-----BEGIN PGP SIGNATURE-----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=igp8
-----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=Lu40
-----END PGP SIGNATURE-----
Merge tag 'jpo_g355e8d0'
Tag for commit 355e8d032e
# gpg: Signature made Thu 13 Oct 2016 08:16:43 AM CEST using RSA key ID E7E455013D042EA1
# gpg: Good signature from "Jean-Philippe Ouellet (Temporary Qubes OS signing key) <jpo@vt.edu>" [unknown]
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg: There is no indication that the signature belongs to the owner.
# Primary key fingerprint: E6B7 1EE7 0211 437B 12D4 A49B E7E4 5501 3D04 2EA1
Salt minion cache can be incomplete after initial installation. As it was
reported in #2213, just `qubesctl saltutil.sync_all` isn't enough to
refresh it in some cases - it may still lack of some files
(ext_module_qvm.py in this case). So, clear the cache completely before
initial configuration.
FixesQubesOS/qubes-issues#2213
If depsolve failed with some (or all) addons selected it wasn't cleared
by deselecting all of them because the package and group set were never
cleared.
Add a check to skip this if the addons have not been changed (or never
set, as is the case with kickstart).
(cherry picked from commit 2ad90e9294517770372f82a14792379a49bec6a2 from
anaconda)
FixesQubesOS/qubes-issues#2105
Currently kernel-qubes-vm is pulled in by template rpms. Since dnf
automatically remove "unneeded" packages, it would also remove
kernel-qubes-vm with the last template rpm (which isn't necessary last
template in general). To prevent this, install kernel-qubes-vm
regardless of templates.
FixesQubesOS/qubes-issues#2107
It isn't necessary for desktop environment as is, only for system
initial configuration. For example it doesn't make sense to install them
when adding some DE later.
This code caused transient build failures when there is more than one
package that provides /etc/system-release _available_ in any of the
repositories, irrespective of _any_ dependecies whatsoever. The failure
is non-deterministic, because depends on the order of packages returned
by search query.
Automatic branding install is stupid anyway and should instead be done
by package groups, kickstarts and/or whatever. But it does not surprise
me at all, because this is package is maintained as part of Fedora/RH.
fixesQubesOS/qubes-issues#2076
When installation image is written on Windows, it automatically (by the
OS) gets mounted and Windows create "System Volume Information" there.
This obviously means the installation media is modified and then fails
verification.
This is really wrong from the Windows side to automatically modify some
files behind users back. But since we can prevent this with really low
cost by just creating those files ourself and reduce a lot of user
confusion, just do it.
Thanks @pbatard for the help.
FixesQubesOS/qubes-issues#2051
Some preset files may be installed when actual services are already
enabled/disabled. To not worry about package installation order, simply
reset all the services to default state when all the packages are
installed.
FixesQubesOS/qubes-issues#2049
DNF based pungi isn't deterministic and sometimes chooses fedora-logos
(both provide system-logos). Make sure the right one is installed.
QubesOS/qubes-issues#1807
Salt-minion config is no longer generated using 'state.sls config', so
remove references to it. Instead make sure all modules are up to date in
cache (saltutil.sync_all).
Also make sure 'salt-minion' service is disabled (it is no longer
handled by config formula).
Additionally dom0 states are no longer in separate environment.
Slightly improve logging.
EFI boot uses only /boot/efi, so /boot may be even on encrypted volume,
LVM, btrfs or anything else. Instead of allowing just LVM, override the
whole check for /boot.
FixesQubesOS/qubes-issues#1721