Thank you very much for the help. Time for a crash course on
qubes-core-admin.
On Mon, Apr 15, 2024 at 9:30 AM Rusty Bird wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Rusty Bird:
> > Boryeu Mao:
> > > An attempt to shutdown `sys-firewall` in `Qube M
An attempt to shutdown `sys-firewall` in `Qube Manager` receive a warning
about running processes in the qube; similarly on command line
`qvm-shutdown sys-firewall` fails with an error. Is it possible to
designate an appVM to behave similarly so it won't get shutdown
accidentally?
--
You
Some useful information at
https://github.com/QubesOS/qubes-issues/issues/8806
On Saturday, February 17, 2024 at 9:08:44 PM UTC-8 Boryeu Mao wrote:
> I attempted to upgrade the fedora-39-minimal template as follows:
>
> sudo qubesctl --show-output --skip-dom0
> --targets=fedor
I attempted to upgrade the fedora-39-minimal template as follows:
sudo qubesctl --show-output --skip-dom0 --targets=fedora-39-minimal-clone-1
state.sls update.qubes-vm
But the process results in errors (see attached file qubesctl-f39). This
is for R4.2. Please help. Thank you.
--
You
Thanks very much -- the details helped a lot.
Case closed.
On Tuesday, February 13, 2024 at 5:21:05 AM UTC-8 Rusty Bird wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Boryeu Mao:
> > > For R4.1.2 I had some RPC calls with + and - characters in
Correction - only + is considered as invalid character.
On Monday, February 12, 2024 at 4:56:27 PM UTC-8 Boryeu Mao wrote:
> For R4.1.2 I had some RPC calls with + and - characters in the file
> name. These are considered as invalid characters to be part of service
> names in the n
For R4.1.2 I had some RPC calls with + and - characters in the file name.
These are considered as invalid characters to be part of service names in
the new qrexec policy format (e.g. in /etc/qubes/policy.d/30-user.policy).
Using wild card * works, but I wonder if there is any way to keep these
Upon a bit of searching, the main package needed is pinentry-gnome3, with four
additional packages: gcr libgcr-base-3-1 libgcr-ui-3-1 libgck-1-0 for my
AppVM.
On Friday, February 9, 2024 at 4:47:28 PM UTC-8 Boryeu Mao wrote:
> PS. The AppVM sends the gpg passphrase request to dom0 w
PS. The AppVM sends the gpg passphrase request to dom0 when the following
command is run in dom0:
qvm-run --pass-io AppVM 'gpg --quiet -d some-file'
On Friday, February 9, 2024 at 1:05:16 PM UTC-8 Boryeu Mao wrote:
> I have a debian-12 based AppVM that forwards gpg passphr
I have a debian-12 based AppVM that forwards gpg passphrase request to dom0
in a pop-up dialog window. When the template is changed to
debian-12-minimal, the pop-up request no longer shows up in dom0,
presumably because some qubes package(s) need to be installed? Any
configuration changes
some-dom:
command failed with code: 137. When SIGTERM is used to kill the process,
the code 143 (128+15) is returned instead of 137.
On Sat, Jul 22, 2023 at 6:55 AM Rusty Bird wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Boryeu Mao:
> > of ``some-dom: comman
of ``some-dom: command failed with code: 137``, which I have been ignoring
since the job with ``some-pid`` did get killed. What could be the meaning
of the code 137 and its significance?
Thanks in advance.
--
You received this message because you are subscribed to the Google Groups
In an AppVM based on Debian-11 template, I would like a `bash` script
running in `xfce Terminal` to catch an X selection `paste` event in
`firefox-esr` - is that possible, and where to look? Thanks in advance.
--
You received this message because you are subscribed to the Google Groups
Am having occasional crashing after lid-closing suspend with Rysen-powered
Dell Inspiron… will try xfce button then lid closing. Many thanks for the
hint.
On Thursday, May 4, 2023, haaber wrote:
> Dear all,
>
> Update of my HCL report: suspend to memory via xfce button works fine,
> but often
Maybe the 'qvm-copy-to-vm' version could be made to place the 1st argument
in the Target field of the pop-up window, such that only a CR is required
to complete the operation?
On Friday, March 24, 2023 at 8:41:54 AM UTC-7 Boryeu Mao wrote:
> Yes, 'qvm-copy' alone would ensure the secur
Yes, 'qvm-copy' alone would ensure the security of copying/moving files
between AppVM's. Thanks.
On Fri, Mar 24, 2023 at 5:43 AM unman wrote:
> qvm-copy-to-vm is deprecated and will be removed.
>
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
> behind a keyboard/mouse. I ran into this as well, then realized the risk I
> was creating running this from a script.
>
> GL
>
>
> On Thu, Mar 23, 2023, 16:50 Boryeu Mao wrote:
>
>> I'd expected 'qvm-copy-to-vm' to accept the 1st argument as target-vm and
>>
I'd expected 'qvm-copy-to-vm' to accept the 1st argument as target-vm and
get on with copying, but for me both commands request the target-vm in a
pop-up window -- so what is the point of having 'qvm-copy-to-vm' at all, if
I am not missing something really simple?
Thanks
--
You received this
Thank you much. Time to catch up a little on lua. (Found a really nice
tutorial in www.linux-magazine.com, circa 2017, which also mentioned a
couple of alternatives.)
On Tuesday, September 6, 2022, Sven Semmler wrote:
> I do that with devilspie2 (lua script telling XFCE where I want each
>
When logging back in, the windows in the workspace are re-opened - is it
possible to have them positioned just as they were before the last logging
out? I have R.4.1.1 with xfce. Thanks in advance.
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
>From Qubes-OS 4.1.0 I updated dom0 today, and see the 5.15 kernel at
reboot, and xen-4.14.5-6 etc. However, the 'release' info in the file
/etc/qubes-release and from the 'About' tab in Qubes Manager still says
R4.1 -- is this any indication that my update did not fully bring the
system to
Found an answer :)
sudo qubes-dom0-update --console --show-output
Sorry for the false alarm.
On Sun, Jun 12, 2022 at 2:27 PM Boryeu Mao wrote:
> Running a dom0 update ('sudo qubes-dom0-update') in a disposable VM (per
> Solomon1732 in
> https://forum.qubes-os.org/t/qubes-dom0-upd
for this purpose? Any help or pointers to
help overcome this part of my Qubes OS learning curve is much appreciated.
Thanks
boryeu mao
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails fro
I started using Qubes (r 4.0.4) and am on 4.1. Everything works well
except 'sleep/wake', which my laptop (Dell, ryzen 3450u) is capable of (on
Debian 11). Two related general questions:
(1) Is it correct to think that there is no easy fixes, as suggested in
some on-line discussions, and it
24 matches
Mail list logo