@unman

This comment has been minimized.

Show comment
Hide comment
@unman

unman Mar 2, 2017

Member

@adrelanos It's true that apt-get is not good at keeping track of, and working with, dependency and recommend changes. That's why it's generally better to use apt or aptitude which do do the right thing. In fact promoting the use of these tools, particularly aptitude, would, I think, resolve all the issues that you raise, particularly "the user won't notice a thing.".
Of course, just because it's displayed, doesn't mean the user will notice, but that's a separate issue.
Using aptitude will definitely resolve the "inconsistent results" issue you raise about using recommends.

All of which is a long winded approach to saying that using "Recommends" would be a workable solution here imo. Does that work the same way in Fedora?

Looking back at the early discussion of packaging it seems to me that many of the decisions (eg inclusion of pulse audio as dependency) were made to provide the simplest user experience, and to avoid users installing Qubes with no sound. That imperative has changed, and so the rationale for including packages as dependencies has gone.

Member

unman commented Mar 2, 2017

@adrelanos It's true that apt-get is not good at keeping track of, and working with, dependency and recommend changes. That's why it's generally better to use apt or aptitude which do do the right thing. In fact promoting the use of these tools, particularly aptitude, would, I think, resolve all the issues that you raise, particularly "the user won't notice a thing.".
Of course, just because it's displayed, doesn't mean the user will notice, but that's a separate issue.
Using aptitude will definitely resolve the "inconsistent results" issue you raise about using recommends.

All of which is a long winded approach to saying that using "Recommends" would be a workable solution here imo. Does that work the same way in Fedora?

Looking back at the early discussion of packaging it seems to me that many of the decisions (eg inclusion of pulse audio as dependency) were made to provide the simplest user experience, and to avoid users installing Qubes with no sound. That imperative has changed, and so the rationale for including packages as dependencies has gone.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Mar 2, 2017

Member
Member

adrelanos commented Mar 2, 2017

@unman

This comment has been minimized.

Show comment
Hide comment
@unman

unman Mar 2, 2017

Member

Dependency tracking works flawless with apt-get. There is no way to miss a 'Depends:' package during upgrades.

But it's far easier to resolve dependency hell with aptitude. And it resolves the issues you complain of with recommends, which is the point here.

apt? Looks pretty certain, that they are just different front-ends and sharing the same backend for dependency resolving etc.

Yes, they are all different front-ends - I'm not sure what your point is. apt is the most recommended user front end, aptitude the most versatile.

Anyway, I don't want to get in to religious wars about this. For most users, using aptitude (or some other high level tool), will avoid the problems you point to re use of "recommends", and I suggest that's the way we should go.

@marmarek Does the Fedora usage you refer to earlier work in the same way as Debian?

Member

unman commented Mar 2, 2017

Dependency tracking works flawless with apt-get. There is no way to miss a 'Depends:' package during upgrades.

But it's far easier to resolve dependency hell with aptitude. And it resolves the issues you complain of with recommends, which is the point here.

apt? Looks pretty certain, that they are just different front-ends and sharing the same backend for dependency resolving etc.

Yes, they are all different front-ends - I'm not sure what your point is. apt is the most recommended user front end, aptitude the most versatile.

Anyway, I don't want to get in to religious wars about this. For most users, using aptitude (or some other high level tool), will avoid the problems you point to re use of "recommends", and I suggest that's the way we should go.

@marmarek Does the Fedora usage you refer to earlier work in the same way as Debian?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 2, 2017

Member

Fedora got Recommends: rather recently - Fedora >= 24. I have not idea how it works yet...

Member

marmarek commented Mar 2, 2017

Fedora got Recommends: rather recently - Fedora >= 24. I have not idea how it works yet...

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 2, 2017

Member

@unman can you provide an example how apt or aptitude handle expanded Recommends:. Say package1 version 1.0 recommends package2. Then package1 version 2.0 recommends also package3. How does upgrade of package1 work in default setup (without any additional options etc)? Exact console output preferred.

Member

marmarek commented Mar 2, 2017

@unman can you provide an example how apt or aptitude handle expanded Recommends:. Say package1 version 1.0 recommends package2. Then package1 version 2.0 recommends also package3. How does upgrade of package1 work in default setup (without any additional options etc)? Exact console output preferred.

@unman

This comment has been minimized.

Show comment
Hide comment
@unman

unman Apr 14, 2017

Member

@andrewdavidwong Confirmed this issue still arises in 3.2 milestone.
I see it's waiting for input from me, so I'll pick that up later.

Member

unman commented Apr 14, 2017

@andrewdavidwong Confirmed this issue still arises in 3.2 milestone.
I see it's waiting for input from me, so I'll pick that up later.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Apr 23, 2017

Member

For Fedora VMs (and maybe dom0, as long as it's Fedora-based?) it looks like groups is what we need. From dnf manpage:

dnf [options] group upgrade <group-spec>...
Upgrades the packages from the group and upgrades the group itself. The latter comprises of installing pacakges that were added to the group by the distribution and removing packages that got removed from the group as far as they were not installed explicitly by the user.

In fact, Fedora template build process do use group to specify what packages should be installed. But that information isn't populated into package repository.

Member

marmarek commented Apr 23, 2017

For Fedora VMs (and maybe dom0, as long as it's Fedora-based?) it looks like groups is what we need. From dnf manpage:

dnf [options] group upgrade <group-spec>...
Upgrades the packages from the group and upgrades the group itself. The latter comprises of installing pacakges that were added to the group by the distribution and removing packages that got removed from the group as far as they were not installed explicitly by the user.

In fact, Fedora template build process do use group to specify what packages should be installed. But that information isn't populated into package repository.

marmarek added a commit to marmarek/qubes-linux-yum that referenced this issue Apr 23, 2017

Add groups definitions (comps.xml) to R3.2 repository
This is exact copy of what is used during build process:
 - comps-vm.xml - builder-fedora/comps-qubes-template.xml
 - comps-dom0.xml - installer-qubes-os/conf/comps-qubes.xml

QubesOS/qubes-issues#2572
@jpouellet

This comment has been minimized.

Show comment
Hide comment
@jpouellet

jpouellet Apr 24, 2017

Contributor

Cross-referencing for easier tracking:

Note that dom0 packages may benefit from an equivalent meta package as well. Selecting only the top-level qubes metapackage in the installer and letting everything else be pulled in automatically as a dependency might perhaps be a large part of the solution to #2742.

Contributor

jpouellet commented Apr 24, 2017

Cross-referencing for easier tracking:

Note that dom0 packages may benefit from an equivalent meta package as well. Selecting only the top-level qubes metapackage in the installer and letting everything else be pulled in automatically as a dependency might perhaps be a large part of the solution to #2742.

marmarek added a commit to marmarek/qubes-meta-packages that referenced this issue May 30, 2017

Initial implementation of meta-packages
This is based on Qubes 3.2, doesn't really add new packages.

Fixes QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/qubes-meta-packages that referenced this issue May 30, 2017

Adjust for package split in Qubes 4.0
qubes-core-agent and qubes-gui-agent were split into multiple packages.
Keep the base on in -dependencies meta-packages, add others into
--recommended.

Fixes QubesOS/qubes-issues#2572
QubesOS/qubes-issues#2771

marmarek added a commit to QubesOS/qubes-meta-packages that referenced this issue May 30, 2017

rpm: fix package names in Fedora
In Qubes 3.2 vm packages are *-vm, not *-agent.

QubesOS/qubes-issues#2572
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 30, 2017

Member

Meta-packages implemented here: https://github.com/QubesOS/qubes-meta-packages
For now only for VM.

Member

marmarek commented May 30, 2017

Meta-packages implemented here: https://github.com/QubesOS/qubes-meta-packages
For now only for VM.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek May 30, 2017

Member

@adrelanos this ticket (and #2771) require some coordination with Whonix.

See package split outcome: QubesOS/qubes-meta-packages@3d5b0aa
Since Whonix by default do not install Recommended: packages, none of them will be installed in Whonix - so for example no dom0 updates handling, and no updates proxy.
Meta packages linked above are Qubes-version specific, but I'm not sure how to handle this at Whonix side to support both Qubes 3.2 and Qubes 4.0. If that would help, we can add another meta-package with something between full and minimal one.

Member

marmarek commented May 30, 2017

@adrelanos this ticket (and #2771) require some coordination with Whonix.

See package split outcome: QubesOS/qubes-meta-packages@3d5b0aa
Since Whonix by default do not install Recommended: packages, none of them will be installed in Whonix - so for example no dom0 updates handling, and no updates proxy.
Meta packages linked above are Qubes-version specific, but I'm not sure how to handle this at Whonix side to support both Qubes 3.2 and Qubes 4.0. If that would help, we can add another meta-package with something between full and minimal one.

marmarek added a commit to marmarek/qubes-builder that referenced this issue May 30, 2017

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status May 30, 2017

Closed

meta-packages v3.2.1 (r3.2) #63

marmarek added a commit to marmarek/qubes-meta-packages that referenced this issue May 31, 2017

Add more required/recommended packages
Based on default list in template builder scripts.

QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/qubes-builder-rpm that referenced this issue May 31, 2017

template: use meta-packages
Even though groups are handled quite well on Fedora, in practice it
doesn't work because handling groups (especially updating) require
additional little known commands.
So, still have groups defined, but reference meta-packages from them.

QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/qubes-builder-rpm that referenced this issue May 31, 2017

marmarek added a commit to marmarek/old-qubes-core-agent-linux that referenced this issue May 31, 2017

rpm: drop dependency on desktop-notification-daemon
It should really be in template builder script, or better: meta-package.

QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/qubes-meta-packages that referenced this issue May 31, 2017

rpm: actually build meta packages
rpmbuild do not output .rpm file if .spec file have no (even empty)
matching %files section.

QubesOS/qubes-issues#2572

marmarek added a commit to QubesOS/qubes-meta-packages that referenced this issue May 31, 2017

Add more required/recommended packages
Based on default list in template builder scripts.

QubesOS/qubes-issues#2572

(cherry picked from commit eb85464)

marmarek added a commit to QubesOS/qubes-meta-packages that referenced this issue May 31, 2017

rpm: actually build meta packages
rpmbuild do not output .rpm file if .spec file have no (even empty)
matching %files section.

QubesOS/qubes-issues#2572

(cherry picked from commit aa9aa78)

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status May 31, 2017

Closed

meta-packages v3.2.2 (r3.2) #64

marmarek added a commit to marmarek/old-qubes-core-agent-linux that referenced this issue Jun 7, 2017

rpm: drop dependency on desktop-notification-daemon
It should really be in template builder script, or better: meta-package.

QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/qubes-builder-rpm that referenced this issue Jun 7, 2017

template: use meta-packages
Even though groups are handled quite well on Fedora, in practice it
doesn't work because handling groups (especially updating) require
additional little known commands.
Also, when installing a group with some missing packages, dnf ignore the
package (only report a warning), so even when build succeed the template
may be broken.

QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/qubes-builder-rpm that referenced this issue Jun 7, 2017

marmarek added a commit to marmarek/qubes-builder-rpm that referenced this issue Jun 7, 2017

template: move yum.q-o.o repo setup into appropriate script
Install packages from yum.qubes-os.org repo in 04_install_qubes.sh, not
necessary any group install

QubesOS/qubes-issues#2572
@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jun 8, 2017

Member

Whonix-Gateway should depend on:

  • qubes-vm-dependencies
  • qubes-core-agent-dom0-updates
  • qubes-core-agent-nautilus
  • qubes-core-agent-networking
  • Not depend on qubes-core-agent-network-manager since only useful in sys-net?

Whonix-Workstation should depend on:

  • qubes-vm-dependencies
  • pulseaudio-qubes
  • Not depend on qubes-core-agent-dom0-updates because sys-whonix will be UpdateVM?
  • qubes-core-agent-nautilus
  • qubes-core-agent-networking
  • Not depend on qubes-core-agent-network-manager since only useful in sys-net?
  • Not on qubes-gpg-split?
  • Not on qubes-img-converter?
  • Not on qubes-pdf-converter?
  • qubes-thunderbird

Right? Could you please create a list on what you think is useful for the gateway and workstation?

Will there still be qubes-core-agent-linux?

What would probably work is:

Depends: qubes-vm-dependencies | some-package-that-only-exists-in-Qubes-R3.2,

  • qubes-core-agent-dom0-updates | some-package-that-only-exists-in-Qubes-R3.2,

That means, if qubes-vm-dependencies is available (Qubes R4), depend on that. Otherwise depend on some-package-that-only-exists-in-Qubes-R3.2. And some-package-that-only-exists-in-Qubes-R3.2 could be qubes-core-agent-linux?

Member

adrelanos commented Jun 8, 2017

Whonix-Gateway should depend on:

  • qubes-vm-dependencies
  • qubes-core-agent-dom0-updates
  • qubes-core-agent-nautilus
  • qubes-core-agent-networking
  • Not depend on qubes-core-agent-network-manager since only useful in sys-net?

Whonix-Workstation should depend on:

  • qubes-vm-dependencies
  • pulseaudio-qubes
  • Not depend on qubes-core-agent-dom0-updates because sys-whonix will be UpdateVM?
  • qubes-core-agent-nautilus
  • qubes-core-agent-networking
  • Not depend on qubes-core-agent-network-manager since only useful in sys-net?
  • Not on qubes-gpg-split?
  • Not on qubes-img-converter?
  • Not on qubes-pdf-converter?
  • qubes-thunderbird

Right? Could you please create a list on what you think is useful for the gateway and workstation?

Will there still be qubes-core-agent-linux?

What would probably work is:

Depends: qubes-vm-dependencies | some-package-that-only-exists-in-Qubes-R3.2,

  • qubes-core-agent-dom0-updates | some-package-that-only-exists-in-Qubes-R3.2,

That means, if qubes-vm-dependencies is available (Qubes R4), depend on that. Otherwise depend on some-package-that-only-exists-in-Qubes-R3.2. And some-package-that-only-exists-in-Qubes-R3.2 could be qubes-core-agent-linux?

@h01ger

This comment has been minimized.

Show comment
Hide comment
@h01ger

h01ger Jun 8, 2017

h01ger commented Jun 8, 2017

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jun 8, 2017

Member

Whonix-Gateway should depend on:

qubes-vm-dependencies
qubes-core-agent-dom0-updates
qubes-core-agent-nautilus

Is this really needed in gateway?

qubes-core-agent-networking
Not depend on qubes-core-agent-network-manager since only useful in sys-net?

Whonix-Workstation should depend on:

qubes-vm-dependencies
pulseaudio-qubes
Not depend on qubes-core-agent-dom0-updates because sys-whonix will be UpdateVM?
qubes-core-agent-nautilus
qubes-core-agent-networking
Not depend on qubes-core-agent-network-manager since only useful in sys-net?
Not on qubes-gpg-split?
Not on qubes-img-converter?
Not on qubes-pdf-converter?
qubes-thunderbird

This looks ok.

Will there still be qubes-core-agent-linux?

You mean qubes-core-agent. Yes, only some (optional) parts were separated into separate packages.

Depends: qubes-vm-dependencies | some-package-that-only-exists-in-Qubes-R3.2,

Actually to make it easier, I've already uploaded qubes-vm-dependencies to R3.2 repository. It depends on qubes-core-agent and qubes-gui-agent, so this part looks the same on R3.2 and R4.0.
The problematic part is about other packages not existing in R3.2.

qubes-core-agent-dom0-updates | some-package-that-only-exists-in-Qubes-R3.2,

Yes, something like this. I don't think we have "some-package-that-only-exists-in-Qubes-R3.2" right now. But we can invent one. It can be empty package - since actual content needed [qubes-core-agent-dom0-updates] will be installed as part of qubes-core-agent.

Member

marmarek commented Jun 8, 2017

Whonix-Gateway should depend on:

qubes-vm-dependencies
qubes-core-agent-dom0-updates
qubes-core-agent-nautilus

Is this really needed in gateway?

qubes-core-agent-networking
Not depend on qubes-core-agent-network-manager since only useful in sys-net?

Whonix-Workstation should depend on:

qubes-vm-dependencies
pulseaudio-qubes
Not depend on qubes-core-agent-dom0-updates because sys-whonix will be UpdateVM?
qubes-core-agent-nautilus
qubes-core-agent-networking
Not depend on qubes-core-agent-network-manager since only useful in sys-net?
Not on qubes-gpg-split?
Not on qubes-img-converter?
Not on qubes-pdf-converter?
qubes-thunderbird

This looks ok.

Will there still be qubes-core-agent-linux?

You mean qubes-core-agent. Yes, only some (optional) parts were separated into separate packages.

