mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-12 08:16:42 -05:00
Reorganize files to account for new "External" section
QubesOS/qubes-issues#4693
This commit is contained in:
parent
5cc99a23d1
commit
d31c786942
203 changed files with 0 additions and 0 deletions
56
developer/releases/1.0/release-notes.md
Normal file
56
developer/releases/1.0/release-notes.md
Normal file
|
|
@ -0,0 +1,56 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R1.0 Release Notes
|
||||
permalink: /doc/releases/1.0/release-notes/
|
||||
redirect_from:
|
||||
- /en/doc/releases/1.0/release-notes/
|
||||
---
|
||||
|
||||
Qubes R1.0 Release Notes
|
||||
========================
|
||||
|
||||
Detailed release notes in [this blog post](http://blog.invisiblethings.org/2012/09/03/introducing-qubes-10.html).
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
- Installer might not support some USB keyboards (\#230). This seems to include all the Mac Book keyboards (most PC laptops have PS2 keyboards and are not affected).
|
||||
|
||||
- If you don't enable Composition (System Setting -\> Desktop -\> Enable desktop effects), which you really should do, then the KDE task bar might get ugly (e.g. half of it might be black). This is some KDE bug that we don't plan to fix.
|
||||
|
||||
- Some keyboard layout set by KDE System Settings can cause [keyboard not working at all](https://groups.google.com/group/qubes-devel/browse_thread/thread/77d076b65dda7226). If you hit this issue, you can switch to console (by console login option) and manually edit `/etc/X11/xorg.conf.d/00-system-setup-keyboard.conf` (and `/etc/sysconfig/keyboard`) and place correct keyboard layout settings (details in linked thread). You can check if specific keyboard layout settings are proper using `setxkbmap` tool.
|
||||
|
||||
- On systems with more than 8GB of RAM there is problem with DisposableVM. To fix it, limit maximum memory allocation for DispVM to 3GB
|
||||
|
||||
~~~
|
||||
qvm-prefs -s fedora-17-x64-dvm maxmem 3072
|
||||
qvm-create-default-dvm --default-template --default-script
|
||||
~~~
|
||||
|
||||
- On some systems the KDE Window Manager might freeze upon resuming from S3 sleep when compositing is enabled (and the only method to log in to the system if this happens is to switch to a text console, enter your user's password, kill the kwin process, go back to the Xorg console, log in, and start a new instance of kwin using Konsole application :) If you experience such problems, make sure to disable compositing before putting the system into sleep by pressing Alt-Ctrl-F12 (and then enabling it back once you log in after resume) -- this way you should never see this problem again.
|
||||
|
||||
Downloads
|
||||
---------
|
||||
|
||||
See [Qubes Downloads](/doc/QubesDownloads/).
|
||||
|
||||
Installation instructions
|
||||
-------------------------
|
||||
|
||||
See [Installation Guide](/doc/installation-guide/).
|
||||
|
||||
Upgrading
|
||||
---------
|
||||
|
||||
### From Qubes 1.0-rc1
|
||||
|
||||
If you're already running Qubes 1.0-rc1, you don't need to reinstall, it's just enough to update the packages in your Dom0 and the template VM(s). The easiest way for doing this is to click on the Update Button in the Qubes Manger -- one click when you selected Dom0, and one click for each of your template VM (by default there is just one template).
|
||||
|
||||
### From Qubes 1.0 Beta 3
|
||||
|
||||
If you have Qubes Beta 3 currently installed on your system, you must reinstall from scratch, as we offer no direct upgrade option in the installer (sorry). However, we do offer tools for smooth migration of your AppVMs. In order to do that, please backup your AppVMs using the `qvm-backup` tool [as usual](/doc/backup-restore/). Then, after you install Qubes 1.0 rc1, you can restore them using `qvm-backup-restore` tool. However, because we have changed the default template in RC1, you should tell qvm-back-restore about that by passing `--replace-template` option:
|
||||
|
||||
~~~
|
||||
qvm-backup-restore <backup_dir> --replace-template=fedora-15-x64:fedora-17-x64
|
||||
~~~
|
||||
|
||||
91
developer/releases/2.0/release-notes.md
Normal file
91
developer/releases/2.0/release-notes.md
Normal file
|
|
@ -0,0 +1,91 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R2.0 Release Notes
|
||||
permalink: /doc/releases/2.0/release-notes/
|
||||
redirect_from:
|
||||
- /en/doc/releases/2.0/release-notes/
|
||||
---
|
||||
|
||||
Qubes R2.0 Release Notes
|
||||
========================
|
||||
|
||||
Detailed release notes in [this blog post](http://blog.invisiblethings.org/2014/09/26/announcing-qubes-os-release-2.html)
|
||||
|
||||
New features since 1.0
|
||||
----------------------
|
||||
|
||||
* Support for generic fully virtualized VMs (without qemu in the TCB!)
|
||||
* Support for Windows-based AppVMs integration (clipboard, file exchange, qrexec, pv drivers)
|
||||
* Secure audio input to select AppVMs (Hello Skype users!)
|
||||
* Clipboard is now also controlled by central policies, unified with other qrexec policies.
|
||||
* Out of the box TorVM support
|
||||
* Experimental support for PVUSB
|
||||
* Updated Xorg packages in Dom0 to support new GPUs
|
||||
* DisposableVM customization support
|
||||
* Introduced Xfce 4.10 environment for Dom0 as an alternative to KDE
|
||||
* Advanced infrastructure for system backups
|
||||
* Ability to autostart selected VM at system startup
|
||||
* Support for dynamic screen resolution change
|
||||
* Dom0 distribution upgraded to Fedora 20
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
- On some graphics cards the Xfce4 Window Manager (one of the two supported Dom0 Windows Managers in Qubes R2, the other being KDE) might behave "strangely", e.g. decorations might not be drawn sometimes. Also the accompanying lightdm login manager might incorrectly display the wallpaper. If you're facing those problems, it's advisable to use the KDE Window Manager and kdm instead of Xfce4 and lightdm (this is default if one chooses the KDE only installation option in the installer).
|
||||
|
||||
- Some icons in the Qubes Manager application might not be drawn correctly when using the Xfce4 environment in Dom0. If this bothers you, please use the KDE environment instead.
|
||||
|
||||
- If your GPU is not correctly supported by the Dom0 kernel (e.g. the 3D desktop effects do not run smoothly) then you might experience "heaviness" with Windows 7-based AppVMs. In that case, please solve the problem with your GPU support in Dom0 in the first place (by using a different kernel), or install Qubes OS on a different system.
|
||||
|
||||
- Under some circumstances, Qubes backup can create broken backup, without any visible message (\#902). It is advisable to verify a backup to spot the problem. If you encounter this problem, backup VM directory manually.
|
||||
|
||||
- System shutdown sometimes is very slow (\#903). To mitigate the problem, shutdown all the VMs first.
|
||||
|
||||
- For other known issues take a look at [our trac tickets](https://wiki.qubes-os.org/query?status=accepted&status=assigned&status=new&status=reopened&type=defect&milestone=Release+2.1+(post+R2)&col=id&col=summary&col=status&col=type&col=priority&col=milestone&col=component&order=priority)
|
||||
|
||||
It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.
|
||||
|
||||
Downloads
|
||||
---------
|
||||
|
||||
See [Qubes Downloads](/doc/QubesDownloads/).
|
||||
|
||||
Installation instructions
|
||||
-------------------------
|
||||
|
||||
See [Installation Guide](/doc/installation-guide/).
|
||||
|
||||
Upgrading
|
||||
---------
|
||||
|
||||
### From Qubes R2 rc1
|
||||
|
||||
Upgrading from Qubes R2 rc1 should be a simple matter of installing updates for [dom0](/doc/software-update-dom0/) and [VMs](/doc/software-update-vm/).
|
||||
|
||||
### From Qubes R2 beta 3 and older
|
||||
|
||||
The easiest and safest way to upgrade to Qubes R2 (especially from older releases) is to install it from scratch and use [qubes backup and restore tools](/doc/backup-restore/) for migrating of all of the user VMs.
|
||||
|
||||
Users of R2 beta 3 can upgrade using procedure that has been described [here](/doc/upgrade-to-r2/).
|
||||
|
||||
Note: if the user has custom Template VMs (i.e. other than the default template, e.g. created from it by cloning), or Standalone VMs, then the user should perform manual upgrade from R2B3 to R2rc1, as described under the link given above.
|
||||
|
||||
### Migrating between beta releases
|
||||
|
||||
#### From Qubes R1 to R2 beta1
|
||||
|
||||
If you're already running Qubes Release 1, you don't need to reinstall, it's just enough to update the packages in your Dom0 and the template VM(s). This procedure is described [here?](/doc/upgrade-to-r2/).
|
||||
|
||||
#### From Qubes R1 or R2 Beta 1 to R2 beta2
|
||||
|
||||
Because of the distribution change in R2B2 (from fc13 to fc18) it's preferred that users reinstall Qubes R2B2 from scratch, and use [qubes backup and restore tools](/doc/backup-restore/) for migrating of all of the user VMs.
|
||||
|
||||
Advanced users (and advanced users only) can also try a manual upgrade procedure that has been described [here](/doc/upgrade-to-r2b2/). It's advisable to backup your VMs before proceeding anyway!
|
||||
|
||||
#### Upgrading from Qubes R1 or R2 Beta 2 to R2 beta 3
|
||||
|
||||
The easiest and safest way to upgrade to Qubes R2B3 is to install it from scratch and use [qubes backup and restore tools](/doc/backup-restore/) for migrating of all of the user VMs.
|
||||
|
||||
Users can also try a manual upgrade procedure that has been described [here](/doc/upgrade-to-r2b3/).
|
||||
|
||||
Note: if the user has custom Template VMs (i.e. other than the default template, e.g. created from it by cloning), or Standalone VMs, then the user should perform manual upgrade from R2B2 to R2B3, as described under the link given above.
|
||||
67
developer/releases/3.0/release-notes.md
Normal file
67
developer/releases/3.0/release-notes.md
Normal file
|
|
@ -0,0 +1,67 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R3.0 Release Notes
|
||||
permalink: /doc/releases/3.0/release-notes/
|
||||
redirect_from:
|
||||
- /en/doc/releases/3.0/release-notes/
|
||||
---
|
||||
|
||||
Qubes R3.0 Release Notes
|
||||
========================
|
||||
|
||||
This Qubes OS release is dedicated to the memory of Caspar Bowden.
|
||||
|
||||
New features since 2.0
|
||||
----------------------
|
||||
|
||||
* HAL (Hypervisor Abstraction Layer) - based on libvirt, opens a whole new
|
||||
possibilities of using different hypervisors. Currently Qubes OS uses Xen.
|
||||
* Xen 4.4 - many new features, but for us the most important is much more
|
||||
mature libxl toolstack.
|
||||
* Qrexec 3 - greatly improved performance by using direct VM-VM connections and
|
||||
bigger buffers.
|
||||
* Debian templates gets official support.
|
||||
* Whonix templates
|
||||
* Build system improvements - especially support for distribution-specific
|
||||
plugins (makes supporting multiple distributions much easier) and building
|
||||
templates using DispVM.
|
||||
* Automated tests - makes much easier to find bugs, before its even shipped to users
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
* Windows Tools: `qvm-block` does not work
|
||||
|
||||
* UEFI is not supported, you need to enable "legacy boot" in BIOS before installing Qubes OS
|
||||
|
||||
* Some icons in the Qubes Manager application might not be drawn correctly when using the Xfce4 environment in Dom0. If this bothers you, please use the KDE environment instead.
|
||||
|
||||
* If your GPU is not correctly supported by the Dom0 kernel (e.g. the 3D desktop effects do not run smoothly) then you might experience "heaviness" with Windows 7-based AppVMs. In that case, please solve the problem with your GPU support in Dom0 in the first place (by using a different kernel), or install Qubes OS on a different system.
|
||||
|
||||
* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+3.0%22+label%3Abug)
|
||||
|
||||
It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.
|
||||
|
||||
Downloads
|
||||
---------
|
||||
|
||||
See [Qubes Downloads](/doc/QubesDownloads/).
|
||||
|
||||
Installation instructions
|
||||
-------------------------
|
||||
|
||||
See [Installation Guide](/doc/installation-guide/).
|
||||
|
||||
Upgrading
|
||||
---------
|
||||
|
||||
### From R3.0 release candidate
|
||||
|
||||
If you are using Qubes R3.0rc1, R3.0rc2 or R3.0rc3, just install system updates, there is no special steps required.
|
||||
|
||||
### From R2.0 or earlier
|
||||
|
||||
The easiest and safest way to upgrade to Qubes R3.0 is to install it from scratch and use [qubes backup and restore tools](/doc/backup-restore/) for migrating of all of the user VMs.
|
||||
|
||||
Users of Qubes R2 can upgrade using [experimental procedure](/doc/upgrade-to-r3.0/).
