Skip to content

Commit

Permalink
Set named dispvm sd-proxy as a servicevm
Browse files Browse the repository at this point in the history
  • Loading branch information
rocodes committed Jul 11, 2024
1 parent bc39d0d commit 6445950
Showing 1 changed file with 1 addition and 0 deletions.
1 change: 1 addition & 0 deletions securedrop_salt/sd-proxy.sls
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,7 @@ sd-proxy-create-named-dispvm:
- service.securedrop-mime-handling
- set:
- vm-config.SD_MIME_HANDLING: default
- servicevm: 1
{% if d.environment == "prod" %}
- internal: 1
{% endif %}
Expand Down

2 comments on commit 6445950

@deeplow
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Interesting! All this time I was thinking that Qubes had no internal concept of what a sys-vm was. I thought it was basically any qube which has " ☑️ provides network to other qubes". Hence why by default sys-usb providing network even though that makes no sense at all (looked this up now and there appears to be some reasoning behind it).

@deeplow
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for finding this. I was hopefully able to resolve the annoying situation with sys-usb QubesOS/qubes-mgmt-salt-dom0-virtual-machines#63.

Please sign in to comment.