I’m trying to add a private yum repo to dom0. In one of my previous posts, I configured a new appvm to work as my updates vm so I can do my updates over a wireguard connection. I got that all functioning properly for dom0 and template vms, but after attempting to add a repo that points to a custom yum repository, I’m getting errors that look perhaps it has something to do with the trust of a repo?
I see this on dom0:
^C*** ERROR while receiving updates:
Error canonicalizing /var/tmp/qubes-updates-tmpeparz_h0.UNTRUSTED/openssh-8.7p1-1.el8.x86_64.rpm
and on the console of my wireguard updates vm:
‘/usr/lib/qubes/qrexec-client-vm dom0 qubes.ReceiveUpdates /usr/lib/qubes/qfile-agent /var/lib/qubes/dom0-updates/packages/*.rpm’ failed with exit code 1!
Not sure how to debug what qrexec isn’t happy with. If I run this command manually, it just returns with a 1 exit status but no output.
The repo I added is not GPG signed. It’s just a regular yum repo. Template VMs have no issue.
Even if it’s a bad idea to add a repo to dom0, I’d like to understand why this isn’t working to deepen my knowledge of Qubes. I’ll probably not include this repo in dom0 in the end, but it would be nice to understand what’s failing here. If I remove my custom repo, things are happy again.
Thanks