-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot open files in disposable VM using SecureDrop Client #766
Comments
I tracked this down to an AppArmor denial:
This in turn appears to be the result of a change in I don't know why I'm the only tester who has encountered this issue, however. Could others on Qubes 4.1 who can successfully open files in disposable VMs please check if:
Regardless, I'll open a draft PR with the AppArmor policy change in case we need it. |
Oh interesting. there is no AppArmor denial on a fresh 4.1 install, and it looks our |
That may indeed have been a consequence of the in-place upgrade; I see that 4.1 repos are in my |
Confirmed, seeing the same AppArmor failure with 4.1 repos. I ran into some issues with conflicting file locations between different Xen packages, but used Checking out the draft PR now |
(Re-titled and labeled as blocker for 4.1) |
I also could not repro on a fresh install of 4.1 and can confirm that we're not interested in adding an in-place upgrade path. |
This is the desired state! So, it sounds like our fresh installs are not using the correct 4.1 repos, which should be opened in a separate issue, especially as we continue to review and test the 4.1 migration PRs. Update: Oops, nvm, maybe this isn't the desired state until freedomofpress/qubes-template-securedrop-workstation#24 is released. |
@eaon wondering if you could add your thoughts on whether or not this is actually a blocker? At first I thought we weren't testing the right thing, but we are in fact testing what users will also experience: their fresh install will also point to the 4.0 repos until freedomofpress/qubes-template-securedrop-workstation#24 is done and rolled out. It looks like @eloquence's draft PR adequately fixes this issue, but I think we'll have to do a lot more testing as part of review/QA for freedomofpress/qubes-template-securedrop-workstation#24 rather than 4.1 support? What do you think? |
Per discussion from this afternoon, we're planning to release 4.1 support with bullseye templates only (which we'll not support for 4.0) and they use the appropriate repositories by default. In that case, this would indeed be a blocker, but yes @eloquence already (very likely 🤞) figured out the fix for this particular problem in freedomofpress/securedrop-client#1485 Once bullseye templates are available we'll have to more in-depth testing of other components which might still need tweaking. |
I believe/hope so, but I don't think any of us have tested client functionality beyond "it starts!" yet. So I believe I'd opt for waiting a little bit longer |
(Closing since this was resolved and our 4.1 support is now complete + in-place) |
As observed in #751 (comment), I'm unable to open files in disposable VMs from the SecureDrop Client app on Qubes 4.1 after an in-place upgrade. This is not necessarily a blocker on #751 as it's not been reproduced on fresh install (the recommended procedure), or indeed by anyone else yet.
Steps to reproduce
Expected behavior
Actual behavior
Findings
qvm-open
command the Client constructs triggers an RPC policy violation$
to@
resolves that and files do open in disposable VMsQProcess
. Early testing suggests that this exits with return code 5, but I've not dug deeply into that yet.The text was updated successfully, but these errors were encountered: