Commit Graph

827 Commits

Author SHA1 Message Date
Wojtek Porczyk
9f54dfbe54 pungi.spec: BuildRequires cvs for tests 2017-03-02 17:01:08 +01:00
Marek Marczykowski-Górecki
72911158da
Merge remote-tracking branch 'qubesos/pr/10'
* qubesos/pr/10:
  Make prompt reflect actual VMs to be created
2017-01-04 23:27:51 +01:00
Jean-Philippe Ouellet
3747bca7ba
Make prompt reflect actual VMs to be created 2016-12-21 21:00:28 -05:00
Marek Marczykowski-Górecki
49f6d9c819
qubes-anaconda-addon: adjust options for qvm-prefs/qubes-prefs
QubesOS/qubes-issues#2412
2016-11-02 22:25:54 +01:00
Marek Marczykowski-Górecki
32531edb26 Tag for commit 355e8d032e
-----BEGIN PGP SIGNATURE-----
 
 iQIcBAABAgAGBQJX/ybLAAoJEOfkVQE9BC6h/xUP/RjLRJTC/M+YSO1LYXzCaStS
 6SQggBxRhb1YRLyGHNSIkQNFsMSHmhlmqpOl16ULdiknOONpXnUyZm1xJmrHRui5
 RJqYRBL80uIcI0uGciVc73AO3D2c9yI/sUg8dBdyn0RNigBfirdxj7wzbbC88bwI
 zYb6n/QuVHO27M4ADB4y1s6ZzPFZbQL8et1ZpUUPsX/ChbA30fLwSdFvZyPMGPcg
 UURfDV+Mtarsu6nn4FMW6yvydvCsbuyp73zOsdfaWp+NtGB5Vna/poKpBog21SYQ
 t6RLAJDpGbFcOxCOoa+/UWXTrle5PGihvR+ulwFHcuLop1nUgydwcpxYv2JSHCOE
 eQRWAjGOUIcytO32ubbfRa6MqHjdX/lhO2NGCZsuz5ymuuWQdPEcmH7+Mg+kI5k+
 3wVJ+Ug75/c0wJ6AH7+YI0rp3rJq7HVYOBM/kpxIV6RXEL+8ICLujDBVAoNzvLqb
 fnhPGYo6nai2vWt1K88vWiXiEoYRRhdoVmsELOlU9FI4K0ohCJxlS9GXU/xAOFHK
 6LcmmWOSytaMEcza7iwNG0MGtai3hgbDfV74YWSTh2A3QFjiRLNMZkqlPffkgLKM
 R3bl8+x5Hh1h38jJPrCXaD0xU9iNsnM+PmSNHmB69zDxxhaBZ830HNYnjxWTDJxK
 zAZCdIAb91nNhiW5sLOu
 =igp8
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v2
 
 iQIcBAABCAAGBQJYBSEYAAoJEAY5OLpCz6ckXUkP/3BoC8DIN3W9PRr7PSNA1cbY
 WzGbrAFwg35iPH6kc8AlMsdKe5jYILHXUdjfZn1t/uvkPViFTj5sRO4AoImbv1/I
 nOP/vI5qB/p11R+Qi3JM4In72a7WdfvrLFN/HyLe0ohcs/wNo7w+Vj1Pl+AsbQ/c
 gTWe3+zFOjMCyGd7XeEl6NEhN8NMOkXsX4SXVxXcO0kSV32IGHQ2+zF59rbVLL0b
 jxSVqFywn9V9reTI0XEewdHSlSPpz3VthzeGyZgpcBKYTuTFhibyd5Nt0Rlm497D
 QotANeVP8BISUzpB3bULFUhHuEwCxf17HgryJSw9gH/qfTmddsC7G9XPhEgId+li
 XHPNp7Myh+mvjDXnStBd1uXGID5iCiU68YA9/40+slSJyy2dnBC5qhjySTIxZxeR
 xscqdPAUDz2BZrG0lj8Y6ZnDqRfBDaDW6H/09mIGJLSSXwsteKfyNnT4AAULmktI
 NCayToaZDDFDFJ2kQwGs+h/dnmRvh9d81sZLhVHcNzOxXxS6XzHAFrJ23/Ysb6Cx
 vt+IIsraqLGNuqTikxLpv5++hSCd8DKoN58mMeYkVcve6CL8ewXIZcoFula/FREv
 GKoLvPfTvmHYwEI4ZI3D4DTDffLKPR9psd1YKfbRhYg9SQ7SVCVswgjZ38IXWuU0
 zXoid7UavGgt2bIGUQOK
 =Lu40
 -----END PGP SIGNATURE-----

Merge tag 'jpo_g355e8d0'

Tag for commit 355e8d032e

# gpg: Signature made Thu 13 Oct 2016 08:16:43 AM CEST using RSA key ID E7E455013D042EA1
# gpg: Good signature from "Jean-Philippe Ouellet (Temporary Qubes OS signing key) <jpo@vt.edu>" [unknown]
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg:          There is no indication that the signature belongs to the owner.
# Primary key fingerprint: E6B7 1EE7 0211 437B 12D4  A49B E7E4 5501 3D04 2EA1
2016-10-17 21:06:00 +02:00
Jean-Philippe Ouellet
355e8d032e comps: install xorg-x11-drv-libinput by default
Libinput has superior input handling than default synaptics drivers.

Fixes https://github.com/QubesOS/qubes-issues/issues/2375
2016-10-13 02:12:12 -04:00
Marek Marczykowski-Górecki
2d273eb439
Merge remote-tracking branch 'qubesos/pr/7'
* qubesos/pr/7:
  live: fix kickstart file path
2016-09-22 11:07:36 +02:00
HW42
bf64e801ec live: fix kickstart file path 2016-09-22 05:41:34 +02:00
Marek Marczykowski-Górecki
4d1a471402
comps: install xfce4-pulseaudio-plugin instead of xfce4-volumed and mixer
xfce4-volumed is no longer maintained, so switch to pulseaudio plugin.

Fixes QubesOS/qubes-issues#2321
Fixes QubesOS/qubes-issues#2291
2016-09-16 00:03:25 +02:00
Marek Marczykowski-Górecki
6db292e3a0
Merge remote-tracking branch 'qubesos/pr/6'
* qubesos/pr/6:
  Fix crashing build
2016-09-03 20:16:24 +02:00
Marek Marczykowski-Górecki
e4cf87c537
anaconda: drop removed files from po/POTFILES.in
Fixes QubesOS/qubes-issues#2288
2016-09-02 19:18:13 +02:00
Bahtiar `kalkin-` Gadimov
1fc941eecf
Fix crashing build 2016-09-02 17:37:39 +02:00
Marek Marczykowski-Górecki
121e31cf70
qubes-anaconda-addon 3.2.3 2016-08-08 00:35:46 +02:00
Marek Marczykowski-Górecki
2a0a180be9
qubes-anaconda-addon: clear salt minion cache before running configuration
Salt minion cache can be incomplete after initial installation. As it was
reported in #2213, just `qubesctl saltutil.sync_all` isn't enough to
refresh it in some cases - it may still lack of some files
(ext_module_qvm.py in this case). So, clear the cache completely before
initial configuration.

Fixes QubesOS/qubes-issues#2213
2016-08-05 11:23:56 +02:00
Marek Marczykowski-Górecki
d2988a8643
anaconda 23.19.10-4, lorax-templates-qubes 3.2.3, qubes-anaconda-addon 3.2.2 2016-07-19 01:42:11 +02:00
Marek Marczykowski-Górecki
be9f5b2163
Merge remote-tracking branch 'qubesos/pr/5'
* qubesos/pr/5:
  anaconda: fix encryption passphrase check
2016-07-19 01:38:30 +02:00
Brian C. Lane
cc03f3778d
Deselect all addons correctly (#1333505)
If depsolve failed with some (or all) addons selected it wasn't cleared
by deselecting all of them because the package and group set were never
cleared.

Add a check to skip this if the addons have not been changed (or never
set, as is the case with kickstart).

(cherry picked from commit 2ad90e9294517770372f82a14792379a49bec6a2 from
 anaconda)
Fixes QubesOS/qubes-issues#2105
2016-07-18 23:20:17 +02:00
Wojtek Porczyk
e22de13063 anaconda: fix encryption passphrase check
The installer checks if there is password for autopart. It should check
that only if autopart is actually in use.

QubesOS/qubes-issues#2180
2016-07-18 23:07:24 +02:00
Marek Marczykowski-Górecki
147941657f
anaconda: don't force non-encrypted /boot on coreboot systems
With grub payload it is possible to have all the partitions encrypted.

Based on patch by @tlaurion

Fixes QubesOS/qubes-issues#2118
2016-07-18 12:28:38 +02:00
Marek Marczykowski-Górecki
d8fab041cf
qubes-anaconda-addon: disable salt states after successful configuration
Fixes QubesOS/qubes-issues#2173
2016-07-16 16:28:19 +02:00
Marek Marczykowski-Górecki
2324cc88cb
qubes-anaconda-addon: don't set default netvm if wasn't created
Fixes QubesOS/qubes-issues#2142
2016-07-15 03:20:15 +02:00
Marek Marczykowski-Górecki
3fd02681bd
comps: install qubes-img-converter-dom0 by default
QubesOS/qubes-issues#1995
2016-07-14 03:31:24 +02:00
Marek Marczykowski-Górecki
221d6af261
lorax: fix "System Volume Information" directory creation
Fixes QubesOS/qubes-issues#2051
2016-07-14 02:36:33 +02:00
Marek Marczykowski-Górecki
57af9604e1
comps: drop "EXPERIMENTAL" from Xfce4 group name
QubesOS/qubes-issues#2119
2016-07-13 00:42:54 +02:00
Marek Marczykowski-Górecki
69c1a45e3a
comps: drop KDE from installation image
Fixes QubesOS/qubes-issues#2119
2016-07-13 00:42:54 +02:00
Marek Marczykowski-Górecki
f185b4db4d
travis: report output ISO size 2016-07-13 00:42:54 +02:00
Marek Marczykowski-Górecki
703a6edc98
anaconda: skip NTP installation and setup in dom0
Dom0 has no direct network access, to this doesn't make sense anyway.

Fixes QubesOS/qubes-issues#2110
2016-07-12 23:22:24 +02:00
Marek Marczykowski-Górecki
2b27cc5eba
comps: install qubes-usb-proxy-dom0 by default
This package isn't strictly required for qvm-usb to work, but contains
default ("deny all") policy to mute qrexec prompt. And tests.
2016-07-12 23:19:10 +02:00
Marek Marczykowski-Górecki
1db5b4d29f
comps: mark kernel-qubes-vm as required regardless of template rpms
Currently kernel-qubes-vm is pulled in by template rpms. Since dnf
automatically remove "unneeded" packages, it would also remove
kernel-qubes-vm with the last template rpm (which isn't necessary last
template in general). To prevent this, install kernel-qubes-vm
regardless of templates.

Fixes QubesOS/qubes-issues#2107
2016-07-12 23:19:10 +02:00
Marek Marczykowski-Górecki
17c7ac66de
comps: install xfce4-volumed by default
It is needed for volume keys working.
2016-06-30 00:23:11 +02:00
Marek Marczykowski-Górecki
59acc12b94
comps: move initial-setup out of kde/xfce groups
It isn't necessary for desktop environment as is, only for system
initial configuration. For example it doesn't make sense to install them
when adding some DE later.
2016-06-27 23:59:56 +02:00
Marek Marczykowski-Górecki
6be5ff7e55
lorax 23.20-4 2016-06-25 03:12:26 +02:00
Marek Marczykowski-Górecki
1a821a5f4c
qubes-release 3.2-0.26 2016-06-25 01:46:42 +02:00
Marek Marczykowski-Górecki
2d1aa3ffd5
comp: include kscreen by default
Fixes QubesOS/qubes-issues#2084
2016-06-25 01:45:13 +02:00
Marek Marczykowski-Górecki
d1443aef73
qubes-release: update release notes 2016-06-25 00:12:54 +02:00
Wojtek Porczyk
7e631b69bd lorax: Remove branding code
This code caused transient build failures when there is more than one
package that provides /etc/system-release _available_ in any of the
repositories, irrespective of _any_ dependecies whatsoever. The failure
is non-deterministic, because depends on the order of packages returned
by search query.

Automatic branding install is stupid anyway and should instead be done
by package groups, kickstarts and/or whatever. But it does not surprise
me at all, because this is package is maintained as part of Fedora/RH.

fixes QubesOS/qubes-issues#2076
2016-06-16 20:13:58 +02:00
Wojtek Porczyk
517abca516 Fix ipython package name for fc23 2016-06-16 18:02:07 +02:00
Wojtek Porczyk
2ba67bef58 kickstart file for building debug ISO 2016-06-16 14:58:39 +02:00
Marek Marczykowski-Górecki
9257165994
lorax-templates-qubes 3.2.2, pykickstart 2.13-3 2016-06-08 02:32:14 +02:00
Marek Marczykowski-Górecki
4a8eca2c45
Merge branch 'add-sysvolinfo'
* add-sysvolinfo:
  lorax: add "System Volume Information" to ESP image
2016-06-08 02:31:34 +02:00
Marek Marczykowski-Górecki
c990f6bd31
pykickstart: update dependency names
Because of https://bugzilla.redhat.com/show_bug.cgi?id=1342056,
python-requests name does no longer works. So adjust dependencies
according to new naming scheme.
2016-06-08 02:25:14 +02:00
Marek Marczykowski-Górecki
2ea4a511ff
lorax: allow '.' in image label
Otherwise "R3.2" will end up as "R3-2".
2016-06-08 02:20:57 +02:00
Marek Marczykowski-Górecki
c9a10727cf
lorax: add "System Volume Information" to ESP image
When installation image is written on Windows, it automatically (by the
OS) gets mounted and Windows create "System Volume Information" there.
This obviously means the installation media is modified and then fails
verification.
This is really wrong from the Windows side to automatically modify some
files behind users back. But since we can prevent this with really low
cost by just creating those files ourself and reduce a lot of user
confusion, just do it.

Thanks @pbatard for the help.

Fixes QubesOS/qubes-issues#2051
2016-06-07 17:18:58 +02:00
Marek Marczykowski-Górecki
8d5bab3f4c
anaconda 23.19.10-3, lorax-templates-qubes 3.2.1, qubes-anaconda-addon 3.2.1 2016-06-07 06:27:35 +02:00
Marek Marczykowski-Górecki
a88c7f0b61
anaconda: sync xen options in UEFI mode with legacy one 2016-06-07 06:12:07 +02:00
Marek Marczykowski-Górecki
72765538f7
anaconda: reset all services to default state
Some preset files may be installed when actual services are already
enabled/disabled. To not worry about package installation order, simply
reset all the services to default state when all the packages are
installed.

Fixes QubesOS/qubes-issues#2049
2016-06-06 02:28:47 +02:00
Marek Marczykowski-Górecki
6a8388e111
lorax: make sure qubes-artwork is installed
DNF based pungi isn't deterministic and sometimes chooses fedora-logos
(both provide system-logos). Make sure the right one is installed.

QubesOS/qubes-issues#1807
2016-06-06 00:59:38 +02:00
Marek Marczykowski-Górecki
1c80b74083
anaconda: drop useless on Qubes dependencies on network filesystems
Installing Qubes on network drive is not supported, so drop those
dependencies.
2016-06-06 00:58:32 +02:00
Marek Marczykowski-Górecki
8b37d08376
qubes-anaconda-addon: adjust mgmt stack usage
Salt-minion config is no longer generated using 'state.sls config', so
remove references to it. Instead make sure all modules are up to date in
cache (saltutil.sync_all).

Also make sure 'salt-minion' service is disabled (it is no longer
handled by config formula).

Additionally dom0 states are no longer in separate environment.

Slightly improve logging.
2016-06-06 00:58:03 +02:00
Marek Marczykowski-Górecki
7ff84cf133
anaconda: do not have any requirements on /boot in EFI mode
EFI boot uses only /boot/efi, so /boot may be even on encrypted volume,
LVM, btrfs or anything else. Instead of allowing just LVM, override the
whole check for /boot.

Fixes QubesOS/qubes-issues#1721
2016-06-05 22:21:03 +02:00