Page MenuHomePhabricator

qvm-service infrastructure does not work with whonix-gw-14 template
Closed, WontfixPublic

Description

If you disable a qvm-service (example: qubes-updates-proxy) for sys-whonix VM
the file
/var/run/qubes-service/qubes-updates-proxy
is created nonetheless (not expected) and as a result of that, the systemd service qubes-updates-proxy.service is enabled (because above file exists).

This means that the Qubes methodology to enable/disable service appears broken for whonix-gw-14 based AppVMs.

dom0: "qvm-service sys-whonix" output:
qubes-updates-proxy off

Details

Impact
Normal

Event Timeline

nusenu triaged this task as Normal priority.Nov 26 2018, 10:33 PM
nusenu created this task.

Does this also happen in Qubes Debian based VMs?

the default debian-9 template is not affected (it works as expected in that template)

Patrick lowered the priority of this task from Normal to Wishlist.Dec 9 2018, 4:52 AM

Reducing the number of lingering, unrealistic tickets, therefore closing.

This either needs source code contributions is is realistically never going to happen.