Implement qrexec service for installing template images #1705
Labels
C: core
P: major
Priority: major. Between "default" and "critical" in severity.
release notes
This issue should be mentioned in the release notes.
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
Milestone
Currently the only way to install new template is to use
qubes-dom0-update
tool. This means the package needs to be built and signed by ITL.It would be good to provide a tool (qrexec service) to create new templates from 3rd party sources. The template image itself (
root.img
) is not trusted by dom0 in any way, so it would not compromise whole system security (contrary to rpm installed in dom0, which can do anything).AppVMs based on some template do trust its
root.img
, but it's up to the user which VMs will use such template.Then, having such service, it will be possible to write a tool (running in some VM), which would download the image, verify its checksum/signature and transfer to dom0. Optionally first converting the image to "raw" format from something else (vmdk, vdi, qcow2 etc).
Such template should have PVGrub set as a kernel by default, so the template will be able to use whatever kernel it want. Including non-Linux one: MirageOS, FreeBSD etc.
In R4.0, we will have tags for VMs, so such template should be tagged as
imported
andimported-from-VMNAME
(whereVMNAME
is a name of VM which sent that image). Related to #1637The text was updated successfully, but these errors were encountered: