Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upUsing username 'qubes' causes installer to hang #2793
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rustybird
May 6, 2017
It probably breaks if any username that's already in /etc/passwd or /etc/group (adm audio avahi-autoipd bin cdrom cgred daemon dbus dialout dip disk floppy ftp games geoclue halt input kmem lightdm lock lp mail man mem nobody operator polkitd pulse pulse-access pulse-rt qubes root rtkit saslauth shutdown slocate ssh_keys sync sys systemd-bus-proxy systemd-journal systemd-network systemd-resolve systemd-timesync tape tty unbound user users utempter utmp video wheel yumex) is entered?
Maybe the dom0 username should just be hardcoded to user, which would be consistent with VMs and get rid of a bit of friction in the installer. (I also find it aesthetically pleasing, somehow.)
rustybird
commented
May 6, 2017
•
|
It probably breaks if any username that's already in Maybe the dom0 username should just be hardcoded to |
andrewdavidwong
added
bug
C: installer
labels
May 6, 2017
andrewdavidwong
added this to the Release 3.2 updates milestone
May 6, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
anoadragon453
May 6, 2017
anoadragon453
commented
May 6, 2017
•
|
I too enjoy and currently use 'user' as the username as it makes
scrubbing logs much less hassle.
…On 05/06/2017 08:58 AM, Rusty Bird wrote:
It probably breaks if any username that's already in |/etc/passwd| (adm
avahi-autoipd bin daemon dbus ftp games geoclue halt lightdm lp mail
nobody operator polkitd pulse root rtkit saslauth shutdown sync
systemd-bus-proxy systemd-network systemd-resolve systemd-timesync
unbound) is entered?
Maybe the dom0 username should just be hardcoded to |user|, which would
be consistent with VMs and get rid of a bit of friction in the
installer. (I also find it aesthetically pleasing, somehow.)
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#2793 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ABR7mLfipDaOIrhWMrpl2DTf98reeqSWks5r3JiVgaJpZM4NSnpw>.
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
eduncan911
May 7, 2017
Hello! I originally reported this here:
https://groups.google.com/forum/#!msg/qubes-users/HH2rK1Yt9Jc/0fO-ujP7BQAJ
And thanks to @anoadragon453, he brought it over to this git issue.
--
Basically, two options on Expected Behavior:
A) With a new installation providing 'qubes' as the user name should produce a new install with 'qubes' as my username. (dom0 would use a user account instead).
or B) Installer should have Validation to not allow qubes on the username input.
Thanks!
eduncan911
commented
May 7, 2017
|
Hello! I originally reported this here: https://groups.google.com/forum/#!msg/qubes-users/HH2rK1Yt9Jc/0fO-ujP7BQAJ And thanks to @anoadragon453, he brought it over to this git issue. -- Basically, two options on Expected Behavior: A) With a new installation providing 'qubes' as the user name should produce a new install with 'qubes' as my username. ( or B) Installer should have Validation to not allow Thanks! |
anoadragon453 commentedMay 6, 2017
Qubes OS version (e.g.,
R3.2):R3.2
Expected behavior:
Actual behavior:
Steps to reproduce the behavior:
General notes: