-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Hi JJ!
> In getting this working, I found that /usr/lib/qubes/qrexec-client
> was my friend, allowing to run commands in the VM's [...]
It's better to use "qvm-run --pass-io --nogui". That's a wrapper around
qrexec-client which, by default, colors the output red and removes
problematic* output bytes before they reach a dom0 terminal emulator.
> /usr/lib/qubes/qrexec-client -d sys-net 'root:systemctl disable
> qubes-gui-agent.service'
>
> Make that disabling of the GUI persistent across VM restarts.
This will only persist if sys-net is a StandaloneVM, because otherwise
the qubes-gui-agent.service symlink (which "systemctl disable"
operates on) is in the TemplateVM's filesystem.
Rusty
* Currently, only ANSI escape sequences are filtered out, but the filter
is going to become stricter soon -- presumably in R3.2 RC3:
https://github.com/QubesOS/qubes-core-admin-linux/commit/e005836286ed4d5615c34608a088a30d9aa7a556
https://github.com/QubesOS/qubes-core-admin-linux/commit/c7ad14320ff5e3a37dc420efae308a36f966795b
-----BEGIN PGP SIGNATURE-----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=FMbA
-----END PGP SIGNATURE-----