mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Add manual https repo fix instructions
Closes QubesOS/qubes-issues#3737
This commit is contained in:
parent
aa2f7e200d
commit
2a93dc53ab
@ -19,8 +19,8 @@ redirect_from:
|
|||||||
Installation Guide
|
Installation Guide
|
||||||
==================
|
==================
|
||||||
|
|
||||||
Warning
|
Warnings
|
||||||
-------
|
--------
|
||||||
|
|
||||||
There is a set of known upstream bugs in the Fedora installer that affect Qubes 3.2 ([Bug 1170803], [Bug 1374983], and [Bug 1268700]; tracked in Qubes issue [#2835]).
|
There is a set of known upstream bugs in the Fedora installer that affect Qubes 3.2 ([Bug 1170803], [Bug 1374983], and [Bug 1268700]; tracked in Qubes issue [#2835]).
|
||||||
This issue is fixed in Qubes 4.0.
|
This issue is fixed in Qubes 4.0.
|
||||||
@ -28,6 +28,35 @@ On Qubes 3.2, because of these bugs, the installer will try to access all existi
|
|||||||
Therefore, we *strongly* recommended that, prior to starting the Qubes installer, you physically disconnect all disks that you do not want to be modified.
|
Therefore, we *strongly* recommended that, prior to starting the Qubes installer, you physically disconnect all disks that you do not want to be modified.
|
||||||
Furthermore, if you are installing Qubes on a potentially compromised system, we *strongly* recommended that you wipe your target installation disk before starting the installer.
|
Furthermore, if you are installing Qubes on a potentially compromised system, we *strongly* recommended that you wipe your target installation disk before starting the installer.
|
||||||
|
|
||||||
|
In new installations of Qubes, the following steps may need to be applied in dom0 and Fedora 26 TemplateVMs in order to receive updates (see [#3737]).
|
||||||
|
|
||||||
|
Steps for dom0 updates:
|
||||||
|
|
||||||
|
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
|
||||||
|
2. Select `Terminal Emulator`.
|
||||||
|
3. In the window that opens, enter this command:
|
||||||
|
|
||||||
|
sudo nano /etc/yum.repos.d/qubes-dom0.repo
|
||||||
|
|
||||||
|
4. This opens the nano text editor. Change all four instances of `http` to `https`.
|
||||||
|
5. Press `CTRL+X`, then `Y`, then `ENTER` to save changes and exit.
|
||||||
|
6. Check for updates normally.
|
||||||
|
|
||||||
|
Steps for Fedora 26 TemplateVM updates:
|
||||||
|
|
||||||
|
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
|
||||||
|
2. Select `Template: fedora-26`, then `fedora-26: Terminal`.
|
||||||
|
3. In the window that opens, enter the command for your version:
|
||||||
|
|
||||||
|
[Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo
|
||||||
|
[Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo
|
||||||
|
|
||||||
|
4. This opens the gedit text editor in a window. Change all four instances of `http` to `https`.
|
||||||
|
5. Click the "Save" button in the top-right corner of the window.
|
||||||
|
6. Close the window.
|
||||||
|
7. Check for updates normally.
|
||||||
|
8. Shut down the TemplateVM.
|
||||||
|
|
||||||
|
|
||||||
Hardware Requirements
|
Hardware Requirements
|
||||||
---------------------
|
---------------------
|
||||||
@ -135,6 +164,7 @@ Getting Help
|
|||||||
[Bug 1374983]: https://bugzilla.redhat.com/show_bug.cgi?id=1374983
|
[Bug 1374983]: https://bugzilla.redhat.com/show_bug.cgi?id=1374983
|
||||||
[Bug 1268700]: https://bugzilla.redhat.com/show_bug.cgi?id=1268700
|
[Bug 1268700]: https://bugzilla.redhat.com/show_bug.cgi?id=1268700
|
||||||
[#2835]: https://github.com/QubesOS/qubes-issues/issues/2835
|
[#2835]: https://github.com/QubesOS/qubes-issues/issues/2835
|
||||||
|
[#3737]: https://github.com/QubesOS/qubes-issues/issues/3737
|
||||||
[system requirements]: /doc/system-requirements/
|
[system requirements]: /doc/system-requirements/
|
||||||
[Hardware Compatibility List]: /hcl/
|
[Hardware Compatibility List]: /hcl/
|
||||||
[live USB]: /doc/live-usb/
|
[live USB]: /doc/live-usb/
|
||||||
|
@ -39,6 +39,35 @@ Security Notes
|
|||||||
However, PV VMs migrated from any earlier 4.0 release candidate (RC1, RC2, or RC3) are not automatically set to PVH mode.
|
However, PV VMs migrated from any earlier 4.0 release candidate (RC1, RC2, or RC3) are not automatically set to PVH mode.
|
||||||
These must be set manually.
|
These must be set manually.
|
||||||
|
|
||||||
|
* The following steps may need to be applied in dom0 and Fedora 26 TemplateVMs in order to receive updates (see [#3737]).
|
||||||
|
|
||||||
|
Steps for dom0 updates:
|
||||||
|
|
||||||
|
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
|
||||||
|
2. Select `Terminal Emulator`.
|
||||||
|
3. In the window that opens, enter this command:
|
||||||
|
|
||||||
|
sudo nano /etc/yum.repos.d/qubes-dom0.repo
|
||||||
|
|
||||||
|
4. This opens the nano text editor. Change all four instances of `http` to `https`.
|
||||||
|
5. Press `CTRL+X`, then `Y`, then `ENTER` to save changes and exit.
|
||||||
|
6. Check for updates normally.
|
||||||
|
|
||||||
|
Steps for Fedora 26 TemplateVM updates:
|
||||||
|
|
||||||
|
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
|
||||||
|
2. Select `Template: fedora-26`, then `fedora-26: Terminal`.
|
||||||
|
3. In the window that opens, enter the command for your version:
|
||||||
|
|
||||||
|
[Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo
|
||||||
|
[Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo
|
||||||
|
|
||||||
|
4. This opens the gedit text editor in a window. Change all four instances of `http` to `https`.
|
||||||
|
5. Click the "Save" button in the top-right corner of the window.
|
||||||
|
6. Close the window.
|
||||||
|
7. Check for updates normally.
|
||||||
|
8. Shut down the TemplateVM.
|
||||||
|
|
||||||
Known issues
|
Known issues
|
||||||
------------
|
------------
|
||||||
|
|
||||||
@ -95,3 +124,4 @@ We also provide [detailed instruction][upgrade-to-r4.0] for this procedure.
|
|||||||
[upgrade-to-r4.0]: /doc/upgrade-to-r4.0/
|
[upgrade-to-r4.0]: /doc/upgrade-to-r4.0/
|
||||||
[locale-bug]: https://github.com/QubesOS/qubes-issues/issues/3753
|
[locale-bug]: https://github.com/QubesOS/qubes-issues/issues/3753
|
||||||
[keyboard-layout-bug]: https://github.com/QubesOS/qubes-issues/issues/3352
|
[keyboard-layout-bug]: https://github.com/QubesOS/qubes-issues/issues/3352
|
||||||
|
[#3737]: https://github.com/QubesOS/qubes-issues/issues/3737
|
||||||
|
Loading…
Reference in New Issue
Block a user