Skip to content

Commit

Permalink
Update readme with dom0 and template upgrade instructions
Browse files Browse the repository at this point in the history
  • Loading branch information
emkll committed Nov 14, 2018
1 parent 55ea887 commit 6c4d651
Showing 1 changed file with 32 additions and 2 deletions.
34 changes: 32 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,18 @@ Installing this project is involved. It requires an up-to-date Qubes 4.0 install

Before trying to use this project, install [Qubes 4.0](https://www.qubes-os.org/downloads/) on your development machine. Accept the default VM configuration during the install process.

After installing Qubes, update your debian-9 template VM to include the latest version of the `qubes-kernel-vm-support` package. Open a terminal in the debian-9 VM and run:
After installing Qubes, you must update both dom0 and debian-9 template VM to include the latest version of the `qubes-kernel-vm-support` package.

##### dom0

Open a terminal in dom0 by clicking on the Qubes menu top-right of the screen and left-clicking on Terminal Emulator and run:

```
sudo qubes-dom0-update
```

##### debian-9
Open a terminal in the debian-9 TemplateVM and run:

```
sudo apt-get update
Expand Down Expand Up @@ -70,7 +81,7 @@ Qubes provisioning is handled by Salt on `dom0`, so this project must be copied
After that initial manual step, the code in your development VM may be copied into place on `dom0` by setting the `SECUREDROP_DEV_VM` and `SECUREDROP_DEV_DIR` environmental variables to reflect the VM and directory to which you've cloned this repo, and running `make clone` from the root of the project on `dom0`:

```
export SECUREDROP_DEV_DIR=sd-dev # set to your dev VM
export SECUREDROP_DEV_DIR=work # set to your dev VM
export SECUREDROP_DEV_DIR=/home/user/projects/securedrop-workstation # set to your working directory
make clone
```
Expand All @@ -91,6 +102,25 @@ When the installation process completes, a number of new VMs will be available o

sudo qubesctl top.disable sd-dispvm


The error will contain the following informating in your dom0 terminal:

```
qfile-agent : Fatal error: File copy: Disk quota exceeded; Last file: <...> (error type: Disk quota exceeded) '/usr/lib/qubes/qrexec-client-vm dom0 qubes.Receiveupdates /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed with exit code 1!
```

##### Upgrading `sys-net`, `sys-usb` and `sys-firewall` to fedora-28

Qubes 4.0 ships with end-of-life fedora-26 templates which are used by default for `sys-net`, `sys-firewall` and `sys-usb`. One needs to manually upgrade their `sys-net`, `sys-firewall` and `sys-usb` VMs to fedora-28. The following commands should be run for all three VMs:

```
qvm-kill sys-net
qvm-prefs sys-net template fedora-28
qvm-start sys-net
```

Upon release, Qubes 4.0.1 will no longer ship fedora-26 templates, and the above steps will no longer be necessary.

#### Initial Use

From the "Q" menu, open SecureDrop Client in the `sd-svs` machine.
Expand Down

0 comments on commit 6c4d651

Please sign in to comment.