Help with Simple set-up of new qubes and software

I have created this file successfully

Create a file in dom0 with this content at /etc/yum.repos.d/3isec-dom0.repo


``
Once you have copies of the key, check the fingerprint:

gpg -n --import --import-options import-show unman.pub

replacing unman.pub with the path to the key.
The output should look similar to this:

what is path to the key mean ? what I should put here?


Where did you save the file unman.pub? Write the pwd.

1 Like

This article explains what the path to a file is in Linux.
It’s the location of a file in the file system.

So, if you downloaded the key to Downloads in your home directory, the full
path would be /home/user/Downloads/unman.pub
If you saved the key in /tmp, the full path would be /tmp/unman.pub

You don’t need to use the full path. If you are already in /home/user/
(see where you are with pwd), then you can just use
Downloads/unman.pub - notice there’s no leading slash.

2 Likes

Thanks. I have installed sys-vpn how to run ProtonVPN on it.

I’ll leave this to someone who knows about ProtonVPN.

The Description specifically references openvpn - if you have an openvn
configuration file you should be fine. If you don’t, this isn’t the
package for you.

I’ve had a specific request for a ProtonVPN package - I just haven’t got
round to it yet.

1 Like

I have the protonvpn openvpn file. Would it work properly?

Where should I add my OpenVPN file (dedian-11-minimal, openvpn Template, or sys-vpn) in general?

The package has been tested with various openvpn configs, but not, I
think,one from ProtonVM.

You should put it in sys-vpn.
There’s a script to run, which you should be able to call from the Q
Menu for sys-vpn. It’s a menu entry for vpn_setup.
If you don’t see it, go to the qube settings Applications pane, and (if
necessary) hit the refresh button.

We dent put it in the template because you have the chance to create
other vpn gateways using that template, each with their own
configuration.

Please feed back how you get on.

2 Likes

I have it with this name " Application missing in template ( vpn_setup_desktop).

I have an issue here.

Just remove it and refresh it

Dont do this.

Just do what I said - go to the Applications pane (where you were) and
hit the Refresh button - marked “Refresh applications”, I think.
Thats all you need to do.
The template will be restarted so that the right details end up in the
qube.

1 Like

Continuing the discussion from Help with Simple set-up of new qubes and software:

I did this step and still have the same issue

Really? works for me.
You can always run the script - open a terminal in sys-vpn and run
/home/user/install.sh

1 Like

my ( vpn_setup_desktop) disappeared from the applications

Also, I have tried to run the script but I failed:

1- open terminal
2- ./home/user/install.sh

'outputs:
bash: ./home/user/install.sh: No such file or directory

Can you send me (PM) the log file:
/var/log/qubes/mgmt-template-openvpn.log
/var/log/qubes/mgmt-sys-vpn.log

The script is at /home/user/install.sh, (you have twice included a
leading “dot”)
Until the installation error is resolved, I don’t suggest you run the
script.

GNU nano 4.9.3 /var/log/qubes/mgmt-template-openvpn.log
2022-08-29 22:37:39,677 calling ‘state.apply openvpn.install’…
2022-08-29 22:41:20,839 output: template-openvpn:
2022-08-29 22:41:20,840 output: ----------
2022-08-29 22:41:20,840 output: _error:
2022-08-29 22:41:20,840 output: Failed to return clean data
2022-08-29 22:41:20,840 output: retcode:
2022-08-29 22:41:20,840 output: 126
2022-08-29 22:41:20,841 output: stderr:
2022-08-29 22:41:20,841 output: Request refused
2022-08-29 22:41:20,841 output: stdout:
2022-08-29 22:41:20,841 exit code: 20
2022-09-07 14:18:28,557 calling ‘state.apply openvpn.install’…
2022-09-07 14:22:00,109 output: template-openvpn:
2022-09-07 14:22:00,110 output: - Rendering SLS ‘base:openvpn.install’ fail>
2022-09-07 14:22:00,110 output:
2022-09-07 14:22:00,110 output: —
2022-09-07 14:22:00,110 output: # vim: set syntax=yaml ts=2 sw=2 sts=2 et>
2022-09-07 14:22:00,110 output: #
2022-09-07 14:22:00,110 output:
2022-09-07 14:22:00,110 output: {% if salt’qvm.exists’ %} >
2022-09-07 14:22:00,110 output:
2022-09-07 14:22:00,110 output: /etc/apt/sources.list:
2022-09-07 14:22:00,111 output: file.replace:
2022-09-07 14:22:00,111 output: - names:
2022-09-07 14:22:00,111 output: - /etc/apt/sources.list
2022-09-07 14:22:00,111 output: […]
2022-09-07 14:22:00,111 output: —
2022-09-07 14:22:00,111 output: [ERROR ] Rendering exception occurred
2022-09-07 14:22:00,111 output: Traceback (most recent call last):
2022-09-07 14:22:00,111 output: File "/usr/lib/python3.10/site-packages/salt/>
2022-09-07 14:22:00,111 output: output = template.render(**decoded_context)
2022-09-07 14:22:00,112 output: File "/usr/lib/python3.10/site-packages/jinja>
2022-09-07 14:22:00,112 output: self.environment.handle_exception()
2022-09-07 14:22:00,112 output: File "/usr/lib/python3.10/site-packages/jinja>
2022-09-07 14:22:00,112 output: raise rewrite_traceback_stack(source=source)
2022-09-07 14:22:00,112 output: File “”, line 4, in top-level templ>
2022-09-07 14:22:00,112 output: File "/usr/lib/python3.10/site-packages/jinja>
2022-09-07 14:22:00,112 output: if not __self.is_safe_callable(__obj):
2022-09-07 14:22:00,112 output: File "/usr/lib/python3.10/site-packages/jinja>
2022-09-07 14:22:00,112 output: getattr(obj, “unsafe_callable”, False) or g

GNU nano 4.9.3 /var/log/qubes/mgmt-template-openvpn.log
2022-09-07 14:22:00,112 output: jinja2.exceptions.UndefinedError: 'salt.utils.t>
2022-09-07 14:22:00,112 output:
2022-09-07 14:22:00,113 output: During handling of the above exception, another>
2022-09-07 14:22:00,113 output:
2022-09-07 14:22:00,113 output: Traceback (most recent call last):
2022-09-07 14:22:00,113 output: File "/usr/lib/python3.10/site-packages/salt/>
2022-09-07 14:22:00,113 output: output = render_str(tmplstr, context, tmplp>
2022-09-07 14:22:00,113 output: File "/usr/lib/python3.10/site-packages/salt/>
2022-09-07 14:22:00,113 output: raise SaltRenderError(“Jinja variable {}{}”>
2022-09-07 14:22:00,113 output: salt.exceptions.SaltRenderError: Jinja variable>
2022-09-07 14:22:00,113 output:
2022-09-07 14:22:00,113 output: —
2022-09-07 14:22:00,113 output: # vim: set syntax=yaml ts=2 sw=2 sts=2 et :
2022-09-07 14:22:00,113 output: #
2022-09-07 14:22:00,113 output:
2022-09-07 14:22:00,113 output: {% if salt’qvm.exists’ %} <=====>
2022-09-07 14:22:00,114 output:
2022-09-07 14:22:00,114 output: /etc/apt/sources.list:
2022-09-07 14:22:00,114 output: file.replace:
2022-09-07 14:22:00,114 output: - names:
2022-09-07 14:22:00,114 output: - /etc/apt/sources.list
2022-09-07 14:22:00,114 output: […]
2022-09-07 14:22:00,114 output: —
2022-09-07 14:22:00,114 output: [CRITICAL] Rendering SLS ‘base:openvpn.install’>
2022-09-07 14:22:00,114 output:
2022-09-07 14:22:00,114 output: —
2022-09-07 14:22:00,114 output: # vim: set syntax=yaml ts=2 sw=2 sts=2 et :
2022-09-07 14:22:00,114 output: #
2022-09-07 14:22:00,114 output:
2022-09-07 14:22:00,114 output: {% if salt’qvm.exists’ %} <=====>
2022-09-07 14:22:00,114 output:
2022-09-07 14:22:00,115 output: /etc/
apt/sources.list:
2022-09-07 14:22:00,115 output: file.replace:
2022-09-07 14:22:00,115 output: - names:
2022-09-07 14:22:00,115 output: - /etc/apt/sources.list
2022-09-07 14:22:00,115 output: […]
2022-09-07 14:22:00,115 output: —
2022-09-07 14:22:00,115 exit code: 0

