On Wed, Jun 26, 2019 at 10:12:40PM -0700, Sphere wrote:
> @unman: thanks for that
> I also noticed that qubes-updates-proxy.service fails by default on startup 
> and I'm unsure if that is a minimal template-only problem but I was able to 
> fix it thanks to it indicating that the problem is a missing folder: 
> /var/run/qubes-service/qubes-updates-proxy
> 
> Pretty much the same problem that I get with clocksync service thankfully so 
> I was able to confirm that this service was running as intended
> 
> systemctl status qubes-updates-proxy:
> qubes-updates-proxy.service - Qubes updates proxy (tinyproxy)
>    Loaded: loaded (/usr/lib/systemd/system/qubes-updates-proxy.service; 
> enabled;
>  vendor preset: enabled)
>    Active: active (running) since Thu 2019-06-27 12:06:14 +08; 2s ago
>   Process: 1603 ExecStartPre=/usr/lib/qubes/iptables-updates-proxy start 
> (code=e
> xited, status=0/SUCCESS)
>  Main PID: 1608 (tinyproxy)
>     Tasks: 3 (limit: 414)
>    Memory: 4.1M
>    CGroup: /system.slice/qubes-updates-proxy.service
>            ??????1608 /usr/bin/tinyproxy -d -c 
> /etc/tinyproxy/tinyproxy-updates.conf
>            ??????1609 /usr/bin/tinyproxy -d -c 
> /etc/tinyproxy/tinyproxy-updates.conf
>            ??????1610 /usr/bin/tinyproxy -d -c 
> /etc/tinyproxy/tinyproxy-updates.conf
> 
> Jun 27 12:06:14 redacted systemd[1]: Starting Qubes updates proxy 
> (tinyproxy)...
> Jun 27 12:06:14 redacted systemd[1]: Started Qubes updates proxy (tinyproxy).
> Jun 27 12:06:14 redacted tinyproxy-wrapper[1608]: Found tinyproxy at 
> /usr/bin/tinyproxy
> 
> Despite this however, the problem still persists and still behaves the same 
> even after trying dnf update for 5 times
> 
> I think is right about the fact that there is a bug about this
> 
> @Chris I think you may be right about the fact that this is a bug and I guess 
> it's time to escalate it into an issue in github. I'm willing to lend a 
> helping hand in making the issue as needed.
> 
> My setup is all fully dependent on variations of fedora-30-minimal template 
> that I have tailored depending on use-case of the AppVM that would be using 
> it.
> 

Like Chris, I use a separate qube for updates.
Unlike you and Chris I don't see the behaviour you report.

Let's try to dig in before raising a bug report.

I've tested this with 30-minimal template 201905071541 and 201906241949,
from stable and testing.
I've tested against dom0 stable and dom0 testing: both fully updated.
Test boxes are an old x230 and a custom rig with X-series CPU and 32G RAM.

In all cases, the proxy is started as appropriate, and the update
process (from fedora 29 and 30-minimal) waits until proxy is up and then
proceeds.

What hardware are you, Sphere and Chris, running?

Sphere - if you create a dedicated update qube using the 30-minimal with
qubes-core-agent-networking installed,
enable the qubes-updates-proxy service, route it through
sys-firewall, and edit the policy file appropriately, do you see the
same behaviour? (Almost instant fail)
What if you start the new update proxy before attempting a 'dnf update'?

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20190627114448.mlnylqqpnf727ni4%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to