-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dom0 to Fedora 41 #9402
Labels
affects-4.3
This issue affects Qubes OS 4.3.
C: other
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
release notes
This issue should be mentioned in the release notes.
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
Comments
marmarek
added
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
affects-4.3
This issue affects Qubes OS 4.3.
labels
Aug 10, 2024
marmarek
added a commit
to marmarek/qubes-qubes-release
that referenced
this issue
Aug 10, 2024
marmarek
added a commit
to marmarek/qubes-qubes-release
that referenced
this issue
Aug 10, 2024
Leave out several irrelevant groups (network tools, unsupported desktop environments, productivity and media tools etc). This time, qubes-specific modifications (removing unneeded packages) is done by commenting them out (instead of removing) to make future updates easier. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-qubes-release
that referenced
this issue
Aug 10, 2024
Leave out several irrelevant groups (network tools, unsupported desktop environments, productivity and media tools etc). This time, qubes-specific modifications (removing unneeded packages) is done by commenting them out (instead of removing) to make future updates easier. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-qubes-release
that referenced
this issue
Aug 10, 2024
Leave out several irrelevant groups (network tools, unsupported desktop environments, productivity and media tools etc). This time, qubes-specific modifications (removing unneeded packages) is done by commenting them out (instead of removing) to make future updates easier. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-qubes-release
that referenced
this issue
Aug 10, 2024
Leave out several irrelevant groups (network tools, unsupported desktop environments, productivity and media tools etc). This time, qubes-specific modifications (removing unneeded packages) is done by commenting them out (instead of removing) to make future updates easier. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-qubes-release
that referenced
this issue
Aug 10, 2024
Leave out several irrelevant groups (network tools, unsupported desktop environments, productivity and media tools etc). This time, qubes-specific modifications (removing unneeded packages) is done by commenting them out (instead of removing) to make future updates easier. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-qubes-release
that referenced
this issue
Aug 11, 2024
Leave out several irrelevant groups (network tools, unsupported desktop environments, productivity and media tools etc). This time, qubes-specific modifications (removing unneeded packages) is done by commenting them out (instead of removing) to make future updates easier. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-blivet
that referenced
this issue
Aug 11, 2024
marmarek
added a commit
to marmarek/qubes-blivet
that referenced
this issue
Aug 11, 2024
marmarek
added a commit
to marmarek/qubes-blivet
that referenced
this issue
Aug 11, 2024
marmarek
added a commit
to marmarek/qubes-core-admin-linux
that referenced
this issue
Aug 11, 2024
In that case rely on a built-in default value (which is adjusted in the qubes package). QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-grub2
that referenced
this issue
Aug 12, 2024
mkfs in F41 enables metadata_csum feature, make grub tolerate it. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-anaconda
that referenced
this issue
Aug 12, 2024
marmarek
added a commit
to marmarek/qubes-core-admin-linux
that referenced
this issue
Aug 12, 2024
marmarek
added a commit
to marmarek/qubes-initial-setup
that referenced
this issue
Aug 12, 2024
And update spec based on initial-setup-0.3.101-1.fc41. This brings split for X11 and Wayland versions into separate subpackages. The X11 subpackage is not included in this build. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-anaconda
that referenced
this issue
Aug 12, 2024
marmarek
added a commit
to marmarek/qubes-anaconda
that referenced
this issue
Aug 12, 2024
marmarek
added a commit
to marmarek/qubes-anaconda
that referenced
this issue
Aug 12, 2024
marmarek
added a commit
to marmarek/qubes-anaconda
that referenced
this issue
Aug 12, 2024
marmarek
added a commit
to marmarek/qubes-anaconda
that referenced
this issue
Aug 13, 2024
marmarek
added a commit
to marmarek/qubes-anaconda
that referenced
this issue
Aug 13, 2024
marmarek
added a commit
to marmarek/qubes-anaconda-addon
that referenced
this issue
Aug 13, 2024
marmarek
added a commit
to marmarek/qubes-qubes-release
that referenced
this issue
Aug 13, 2024
Leave out several irrelevant groups (network tools, unsupported desktop environments, productivity and media tools etc). This time, qubes-specific modifications (removing unneeded packages) is done by commenting them out (instead of removing) to make future updates easier. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-initial-setup
that referenced
this issue
Aug 13, 2024
marmarek
added a commit
to marmarek/qubes-initial-setup
that referenced
this issue
Aug 13, 2024
And update spec based on initial-setup-0.3.101-1.fc41. This brings split for X11 and Wayland versions into separate subpackages. The X11 subpackage is not included in this build. Update patches, and add also a patch that unbreaks addons. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-initial-setup
that referenced
this issue
Aug 13, 2024
This was referenced Aug 24, 2024
This was referenced Aug 24, 2024
This was referenced Aug 24, 2024
This was referenced Aug 24, 2024
marmarek
added a commit
to QubesOS/qubes-release-configs
that referenced
this issue
Sep 4, 2024
marmarek
added a commit
to marmarek/qubes-desktop-linux-kde
that referenced
this issue
Sep 18, 2024
Fonts were added here in the past as it was the primary meta-package for qubes stuff. It's no longer the case for a long time. Furthermore Fedora 41 has proper meta-packages for fonts now. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-desktop-linux-kde
that referenced
this issue
Sep 19, 2024
It isn't relevant for Plasma 6 anymore QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Oct 7, 2024
It's now virxend service, not libvirtd. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Oct 7, 2024
libvirtd.service is the monolithic one, virtxend is modular one. Add After=virtxend.socket, as it uses socket activation now. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-desktop-linux-kde
that referenced
this issue
Oct 15, 2024
marmarek
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Oct 27, 2024
libvirtd.service is the monolithic one, virtxend and virtnodedevd are modular one. Add related After= dependencies to qubesd.service. This is especially necessary on shutdown, to allow shutting down VMs work before libvirt is stopped. QubesOS/qubes-issues#9402
marmarek
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Oct 27, 2024
libvirtd.service is the monolithic one, virtxend and virtnodedevd are modular one. Add related After= dependencies to qubesd.service. This is especially necessary on shutdown, to allow shutting down VMs work before libvirt is stopped. Add also remote-fs.target there, to cover all filesystem related units running already too. QubesOS/qubes-issues#9402
This was referenced Oct 27, 2024
fepitre
pushed a commit
to fepitre/qubes-core-admin
that referenced
this issue
Nov 4, 2024
libvirtd.service is the monolithic one, virtxend and virtnodedevd are modular one. Add related After= dependencies to qubesd.service. This is especially necessary on shutdown, to allow shutting down VMs work before libvirt is stopped. Add also remote-fs.target there, to cover all filesystem related units running already too. QubesOS/qubes-issues#9402
marmarek
added a commit
to QubesOS/qubes-linux-utils
that referenced
this issue
Dec 25, 2024
The former is removed in Python 3.13 QubesOS/qubes-issues#9402 (cherry picked from commit c67af4e)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
affects-4.3
This issue affects Qubes OS 4.3.
C: other
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
release notes
This issue should be mentioned in the release notes.
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
How to file a helpful issue
The problem you're addressing (if any)
Refresh dom0 in R4.3.
The solution you'd like
Update to Fedora 41 (to be released before R4.3)
The value to a user, and who that user might be
More recent software, better hardware support
Completion criteria checklist
(This section is for developer use only. Please do not modify it.)
The text was updated successfully, but these errors were encountered: