You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This includes how to setup builder disposable template, socket->qrexec
proxy and all relevant parameters
This moves some of the setup steps from README.md in vmm-xen-unified
repo.
QubesOS/qubes-issues#8206
If extra parameters for using the key are needed for `pesign`, add `/home/user/.config/qubes-pesign/CERT_NICKNAME` (where `CERT_NICKNAME` is a name used for `KEY_NAME` value later in this instruciton) to set the arguments, for example:
Copy `rpc/qubes-pesign*` from qubes-builderv2 into `/rw/bind-dirs/etc/systemd/system/` in `qubes-pesign-builder-dvm` and set appropriate SELinux context (if SELinux is enabled there):
184
+
```
185
+
restorecon /rw/bind-dirs/etc/systemd/system/*
186
+
```
187
+
188
+
Add starting the service in `/rw/config/rc.local`:
189
+
```
190
+
systemctl daemon-reload
191
+
systemctl start qubes-pesign.socket
192
+
```
193
+
194
+
Next step is to adjust qrexec policy to allow signing. To not depend on specific dispvm name, the policy will use tags. The `rpc/policy/50-qubesbuilder.policy` file contains commented-out example. Adjust key-holding qube name and possibly certificat nickname there.
195
+
And then add appropriate tag to the `qubes-pesign-builder-dvm`:
0 commit comments