Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upQubes 3.2.1 Build #3426
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 23, 2017
Preliminary build steps/notes, with line numbers on the file edits:
Qubes 3.2 build 22Dec2017
dom0:
sudo qubes-dom0-update qubes-template-fedora-25
[from https://www.qubes-os.org/doc/building-archlinux-template/]
Create standalone appVM from fedora 25 template named dev25
Set private storage to 60000MB, more if additional templates beyond default list
Increase CPU and RAM, disable memory balancing as desired
dev25:
sudo dnf upgrade
sudo reboot
sudo dnf install git createrepo rpm-build make wget rpmdevtools dialog rpm-sign gnupg dpkg-dev debootstrap python2-sh
gpg --keyserver pgp.mit.edu --recv-keys 0xDDFA1A3E36879494
Verify its fingerprint, set as ‘trusted’. This is described here https://www.qubes-os.org/doc/VerifyingSignatures.
gpg --edit-key 0x36879494
fpr
trust
5
q
wget https://keys.qubes-os.org/keys/qubes-developers-keys.asc
gpg --import qubes-developers-keys.asc
gpg --keyserver pgp.mit.edu --recv-keys 916B8D99C38EAF5E8ADC7A2A8D66066A2EEACCDA
git clone git://github.com/QubesOS/qubes-builder.git qubes-builder
mkdir qubes-builder/keyrings
mkdir qubes-builder/keyrings/git
cp .gnupg/pubring.gpg qubes-builder/keyrings/git/
cp .gnupg/trustdb.gpg qubes-builder/keyrings/git/
cd qubes-builder
git tag -v git describe
gedit example-configs/qubes-os-r3.2.conf
13: DISTS_VM = fc26 stretch
./setup
Select 3.2
Stable
No for a full build
Select builder-fedora, builder-debian, template-whonix, mgmt-salt
Y to download
Select fc26, stretch, whonix-gateway, whonix-workstation
make install-deps
make get-sources
gedit qubes-src/installer-qubes-os/conf/comps-qubes.xml
1164: qubes-template-fedora-26
1174: debian-9
1175: Debian 9 (stretch) template
1179: qubes-template-debian-9
1211: debian-9
gedit qubes-src/template-whonix/builder.conf
22: WHONIX_TBB_VERSION ?= 7.0.11
gedit qubes-src/installer-qubes-os/qubes-anaconda-addon/firstboot-qubes-text
107: qubes-prefs --set default-template 'fedora-26'
gedit qubes-src/installer-qubes-os/qubes-anaconda-addon/org_qubes_os_initial_setup/gui/spokes/qubes_os.py
230: self.default_template = 'fedora-26'
make qubes
make iso
awokd
commented
Dec 23, 2017
|
Preliminary build steps/notes, with line numbers on the file edits: Qubes 3.2 build 22Dec2017 dom0: sudo qubes-dom0-update qubes-template-fedora-25 [from https://www.qubes-os.org/doc/building-archlinux-template/] Create standalone appVM from fedora 25 template named dev25 dev25: sudo dnf upgrade gpg --keyserver pgp.mit.edu --recv-keys 0xDDFA1A3E36879494 git clone git://github.com/QubesOS/qubes-builder.git qubes-builder gedit example-configs/qubes-os-r3.2.conf ./setup make install-deps gedit qubes-src/installer-qubes-os/conf/comps-qubes.xml make qubes |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 23, 2017
MBR/AMD Test notes:
- Installer warning of pre-release/testing version
- MBR corrupted, fixed with https://groups.google.com/forum/?_escaped_fragment_=msg/qubes-users/TS1zfKZ7q8w/JQFkVF4xBgAJ#!msg/qubes-users/TS1zfKZ7q8w/JQFkVF4xBgAJ
- Stretch template MIA, need to fix group name in qubes-src/installer-qubes-os/conf/comps-qubes.xml and qubes-src/installer-qubes-os/conf/qubes-kickstart.cfg to "debian".
- Hypervisor command line on post-installed system is "placeholder", causing dom0 to take up most RAM
- No splash screen on boot
- All qubes based on Fedora 26 only have Thunderbird shortcut
- Passthrough appears to work
- Mapping USB block devices works
- Network and sys-whonix works
- Fedora DNF
salt requires dnf-utils, but that conflicts with the installed yum-utils
repaired with "dnf --allow-erasing --best upgrade"
I should be able to find this in the Fedora 26 list of required packages
awokd
commented
Dec 23, 2017
|
MBR/AMD Test notes:
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Dec 24, 2017
Member
This is a tracking issue for tasks related to Qubes 3.2.1. It was prompted by this thread:
https://groups.google.com/d/topic/qubes-users/KYl6FWhP_IQ/discussion
|
This is a tracking issue for tasks related to Qubes 3.2.1. It was prompted by this thread: |
andrewdavidwong
added
C: builder
task
labels
Dec 24, 2017
andrewdavidwong
added this to the Release 3.2 updates milestone
Dec 24, 2017
added a commit
to awokd/qubes-builder
that referenced
this issue
Dec 24, 2017
This was referenced Dec 24, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 24, 2017
UEFI/Intel specific test notes
- original 3.2 required use of Refind to install on this machine, this build does not
- still needed mapbs and noexitboot lines
awokd
commented
Dec 24, 2017
|
UEFI/Intel specific test notes
|
fepitre
referenced this issue
in QubesOS/qubes-builder-rpm
Dec 24, 2017
Merged
Fix broken dependency due to yum-utils in Fedora26/27 #15
added a commit
to awokd/qubes-installer-qubes-os
that referenced
this issue
Dec 25, 2017
awokd
referenced this issue
in QubesOS/qubes-installer-qubes-os
Dec 25, 2017
Closed
change default templates to debian-9 and fedora-26 #18
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 25, 2017
Resolved:
- missing Stretch template
- AMD/MBR "placeholder" hypervisor command line due to coreboot and #2553. Would cause no splash screen too. IMHO not a release blocker, but should test as is MBR install on non-coreboot.
- fepitre addressed DNF conflicts in Fedora template
Pending:
- test MBR install on non-coreboot
- Should QubesOS/qubes-installer-qubes-os@62cb1ca or any others from QubesOS/updates-status#117 be backported to 3.2.1?
- Stretch template updater broken. Might still be #2615. I remember some mailing list discussion too; will research.
- Fixed one bug but default shortcuts still missing, researching.
- I need to write more descriptive commit messages.
awokd
commented
Dec 25, 2017
|
Resolved:
Pending:
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 25, 2017
Member
Stretch template updater broken. Might still be #2615. I remember some mailing list discussion too; will research.
Maybe this helps?
QubesOS/updates-status#323
Should QubesOS/qubes-installer-qubes-os@62cb1ca or any others from QubesOS/updates-status#117 be backported to 3.2.1?
Most commits are specific to r4.0 or fc25 in dom0. But probably some applies (including the one you've pointed). I can't test it right now, but can prepare some pull request with selected commits.
Maybe this helps?
Most commits are specific to r4.0 or fc25 in dom0. But probably some applies (including the one you've pointed). I can't test it right now, but can prepare some pull request with selected commits. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 25, 2017
Stretch template issue seemed to have been caused by #2909 / #3229. Deleting /usr/lib/xorg/Xorg.wrap per the latter resolved it. dbus-x11 was already installed and I left /etc/X11/Xwrapper.config sitting there with allowed_users=console. May already be fixed somewhere in testing but I can't find code mentioning "Xorg.wrap".
awokd
commented
Dec 25, 2017
|
Stretch template issue seemed to have been caused by #2909 / #3229. Deleting /usr/lib/xorg/Xorg.wrap per the latter resolved it. dbus-x11 was already installed and I left /etc/X11/Xwrapper.config sitting there with allowed_users=console. May already be fixed somewhere in testing but I can't find code mentioning "Xorg.wrap". |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 25, 2017
Member
See gui-agent-linux changes I've pushed today, should address Xorg.wrap issue.
|
See gui-agent-linux changes I've pushed today, should address Xorg.wrap issue. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 26, 2017
On this last build, I got the following. I skipped "make builder" and continued with the remaining components and they seemed to work so hopefully it wasn't too critical. Not sure what I did differently this time.
$ make help
[...]
COMPONENT can be one of:
vmm-xen core-libvirt core-vchan-xen core-qubesdb linux-utils core-admin core-admin-linux core-agent-linux linux-kernel artwork gui-common gui-daemon gui-agent-linux gui-agent-xen-hvm-stubdom app-linux-split-gpg app-linux-tor app-thunderbird app-linux-pdf-converter app-linux-img-converter app-linux-input-proxy app-linux-usb-proxy app-yubikey mgmt-salt mgmt-salt-base mgmt-salt-base-topd mgmt-salt-base-config mgmt-salt-base-overrides mgmt-salt-dom0-qvm mgmt-salt-dom0-virtual-machines mgmt-salt-dom0-update meta-packages linux-template-builder desktop-linux-kde desktop-linux-xfce4 desktop-linux-i3 desktop-linux-awesome manager linux-pvgrub2 installer-qubes-os linux-yum linux-deb vmm-xen-windows-pvdrivers antievilmaid builder builder-fedora builder-debian template-whonix
You can also specify COMPONENTS="c1 c2 c3 ..." on command line
to operate on subset of components. Example: make COMPONENTS="gui" get-sources
$ make builder
make: *** No rule to make target 'builder'. Stop.
awokd
commented
Dec 26, 2017
|
On this last build, I got the following. I skipped "make builder" and continued with the remaining components and they seemed to work so hopefully it wasn't too critical. Not sure what I did differently this time. $ make help You can also specify COMPONENTS="c1 c2 c3 ..." on command line |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 26, 2017
Tested with full build and install on MBR.
Resolved:
- I applied the cherry-picked .diff directly to source code and coreboot install now works properly, with correct Xen command line construction
- fixed missing default application shortcuts, will PR my hack fix shortly
- starting applications in Debian Stretch template works now without messing with Xorg.wrap etc.
- going to ignore that "make builder" glitch for now
Pending:
- error on default template deployment "qubes-prefs --force-root default-template fedora-26 failed, no such option --force-root". Probably one of the backported ones, I will isolate.
- now that default application shortcuts are working properly, I need to update outdated ones in Stretch template
- will test again on MBR and UEFI once I figure out the --force-root item
awokd
commented
Dec 26, 2017
|
Tested with full build and install on MBR.
Pending:
|
awokd
referenced this issue
in QubesOS/qubes-linux-template-builder
Dec 26, 2017
Closed
Fix missing/incorrect default template appmenus #6
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 26, 2017
Member
error on default template deployment "qubes-prefs --force-root default-template fedora-26 failed, no such option --force-root". Probably one of the backported ones, I will isolate.
Yes, this one
Yes, this one |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 26, 2017
Yes, that was it. I rolled it back by hand because there was another .diff to that same file. Finally finished rebuilding the templates and installer and iso and:
awokd
commented
Dec 26, 2017
|
Yes, that was it. I rolled it back by hand because there was another .diff to that same file. Finally finished rebuilding the templates and installer and iso and: |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 26, 2017
MBR/AMD Test Results
Resolved:
- Default template deployment works correctly with zero errors
- USB Qube not marked as experimental, created DispVM by default
- Stretch applist whitelists working properly (will PR soon with my updated template whitelists)
Pending:
- test UEFI/Intel install
- cosmetic issue: on the very first boot after template deployment, the network indicator doesn't display. A reboot restores normal function, and it continues working after that for repeated reboots. Not sure if it's worth looking into.
awokd
commented
Dec 26, 2017
|
MBR/AMD Test Results
Pending:
|
awokd
referenced this issue
in QubesOS/qubes-builder-debian
Dec 26, 2017
Merged
Update Stretch appmenu whitelists #13
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 26, 2017
UEFI/Intel Test Results
Resolved:
- Same as MBR/AMD
- Performed a rescue mode edit of /boot/efi/EFI/qubes/xen.cfg. Would like to claim this was planned but it was because I forgot to add mapbs=1 and noexitboot=1 at the end of install!
awokd
commented
Dec 26, 2017
|
UEFI/Intel Test Results
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 26, 2017
Build Reproduction
- Follow ./setup steps above
- Apply PRs
QubesOS/qubes-builder#42
QubesOS/qubes-installer-qubes-os#18
QubesOS/qubes-linux-template-builder#6
QubesOS/qubes-builder-debian#13 - Apply QubesOS/qubes-installer-qubes-os#19 minus QubesOS/qubes-installer-qubes-os@1967168
- Fix Fedora 26 DNF conflict with QubesOS/qubes-builder-rpm#15
Caveats:
- network indicator missing on very first boot, full reboot or restarting sys-net restores it for good
- not sure if "No rule to make target 'builder'" was anything
- No package or file manager in default Stretch template
- Fedora 26 template testing was performed by editing builder-fedora/template_scripts/packages_fc26.list and replacing yum-utils with dnf-utils, not the above PR
awokd
commented
Dec 26, 2017
|
Build Reproduction
Caveats:
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 27, 2017
Looks like QubesOS/qubes-desktop-linux-xfce4@ae0ddcb#diff-e2c130c91a59d0c63daf7efc7a753d81 fixes the network indicator. Will attempt to backport to 3.2.1 and test.