|
||||
|
||||
16
developer/releases/3.0/schedule.md
Normal file
16
developer/releases/3.0/schedule.md
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R3.0 Release Schedule
|
||||
permalink: /doc/releases/3.0/schedule/
|
||||
redirect_from:
|
||||
- /en/doc/releases/3.0/schedule/
|
||||
---
|
||||
|
||||
Qubes R3.0 Release Schedule
|
||||
===========================
|
||||
|
||||
| Date | Stage |
|
||||
| -----------:| ------------------------------------- |
|
||||
| 5 Sep 2015 | current-testing freeze before 3.0-rc3 |
|
||||
| 15 Sep 2015 | 3.0-rc3 release |
|
||||
| 1 Oct 2015 | 3.0 release |
|
||||
76
developer/releases/3.1/release-notes.md
Normal file
76
developer/releases/3.1/release-notes.md
Normal file
|
|
@ -0,0 +1,76 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R3.1 release notes
|
||||
permalink: /doc/releases/3.1/release-notes/
|
||||
---
|
||||
|
||||
Qubes R3.1 release notes
|
||||
========================
|
||||
|
||||
New features since 3.0
|
||||
----------------------
|
||||
|
||||
* Management Stack based of Salt Stack in dom0 - [documentation][salt-doc]
|
||||
* Out of the box Whonix setup
|
||||
* UEFI support
|
||||
* LIVE edition (still alpha, not part of R3.1-rc1)
|
||||
* Updated GPU drivers in dom0
|
||||
* Colorful window application icons (instead of just colorful lock icon)
|
||||
* PV Grub support ([documentation][pvgrub-doc])
|
||||
* Out of the box USB VM setup, including [handling USB mouse][input-proxy]
|
||||
* Xen upgraded to 4.6, for better hardware support (especially Skylake platform)
|
||||
* Improve updates proxy flexibility - especially repositories served over HTTPS
|
||||
|
||||
You can get detailed description in [completed github issues][github-release-notes]
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
* Installation image does not fit on DVD, requires either DVD DL, or USB stick (5GB or more)
|
||||
|
||||
* Windows Tools: `qvm-block` does not work
|
||||
|
||||
* Some icons in the Qubes Manager application might not be drawn correctly when using the Xfce4 environment in Dom0. If this bothers you, please use the KDE environment instead.
|
||||
|
||||
* USB mouse (in the case of USB VM) does not work at first system startup (just after completing firstboot). Workaround: restart the system.
|
||||
|
||||
* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+3.1%22+label%3Abug)
|
||||
|
||||
It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.
|
||||
|
||||
Downloads
|
||||
---------
|
||||
|
||||
See [Qubes Downloads](/downloads/).
|
||||
|
||||
Installation instructions
|
||||
-------------------------
|
||||
|
||||
See [Installation Guide](/doc/installation-guide/).
|
||||
|
||||
Upgrading
|
||||
---------
|
||||
|
||||
### From R3.0
|
||||
|
||||
The easiest and safest way to upgrade to Qubes R3.1 is to install it from
|
||||
scratch and use [qubes backup and restore tools](/doc/backup-restore/) for
|
||||
migrating of all of the user VMs.
|
||||
|
||||
Users of Qubes R3.0 can upgrade using [experimental
|
||||
procedure](/doc/upgrade-to-r3.1/).
|
||||
|
||||
### From R2 or earlier
|
||||
|
||||
When upgrading from earlier versions the easiest and safest way is to install
|
||||
it from scratch and use [qubes backup and restore tools](/doc/backup-restore/)
|
||||
for migrating of all of the user VMs.
|
||||
|
||||
Alternatively you can [upgrade to R3.0
|
||||
using](/doc/releases/3.0/release-notes/#upgrading) first, then follow the
|
||||
instructions above. This will be time consuming process.
|
||||
|
||||
[salt-doc]: /doc/salt/
|
||||
[pvgrub-doc]: /doc/managing-vm-kernel/
|
||||
[input-proxy]: https://github.com/QubesOS/qubes-app-linux-input-proxy/blob/master/README.md
|
||||
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+3.1%22+label%3Arelease-notes+is%3Aclosed
|
||||
21
developer/releases/3.1/schedule.md
Normal file
21
developer/releases/3.1/schedule.md
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R3.1 Release Schedule
|
||||
permalink: /doc/releases/3.1/schedule/
|
||||
redirect_from:
|
||||
- /en/doc/releases/3.1/schedule/
|
||||
---
|
||||
|
||||
Qubes R3.1 Release Schedule
|
||||
===========================
|
||||
|
||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||
|
||||
| Date | Stage |
|
||||
| -----------:| --------------------------------------- |
|
||||
| 8 Dec 2015 | 3.1-rc1 release |
|
||||
| 5 Jan 2016 | current-testing freeze before 3.1-rc2 |
|
||||
| 12 Jan 2016 | 3.1-rc2 release |
|
||||
| 26 Jan 2016 | decide whether 3.1-rc2 is the final 3.1 |
|
||||
| 9 Feb 2016 | current-testing freeze before 3.1-rc3 |
|
||||
| <strike>16 Feb 2016</strike><br/>23 Feb 2016 | 3.1-rc3 release |
|
||||
77
developer/releases/3.2/release-notes.md
Normal file
77
developer/releases/3.2/release-notes.md
Normal file
|
|
@ -0,0 +1,77 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R3.2 release notes
|
||||
permalink: /doc/releases/3.2/release-notes/
|
||||
---
|
||||
|
||||
Qubes R3.2 release notes
|
||||
========================
|
||||
|
||||
New features since 3.1
|
||||
----------------------
|
||||
|
||||
* Management Stack extended to support in-VM configuration - [documentation][salt-doc]
|
||||
* PV USB - [documentation][usb]
|
||||
* Dom0 update to Fedora 23 for better hardware support
|
||||
* Kernel 4.4.x
|
||||
* Default desktop environment switched to Xfce4
|
||||
* KDE 5 support (but it is no longer the default one)
|
||||
* Tiling window managers support: awesome, [i3][i3]
|
||||
* More flexible Qubes RPC services - [related ticket][qrexec-argument], [documentation][qrexec-doc]
|
||||
|
||||
You can get detailed description in [completed github issues][github-release-notes]
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
* [Fedora 23 reached EOL in December 2016](https://fedoraproject.org/wiki/End_of_life). There is a [manual procedure to upgrade your VMs](/news/2018/01/06/fedora-26-upgrade/).
|
||||
|
||||
* Windows Tools: `qvm-block` does not work
|
||||
|
||||
* Some icons in the Qubes Manager application might not be drawn correctly when using the Xfce4 environment in Dom0. If this bothers you, please use the KDE environment instead.
|
||||
|
||||
* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+3.2%22+label%3Abug)
|
||||
|
||||
It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.
|
||||
|
||||
Downloads
|
||||
---------
|
||||
|
||||
See [Qubes Downloads](/downloads/).
|
||||
|
||||
Installation instructions
|
||||
-------------------------
|
||||
|
||||
See [Installation Guide](/doc/installation-guide/).
|
||||
After installation, [manually upgrade to Fedora 26](/news/2018/01/06/fedora-26-upgrade/).
|
||||
|
||||
Upgrading
|
||||
---------
|
||||
|
||||
### From R3.1
|
||||
|
||||
The easiest and safest way to upgrade to Qubes R3.2 is to install it from
|
||||
scratch and use [qubes backup and restore tools][backup] for
|
||||
migrating of all of the user VMs.
|
||||
|
||||
Users of Qubes R3.1 can also upgrade using [this
|
||||
procedure][upgrade].
|
||||
|
||||
### From R3.0 or earlier
|
||||
|
||||
When upgrading from earlier versions the easiest and safest way is to install
|
||||
it from scratch and use [qubes backup and restore tools][backup]
|
||||
for migrating of all of the user VMs.
|
||||
|
||||
Alternatively you can [upgrade to R3.1 using][upgrade-r3.1] first, then follow
|
||||
the instructions above. This will be time consuming process.
|
||||
|
||||
[salt-doc]: /doc/salt/
|
||||
[usb]: /doc/usb/
|
||||
[i3]: /doc/i3/
|
||||
[upgrade]: /doc/upgrade-to-r3.2/
|
||||
[upgrade-r3.1]: /doc/releases/3.1/release-notes/#upgrading
|
||||
[backup]: /doc/backup-restore/
|
||||
[qrexec-argument]: https://github.com/QubesOS/qubes-issues/issues/1876
|
||||
[qrexec-doc]: /doc/qrexec3/#service-argument-in-policy
|
||||
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+3.2%22+label%3Arelease-notes+is%3Aclosed
|
||||
23
developer/releases/3.2/schedule.md
Normal file
23
developer/releases/3.2/schedule.md
Normal file
|
|
@ -0,0 +1,23 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R3.2 Release Schedule
|
||||
permalink: /doc/releases/3.2/schedule/
|
||||
redirect_from:
|
||||
- /en/doc/releases/3.2/schedule/
|
||||
---
|
||||
|
||||
Qubes R3.2 Release Schedule
|
||||
===========================
|
||||
|
||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||
|
||||
| Date | Stage |
|
||||
| -----------:| --------------------------------------- |
|
||||
| 18 Jun 2016 | 3.2-rc1 release |
|
||||
| 2 Jul 2016 | decide whether 3.2-rc1 is the final 3.2 |
|
||||
| <strike>16 Jul 2016</strike><br/>20 Jul 2016 | current-testing freeze before 3.2-rc2 |
|
||||
| <strike>23 Jul 2016</strike><br/>27 Jul 2016 | 3.2-rc2 release |
|
||||
| <strike> 5 Aug 2016</strike><br/> 9 Aug 2016 | decide whether 3.2-rc2 is the final 3.2 |
|
||||
| 24 Aug 2016 | current-testing freeze before 3.2-rc3 |
|
||||
| 31 Aug 2016 | 3.2-rc3 release |
|
||||
| 29 Sep 2016 | 3.2 release |
|
||||
129
developer/releases/4.0/release-notes.md
Normal file
129
developer/releases/4.0/release-notes.md
Normal file
|
|
@ -0,0 +1,129 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R4.0 release notes
|
||||
permalink: /doc/releases/4.0/release-notes/
|
||||
---
|
||||
|
||||
Qubes R4.0 release notes
|
||||
========================
|
||||
|
||||
New features since 3.2
|
||||
----------------------
|
||||
|
||||
* Core management scripts rewrite with better structure and extensibility, [API documentation][api-doc]
|
||||
* [Admin API][admin-api] allowing strictly controlled managing from non-dom0
|
||||
* All `qvm-*` command-line tools rewritten, some options have changed
|
||||
* Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM
|
||||
* Use [PVH][qsb-37] and [HVM][hvm-switch] by default to [mitigate Meltdown & Spectre][qsb-37] and lower the [attack surface on Xen][qsb-24]
|
||||
* Create USB VM by default
|
||||
* [Multiple DisposableVMs templates support][dispvm-ticket]
|
||||
* New [backup format][backup-format] using scrypt key-derivation function
|
||||
* Non-encrypted backups no longer supported
|
||||
* [split VM packages][packages-split], for better support minimal, specialized templates
|
||||
* [Qubes Manager decomposition][manager-ticket] - domains and devices widgets instead of full Qubes Manager; devices widget support also USB
|
||||
* [More flexible firewall interface][vm-interface] for ease unikernel integration
|
||||
* Template VMs do not have network interface by default, [qrexec-based updates proxy][qrexec-proxy] is used instead
|
||||
* More flexible IP addressing for VMs - [custom IP][custom-ip], [hidden from the IP][hide-ip]
|
||||
* More flexible Qubes RPC policy - [related ticket][qrexec-policy-keywords], [documentation][qrexec-doc]
|
||||
* [New Qubes RPC confirmation window][qrexec-confirm], including option to specify destination VM
|
||||
* [New storage subsystem design][storage]
|
||||
* Dom0 update to Fedora 25 for better hardware support
|
||||
* Kernel 4.9.x
|
||||
|
||||
You can get detailed description in [completed github issues][github-release-notes]
|
||||
|
||||
Security Notes
|
||||
--------------
|
||||
|
||||
* PV VMs migrated from 3.2 to 4.0-rc4 or later are automatically set to PVH mode in order to protect against Meltdown (see [QSB #37][qsb-37]).
|
||||
However, PV VMs migrated from any earlier 4.0 release candidate (RC1, RC2, or RC3) are not automatically set to PVH mode.
|
||||
These must be set manually.
|
||||
|
||||
* The following steps may need to be applied in dom0 and Fedora 26 TemplateVMs in order to receive updates (see [#3737]).
|
||||
|
||||
Steps for dom0 updates:
|
||||
|
||||
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
|
||||
2. Select `Terminal Emulator`.
|
||||
3. In the window that opens, enter this command:
|
||||
|
||||
sudo nano /etc/yum.repos.d/qubes-dom0.repo
|
||||
|
||||
4. This opens the nano text editor. Change all four instances of `http` to `https`.
|
||||
5. Press `CTRL+X`, then `Y`, then `ENTER` to save changes and exit.
|
||||
6. Check for updates normally.
|
||||
|
||||
Steps for Fedora 26 TemplateVM updates:
|
||||
|
||||
1. Open the Qubes Menu by clicking on the "Q" icon in the top-left corner of the screen.
|
||||
2. Select `Template: fedora-26`, then `fedora-26: Terminal`.
|
||||
3. In the window that opens, enter the command for your version:
|
||||
|
||||
[Qubes 3.2] sudo gedit /etc/yum.repos.d/qubes-r3.repo
|
||||
[Qubes 4.0] sudo gedit /etc/yum.repos.d/qubes-r4.repo
|
||||
|
||||
4. This opens the gedit text editor in a window. Change all four instances of `http` to `https`.
|
||||
5. Click the "Save" button in the top-right corner of the window.
|
||||
6. Close the window.
|
||||
7. Check for updates normally.
|
||||
8. Shut down the TemplateVM.
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
* Locale using coma as decimal separator [crashes qubesd][locale-bug]. Either install with different locale (English (United States) for example), or manually apply fix explained in that issue.
