qubes-installer-qubes-os/qubes-release
Marek Marczykowski-Górecki 578dc74879
qubes-release: provide system-release(releasever)
dnf do not support distroverpkg option to detect $relasever value.
Instead, it looks for a various packages, starting with
'system-release(releasever)', then 'system-release' and
'redhat-release'.
Until Fedora 29's dnf it took package version for $releasever value, but
starting with Fedora 29 it takes Provides value instead (it looks like
that code was in place before already, but for some reason it didn't worked).
Both 'redhat-release' and 'system-release' are set to base Fedora
version and needs to stay this way to satisfy Fedora's packages
dependencies. This means, $releasever was set to base Fedora version,
not Qubes version, which breaks repository urls.
Add 'system-release(releasever)' (which is checked first) with Qubes
version to solve this problem.

Fixes QubesOS/qubes-issues#4477
2018-11-12 23:33:15 +01:00
..
comps-qubes.xml qubes-release: install fedora-29 template by default 2018-11-02 15:53:18 +01:00
fedora-updates.repo.in qubes-release: fix fedora repositories 2018-09-10 15:16:34 +02:00
fedora.repo.in qubes-release: fix fedora repositories 2018-09-10 15:16:34 +02:00
GPL Renamed qubes-release and qubes-logos directories 2011-03-31 16:11:27 +02:00
qubes-dom0-dist-upgrade.spec Support Mock based build 2018-05-14 12:38:22 +02:00
qubes-dom0.repo.in qubes-release: drop https from onion urls 2018-09-06 19:17:43 +02:00
qubes-release.spec qubes-release: provide system-release(releasever) 2018-11-12 23:33:15 +01:00
qubes-templates.repo qubes-release: drop https from onion urls 2018-09-06 19:17:43 +02:00
README.Qubes-Release-Notes qubes-release: update release notes 2018-03-28 04:35:21 +02:00
RPM-GPG-KEY-fedora-25-primary qubes-release: add Fedora 25 key 2017-02-14 02:35:47 +01:00
RPM-GPG-KEY-qubes-3-primary qubes-release: update keys for R3 release 2014-11-20 16:40:37 +01:00
RPM-GPG-KEY-qubes-3-templates-community qubes-release: update keys for R3 release 2014-11-20 16:40:37 +01:00
RPM-GPG-KEY-qubes-3-unstable qubes-release: update keys for R3 release 2014-11-20 16:40:37 +01:00
RPM-GPG-KEY-qubes-3.1-primary qubes-release 3.1-0.1 2015-09-29 16:37:26 +02:00
RPM-GPG-KEY-qubes-3.1-templates-community qubes-release 3.1-0.1 2015-09-29 16:37:26 +02:00
RPM-GPG-KEY-qubes-3.1-unstable qubes-release 3.1-0.1 2015-09-29 16:37:26 +02:00
RPM-GPG-KEY-qubes-3.2-primary qubes-release: add symlinks for R3.2 keys 2016-05-25 10:37:36 +02:00
RPM-GPG-KEY-qubes-3.2-templates-community qubes-release: add symlinks for R3.2 keys 2016-05-25 10:37:36 +02:00
RPM-GPG-KEY-qubes-3.2-unstable qubes-release: add symlinks for R3.2 keys 2016-05-25 10:37:36 +02:00
RPM-GPG-KEY-qubes-4-primary qubes-release: Add Qubes 4.x release signing key 2017-04-08 13:48:37 +02:00
RPM-GPG-KEY-qubes-4-templates-community qubes-release: Add Qubes 4.0 community templates signing key 2017-09-14 11:44:32 +02:00
RPM-GPG-KEY-qubes-4-unstable qubes-release: add R4 unstable key 2017-11-03 22:08:57 +01:00
RPM-GPG-KEY-qubes-4.0-primary qubes-release: Add Qubes 4.x release signing key 2017-04-08 13:48:37 +02:00
RPM-GPG-KEY-qubes-4.0-templates-community qubes-release: Add Qubes 4.0 community templates signing key 2017-09-14 11:44:32 +02:00
RPM-GPG-KEY-qubes-4.0-unstable qubes-release: add R4 unstable key 2017-11-03 22:08:57 +01:00

Qubes R4.0 release notes
========================

New features since 3.2
----------------------

* Core management scripts rewrite with better structure and extensibility, [API documentation][api-doc]
* [Admin API][admin-api] allowing strictly controlled managing from non-dom0
* All `qvm-*` command-line tools rewritten, some options have changed
* Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM
* Use [PVH][qsb-37] and [HVM][hvm-switch] by default to [mitigate Meltdown & Spectre][qsb-37] and lower the [attack surface on Xen][qsb-24]
* Create USB VM by default
* [Multiple Disposable VMs templates support][dispvm-ticket]
* New [backup format][backup-format] using scrypt key-derivation function
* Non-encrypted backups no longer supported
* [split VM packages][packages-split], for better support minimal, specialized templates
* [Qubes Manager decomposition][manager-ticket] - domains and devices widgets instead of full Qubes Manager; devices widget support also USB
* [More flexible firewall interface][vm-interface] for ease unikernel integration
* Template VMs do not have network interface by default, [qrexec-based updates proxy][qrexec-proxy] is used instead
* More flexible IP addressing for VMs - [custom IP][custom-ip], [hidden from the IP][hide-ip]
* More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc]
* [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM
* Dom0 update to Fedora 25 for better hardware support
* Kernel 4.14.x

You can get detailed description in [completed github issues][github-release-notes]

Known issues
------------

* On some laptops (for example Librem 15v2), touchpad do not work directly after installation. Reboot the system to fix the issue.

* List of USB devices may contain device identifiers instead of name

* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug)

It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.

Downloads
---------

See [Qubes Downloads](https://www.qubes-os.org/downloads/).

Installation instructions
-------------------------

See [Installation Guide](https://www.qubes-os.org/doc/installation-guide/).

Upgrading
---------

There is no in-place upgrade path from earlier Qubes versions. The only
supported option to upgrade to Qubes R4.0 is to install it from scratch and use
[qubes backup and restore tools][backup] for migrating of all of the user VMs.


[backup]: https://www.qubes-os.org/doc/backup-restore/
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.0%22+label%3Arelease-notes+is%3Aclosed
[custom-ip]: https://github.com/QubesOS/qubes-issues/issues/1477
[hide-ip]: https://github.com/QubesOS/qubes-issues/issues/1143
[packages-split]: https://github.com/QubesOS/qubes-issues/issues/2771
[hvm-switch]: https://github.com/QubesOS/qubes-issues/issues/2185
[manager-ticket]: https://github.com/QubesOS/qubes-issues/issues/2132
[dispvm-ticket]: https://github.com/QubesOS/qubes-issues/issues/2253
[qrexec-proxy]: https://github.com/QubesOS/qubes-issues/issues/1854
[qrexec-policy-keywords]: https://github.com/QubesOS/qubes-issues/issues/865
[qrexec-confirm]: https://github.com/QubesOS/qubes-issues/issues/910
[qrexec-doc]: https://www.qubes-os.org/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
[vm-interface]: https://www.qubes-os.org/doc/vm-interface/
[admin-api]: https://www.qubes-os.org/news/2017/06/27/qubes-admin-api/
[qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
[qsb-37]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-037-2018.txt
[backup-format]: https://www.qubes-os.org/doc/backup-emergency-restore-v4/
[api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/