automount not working after macOS Catalina updates

I’ve recently upgraded to macOS catalina. My automount mount for music media was broken. I fixed it and today it is again not working.

The last change I did was to install the supplemental update for 10.15.7 which seems to overwrite the /etc/auto_master so my /etc/auto_smb wasn’t loaded anymore. Here’s my current working content:

# Automounter master map
+auto_master		# Use directory service
#/net			-hosts		-nobrowse,hidefromfinder,nosuid
/home			auto_home	-nobrowse,hidefromfinder
/Network/Servers	-fstab
/-			-static
/-			auto_smb	-nosuid,noowners

Don’t forget to run

sudo automount -vc

after it you’ve changed the file. Your automount should now work again.

Fix broken automount mounts on macOS Catalina

I’ve moved my iTunes music library content to my NAS. I’m using automount to keep iTunes happy without losing the connection to the files. After upgrading to macOS Catalina, automount did not work as it used to.

Reason is the changed structure in the APFS container. If you have a look at the disk utility, it will show you a system container and a user container. The system contains macOS and is write protected, while the user container contains all your apps, data and so on.

You’ll just have to prepend your existing automount paths with /System/Volumes/Data. Now you’ll just have to run

sudo automount -vc

and the automounts are working again.

I had to change the iTunes settings back to my automount folder, as the upgrade to Catalina reset it to its default location in your users folder.

Fixing Xcode command line tools after upgrade to macOS Catalina 10.15

Today I’ve updated to macOS Catalina 10.15. I’ve tried to setup zsh instead of bash and ran intro troubles with Xcode command line tools.

If I run

xcode-select -p

I’m seeing my previous installation in /Library/Developer/CommandLineTools. However, if I run

xcode-select --install

I’m seeing the installer which tries to fetch the latest Xcode command line tools. However, it always fails with

Unable to Download App. "Xcode" could not be installed. Please try again later.

I don’t intend to install the large Xcode from the appstore. So I’ve tried to delete the existing installation of the command line tools with

sudo rm -rf /Library/Developer

but the problem is still present.

Many people suggest to go to the page and to search manually for the Xcode command line tools. I thought this wouldn’t work, because I’m only seeing the Xcode command line tools for Xcode 12.

However, we’re already at Xcode 12.1, so I thought this is the wrong download and is already outdated. But after I’ve installed the tools from this dmg, its working again and

xcode-select --install
xcode-select: error: command line tools are already installed, use "Software Update" to install updates

shows a suitable error message.

So lessons learned: using the latest major version of the command line tools installer seems to be sufficient.

Setup WireGuard VPN on Raspbian

I’m already using OpenVPN but heard only good things about WireGuard VPN. For my current project, I need a VPN connection to my home network. I do not want to mess with my currently working OpenVPN setup, so I tried to setup WireGuard VPN on Raspbian.

Start with updating your installed packages. Its especially important to install the raspberrypi-kernel-headers before the WireGuard installation.:

sudo apt-get update
sudo apt-get upgrade
sudo apt-get install raspberrypi-kernel-headers

I’ll use pivpn as setup script. You can install it with curl piping the script to bash like this:

curl -L | bash

However, if you don’t trust that source and doesn’t want to execute it unseen, you can also check the script content first or download the script separately to your machine first.

I’ve followed now the installation steps which are already pretty good explained by others:

What’s nice about this script is, that it will also detect installations of pi-hole running on the same machine.

I’ve used the script to setup WireGuard (as it also supports OpenVPN). I’ve selected the default port 51820 and created a port forwarding rule in my FritzBox router. After the installation completed, you’re asked to do a reboot.

Now we’ll create a new WireGuard profile using

sudo pivpn add

The script just asks for a profile name and will place the generated profiles in the users home under the config folder.

Setup on the client machine is similar. But instead of using the script for installation, we’ll use the version provided by the Debian repo. I’ve followed these instructions:

sudo apt-get install dirmngr
echo "deb unstable main" | sudo tee --append /etc/apt/sources.list
sudo apt-key adv --keyserver --recv-keys 04EE7237B7D453EC
sudo apt-key adv --keyserver --recv-keys 648ACFD622F3D138
sudo sh -c 'printf "Package: *\nPin: release a=unstable\nPin-Priority: 90\n" > /etc/apt/preferences.d/limit-unstable'
sudo apt-get update
sudo apt install wireguard

I’ve transferred the created config from the WireGuard host to the WireGuard client and ran

sudo wg-quick up <ProfileName>

And it established really fast a connection. However, my problem was now that the SSH connection broke because all of the traffic to and from the client was going through the WireGuard VPN (like you would have used it for your phone when you’re in an unsecured WiFi and want to redirect all traffic through the VPN).

Luckily I was able to stop the connection by SSHing from the WireGuard VPN to the assigned IP of the WireGuard client and by using

sudo wg-quick down <ProfileName>

The question is now, how can I configure WireGuard Client to just know the route through the VPN to resources in the host network or vice versa how I can configure the WireGuard Host to provide other machines in the network a route to the connected client…