GNU nano 4.9.3 /var/log/qubes/mgmt-sys-vpn.log
2022-08-29 22:42:33,035 calling ‘state.apply openvpn.client_install’…
2022-08-29 22:45:20,019 output: sys-vpn:
2022-08-29 22:45:20,020 output: ----------
2022-08-29 22:45:20,020 output: ID: /rw/config/rc.local
2022-08-29 22:45:20,020 output: Function: file.managed
2022-08-29 22:45:20,020 output: Result: True
2022-08-29 22:45:20,021 output: Comment: File /rw/config/rc.local updated
2022-08-29 22:45:20,021 output: Started: 22:45:15.202478
2022-08-29 22:45:20,021 output: Duration: 222.625 ms
2022-08-29 22:45:20,021 output: Changes:
2022-08-29 22:45:20,021 output: ----------
2022-08-29 22:45:20,021 output: diff:
2022-08-29 22:45:20,021 output: —
2022-08-29 22:45:20,021 output: +++
2022-08-29 22:45:20,021 output: @@ -1,10 +1,8 @@
2022-08-29 22:45:20,021 output: -#!/bin/sh
2022-08-29 22:45:20,021 output: +#!/bin/bash
2022-08-29 22:45:20,021 output: +systemctl unmask openvpn
2022-08-29 22:45:20,021 output: +VPN_CLIENT=‘openvpn’
2022-08-29 22:45:20,022 output: +VPN_OPTIONS='–cd /rw/config
2022-08-29 22:45:20,022 output:
2022-08-29 22:45:20,022 output: -# This script will be execut>
2022-08-29 22:45:20,022 output: -# custom commands here. This>
2022-08-29 22:45:20,022 output: -# starting services etc.
2022-08-29 22:45:20,022 output: -
2022-08-29 22:45:20,022 output: -# Example for overriding the>
2022-08-29 22:45:20,022 output: -# rm -rf /etc/cups
2022-08-29 22:45:20,022 output: -# ln -s /rw/config/cups /et>
2022-08-29 22:45:20,022 output: -# systemctl --no-block rest>
2022-08-29 22:45:20,022 output: +su - -c ‘notify-send "$(host>
2022-08-29 22:45:20,022 output: +groupadd -rf qvpn ; sleep 2s
2022-08-29 22:45:20,022 output: +sg qvpn -c "$VPN_CLIENT $VPN>
2022-08-29 22:45:20,022 output: ----------
2022-08-29 22:45:20,023 output: ID: /rw/config/qubes-firewall-user-sc>
2022-08-29 22:45:20,023 output: Function: file.managed
2022-08-29 22:45:20,023 output: Result: True
2022-08-29 22:45:20,023 output: Comment: File /rw/config/qubes-firewall-us>
2022-08-29 22:45:20,023 output: Started: 22:45:15.425293
2022-08-29 22:45:20,023 output: Duration: 8.998 ms
2022-08-29 22:45:20,023 output: Changes:
2022-08-29 22:45:20,023 output: ----------
2022-08-29 22:45:20,023 output: diff:
2022-08-29 22:45:20,023 output: —
2022-08-29 22:45:20,023 output: +++
2022-08-29 22:45:20,023 output: @@ -1,11 +1,26 @@
2022-08-29 22:45:20,023 output: -#!/bin/sh
2022-08-29 22:45:20,024 output: +#!/bin/bash
2022-08-29 22:45:20,024 output: +# Block forwarding of con>
2022-08-29 22:45:20,024 output: +# (in case the vpn tunnel>
2022-08-29 22:45:20,024 output: +iptables -I FORWARD -o eth0 >
2022-08-29 22:45:20,024 output: +iptables -I FORWARD -i eth0 >
2022-08-29 22:45:20,024 output: +ip6tables -I FORWARD -o eth0>
2022-08-29 22:45:20,024 output: +ip6tables -I FORWARD -i eth0>
2022-08-29 22:45:20,024 output:
2022-08-29 22:45:20,024 output: -# This script is called at A>
2022-08-29 22:45:20,024 output: -# service enabled. It is exe>
2022-08-29 22:45:20,024 output: -# are created, but before ru>
2022-08-29 22:45:20,024 output: -#
2022-08-29 22:45:20,024 output: -# It is a good place for cus>
2022-08-29 22:45:20,024 output: -# firewall service is starte>
2022-08-29 22:45:20,025 output: -#
2022-08-29 22:45:20,025 output: -# Executable scripts located>
2022-08-29 22:45:20,025 output: -# immediately before this qu>
