mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-12 09:14:20 -05:00
3806ecf338
Those are redundant, and yaml parser strips them in fact. By removing them, loading and saving yaml file without any change indeed produce the same output. This is useful for prepare_for_translation.py script (which adds lang and ref tags) - to produce only change that indeed was made.
124 lines
4.0 KiB
Markdown
124 lines
4.0 KiB
Markdown
---
|
|
lang: en
|
|
layout: doc
|
|
permalink: /doc/upgrade-to-r3.1/
|
|
redirect_from:
|
|
- /en/doc/upgrade-to-r3.1/
|
|
- /doc/UpgradeToR3.1/
|
|
- /doc/UpgradeToR3.1rc1/
|
|
ref: 155
|
|
title: Upgrading to R3.1
|
|
---
|
|
|
|
**Before attempting either an in-place upgrade or a clean installation, we
|
|
strongly recommend that users [back up their systems](/doc/backup-restore/).**
|
|
|
|
Current Qubes R3.0 systems can be upgraded in-place to the latest R3.1
|
|
by following the procedure below.
|
|
|
|
## Upgrade all Template and Standalone VM(s)
|
|
|
|
By default, in Qubes R3.0, there is only one template. However, users are
|
|
free to create more templates for special purposes, as well as standalones.
|
|
More information on using multiple templates, as well as standalones, can be
|
|
found [here](/doc/software-update-vm/). The steps described in this
|
|
section should be repeated in **all** the user's Template and Standalone VMs.
|
|
|
|
### Upgrade Fedora templates:
|
|
|
|
1. Open a terminal in the template (or standalone). (E.g., use Qubes VM
|
|
Manager's right-click menu, choose "Run Command in VM," and type
|
|
`gnome-terminal` there.)
|
|
|
|
2. Install the `qubes-upgrade-vm` package:
|
|
|
|
```
|
|
sudo yum install qubes-upgrade-vm
|
|
```
|
|
|
|
3. Proceed with a normal upgrade in the template:
|
|
|
|
```
|
|
sudo yum upgrade
|
|
```
|
|
|
|
4. Shut down the template.
|
|
|
|
### Upgrade Debian (and Whonix) templates:
|
|
|
|
1. Open a terminal in the template (or standalone). (E.g., use Qubes VM
|
|
Manager's right-click menu, choose "Run Command in VM," and type
|
|
`gnome-terminal` there.)
|
|
|
|
2. Update repository definition:
|
|
|
|
```
|
|
sudo cp /etc/apt/sources.list.d/qubes-r3.list /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
|
sudo sed -i 's/r3.0/r3.1/' /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
|
```
|
|
|
|
3. Proceed with a normal update in the template:
|
|
|
|
```
|
|
sudo apt-get update
|
|
sudo apt-get dist-upgrade
|
|
```
|
|
|
|
4. Remove unnecessary now file:
|
|
|
|
```
|
|
sudo rm -f /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
|
```
|
|
|
|
5. Shut down the template.
|
|
|
|
## Upgrading dom0
|
|
|
|
**Important:** Do not perform the steps described in this section until **all**
|
|
your Template and Standalone VMs have been upgraded as described in the previous
|
|
section. Also, do not shut down `sys-net` or `sys-firewall`, since you will not
|
|
be able to start them again until after the entire in-place upgrade procedure is
|
|
complete.
|
|
|
|
1. Open a terminal in Dom0. (E.g., Start -\> System Settings -\> Konsole.)
|
|
|
|
2. Upgrade dom0 to R3.1:
|
|
|
|
```
|
|
sudo qubes-dom0-update --releasever=3.1
|
|
```
|
|
|
|
At this point, most of the `qvm-*` tools will stop working until after you
|
|
reboot the system.
|
|
|
|
3. If the previous step completed successfully, your `qubes-core-dom0` version
|
|
should be `3.1.4` or higher. If it's not, repeat the previous step with the
|
|
`--clean` option.
|
|
|
|
4. Reboot dom0.
|
|
|
|
The system may hang during the reboot. If that happens, do not panic. All
|
|
the filesystems will have already been unmounted at this stage, so you can
|
|
simply perform a hard reboot (e.g., hold the physical power button down
|
|
until the machine shuts off, wait a moment, then press it again to start it
|
|
back up).
|
|
|
|
Please note that if you use [Anti Evil Maid](/doc/anti-evil-maid), it won't be
|
|
able to unseal the passphrase the first time the system boots after performing
|
|
this in-place upgrade procedure since the Xen, kernel, and initramfs binaries
|
|
will have changed. Once the system boots up again, you can reseal your Anti Evil
|
|
Maid passphrase to the new configuration. Please consult the Anti Evil Maid
|
|
[documentation](/doc/anti-evil-maid) for instructions on how to do that.
|
|
|
|
If you use USB VM, you may encounter problem with starting it on updated Xen
|
|
version (because of strict default settings). Take a look at
|
|
[User FAQ](/faq/#i-created-a-usb-vm-and-assigned-usb-controllers-to-it-now-the-usb-vm-wont-boot)
|
|
for details.
|
|
|
|
Once you have upgraded dom0, you can install new templates from Qubes R3.1
|
|
repositories, in particular the new default Fedora 23 template:
|
|
|
|
```
|
|
sudo qubes-dom0-update qubes-template-fedora-23
|
|
```
|