New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using username 'qubes' causes installer to hang #2793

Open
anoadragon453 opened this Issue May 6, 2017 · 3 comments

Comments

Projects
None yet
4 participants
@anoadragon453

Qubes OS version (e.g., R3.2):

R3.2


Expected behavior:

  • With a new installation providing 'qubes' as the user name should produce a new install with 'qubes' as my username

Actual behavior:

  • The installer hangs at the end with a message similar to can't create user. user already exists.

Steps to reproduce the behavior:

  • New Qubes R3.2 install
  • At portion where you can set your username, enter 'qubes'
  • Installer will go til the end until it hangs, making install impossible

General notes:

  • The user should not be able to set 'qubes' as the username
  • Perhaps instead we should show a warning/error message if qubes is entered into the username box, and advise the user to change it
@rustybird

This comment has been minimized.

Show comment
Hide comment
@rustybird

rustybird May 6, 2017

It probably breaks if any username that's already in /etc/passwd or /etc/group (adm audio avahi-autoipd bin cdrom cgred daemon dbus dialout dip disk floppy ftp games geoclue halt input kmem lightdm lock lp mail man mem nobody operator polkitd pulse pulse-access pulse-rt qubes root rtkit saslauth shutdown slocate ssh_keys sync sys systemd-bus-proxy systemd-journal systemd-network systemd-resolve systemd-timesync tape tty unbound user users utempter utmp video wheel yumex) is entered?

Maybe the dom0 username should just be hardcoded to user, which would be consistent with VMs and get rid of a bit of friction in the installer. (I also find it aesthetically pleasing, somehow.)

rustybird commented May 6, 2017

It probably breaks if any username that's already in /etc/passwd or /etc/group (adm audio avahi-autoipd bin cdrom cgred daemon dbus dialout dip disk floppy ftp games geoclue halt input kmem lightdm lock lp mail man mem nobody operator polkitd pulse pulse-access pulse-rt qubes root rtkit saslauth shutdown slocate ssh_keys sync sys systemd-bus-proxy systemd-journal systemd-network systemd-resolve systemd-timesync tape tty unbound user users utempter utmp video wheel yumex) is entered?

Maybe the dom0 username should just be hardcoded to user, which would be consistent with VMs and get rid of a bit of friction in the installer. (I also find it aesthetically pleasing, somehow.)

@anoadragon453

This comment has been minimized.

Show comment
Hide comment
@anoadragon453

anoadragon453 May 6, 2017

anoadragon453 commented May 6, 2017

@eduncan911

This comment has been minimized.

Show comment
Hide comment
@eduncan911

eduncan911 May 7, 2017

Hello! I originally reported this here:

https://groups.google.com/forum/#!msg/qubes-users/HH2rK1Yt9Jc/0fO-ujP7BQAJ

And thanks to @anoadragon453, he brought it over to this git issue. 👍

--

Basically, two options on Expected Behavior:

A) With a new installation providing 'qubes' as the user name should produce a new install with 'qubes' as my username. (dom0 would use a user account instead).

or B) Installer should have Validation to not allow qubes on the username input.

Thanks!

Hello! I originally reported this here:

https://groups.google.com/forum/#!msg/qubes-users/HH2rK1Yt9Jc/0fO-ujP7BQAJ

And thanks to @anoadragon453, he brought it over to this git issue. 👍

--

Basically, two options on Expected Behavior:

A) With a new installation providing 'qubes' as the user name should produce a new install with 'qubes' as my username. (dom0 would use a user account instead).

or B) Installer should have Validation to not allow qubes on the username input.

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment