Can somebody clarifies how qubes-update-check service works and how dom0 gets update notifications for TemplateVMs that are never powered on?

Thank you @unman.

That was the helpful boost I needed to test it and get it working.

To clarify, it appears most non-TemplateVMs need:

  • The updates-proxy-setup service enabled via the Qube Manager GUI
  • A qvm-tag so Dom0’s /etc/qubes/policy.d/30-user.policy can route update requests to cacher
  • An entry in Dom0’s /etc/qubes/policy.d/30-user.policy to route update requests from the specified qvm-tag to cacher

I say most because any Qube running the qubes-updates-proxy service (like cacher and sys-net), seems to need:

  • An /rw/config/rc.local entry to revert the cacher template mods
### Revert cacher mods for update detection
sed -i 's^http://HTTPS///^https://^' /etc/apt/sources.list
sed -i 's^http://HTTPS///^https://^' /etc/apt/sources.list.d/*.list
  • A qvm-tag so Dom0’s /etc/qubes/policy.d/30-user.policy can route update requests to sys-net
  • An entry in Dom0’s /etc/qubes/policy.d/30-user.policy to route update requests from the specified qvm-tag to sys-net

Alternatively, I suppose I could revert the cacher repo modifications in all non-TemplateVM’s via /rw/config/rc.local and tag them to bypass cacher in Dom0’s /etc/qubes/policy.d/30-user.policy

Is there a better way or is this just a matter of preference?

Thanks again.

1 Like