This document provides solutions to common issues encountered when installing and running pvetui.
Problem: When running the pre-built binary on macOS, you encounter errors such as:
zsh: killed ./pvetui-darwin-arm64- Binary exits with code 137 (SIGKILL)
- macOS shows security warnings about unsigned applications
Cause: macOS Gatekeeper blocks unsigned binaries downloaded from the internet by applying the com.apple.quarantine attribute.
Solutions (in order of recommendation):
xattr -d com.apple.quarantine ./pvetui-darwin-arm64This removes the quarantine attribute that macOS applies to downloaded files, allowing the binary to run normally.
- Right-click the binary in Finder
- Select "Open" from the context menu
- Click "Open" in the security dialog that appears
- The binary will run and be remembered as trusted
git clone https://github.com/devnullvoid/pvetui.git
cd pvetui
make installBuilding from source avoids Gatekeeper issues entirely since the binary is compiled locally. The embedded noVNC client is vendored via git subtree, so no additional clone flags are required.
git clone https://github.com/devnullvoid/pvetui.git
cd pvetui
make install-go
# or: go install ./cmd/pvetuiThis method compiles the source code directly with the vendored noVNC client.
Why This Happens: The pre-built binaries are not code-signed with an Apple Developer certificate ($99/year requirement). Code signing would eliminate these warnings but requires an Apple Developer Program membership.
If you encounter permission issues when running the binary:
chmod +x ./pvetui-linux-amd64pvetui is statically compiled and should not require additional dependencies. If you encounter issues, ensure your system is up to date.
Windows may show a SmartScreen warning for unsigned executables:
- Click "More info" in the SmartScreen dialog
- Click "Run anyway" to proceed
- The executable will be remembered as trusted
Some antivirus software may flag the binary as suspicious. This is common with unsigned executables. You can:
- Add an exception for the binary in your antivirus software
- Build from source using the Go toolchain
- Use the source installation method (see Go Install Issues section above)
Problem: Running go install github.com/devnullvoid/pvetui/cmd/pvetui@latest fails with:
pattern novnc: no matching files found
Cause: Releases prior to October 2025 embedded noVNC via a git submodule. Current versions vendor the client with a git subtree, so this error usually means you're building an older tag or your checkout predates the subtree migration.
Solutions:
- Upgrade to the latest tag or main branch;
go install github.com/devnullvoid/pvetui/cmd/pvetui@latestnow works without extra flags. - If you must build an older release, clone with
--recurse-submodulesto populate the legacy noVNC dependency.
-
Check Architecture: Ensure you downloaded the correct binary for your system:
darwin-amd64: Intel Macsdarwin-arm64: Apple Silicon Macs (M1/M2/M3)linux-amd64: 64-bit Linuxlinux-arm64: ARM64 Linuxwindows-amd64.exe: 64-bit Windows
-
Verify Download: Re-download the binary if it seems corrupted
-
Check Permissions: Ensure the binary has execute permissions (Unix-like systems)
If you encounter configuration-related problems:
- Use Config Wizard: Run with
--config-wizardflag for interactive setup - Check Config Path: Verify configuration file location with
--help - Validate YAML: Ensure your configuration file has valid YAML syntax
For Proxmox connection problems:
- Test API Access: Verify you can reach the Proxmox API from your machine
- Check Credentials: Ensure your username, password, or API tokens are correct
- Verify SSL: Use
--insecureflag if testing with self-signed certificates (not recommended for production)
If you continue to experience issues:
-
Check Existing Issues: Search the GitHub Issues for similar problems
-
Create New Issue: If your problem isn't covered, create a new issue with:
- Your operating system and architecture
- The exact error message
- Steps to reproduce the issue
- Your configuration (with sensitive data removed)
-
Include System Information:
# For version information ./pvetui --version # For Go environment (if building from source) go version go env GOOS GOARCH
Currently, the pre-built binaries are not code-signed. This means:
- ✅ The source code is open and auditable
- ✅ You can build from source for maximum trust
- ❌ Pre-built binaries may trigger OS security warnings
- ❌ Some corporate environments may block unsigned binaries
Highest Security: Build from source after reviewing the code
git clone https://github.com/devnullvoid/pvetui.git
cd pvetui
# Review the source code
make installHigh Security: Use Go's built-in installation
go install github.com/devnullvoid/pvetui/cmd/pvetui@latestStandard Security: Use pre-built binaries with OS override (as documented above)