Hello,
I have migrated all my VMs to fedora-28 based VMs and documented the exakt steps to do so as I want to write a howto for newbies coming from a fresh Qubes Installation to get a fully working production environment including newest templates, windows and maybe crossover.
After a clean installation of Qubes 4 I run into an issue using my newly created sys-usb qube.
sys-usb sees an attached harddrive but when I try to mount the drive (click on it) I get the following error message:
Unable to access "EXT-HDD2"
Not authorized to perform operation (polkit auhority not available and coller is not uid (0)
If I pass the USB-drive to my AppVM it will not be shown in the file explorer.
When switching back to the default fedora-26 based template for sys-usb everything works.
Those are the command/script to create my fedora-28-minimal based template for the sys-VMs.
# Install Fedora 28 minimal template
sudo qubes-dom0-update qubes-template-fedora-28-minimal
# make sure networking is available
qvm-start --skip-if-running sys-firewall
# clone template
qvm-clone fedora-28-minimal t-fedora-28-sys
# Install packages for sys-vms
qvm-run --auto --user root t-fedora-28-sys "xterm -hold -e 'dnf -y update && \
dnf -y install qubes-core-agent-qrexec qubes-core-agent-systemd qubes-core-agent-networking \
qubes-core-agent-network-manager notification-daemon qubes-core-agent-dom0-updates qubes-usb-proxy \
network-manager-applet NetworkManager-wwan NetworkManager-wifi iwl6000g2a-firmware qubes-input-proxy-sender && \
shutdown -h now'"
# shutdown all vms
qvm-shutdown --all --wait --timeout 120
# use the new template
qvm-prefs --set sys-usb template t-fedora-28-sys
qvm-prefs --set sys-net template t-fedora-28-sys
qvm-prefs --set sys-firewall template t-fedora-28-sys
# restart sys-vms
qvm-start sys-firewall sys-usb
QUESTION:
How do I fix the error "Not authorized to perform operation"
Can you reproduce the problem?
[799]