Brand new Qubes R4.2 Installation.
Following https://github.com/QubesOS/qubes-ansible to try to install Ansible.
Step 1 of the procedure:
Ensure that the template used for mgmtvm
has the qubes-core-admin-client
and qubes-ansible
packages installed.
I have:
cloned fedora-41-xfce → fedora-41-mgmt
successfully updated fedora-41-mgmt:
sudo dnf update
successfully installed qubes-core-admin-client
in fedora-41-mgmt:
sudo dnf install qubes-core-admin-client
failed to install qubes-ansible
in fedora-41-mgmt:
sudo dnf install qubes-ansible
Error message contains:
No match for argument: qubes-ansible
I feel I’m missing something obvious.
Help welcome!
There is source code for qubes-ansible
package that you need to build yourself.
Or install from COPR
Hi everyone,
I’m excited to announce that qubes-ansible is now available for testing! You can check it out at https://github.com/fepitre/qubes-ansible .
You have two options to get started:
Build it yourself using qubes-builderv2. Append to your builder.yml components list:components:
(...)
- ansible:
url: https://github.com/fepitre/qubes-ansible
maintainers:
# fepitre's @invisiblethingslab.com
- 77EEEF6D0386962AEA8CF84A9B8273F80AC219E6
Install it via COPR re…
I thought your reference (dated 6th April) was the very first announcement of a testing phase.
Fepitre wrote later (28th April) in the same post:
Do you mean: that
Did dnf
found compiled package of qubes-ansible
?
Autor moved github repository from personal github to qubesos github. But it sesms that it wasn’t compiled and packaged.
Ask autor about it, not me.
We have some version in unstable
repo for dom0. This is absolutely not a secure version to be used in untrusted environment. The reason is that, similar to Salt, we need to isolate each connection from dom0/mgmtvm to a qube with a disposable qube in between. A compromised qube could attempt to execute code into Ansible facts rendering. See Isolate dom0 from untrusted ansible data · Issue #10030 · QubesOS/qubes-issues · GitHub . It is in unstable for anyone wanting to test or use Ansible at its own awareness of security risks it implies. It is also used in CI for helping the development process.
In dom0:
sudo qubes-dom0-update --enablerepo=qubes-dom0-unstable qubes-ansible
gives:
…
Failed to resolve the transaction
No match for argument: qubes-ansible
…
Would it be possible to have:
a list of commands
the qubes where they each of them should be typed (dom0 / fedora-41-mgmt template / mgmtvm
Qube / Other?)
Thanks!
This is only for 4.3 (development).
1 Like