Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upFedora templates do not update the Qubes' repos through Whonix update proxy (R4.0-RC5) : " Error: Failed to synchronize cache for repo 'qubes-vm-r4.0-current' " #3737
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mirrorway
Mar 23, 2018
Same issue here with jessie-based sys-whonix and fedora-26 current-testing.
$ sudo dnf update
Fedora 26 - x86_64 - Updates 644 kB/s | 21 MB 00:33
Error: Failed to synchronize cache for repo 'qubes-vm-r4.0-current-testing'
debian, dom0 updates not affected.
fedora-26 updates properly if changed to use sys-net in /etc/qubes-rpc/policy/qubes.UpdatesProxy.
mirrorway
commented
Mar 23, 2018
•
|
Same issue here with jessie-based sys-whonix and fedora-26 current-testing.
debian, dom0 updates not affected. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Duplicate of #1352 (comment) |
andrewdavidwong
marked this as
a duplicate of
#1352
Mar 24, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Mar 24, 2018
Member
This appears to be a duplicate of an existing issue. If you believe this is not really a duplicate, please leave a comment briefly explaining why. We'll be happy to take another look and, if appropriate, reopen this issue. Thank you.
|
This appears to be a duplicate of an existing issue. If you believe this is not really a duplicate, please leave a comment briefly explaining why. We'll be happy to take another look and, if appropriate, reopen this issue. Thank you. |
andrewdavidwong
closed this
Mar 24, 2018
andrewdavidwong
added
the
duplicate
label
Mar 24, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 24, 2018
Member
I'm not so sure about this being duplicate - fedora repositories do not use onion service by default.
|
I'm not so sure about this being duplicate - fedora repositories do not use onion service by default. |
marmarek
reopened this
Mar 24, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
n1m1
Mar 24, 2018
Thanks @andrewdavidwong and @marmarek for your kind and prompt answers. I am not using onion services on Qubes 4.0: the problem is not related to them.
P.s: just a note, not related with this issue. I use onion services on a different laptop where I run Qubes 3.2 and, until few days ago, I've never ever experienced a problem with them.
n1m1
commented
Mar 24, 2018
|
Thanks @andrewdavidwong and @marmarek for your kind and prompt answers. I am not using onion services on Qubes 4.0: the problem is not related to them. P.s: just a note, not related with this issue. I use onion services on a different laptop where I run Qubes 3.2 and, until few days ago, I've never ever experienced a problem with them. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Does |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
n1m1
Mar 24, 2018
Unfortunately it does not.
[user@fedora-26 ~]$ sudo dnf update --refresh
Fedora 26 - x86_64 - Updates 265 kB/s | 21 MB 01:20
Error: Failed to synchronize cache for repo 'qubes-vm-r4.0-current'
I tried also with:
[user@fedora-26 ~]$ sudo dnf clean all
18 files removed
[user@fedora-26 ~]$ sudo dnf update
Fedora 26 - x86_64 - Updates 172 kB/s | 21 MB 02:04
Fedora 26 - x86_64 351 kB/s | 53 MB 02:35
Error: Failed to synchronize cache for repo 'qubes-vm-r4.0-current'
Some more information here:
[user@fedora-26 ~]$ sudo dnf update -v
Loaded plugins: builddep, config-manager, copr, debug, debuginfo-install, download, generate_completion_cache, needs-restarting, playground, qubes-hooks, repoclosure, repograph, repomanage, reposync
DNF version: 2.7.5
cachedir: /var/cache/dnf
repo: using cache for: updates
updates: using metadata from Sat Mar 24 04:21:18 2018.
repo: using cache for: fedora
not found deltainfo for: Fedora 26 - x86_64
not found updateinfo for: Fedora 26 - x86_64
fedora: using metadata from Wed Jul 5 21:31:38 2017.
Cannot download 'http://yum.qubes-os.org/r4.0/current/vm/fc26': repomd.xml parser error: Parse error at line: 1 (not well-formed (invalid token)).
Error: Failed to synchronize cache for repo 'qubes-vm-r4.0-current'
May be it is not necessary, but let me emphasize this one more time: this issue occurs only with the Qubes' repos on Fedora templates when updating through sys-whonix. With Qubes' repos on Debian-based templates (8,9.Whonix 13 and 14) I do not have this problem.
n1m1
commented
Mar 24, 2018
•
|
Unfortunately it does not.
I tried also with:
Some more information here:
May be it is not necessary, but let me emphasize this one more time: this issue occurs only with the Qubes' repos on Fedora templates when updating through sys-whonix. With Qubes' repos on Debian-based templates (8,9.Whonix 13 and 14) I do not have this problem. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 24, 2018
Member
Can you access that http://yum.qubes-os.org/r4.0/current/vm/fc26/repodata/repomd.xml from sys-whonix (using wget or curl)?
|
Can you access that |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
n1m1
Mar 24, 2018
Yes, I can.
user@host:~$ wget http://yum.qubes-os.org/r4.0/current/vm/fc26/repodata/repomd.xml
--2018-03-24 14:47:49-- http://yum.qubes-os.org/r4.0/current/vm/fc26/repodata/repomd.xml
Resolving yum.qubes-os.org (yum.qubes-os.org)... 82.94.215.165
Connecting to yum.qubes-os.org (yum.qubes-os.org)|82.94.215.165|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 3689 (3.6K) [application/xml]
Saving to: 'repomd.xml'
repomd.xml 100%[=====================================================================================================================================================>] 3.60K --.-KB/s in 0.02s
2018-03-24 14:47:50 (219 KB/s) - 'repomd.xml' saved [3689/3689]
n1m1
commented
Mar 24, 2018
|
Yes, I can.
|
andrewdavidwong
marked this as
not
a duplicate of
#1352
Mar 24, 2018
andrewdavidwong
added
bug
C: Fedora
and removed
duplicate
labels
Mar 24, 2018
andrewdavidwong
added this to the Release 4.0 milestone
Mar 24, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
n1m1
Mar 24, 2018
Have you modified something on your side? I've done several tests on my Fedora templates and now everything works as expected.
Here, I just run in Dom0:
sudo qubesctl state.sls qvm.updates-via-whonix
However, the configuration in /etc/qubes-rpc/policy/qubes.UpdatesProxy has not changed.
n1m1
commented
Mar 24, 2018
|
Have you modified something on your side? I've done several tests on my Fedora templates and now everything works as expected. Here, I just run in Dom0:
However, the configuration in |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
No changes from me. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
SSPJ
Mar 24, 2018
I am also experiencing this on Qubes 3.2 trying to update Fedora 23 template.
Error: Failed to synchronize cache for repo 'qubes-vm-r3.2-current'
I am using whatever the default updating mechanism on 3.2 is.
SSPJ
commented
Mar 24, 2018
|
I am also experiencing this on Qubes 3.2 trying to update Fedora 23 template. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mirrorway
Mar 25, 2018
The wget from sys-whonix also works for me. One tweak with my sys-whonix is, the firewall tab has traffic restricted to my tor entry nodes. Not sure if disabling those rules would help, but I'm a little scared to try...
mirrorway
commented
Mar 25, 2018
•
|
The wget from sys-whonix also works for me. One tweak with my sys-whonix is, the firewall tab has traffic restricted to my tor entry nodes. Not sure if disabling those rules would help, but I'm a little scared to try... |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Caesarwm1
Mar 26, 2018
Hello!
Here, it's nearly the same as with user @n1m1. I'm quite sure I checked (since many, many days) every single dnf possibilitiy like --refresh --clean all, etc., as well as issues #3135, #1352, and setting RestartSec=0s in etc/systemd/system/multi-user.target.wants/qubes-updates-proxy.service.
I can access http://yum.qubes-os.org/r4.0/current/vm/fc26/repodata/repomd.xml from sys-whonix, if I connect sys-whonix directly to Chris Laprise'/tasket's OpenVPN setup, not also to sys-firewall. But the fedora-26 template dnf issue (Qubes repos only; Fedora updates properly if I set Qubes repos enabled=0) existed before this VPN setup, so I don't think it's related.
sudo qubesctl state.sls qvm.updates-via-whonix in dom0 succeeds.
