Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Migrate templates from rpmdb to qvm-template #7436

Closed
marmarek opened this issue Apr 12, 2022 · 6 comments · Fixed by QubesOS/qubes-core-admin-client#207
Closed

Migrate templates from rpmdb to qvm-template #7436

marmarek opened this issue Apr 12, 2022 · 6 comments · Fixed by QubesOS/qubes-core-admin-client#207
Labels
affects-4.1 This issue affects Qubes OS 4.1. C: core C: dist upgrade The code and tools that support upgrading in-place from one Qubes OS release to another diagnosed Technical diagnosis has been performed (see issue comments). P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. pr submitted A pull request has been submitted for this issue. r4.1-bookworm-stable r4.1-bullseye-stable r4.1-buster-stable r4.1-centos-stream8-stable r4.1-dom0-stable r4.1-fc34-stable r4.1-fc35-stable r4.1-fc36-stable

Comments

@marmarek
Copy link
Member

How to file a helpful issue

Qubes OS release

R4.1

Brief summary

After in-place upgrade, templates previously installed cannot be managed with qvm-template

Steps to reproduce

  1. Perform in-place upgrade from R4.0 to R4.1
  2. Try to use qvm-template info <name-of-template>

Expected behavior

Shows info about installed template.

Actual behavior

qvm-template: error: Template 'fedora-34' is not managed by qvm-template.

Originally reported at freedomofpress/securedrop-workstation#751 (comment)

@marmarek marmarek added T: bug C: core P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. labels Apr 12, 2022
@marmarek marmarek added this to the Release 4.1 updates milestone Apr 12, 2022
marmarek added a commit to marmarek/qubes-core-admin-client that referenced this issue Apr 12, 2022
@andrewdavidwong andrewdavidwong added diagnosed Technical diagnosis has been performed (see issue comments). pr submitted A pull request has been submitted for this issue. labels Apr 12, 2022
marmarek added a commit to marmarek/qubes-core-admin-client that referenced this issue Apr 12, 2022
marmarek added a commit to marmarek/qubes-core-admin-client that referenced this issue Apr 12, 2022
marmarek added a commit to marmarek/qubes-core-admin-client that referenced this issue Apr 12, 2022
marmarek added a commit to marmarek/qubes-core-admin-client that referenced this issue Apr 12, 2022
marmarek added a commit to marmarek/qubes-core-admin-client that referenced this issue Apr 12, 2022
marmarek added a commit to marmarek/qubes-dist-upgrade that referenced this issue Apr 12, 2022
@qubesos-bot
Copy link

Automated announcement from builder-github

The package core-admin-client has been pushed to the r4.1 testing repository for the CentOS centos-stream8 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.1-current-testing

Changes included in this update

@qubesos-bot
Copy link

Automated announcement from builder-github

The component core-admin-client (including package python3-qubesadmin-4.1.22-1.fc32) has been pushed to the r4.1 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot
Copy link

Automated announcement from builder-github

The package qubes-core-admin-client_4.1.22-1 has been pushed to the r4.1 testing repository for the Debian template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing buster-testing (or appropriate equivalent for your template version), then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

eloquence added a commit to freedomofpress/securedrop-workstation that referenced this issue Apr 18, 2022
QubesOS/qubes-issues#7436 is expected
to fully resolve. Switching to running qvm-template manually resolves
the issue in the meantime. Because anon-whonix also calls the Salt
state, removing it for now (we run it mainly to ensure that Whonix
is up-to-date, which won't be an issue until the next Debian
stable release).
eloquence added a commit to freedomofpress/securedrop-workstation that referenced this issue Apr 19, 2022
QubesOS/qubes-issues#7436 is expected
to fully resolve. Switching to running qvm-template manually resolves
the issue in the meantime. Because anon-whonix also calls the Salt
state, removing it for now (we run it mainly to ensure that Whonix
is up-to-date, which won't be an issue until the next Debian
stable release).
@qubesos-bot
Copy link

Automated announcement from builder-github

The package core-admin-client has been pushed to the r4.1 stable repository for the CentOS centos-stream8 template.
To install this update, please use the standard update command:

sudo yum update

Changes included in this update

@qubesos-bot
Copy link

Automated announcement from builder-github

The package qubes-core-admin-client_4.1.22-1+deb10u1 has been pushed to the r4.1 stable repository for the Debian template.
To install this update, please use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@qubesos-bot
Copy link

Automated announcement from builder-github

The component core-admin-client (including package python3-qubesadmin-4.1.22-1.fc32) has been pushed to the r4.1 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

@andrewdavidwong andrewdavidwong added the C: dist upgrade The code and tools that support upgrading in-place from one Qubes OS release to another label Jul 27, 2022
@andrewdavidwong andrewdavidwong added the affects-4.1 This issue affects Qubes OS 4.1. label Aug 8, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
affects-4.1 This issue affects Qubes OS 4.1. C: core C: dist upgrade The code and tools that support upgrading in-place from one Qubes OS release to another diagnosed Technical diagnosis has been performed (see issue comments). P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. pr submitted A pull request has been submitted for this issue. r4.1-bookworm-stable r4.1-bullseye-stable r4.1-buster-stable r4.1-centos-stream8-stable r4.1-dom0-stable r4.1-fc34-stable r4.1-fc35-stable r4.1-fc36-stable
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants