Commit Graph

814 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
2a0a180be9
qubes-anaconda-addon: clear salt minion cache before running configuration
Salt minion cache can be incomplete after initial installation. As it was
reported in #2213, just `qubesctl saltutil.sync_all` isn't enough to
refresh it in some cases - it may still lack of some files
(ext_module_qvm.py in this case). So, clear the cache completely before
initial configuration.

Fixes QubesOS/qubes-issues#2213
2016-08-05 11:23:56 +02:00
Marek Marczykowski-Górecki
d2988a8643
anaconda 23.19.10-4, lorax-templates-qubes 3.2.3, qubes-anaconda-addon 3.2.2 2016-07-19 01:42:11 +02:00
Marek Marczykowski-Górecki
be9f5b2163
Merge remote-tracking branch 'qubesos/pr/5'
* qubesos/pr/5:
  anaconda: fix encryption passphrase check
2016-07-19 01:38:30 +02:00
Brian C. Lane
cc03f3778d
Deselect all addons correctly (#1333505)
If depsolve failed with some (or all) addons selected it wasn't cleared
by deselecting all of them because the package and group set were never
cleared.

Add a check to skip this if the addons have not been changed (or never
set, as is the case with kickstart).

(cherry picked from commit 2ad90e9294517770372f82a14792379a49bec6a2 from
 anaconda)
Fixes QubesOS/qubes-issues#2105
2016-07-18 23:20:17 +02:00
Wojtek Porczyk
e22de13063 anaconda: fix encryption passphrase check
The installer checks if there is password for autopart. It should check
that only if autopart is actually in use.

QubesOS/qubes-issues#2180
2016-07-18 23:07:24 +02:00
Marek Marczykowski-Górecki
147941657f
anaconda: don't force non-encrypted /boot on coreboot systems
With grub payload it is possible to have all the partitions encrypted.

Based on patch by @tlaurion

Fixes QubesOS/qubes-issues#2118
2016-07-18 12:28:38 +02:00
Marek Marczykowski-Górecki
d8fab041cf
qubes-anaconda-addon: disable salt states after successful configuration
Fixes QubesOS/qubes-issues#2173
2016-07-16 16:28:19 +02:00
Marek Marczykowski-Górecki
2324cc88cb
qubes-anaconda-addon: don't set default netvm if wasn't created
Fixes QubesOS/qubes-issues#2142
2016-07-15 03:20:15 +02:00
Marek Marczykowski-Górecki
3fd02681bd
comps: install qubes-img-converter-dom0 by default
QubesOS/qubes-issues#1995
2016-07-14 03:31:24 +02:00
Marek Marczykowski-Górecki
221d6af261
lorax: fix "System Volume Information" directory creation
Fixes QubesOS/qubes-issues#2051
2016-07-14 02:36:33 +02:00
Marek Marczykowski-Górecki
57af9604e1
comps: drop "EXPERIMENTAL" from Xfce4 group name
QubesOS/qubes-issues#2119
2016-07-13 00:42:54 +02:00
Marek Marczykowski-Górecki
69c1a45e3a
comps: drop KDE from installation image
Fixes QubesOS/qubes-issues#2119
2016-07-13 00:42:54 +02:00
Marek Marczykowski-Górecki
f185b4db4d
travis: report output ISO size 2016-07-13 00:42:54 +02:00
Marek Marczykowski-Górecki
703a6edc98
anaconda: skip NTP installation and setup in dom0
Dom0 has no direct network access, to this doesn't make sense anyway.

Fixes QubesOS/qubes-issues#2110
2016-07-12 23:22:24 +02:00
Marek Marczykowski-Górecki
2b27cc5eba
comps: install qubes-usb-proxy-dom0 by default
This package isn't strictly required for qvm-usb to work, but contains
default ("deny all") policy to mute qrexec prompt. And tests.
2016-07-12 23:19:10 +02:00
Marek Marczykowski-Górecki
1db5b4d29f
comps: mark kernel-qubes-vm as required regardless of template rpms
Currently kernel-qubes-vm is pulled in by template rpms. Since dnf
automatically remove "unneeded" packages, it would also remove
kernel-qubes-vm with the last template rpm (which isn't necessary last
template in general). To prevent this, install kernel-qubes-vm
regardless of templates.

Fixes QubesOS/qubes-issues#2107
2016-07-12 23:19:10 +02:00
Marek Marczykowski-Górecki
17c7ac66de
comps: install xfce4-volumed by default
It is needed for volume keys working.
2016-06-30 00:23:11 +02:00
Marek Marczykowski-Górecki
59acc12b94
comps: move initial-setup out of kde/xfce groups
It isn't necessary for desktop environment as is, only for system
initial configuration. For example it doesn't make sense to install them
when adding some DE later.
2016-06-27 23:59:56 +02:00
Marek Marczykowski-Górecki
6be5ff7e55
lorax 23.20-4 2016-06-25 03:12:26 +02:00
Marek Marczykowski-Górecki
1a821a5f4c
qubes-release 3.2-0.26 2016-06-25 01:46:42 +02:00
Marek Marczykowski-Górecki
2d1aa3ffd5
comp: include kscreen by default
Fixes QubesOS/qubes-issues#2084
2016-06-25 01:45:13 +02:00
Marek Marczykowski-Górecki
d1443aef73
qubes-release: update release notes 2016-06-25 00:12:54 +02:00
Wojtek Porczyk
7e631b69bd lorax: Remove branding code
This code caused transient build failures when there is more than one
package that provides /etc/system-release _available_ in any of the
repositories, irrespective of _any_ dependecies whatsoever. The failure
is non-deterministic, because depends on the order of packages returned
by search query.

Automatic branding install is stupid anyway and should instead be done
by package groups, kickstarts and/or whatever. But it does not surprise
me at all, because this is package is maintained as part of Fedora/RH.

fixes QubesOS/qubes-issues#2076
2016-06-16 20:13:58 +02:00
Wojtek Porczyk
517abca516 Fix ipython package name for fc23 2016-06-16 18:02:07 +02:00
Wojtek Porczyk
2ba67bef58 kickstart file for building debug ISO 2016-06-16 14:58:39 +02:00
Marek Marczykowski-Górecki
9257165994
lorax-templates-qubes 3.2.2, pykickstart 2.13-3 2016-06-08 02:32:14 +02:00
Marek Marczykowski-Górecki
4a8eca2c45
Merge branch 'add-sysvolinfo'
* add-sysvolinfo:
  lorax: add "System Volume Information" to ESP image
2016-06-08 02:31:34 +02:00
Marek Marczykowski-Górecki
c990f6bd31
pykickstart: update dependency names
Because of https://bugzilla.redhat.com/show_bug.cgi?id=1342056,
python-requests name does no longer works. So adjust dependencies
according to new naming scheme.
2016-06-08 02:25:14 +02:00
Marek Marczykowski-Górecki
2ea4a511ff
lorax: allow '.' in image label
Otherwise "R3.2" will end up as "R3-2".
2016-06-08 02:20:57 +02:00
Marek Marczykowski-Górecki
c9a10727cf
lorax: add "System Volume Information" to ESP image
When installation image is written on Windows, it automatically (by the
OS) gets mounted and Windows create "System Volume Information" there.
This obviously means the installation media is modified and then fails
verification.
This is really wrong from the Windows side to automatically modify some
files behind users back. But since we can prevent this with really low
cost by just creating those files ourself and reduce a lot of user
confusion, just do it.

Thanks @pbatard for the help.

Fixes QubesOS/qubes-issues#2051
2016-06-07 17:18:58 +02:00
Marek Marczykowski-Górecki
8d5bab3f4c
anaconda 23.19.10-3, lorax-templates-qubes 3.2.1, qubes-anaconda-addon 3.2.1 2016-06-07 06:27:35 +02:00
Marek Marczykowski-Górecki
a88c7f0b61
anaconda: sync xen options in UEFI mode with legacy one 2016-06-07 06:12:07 +02:00
Marek Marczykowski-Górecki
72765538f7
anaconda: reset all services to default state
Some preset files may be installed when actual services are already
enabled/disabled. To not worry about package installation order, simply
reset all the services to default state when all the packages are
installed.

Fixes QubesOS/qubes-issues#2049
2016-06-06 02:28:47 +02:00
Marek Marczykowski-Górecki
6a8388e111
lorax: make sure qubes-artwork is installed
DNF based pungi isn't deterministic and sometimes chooses fedora-logos
(both provide system-logos). Make sure the right one is installed.

QubesOS/qubes-issues#1807
2016-06-06 00:59:38 +02:00
Marek Marczykowski-Górecki
1c80b74083
anaconda: drop useless on Qubes dependencies on network filesystems
Installing Qubes on network drive is not supported, so drop those
dependencies.
2016-06-06 00:58:32 +02:00
Marek Marczykowski-Górecki
8b37d08376
qubes-anaconda-addon: adjust mgmt stack usage
Salt-minion config is no longer generated using 'state.sls config', so
remove references to it. Instead make sure all modules are up to date in
cache (saltutil.sync_all).

Also make sure 'salt-minion' service is disabled (it is no longer
handled by config formula).

Additionally dom0 states are no longer in separate environment.

Slightly improve logging.
2016-06-06 00:58:03 +02:00
Marek Marczykowski-Górecki
7ff84cf133
anaconda: do not have any requirements on /boot in EFI mode
EFI boot uses only /boot/efi, so /boot may be even on encrypted volume,
LVM, btrfs or anything else. Instead of allowing just LVM, override the
whole check for /boot.

Fixes QubesOS/qubes-issues#1721
2016-06-05 22:21:03 +02:00
Marek Marczykowski-Górecki
12c2fd9720
qubes-release 3.2-0.25, lorax 23.20-3 2016-05-25 14:07:52 +02:00
Marek Marczykowski-Górecki
7875d31a8f
lorax: update package verification for dnf API
QubesOS/qubes-issues#1807
2016-05-25 11:25:54 +02:00
Marek Marczykowski-Górecki
7484fb2bb5
travis: update for R3.2
QubesOS/qubes-issues#1926
2016-05-25 10:39:06 +02:00
Marek Marczykowski-Górecki
194ba37fb5
qubes-release: add symlinks for R3.2 keys
QubesOS/qubes-issues#1807
2016-05-25 10:37:36 +02:00
Marek Marczykowski-Górecki
4288335086
Merge branch 'master' into fedora-23 2016-05-25 03:10:11 +02:00
Marek Marczykowski-Górecki
237aee86c5
travis: check if package verification really works
QubesOS/qubes-issues#1926
2016-05-25 02:03:04 +02:00
Marek Marczykowski-Górecki
798e008f7b
travis: Smaller output log
There is 4MB limit on total log size...

QubesOS/qubes-issues#1926
2016-05-25 01:48:53 +02:00
Marek Marczykowski-Górecki
ff0bb730bb
travis: add basic build test
QubesOS/qubes-issues#1926
2016-05-25 01:13:36 +02:00
Marek Marczykowski-Górecki
68ab062cde
Make build configuration (kickstart) configurable
QubesOS/qubes-issues#1926
2016-05-24 13:40:53 +02:00
Marek Marczykowski-Górecki
78c7484a7c
pungi 4.0.15, set epoch to 1000
QubesOS/qubes-issues#1807
2016-05-24 13:19:24 +02:00
Marek Marczykowski-Górecki
efb772a03a
qubes-release-3.2-0.24
Increase release number to 0.24, because upstream systemd package
conflicts with fedora-release<23-0.12.
Also cleanup transitional upgrade package.

QubesOS/qubes-issues#1807
2016-05-19 00:27:19 +02:00
Marek Marczykowski-Górecki
13f17526ed
anaconda 23.19.10-2, lorax-templates-qubes 3.2.0, lorax 23.20-2, qubes-anaconda-addon 3.2.0-1 2016-05-18 03:22:57 +02:00
Marek Marczykowski-Górecki
7e60c9884b
qubes-release 3.2-0.1 2016-05-18 03:19:17 +02:00