New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

qvm-run --dispvm doesn't work when invoked from dom0 #3012

Closed
rootkovska opened this Issue Aug 11, 2017 · 38 comments

Comments

@rootkovska
Member

rootkovska commented Aug 11, 2017

Qubes OS version (e.g., R3.2):

4.0-rc1, latest core 4.0.5 from current-testing

Steps to reproduce the behavior:

[user@dom0 ~] $ qvm-run --dispvm -- xterm

The error message from qubesd is that dom0 has no property default_dispvm.

If I then specify e.g. fedora-25 to be used as a template, this also fails, because the template does not have dispvm_allowed property, and it doesn't seem possible to set it via qvm-prefs.
If I specify some AppVM as a template (after manually changing dispvm_allowed to True), this step works.
Unfortunately, the startup fails, Actually it seems like the DispVM starts for a second, then dies. Some relevant message might be about the Storage Pool for the dispvm (qubes_dom0/vm-dispXYZ-root-snap) "being in use"...

@rootkovska rootkovska added this to the Release 4.0 milestone Aug 11, 2017

@rootkovska rootkovska changed the title from qvm-start --dispvm doesn't work when invoked from dom0 to qvm-run --dispvm doesn't work when invoked from dom0 Aug 11, 2017

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 11, 2017

Member

The error message from qubesd is that dom0 has no property default_dispvm.

This means you haven't update qubes-core-dom0: QubesOS/updates-status#176
Please update and try again (there are more fixes than just this).
Also, for GUI application I recommend updating template too, and use --service qubes.StartApp+xterm, instead of bare xterm (which use qubes.VMShell).

Member

marmarek commented Aug 11, 2017

The error message from qubesd is that dom0 has no property default_dispvm.

This means you haven't update qubes-core-dom0: QubesOS/updates-status#176
Please update and try again (there are more fixes than just this).
Also, for GUI application I recommend updating template too, and use --service qubes.StartApp+xterm, instead of bare xterm (which use qubes.VMShell).

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 11, 2017

Member

Or maybe, you don't have default_dispvm set? If it isn't set for dom0, it defaults to global property. But maybe you don't have it set either?

Member

marmarek commented Aug 11, 2017

Or maybe, you don't have default_dispvm set? If it isn't set for dom0, it defaults to global property. But maybe you don't have it set either?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 11, 2017

Member

(and of course you've meant qvm-run --dispvm, not qvm-start --dispvm. I've updated description)

Member

marmarek commented Aug 11, 2017

(and of course you've meant qvm-run --dispvm, not qvm-start --dispvm. I've updated description)

@3hhh

This comment has been minimized.

Show comment
Hide comment
@3hhh

3hhh Aug 12, 2017

@qvm-run --dispvm -- xterm:
I had also tested that yesterday afternoon and this morning with the latest updates:

This morning it did work on the 3rd try, the first two tries just resulted in qvm-run exiting without any comment and nothing happening.

I then tested qvm-run --dispvm --service qubes.StartApp+xterm which worked on the first try.

Afterwards I ran

qvm-run --dispvm fedora-25-dvm xterm
Running 'xterm' on $dispvm:fedora-25-dvm

$dispvm:fedora-25-dvm: Cannot execute qrexec-daemon!
Traceback (most recent call last):
  File "/usr/bin/qvm-run", line 9, in <module>
    load_entry_point('qubesadmin==4.0.5', 'console_scripts', 'qvm-run')()
  File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qvm_run.py", line 235, in main
    dispvm.cleanup()
  File "/usr/lib/python3.5/site-packages/qubesadmin/vm/__init__.py", line 376, in cleanup
    self.kill()
  File "/usr/lib/python3.5/site-packages/qubesadmin/vm/__init__.py", line 118, in kill
    self.qubesd_call(self._method_dest, 'admin.vm.Kill')
  File "/usr/lib/python3.5/site-packages/qubesadmin/base.py", line 69, in qubesd_call
    payload_stream)
  File "/usr/lib/python3.5/site-packages/qubesadmin/app.py", line 482, in qubesd_call
    return self._parse_qubesd_response(return_data)
  File "/usr/lib/python3.5/site-packages/qubesadmin/base.py", line 102, in _parse_qubesd_response
    raise exc_class(format_string, *args)
qubesadmin.exc.QubesVMNotStartedError: Domain is powered off: 'disp3011'

--> Doesn't look stable to me yet.

I also noticed a few less important bugs, but I'll create separate issues for that.

3hhh commented Aug 12, 2017

@qvm-run --dispvm -- xterm:
I had also tested that yesterday afternoon and this morning with the latest updates:

This morning it did work on the 3rd try, the first two tries just resulted in qvm-run exiting without any comment and nothing happening.

I then tested qvm-run --dispvm --service qubes.StartApp+xterm which worked on the first try.

Afterwards I ran

qvm-run --dispvm fedora-25-dvm xterm
Running 'xterm' on $dispvm:fedora-25-dvm

$dispvm:fedora-25-dvm: Cannot execute qrexec-daemon!
Traceback (most recent call last):
  File "/usr/bin/qvm-run", line 9, in <module>
    load_entry_point('qubesadmin==4.0.5', 'console_scripts', 'qvm-run')()
  File "/usr/lib/python3.5/site-packages/qubesadmin/tools/qvm_run.py", line 235, in main
    dispvm.cleanup()
  File "/usr/lib/python3.5/site-packages/qubesadmin/vm/__init__.py", line 376, in cleanup
    self.kill()
  File "/usr/lib/python3.5/site-packages/qubesadmin/vm/__init__.py", line 118, in kill
    self.qubesd_call(self._method_dest, 'admin.vm.Kill')
  File "/usr/lib/python3.5/site-packages/qubesadmin/base.py", line 69, in qubesd_call
    payload_stream)
  File "/usr/lib/python3.5/site-packages/qubesadmin/app.py", line 482, in qubesd_call
    return self._parse_qubesd_response(return_data)
  File "/usr/lib/python3.5/site-packages/qubesadmin/base.py", line 102, in _parse_qubesd_response
    raise exc_class(format_string, *args)
qubesadmin.exc.QubesVMNotStartedError: Domain is powered off: 'disp3011'

--> Doesn't look stable to me yet.

I also noticed a few less important bugs, but I'll create separate issues for that.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 12, 2017

Member

This morning it did work on the 3rd try, the first two tries just resulted in qvm-run exiting without any comment and nothing happening.

This is because qubes.VMShell service do not wait for X server startup in the VM - so, there is a race. If it starts xterm before X server, it fails. You can see that adding --pass-io option. qubes.StartApp service do wait for X server.

$dispvm:fedora-25-dvm: Cannot execute qrexec-daemon!

That's strange. Can you set debug to true on this VM and try again? You should get VM VGA output and see what's wrong with VM startup.

Member

marmarek commented Aug 12, 2017

This morning it did work on the 3rd try, the first two tries just resulted in qvm-run exiting without any comment and nothing happening.

This is because qubes.VMShell service do not wait for X server startup in the VM - so, there is a race. If it starts xterm before X server, it fails. You can see that adding --pass-io option. qubes.StartApp service do wait for X server.

$dispvm:fedora-25-dvm: Cannot execute qrexec-daemon!

That's strange. Can you set debug to true on this VM and try again? You should get VM VGA output and see what's wrong with VM startup.

@3hhh

This comment has been minimized.

Show comment
Hide comment
@3hhh

3hhh Aug 12, 2017

Out of ten tries I only had it once so far and unfortunately debug was off then...

Now however 2/3 tries of
qvm-run -p --dispvm --service qubes.StartApp+xterm
resulted in
xterm: Xt error: Can't open display: :0
i.e. there seems to be a racing condition still. In general it might be worth making "wait for X" another command-line flag.

3hhh commented Aug 12, 2017

Out of ten tries I only had it once so far and unfortunately debug was off then...

Now however 2/3 tries of
qvm-run -p --dispvm --service qubes.StartApp+xterm
resulted in
xterm: Xt error: Can't open display: :0
i.e. there seems to be a racing condition still. In general it might be worth making "wait for X" another command-line flag.

@3hhh

This comment has been minimized.

Show comment
Hide comment
@3hhh

3hhh Aug 12, 2017

What also happened multiple times with debug = true was that I got a totally black dispVM, unable to type and not starting xterm.
In the upper left corner I get

[
_

Before I could see from the scrolling down startup messages that it got past the login.
Pass-io just shows some missing font for xterm (also happens on other occasions).

3hhh commented Aug 12, 2017

What also happened multiple times with debug = true was that I got a totally black dispVM, unable to type and not starting xterm.
In the upper left corner I get

[
_

Before I could see from the scrolling down startup messages that it got past the login.
Pass-io just shows some missing font for xterm (also happens on other occasions).

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 12, 2017

Member

What also happened multiple times with debug = true was that I got a totally black dispVM,

By default configuration in Fedora X server switch to empty tty, even if not going to use it. Simply switch back to other tty, for example with ctrl+alt+left.

Now however 2/3 tries of
qvm-run -p --dispvm --service qubes.StartApp+xterm
resulted in
xterm: Xt error: Can't open display: :0

Do you have newest qubes-core-agent there (QubesOS/updates-status#188)?

i.e. there seems to be a racing condition still. In general it might be worth making "wait for X" another command-line flag.

There is one: --gui. But normally it require calling another qrexec service before actual command. And DispVM is automatically destroyed after qrexec service call finishes... So, this option in practice works only for non-Disposable VMs.

Member

marmarek commented Aug 12, 2017

What also happened multiple times with debug = true was that I got a totally black dispVM,

By default configuration in Fedora X server switch to empty tty, even if not going to use it. Simply switch back to other tty, for example with ctrl+alt+left.

Now however 2/3 tries of
qvm-run -p --dispvm --service qubes.StartApp+xterm
resulted in
xterm: Xt error: Can't open display: :0

Do you have newest qubes-core-agent there (QubesOS/updates-status#188)?

i.e. there seems to be a racing condition still. In general it might be worth making "wait for X" another command-line flag.

There is one: --gui. But normally it require calling another qrexec service before actual command. And DispVM is automatically destroyed after qrexec service call finishes... So, this option in practice works only for non-Disposable VMs.

@3hhh

This comment has been minimized.

Show comment
Hide comment
@3hhh

3hhh Aug 12, 2017

Do you have newest qubes-core-agent there (QubesOS/updates-status#188)?

Now I understand that previous comment...
No, I had not upgraded my template VM with the testing repo.

So now it worked 7/7 times or so without any of the aforementioned errors.

Totally my bad, sorry!

3hhh commented Aug 12, 2017

Do you have newest qubes-core-agent there (QubesOS/updates-status#188)?

Now I understand that previous comment...
No, I had not upgraded my template VM with the testing repo.

So now it worked 7/7 times or so without any of the aforementioned errors.

Totally my bad, sorry!

@3hhh

This comment has been minimized.

Show comment
Hide comment
@3hhh

3hhh Aug 18, 2017

@marmarek : qvm-run -p --dispvm --service qubes.StartApp+firefox seems to be indeed more reliable than qvm-run --dispvm -- firefox due to the waiting time for X. How can one pass arguments to the application with --service qubes.StartApp+firefox then though?

E.g. qvm-run -p --dispvm --service 'qubes.StartApp+firefox google.com' didn't work last time I tried (invalid service or something).

3hhh commented Aug 18, 2017

@marmarek : qvm-run -p --dispvm --service qubes.StartApp+firefox seems to be indeed more reliable than qvm-run --dispvm -- firefox due to the waiting time for X. How can one pass arguments to the application with --service qubes.StartApp+firefox then though?

E.g. qvm-run -p --dispvm --service 'qubes.StartApp+firefox google.com' didn't work last time I tried (invalid service or something).

@rootkovska

This comment has been minimized.

Show comment
Hide comment
@rootkovska

rootkovska Aug 23, 2017

Member

I still keep getting the same error about qubes_dom0/vm-disp{id}-root-snap being in used.

Member

rootkovska commented Aug 23, 2017

I still keep getting the same error about qubes_dom0/vm-disp{id}-root-snap being in used.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 25, 2017

Member

I still keep getting the same error about qubes_dom0/vm-disp{id}-root-snap being in used.

This problem is during DispVM cleanup, should not affect starting new DispVM.

As for qubes.StartApp - it do not allow passing an argument to application on purpose - this service is to start an application, without giving arbitrary command execution in the VM. Also, the service argument is not a command name, but a name of application (name of .desktop file in /usr/share/application, without .desktop extension - by coincidence it is the same for xterm and firefox).
The issue with original form is that qubes.VMShell service (the thing used without --service option) is not considered GUI service, so do not wait for X server startup. Unconditionally marking qubes.VMShell as GUI service IMO is a bad idea, because there are some use cases when GUI is not needed (for example downloading updates for dom0). And in Qubes 4.0 you can even choose to not start X server in a VM at all (set gui feature to false).

I see multiple possible solutions here:

  1. Introduce another service, qubes.VMShellWithGUI, which will wait for X server startup.
  2. Modify qvm-run tool to prepend wait for X server startup to the command, unless --nogui option is given (the command is already mangled before piping to qubes.VMShell, at least to add exit at the end).
  3. Repurpose qubes.VMShell service to be the one with GUI, then introduce another one, for example qubes.VMShellHeadless without GUI. And carefully modify all places that use it (in practice there should be very few such places).
Member

marmarek commented Aug 25, 2017

I still keep getting the same error about qubes_dom0/vm-disp{id}-root-snap being in used.

This problem is during DispVM cleanup, should not affect starting new DispVM.

As for qubes.StartApp - it do not allow passing an argument to application on purpose - this service is to start an application, without giving arbitrary command execution in the VM. Also, the service argument is not a command name, but a name of application (name of .desktop file in /usr/share/application, without .desktop extension - by coincidence it is the same for xterm and firefox).
The issue with original form is that qubes.VMShell service (the thing used without --service option) is not considered GUI service, so do not wait for X server startup. Unconditionally marking qubes.VMShell as GUI service IMO is a bad idea, because there are some use cases when GUI is not needed (for example downloading updates for dom0). And in Qubes 4.0 you can even choose to not start X server in a VM at all (set gui feature to false).

I see multiple possible solutions here:

  1. Introduce another service, qubes.VMShellWithGUI, which will wait for X server startup.
  2. Modify qvm-run tool to prepend wait for X server startup to the command, unless --nogui option is given (the command is already mangled before piping to qubes.VMShell, at least to add exit at the end).
  3. Repurpose qubes.VMShell service to be the one with GUI, then introduce another one, for example qubes.VMShellHeadless without GUI. And carefully modify all places that use it (in practice there should be very few such places).
@rootkovska

This comment has been minimized.

Show comment
Hide comment
@rootkovska

rootkovska Sep 18, 2017

Member

This still doesn't work.

Member

rootkovska commented Sep 18, 2017

This still doesn't work.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 18, 2017

Member

What exact command have you used?

Member

marmarek commented Sep 18, 2017

What exact command have you used?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 18, 2017

Member

Also, see #3012 (comment) for possible solutions. Personally I like the third one.

Member

marmarek commented Sep 18, 2017

Also, see #3012 (comment) for possible solutions. Personally I like the third one.

@rootkovska

This comment has been minimized.

Show comment
Hide comment
@rootkovska

rootkovska Sep 18, 2017

Member

What exact command have you used?

qvm-run --service qubes.StartApp+xterm --dispvm

(BTW, it seems the argparse doesn't accept if I specify the arguments in a different order?)

Member

rootkovska commented Sep 18, 2017

What exact command have you used?

qvm-run --service qubes.StartApp+xterm --dispvm

(BTW, it seems the argparse doesn't accept if I specify the arguments in a different order?)

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 18, 2017

Member

qvm-run --service qubes.StartApp+xterm --dispvm

It works for me... What error have you got? Did you installed template updates (from testing)?

(BTW, it seems the argparse doesn't accept if I specify the arguments in a different order?)

Yes, argparse is more strict about ordering than previous, deprecated version (optparse).
Technically, the correct order is qvm-run --dispvm --service qubes.StartApp+xterm. --dispvm accepts optional argument - a name of base VM, so if you use qvm-run --service --dispvm qubes.StartApp+xterm, it will get qubes.StartApp+xterm as a base VM name...

Member

marmarek commented Sep 18, 2017

qvm-run --service qubes.StartApp+xterm --dispvm

It works for me... What error have you got? Did you installed template updates (from testing)?

(BTW, it seems the argparse doesn't accept if I specify the arguments in a different order?)

Yes, argparse is more strict about ordering than previous, deprecated version (optparse).
Technically, the correct order is qvm-run --dispvm --service qubes.StartApp+xterm. --dispvm accepts optional argument - a name of base VM, so if you use qvm-run --service --dispvm qubes.StartApp+xterm, it will get qubes.StartApp+xterm as a base VM name...

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 19, 2017

Member

Interesting, it works better when you add -p option. I have no idea why, yet.

Member

marmarek commented Sep 19, 2017

Interesting, it works better when you add -p option. I have no idea why, yet.

@jpouellet

This comment has been minimized.

Show comment
Hide comment
@jpouellet

jpouellet Dec 12, 2017

Contributor
  1. Modify qvm-run tool to prepend wait for X server startup to the command, unless --nogui option is given (the command is already mangled before piping to qubes.VMShell, at least to add exit at the end).
  2. Repurpose qubes.VMShell service to be the one with GUI, then introduce another one, for example qubes.VMShellHeadless without GUI. And carefully modify all places that use it (in practice there should be very few such places).

From just reading the command line help / man page, I expected that that qvm-run --gui would wait for the X session to be up before running my command.

Requiring users to be aware of qubes.VMShell* and X-related side-effects makes the command line (specifically --gui without --service) feel broken IMO.

My expectations as a user would be solution 2, or solution 3 iff --gui / --nogui controls which of qubes.VMShell / qubes.VMShellHeadless the positional command string is passed to.

Contributor

jpouellet commented Dec 12, 2017

  1. Modify qvm-run tool to prepend wait for X server startup to the command, unless --nogui option is given (the command is already mangled before piping to qubes.VMShell, at least to add exit at the end).
  2. Repurpose qubes.VMShell service to be the one with GUI, then introduce another one, for example qubes.VMShellHeadless without GUI. And carefully modify all places that use it (in practice there should be very few such places).

From just reading the command line help / man page, I expected that that qvm-run --gui would wait for the X session to be up before running my command.

Requiring users to be aware of qubes.VMShell* and X-related side-effects makes the command line (specifically --gui without --service) feel broken IMO.

My expectations as a user would be solution 2, or solution 3 iff --gui / --nogui controls which of qubes.VMShell / qubes.VMShellHeadless the positional command string is passed to.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Jan 12, 2018

Member

Interesting, it works better when you add -p option. I have no idea why, yet.

Found it: it's about qrexec data connection timeout, which is 5s by default. Waiting for session is included in that timeout, so on slower machines it didn't had a chance.

Member

marmarek commented Jan 12, 2018

Interesting, it works better when you add -p option. I have no idea why, yet.

Found it: it's about qrexec data connection timeout, which is 5s by default. Waiting for session is included in that timeout, so on slower machines it didn't had a chance.

marmarek added a commit to marmarek/qubes-core-admin-client that referenced this issue Jan 12, 2018

vm/DispVM: use 'qrexec_timeout' also for call connection timeout
When calling a service in DispVM, the connection is established only
after session is ready (if required for given service). qrexec-client by
default use 5s here, which is too low depending on hardware. Use
'qrexec_timeout' property here for DispVM case.

Fixes QubesOS/qubes-issues#3012

marmarek added a commit to marmarek/qubes-core-admin-client that referenced this issue Jan 12, 2018

tools/qvm-run: prepend qubes.WaitForSession call when calling into ne…
…w DispVM

DispVM is one-call-only by design, so cannot call qubes.WaitForSession
separately there. Instead, prefix the call into qubes.VMShell call. We
mangle the command already anyway, so it shouldn't be any worse.

Fixes QubesOS/qubes-issues#3012

@marmarek marmarek referenced this issue in QubesOS/qubes-core-admin-client Jan 12, 2018

Closed

Fix qvm-run --dispvm some-command #49

rustybird added a commit to rustybird/qubes-core-admin-client that referenced this issue Jan 14, 2018

vm/DispVM: use 'qrexec_timeout' also for call connection timeout
When calling a service in DispVM, the connection is established only
after session is ready (if required for given service). qrexec-client by
default use 5s here, which is too low depending on hardware. Use
'qrexec_timeout' property here for DispVM case.

Fixes QubesOS/qubes-issues#3012

rustybird added a commit to rustybird/qubes-core-admin-client that referenced this issue Jan 14, 2018

qvm-run: wait for X11 in --dispvm --gui case
'qvm-run --dispvm' cannot easily make a separate qubes.WaitForSession
call. Instead, if --gui is active, pass the new WaitForSession argument
to qubes.VMShell, which will do the equivalent.

The unit tests have been copied (in slightly adapted form) from commit
marmarek@a620f02

Fixes QubesOS/qubes-issues#3012
Closes QubesOS/qubes-core-admin-client#49
@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jan 18, 2018

Automated announcement from builder-github

The package core-agent-linux has been pushed to the r4.0 testing repository for the CentOS centos7 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

Automated announcement from builder-github

The package core-agent-linux has been pushed to the r4.0 testing repository for the CentOS centos7 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jan 18, 2018

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-4.0.17-1.fc26 has been pushed to the r4.0 testing repository for the Fedora fc26 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

Automated announcement from builder-github

The package python2-dnf-plugins-qubes-hooks-4.0.17-1.fc26 has been pushed to the r4.0 testing repository for the Fedora fc26 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jan 18, 2018

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status Jan 18, 2018

Closed

core-admin-client v4.0.13 (r4.0) #364

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jan 18, 2018

Automated announcement from builder-github

The package qubes-core-admin-client_4.0.13-1+deb8u1 has been pushed to the r4.0 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Automated announcement from builder-github

The package qubes-core-admin-client_4.0.13-1+deb8u1 has been pushed to the r4.0 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jan 18, 2018

Automated announcement from builder-github

The package qubes-core-admin-client_4.0.13-1+deb9u1 has been pushed to the r4.0 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Automated announcement from builder-github

The package qubes-core-admin-client_4.0.13-1+deb9u1 has been pushed to the r4.0 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jan 18, 2018

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc24 has been pushed to the r4.0 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc24 has been pushed to the r4.0 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jan 18, 2018

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc25 has been pushed to the r4.0 testing repository for the Fedora fc25 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc25 has been pushed to the r4.0 testing repository for the Fedora fc25 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Jan 18, 2018

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc26 has been pushed to the r4.0 testing repository for the Fedora fc26 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc26 has been pushed to the r4.0 testing repository for the Fedora fc26 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.0-current-testing

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Feb 6, 2018

Automated announcement from builder-github

The package qubes-core-agent_4.0.20-1+deb9u1 has been pushed to the r4.0 stable repository for the Debian template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Automated announcement from builder-github

The package qubes-core-agent_4.0.20-1+deb9u1 has been pushed to the r4.0 stable repository for the Debian template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Feb 6, 2018

Automated announcement from builder-github

The component core-admin-client (including package python2-qubesadmin-4.0.13-0.1.fc26) has been pushed to the r4.0 stable repository for the Fedora template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Automated announcement from builder-github

The component core-admin-client (including package python2-qubesadmin-4.0.13-0.1.fc26) has been pushed to the r4.0 stable repository for the Fedora template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Feb 6, 2018

Automated announcement from builder-github

The component core-agent-linux (including package python2-dnf-plugins-qubes-hooks-4.0.20-1.fc26) has been pushed to the r4.0 stable repository for the Fedora template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Automated announcement from builder-github

The component core-agent-linux (including package python2-dnf-plugins-qubes-hooks-4.0.20-1.fc26) has been pushed to the r4.0 stable repository for the Fedora template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Feb 6, 2018

Automated announcement from builder-github

The package core-agent-linux has been pushed to the r4.0 stable repository for the Fedora centos7 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

Automated announcement from builder-github

The package core-agent-linux has been pushed to the r4.0 stable repository for the Fedora centos7 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Feb 6, 2018

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Automated announcement from builder-github

The package python2-qubesadmin-4.0.13-0.1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Feb 12, 2018

Automated announcement from builder-github

The package qubes-core-admin-client_4.0.13-1+deb9u1 has been pushed to the r4.0 stable repository for the Debian template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Automated announcement from builder-github

The package qubes-core-admin-client_4.0.13-1+deb9u1 has been pushed to the r4.0 stable repository for the Debian template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment