Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upDebian based UpdateVM does not support --action=list or reinstall #3553
Comments
awokd
referenced this issue
in QubesOS/qubes-doc
Feb 8, 2018
Merged
reinstall-template 4.0 update #550
andrewdavidwong
added
bug
C: Whonix
C: Debian
labels
Feb 9, 2018
andrewdavidwong
added this to the Release 4.0 milestone
Feb 9, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 9, 2018
Member
You left the "Qubes OS version" field empty, but I'm guessing you meant 4.0.
|
You left the "Qubes OS version" field empty, but I'm guessing you meant 4.0. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
commented
Feb 9, 2018
|
@andrewdavidwong No, it applies to both 3.2 & 4.0 using a Debian based UpdateVM. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 9, 2018
Probably older versions too, since #1029 was released. Should I have written "all"?
awokd
commented
Feb 9, 2018
|
Probably older versions too, since #1029 was released. Should I have written "all"? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Feb 10, 2018
Member
Probably older versions too, since #1029 was released. Should I have written "all"?
Yeah, or "3.2 and 4.0," or "3.2 and 4.0 confirmed, but probably all," depending on your temperament with respect to verbosity and speculation.
(However, since versions prior to 3.2 are no longer supported, it doesn't matter whether they're affected for the purposes of this issue tracker.)
Since an issue can have only one milestone, I'll change this one to 3.2
Yeah, or "3.2 and 4.0," or "3.2 and 4.0 confirmed, but probably all," depending on your temperament with respect to verbosity and speculation. (However, since versions prior to 3.2 are no longer supported, it doesn't matter whether they're affected for the purposes of this issue tracker.) Since an issue can have only one milestone, I'll change this one to 3.2 |
andrewdavidwong
modified the milestones:
Release 4.0,
Release 3.2 updates
Feb 10, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 11, 2018
ERROR: yum version installed in VM host does not suppport --downloadonly option
ERROR: only 'install' and 'upgrade' actions supported (list not)
If I copy in qubes-dom0.repo to my debian-9 template (and disable all repos in there and replace r$releasever with r3.2), yum lets me list available packages. Like the error message says though, --downloadonly is not supported. sys-whonix can't resolve yum.qubes-os.org probably for security reasons, but there must be a way to accomplish the same thing in there because it can download updates for dom0.
user@debian-9:~$ yum --enablerepo=qubes-dom0-current list kernel-qubes-vm
qubes-dom0-current | 3.6 kB 00:00:00
qubes-dom0-current/primary_db | 890 kB 00:00:01
Available Packages
kernel-qubes-vm.x86_64 1000:4.9.56-21.pvops.qubes qubes-dom0-current
user@debian-9:~$ yum --enablerepo=qubes-dom0-current-testing list kernel-qubes-vm
qubes-dom0-current-testing | 3.6 kB 00:00:00
qubes-dom0-current-testing/primary_db | 1.6 MB 00:00:02
Available Packages
kernel-qubes-vm.x86_64 1000:4.14.18-1.pvops.qubes qubes-dom0-current-testing
user@debian-9:~$
awokd
commented
Feb 11, 2018
If I copy in qubes-dom0.repo to my debian-9 template (and disable all repos in there and replace
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 11, 2018
Looks like the error is coming from qubes-download-dom0-updates.sh. Need to try modifying it to permit --action=list on a debian-9 template. sys-whonix needs a UWT wrapper defined, if I'm reading the error right.
awokd
commented
Feb 11, 2018
|
Looks like the error is coming from qubes-download-dom0-updates.sh. Need to try modifying it to permit |
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Feb 11, 2018
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Feb 11, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 11, 2018
Member
See /usr/lib/qubes/qubes-download-dom0-updates.sh
For list, you don't really need --downloadonly, because you don't download any package. Try something like this: marmarek/qubes-core-agent-linux@e60194b
|
See |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 11, 2018
That's the file I was looking at too. Wasn't seeing anything that would prevent a list! Thanks, will try it out and see if I can figure out how to make sys-whonix work with it too. Think it needs a wrapper defined for yum.
awokd
commented
Feb 11, 2018
|
That's the file I was looking at too. Wasn't seeing anything that would prevent a list! Thanks, will try it out and see if I can figure out how to make sys-whonix work with it too. Think it needs a wrapper defined for yum. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Feb 11, 2018
Member
|
awokd:
sys-whonix needs a UWT wrapper defined, if I'm reading the error right.
Sure?
There is a uwt wrapper for yum and yumdownloader.
https://github.com/Whonix/uwt/blob/master/usr/bin/yum.anondist
https://github.com/Whonix/uwt/blob/master/usr/bin/yumdownloader.anondist
These are the programs run by qubes-download-dom0-updates.sh. It makes
more sense to uwt wrap (since there are no socks settings available
which would be better) the actual network using programs by the
qubes-download-dom0-updates.sh scripts than the
qubes-download-dom0-updates.sh script itself.
There is no 'dnf' in Debian.
Let me know ASP please if something is missing in Whonix so it can make
its way into Whonix 14 in time.
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 11, 2018
Thanks, @adrelanos . Found those wrappers where you said they'd be.
I got @marmarek 's script running on a standard debian-9 template and it works there. It's not super clean output (like it always lists my currently installed packages) but it does also list packages available in the repo specified. Copied it over to sys-whonix, but when I tried the same '--action=list' there with sys-whonix as my updatevm, I got:
mktemp: failed to create file via template '/tmp/uwt_root/tmp.XXXXXXXXXX': Permission denied
chmod: cannot access '': No such file or directory
/usr/bin/uwt: line 259: : No such file or directory
uwt: Missing torsocks configuration file "\.
But I think I may have figured out a work-around at least, I removed fakeroot from this section of Marmarek's code:
+ elif [ "$YUM_ACTION" == "list" ] || [ "$YUM_ACTION" == "search" ]; then
+ # those actions do not download any package, so lack of --downloadonly is irrelevant
+ YUM_COMMAND="fakeroot $YUM $YUM_ACTION -y"
and now it lists packages for the specified repo!
Maybe fakeroot throws off the UWT wrapper?
awokd
commented
Feb 11, 2018
|
Thanks, @adrelanos . Found those wrappers where you said they'd be.
But I think I may have figured out a work-around at least, I removed
and now it lists packages for the specified repo! |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 11, 2018
And this is just something where it would be nice to have feature parity with the Fedora template. If it doesn't make the cut for Whonix 14 it's not a big deal for me at least. Can patch it in later!
awokd
commented
Feb 11, 2018
|
And this is just something where it would be nice to have feature parity with the Fedora template. If it doesn't make the cut for Whonix 14 it's not a big deal for me at least. Can patch it in later! |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Feb 11, 2018
In the (Debian) portion of the qubes-download-dom0-updates.sh script, list/search are the only options that use yum instead of yumdownloader. Maybe removing fakeroot there is all that needs to be done since yum can apparently list and search without being sudo.
awokd
commented
Feb 11, 2018
|
In the (Debian) portion of the |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Feb 11, 2018
Member
Whonix 14 doesn't use /usr/bin/uwt anymore since it is no longer required. The mktemp workaround is no longer required. (This is because torsocks was improved.)
We are using /etc/tor/torsocks.conf.
# Set Torsocks to use an automatically generated SOCKS5 username/password based
# on the process ID and current time, that makes the connections to Tor use a
# different circuit from other existing streams in Tor on a per-process basis.
# If set, the SOCKS5Username and SOCKS5Password options must not be set.
# (Default: 0)
IsolatePID 1
Since it doesn't use mktemp anymore, you won't have the issue described in #3553 (comment).
I've removed fakeroot from /usr/lib/qubes/qubes-download-dom0-updates.sh as per your instructions and commented out the exit 1 of the does not suppport --downloadonly check.
It's downloading. Dunno yet if it will actually reinstall the template but at least for sure we don't have any uwt / connectivity issues.
|
Whonix 14 doesn't use /usr/bin/uwt anymore since it is no longer required. The mktemp workaround is no longer required. (This is because torsocks was improved.) We are using
Since it doesn't use mktemp anymore, you won't have the issue described in #3553 (comment). I've removed It's downloading. Dunno yet if it will actually reinstall the template but at least for sure we don't have any uwt / connectivity issues. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
commented
Feb 12, 2018
|
Doc link for tracking: QubesOS/qubes-doc#584 |
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Feb 13, 2018
marmarek
referenced this issue
in QubesOS/qubes-core-agent-linux
Feb 13, 2018
Merged
Extend dom0 updates handling script on Debian #94
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Feb 14, 2018
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Feb 14, 2018
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Feb 14, 2018
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Feb 14, 2018
marmarek
closed this
in
QubesOS/qubes-core-agent-linux#94
Feb 22, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 27, 2018
Automated announcement from builder-github
The package core-agent-linux has been pushed to the r4.0 testing repository for the CentOS centos7 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Feb 27, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-centos7-cur-test
label
Feb 27, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Feb 27, 2018
Closed
core-agent-linux v4.0.24 (r4.0) #433
qubesos-bot
added
r4.0-fc24-cur-test
r4.0-fc25-cur-test
labels
Feb 27, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 27, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.24-1+deb10u1 has been pushed to the r4.0 testing repository for the Debian template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing buster-testing (or appropriate equivalent for your template version), then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Feb 27, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
r4.0-buster-cur-test
r4.0-jessie-cur-test
labels
Feb 27, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 27, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.24-1+deb9u1 has been pushed to the r4.0 testing repository for the Debian template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing (or appropriate equivalent for your template version), then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Feb 27, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-stretch-cur-test
label
Feb 27, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 27, 2018
Automated announcement from builder-github
The component core-agent-linux (including package python2-dnf-plugins-qubes-hooks-4.0.24-1.fc26) has been pushed to the r4.0 testing repository for the Fedora template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Feb 27, 2018
|
Automated announcement from builder-github The component
|
qubesos-bot
added
the
r4.0-fc26-cur-test
label
Feb 27, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Mar 12, 2018
Automated announcement from builder-github
The package core-agent-linux has been pushed to the r4.0 stable repository for the Fedora centos7 template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
Mar 12, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
r4.0-centos7-stable
and removed
r4.0-centos7-cur-test
labels
Mar 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Mar 12, 2018
Automated announcement from builder-github
The component core-agent-linux (including package python2-dnf-plugins-qubes-hooks-4.0.24-1.fc26) has been pushed to the r4.0 stable repository for the Fedora template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
Mar 12, 2018
|
Automated announcement from builder-github The component
|
qubesos-bot
added
r4.0-fc26-stable
and removed
r4.0-fc26-cur-test
labels
Mar 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Mar 12, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.24-1+deb10u1 has been pushed to the r4.0 stable repository for the Debian template.
To install this update, please use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Mar 12, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
r4.0-buster-stable
r4.0-jessie-stable
and removed
r4.0-buster-cur-test
r4.0-jessie-cur-test
labels
Mar 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Mar 12, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.24-1+deb9u1 has been pushed to the r4.0 stable repository for the Debian template.
To install this update, please use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Mar 12, 2018
|
Automated announcement from builder-github The package
|
awokd commentedFeb 8, 2018
Qubes OS version:
Affected TemplateVMs:
debian-9, whonix-gw
Steps to reproduce the behavior:
Set UpdateVM to a debian-9 based sys-firewall or standard sys-whonix
sudo qubes-dom0-update --action=list kernel-qubes-vm (or --action=reinstall, etc.)
Expected behavior:
packages will be listed or reinstalled
Actual behavior:
ERROR: yum version installed in VM host does not suppport --downloadonly option
ERROR: only 'install' and 'upgrade' actions supported (list not)
General notes:
Ideally these additional
--actioncommands would work with a Debian based UpdateVM, but if it's a WONTFIX there should be a documented work-around available.--action=reinstallis easy enough to document (dnf remove, then install the package) but how does one--action=listavailable packages in the qubes-dom0-unstable repository for example?Related issues:
#1029
#3495