Jump to content

Search the Community

Showing results for tags 'templatevm'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • News & Announcements
    • BlockForums Announcements
    • Denarius Announcements
    • Kronos Wallet Announcements
    • The Crypto News Feed
  • Cryptocurrency Discussions
    • Cryptocurrencies
    • Altcoin Announcements
    • General Discussion
    • Tutorials & Help
  • Denarius Discussions
    • General Discussion
    • Tutorials & Help
    • Marketing & PR
    • Development
    • Mining & Staking
    • Trading & Exchanges
    • Marketplace
  • Programming & Design
    • Development QA
    • Design QA
  • Gaming
    • Bot Downloads & Discussion
    • Gaming Discussion
  • Classifieds
    • Buy Sell and Trade
  • Other Discussions
    • Element 115
    • The Lounge
    • Hardware & IoT
    • Tutorials & Guides
    • Domains & Hosting

Product Groups

There are no results to display.

Calendars

  • Community Calendar

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


BTC Address

Found 2 results

  1. Guide to installing Qbuntu (Ubuntu 20.04 - Focal Fossa) TemplateVM in Qubes Release 4.0.4-rc1 fedora-32 as of this writing, I did this on a fresh Qubes install on a couple year old Intel I7. This is similar but a better less steps way to create this. Xenial guide located here https://blockforums.org/topic/305-guide-to-installing-qbuntu-ubuntu-1604-xenial-templatevm-in-qubes-402-rc1/ Qubes Homepage - https://www.qubes-os.org/ Clone the vanilla Fedora templatevm, allow network access, and private storage max size 30gb, I called my clone ubuntu-builder. Open up a terminal in the ubuntu-builder templatevm. Import the Qubes master key gpg --import /usr/share/qubes/qubes-master-key.asc Verify its fingerprint, set as ‘trusted’. This is described here. https://www.qubes-os.org/security/verifying-signatures/ Download the Qubes developers’ keys. wget https://keys.qubes-os.org/keys/qubes-developers-keys.asc gpg --import qubes-developers-keys.asc Download the latest stable qubes-builder repository: git clone https://github.com/QubesOS/qubes-builder.git /home/user/qubes-builder/ Verify the integrity of the downloaded repository. The last line should read gpg: Good signature from… cd /home/user/qubes-builder/ git tag -v $(git describe) Run the ‘setup’ script located in ‘/home/user/qubes-builder/’ Make sure you are in directory ‘qubes-builder’ cd /home/user/qubes-builder/ ./setup Y to add whats missing then yes to add missing keys select 4.0 stable dont select current or current-testing yes (to only build the template) select focal fossa+desktop with spacebar and push enter NEED TO CHANGE IMAGE HERE and get all brand new images of the current process, even though its basically the same. select Builder-rpm builder-debian only, nothing else. (need to update to latest focal fossa image below) The last step to build took me a little over an hour for the whole thing. make install-deps make get-sources make qubes-vm make template We have our Ubuntu 20.04 template, now to install it! Qubes-builder should have created an install script, let's make sure it exists: [user@ubuntu-builder qubes-builder]$ ls -altr qubes-src/linux-template-builder/rpm You should see an 'install-template.sh' file there. Now switch back to your dom0 terminal, and install the template: [user@dom0 ~]$ qvm-run --pass-io ubuntu-builder 'cat /home/user/qubes-builder/qubes-src/linux-template-builder/rpm/install-templates.sh' > install-templates.sh Make the copied script executable and run it [user@dom0 ~]$ chmod +x install-templates.sh [user@dom0 ~]$ ./install-templates.sh #make template (clone) just for denarius, why not in dom0 terminal emulator qvm-clone focal-fossa-desktop denarius-crypto To make the user have a password for sudo. Use this https://www.reddit.com/r/Qubes/comments/e39r8l/ubuntu_1804_lts_template_password/ dom0 terminal (change focal-fossa-desktop and newpassword) qvm-run -a --user root focal-fossa-desktop "echo \"user:newpassword\"|chpasswd" dom0 terminal qvm-run -a --user root focal-fossa-desktop "sudo usermod -a -G sudo user" shutdown your focal-fossa-desktop and now try sudo apt update
  2. How to install bionic-builder template for Ubuntu 18.04 in Qubes OS 4.0.2-rc1, Qbuntu Clone your fedora-30 vanilla template into a temporary 'builder' we will use to create Ubuntu templates. Top left button -> Terminal Emulator [user@dom0 ~]$ qvm-clone fedora-30 ubuntu-builder go into the bionic-builder template and pick your network (sys-firewall), and give yourself 30gb for private storage. Open the terminal for this template and begin. [user@ubuntu-builder ~]$ gpg I missed the receive keys screenshot [user@ubuntu-builder ~]$ gpg --recv-keys 0x36879494 [user@ubuntu-builder ~]$ gpg --edit-key 36879494 gpg> trust >Your decision? 5 >Do you really want to set this key to ultimate trust? Y gpg> quit [user@ubuntu-builder ~]$ wget http://keys.qubes-os.org/keys/qubes-developers-keys.asc [user@ubuntu-builder ~]$ gpg --import qubes-developers-keys.asc [user@ubuntu-builder ~]$ sudo dnf install nano [user@ubuntu-builder ~]$ sudo dnf install git createrepo rpm-build rpm-sign make python-sh rpmdevtools rpm-sign dialog [user@ubuntu-builder ~]$ git clone https://github.com/QubesOS/qubes-builder [user@ubuntu-builder ~]$ cd qubes-builder [user@ubuntu-builder qubes-builder]$ nano example-configs/qubes-os-r4.0.conf [user@ubuntu-builder qubes-builder]$ ./setup select Y to anything missing Select Yes to keys that don't exist. Select Yes to add, this one glitches out for me, but worked first try writing this. Just keep rerunning ./setup over and over until this passes through. If this still won't work, change the pgp.mit.edu server to something else in the setup file. nano setup GPG_KEY_SERVER = 'ha.pool.sks-keyservers.net ' Select Qubes Release 4.0 Select Stable Select none of these options Build Template Only? Yes Select your OS template, this example is using Bionic+desktop Select builder-rpm and builder-debian Get Source? Yes Wait while this gets what the source files. This screen gives us what to do next. make install-deps make get-sources make qubes-vm make template [user@ubuntu-builder qubes-builder]$ ls -altr qubes-src/linux-template-builder/rpm Go to your dom0 terminal and move the install-templates.sh file over [user@dom0 ~]$ qvm-run --pass-io ubuntu-builder 'cat /home/user/qubes-builder/qubes-src/linux-template-builder/rpm/install-templates.sh' > install-templates.sh [user@dom0 ~]$ chmod +x install-templates.sh ./install-templates.sh After this was done, I cloned this into a crypto version to play around in. This is a cryptocurrency related site after all. qvm-clone bionic-desktop bionic-crypto After that, I then deleted the bionic-builder templateVM from Qube Manager to save some disk space.
×
×
  • Create New...