Depends: qubes-vm-dependencies | some-package-that-only-exists-in-Qubes-R3.2,

Actually to make it easier, I've already uploaded qubes-vm-dependencies to R3.2 repository. It depends on qubes-core-agent and qubes-gui-agent, so this part looks the same on R3.2 and R4.0.
The problematic part is about other packages not existing in R3.2.

qubes-core-agent-dom0-updates | some-package-that-only-exists-in-Qubes-R3.2,

Yes, something like this. I don't think we have "some-package-that-only-exists-in-Qubes-R3.2" right now. But we can invent one. It can be empty package - since actual content needed [qubes-core-agent-dom0-updates] will be installed as part of qubes-core-agent.

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jun 8, 2017

Member
Member

adrelanos commented Jun 8, 2017

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jun 8, 2017

Member

Is this really needed in gateway?

I had in mind only the last one.

qubes-core-agent-nautilus: Maybe could be avoided if we just install dolphin and qubes-core-agent-dolphin? I however would suggest qubes-core-agent-dolphin, to have file manage integration, in case someone wants to send a file from Whonix-Gateway to another VM for debugging/backup purposes.

I mean does Whonix Gateway need a file manager at all?

Yes, something like this. I don't think we have "some-package-that-only-exists-in-Qubes-R3.2" right now. But we can invent one. It can be empty package - since actual content needed [qubes-core-agent-dom0-updates] will be installed as part of qubes-core-agent.

Sounds good.

Any idea for it's name? qubes-vm-r3.2?
Or, maybe it isn't needed at all, what about:

Depends: qubes-core-agent-dom0-updates | qubes-vm-dependencies (<< 4.0.0)
Member

marmarek commented Jun 8, 2017

Is this really needed in gateway?

I had in mind only the last one.

qubes-core-agent-nautilus: Maybe could be avoided if we just install dolphin and qubes-core-agent-dolphin? I however would suggest qubes-core-agent-dolphin, to have file manage integration, in case someone wants to send a file from Whonix-Gateway to another VM for debugging/backup purposes.

I mean does Whonix Gateway need a file manager at all?

Yes, something like this. I don't think we have "some-package-that-only-exists-in-Qubes-R3.2" right now. But we can invent one. It can be empty package - since actual content needed [qubes-core-agent-dom0-updates] will be installed as part of qubes-core-agent.

Sounds good.

Any idea for it's name? qubes-vm-r3.2?
Or, maybe it isn't needed at all, what about:

Depends: qubes-core-agent-dom0-updates | qubes-vm-dependencies (<< 4.0.0)
@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jun 8, 2017

Member
Member

adrelanos commented Jun 8, 2017

@h01ger

This comment has been minimized.

Show comment
Hide comment
@h01ger

h01ger Jun 8, 2017

h01ger commented Jun 8, 2017

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jun 8, 2017

Member
Member

adrelanos commented Jun 8, 2017

marmarek added a commit to marmarek/old-qubes-core-agent-linux that referenced this issue Jun 9, 2017

rpm: drop dependency on desktop-notification-daemon
It should really be in template builder script, or better: meta-package.

QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/old-qubes-core-agent-linux that referenced this issue Jun 9, 2017

debian: drop explicit dependency on sudo
qubes-core-agent itself do not require sudo to work.

QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/old-qubes-core-agent-linux that referenced this issue Jun 9, 2017

Add qubes.VMRootShell service
It is the same as qubes.VMShell - the actual difference is in qrexec
policy, which contains 'user=root' option.

QubesOS/qubes-issues#2572

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status Jun 9, 2017

Closed

core-agent-linux v4.0.0 (r4.0) #68

marmarek added a commit to marmarek/old-qubes-gui-agent-linux that referenced this issue Jun 9, 2017

rpm: add dependency on X server itself
On minimal template this package isn't required by anything else.

QubesOS/qubes-issues#2572

marmarek added a commit to marmarek/qubes-builder-debian that referenced this issue Jun 14, 2017

template: add nftables to installed package in stretch
Do not put this one into meta-packackage because it isn't available in
jessie.

QubesOS/qubes-issues#2572
@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Jun 29, 2017

Member

Whonix work tracked here.
sort out meta packages compatiblity with Qubes 3.2 and Qubes R4.0
https://phabricator.whonix.org/T697

Member

adrelanos commented Jun 29, 2017

Whonix work tracked here.
sort out meta packages compatiblity with Qubes 3.2 and Qubes R4.0
https://phabricator.whonix.org/T697

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment