Commit Graph

670 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
5a3df02a37
lorax: do not exclude HID drivers from installation image
Fixes QubesOS/qubes-issues#1516
2016-02-07 02:57:07 +01:00
Marek Marczykowski-Górecki
37a6a3d3c3
firstboot: disable "Back" button when applying configuration
There is no support in canceling operation, so simply disable this
button.

Fixes QubesOS/qubes-issues#1719
2016-02-06 00:23:38 +01:00
Marek Marczykowski-Górecki
dc1374cd95
firstboot: disable USB qube option when USB keyboard or disk is present
For keyboard is not totally imposibble to use it with USB qube, but it's
somehow harder to setup (and if something goes wrong, no keyboard will
be available). But currently if booted from USB disk, it is imposible to
work with USB qube then.

At the some time, slightly rework QubesChoice external conditions - have
them checked outside of the object, which make it easier to have
different message when such option is not available (and why).

Fixes QubesOS/qubes-issues#1649
Fixes QubesOS/qubes-issues#1630
2016-02-06 00:23:37 +01:00
Marek Marczykowski-Górecki
2838da02cf
anaconda: allow /boot on LVM in UEFI mode
Since all the required files are on ESP (and are loaded by xen.efi), we
don't need /boot accessible at all from there. This will in practice
allow to not have separate /boot at all.

Fixes QubesOS/qubes-issues#1721
2016-02-06 00:23:37 +01:00
Marek Marczykowski-Górecki
763098db0e
anaconda: use installer kernel parameters as default for installed system
This way if any kernel parameter was need to boot Qubes on particular
hardware, it will also be set to installed system

Fixes QubesOS/qubes-issues#1650
2016-02-06 00:23:37 +01:00
Marek Marczykowski-Górecki
dee1bfd3cb
lorax: add i915.preliminary_hw_support=1 to kernel parameters
Fixes QubesOS/qubes-issues#1668
2016-02-03 17:55:46 +01:00
Marek Marczykowski-Górecki
5f0c9a7565
lorax: add "verbose boot" - Grub2-efi
QubesOS/qubes-issues#1598
2016-02-03 17:55:04 +01:00
Marek Marczykowski-Górecki
a40327988c
lorax: add verbose mode in xen.cfg (UEFI)
QubesOS/qubes-issues#1598
2016-02-03 17:53:08 +01:00
Marek Marczykowski-Górecki
969e2df914
lorax: drop multi-kernel support - no longer used in R3.1 2016-02-03 17:52:56 +01:00
Marek Marczykowski-Górecki
930fbc776e
lorax: do not install firstboot in installation image
It should be installed only in target system. Not having it here, should
also drop the whole SaltStack from installation image and save some
space.
2016-02-03 17:52:10 +01:00
Marek Marczykowski-Górecki
a0a616733f
anaconda 20.25.16-11, firstboot 18.6-9, livecd-tools 20.6-3, lorax-templates-qubes 3.1.1 2015-11-29 04:22:59 +01:00
Marek Marczykowski-Górecki
3feb90eef2
firstboot: improve salt highstate error reporting
Full stdout/stderr is way to much to fit in that error message. Tell the
user where it can be found and what to do.
2015-11-29 04:19:39 +01:00
Marek Marczykowski-Górecki
aa8c80cbca
firstboot: start sys-usb
QubesOS/qubes-issues#704
2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
538d80186d
anaconda: disable crashkernel default options
We don't support it.
2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
c83c75b338
anaconda: include default kernel parameters in EFI setup
QubesOS/qubes-issues#794
2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
2da9f7c3ec
firstboot: fix whonix as default netvm option 2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
467402fee9
firstboot: improve wording of whonix as default netvm option 2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
cd1f03f40e
comps: install qubes-input-proxy by default
Useful for setup with USB VM

QubesOS/qubes-issues#704
2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
cf7d97a8af
lorax: include USB3.0 drivers in installer initramfs 2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
c4ee550b49
firstboot: improve error reporting 2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
ecac7cb908
firstboot: set default template to 'fedora-23' 2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
0032dc6597
comps: install Debian 8 and Whonix by default 2015-11-29 04:19:38 +01:00
Marek Marczykowski-Górecki
be52104454
firstboot: add an option to create USB VM
Fixes QubesOS/qubes-issues#704
2015-11-29 04:19:37 +01:00
Marek Marczykowski-Górecki
e6c2a93146
firstboot: add an option to route "all" the traffic through Tor 2015-11-27 23:02:38 +01:00
Marek Marczykowski-Górecki
6cc13889d0
comps: switch to Fedora 23 as default template 2015-11-27 23:02:02 +01:00
Marek Marczykowski-Górecki
156ae001fb
comps: drop qubes-dom0-debug group
Save some space on installation DVD.
2015-11-27 23:01:30 +01:00
Marek Marczykowski-Górecki
d98d7dbf94
firstboot: set 'Whonix' option to inactive when no Whonix templates installed
QubesOS/qubes-issues#1258
2015-11-23 19:10:45 +01:00
Marek Marczykowski-Górecki
cdd4294938
firstboot: use qvm-pci --add-class net for NetVM setup
Trying to reduce code duplication.
2015-11-23 19:09:53 +01:00
Marek Marczykowski-Górecki
3c25ca1d94
firstboot: since it now uses salt stack for configuration, add R: salt
QubesOS/qubes-issues#1258
2015-11-23 19:09:37 +01:00
Marek Marczykowski-Górecki
8f14f91b04
firstboot: enable Whonix setup by default if Whonix templates are installed
QubesOS/qubes-issues#1258
2015-11-23 19:09:37 +01:00
Marek Marczykowski-Górecki
875f3ee060
conf: include Whonix in installtion image
QubesOS/qubes-issues#1258
2015-11-23 19:09:37 +01:00
Marek Marczykowski-Górecki
a2456dd73b
firstboot: restore appmenus retrieval code
This part isn't (and probably shouldn't be) handled by salt.

QubesOS/qubes-issues#1258
2015-11-23 02:34:53 +01:00
Marek Marczykowski-Górecki
0417d5de56
firstboot: force salt-minion configuration refresh
It should be done at package installation time (%post script), but
unfortunately it isn't. Probably because of wrong order of scripts calls
(missin Requires(post) dependencies).

QubesOS/qubes-issues#1258
2015-11-23 02:27:18 +01:00
Wojtek Porczyk
be64e72d63 firstboot: use Qubes preconfiguration infrastructure 2015-11-21 01:54:07 +01:00
Marek Marczykowski-Górecki
84f61cbb6b
live: Include USB3.0 drivers
Fixes QubesOS/qubes-issues#1162
2015-11-04 01:17:07 +01:00
Marek Marczykowski-Górecki
1d4f49961c
anaconda: limit dom0 maxmem to 4GB to limit its overhead on big systems
Linux kernel have some memory overhead depending on maxmem. Dom0 isn't
meant to use that much memory (most should be assigned to AppVMs), so on
big systems this will be pure waste.

QubesOS/qubes-issues#1136
Fixes QubesOS/qubes-issues#1313
2015-10-10 00:33:13 +02:00
Marek Marczykowski-Górecki
c0f4d76a14
livecd-tools: add 'repo --ignoregroups' support
Apparently this option wass ignored by livecd-tools, so groups from
Fedora repositories came in.

QubesOS/qubes-issues#1018
2015-10-06 05:06:27 +02:00
Marek Marczykowski-Górecki
64167c525c
liveusb: restore plymouth in EFI initramfs
QubesOS/qubes-issues#794
2015-10-06 05:06:27 +02:00
Marek Marczykowski-Górecki
e5368d7da7
liveusb: handle both Debian and Fedora appmenus
Some applications are named differently, so we need a separate list.

QubesOS/qubes-issues#1018
QubesOS/qubes-issues#794
2015-10-06 05:06:27 +02:00
Marek Marczykowski-Górecki
588cbed78e
liveusb: set Fedora 21 as default template
QubesOS/qubes-issues#794
2015-10-06 05:06:27 +02:00
Marek Marczykowski-Górecki
e842046273
anaconda 20.25.16-10, livecd-tools 20.6-2, lorax-templates-qubes 3.1-1, pungi 3.03-2
Also set epoch ridiculously high for pungi and livecd-tools to make sure
we use versions with enabled signature checking.
2015-09-30 00:40:53 +02:00
Marek Marczykowski-Górecki
ae8d7dbdb4
qubes-release 3.1-0.1
'master' branch now points to next major release
2015-09-29 16:37:26 +02:00
Marek Marczykowski-Górecki
bab6aa2fa2
Merge branch 'efi'
* efi:
  lorax: disable debug output from xen and kernel
  lorax: make initrd back to work without ifcfg module
  lorax: efi: improve using ESP for 'root' device
  lorax: fix legacy mode boot after EFI initrd tinyfication
  lorax: Add rescue entry to grub2-efi.cfg
  lorax: Provide correct device information to xen.efi
  anaconda: use correct root= kernel parameter when creating EFI xen.cfg
  anaconda: workaround efibootmgr bug (SIGABRT while removing entries)
  anaconda: fix dracut module to work with reduced dependencies
  lorax: drop plymouth label plugin
  lorax: exclude SCSI and misc modules from UEFI initrd
  lorax: remove SecureBoot files - save some space in efiboot.img
  lorax: do not create macboot.img - it will be too big anyway
  lorax: remove network support from UEFI initrd
  lorax: select xen.cfg section to enable/disable media check
  lorax: disable UEFI Secure Boot shim
  pungi: do not use isohybrid --offset as it isn't compatible with EFI
  anaconda: generate xen efi configuration
  lorax: preliminary EFI support

QubesOS/qubes-issues#794
2015-09-29 16:11:59 +02:00
Marek Marczykowski-Górecki
0e6649b6a5
Merge branch 'liveusb'
* liveusb: (31 commits)
  livecd-tools: gitignore
  livecd-tools: apply patches for verifying downloaded packages
  livecd-tools: plug it into qubes-builder scripts
  livecd-tools: import unmodified package from Fedora 20
  makefile: remove legacy targets
  liveusb: EFI support
  live: remove automatic swap discovery
  live: place private.img of default VMs back on dm-snapshot device
  live: remove redundant livecd-creator --verbose flag
  live: disable (currently broken) EFI
  liveusb: fix package name in build-deps
  liveusb: use more friendly output image name
  liveusb: overlayfs doesn't support sparse files, use tmpfs directly
  liveusb: include default appmenus based on default fedora-21 template
  liveusb: use offline-mode of qubes-set-updates
  liveusb: mount /var/lib/qubes using overlayfs on tmpfs, instead of dm-snapshot
  liveusb: reset list of PCI devices assigned to sys-net before assigning new ones
  conf/liveusb: disable updates check - senseless on non-persistent system
  liveusb: use qvm-pci --offline-mode
  conf/liveusb: create default dispvm template
  ...

QubesOS/qubes-ossues#1018
2015-09-29 16:10:30 +02:00
Marek Marczykowski-Górecki
7ac6902f1e livecd-tools: gitignore 2015-09-29 03:36:59 +02:00
Marek Marczykowski-Górecki
8ec82b09f7 livecd-tools: apply patches for verifying downloaded packages
Livecd-creator is one more example of program which happily installs
whatever downloads from the network, without any verification
(repository metadata consistency doesn't count)...

Patches sent upstream here:
https://github.com/rhinstaller/livecd-tools/pull/14
2015-09-29 03:35:14 +02:00
Marek Marczykowski-Górecki
ea9d843368 livecd-tools: plug it into qubes-builder scripts 2015-09-29 03:29:36 +02:00
Marek Marczykowski-Górecki
75bc4dbee8 livecd-tools: import unmodified package from Fedora 20 2015-09-29 03:24:01 +02:00
Marek Marczykowski-Górecki
dbb8ebcbe5 makefile: remove legacy targets 2015-09-29 03:22:19 +02:00
Marek Marczykowski-Górecki
a8b97177ae
Merge branch 'pungi-gpgcheck' 2015-09-29 02:31:40 +02:00