2022-08-29 22:45:20,025 output: +# Accept traffic to VPN
2022-08-29 22:45:20,025 output: +iptables -P OUTPUT DROP
2022-08-29 22:45:20,025 output: +iptables -F OUTPUT
2022-08-29 22:45:20,025 output: +iptables -I OUTPUT -o lo -j >
2022-08-29 22:45:20,025 output: +
2022-08-29 22:45:20,025 output: +# Add the qvpn group to>
2022-08-29 22:45:20,025 output: +if ! grep -q “^qvpn:” /etc/g>
2022-08-29 22:45:20,025 output: + groupadd -rf qvpn
2022-08-29 22:45:20,025 output: + sync
2022-08-29 22:45:20,025 output: +fi
2022-08-29 22:45:20,025 output: +sleep 2s
2022-08-29 22:45:20,025 output: +
2022-08-29 22:45:20,026 output: +# Block non-VPN traffic t>
2022-08-29 22:45:20,026 output: +iptables -I OUTPUT -o eth0 →
2022-08-29 22:45:20,026 output: +# Allow traffic from the >
2022-08-29 22:45:20,026 output: +# Our VPN client will run>
2022-08-29 22:45:20,026 output: +iptables -I OUTPUT -p all -o>
2022-08-29 22:45:20,026 output: +iptables -I OUTPUT -o eth0 →
2022-08-29 22:45:20,026 output: ----------
2022-08-29 22:45:20,026 output: ID: /rw/config/vpn
2022-08-29 22:45:20,026 output: Function: file.directory
2022-08-29 22:45:20,026 output: Result: True
2022-08-29 22:45:20,026 output: Comment:
2022-08-29 22:45:20,026 output: Started: 22:45:15.434437
2022-08-29 22:45:20,026 output: Duration: 1.647 ms
2022-08-29 22:45:20,027 output: Changes:
2022-08-29 22:45:20,027 output: ----------
2022-08-29 22:45:20,027 output: /rw/config/vpn:
2022-08-29 22:45:20,027 output: ----------
2022-08-29 22:45:20,027 output: directory:
2022-08-29 22:45:20,027 output: new
2022-08-29 22:45:20,027 output: ----------
2022-08-29 22:45:20,027 output: ID: /rw/config/vpn/qubes-vpn-handler.>
2022-08-29 22:45:20,027 output: Function: file.managed
2022-08-29 22:45:20,027 output: Result: True
2022-08-29 22:45:20,027 output: Comment: File /rw/config/vpn/qubes-vpn-han>
2022-08-29 22:45:20,027 output: Started: 22:45:15.436245
2022-08-29 22:45:20,027 output: Duration: 6.278 ms
2022-08-29 22:45:20,027 output: Changes:
2022-08-29 22:45:20,027 output: ----------
2022-08-29 22:45:20,028 output: diff:
2022-08-29 22:45:20,028 output: New file
2022-08-29 22:45:20,028 output: mode:
2022-08-29 22:45:20,028 output: 0755
2022-08-29 22:45:20,028 output: ----------
2022-08-29 22:45:20,028 output: ID: /home/user/install.sh
2022-08-29 22:45:20,028 output: Function: file.managed
2022-08-29 22:45:20,028 output: Result: True
2022-08-29 22:45:20,028 output: Comment: File /home/user/install.sh updated
2022-08-29 22:45:20,028 output: Started: 22:45:15.442657
2022-08-29 22:45:20,028 output: Duration: 10.178 ms
2022-08-29 22:45:20,028 output: Changes:
2022-08-29 22:45:20,028 output: ----------
2022-08-29 22:45:20,028 output: diff:
2022-08-29 22:45:20,028 output: New file
2022-08-29 22:45:20,029 output: mode:
2022-08-29 22:45:20,029 output: 0755
2022-08-29 22:45:20,029 output:
2022-08-29 22:45:20,029 output: Summary for sys-vpn
2022-08-29 22:45:20,029 output: ------------
2022-08-29 22:45:20,029 output: Succeeded: 5 (changed=5)
2022-08-29 22:45:20,029 output: Failed: 0
2022-08-29 22:45:20,029 output: ------------
2022-08-29 22:45:20,029 output: Total states run: 5
2022-08-29 22:45:20,029 output: Total run time: 249.726 ms
2022-08-29 22:45:20,029 exit code: 0
2022-09-07 14:22:48,435 calling ‘state.apply openvpn.client_install’…
2022-09-07 14:25:52,596 output: sys-vpn:
2022-09-07 14:25:52,596 output: ----------
2022-09-07 14:25:52,597 output: ID: /rw/config/rc.local
2022-09-07 14:25:52,597 output: Function: file.managed
2022-09-07 14:25:52,597 output: Result: True
2022-09-07 14:25:52,597 output: Comment: File /rw/config/rc.local updated
2022-09-07 14:25:52,597 output: Started: 14:25:48.320557
2022-09-07 14:25:52,597 output: Duration: 401.869 ms
2022-09-07 14:25:52,597 output: Changes:
2022-09-07 14:25:52,597 output: ----------
2022-09-07 14:25:52,597 output: diff:
2022-09-07 14:25:52,597 output: —
2022-09-07 14:25:52,597 output: +++
2022-09-07 14:25:52,598 output: @@ -1,10 +1,8 @@
2022-09-07 14:25:52,598 output: -#!/bin/sh
2022-09-07 14:25:52,598 output: +#!/bin/bash
2022-09-07 14:25:52,598 output: +systemctl unmask openvpn
2022-09-07 14:25:52,598 output: +VPN_CLIENT=‘openvpn’
2022-09-07 14:25:52,598 output: +VPN_OPTIONS=’–cd /rw/config>
2022-09-07 14:25:52,598 output:
2022-09-07 14:25:52,598 output: -# This script will be execut>
2022-09-07 14:25:52,598 output: -# custom commands here. This>
2022-09-07 14:25:52,598 output: -# starting services etc.
2022-09-07 14:25:52,598 output: -
2022-09-07 14:25:52,598 output: -# Example for overriding the>
2022-09-07 14:25:52,598 output: -# rm -rf /etc/cups
2022-09-07 14:25:52,598 output: -# ln -s /rw/config/cups /et>
2022-09-07 14:25:52,598 output: -# systemctl --no-block rest>
2022-09-07 14:25:52,599 output: +su - -c 'notify-send "$(host>
2022-09-07 14:25:52,599 output: +groupadd -rf qvpn ; sleep 2s
2022-09-07 14:25:52,599 output: +sg qvpn -c "$VPN_CLIENT $VPN>
2022-09-07 14:25:52,599 output: ----------
2022-09-07 14:25:52,599 output: ID: /rw/config/qubes-firewall-user-sc>
2022-09-07 14:25:52,599 output: Function: file.managed
2022-09-07 14:25:52,599 output: Result: True
2022-09-07 14:25:52,599 output: Comment: File /rw/config/qubes-firewall-us>
2022-09-07 14:25:52,599 output: Started: 14:25:48.722607
2022-09-07 14:25:52,599 output: Duration: 11.683 ms
2022-09-07 14:25:52,599 output: Changes:
2022-09-07 14:25:52,599 output: ----------
2022-09-07 14:25:52,599 output: diff:
2022-09-07 14:25:52,599 output: —
2022-09-07 14:25:52,599 output: +++
2022-09-07 14:25:52,600 output: @@ -1,11 +1,26 @@
2022-09-07 14:25:52,600 output: -#!/bin/sh
2022-09-07 14:25:52,600 output: +#!/bin/bash
2022-09-07 14:25:52,600 output: +# Block forwarding of con>
2022-09-07 14:25:52,600 output: +# (in case the vpn tunnel>
2022-09-07 14:25:52,600 output: +iptables -I FORWARD -o eth0 >
2022-09-07 14:25:52,600 output: +iptables -I FORWARD -i eth0 >
2022-09-07 14:25:52,600 output: +ip6tables -I FORWARD -o eth0>
2022-09-07 14:25:52,600 output: +ip6tables -I FORWARD -i eth0>
2022-09-07 14:25:52,600 output:
2022-09-07 14:25:52,600 output: -# This script is called at A>
2022-09-07 14:25:52,600 output: -# service enabled. It is exe>
2022-09-07 14:25:52,600 output: -# are created, but before ru>
2022-09-07 14:25:52,601 output: -#
2022-09-07 14:25:52,601 output: -# It is a good place for cus>
2022-09-07 14:25:52,601 output: -# firewall service is starte>
2022-09-07 14:25:52,601 output: -#
2022-09-07 14:25:52,601 output: -# Executable scripts located>
2022-09-07 14:25:52,601 output: -# immediately before this qu>
2022-09-07 14:25:52,601 output: +# Accept traffic to VPN
2022-09-07 14:25:52,601 output: +iptables -P OUTPUT DROP
2022-09-07 14:25:52,601 output: +iptables -F OUTPUT
2022-09-07 14:25:52,601 output: +iptables -I OUTPUT -o lo -j >
2022-09-07 14:25:52,601 output: +
2022-09-07 14:25:52,601 output: +# Add the qvpn group to>
2022-09-07 14:25:52,601 output: +if ! grep -q “^qvpn:” /etc/g>
2022-09-07 14:25:52,601 output: + groupadd -rf qvpn
022-09-07 14:25:52,601 output: + sync
2022-09-07 14:25:52,601 output: +fi
2022-09-07 14:25:52,602 output: +sleep 2s
2022-09-07 14:25:52,602 output: +
2022-09-07 14:25:52,602 output: +# Block non-VPN traffic t>
2022-09-07 14:25:52,602 output: +iptables -I OUTPUT -o eth0 →
2022-09-07 14:25:52,602 output: +# Allow traffic from the >
2022-09-07 14:25:52,602 output: +# Our VPN client will run>
2022-09-07 14:25:52,602 output: +iptables -I OUTPUT -p all -o>
2022-09-07 14:25:52,602 output: +iptables -I OUTPUT -o eth0 →
2022-09-07 14:25:52,602 output: ----------
2022-09-07 14:25:52,602 output: ID: /rw/config/vpn
2022-09-07 14:25:52,602 output: Function: file.directory
2022-09-07 14:25:52,602 output: Result: True
2022-09-07 14:25:52,602 output: Comment:
2022-09-07 14:25:52,602 output: Started: 14:25:48.734771
2022-09-07 14:25:52,602 output: Duration: 4.835 ms
2022-09-07 14:25:52,603 output: Changes:
2022-09-07 14:25:52,603 output: ----------
2022-09-07 14:25:52,603 output: /rw/config/vpn:
2022-09-07 14:25:52,603 output: directory:
2022-09-07 14:25:52,603 output: new
2022-09-07 14:25:52,603 output: ----------
2022-09-07 14:25:52,603 output: ID: /rw/config/vpn/qubes-vpn-handler.>
2022-09-07 14:25:52,603 output: Function: file.managed
2022-09-07 14:25:52,603 output: Result: True
2022-09-07 14:25:52,603 output: Comment: File /rw/config/vpn/qubes-vpn-han>
2022-09-07 14:25:52,603 output: Started: 14:25:48.739828
2022-09-07 14:25:52,603 output: Duration: 11.513 ms
2022-09-07 14:25:52,603 output: Changes:
2022-09-07 14:25:52,604 output: ----------
2022-09-07 14:25:52,604 output: diff:
2022-09-07 14:25:52,604 output: New file
2022-09-07 14:25:52,604 output: mode:
2022-09-07 14:25:52,604 output: 0755
2022-09-07 14:25:52,604 output: ----------
2022-09-07 14:25:52,604 output: ID: /home/user/install.sh
2022-09-07 14:25:52,604 output: Function: file.managed
2022-09-07 14:25:52,604 output: Result: True
2022-09-07 14:25:52,604 output: Comment: File /home/user/install.sh updated
2022-09-07 14:25:52,604 output: Started: 14:25:48.751564
2022-09-07 14:25:52,604 output: Duration: 15.071 ms
2022-09-07 14:25:52,604 output: Changes:
2022-09-07 14:25:52,604 output: ----------
2022-09-07 14:25:52,604 output: diff:
2022-09-07 14:25:52,605 output: New file
2022-09-07 14:25:52,605 output: mode:
2022-09-07 14:25:52,605 output: 0755
2022-09-07 14:25:52,605 output:
2022-09-07 14:25:52,605 output: Summary for sys-vpn
2022-09-07 14:25:52,605 output: ------------
2022-09-07 14:25:52,605 output: Succeeded: 5 (changed=5)
2022-09-07 14:25:52,605 output: Failed: 0
2022-09-07 14:25:52,605 output: ------------
2022-09-07 14:25:52,605 output: Total states run: 5
2022-09-07 14:25:52,605 output: Total run time: 444.971 ms
2022-09-07 14:25:52,605 exit code: 0

Thanks, but I specifically asked you to PM me the logs: can you do that?
From what I can see you have a salt exception that I dont have, and
have not yet seen.
I’ll check what might have caused this.

Can you make sure you have updated dom0 and the templates?

Thanks