awokd
commented
Dec 27, 2017
|
Looks like QubesOS/qubes-desktop-linux-xfce4@ae0ddcb#diff-e2c130c91a59d0c63daf7efc7a753d81 fixes the network indicator. Will attempt to backport to 3.2.1 and test. |
awokd
referenced this issue
in QubesOS/qubes-desktop-linux-xfce4
Dec 27, 2017
Merged
backport use default panel config on first boot #9
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 27, 2017
Tests OK, PRing. That resolves the network indicator caveat. That is all I can think of besides branding and signing, etc. Please let me know if there's anything else.
awokd
commented
Dec 27, 2017
|
Tests OK, PRing. That resolves the network indicator caveat. That is all I can think of besides branding and signing, etc. Please let me know if there's anything else. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 27, 2017
Member
Thank you very much!
I'll review and merge it in the meantime, but more time I'll probably have only after releasing 4.0-rc4. But maybe I'll manage to build 3.2.1 while waiting for some test build of 4.0 ;)
|
Thank you very much! |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Dec 27, 2017
No trouble, hopefully this helped towards getting 4.0 out a little bit faster or for you all to get some extra time off for the holidays!
awokd
commented
Dec 27, 2017
|
No trouble, hopefully this helped towards getting 4.0 out a little bit faster or for you all to get some extra time off for the holidays! |
added a commit
to marmarek/qubes-builder
that referenced
this issue
Jan 5, 2018
added a commit
to marmarek/qubes-builder
that referenced
this issue
Jan 5, 2018
added a commit
to awokd/qubes-builder
that referenced
this issue
Jan 6, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Jan 13, 2018
For documentation purposes, with the added scope of recent security mitigations will the next version of R3 released be R3.3?
awokd
commented
Jan 13, 2018
|
For documentation purposes, with the added scope of recent security mitigations will the next version of R3 released be R3.3? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 3, 2018
Member
For documentation purposes, with the added scope of recent security mitigations will the next version of R3 released be R3.3?
My understanding is that the next version will be R3.2.1 (not R3.3), since the final decision regarding the Meltdown mitigation was to use the less drastic XPTI solution, as explained in QSB #37.
@marmarek, please confirm.
My understanding is that the next version will be R3.2.1 (not R3.3), since the final decision regarding the Meltdown mitigation was to use the less drastic XPTI solution, as explained in QSB #37. @marmarek, please confirm. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
May 20, 2018
Member
Do we still expect Qubes 3.2.1 to be released soon? It's scheduled to reach EOL in ~10 months on 2019-03-28:
https://www.qubes-os.org/doc/supported-versions/#qubes-os
It might seem strange if it reaches EOL shortly after being released.
|
Do we still expect Qubes 3.2.1 to be released soon? It's scheduled to reach EOL in ~10 months on 2019-03-28: https://www.qubes-os.org/doc/supported-versions/#qubes-os It might seem strange if it reaches EOL shortly after being released. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
May 24, 2018
Member
There is already preliminary build in testing here: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=3.2&build=20180522&groupid=1
It includes also Fedora 28 template. Failures on UEFI tests seems to be limitation of test environment, but other failures are still to be resolved. For anyone interested - it's possible to download ISO image from there - select any test and go to assets tab.
@andrewdavidwong @rootkovska Should we follow the full release candidate cycle (which means at least 5 weeks), or use some shorter schedule?
|
There is already preliminary build in testing here: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=3.2&build=20180522&groupid=1 @andrewdavidwong @rootkovska Should we follow the full release candidate cycle (which means at least 5 weeks), or use some shorter schedule? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
May 24, 2018
Member
Should we follow the full release candidate cycle (which means at least 5 weeks), or use some shorter schedule?
I don't have an informed opinion about this, other than what I previously noted (that it might seem strange if it reaches EOL shortly after being released).
I don't have an informed opinion about this, other than what I previously noted (that it might seem strange if it reaches EOL shortly after being released). |
awokd commentedDec 23, 2017
Qubes OS version:
R3.2
Affected TemplateVMs:
fedora-23, debian-8
Steps to reproduce the behavior:
Install Qubes 3.2
Expected behavior:
Will have somewhat recent kernel and templates
Actual behavior:
Kernel and templates are dated
General notes:
Current kernel is now Linux 4.9.56-21.pvops.qubes.x86_64
Current templates Fedora 26 and Debian 9
Related issues:
https://groups.google.com/forum/?_escaped_fragment_=msg/qubes-users/fE2HCAdF-U0/eLovum3xAgAJ#!msg/qubes-users/fE2HCAdF-U0/eLovum3xAgAJ