Ben Grande c84dfea48e
fix: generate RPM Specs for Qubes Builder V2
It doesn't checkout the current directory when querying the spec, so we
provide the already modified version of the spec.
2024-06-21 17:00:06 +02:00
..
2023-11-13 14:33:28 +00:00
2023-11-13 14:33:28 +00:00
2023-11-13 14:33:28 +00:00
2023-11-13 14:33:28 +00:00
2024-01-29 16:49:54 +01:00
2023-11-13 14:33:28 +00:00
2023-11-13 14:33:28 +00:00
2023-11-13 14:33:28 +00:00
2024-02-23 16:55:11 +01:00

ansible

Ansible environment in Qubes OS.

Table of Contents

Description

Install Ansible and use it on the "ansible" app qube.

Installation

  • Top
sudo qubesctl top.enable ansible
sudo qubesctl --targets=tpl-ansible,ansible,ansible-minion state.apply
sudo qubesctl top.disable ansible
  • State
sudo qubesctl state.apply ansible.create
sudo qubesctl --skip-dom0 --targets=tpl-ansible state.apply ansible.install
sudo qubesctl --skip-dom0 --targets=ansible state.apply ansible.configure,zsh.touch-zshrc
sudo qubesctl --skip-dom0 --targets=ansible-minion state.apply ansible.configure-minion,zsh.touch-zshrc

Usage

Configure the control node ansible:

ssh-keygen -t ed25519 -N "" -f ~/.ssh/id_ansible
qvm-copy ~/.ssh/id_ansible.pub

Select ansible-minion as the target qube for the copy operation.

Configure the minion ansible-minion:

mkdir -m 0700 ~/.ssh
cat ~/QubesIncoming/ansible/id_ansible.pub >> ~/.ssh/authorized_keys

From the control node ansible, test connection to the minion ansible-minion:

ssh minion