- User Since
- Nov 20 2014, 4:36 PM (256 w, 12 h)
Sun, Oct 6
Implemented for some time now.
Reported build failures:
Sat, Sep 28
Mon, Sep 23
Sep 14 2019
Aug 31 2019
Aug 23 2019
Aug 21 2019
Should work on manual invocation.
For the record, this is the diff being generated.
Aug 19 2019
By default, the VMs do not start because the virtual disks are not set to readonly. This is only needed when using the ISO though. Might stay this way as long as the user is correctly advised to change to set the disk to readonly mode.
Aug 17 2019
Aug 16 2019
Aug 11 2019
Aug 9 2019
install electrum appimage by default:
Jul 27 2019
Looks like mine.
Jul 25 2019
remove qubes-core-agent dependency on initscripts
Jul 21 2019
Done in git master.
journal keeps metadata about each message, so it's possible to avoid it with `journalctl -p err -b` (I've added `-b` to avoid listing messages from previous boot).
Jul 19 2019
Jul 16 2019
Jul 15 2019
Jul 14 2019
Jul 11 2019
Jul 8 2019
Removed a few. Would not start without openat, so kept.
Yay, we have ProtectSystem=strict now.
Can we exclude ExecStartPre=/usr/lib/onion-grater-merger from systemd hardening?
Jul 7 2019
Error back after reboot.
Jul 6 2019
https://github.com/Whonix/onion-grater/blob/master/lib/systemd/system/onion-grater.service currently works without ReadWritePaths. So let's not add?
Any idea? @marmarek
There is none indeed for VMs but it has to be re-checked once/if Whonix-Host becomes a thing.
Jul 4 2019
It's a file, not a folder. Nothing in the code of
/usr/lib/onion-grater-merger writes to /usr/lib/onion-grater-merger.
Jul 3 2019
Could you test this please by installing in VM and/or host please? @madaidan
Jul 1 2019
Merged your changes.
Jun 29 2019
needrestart works good enough for it to be implemented as a test in whonixcheck (--verbose?).
Jun 27 2019
Blocked by Qubes.
Qubes start menu incompatible with DispVMs launching GUI applications into the background
marmarek (Marek Marczykowski-Górecki):
Is there a reason for fixed geometry of those widgets, instead of letting Qt figure it out based on the content?
I have no idea why this started happening without changes. Perhaps due to underlying libraries changes. Anyhow, fixed in git master.
Work for me too in new build https://forums.whonix.org/t/qubes-whonix-15-templatevms-debian-buster-based-4-0-1-201906232114-testers-wanted/7601
Implementation looks good enough for now.
Will keep watching what Tails is doing.
Seems ok after full removal and re-creation.
Jun 25 2019
Jun 24 2019
runit-sysv is incompatible with Whonix and Qubes Debian template. Even sudo apt install runit-sysv --no-install-recommends would uninstall some Whonix or Qubes packages.
git-all also breaks Qubes Debian buster template. @marmarek
Another workaround with full git-all functionality that does not break Whonix:
While this should be fixed, note, meanwhile the following works perfectly well for general use of git (I did not ever had any situation where I was missing any features):
Jun 23 2019
Unfortunately not. On Qubes-Whonix. Could be Non-Qubes-Whonix vs
sudo journalctl -f in dom0 does not show anything when running qvm-sync-appmenus whonix-gw-15 in dom0.
QVMM applications tab looks good btw. Just the default applications listed in Qubes start menu (without ever using QVMM applications tab) is not properly populated.
Does not work yet. @madaidan
Jun 21 2019
Jun 20 2019
sys-whonix shows sdwdate-gui.desktop by default but not
Any idea why these are missing? @marmarek
anon-whonix / sys-whonix lacks a lot entries.
- Copy to VM
- Move to VM
- Create Archive...
The problem is, xpra (actually xpra | xserver-xephyr | xvfb) isn't in the list of Recommends: of the firejail package by accident. We don't really know the rationale of that. Could be an optional dependency and without it, some things someone who knows firejail who is happy to find it installed would wonder why it actually does not work.