[qubes-users] How to set template-wide gnome-terminal default profile?
Common scenario: 1) create new appVM 2) open terminal 3) "oh no, the color scheme and font and terminal settings are all wrong" 4) spend some time clicking around in menus fixing it Is there a way to create a template-wide default gnome-terminal profile? (The terminal profile that I set in the template is not propagated to appVMs based on that template) -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191012034803.GB1020%40danwin1210.me.
Re: [qubes-users] VMs refuse to start after being shut down (following latest update)
On Fri, Oct 11, 2019 at 05:44:26PM +0200, tetrahedra via qubes-users wrote: After the latest round of updates I have started seeing some odd behavior: VMs will only start once per system boot. This is rather a problem (it makes Qubes much less usable!), should I also add it to the Github tracker? Further details: After a VM has been shut down, when I try to start it again I get the notification: "Domain MYVM has failed to start: Cannot connect to qrexec agent for 60 seconds, see /var/log/xen/console/guest-MYVM.log for details" Key discovery: when I updated Qubes, around the same time I decreased the starting memory for some VMs to 200MB (from 400MB), and only those VMs were affected by this issue. Solution: raise the starting memory back to 400MB. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191012034520.GA1020%40danwin1210.me.
[qubes-users] Re: Creating App Shortcut for a Single AppVM Doesn't Work
I uses gnome shortcut editor to create the desktop file (optional) and saved to desktop. Then I double clicked it in the file manager and opened the program one time. Then I think I rebooted (I don't remember) but it was there in the qubes settings->applications hope it helps On Friday, October 11, 2019 at 10:03:34 PM UTC-3, pudding wrote: > > Hi, > > I downloaded the AppImage version of KeePassXC, moved it to an Debian > 10-based AppVM "kpxc", and wanted to create a dom0 startmenu entry for > it. I followed the "If you only want to create a shortcut for a single > AppVM..." part of the guide here: > https://www.qubes-os.org/doc/managing-appvm-shortcuts/ , but after > completing the steps and rebooting, there is still no entry of KeePassXC > under kpxc in the startmenu, and I couldn't figure out why. Here's the > content of ~/.local/share/applications/kpxc-KeePassXC.desktop which I > wrote: > > Version=1.0 > > Type=Application > > Terminal=false > > Name=kpxc: KeePassXC > > GenericName=kpxc: Password Manager > > Comment=Manage Passwords > > Exec=qvm-run kpxc '~/Desktop/KeePassXC.AppImage' > > > Both dom0 and Debian template are updated to the lastest stable. > > Any help would be appreciated! > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/afdb2a7f-cfdf-44f6-b169-991a458b59b6%40googlegroups.com.
Re: [qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?
thanks, that explains why I needed to install gnome-disks every time I plugged a disk. I wondered why it didn t stay On Friday, October 11, 2019 at 7:37:44 PM UTC-3, Claudia wrote: > > Guerlan: > > I installed some drivers on a sys-net-2 VM. Does that men they are > > installed on the template then? > > No. Probably not. The root directory is shared, but only for reading. > Any changes are visible only within that VM, and are lost on reboot. > Exceptions are anything mapped to /rw (e.g. /home/user and /usr/local). > > If you want to install something permanently, without affecting other > VMs, the simplest way is to create a StandaloneVM. Alternatively, you > can clone the TemplateVM and install your package in it, then create an > AppVM using the new TemplateVM. > > https://www.qubes-os.org/doc/software-update-domu/ > > - > This free account was provided by VFEmail.net - report spam to > ab...@vfemail.net > > ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of > the NSA's hands! > $24.95 ONETIME Lifetime accounts with Privacy Features! > 15GB disk! No bandwidth quotas! > Commercial and Bulk Mail Options! > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e4f58228-c80b-46c6-9679-081824273175%40googlegroups.com.
[qubes-users] Creating App Shortcut for a Single AppVM Doesn't Work
Hi, I downloaded the AppImage version of KeePassXC, moved it to an Debian 10-based AppVM "kpxc", and wanted to create a dom0 startmenu entry for it. I followed the "If you only want to create a shortcut for a single AppVM..." part of the guide here: https://www.qubes-os.org/doc/managing-appvm-shortcuts/ , but after completing the steps and rebooting, there is still no entry of KeePassXC under kpxc in the startmenu, and I couldn't figure out why. Here's the content of ~/.local/share/applications/kpxc-KeePassXC.desktop which I wrote: Version=1.0 Type=Application Terminal=false Name=kpxc: KeePassXC GenericName=kpxc: Password Manager Comment=Manage Passwords Exec=qvm-run kpxc '~/Desktop/KeePassXC.AppImage' Both dom0 and Debian template are updated to the lastest stable. Any help would be appreciated! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/39493dc2-5c96-966f-1951-464c8cb55cce%40cock.li.
[qubes-users] How to enter ipv6 in firewall settings?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I suspect this is a "dumb" question, but can't figure out the answer after searching through the list archives: I am unable to enter colons (from ipv6 addresses) into the firewall whitelist on the "Firewall rules" tab of "Qube Settings" when I click the "+" button. The resulting input box only seems to accept digits or dots. Is there some other way to enter an ipv6 address, other than using colons? I am trying to whitelist all the IPs associted with a given subdomain; the subdomain name resolves (in nslookup) to a handful of ipv4 and ipv6 addresses. Whitelisting the ipv4s alone does not seem to be getting the job done. Thanks for any help ... -BEGIN PGP SIGNATURE- iQIzBAEBCAAdFiEEld4E33dXYpZjK0nBqQc3v7v0xDoFAl2fl0wACgkQqQc3v7v0 xDrcyw/+KIYYNmy4fsyY3dgTULFgHud6eyxE3k2WbJu1iXJ73GBmP7n6p3w0E315 6s+PFfYwqdtl/7nb2YBTk5GKi6/vehiZM/7VC8e4FkhQSIXIykeYKKFsX/3I8Cyw CdOdLKBvfg9Eg/FNV23e9EyzoPvtCgBSUHjU8hh5wAdLc+3Xg7aSCpA+I80pTQij 7xvx5hdmifAZbFbqxYWVEDarUqvhgQyegVAzsrt87p6sErEPI+l14mJei2thekbo WllEvEO1KmTlB3asIScxSRdHklNcQLL3rchc2rF57mvVNJ2Mg4cJTSg2d0XwcNwc ym2qBO9UTRIMzbShIoZJR0hcYkqNmIvc8EpJxCGI+287uqwCSwSCSVd2a6toeSqw NX/2EKo3h30Hvh1PYuQYRHwHkEgYJt8Ojal6WkdPfRVXTgWxFPtNwiav3qvApkEi hMl1ELCvXXbl6c8q0M4WL0Ip6kUX7YA17F/avkhICVuDpxnrnhM9lAgkmmkCQPdJ lmhIsymnV9gPrcafDhqdFr2MBEc0Eh8sHt5m4pWFLRbaqsA0DA5HBnXrtJlteFHF af65W7QU5ko2mOvD5eiST7tlIz9WKupjZmCsiCE/QVI7XroUP65nEnJszXP+p/SY MyKErVUsrczStjM4U8BUSMU1cm29jdnCpwNlP02eIlTqMGi2pkY= =GAeX -END PGP SIGNATURE- -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/87imowe3kz.fsf%40ryantate.com.
Re: [qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?
Guerlan: I installed some drivers on a sys-net-2 VM. Does that men they are installed on the template then? No. Probably not. The root directory is shared, but only for reading. Any changes are visible only within that VM, and are lost on reboot. Exceptions are anything mapped to /rw (e.g. /home/user and /usr/local). If you want to install something permanently, without affecting other VMs, the simplest way is to create a StandaloneVM. Alternatively, you can clone the TemplateVM and install your package in it, then create an AppVM using the new TemplateVM. https://www.qubes-os.org/doc/software-update-domu/ - This free account was provided by VFEmail.net - report spam to ab...@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/adf0dee6-b410-7eff-07fd-39af34096bdd%40vfemail.net.
Re: [qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?
I installed some drivers on a sys-net-2 VM. Does that men they are installed on the template then? On Friday, October 11, 2019 at 6:04:15 PM UTC-3, steve.coleman wrote: > > On 2019-10-11 14:16, Guerlan wrote: > > The root folder is shared, only the /home is unique for each VM. Does > > that mean that is I instal anything with sudo in one VM, it will affect > > the template and therefore all other VMs? > > When you install software in /usr or /opt in the template VM it will be > visible in all the user VM's that use that template. The settings to > automatically launch daemon processes may need to be enabled for each > AppVM depending on both yours and the particular software package > requirements. You may not necessarily need a cron job or a daemon to run > in every AppVM instance, for example. > > If you instead install software in the AppVM's /home/user/* or > /usr/local/* (basically any directory automatically remapped from the > private volume /rw/* ), then the software will be available only within > that single AppVM. > > Where it makes sense to install a particular third-party software > package depends highly on what that specific software needs in order to > function properly. If the software is installed locally in /usr/local > but then still wants its configuration files to be in /etc, or needs > cron, then you may need to work around that specific problem with either > copying the configuration file separately into the template VM /etc, or > else using some magic scripting during the AppVM startup to copy the > config file into the right location before the software that needs it is > actually started. There is usually a workaround that will get the job > done, but you may need to learn a bit more about how each software > package works than you normally would on some other less secure system. > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6c7e94cf-62fe-488c-9cc2-403a789f6762%40googlegroups.com.
Re: [qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?
On 2019-10-11 14:16, Guerlan wrote: The root folder is shared, only the /home is unique for each VM. Does that mean that is I instal anything with sudo in one VM, it will affect the template and therefore all other VMs? When you install software in /usr or /opt in the template VM it will be visible in all the user VM's that use that template. The settings to automatically launch daemon processes may need to be enabled for each AppVM depending on both yours and the particular software package requirements. You may not necessarily need a cron job or a daemon to run in every AppVM instance, for example. If you instead install software in the AppVM's /home/user/* or /usr/local/* (basically any directory automatically remapped from the private volume /rw/* ), then the software will be available only within that single AppVM. Where it makes sense to install a particular third-party software package depends highly on what that specific software needs in order to function properly. If the software is installed locally in /usr/local but then still wants its configuration files to be in /etc, or needs cron, then you may need to work around that specific problem with either copying the configuration file separately into the template VM /etc, or else using some magic scripting during the AppVM startup to copy the config file into the right location before the software that needs it is actually started. There is usually a workaround that will get the job done, but you may need to learn a bit more about how each software package works than you normally would on some other less secure system. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d50d6db0-f759-1631-14a5-8daa9f5d4555%40jhuapl.edu.
[qubes-users] qubes-builder error: target not found: linux
I've ran qubes-builder by selecting ubuntu, debian, arch and kali. However I always end up in this error after running make qubes-vm: (11/11) Rebuilding certificate stores... --> Removing non-required linux kernel (can be added manually through a package)... error: target not found: linux make[1]: *** [/home/user/qubes-builder/qubes-src/builder-archlinux/Makefile.archlinux:104: /home/user/qubes-builder/chroot-vm-archlinux/home/user/.prepared_base] Error 1 make: *** [Makefile:226: vmm-xen-vm] Error 1 there's no issues in the github project so I can't talk directly to them anyone knows what is happening? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3636bbac-4bfc-4094-92f5-fdd48fdc89f2%40googlegroups.com.
[qubes-users] Wifi card adapter wont appear inside VM
I have a MediaTek card adapter. I redirected it to the VM. When I run lsusb inside the VM, it won't appear. How do I troubleshoot this? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/a7d96c4f-38c5-4e71-b914-646c9a5d06cc%40googlegroups.com.
[qubes-users] Does installing things with sudo affect my template and therefore all VMs that use this template?
The root folder is shared, only the /home is unique for each VM. Does that mean that is I instal anything with sudo in one VM, it will affect the template and therefore all other VMs? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6cd98a22-adcc-45c3-bc7c-3c179b75f49e%40googlegroups.com.
Re: [qubes-users] Installation on Lenovo ThinkStation P330 (2. generation)
The first start up of the pc after the installation of Qubes results in a black monitor immediately after running the code/script that is related to booting Qubes OS. Wonder if the reason could be that I have chosen full encryption and use USB mouse and keyboard. Although the USB-Qube option was grayed out in the installationguide which - as far as I recall - shows that a USB-Qube isn’t possible and thereby USB keyboard should be useable when it is necessary to enter the encryption code. And therefore I still wonder why the screen turns black when reaching the Qube OS login screen or just before that. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/7af11fea-c261-4ea3-9afa-92815a307053%40googlegroups.com.
Re: [qubes-users] laptop screen wont appear after closing lid
Guerlan: I did the HCL report and sent. I tried the manual sleep and it wont work, the same thing happens as when I close the lid: the keyboard goes off and the screen goes blank and nothing returns when I open. I tried pressing the power button but also didn't work. The workaround isn't good for me because my notebook has very limited battery, so I need for it to sleep while closed. I tried Fedora 30 and sleep worked perfectly. I just closed the lid and reopened and it worked. Can't say for sure, but probably F25 is simply too old, and lacks the necessary firmware drivers, or whatever, for your laptop. In other words, the hardware is too new for the software. The good news is you're not alone. I ran into this exact issue a couple of months ago, and two other users have posted here about the same problem since then. The bad news is no one has found a fix, as far as I know. Here are links to those conversations. See if it sounds like what you're experiencing. There are some troubleshooting tips mentioned there that you can try also. Let us know what you find out. https://www.mail-archive.com/qubes-users@googlegroups.com/msg29755.html https://www.mail-archive.com/qubes-users@googlegroups.com/msg30760.html https://www.mail-archive.com/qubes-users@googlegroups.com/msg30490.html - This free account was provided by VFEmail.net - report spam to ab...@vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/8e4553ca-9a09-c2ab-adcb-6a7b674f9041%40vfemail.net.
[qubes-users] VMs refuse to start after being shut down (following latest update)
After the latest round of updates I have started seeing some odd behavior: VMs will only start once per system boot. This is rather a problem (it makes Qubes much less usable!), should I also add it to the Github tracker? Further details: After a VM has been shut down, when I try to start it again I get the notification: "Domain MYVM has failed to start: Cannot connect to qrexec agent for 60 seconds, see /var/log/xen/console/guest-MYVM.log for details" In the relevant file I find the following block of ugly text. The "start job is running" part is interesting as there is a similar message when I go to reboot the machine (which I need to do to use the VM again!)... on shut down, it hangs at the various "stop job is running" messages (which it rotates through) until timeout. There are also further errors which scroll past, but which I could not note down in time. [3.659414] intel_rapl: Found RAPL domain core [3.659429] intel_rapl: Found RAPL domain uncore [.[0;1;31mFAILED.[0m] Failed to start Init Qubes Services settings. See 'systemctl status qubes-sysinit.service' for details. [.[0;32m OK .[0m] Found device /dev/hvc0. [.[0;32m OK .[0m] Found device /dev/xvdc1. [.[0;1;31mFAILED.[0m] Failed to activate swap /dev/xvdc1. See 'systemctl status dev-xvdc1.swap' for details. [.[0;1;33mDEPEND.[0m] Dependency failed for Swap. [.[0;1;31mFAILED.[0m] Failed to start Initialize and mount /rw and /home. See 'systemctl status qubes-mount-dirs.service' for details. [.[0;1;31mFAILED.[0m] Failed to start Adjust root filesystem size. See 'systemctl status qubes-rootfs-resize.service' for details. ^M[ .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… progress polling (30s / n o limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polli ng (30s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… pro gress polling (31s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (31s / no limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… progress polling (32s / no limit)^M.[K[.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (33s / no limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… progress polling (33s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (34s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (34s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (35s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… progress polling (36s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m] A start job is running for Monitori… progress polling (36s / no limit)^M.[K[ .[0;31m*.[0m] A start job is running for Monitori… progress polling (37s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m] A start job is running for Monitori… progress polling (37s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… progress polling (38s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (38s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (39s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (40s / no limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… progress polling (40s / no limit)^M.[K[.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (41s / no limit)^M.[K[.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… progress polling (41s / no limit)^M.[K[.[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (42s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (43s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m* .[0m] A start job is running for Monitori… progress polling (43s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m.[0;31m*.[0m] A start job is running for Monitori… progress polling (44s / no limit)^M.[K[ .[0;31m*.[0;1;31m*.[0m] A start job is running for Monitori… progress polling (44s / no limit)^M.[K[ .[0;31m*.[0m] A start job i: -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191011154426.GA1244%40danwin1210.me.
Re: [qubes-users] Salt Questions
On Wed, Oct 09, 2019 at 02:43:56PM -0400, Brian C. Duggan wrote: > On 10/8/19 6:45 AM, Johannes Graumann wrote: > > 2) I'm unclear about whether the fedora-/debian-X-minimal template VMs > > require additional packages to be managed through salt. > > https://www.qubes-os.org/doc/templates/minimal/ appears to indicate so: > >> Also, there are packages to provide additional services: > >> ... > >> qubes-mgmt-\*: If you want to use salt management on the template and > >> qubes. > > > > If that's indeed the case, it's actually not possible to manage minimal > > template installation/customization entirely through salt, which I > > consider suboptimal. > > > > Qubes does not require that these packages be installed on target VMs to > manage them. > > The disposable management VM applies states through salt-ssh over > qrexec. So target VMs only need the qrexec agent installed: > > https://www.qubes-os.org/doc/salt/#configuring-a-vms-system-from-dom0 > > I believe qubes-mgmt-salt packages will let a user-controlled management > VM use the AdminAPI through Salt. But I'm not sure whether the AdminAPI > is mature enough for that to work fully, yet. Folks on this list have > only talked about using Salt from dom0. > > > 3) I so far have managed to setup `*.sls` files for updating all > > templates as well as dom0 (THANKS unman for the example repo posted a > > while ago). Now I'm trying to get a defined package installed in a > > minimal template and fail: > > > > flatpak.sls: > > install_flatpak: > >pkg.installed: > > - pkgs: > > - flatpak > > > > I was able to apply this state to a clone of fedora-30-minimal like this: > > # qubesctl --show-output --skip-dom0 \ > # --target=fedora-30-minimal-flatpak state.sls flatpak > > Try getting the state to work by itself before using it in a top file. > What do you get when you try that command? > > Brian > > -- > Brian C. Duggan > he/him/his > Brian is right - the minimal templates can be configured as they are. You can use a managementVM to control with salt and I am transitioning to this. On your specific problem, check the log in /var/log/qubes - it wil be mgmt-.log - there should be a pointer to what has gone wrong. One possibility if this is a debian template - you need to enable the *testing* repository. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191011153403.GC32237%40thirdeyesecurity.org.
Re: [qubes-users] Is there a fix for constantly failing wifi?
On Thu, Oct 10, 2019 at 07:31:24AM -0700, Guerlan wrote: > I have a Qualcomm Atheros QCA6174 802.11ac Wireless Network Adapter (rev 32) > > It constantly goes off. I tried the rmmod and insert from the qubes wifi > page and it didn't work. I then discovered that simply turning it off and > on in the tray icon works. However I have to do it every 15 mintutes, and > if I download something huge (that is, I use a lot of wifi) it goess off > and I have to restart it every 30 seconds, it?? very annoying! > > Is there a way to fix it? > It's not a Qubes issue - you need to get firmware that works in whatever OS you are using for sys-net. Search for this and you'll find many hints, and pointers to the right firmware. You could try switching to another template (Fedora - Debian/Arch or vice versa) in first instance. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191011152732.GB32237%40thirdeyesecurity.org.
Re: [qubes-users] Customizing Firefox in dispVMs
On Fri, Oct 11, 2019 at 03:04:16PM +, 'Totally Zoid' via qubes-users wrote: > Hello > > Is there a definite way to customize the default Firefox install in the > DispVMs without launching it first in the TemplateVM (which I don't want to > do for obvious reasons)? > > I thought to add a prefs.js file to get rid of the Google search and other > garbage that comes preinstalled and turned on in Firefox and which I have to > manually turn off in preferences and about:config every time I start the > DispVM (which gets tiring). However, apparently the profile folder is always > generated under a different name and the new default profile I created > doesn't get recognized. > > ~ Zoid > How about this: Create a qube, which has no netvm. Open firefox - configure it as you will. (To install plugins, you wil have to download elsewhere and copy them in to this qube to install) Close qube. Use `qvm-prefs qube template_for_dispvms True` Set netvm for that qube. Open disposableVM based on qube. Profit. unman -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20191011152355.GA32237%40thirdeyesecurity.org.
[qubes-users] Customizing Firefox in dispVMs
Hello Is there a definite way to customize the default Firefox install in the DispVMs without launching it first in the TemplateVM (which I don't want to do for obvious reasons)? I thought to add a prefs.js file to get rid of the Google search and other garbage that comes preinstalled and turned on in Firefox and which I have to manually turn off in preferences and about:config every time I start the DispVM (which gets tiring). However, apparently the profile folder is always generated under a different name and the new default profile I created doesn't get recognized. ~ Zoid Sent with [ProtonMail](https://protonmail.com) Secure Email. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/MuxpNCuFw3NP7Fu2FNCiuLC_h6e1lX6gYw7FFED7lIV9XhKQEBmfzltN3pbLkkc5UBiyg6LPP5Fubq1L0bXLJiezOQI1vy-7yJb4ZufgwG0%3D%40protonmail.com.
Re: [qubes-users] Any virtualizer / emulator working in Qubes OS?
nested virtualization would be very useful for android development but I only found unconclusive posts about how to do it On Friday, October 11, 2019 at 4:01:18 AM UTC-3, Jean-Philippe Ouellet wrote: > > Currently: anything that doesn't require nested virt, meaning anything > that actually emulates instead of trying to use vmx (via kvm, etc.). > > Examples include qemu using its tcg backend instead of kvm, and bochs. > > On Thu, Sep 19, 2019 at 11:58 AM Patrick Schleizer > > wrote: > > > > Is there any virtualizer / emulator working inside Qubes OS AppVMs? > > > > -- > > You received this message because you are subscribed to the Google > Groups "qubes-users" group. > > To unsubscribe from this group and stop receiving emails from it, send > an email to qubes...@googlegroups.com . > > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/2d7d4f20-b255-ed3b-30ef-7b98bfd44e69%40whonix.org. > > > -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/f5733f2b-7660-45f0-b910-b9ff44fa1df7%40googlegroups.com.
Re: [qubes-users] Any virtualizer / emulator working in Qubes OS?
Currently: anything that doesn't require nested virt, meaning anything that actually emulates instead of trying to use vmx (via kvm, etc.). Examples include qemu using its tcg backend instead of kvm, and bochs. On Thu, Sep 19, 2019 at 11:58 AM Patrick Schleizer wrote: > > Is there any virtualizer / emulator working inside Qubes OS AppVMs? > > -- > You received this message because you are subscribed to the Google Groups > "qubes-users" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to qubes-users+unsubscr...@googlegroups.com. > To view this discussion on the web visit > https://groups.google.com/d/msgid/qubes-users/2d7d4f20-b255-ed3b-30ef-7b98bfd44e69%40whonix.org. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_DASxRUbSMJNJFPbWiN--OGXM_fhtONFKyvW5fOibVnTg%40mail.gmail.com.