-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Include all relevant user-created and user-customizable dom0 files in backups #1635
Comments
Net topology is already included (if not, please give concrete example). Others - yes, should be. |
Might be nice also to include:
|
@axon-qubes I'm not sure about those files - those are highly specific to particular installation, if you restore the backup on fresh installation, replacing those files most likely will break the system (at least because of different UUIDs) |
Right, I was mainly thinking to include them in the backup but not automatically restore. But you make a good point. Perhaps it's better to leave it up to users to |
Actually, I just checked, and my |
Since this is marked as a duplicate of the feature request I raised, I'd like to propose that backup of dom0 should include:
and that these files should be restored to ~/restore/etc/qubes and ~/restore/etc/qubes-rpc respectively. Later maybe other files from dom0 could be included by default or a preference setting to do so could be implemented. I would also appreciate others' input as to what documentation should accompany this. In particular, do we expect that a user can copy ~/restore/etc/qubes and ~/restore/etc/qubes-rpc into a new install's /etc/qubes and /etc/qubes-rpc without issues? Is that true only for the same release or also across point releases (e.g. R4.0 -> R4.1). I would like to implement this and provide some pull requests, and it seems like consensus on the solution will make them more likely to be accepted. |
Generalizing this issue to reflect developments in Qubes OS since it was first opened. |
Examples:
guid.conf(no longer user-customizable)/etc/qubes
or other files inside of it (which includes the aforementioned qrexec policies) (Meaningfully backup dom0 with Qubes Backup #5608)The text was updated successfully, but these errors were encountered: