Some update on the current status of Qubes OS R4.3 development. A Github project is made to keep track of list of blockers for R4.3 release. These are the additional features which would most probably will be added to R4.3:
The list is flexible.
As you could see, not so many items remain on the list.
9 Likes
barto
February 17, 2025, 7:16pm
65
āStabilize F41 templatesā should be a priority too.
4 Likes
nxn
April 30, 2025, 1:15pm
66
Question: does this mean that R4.3 is basically locked on to release with Xen v4.19 or is there still a chance that Xen v4.20 is used?
2 Likes
Would you mind sharing the scripts you used for the upgrade? Iām curious to test it out on an old laptop that I donāt use anymore just for my own learning.
1st of all, follow this Github issue:
opened 11:22PM - 21 Jun 24 UTC
C: doc
P: major
release notes
C: dist upgrade
affects-4.2
[How to file a helpful issue](https://www.qubes-os.org/doc/issue-tracking/)
###⦠The problem you're addressing (if any)
Similar to https://github.com/QubesOS/qubes-issues/issues/7832, we need an upgrade tool.
### The solution you'd like
For now this issue is a placeholder to collect tasks the tool will need to do.
### The value to a user, and who that user might be
Ability to upgrade without full reinstall.
### Completion criteria checklist
Take care of the following changes that need special care on upgrade:
- [ ] https://github.com/QubesOS/qubes-core-qrexec/pull/141#issuecomment-2197678160
- [ ] https://github.com/QubesOS/qubes-core-qrexec/pull/135#issuecomment-2197793318
- [ ] https://github.com/QubesOS/qubes-issues/issues/9421
- [ ] do `systemctl preset-all` and then re-enable `qubes-vm@` units for VMs set for autostart
- [ ] remove packages not present in F41 anymore: `duktape`
- [ ] `audit` update complains in preun: `Stopping logging:`, `Auditd is not running`
- [ ] add `minimal-netvm`/`minimal-usbvm` services to sys-net/sys-usb respectively: https://github.com/QubesOS/qubes-core-agent-linux/pull/540, https://github.com/QubesOS/qubes-mgmt-salt-dom0-virtual-machines/pull/70
- [ ] may need to exclude `breeze-icon-theme-fedora`
2nd of all, follow the changes to upgrade script (specifically its branches and/or forks):
Contribute to QubesOS/qubes-dist-upgrade development by creating an account on GitHub.
p.s.: Since you are doing it on a testing laptop, I assume you have proper backups or backups are not needed.
2 Likes
Thanks! And yeah, itās a test laptop so I donāt care if things go sideways. I checked out the links and Iām not seeing any branches or forks with updates I can run for 4.3.
Yes. It did not exist 8 hours ago (at the time of your post). But it was created 5 hours ago:
committed 03:29PM - 04 Jun 25 UTC
This handles the following custom steps:
- create LVM devices file
- re-preset s⦠ystemd services (especially to enable modular libvirt
services)
- start auditd before upgrade - otherwise updating audit package fails
- store device ID (in addition to port ID) for all PCI assignments
- add minimal-netvm/minimal-usbvm services
Fixes QubesOS/qubes-issues#9421
Fixes QubesOS/qubes-issues#9317
3 Likes