More information:
[user@fedora-26 ~]$ sudo dnf update -v
Loaded plugins: builddep, config-manager, copr, debug, debuginfo-install, download, generate_completion_cache, needs-restarting, playground, qubes-hooks, repoclosure, repograph, repomanage, reposync
DNF version: 2.7.5
cachedir: /var/cache/dnf
repo: using cache for: updates
updates: using metadata from Mon Mar 26 19:23:26 2018.
repo: using cache for: fedora
not found deltainfo for: Fedora 26 - x86_64
not found updateinfo for: Fedora 26 - x86_64
fedora: using metadata from Wed Jul 5 22:31:38 2017.
Cannot download 'http://yum.qubes-os.org/r4.0/current/vm/fc26': repomd.xml parser error: Parse error at line: 1 (not well-formed (invalid token)).
Error: Failed to synchronize cache for repo 'qubes-vm-r4.0-current'
I tried every other possibility here (sys-net and/or sys-firewall):
Also, I tested both onion/hidden service addresses; at the moment I use the clearnet addresses.
Best regards!
Caesarwm1
commented
Mar 26, 2018
•
|
Hello! Here, it's nearly the same as with user @n1m1. I'm quite sure I checked (since many, many days) every single dnf possibilitiy like --refresh --clean all, etc., as well as issues #3135, #1352, and setting I can access
More information:
I tried every other possibility here (sys-net and/or sys-firewall): Also, I tested both onion/hidden service addresses; at the moment I use the clearnet addresses. Best regards! |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 26, 2018
Member
Try to modify /etc/yum.repos.d/qubes-r4.repo to use https instead of http.
|
Try to modify |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Caesarwm1
commented
Mar 27, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mirrorway
commented
Mar 27, 2018
|
Change to https fixes it for me too :) |
andrewdavidwong
modified the milestones:
Release 4.0,
Release 4.0 updates
Mar 31, 2018
qubes-user
referenced this issue
Apr 1, 2018
Closed
Template Update, checksum mismatch (R4.0 fedora-26-minimal & fedora-26) #3774
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Apr 4, 2018
This is an issue on a fresh install of 4.0 final as well, with the default fedora-26 template. The https fix works, although those checksum errors are worrisome. Probably shouldn't expect users to edit files out of the box to get updates working. Is the http -> https redirect breaking it? Can 4.0 final be updated to include the https fix?
awokd
commented
Apr 4, 2018
|
This is an issue on a fresh install of 4.0 final as well, with the default fedora-26 template. The https fix works, although those checksum errors are worrisome. Probably shouldn't expect users to edit files out of the box to get updates working. Is the http -> https redirect breaking it? Can 4.0 final be updated to include the https fix? |
andrewdavidwong
added
the
P: major
label
Apr 4, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
titxz
Apr 10, 2018
I'm using Qubes os r4.0 and i have this problem, but i can not find "qubes-r4.repo" file from the "/etc/yum.repos.d/" location..
But i found "fedora.repo" , "fedora-updates.repo" , "qubes-dom0.repo" , "qubes-templates.repo" files in this location.
Please help me...!!!
titxz
commented
Apr 10, 2018
|
I'm using Qubes os r4.0 and i have this problem, but i can not find "qubes-r4.repo" file from the "/etc/yum.repos.d/" location.. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Apr 11, 2018
Member
I'm using Qubes os r4.0 and i have this problem, but i can not find "qubes-r4.repo" file from the "/etc/yum.repos.d/" location..
But i found "fedora.repo" , "fedora-updates.repo" , "qubes-dom0.repo" , "qubes-templates.repo" files in this location.
It sounds like you're looking in dom0 when you should be looking in the desired Fedora TemplateVM.
It sounds like you're looking in dom0 when you should be looking in the desired Fedora TemplateVM. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
carnak
Apr 15, 2018
Problem: Fedora 26 template repo update fails with error message: "Error: failed to synchronize cache for repo 'qubes-vm-r4.0-current'.
