Re: [qubes-users] Force a flatpaked application to open attachments, links etc. in a dismVM?

2022-05-30 Thread Demi Marie Obenour
On Sat, May 28, 2022 at 12:56:42PM +0200, Johannes Graumann wrote:
> On Tue, 2022-05-24 at 12:35 -0400, Demi Marie Obenour wrote:
> > On Tue, May 24, 2022 at 10:37:18AM +0200, Qubes OS Users Mailing List
> > wrote:
> > > https://www.qubes-os.org/doc/how-to-use-disposables/#making-a-particular-application-open-everything-in-a-disposable
> > > states:
> > > >  To do this [make a particular application open everything in a 
> > > > disposable VM], enable a service named app-dispvm.X in that
> > > > qube, 
> > > > where X is the application ID.
> > > 
> > > and invokes `app-dispvm.thunderbird` as an example.
> > > 
> > > How would you do that for an application installes and run through
> > > flatpak?
> > 
> > Flatpak-installed applications still have an application ID, which is
> > what gets passed to qubes.StartApp to launch the application.
> 
> Thank you for your answer. Lengthy googling has dug up no answer to
> what an "application ID" actually is or how to look it up. Could you
> please help with that? Given a running program, how do I identify it?

It is the name of the .desktop file the application has within the VM.
For Flatpak apps, I believe it will always be the ID of the flatpak (the
reverse-DNS name).
-- 
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/YpUI0vyWFUt%2B6/o9%40itl-email.


signature.asc
Description: PGP signature


Re: [qubes-users] Problems with announced Fedora 35 templates

2022-05-30 Thread Viktor Ransmayr
Hello everyone,

A small but important clarification !

Viktor Ransmayr schrieb am Montag, 30. Mai 2022 um 10:37:56 UTC+2:

> Hello slcoleman & Qubes Community,
>
> stevenlc...@gmail.com schrieb am Sonntag, 29. Mai 2022 um 20:45:29 UTC+2:
>
>> On Sun, May 29, 2022 at 4:39 AM Viktor Ransmayr  
>> wrote:
>>
>>> stevenlc...@gmail.com schrieb am Samstag, 28. Mai 2022 um 21:54:40 
>>> UTC+2:
>>>

 Thanks for your quick reply!
>>>
>>> However, when I try to list the available templates using the 
>>> 'qvm-template' command, I get the same error message: 
>>>
>>> [vr@dom0 ~]$ qvm-template list
>>> [Qrexec] /bin/sh: /etc/qubes-rpc/qubes.TemplateSearch: No such file 
>>> or directory
>>> ERROR: qrexec call 'qubes.TemplateSearch' failed.
>>> [vr@dom0 ~]$ 
>>>
>>>
>>>
>> I just checked my own system and ran a python3 trace on the command. The 
>> file  /etc/qubes-rpc/qubes.TemplateSearch should be on the sys-firewall 
>> , assuming the default configuration. If you use a different OS or changed 
>> your "Dom0 update qube" in the "Global Settings" for dom0 updates then that 
>> update VM may not have this file installed. I would start by looking 
>> there.  
>>
>
> I've not modified anything - and - the "Global Settings" look OK.
>
> I tried to open a console in 'sys-firewall' - but - can't login :-(
>
> I had expected that I could do so, using my credentials, i.e. user 'vr' 
> plus my password ... 
>

I tried to open a console in 'sys-firewall' - and - could not login.

However, I (obviously) could open a terminal in 'sys-firewall' ...

Here's the content of /etc/qubes-rpc/ :

[user@sys-firewall ~]$ cd /etc/qubes-rpc/
[user@sys-firewall qubes-rpc]$ ls
qubes.Backup qubes.PdfConvertqubes.SuspendPostAll
qubes.ConnectTCP qubes.PostInstall   qubes.SuspendPre
qubes.DetachPciDevicequbes.ResizeDiskqubes.SuspendPreAll
qubes.Filecopy   qubes.Restore   qubes.USB
qubes.GetAppmenusqubes.SaltLinuxVM   qubes.USBAttach
qubes.GetDatequbes.SelectDirectory   qubes.USBDetach
qubes.GetImageRGBA   qubes.SelectFilequbes.UpdatesProxy
qubes.Gpgqubes.SetDateTime   qubes.VMRootShell
qubes.GpgImportKey   qubes.SetMonitorLayout  qubes.VMShell
qubes.InstallUpdatesGUI  qubes.ShowInTerminalqubes.WaitForSession
qubes.OpenInVM   qubes.StartApp
qubes.OpenURLqubes.SuspendPost
[user@sys-firewall qubes-rpc]$ 

With kind regards,

Viktor

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aa4bd9f5-8ec0-459a-8678-5ce12dc8f07an%40googlegroups.com.


Re: [qubes-users] Problems with announced Fedora 35 templates

2022-05-30 Thread Viktor Ransmayr
Hello slcoleman & Qubes Community,

stevenlc...@gmail.com schrieb am Sonntag, 29. Mai 2022 um 20:45:29 UTC+2:

> On Sun, May 29, 2022 at 4:39 AM Viktor Ransmayr  
> wrote:
>
>> stevenlc...@gmail.com schrieb am Samstag, 28. Mai 2022 um 21:54:40 UTC+2:
>>
>>>
>>> Thanks for your quick reply!
>>
>> However, when I try to list the available templates using the 
>> 'qvm-template' command, I get the same error message: 
>>
>> [vr@dom0 ~]$ qvm-template list
>> [Qrexec] /bin/sh: /etc/qubes-rpc/qubes.TemplateSearch: No such file 
>> or directory
>> ERROR: qrexec call 'qubes.TemplateSearch' failed.
>> [vr@dom0 ~]$ 
>>
>>
>>
> I just checked my own system and ran a python3 trace on the command. The 
> file  /etc/qubes-rpc/qubes.TemplateSearch should be on the sys-firewall , 
> assuming the default configuration. If you use a different OS or changed 
> your "Dom0 update qube" in the "Global Settings" for dom0 updates then that 
> update VM may not have this file installed. I would start by looking 
> there.  
>

I've not modified anything - and - the "Global Settings" look OK.

I tried to open a console in 'sys-firewall' - but - can't login :-(

I had expected that I could do so, using my credentials, i.e. user 'vr' 
plus my password ... 

FYI-#1: I have performed an 'in-place-upgrade' from 4.0 to 4.1 a little bit 
over a week ago - and - did not notice any issues, other than this one ...

FYI-#2: Here are the installed packages from dom0:

xen_version: 4.14.5
Linux 5.10.112-1.fc32.qubes.x86_64
  
Installed Packages:  
  
grub2-qubes-theme.x86_64  5.14.4-2.fc32 
kernel-qubes-vm.x86_64   
 1000:5.4.156-1.fc25.qubes 
kernel-qubes-vm.x86_64   
 1000:5.4.190-1.fc25.qubes 
kernel-qubes-vm.x86_64   
 1000:5.10.112-1.fc32.qubes 
python2-qubesadmin.noarch 4.0.32-1.fc25 
python2-qubesimgconverter.x86_64  4.0.31-1.fc25 
python3-qubesadmin.noarch 4.1.23-1.fc32 
python3-qubesdb.x86_644.1.13-1.fc32 
python3-qubesimgconverter.x86_64  4.1.16-1.fc32 
qubes-anaconda-addon.noarch   4.1.8-1.fc32 
qubes-artwork.noarch  4.1.12-1.fc32 
qubes-artwork-plymouth.noarch 4.1.12-1.fc32 
qubes-audio-daemon.x86_64 4.1.21-1.fc32 
qubes-audio-dom0.x86_64   4.1.21-1.fc32 
qubes-core-admin-addon-whonix.noarch  4.1.1-1.fc32 
qubes-core-admin-client.noarch4.1.23-1.fc32 
qubes-core-dom0.noarch4.1.27-1.fc32 
qubes-core-dom0-linux.x86_64  4.1.21-1.fc32 
qubes-core-dom0-linux-kernel-install.x86_64   4.1.21-1.fc32 
qubes-core-qrexec.x86_64  4.1.18-1.fc32 
qubes-core-qrexec-dom0.x86_64 4.1.18-1.fc32 
qubes-core-qrexec-libs.x86_64 4.1.18-1.fc32 
qubes-db.x86_64   4.1.13-1.fc32 
qubes-db-dom0.x86_64  4.1.13-1.fc32 
qubes-db-libs.x86_64  4.1.13-1.fc32 
qubes-desktop-linux-common.noarch 4.1.12-1.fc32 
qubes-desktop-linux-manager.noarch4.1.14-1.fc32 
qubes-dist-upgrade.noarch 4.0.6-1.fc25 
qubes-gpg-split-dom0.x86_64   2.0.59-1.fc32 
qubes-gui-daemon.x86_64   4.1.21-1.fc32 
qubes-gui-dom0.x86_64 4.1.21-1.fc32 
qubes-img-converter-dom0.x86_64   1.2.11-1.fc32 
qubes-input-proxy.x86_64  1.0.26-1.fc32 
qubes-input-proxy-receiver.x86_64 1.0.26-1.fc32 
qubes-libvchan-xen.x86_64 4.1.7-1.fc32 
qubes-manager.noarch  4.1.23-1.fc32 
qubes-menus.noarch4.1.12-1.fc32 
qubes-mgmt-salt.noarch4.1.14-1.fc32 
qubes-mgmt-salt-admin-tools.noarch4.1.14-1.fc32 
qubes-mgmt-salt-base.noarch   4.1.4-1.fc32 
qubes-mgmt-salt-base-config.noarch4.1.1-1.fc32 
qubes-mgmt-salt-base-overrides-libs.noarch4.0.2-1.fc25 
qubes-mgmt-salt-base-topd.noarch  4.1.3-1.fc32 
qubes-mgmt-salt-config.noarch 4.1.14-1.fc32 
qubes-mgmt-salt-dom0.noarch   4.1.14-1.fc32 
qubes-mgmt-salt-dom0-qvm.noarch   4.1.4-1.fc32 
qubes-mgmt-salt-dom0-update.noarch4.1.8-1.fc32 
qubes-mgmt-salt-dom0-virtual-machines.noarch  4.1.16-1.fc32 
qubes-pdf-converter-dom0.x86_64   2.1.12-1.fc32 
qubes-release.noarch