diff --git a/README.md b/README.md index 452a6e6c..f2a814a4 100644 --- a/README.md +++ b/README.md @@ -40,7 +40,18 @@ Installing this project is involved. It requires an up-to-date Qubes 4.0 install Before trying to use this project, install [Qubes 4.0](https://www.qubes-os.org/downloads/) on your development machine. Accept the default VM configuration during the install process. -After installing Qubes, update your debian-9 template VM to include the latest version of the `qubes-kernel-vm-support` package. Open a terminal in the debian-9 VM and run: +After installing Qubes, you must update both dom0 and debian-9 template VM to include the latest version of the `qubes-kernel-vm-support` package. + +##### dom0 + +Open a terminal in dom0 by clicking on the Qubes menu top-right of the screen and left-clicking on Terminal Emulator and run: + +``` +sudo qubes-dom0-update +``` + +##### debian-9 +Open a terminal in the debian-9 TemplateVM and run: ``` sudo apt-get update @@ -70,7 +81,7 @@ Qubes provisioning is handled by Salt on `dom0`, so this project must be copied After that initial manual step, the code in your development VM may be copied into place on `dom0` by setting the `SECUREDROP_DEV_VM` and `SECUREDROP_DEV_DIR` environmental variables to reflect the VM and directory to which you've cloned this repo, and running `make clone` from the root of the project on `dom0`: ``` -export SECUREDROP_DEV_DIR=sd-dev # set to your dev VM +export SECUREDROP_DEV_DIR=work # set to your dev VM export SECUREDROP_DEV_DIR=/home/user/projects/securedrop-workstation # set to your working directory make clone ``` @@ -91,6 +102,25 @@ When the installation process completes, a number of new VMs will be available o sudo qubesctl top.disable sd-dispvm + +The error will contain the following informating in your dom0 terminal: + +``` +qfile-agent : Fatal error: File copy: Disk quota exceeded; Last file: <...> (error type: Disk quota exceeded) '/usr/lib/qubes/qrexec-client-vm dom0 qubes.Receiveupdates /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm' failed with exit code 1! +``` + +##### Upgrading `sys-net`, `sys-usb` and `sys-firewall` to fedora-28 + +Qubes 4.0 ships with end-of-life fedora-26 templates which are used by default for `sys-net`, `sys-firewall` and `sys-usb`. One needs to manually upgrade their `sys-net`, `sys-firewall` and `sys-usb` VMs to fedora-28. The following commands should be run for all three VMs: + +``` +qvm-kill sys-net +qvm-prefs sys-net template fedora-28 +qvm-start sys-net +``` + +Upon release, Qubes 4.0.1 will no longer ship fedora-26 templates, and the above steps will no longer be necessary. + #### Initial Use From the "Q" menu, open SecureDrop Client in the `sd-svs` machine.