ue) because Mozilla has been a great supporter of Qubes with the big
> grant they gave so it's the least we could do as well as to not put
> Firefox at a disadvantage.
Yes, having this in community repo would be fantastic! In fact, I'd even
consider adding it into the main repo and have it inst
ata (VM settings etc)
- reverting to older revision is not reversible (you cannot switch back
and forth)
- you cannot start both old and new versions at the same time (to copy
data between them for example)
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PG
alt is enough?
2. Is Vagrant the right too for the job?
If we'd go in a direction like this, I'd strongly prefer to re-use some
existing well known tool. Integrating anything into our custom
qubes-builder + template-builder has quite high contributor entry
barrier.
- --
Best Rega
inputs.
> >
> >
> >> On 2/17/21 7:27 PM, Marek Marczykowski-Górecki wrote:
> >>>
> >>> Since some time there is an easier way:
> >>> https://www.qubes-os.org/doc/firewall/#opening-a-single-tcp-port-to-other-network-isolated
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Mar 20, 2021 at 04:20:20PM -0700, Andrew David Wong wrote:
> On 3/20/21 12:09 PM, Frédéric Pierret wrote:
> >
> >
> > Le 3/20/21 à 1:42 PM, Marek Marczykowski-Górecki a écrit :
> > > On Sat, Mar 20, 2021
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Mar 20, 2021 at 09:38:19AM +0100, Frédéric Pierret wrote:
>
>
> Le 3/20/21 à 3:20 AM, Marek Marczykowski-Górecki a écrit :
> > Hi,
> >
> > I want to do a little cleanup on the server, to make more room
reason to keep them online, on
the same server, under same URL? Note this content is also mirrored, so
removing it from here will also reduce storage usage on all the mirrors.
[1] https://www.qubes-os.org/statistics/
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Mar 19, 2021 at 03:07:48PM -0500, Sven Semmler wrote:
> On 3/19/21 2:03 PM, Marek Marczykowski-Górecki wrote:
> > Are you sure you don't have security-testing or current-testing
> > enabled? Those packages are currently onl
I've fixed it now:
https://github.com/QubesOS/updates-status/issues/2385
You can retry with `qubes-dom0-update --refresh`
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmBU9XwACgkQ24/THMrX
1yxt8QgAg1
ly - for example many of the
hardware settings like power management). But I don't think you need to
worry about it in practice.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PGP SIGNATURE-
iQEyBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmBQ6v0ACgkQ24/THMrX
here:
https://github.com/QubesOS/qubes-desktop-linux-common/tree/master/qubesappmenus
I don't think you'll need to modify it or import directly, but it may be
helpful to clarify some details.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PGP SIGNATURE
y requirements.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmBKP0wACgkQ24/THMrX
1yyVQQf/S3Dm6G/1cgnySbiQVejeau5XKkGtN4tN8nADs/JlzpLOUkfgD+Prfeyw
CfAYpbdtxfxoNmt9RP9Wq43U/jBFczwuK1EeodYJ4GvcSl5N7
s not honored
>
> How can i get by this so this one VM can do finish its upgrade before
> forcibly rebooted?
>
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmBJZz0ACgkQ24/THMrX
1yyEowf9EGwsC
os.org/doc/version-scheme/, but indeed the relation to
specific packages versions is not that clear there.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmBFUqQACgkQ24/THMrX
1yz+DQf+NMqNn
n (PV must die
first, at the very least). But it does use some other mitigations like
SMAP/SMEP. And also some of the more complex parts like instruction
emulator are integrated with fuzzy testing.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-BEGIN PGP SIGNATURE--
tps://www.reddit.com/r/Qubes/comments/8cb57i/how_to_achieve_qube_to_qube_communication_port/
> [3] - https://github.com/QubesOS/qubes-issues/issues/6225
> [4] - https://git.lsd.cat/g/thinkpad-coreboot-qubes
> [5] - https://lsd.cat
>
- --
Best Regards,
Marek Marczyko
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Jan 16, 2021 at 01:49:25AM +, Jinoh Kang wrote:
> On 1/15/21 8:06 PM, Marek Marczykowski-Górecki wrote:
> > On Fri, Jan 15, 2021 at 05:29:43PM +, Jinoh Kang wrote:
> >> Is qubes-xorg-x11-drv-intel an option? Upstre
apshot.
We do backport this package from newer Fedora already:
https://github.com/QubesOS/qubes-linux-dom0-updates
But I would prefer to get it upstream anyway (and then possibly build
xorg-x11-drv-intel from newer git snapshot).
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Thin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Jan 13, 2021 at 01:21:51PM +, Jinoh Kang wrote:
> On 1/11/21 11:03 PM, Marek Marczykowski-Górecki wrote:
> > So, I can confirm the (fixed) 5.10 patch also improves the situation.
>
> Sounds good. Thanks for testing!
llow-up patches and give some feedback here.
So, I can confirm the (fixed) 5.10 patch also improves the situation.
Have you sent it upstream? I do consider including it in our standard
kernel package, but I'd like to see i915 driver maintainer opinion
first.
- --
Best Regards,
Marek Marczykows
const char *type,
> diff --git a/drivers/gpu/drm/i915/i915_params.h
> b/drivers/gpu/drm/i915/i915_params.h
> index 330c03e2b4f7..1169a610a73c 100644
> --- a/drivers/gpu/drm/i915/i915_params.h
> +++ b/drivers/gpu/drm/i915/i915_params.h
> @@ -79,6 +79,7 @@ struct drm_printer;
>
hat it's emulated (emu_mask) which means qemu provides own values
instead of passing them from the hardware and the values for those 3 bits
are 0 (init_val).
I'm not sure how hard would be implementing multi-vector support here,
but it's clearly not there.
[1] https://github.com/qemu/qemu/blob/master/hw/xen/xen_p
breaks detached signatures, but not the inline ones.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX
.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAl/OkYIACgkQ24/THMrX
1yyv3Qf/dlfOvyjyIdPL05K
nd adding INCREMENT_DEVEL_VERSIONS=1 to your
builder.conf, so that your build will automatically get higher version
and avoid having multiple different binaries with the same version.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people nor
reverse
engineering some parts), in addition to development similar to the
second option.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP
>- Application Troubleshooting
>- Tails Troubleshooting
>
>
> Thanks for reading.
> Have a great weekend.
>
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting su
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Nov 13, 2020 at 12:35:55PM +0100, Wojtek Porczyk wrote:
> On Thu, Nov 12, 2020 at 11:25:16PM -0800, Andrew David Wong wrote:
> > On 11/12/20 1:39 PM, Demi M. Obenour wrote:
> > > On 11/12/20 2:56 PM, Marek Marczyko
to do in rush.
[1] https://blog.travis-ci.com/2020-11-02-travis-ci-new-billing
[2]
https://www.qubes-os.org/news/2020/10/05/new-gentoo-templates-and-maintenance-infrastructure/
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) #61: Information
leak via power sidechannel (XSA-351). The text of this QSB is
reproduced below. This QSB and its accompanying signatures will always
be available in the
Those may be severely outdated. Check git log for them and correlate
with Qubes version at that time. At the very least add an info to which
version it was applicable.
>- Troubleshooting other hardware issues
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it mes
/github.com/username.gpg.
>
> This returns the key as-is.
Nice find! This helps a lot. We still want to build a cache, so we can
verify signatures even after the key is removed from github (or account
deleted etc), but this method can be used to reliably populate that
cache.
- --
Best
key there is more elaborate (requires email
confirmation). Any other ideas?
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBC
relevant
> content has either been placed under "Suspend/Resume Troubleshooting" or
> "PCI Troubleshooting".
Sounds ok.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-pos
l instructions.
>
> Any thoughts? Anyone else seeing this? My build machine is a bit slow, so
> I'll try moving *dummy-psu* and *dummy-backlight* above
> *linux-template-builder* and see if that fixes issue #1 and report back
> some time tomorrow.
I think that's it. I've just move
t;- Performance troubleshooting
>- Media troubleshooting
Sounds good!
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Sep 20, 2020 at 08:03:31PM +0200, Marek Marczykowski-Górecki wrote:
> On Sun, Sep 20, 2020 at 05:33:26PM +, Rusty Bird wrote:
> > Marek, the masses are chanting it!!
> > https://www.youtube.com/watch?v=sq5g-V63Q30=151
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Oct 11, 2020 at 06:45:26PM -0500, Andrew David Wong wrote:
> On 10/11/20 11:16 AM, Marek Marczykowski-Górecki wrote:
> > On Sat, Oct 10, 2020 at 09:50:00PM -0500, Andrew David Wong wrote:
> > > I still upgrade dom0 and
to 1)
--targets=vm1,vm2,... - limit to specific VMs, instead of all the
templates (use instead of --templates --standalones)
--show-output - show update summary instead of just OK/FAIL
For other options see qubesctl --help
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible
report/discussion where the particular issue is analysed (if available)
- - this will give more context in case of similar but not exactly the
same problem.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in w
et
> is None or default_target in targets_for_ask
> Oct 03 10:56:06 dom0 qrexec-policy-daemon[2296]: AssertionError
This looks like a bug in dom0 vs @adminvm processing. dom0 is
translated to @adminvm in some places but not others...
- --
Best Regards,
Marek Marczykowski-Górecki
Invisi
l in dom0 and observe
qrexec-related messages.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/T
is run
in a chroot environment that shouldn't depend on the outside
distribution...
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIG
t; > lvm_pool qubes_dom0/vm-pool
> > %end
>
> Output of 'qvm-pool':
> > NAME DRIVER
> > varlibqubes file
> > linux-kernel linux-kernel
>
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which
eas, perhaps even bisecting Xen between 4.13
and 4.14 would work.
> *
> https://github.com/kdave/btrfs-progs/commit/0ff7a9b5210723bd4ad0d9d78dbbb18ee8fdd2b1
[2] https://github.com/QubesOS/qubes-issues/issues/6066
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Becaus
ing - typos,
broken references between VMs etc will prevent qubesd to start.
And since you're probably going to modify storage, be sure to keep
metadata (volume names, sizes etc) in sync.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in whic
ends very soon (final report to
be submitted this week), I'm quite positive the core part is already in
a good shape.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
his in Qubes?
>
> Thank you in advance!
You can use `virsh -c xen dump` or `xl dump-core`. It may be good to
pause the qube first.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-postin
tion against DMA attacks.
This sounds like a question for xen-devel ML instead.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBCA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Aug 01, 2020 at 11:32:36AM -0400, Demi M. Obenour wrote:
> On 2020-08-01 07:59, Marek Marczykowski-Górecki wrote:
> > On Fri, Jul 31, 2020 at 02:17:05PM -0700, Jason M wrote:
> >> I then looked into alternatives to p
libvirt uses the number of processors available (make -j32 V=1). It
> will
> build without errors if I generate a '.rpmmacros' file containing
> '%_smp_mflags' -j10' to the 'chroot-dom0-fc32/home/user' directory.
> Just
> wondering is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Jul 26, 2020 at 09:03:35PM -0400, Demi M. Obenour wrote:
> On 2020-07-26 20:31, Marek Marczykowski-Górecki wrote:
> > On Sun, Jul 26, 2020 at 06:59:02PM -0400, Demi M. Obenour wrote:
> >> When looking at recent posts about
tall such package with the new qvm-template directly in dom0, but
for added protection, it is also possible to use that tool outside of
dom0 (given proper Admin API permissions).
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people
(in most
cases - all of them).
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAl
ink we've tried
every sensible set of dependencies and dnf options:
https://github.com/QubesOS/qubes-desktop-linux-xfce4/pull/21#discussion_r447384248
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, May 23, 2020 at 11:16:13AM -0500, Andrew David Wong wrote:
> On 2020-05-23 7:48 AM, Marek Marczykowski-Górecki wrote:
> > Hi Andrew,
> >
> > Recently I've stumbled over an idea for issue template:
> > https:/
od ends both for us and for Google (August 16). So, there is quite a
bit of time until that:
https://developers.google.com/season-of-docs/docs/timeline
> Thanks
> Sarvottam Kumar
>
> [1]
> https://docs.google.com/document/d/18MvrZ3n4BAOXVsVl-i0petYQCKymrmP3VHExeoFoYEc/edit?usp=sharin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Jul 08, 2020 at 06:57:05PM +, WillyPillow wrote:
> On Tuesday, July 7, 2020 8:57 AM, Marek Marczykowski-Górecki
> wrote:
> > Perhaps a better solution would be to create new separate package with
> > template repo
oject.org/docs/unstable-staging/features/dom0less.html
> <http://xenbits.xenproject.org/docs/unstable-staging/features/dom0less.html>
> [3] https://elinux.org/images/f/f7/Dom0less_-_ELC_2019.pdf
> [4] https://www.denx.de/wiki/U-Boot/X86
> <https://www.denx.de/wiki/U-Boot/X8
d enough for this use case. If you want to
manage templates on Qubes 4.1, use VM with packages from Qubes 4.1.
> [^1]: Unfortunately this also means that I'm a bit behind on my original
> schedule. Hopefully I'm able to catch up soon.
- --
Best Regards,
Marek Marczykowski-Górecki
Invi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Jul 03, 2020 at 06:16:44PM +, WillyPillow wrote:
> On Friday, July 3, 2020 5:28 AM, Marek Marczykowski-Górecki
> wrote:
> > Besides comments I've left there, overall looks good.
> > I'm not sure if splitting epoch, v
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jul 02, 2020 at 06:57:37PM +, WillyPillow wrote:
> On Wednesday, July 1, 2020 11:10 AM, Marek Marczykowski-Górecki
> wrote:
>
> > On Tue, Jun 30, 2020 at 07:21:23PM +, WillyPillow wrote:
> >
>
github interface then.
> For the next step, should I start implementing the interactions with the
> repos?
Yes :)
While you are writing/testing those things, please also keep notes about
testing scenarios. Can be sketch quality (list of commands to test or
such). This will be useful later when int
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Jun 27, 2020 at 08:05:49PM +, WillyPillow wrote:
> On Friday, June 26, 2020 7:53 AM, Marek Marczykowski-Górecki
> wrote:
>
> > On Thu, Jun 25, 2020 at 05:22:12PM +, WillyPillow wrote:
> >
>
> > &g
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jun 25, 2020 at 05:22:12PM +, WillyPillow wrote:
> On Monday, June 22, 2020 12:11 PM, Marek Marczykowski-Górecki
> wrote:
> > If we rely on the side effect of qubes.SyncAppmenus to not only extract
> > available deskt
deed the example is a bit unfortunate, as it may be
dangerous when used directly. I'll update it with a different target
than dom0.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-po
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Jun 20, 2020 at 04:47:49PM +, WillyPillow wrote:
> On Wednesday, June 17, 2020 11:55 PM, Marek Marczykowski-Górecki
> wrote:
> > I'm not yet sure about interactions with qubes.SyncAppmenus call (used
> > to extract
gt; > I think we need to find the right balance here, for the indicator to be
> > not too-annoying. But I still think it should be clearly visible all the
> > time, not only during the switch action.
>
> If really needed, maybe a little script could run on startup, perform a
>
t. The actual data doesn't need to be available at this point.
See here for documentation about various methods:
https://dev.qubes-os.org/projects/core-admin/en/latest/qubes-storage.html#storage-pool-driver-api
> So I guess I'd also have to proxy the Volume class for that feature? -_-
I think
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Jun 19, 2020 at 04:20:40PM -0700, Jean-Philippe Ouellet wrote:
> On Thu, Jun 18, 2020 at 9:14 PM Marek Marczykowski-Górecki
> wrote:
> >
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jun 18, 2020 at 11:40:07PM -0400, Demi M. Obenour wrote:
> On 2020-06-18 22:38, Marek Marczykowski-Górecki wrote:
> > On Thu, Jun 18, 2020 at 09:49:14PM -0400, Demi M. Obenour wrote:
> >> Would it be possible to
lready - yet, I see many research papers with
similar ideas, some from many years ago, and exactly zero real-life
working implementations.
Anyway, this is rather a question to relevant hypervisor developers (Xen
in this case).
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: B
IOMMU (at least until PV is
> > completely removed), please provide patches implementing the second
> > point above. Then, I'll add the first one.
>
> A boot parameter would be a good choice I think. Nobody would add a boot
> parameter and switch vms to pv mode "by accident
't tried it, but it should be possible.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQ
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Jun 09, 2020 at 12:35:48PM +, WillyPillow wrote:
> On Sunday, June 7, 2020 11:39 PM, Marek Marczykowski-Górecki
> wrote:
> > [1]
> > https://dev.qubes-os.org/projects/core-admin/en/latest/qubes-features.html#qv
e for notifications
about every single message, but I guess it will be hard to load back
into discourse if we'd ever need to.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, Jun 07, 2020 at 01:39:59PM +, WillyPillow wrote:
> On Friday, June 5, 2020 4:53 AM, Marek Marczykowski-Górecki
> wrote:
>
> > On Wed, Jun 03, 2020 at 07:02:01PM +, WillyPillow wrote:
> > > There may be u
> > "There are two hard things in computer science: cache invalidation, naming
> > things, and off-by-one errors."
>
> Jokes aside, I think `qtm`, as proposed in #1326, is a reasonable name for the
> CLI tool.
What about qvm-template?
> - - -
>
> By the
long list). But I'm not sure if it helps with
anything I mentioned in this email.
[1] https://github.com/QubesOS/qubes-issues/issues/5863
[2] https://github.com/QubesOS/qubes-issues/issues/5875
[3] https://github.com/QubesOS/qubes-issues/issues/5791
- --
Best Regards,
Marek Marczykowski-Górecki
Inv
ts
> python2-chardet
> python2-crypto
> python2-qubesadmin
> python2-singledispatch
> python2-backgports_abc
>
> All are listed under 'removing dependent packages' when running
> qubes-dom0-update, yet all are left in place.
