Separate UI from applying configuration by implementing proper
anaconda/kickstart addon. This have multiple benefits:
- entering settings window twice does not result in configuration being
applied multiple times
- all settings can be saved and loaded in kickstart file - this allows
automating this part of installation too
- it's much easier to implement other UI (text) for the same mechanism
There is one little catch: initial-setup (contrary to base anaconda)
does not provide graphical indicator for long-running system
configuration, so while configuration is progress, the UI is frozen.
Workaround this by re-using old progress dialog, but from kickstart
addon this time. This means the kickstart needs to know whether it's
running from GUI or not.
FixesQubesOS/qubes-issues#2433
(backported from R4.1, adjusted for older anaconda)
Blivet (storage library) reserve 20% of volume group space if there is
thin pool created. Include it in required space reporting.
QubesOS/qubes-issues#5345
This operation may be harmfull in many ways:
- may unintentionally modify a disk not selected as installation target
(mounting even read only replays journal for example)
- if previous system was compromised, it may try to exploit some of the
parsing code (filesystem driver etc) to survive across
re-installation
QubesOS/qubes-issues#2835
Revert few changes to make it compatible with fc25 (libblockdev-0.9,
anaconda-25). And manually backport get_thpool_meta_size function not
present in libblockdev-0.9. Besides that, drop patches already included
in this release.
This update, among other things, limit fsck calls on partitions not
selected for install/resize.
Tarball generated from upstream git checkout of
ee16c10d48724590aac5e0382ebc540195dc712d ("New version 2.1.11") by
calling "make archive".
QubesOS/qubes-issues#2835
to non-verbose boot options. This will avoid automatic plymouth switch
to "details" view - retaining nice graphical progress. And also will be
copied to the target system, with the same effect - nice graphical boot.
QubesOS/qubes-issues#3849
dnf do not support distroverpkg option to detect $relasever value.
Instead, it looks for a various packages, starting with
'system-release(releasever)', then 'system-release' and
'redhat-release'.
Until Fedora 29's dnf it took package version for $releasever value, but
starting with Fedora 29 it takes Provides value instead (it looks like
that code was in place before already, but for some reason it didn't worked).
Both 'redhat-release' and 'system-release' are set to base Fedora
version and needs to stay this way to satisfy Fedora's packages
dependencies. This means, $releasever was set to base Fedora version,
not Qubes version, which breaks repository urls.
Add 'system-release(releasever)' (which is checked first) with Qubes
version to solve this problem.
FixesQubesOS/qubes-issues#4477
Don't include all kernel-qubes-vm packages from qubes-dom0 repo, only
those explicitly placed in dom0-updates repo.
Also, do not include a copy of the newest one.
Removing elements from a list while iterating over it cause some
elements to be missed. Specifically, this caused /boot/efi to be skipped
and left unmodified.
Fix that by iterating over list copy.
FixesQubesOS/qubes-issues#3224
* origin/pr/27:
anaconda: autoreconf before configure as configure.ac is modified and autogen.sh is not present anymore
anaconda: update spec with autosetup
anaconda: switch to source + patches
Don't try to install kernel-modules-extra, which force Fedora's kernel.
Qubes kernel package is not split into several packages.
Also, don't install gfs2-utils (not needed in Qubes case) which is said
to pull kernel-debuginfo package.
FixesQubesOS/qubes-issues#3784
Defaults set during package installation do not apply, as booloader
configuration doesn't exist at that stage yet.
Reported by @rustybird
QubesOS/qubes-issues#4252
Use '*' in package name. This require using rpm -qa (instead of rpm -q).
In this case, checking exit code doesn't work, we need to check if any
package was actually listed.
This enables use of different mirrors. Specifify fastestmirror=1
explicitly for templates repository, as it has the biggest impact there.
QubesOS/qubes-issues#3935