Solution: From dom0 terminal window, I run following 5 commands:
- qvm-service -l fedora-26 qubes-yum-proxy
- qvm-service -e fedora-26 qubes-yum-proxy
- qvm-service -l fedora-26 qubes-updates-proxy
- qvm-service -e fedora-26 qubes-updates-proxy
- reboot dom0
ymmv, though this has solved the problem for me repeatedly.
carnak
commented
Apr 15, 2018
|
Problem: Fedora 26 template repo update fails with error message: "Error: failed to synchronize cache for repo 'qubes-vm-r4.0-current'.
ymmv, though this has solved the problem for me repeatedly. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Apr 21, 2018
This is an (out of the box) issue with dom0 updates as well as Fedora templates. To summarize, after installing 4.0 final with the box checked to use Whonix for updates, neither dom0 or Fedora template updates work. I had to manually edit dom0's /etc/yum.repos.d/qubes-dom0.repo and fedora-26's /etc/yum.repos.d/qubes-r4.repo and replace http with https. This was not an issue until somewhere around the release of rc5. Was http://yum.qubes-os.org changed around that time to redirect to https? Should the redirect be turned off so updates will work over http again?
awokd
commented
Apr 21, 2018
|
This is an (out of the box) issue with dom0 updates as well as Fedora templates. To summarize, after installing 4.0 final with the box checked to use Whonix for updates, neither dom0 or Fedora template updates work. I had to manually edit dom0's |
andrewdavidwong
added
P: critical
and removed
P: major
labels
Apr 21, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Apr 21, 2018
Member
Upgrading priority to critical. Rationale:
Even though the workaround is "easy," most users won't know to do it. They'll simply stop getting updates.
|
Upgrading priority to critical. Rationale: Even though the workaround is "easy," most users won't know to do it. They'll simply stop getting updates. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Apr 21, 2018
Member
Solution: From dom0 terminal window, I run following 5 commands:
qvm-service -l fedora-26 qubes-yum-proxy qvm-service -e fedora-26 qubes-yum-proxy qvm-service -l fedora-26 qubes-updates-proxy qvm-service -e fedora-26 qubes-updates-proxy reboot dom0
This is wrong. qubes-updates-proxy (and its deprecated name qubes-yum-proxy) is a service providing a proxy for templates, which should be running in whatever VM you use to download updates (sys-net or sys-whonix in default configuration, depending on initial setup choice). Running it in the template itself will (depending on start order) either do nothing, or nullify updates proxy mechanism and use plain network - which is not enabled for templates in R4 by default. So, I guess it worked for you @carnak because you additionally set some netvm for this template.
I have no idea why updates over http stopped working when using whonix (there is no redirection @awokd ; web browser use https by default because qubes-os.org is on hsts preload list). But the correct solution is to switch to https. I wanted to wait until we'll have proper metalinks in place (#1254) to avoid changing repository definitions multiple times, but it looks like it will take more time than expected. So, I'll switch to https right away. For this to be applied, the update will need to be installed (so, working update mechanism is required...).
This is wrong. I have no idea why updates over http stopped working when using whonix (there is no redirection @awokd ; web browser use https by default because qubes-os.org is on hsts preload list). But the correct solution is to switch to https. I wanted to wait until we'll have proper metalinks in place (#1254) to avoid changing repository definitions multiple times, but it looks like it will take more time than expected. So, I'll switch to https right away. For this to be applied, the update will need to be installed (so, working update mechanism is required...). |
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Apr 21, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Apr 21, 2018
Automated announcement from builder-github
The package pykickstart-2.32-4.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Apr 21, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Apr 21, 2018
qubesos-bot
referenced this issue
in QubesOS/updates-status
Apr 21, 2018
Closed
installer-qubes-os v4.0-2-qubes-release (r4.0) #492
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Apr 22, 2018
dom0 updates work sometimes, after all. I have a couple systems with 4.0 final installed 2-3 weeks ago that received no dom0 updates and were showing that Failed to synchronize cache for repo error until I edited the dom0 yum.repos to HTTPS. I did a fresh install a different system and when I did dom0 updates first, it worked (but still no Fedora template updates). Going to try again but attempt a Fedora template update first, in case it's caching a bad file somewhere.
I found a similar bug report here https://bugzilla.redhat.com/show_bug.cgi?id=1207685 when HTTP headers got included in the body. Trying to work through https://access.redhat.com/solutions/189533. It seems to show up on other http only repos as well; for example, if I enable adobe-linux-x86_64.repo in the Fedora template.
For this to be applied, the update will need to be installed (so, working update mechanism is required...)
@andrewdavidwong, should an announcement go out with steps (like https://www.mail-archive.com/qubes-users@googlegroups.com/msg21002.html) on how to edit these files? Should a replacement ISO be generated or install documentation/release notes updated to mention it?
awokd
commented
Apr 22, 2018
|
dom0 updates work sometimes, after all. I have a couple systems with 4.0 final installed 2-3 weeks ago that received no dom0 updates and were showing that
@andrewdavidwong, should an announcement go out with steps (like https://www.mail-archive.com/qubes-users@googlegroups.com/msg21002.html) on how to edit these files? Should a replacement ISO be generated or install documentation/release notes updated to mention it? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Apr 22, 2018
Member
For this to be applied, the update will need to be installed (so, working update mechanism is required...)
@andrewdavidwong, should an announcement go out with steps (like https://www.mail-archive.com/qubes-users@googlegroups.com/msg21002.html) on how to edit these files?
Yes. Please confirm the exact steps required, and we will make an announcement notifying current Qubes 4.0 users to perform them. (This is another case where we need #3430.)
Should a replacement ISO be generated or install documentation/release notes updated to mention it?
Yes, we should do one of these two things. I don't know whether @marmarek wants to issue a new ISO for this. If not, we'll have to mention it prominently in the installation guide and release notes so that users perform the steps right after they install.
Yes. Please confirm the exact steps required, and we will make an announcement notifying current Qubes 4.0 users to perform them. (This is another case where we need #3430.)
Yes, we should do one of these two things. I don't know whether @marmarek wants to issue a new ISO for this. If not, we'll have to mention it prominently in the installation guide and release notes so that users perform the steps right after they install. |
andrewdavidwong
reopened this
Apr 22, 2018
andrewdavidwong
added
C: doc
release-notes
labels
Apr 22, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
We should also update this FAQ entry: |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Apr 22, 2018
Edit Fedora-26 Update Location
- Click on the Qubes menu (Q in top left)
- Then, Template: fedora-26 > fedora-26: Terminal
- In the window that opens, enter
sudo gedit /etc/yum.repos.d/qubes-r4.repo - Change all instances of
httptohttps(there are four) - Click the Save button in the top right
- Close gedit and
sudo poweroffthe template
Edit Dom0 Update Location
- Click on the Qubes menu (Q in top left)
- Then, Terminal Emulator
- In the window that opens, enter
sudo nano /etc/yum.repos.d/qubes-dom0.repo - Change all instances of
httptohttps(there are four) - Once done, hit
CTRL-x,y, and thenENTERto save changes and exit - Type
sudo qubes-dom0-updateto check for updates
I'll take a look at that FAQ entry too.
awokd
commented
Apr 22, 2018
|
Edit Fedora-26 Update Location
Edit Dom0 Update Location
I'll take a look at that FAQ entry too. |
awokd
referenced this issue
in QubesOS/qubes-doc
Apr 22, 2018
Closed
faq: add steps to edit update repositories #635
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Apr 22, 2018
Member
@awokd: Thank you for providing these steps. Before I send an edited version of these steps to the MLs and post it on the website, I want to confirm with @marmarek and/or @rootkovska on a couple of points:
- Can you confirm that these are actually steps that all current 4.0 users should perform?
- Should this be a QSB? It is highly unusual for us to post an important announcement that requires user action that is not a QSB. (I can't currently recall another case.) For example, it seems like this announcement should go to
qubes-announce, even if it's not a QSB.
|
@awokd: Thank you for providing these steps. Before I send an edited version of these steps to the MLs and post it on the website, I want to confirm with @marmarek and/or @rootkovska on a couple of points:
|
andrewdavidwong
closed this
Apr 22, 2018
andrewdavidwong
reopened this
Apr 22, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
awokd
Apr 22, 2018
I'm having difficulty recreating the dom0 update issue on my test install- they've been working pretty reliably there. My other systems might have been operating against an old cache, but neither of them showed updates until yesterday when I changed them to https.
awokd
commented
Apr 22, 2018
|
I'm having difficulty recreating the dom0 update issue on my test install- they've been working pretty reliably there. My other systems might have been operating against an old cache, but neither of them showed updates until yesterday when I changed them to https. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Apr 26, 2018
Member
It looks like @marmarek and @rootkovska are too busy to respond to this, so I'm just going to opt for a conservative course of action by sending the announcement to qubes-users and qubes-devel (but not qubes-announce or posting it on the website). If, for some reason, we later come to believe that sending it to qubes-users and qubes-devel was insufficient, we can always send or post it in additional places.
|
It looks like @marmarek and @rootkovska are too busy to respond to this, so I'm just going to opt for a conservative course of action by sending the announcement to qubes-users and qubes-devel (but not qubes-announce or posting it on the website). If, for some reason, we later come to believe that sending it to qubes-users and qubes-devel was insufficient, we can always send or post it in additional places. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Apr 26, 2018
Member
We should also update this FAQ entry:
After thinking about this some more, I don't think it's necessary to update the FAQ entry. The current content still applies in the general case, and the proposed addition wouldn't apply after this fix has been implemented. Stating the fix in the announcement, installation guide, and release notes should be sufficient to spread awareness to users.
After thinking about this some more, I don't think it's necessary to update the FAQ entry. The current content still applies in the general case, and the proposed addition wouldn't apply after this fix has been implemented. Stating the fix in the announcement, installation guide, and release notes should be sufficient to spread awareness to users. |
andrewdavidwong
closed this
in
QubesOS/qubes-doc@2a93dc5
Apr 26, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Apr 29, 2018
Member
I think the only realistic way to have most users who have this issue having it fixed for them is a dom0 upgrade which then uses salt to make the change for the user inside the template.
(But I am aware that the general development time scarcity as well.)
|
I think the only realistic way to have most users who have this issue having it fixed for them is a dom0 upgrade which then uses salt to make the change for the user inside the template. (But I am aware that the general development time scarcity as well.) |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
May 2, 2018
Automated announcement from builder-github
The package core-agent-linux has been pushed to the r4.0 testing repository for the CentOS centos7 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
May 2, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-centos7-cur-test
label
May 2, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
May 14, 2018
Automated announcement from builder-github
The package pykickstart-2.32-4.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
May 14, 2018
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
qubesos-bot
added
r4.0-dom0-stable
and removed
r4.0-dom0-cur-test
labels
May 14, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
May 21, 2018
Automated announcement from builder-github
The component core-agent-linux (including package python2-dnf-plugins-qubes-hooks-4.0.28-1.fc26) has been pushed to the r4.0 stable repository for the Fedora template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
May 21, 2018
|
Automated announcement from builder-github The component
|
qubesos-bot
removed
the
r4.0-fc26-cur-test
label
May 21, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
May 21, 2018
Automated announcement from builder-github
The package core-agent-linux has been pushed to the r4.0 stable repository for the Fedora centos7 template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
May 21, 2018
|
Automated announcement from builder-github The package
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
May 21, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.28-1+deb9u1 has been pushed to the r4.0 stable repository for the Debian template.
To install this update, please use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
May 21, 2018
|
Automated announcement from builder-github The package
|



n1m1 commentedMar 23, 2018
Qubes OS version:
R4.0-rc5
Affected component(s):
Fedora templates.
Steps to reproduce the behavior:
In a Fedora template type:
sudo dnf updateQubes is configured in order to update the templates through sys-whonix-14. Below the conf file in Dom0' (/etc/qubes-rpc/policy/qubes.UpdatesProxy)
Expected behavior:
The Fedora template is updated
Actual behavior:
The Fedora repos properly work, but the Qubes' ones do not. Here is the output I get.
General notes:
apt update && apt upgradejust work.qubes-dom0-updatejust works.$type:TemplateVM $default allow,target=sys-whonix-14in$type:TemplateVM $default allow,target=sys-neteverything works as expected.systemctl status qubes-updates-proxyin sys-whonix-14sudo systemctl restart qubes-updates-proxyin sys-whonix-14 did not sort effect.Related issues:
#3557 and #3135 ?