- --
Best Regards,
Marek Marczyk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, May 27, 2020 at 11:21:57PM -0700, Foppe de Haan wrote:
>
>
> On Wednesday, May 27, 2020 at 3:57:26 PM UTC+2, Marek Marczykowski-Górecki
> wrote:
> >
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
[moving to a separate sub-thread]
On Thu, May 28, 2020 at 03:18:08AM +, WillyPillow wrote:
> On Tuesday, May 26, 2020 11:52 AM, Marek Marczykowski-Górecki
> wrote:
>
> > On Mon, May 25, 2020 at 05:19:04PM +, Wi
software is updated
3. domains widget doesn't work (it crashes on startup, flashing)[3]
[1] https://github.com/QubesOS/qubes-issues/issues/5763
[2] https://github.com/QubesOS/qubes-issues/issues/4370
[3] https://github.com/QubesOS/qubes-issues/issues/5854
- --
Best Regards,
Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, May 26, 2020 at 12:50:39PM -0700, Sarvottam Kumar wrote:
>
>
> On Tuesday, May 26, 2020 at 8:24:39 AM UTC+5:30, Marek Marczykowski-Górecki
> wrote:
> > A technical detail: I would be careful about requirin
that instead.
Yes, configuring things within a VM is rather a task for salt. But you
can totally create VMs and set their properties via Admin API. In fact,
all qvm-* tools use Admin API to do their things. It's just not that
visible when running in dom0, because policy is bypassed in this c
ilding a custom kernel.
> I would prefer to avoid that.
That's a bummer. Are there any plans for userspace access to those
interfaces? Without them, you won't have qrexec neither (if you'd like
this to be some next step).
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Bec
pVM so that users can open it whenever they want.
> Here I'm looking for suggestions so feel free to share your opinion.
Oh, you've covered this point already :) I would first try to search for
existing applications like that. There is for example Yelp[2], but maybe
there is something more lightweight
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sun, May 24, 2020 at 04:12:27PM -0400, Demi M. Obenour wrote:
> On 2020-05-24 15:58, Marek Marczykowski-Górecki wrote:>> That makes sense.
> Writing to a qube’s root volume from dom0 is a
> >> safe operation, since i
gs-file (the "tplspec" parts) with the build process.
> > this is mostly needed for the mirage templates.
>
> That makes sense. Writing to a qube’s root volume from dom0 is a
> safe operation, since it doesn’t do anything that the qube could
> not already do itself.
bes-os.org/support/ ?
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAl7JG64ACg
ive stream are here:
https://twitter.com/3mdeb_com/status/1263068441319223296
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP
ontent of
this one is discarded at each VM shutdown
More details here:
https://www.qubes-os.org/doc/template-implementation/
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad
untu, GNOME, and Internet Archive.
> Besides writing, I've also worked as a web developer in my two previous
> internships.
Thanks for the above description and the link, there is quite impressive
collection :)
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it
description itself project please include
also a plan how you want to approach it. Things like proposed structure,
steps to achieve it etc.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, May 12, 2020 at 05:36:07PM -0700, Brendan Hoar wrote:
> On Tuesday, May 12, 2020 at 8:01:50 PM UTC-4, Marek Marczykowski-Górecki
> wrote:
> >
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
>
notice.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAl67OOYACgkQ24/THMrX
1yy
s a
> broken template.
AFAIR dnf system-upgrade doesn't fully work on Qubes, because it
performs the update before qrexec is started, which means you'll most
likely hit 60s startup timeout.
Take a look at upgrade documentation here:
https://www.qubes-os.org/doc/template/fedora/upgrade/
-
il signature verifies correctly. On the other
hand, I get bad signature on yours email, probably because of
automatically added footer (use gpg inline instead of mime to avoid the
issue - this way the footer will be outside of the signed part).
- --
Best Regards,
Marek Marczykowski-Górecki
Invi
happy to work with
> anyone on this issue.
>
> Thanks in advance!
>
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Apr 02, 2020 at 09:59:32PM -0400, Demi M. Obenour wrote:
> On 2020-04-02 21:46, Marek Marczykowski-Górecki wrote:>> Marek: is OCR on a
> converted PDF safe? Being able to reconstruct the
> >> Also, could this be
101 - 200 of 782 matches
Mail list logo