Skip to content
View bcduggan's full-sized avatar

Block or report bcduggan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. qrexec-connect qrexec-connect Public

    Start client qrexec connection services with systemd socket activation

    Python 1

  2. ansible-rt ansible-rt Public

    Ansible role for Request Tracker

    Perl 6 13 4

  3. Target Qubes VMs with tags in Salt P... Target Qubes VMs with tags in Salt Pillar data
    1
    # Target Qubes VMs with tags in Salt Pillar data
    2
    
                  
    3
    Qubes allows users to target VMs in top files using pillar data:
    4
    
                  
    5
    ```yaml
  4. ansible-perlbrew ansible-perlbrew Public

    Install perlbrew and alternative versions of perl

    Shell 2 1

  5. Qubes RPC service for git remotes Qubes RPC service for git remotes
    1
    # Qubes RPC for git remotes over qrexec
    2
    
                  
    3
    This gist describes a set of configurations to implement a new set of Qubes RPCs, qubes.GitUploadPack and qubes.GitReceivePack. These RPCs allow a client qube to clone, fetch, push, etc from local repositories to repositories on service qubes over qrexec. Qubes policy can control ro (clone, fetch, etc) and rw (push, etc) access per-repository.
    4
    
                  
    5
    The RPCs only allow access to git repositories on the service qube filesystem. They do not connect the client qube to internet git servers or forges.