Commit Graph

43 Commits

Author SHA1 Message Date
Miguel Jacq
6a792ed056
Fix typos in qubes-dom0-update 2018-02-12 16:48:52 +11:00
Marek Marczykowski-Górecki
b07706fd7a
dom0-updates: launch console update in terminal emulator as "GUI"
GUI updaters and Packagekit are confused by networkless dom0 and often
report that:
 - cannot check for updates (because of no network connection)
 - no updates are available, even if they are

The latter happen mostly because PackageKit does not load dnf.conf, so
try to use /etc/yum.repos.d (network repositories) instead of
/etc/yum.real.repos.d (local cache, downloaded by qubes-dom0-update).
Currently PackageKit does not support configuring it, the path is
hardcoded.

Until both of above issues get fixed, prefer console updater.

Fixes QubesOS/qubes-issues#1378
2018-01-12 04:54:07 +01:00
Marek Marczykowski-Górecki
8689170368
dom0-updates: move PackageKit cache refresh to GUI handling
PackageKit is used only by GUI updaters, refresh its cache only then.
Since PackageKit daemon do not read dnf.conf, it doesn't know  the right
repository location, so try to access network, which results in
timeouts. But at the same time, it invalidate previous cache, which is
what we need.
Do not delay every qubes-dom0-update call by pkcon call.
2018-01-08 01:40:18 +01:00
Marek Marczykowski-Górecki
be9e759697
Merge remote-tracking branch 'qubesos/pr/33'
* qubesos/pr/33:
  qubes-dom0-update: Adapt template backup failsafe for R4
2017-12-05 23:10:02 +01:00
Marek Marczykowski-Górecki
7902979470
Merge remote-tracking branch 'qubesos/pr/32'
* qubesos/pr/32:
  qubes-dom0-update: Simplify
2017-12-05 23:06:12 +01:00
Jean-Philippe Ouellet
552fd062ea
qubes-dom0-update: Adapt template backup failsafe for R4
Perhaps the UpdateVM template should be temporarily switched to the
backup too. That would make it really failsafe. Currently it requires
manual recovery (by setting template of UpdateVM to the backup).
2017-11-30 08:52:13 -05:00
Jean-Philippe Ouellet
aeb04e24e2
qubes-dom0-update: Simplify
qvm-run auto-starts VMs by default
2017-11-30 08:51:14 -05:00
Jean-Philippe Ouellet
686db90032
qubes-dom0-update: Remove dependency on Xen as vmm 2017-11-30 08:46:28 -05:00
Marek Marczykowski-Górecki
005fed6cdf
Merge remote-tracking branch 'qubesos/pr/27'
* qubesos/pr/27:
  Fix root.img handling bug
2017-06-07 10:09:03 +02:00
Christopher Laprise
6d251d5c58
Fix root.img handling bug
Per issue https://github.com/QubesOS/qubes-issues/issues/2848
2017-06-07 01:35:34 -04:00
Marek Marczykowski-Górecki
d9202f8d14
Update qubes-dom0-update script
- don't call removed qvm-sync-clock
- use qvm-start --skip-if-running instead of qvm-run ... true, to start
a VM
- update qvm-run options
- use dnf directly, not through compatibility wrapper
2017-05-20 03:46:33 +02:00
Marek Marczykowski-Górecki
ad2a976924
Merge branch 'core3-devel' 2017-05-18 01:26:20 +02:00
unman
fa72d66d5d
Flush dnf configuration on updateVM before starting dom0 update 2017-04-20 14:41:19 +01:00
Christopher Laprise
25f1801061
Fixes 2017-03-15 10:10:36 -04:00
Christopher Laprise
ad404bfbe6
Starting mods for template upgrade support 2017-03-12 23:15:45 -04:00
Rusty Bird
be30203d81
qubes-dom0-update: Show sync and download progress
Use "script" (part of util-linux) to fake a dumb terminal in the
updatevm, so dnf will show sync and download progress indicators.
2016-09-05 13:57:07 +00:00
Marek Marczykowski-Górecki
b91eace873
dom0-updates: convert to core3 API 2016-08-08 00:47:18 +02:00
Marek Marczykowski-Górecki
d9b37eec6c
dom0-updates: whitespace fixes 2016-06-24 02:24:52 +02:00
ttasket
fbb58918af Fixes
Moved create private.img before yum.
Shutdown templatevm first -- don't want to query possibly compromised vm running old private.img.
Issue #2061
2016-06-21 15:15:34 -04:00
ttasket
ef1ab34234 Re-create private.img if missing
This restores the netvm setting and also re-creates private.img if older rpm scriptlet doesn't create it.
Issue #2061
2016-06-21 10:57:57 -04:00
ttasket
577944c8fb Try to handle private.img (fail)
mv and rm private.img like root.img, but this results in no private.img after reinstall.
do not use.
2016-06-20 14:04:55 -04:00
ttasket
457b275800 Fix syntax
@marmarek This works on my system.
2016-06-20 13:36:30 -04:00
ttasket
32a4269f4a Backup root.img
Just in case template %post scriptlet doesn't unlink during reinstall, or if reinstall fails.
Also preserves Netvm prefs setting.
2016-06-18 12:00:00 -04:00
ttasket
d316624f61 Update qubes-dom0-update 2016-06-18 05:24:18 -04:00
ttasket
8c7a225070 Backup root.img
Just in case template %post scriptlet doesn't unlink during reinstall, or if reinstall fails. Fixed PKGS test.
2016-06-18 04:22:23 -04:00
ttasket
6c7c25d9e7 Backup root.img
Just in case template %post scriptlet doesn't unlink during reinstall, or if reinstall fails.
2016-06-18 03:02:46 -04:00
ttasket
17627cdf3c Support in-place template reinstalls - for testing
This doesn't yet prevent appvms from starting with invalid template during the reinstall, and doesn't deal with the Netvm setting problem.
For issue #2061
2016-06-16 07:59:28 -04:00
ttasket
6b315b1dad Add template reinstall support
Issue #2061
Simple implementation checks for --action=reinstall but adds no sanity checks.
2016-06-12 12:05:28 -04:00
Marek Marczykowski-Górecki
6c7443223b
dom0-update: remove cached metadata when --clean is used
Fixes QubesOS/qubes-issues#1748
2016-03-11 15:10:28 +01:00
Marek Marczykowski-Górecki
2198986d5c
dom0-update: do not output scary messagge about missing repomd.xml
... when no updates are available.

Fixes QubesOS/qubes-issues#1685
2016-02-03 16:46:58 +01:00
Marek Marczykowski-Górecki
6921400a7a
dom0-updates: remove "updates pending" flag also when no actual updates were found
This allows to clear the flag when for some reason it wasn't cleared
immediately after installing updates.

Fixes QubesOS/qubes-issues#1511
2015-12-13 02:11:56 +01:00
Marek Marczykowski-Górecki
cb6a52a652
dom0-updates: wait for apper to finish, then remove "updates pending" flag
Unfortunate side effect (to be solved at Qubes Manager side): it will
block Qubes Manager until all updates are installed (not only updater
launched).

Fixes QubesOS/qubes-issues#1511
2015-12-13 02:08:05 +01:00
Patrick Schleizer
7d0b2479f5 filter out tar time wrap warnings using grep
https://phabricator.whonix.org/T401#6634
2015-09-04 00:54:50 +00:00
Marek Marczykowski-Górecki
f2b5cf1cc0 dom0-update: clear error marker before downloading new packages (#987)
Otherwise if some package download fails once - further tries will also
report errors.

Fixes qubesos/qubes-issues#987
2015-05-13 02:34:51 +02:00
Marek Marczykowski-Górecki
4cab815317 dom0-update: prevent template package upgrades (#996)
This would override user changes to the template. Previous method
(Obsoletes: rpm header) doesn't work now, so add explicit exclude list
as yum option

Fixes qubesos/qubes-issues#996
2015-05-13 02:33:12 +02:00
Marek Marczykowski-Górecki
3c151ca509 dom0-update: allow to specify custom yum action
This can be useful for actions like "downgrade", "reinstall" etc.

Needs additional testing if whole distribution upgrade using
"distro-sync" action will work as expected.
2015-03-26 00:58:10 +01:00
Marek Marczykowski-Górecki
28dfdddc0e Minor fixes in messages 2014-10-28 05:28:13 +01:00
Marek Marczykowski-Górecki
a013cb3eca dom0-updates: call "apper --updates" to go directly to updates tab 2014-06-30 16:16:08 +02:00
Marek Marczykowski-Górecki
8627ef9a80 dom0-updates: use GUI tool appropriate to current DE (#824) 2014-06-29 22:02:00 +02:00
Marek Marczykowski-Górecki
a7c43e6148 dom0-updates: clean local repo when --clean given 2014-05-12 00:30:48 +02:00
Marek Marczykowski-Górecki
46f85b7f3f dom0-updates: fix command quotation, hide only harmless error msgs 2014-04-15 13:22:28 +02:00
Marek Marczykowski-Górecki
793dec27ff dom0-updates: use qvm-run, not qrexec-client directly 2014-04-15 03:32:52 +02:00
Marek Marczykowski
e5f9e46e19 dom0-updates code 2013-03-16 18:54:21 +01:00