Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upQubes firewall - allowing temporary access causes python error #3661
Comments
andrewdavidwong
added
bug
C: core
labels
Mar 6, 2018
andrewdavidwong
added this to the Release 4.0 milestone
Mar 6, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
donob4n
Mar 7, 2018
I think I have this fixed but doing it I discovered a problem with https://github.com/QubesOS/qubes-core-admin/blob/a8784df349910c2f3acf503207084a663c30e400/qubes/firewall.py#L204-L207
and https://github.com/QubesOS/qubes-manager/blob/819f2f45d47899f1f89cbef63f3c5dc42a1ff9bc/qubesmanager/firewall.py#L338
The datetime is not properly restored and I personally have a 5h diff. I tried even calling utcfromtimestamp() in qubes-manager itself and the time was wrong.
Without using UTC it works fine.
donob4n
commented
Mar 7, 2018
•
|
I think I have this fixed but doing it I discovered a problem with https://github.com/QubesOS/qubes-core-admin/blob/a8784df349910c2f3acf503207084a663c30e400/qubes/firewall.py#L204-L207 The datetime is not properly restored and I personally have a 5h diff. I tried even calling utcfromtimestamp() in qubes-manager itself and the time was wrong. Without using UTC it works fine. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
donob4n
Mar 7, 2018
Now call_later() works fine but this comparison fails https://github.com/QubesOS/qubes-core-admin/blob/a8784df349910c2f3acf503207084a663c30e400/qubes/firewall.py#L551
Could you check @marmarek ?
donob4n
commented
Mar 7, 2018
•
|
Now call_later() works fine but this comparison fails https://github.com/QubesOS/qubes-core-admin/blob/a8784df349910c2f3acf503207084a663c30e400/qubes/firewall.py#L551 Could you check @marmarek ? |
donob4n
referenced this issue
in QubesOS/qubes-core-admin
Mar 8, 2018
Merged
Fixes in firewall temporary access #200
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
pgporada
Mar 14, 2018
This just happened to me after the latest round of Qube updates. I'm running the latest Qubes 4.0 RC.
pgporada
commented
Mar 14, 2018
•
|
This just happened to me after the latest round of Qube updates. I'm running the latest Qubes 4.0 RC. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Confirmed in rc5 |
andrewdavidwong
added
the
P: major
label
Mar 15, 2018
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Mar 20, 2018
marmarek
closed this
in
marmarek/qubes-core-admin@b3b18f9
Mar 20, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Mar 29, 2018
Automated announcement from builder-github
The package qubes-core-dom0-4.0.25-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Mar 29, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Mar 29, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Mar 29, 2018
Closed
core-admin v4.0.25 (r4.0) #469
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
tlaurion
Apr 9, 2018
Contributor
I confirm this bug is still present in Qubes 4 release, fully updated to current, and fixed by upgrading to qubes-dom0-current-testing.
This greatly impact installation of other package repos, importing their keys and general user experience.
@marmarek : That fix should be pushed into current repo!
|
I confirm this bug is still present in Qubes 4 release, fully updated to current, and fixed by upgrading to qubes-dom0-current-testing. This greatly impact installation of other package repos, importing their keys and general user experience. @marmarek : That fix should be pushed into current repo! |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Apr 11, 2018
Member
@marmarek : That fix should be pushed into current repo!
Yes, it will be, after making sure it really didn't introduce any regression in any supported configuration.
Yes, it will be, after making sure it really didn't introduce any regression in any supported configuration. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
May 14, 2018
Automated announcement from builder-github
The package qubes-core-dom0-4.0.27-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
May 14, 2018
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
mirrorway commentedMar 5, 2018
•
edited
Edited 3 times
-
mirrorway
edited Mar 15, 2018 (most recent)
-
mirrorway
edited Mar 5, 2018
-
mirrorway
edited Mar 5, 2018
Qubes OS version:
R4.0 rc4, current-testing
Affected component(s):
GUI firewall
Steps to reproduce the behavior:
This affects existing VMs too.
Expected behavior:
Allows temporary net access.
Actual behavior:
ERROR: Firewall tab: Got empty response from qubesd. See journalctl in dom0 for details.
journalctl: