Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Test install process, workstation functionality against Qubes 4.0.4 #640

Closed
3 tasks
zenmonkeykstop opened this issue Nov 9, 2020 · 7 comments
Closed
3 tasks

Comments

@zenmonkeykstop
Copy link
Contributor

The Qubes 4.0.4 RC1 iso is now available: https://www.qubes-os.org/news/2020/11/05/qubes-4-0-4-rc1/

Probably the most relevant change is the update to Fedora version from 30 (in 4.0.3) to 32. The workstation installation currently involves installing F31 after the Qubes install, so this would simplify the process.

Testing should involve:

  • verifying that the SDW docs correctly describe the Qubes installer process
  • verifying that an installation can be completed successfully without installing F31 and with F32 used for sys- VMs
  • verifying client functionality after install.
@zenmonkeykstop
Copy link
Contributor Author

Tried naively installing on 4.0.4-rc1, ignoring the fedora31 setup step (because fedora32, right?)

Installation proceeds happily including installation of fedora31 template until first attempt to update a fedora31-based VM (sys-firewall), which fails due to the upstream issue QubesOS/qubes-issues#6188 . Applying the fix described there (using Qubestesting repo) resolves, and installation completes without error on a second run of sdw-admin --apply.

@eloquence eloquence moved this from Near Term - SD Workstation to SecureDrop Sprint #63 - 11/12-11/25 in SecureDrop Team Board Nov 13, 2020
@eloquence
Copy link
Member

Thanks for the report @zenmonkeykstop, that's great news. I've pulled this into the current sprint for visibility, but if the release stars align, we can do the final testing as part of QA for 0.5.1 (#643).

@eloquence eloquence moved this from SecureDrop Sprint #63 - 11/12-11/25 to Next up in SecureDrop Team Board Nov 30, 2020
@eloquence eloquence moved this from Next up to Discussion Points in SecureDrop Team Board Dec 1, 2020
@eloquence eloquence moved this from Discussion Points to Near Term - SD Workstation in SecureDrop Team Board Jan 5, 2021
@eloquence
Copy link
Member

Qubes 4.0.4 is still not out yet; we'll want to re-test a fresh install once it it is but moving to near-term backlog for now.

@eloquence
Copy link
Member

4.0.4~RC2 is out; plan of record is to re-test once the final 4.0.4 is out.

@eloquence
Copy link
Member

eloquence commented Mar 6, 2021

Just noting that 4.0.4. was in fact released yesterday. According to the release announcement, any updated Qubes 4 system is functionally identical to a 4.0.4 install.

I re-ran sdw-admin --apply on my updates Qubes machine without issues; SecureDrop Client also seems happy. In make test in dom0 I am noticing Whonix policy lines that cause test failures on my machine. I'm not sure when exactly those were added, may have been well before 4.0.4 but I do believe it must have been through some update:

Policy for qubes.VMRootShell is:
disp-mgmt-whonix-gw-15 whonix-gw-15 allow,user=root
### BEGIN securedrop-workstation ###
Policy for qubes.Filecopy is:
disp-mgmt-whonix-gw-15 whonix-gw-15 allow,user=root
### BEGIN securedrop-workstation ###

@conorsch
Copy link
Contributor

conorsch commented Mar 8, 2021

Those RPC policies changes appear incidental, they are automatically created by dom0 during updates to a given VM. So, while updating whonix-gw-15 via Salt, dom0 will add a grant for disp-mgmt-whonix-gw-15 to talk to it. Those should be cleaned up automatically after a successful run, but if the updates failed, they'll hang around again. See #351 (comment) for reference.

In other words, those changes do not appear to be related to 4.0.4. Thanks for the install report, great to hear it's working well! We'll need to update the docs to match.

@conorsch conorsch closed this as completed Mar 8, 2021
SecureDrop Team Board automation moved this from Near Term - SD Workstation to Done Mar 8, 2021
@conorsch conorsch reopened this Mar 8, 2021
@eloquence
Copy link
Member

We've been using Qubes 4.0.4 without issue for a while, so closing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
No open projects
Development

No branches or pull requests

3 participants