|
||||
|
||||
* In the middle of installation, [keyboard layout reset to US][keyboard-layout-bug]. Be careful what is the current layout while setting default user password (see upper right screen corner).
|
||||
|
||||
* On some laptops (for example Librem 15v2), touchpad do not work directly after installation. Reboot the system to fix the issue.
|
||||
|
||||
* List of USB devices may contain device identifiers instead of name
|
||||
|
||||
* With R4.0.1, which ships kernel-4.19, you may never reach the anaconda startup and be block on an idle black screen with blinking cursor. You can try to add `plymouth.ignore-serial-consoles` in the grub installer boot menu right after `quiet rhgb`. With legacy mode, you can do it directly when booting the DVD or USB key. In UEFI mode, follow the same procedure described for [disabling](https://www.qubes-os.org/doc/uefi-troubleshooting/#installation-freezes-before-getting-to-anaconda-qubes-40) `nouveau` module (related [solved issue](https://github.com/QubesOS/qubes-issues/issues/3849) in further version of Qubes).
|
||||
|
||||
* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug)
|
||||
|
||||
It is advised to install updates just after system installation to apply bug fixes for (some of) the above problems.
|
||||
|
||||
Downloads
|
||||
---------
|
||||
|
||||
See [Qubes Downloads](/downloads/).
|
||||
|
||||
Installation instructions
|
||||
-------------------------
|
||||
|
||||
See [Installation Guide](/doc/installation-guide/).
|
||||
|
||||
Upgrading
|
||||
---------
|
||||
|
||||
There is no in-place upgrade path from earlier Qubes versions. The only
|
||||
supported option to upgrade to Qubes R4.0 is to install it from scratch and use
|
||||
[qubes backup and restore tools][backup] for migrating of all of the user VMs.
|
||||
We also provide [detailed instruction][upgrade-to-r4.0] for this procedure.
|
||||
|
||||
|
||||
[backup]: /doc/backup-restore/
|
||||
[github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.0%22+label%3Arelease-notes+is%3Aclosed
|
||||
[custom-ip]: https://github.com/QubesOS/qubes-issues/issues/1477
|
||||
[hide-ip]: https://github.com/QubesOS/qubes-issues/issues/1143
|
||||
[packages-split]: https://github.com/QubesOS/qubes-issues/issues/2771
|
||||
[hvm-switch]: https://github.com/QubesOS/qubes-issues/issues/2185
|
||||
[manager-ticket]: https://github.com/QubesOS/qubes-issues/issues/2132
|
||||
[dispvm-ticket]: https://github.com/QubesOS/qubes-issues/issues/2253
|
||||
[qrexec-proxy]: https://github.com/QubesOS/qubes-issues/issues/1854
|
||||
[qrexec-policy-keywords]: https://github.com/QubesOS/qubes-issues/issues/865
|
||||
[qrexec-confirm]: https://github.com/QubesOS/qubes-issues/issues/910
|
||||
[qrexec-doc]: /doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
|
||||
[storage]: https://github.com/QubesOS/qubes-issues/issues/1842
|
||||
[vm-interface]: /doc/vm-interface/
|
||||
[admin-api]: /news/2017/06/27/qubes-admin-api/
|
||||
[qsb-24]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
|
||||
[qsb-37]: https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-037-2018.txt
|
||||
[backup-format]: /doc/backup-emergency-restore-v4/
|
||||
[api-doc]: https://dev.qubes-os.org/projects/qubes-core-admin/en/latest/
|
||||
[upgrade-to-r4.0]: /doc/upgrade-to-r4.0/
|
||||
[locale-bug]: https://github.com/QubesOS/qubes-issues/issues/3753
|
||||
[keyboard-layout-bug]: https://github.com/QubesOS/qubes-issues/issues/3352
|
||||
[#3737]: https://github.com/QubesOS/qubes-issues/issues/3737
|
||||
29
developer/releases/4.0/schedule.md
Normal file
29
developer/releases/4.0/schedule.md
Normal file
|
|
@ -0,0 +1,29 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Qubes R4.0 Release Schedule
|
||||
permalink: /doc/releases/4.0/schedule/
|
||||
redirect_from:
|
||||
- /en/doc/releases/4.0/schedule/
|
||||
---
|
||||
|
||||
Qubes R4.0 Release Schedule
|
||||
===========================
|
||||
|
||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||
|
||||
| Date | Stage |
|
||||
| -----------:| --------------------------------------- |
|
||||
| 31 Jul 2017 | 4.0-rc1 release |
|
||||
| <strike>28 Aug 2017</strike><br/><strike>11 Sep 2017</strike><br/><strike>9 Oct 2017</strike><br/>18 Oct 2017 | current-testing freeze before 4.0-rc2 |
|
||||
| <strike> 4 Sep 2017</strike><br/><strike>18 Sep 2017</strike><br/><strike>16 Oct 2017</strike><br/>23 Oct 2017 | 4.0-rc2 release |
|
||||
| 6 Nov 2017 | decide whether 4.0-rc2 is the final 4.0 |
|
||||
| 20 Nov 2017 | current-testing freeze before 4.0-rc3 |
|
||||
| 27 Nov 2017 | 4.0-rc3 release |
|
||||
| 11 Dec 2017 | decide whether 4.0-rc3 is the final 4.0 |
|
||||
| 1 Jan 2018 | current-testing freeze before 4.0-rc4 |
|
||||
| <strike>8 Jan 2018</strike><br/>31 Jan 2018 | 4.0-rc4 release |
|
||||
| <strike>22 Jan 2018</strike><br/>14 Feb 2018 | decide whether 4.0-rc4 is the final 4.0 |
|
||||
| 27 Feb 2018 | current-testing freeze before 4.0-rc5 |
|
||||
| 6 Mar 2018 | 4.0-rc5 release |
|
||||
| 20 Mar 2018 | decide whether 4.0-rc5 is the final 4.0 |
|
||||
| 28 Mar 2018 | final 4.0 release |
|
||||
16
developer/releases/notes.md
Normal file
16
developer/releases/notes.md
Normal file
|
|
@ -0,0 +1,16 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Release Notes
|
||||
permalink: /doc/releases/notes/
|
||||
---
|
||||
|
||||
Release Notes
|
||||
=============
|
||||
|
||||
* [Qubes R1.0 release notes](/doc/releases/1.0/release-notes/)
|
||||
* [Qubes R2.0 release notes](/doc/releases/2.0/release-notes/)
|
||||
* [Qubes R3.0 release notes](/doc/releases/3.0/release-notes/)
|
||||
* [Qubes R3.1 release notes](/doc/releases/3.1/release-notes/)
|
||||
* [Qubes R3.2 release notes](/doc/releases/3.2/release-notes/)
|
||||
* [Qubes R4.0 release notes](/doc/releases/4.0/release-notes/)
|
||||
|
||||
14
developer/releases/schedules.md
Normal file
14
developer/releases/schedules.md
Normal file
|
|
@ -0,0 +1,14 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Release Schedules
|
||||
permalink: /doc/releases/schedules/
|
||||
---
|
||||
|
||||
Release Schedules
|
||||
=================
|
||||
|
||||
* [Qubes R3.0 release schedule](/doc/releases/3.0/schedule/)
|
||||
* [Qubes R3.1 release schedule](/doc/releases/3.1/schedule/)
|
||||
* [Qubes R3.2 release schedule](/doc/releases/3.2/schedule/)
|
||||
* [Qubes R4.0 release schedule](/doc/releases/4.0/schedule/)
|
||||
|
||||
40
developer/releases/todo.md
Normal file
40
developer/releases/todo.md
Normal file
|
|
@ -0,0 +1,40 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Release Checklist
|
||||
permalink: /doc/releases/todo/
|
||||
redirect_from:
|
||||
- /en/doc/releases/todo/
|
||||
---
|
||||
|
||||
Release Checklist
|
||||
=================
|
||||
|
||||
*the checklist is probably unfinished*
|
||||
|
||||
On -rc1
|
||||
-------
|
||||
* write schedule
|
||||
* create package repositories (linux-yum, linux-deb)
|
||||
* update repository definition (core-agent-linux, installer-qubes-os/qubes-release)
|
||||
* push all packages to `current-testing`
|
||||
* draft release notes, one note per feature
|
||||
* create upgrade package in previous release branch (r2->r3.0, r3.0->r3.1, etc) - core-agent-linux
|
||||
* make sure that keys for the current release are included in previous release's qubes-release package (for upgrade)
|
||||
* build ISO and push to mirrors
|
||||
|
||||
On subsequent -rc
|
||||
-----------------
|
||||
* push packages to `current`
|
||||
* update release notes
|
||||
* build ISO and push to mirrors
|
||||
* notify @Rudd-O about the new ISO for new torrent hosting
|
||||
|
||||
On final release
|
||||
----------------
|
||||
* push packages to `current`
|
||||
* finish release notes
|
||||
* update InstallationInstructions
|
||||
* build ISO and push to mirrors
|
||||
* notify @Rudd-O about the new ISO for new torrent hosting
|
||||
* write blog post
|
||||
* announce on Twitter
|
||||
Loading…
Add table
Add a link
Reference in a new issue