You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
(I think there was talk of GUI installers and such before, but can't see any relevant issues. This is a suggestion for a more lightweight approach.)
Currently prod SDW configuration and installation involves manual attachments of USB keys along with "qvm-run --pass-io" commands to copy files to dom0. The rough flow is as follows:
configure a network-attached VM to download the dom0 rpm, copy and install it
attach the SVS to a non-networked VM, copy the privkey to dom0
attach the JW/AW, copy the JI service details to dom0
(optionally copy the JW/AW keepassxc vault to a vault VM)
copy the key into place and retrieve its fingerprint
create config.json and add in the fingerprint and service details via a text editor
7 run sdw-admin --validate, then sdw-admin--apply
There is plenty of opportunity for error and frustration in the above, and it should be scriptable. I'd propose something more like:
configure a network-attached VM to download the dom0 rpm, copy and install it (this could be simplified a little but some variation is probably unavoidable as a bootstrapping step)
Run sdw-admin --configure which will:
check for the existence of a valid privkey, and either prompt the user to change it if found or prompt the user to add a new key (guiding through device attachment and validating that the VM chosen is non-networked) directly under /usr/share/...
read config.json if it exists and prompt the user to confirm the values found, or prompt the user to provide new ones (guiding attachment and then reading from the expected location directly)
validate the new values and give the user the option to save and optionally apply them
Desired behaviours (attaching sticks to non-networked VMs etc) could be checked and enforced by the script.
The text was updated successfully, but these errors were encountered:
(I think there was talk of GUI installers and such before, but can't see any relevant issues. This is a suggestion for a more lightweight approach.)
Currently prod SDW configuration and installation involves manual attachments of USB keys along with "qvm-run --pass-io" commands to copy files to dom0. The rough flow is as follows:
7 run sdw-admin --validate, then sdw-admin--apply
There is plenty of opportunity for error and frustration in the above, and it should be scriptable. I'd propose something more like:
sdw-admin --configure
which will:Desired behaviours (attaching sticks to non-networked VMs etc) could be checked and enforced by the script.
The text was updated successfully, but these errors were encountered: