-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
qvm-template fails silently with repo_gpgcheck=1 #7414
Comments
Thanks for the report. This is certainly wrong. I believe what is happening is that the check for signed repository metadata in dom0 fails. This is expected behavior, since dom0 metadata is generated within dom0 and so cannot be signed. That said, the error message is unacceptably poor. Will fix. |
I don't think so. @3hhh what template your updatevm uses? Is it maybe some older Debian? |
@3hhh what template your updatevm uses? Is it maybe some older Debian?
I use a debian-11 template. It works for `qubes-dom0-update` though (incl. repo_gpgcheck=1).
|
I can confirm this (using fedora-34 for updateVM)
Different is: With
Without
|
Is it still the case? We don't have |
@marmarek what would it take to sign the template metadata? |
The metadata is signed. The issue is IIUC about its verification in the updatevm, if you opt in for it. |
Yes.
I think I had looked into this setting as part of QSB 67, which it might have prevented. It's also weird that |
Culprit is a missing package dependency: the needed to verify the metadata are provided by the |
Isn't that layering violation? qvm-template tool sends repository definitions to the updatevm, so having it also requiring repo definitions being installed in updatevm sounds weird. I guess the missing part are keys, right? Can they be inlined into repo definition file? |
I don’t think so @marmarek. |
Can we then invent some (like, put the key in a specially marked comment, that updatevm-side script will extract)? |
Let’s get the official repos fixed first. That’s a much simpler fix and so less likely to cause any regressions. A general fix will be more complex, so it will take longer and be more likely to cause regressions. |
qubes-core-agent-dom0-updates was missing a dependency on qubes-repo-templates, so the OpenPGP keys needed with repo_gpgcheck=1 weren't available to DNF. Also add -y to the DNF command line so that it imports these keys without a prompt. Fixes: QubesOS/qubes-issues#7414 (cherry picked from commit 81454a9)
This comment was marked as outdated.
This comment was marked as outdated.
Fixed or not yet? |
Currently only fixed for the official repos. |
How to file a helpful issue
Qubes OS release
4.1
Brief summary
Enforcing signed metadata for the template repo causes `qvm-template' to not find any templates anymore.
Steps to reproduce
repo_gpgcheck=1
in/etc/qubes/repo-templates/qubes-templates.repo
.qvm-template list --available
.Expected behavior
Error on the signature check failing or ideally list of templates available to install.
Actual behavior
Error: "No templates available".
The text was updated successfully, but these errors were encountered: