Search the Community
Showing results for tags 'fedora'.
KRONOS Kronos (Originally Denarius Pi - dPi) is a AIO interface/wallet for Denarius. Kronos was originally built with the intention of running it and installing it on Raspberry Pi Ubuntu systems, but now can be used mostly for all Linux distros. It is recommended to have at least 2GB of RAM to install and run Kronos (It also runs a Denarius node). Please go to the last page of this thread for updated information. Kronos has progressed massively overtime and this information can be out-of-date and deprecated. Features: Send and Receive D Denarius Addresses with P2PK and P2PKH scripthashed balances Import and Export Private Keys View Transactions Terminal (Access your terminal for advanced use or restarting your Denarius node manually) Generate Minikeys Convert Minkeys Encrypted Local LevelDB 24 Word Seed Phrases Block Explorer (View Addresses, Transactions, and Blocks) Stake your Denarius Monitor your configured FortunaStakes Verify Denarius Messages Sign Denarius Messages Backup Wallet Send Raw Transactions View Current OS Enviroment Statistics like CPU and Memory Usage Runs on local network by default, so great for running on a local Pi or Linux box and then accessing it from your phone or other computer, can also run it locally if viewing with a monitor on a Pi or Linux box. More Coming Soon How to Install: Run one of these commands depending on your flavor of Linux! wget -qO- https://raw.githubusercontent.com/carsenk/kronos/master/installkronos.sh | bash or curl -o- https://raw.githubusercontent.com/carsenk/kronos/master/installkronos.sh | bash Github: https://github.com/carsenk/kronos Screenshot of Kronos: Screenshots when this all started (dPi): More information and list of features will be coming soon! Stay tuned! It will be a one liner install script to run.
Wondering if anyone has been able to compile the daemon and/or QT in Fedora and not had a segfault near the end of syncing. This is what I have tried. Deamon sudo dnf install make automake gcc gcc-c++ kernel-devel boost-devel libtool zlib-devel libevent-devel libcurl-devel libdb-devel libdb-cxx-devel miniupnpc miniupnpc-devel wget https://ftp.openssl.org/source/old/1.0.1/openssl-1.0.1j.tar.gz tar -xzvf openssl-1.0.1j.tar.gz cd openssl-1.0.1j ./config make depend make sudo make install sudo ln -sf /usr/local/ssl/bin/openssl `which openssl` cd ~ openssl version -v wget -O boost_1_58_0.tar.gz https://sourceforge.net/projects/boost/files/boost/1.58.0/boost_1_58_0.tar.gz/download tar xzvf boost_1_58_0.tar.gz cd boost_1_58_0/ ./bootstrap.sh --prefix=/usr/local ./b2 sudo ./b2 install sudo /bin/bash -c 'echo "/usr/local/lib" > /etc/ld.so.conf.d/boost.conf' sudo ldconfig BOOST_INCLUDE_PATH=/usr/local/include/boost BOOST_LIB_PATH=/usr/local/lib OPENSSL_INCLUDE_PATH=/usr/local/ssl/include OPENSSL_LIB_PATH=/usr/local/ssl/lib make -f makefile.unix USE_NATIVETOR=- -j6 QT sudo dnf install qt5-qtbase qt5-qtbase-devel qt5-qttools qt5-qttools-devel qt5-qttools-common qrencode-devel protobuf-devel change line 9 in src/qt/trafficgraphwidget.cpp so it looks like // Copyright (c) 2011-2013 The Bitcoin developers // Distributed under the MIT/X11 software license, see the accompanying // file COPYING or http://www.opensource.org/licenses/mit-license.php. #include "trafficgraphwidget.h" #include "clientmodel.h" #include <QPainter> #include <QPainterPath> #include <QColor> #include <QTimer> Then compile qmake-qt5 "USE_UPNP=1" "USE_QRCODE=1" BOOST_INCLUDE_PATH=/usr/local/include/boost BOOST_LIB_PATH=/usr/local/lib OPENSSL_INCLUDE_PATH=/usr/local/ssl/include OPENSSL_LIB_PATH=/usr/local/ssl/lib denarius-qt.pro USE_NATIVETOR=- make -j6 But segfaults on a reorg or something when the sync to current block happens. Arch and Ubuntu 20.04 do the same thing.
Its very easy to setup the Denarius wallet daemon using SNAP on most Linux distributions, including even a 2GB or more ram Raspberry Pi4. Arch, CentOS, Debian, elementary, Fedora, KDE Neon, Kubuntu, Manjaro, Mint, openSUSE, Red Hat, and Ubuntu are just a few of the supported distros. I will assume you are running a single daemon on a VPS, first create directory as we want to download chaindata and unzip into the proper folder first. If you end up using parallels to install more than 1 snap daemon on your server, the directories would be like this and each need their own chaindata. ~/snap/denarius_1/common/.denarius ~/snap/denarius_2/common/.denarius ~/snap/denarius_3/common/.denarius Start creating the directory so we can grab chaindata for the unzip. If you are using a pi4 or similar ARM server, use the ARM download link. AMD64 -Â https://denarii.cloud/chaindata.zip ARM -Â https://denarii.cloud/pichaindata.zip mkdir ~/snap mkdir ~/snap/denarius mkdir ~/snap/denarius/common mkdir ~/snap/denarius/common/.denarius cd ~/snap/denarius/common/.denarius/ wget https://denarii.cloud/chaindata.zip unzip chaindata.zip rm chaindata.zip Pick your OS to install Denarius Daemon from Snap Page https://snapcraft.io/denarius Example Ubuntu sudo apt update sudo apt install snapd sudo snap install denarius Run Snap Daemon denarius.daemon this will auto generate a denarius.conf Stop Snap Daemon after about 60 seconds denarius.daemon stop Edit denarius.conf to add your privkey to denarius.conf and delete these 2 lines fortunastake=0 and fortunastakeaddr= nano denarius.conf fortunastakeprivkey=YOURFORTUNASTAKEGENKEYHERE Example denarius.conf rpcuser=5fWxpSAp rpcpassword=2uArAP0XQvL20a6GuqR5MnP rpcport=32369 port=33369 daemon=1 listen=1 server=1 fortunastakeprivkey=YOURFORTUNASTAKEGENKEYHERE addnode=126.96.36.199 addnode=188.8.131.52 addnode=184.108.40.206 addnode=220.127.116.11 addnode=18.104.22.168 addnode=22.214.171.124 addnode=126.96.36.199:33369 addnode=188.8.131.52:333691 addnode=184.108.40.206:33369 addnode=220.127.116.11:33369 addnode=18.104.22.168:33369 addnode=22.214.171.124:33369 addnode=126.96.36.199:33369 addnode=188.8.131.52:33369 addnode=184.108.40.206:33369 addnode=220.127.116.11:33369 addnode=18.104.22.168:33369 addnode=22.214.171.124 addnode=[2001:bc8:47a8:2519::1] save -> ctrl+x yes Run Snap Daemon denarius.daemon To watch the debug.log as this syncs and to watch the enable happen tail -f debug.log For the 5000 D send please use the original guide for reference. Â
A guide on how to setup Windows 10 in Qubes 4.0.2-rc1, and then how to login using RDP in a Fedora Qube for clipboard anf file sharing. If you are finding this tutorial, I am going to skip some of the basic how to install Windows 10 shenanigans, as that's a bit redundant. First read through the original guide a few times to get a feel for this. https://groups.google.com/d/msg/qubes-users/dB_OU87dJWA/X2WWa1y-BQAJ What I did was get the Win10 ISO from MS download tool and put that windows.ISO file on a usb drive. https://www.microsoft.com/en-us/software-download/windows10 I then took this file and put it inside a qube's download folder. Once there we use the official Qubes docs. Choose your qube and folder the ISO was placed in for the last step here. https://www.qubes-os.org/doc/windows-vm/ Create a new Qube: Name: Win10, Color: red Standalone Qube not based on a template Networking: sys-firewall (default) Launch settings after creation: check Click â€œOKâ€�. Settings: Basic: System storage: 30000+ MB Advanced: Include in memory balancing: uncheck Initial memory: 4096+ MB Kernel: None Mode: HVM Click "Apply". Click "Boot from CDROM": "from file in qube": Select the qube that has the ISO. Select ISO by clicking"¦". Click 'OK" to boot into the windows installer. Setup Windows 10 as usual, each time the Qube resets the VM will close, keep starting up again until you get to the login screen. Make sure to put some type of password in as we will use this username and password to login through RDP later in the guide. Setup RDP in Windows 10. Enable Remote Desktop in Settings > System Next we need a Fedora qube running freerdp and a firewall qube. I cloned the Fedora 30 template and sys-firewall templates. Because sys-firewall is based off of the Fedora 30 template lets install freerdp in there, I also installed nano since I prefer that to edit files. open up terminal in fedora-30 templateVM. sudo dnf --refresh install freerdp sudo dnf install nano Clone the sys-firewall qube and I called mine sys-firewall-RDP so I knew which one to mess around with. Clone fedora-30 templateVM and use sys-firewall-RDP for your network, call it whatever, fedora-RDP for eaxmple. Lets get the firewall to talk between Win10 qube and our new fedora-RDP qube. We need the IP addresses of both of these qubes for the next step. Open a terminal in sys-firewall-RDP qube. Example Qube A - fedora-RDP (10.137.0.31) Qube B - Win10 (10.137.0.30) sudo nano /rw/config/qubes-firewall-user-script iptables -I FORWARD 2 -s 10.137.0.30 -d 10.137.0.31 -j ACCEPT iptables -I FORWARD 2 -s 10.137.0.31 -d 10.137.0.30 -j ACCEPT save this and next file to edit sudo nano /rw/config/rc.local iptables -I INPUT -s 10.137.0.30 -j ACCEPT iptables -I INPUT -s 10.137.0.31 -j ACCEPT Restart the sys-firewall-RDP qube. Open fedora-RDP terminal and Win10 qubes. I was able to ping 10.137.0.30 from fedora-RDP and now we are getting close. a sample run of freerdp xfreerdp /u:<USERNAME> /p:<PASSWORD> /v:<WIN10 QUBE IP>:3389 or xfreerdp /u:buzzkillb /p:denariusrocks /v:10.137.0.30:3389 Some magic should happen and now you RDP'd into Windows 10. Lets add clipboard sharing and file sharing. xfreerdp /u:buzzkillb /p:denariusrocks /v:10.137.0.30:3389 /drive:software,/home/user/Downloads /clipboard this will create a Windows shared folder called software in the fedora-RDP qube and share with /home/user/Downloads and also allow copy and paste text. lets just show some extra power of this. regedit this to 1 in your Windows 10 Qube. https://getadmx.com/?Category=Windows_10_2016&Policy=Microsoft.Policies.TerminalServer-Server::TS_ALLOW_APPS xfreerdp /u:buzzkillb /p:denariusrocks /v:10.137.0.30:3389 /drive:software,/home/user/Downloads /clipboard /app:"C:\Windows\explorer.exe" This line will open a windows of just the Windows File Explorer. I ended up creating a start.sh file with these lines like this. start.sh #!/bin/sh xfreerdp /u:buzzkillb /p:denariusrocks /v:10.137.0.30:3389 /drive:software,/home/user/Downloads /clipboard /app:"C:\Windows\explorer.exe" What would be sweet is putting start.sh into /usr/local/bin and creating a desktop icon in the fedora-RDP qube, to pull these things up like they are in typical Qubes format. I will add more as I play around with this. Next will also be how to run a GPU for games.