Open kennethrrosen opened 1 week ago
You will need:
netvm
, to provide the dev
qube with a proxy to access remote SSH servers, including git repositories for example.Optional but recommended:
I recommend first trying this setup, it is transparent to the user (if the installation works), there will be (hopefully) no problems. So it is very easy to manage without having to learn many things. After you have used this setup, use your experience to build your custom dev setup. There is no one formula fits all, I don't try to do that, I try to bring the basics that is useful.
Related thread on how to test and run code:
Mgmt are already Fedora, so that seems okay. My hangup at present is the sys-net proxy. When installed in the template of my current sys-net, and with the RPC and policies in place, nothing will connect. Moving current sys-net to sys-net-old then running the formulas is no good, either, as the PCI devices through which connectivity is served exists on sys-net-old but are needed by the new sys-net to download packages. That is where I'm stuck now.
The qube sys-net
don't need to be created, only target the template of the netvm you want to use as the proxy with sys-net.install-proxy
:
Assuming the template of sys-net
is fedora-40
:
sudo qubesctl --skip-dom0 --targets=fedora-40 state.apply sys-net.install-proxy
When installed in the template of my current sys-net, and with the RPC and policies in place, nothing will connect.
Please see https://github.com/ben-grande/qusal/issues/61 for debugging.
Moving current sys-net to sys-net-old then running the formulas is no good, either, as the PCI devices through which connectivity is served exists on sys-net-old but are needed by the new sys-net to download packages. That is where I'm stuck now.
Can you share all the commands and outputs?
Intended workflow:
sys-net
to sys-net-old
.sys-net-old
and check if DNS is workingqubesctl
commandsPCI devices can be attached to multiple qubes, such as sys-net
and sys-net-old
. What can't happen is both qubes powering on when they have the same PCI devices attached. Another problem you may be facing may be due to no-strict-reset
. Does your network PCI card requires this qvm-pci
option? You can check if it is set with qvm-pci list
.
Restarting mirage cleared the issue with the sys-net not connecting with the proxy installed in its template.
Restarting mirage cleared the issue with the sys-net not connecting with the proxy installed in its template.
What is your mirage version? Was it deployed by Qusal?
In dom0
:
cat /var/lib/qubes/vm-kernels/mirage-firewall/version.txt
Latest version is v0.9.1
.
Beginning in v0.9.0
, it is possible to recover from a netvm change. Maybe shutdown of upstream netvm and wait till restart, it cannot recover from this state yet. Maybe report an issue upstream if using the version equal or above v0.9.0
.
Commitment
I confirm that I have read the following resources:
Question
In reference to the thread below; a user would like to contribute regularly (or once) to qusal or the QubesOS project. What are the recommended steps and formulas and dom0/U changes one should take assuming the user starts with the
dev
formula?Originally posted by @ben-grande in https://github.com/ben-grande/qusal/issues/75#issuecomment-2186827657
.