mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-12-22 13:55:08 -05:00
delete staging/
This commit is contained in:
parent
094c4deb68
commit
75d1491737
@ -1,4 +0,0 @@
|
||||
- create-minimal-sys-vms : should be a doc
|
||||
- howto-build-win7-appvm : ditto
|
||||
- qvm-backup-to-appvm : isn't backup related ; +, why not use qvm-run vmname 'mv ...' instead of helper script.
|
||||
|
@ -1,37 +0,0 @@
|
||||
#!/bin/bash
|
||||
# qubes-create-minimal-sys-vms
|
||||
# Script to setup sys-net / sys-firewall / sys-usb based on a fedora-26.minimal template
|
||||
# See also: https://www.qubes-os.org/doc/templates/fedora-minimal/
|
||||
#
|
||||
# Disclaimer:
|
||||
# all scripts in the Qubes-Community docs have to be treated as alpha or beta status
|
||||
# Do not use this scripts if you don't understand what the script is doing in each step
|
||||
# If you have questions and comment, feel free to comment (and improve this script)
|
||||
#
|
||||
# Comments:
|
||||
# After this script has been run, you should have a new Template t-sys which can be used as template for your sys-VMs
|
||||
# To change the templates: shutdown or kill the sys-vms and then use qvm-prefs to set the new template
|
||||
# qvm-kill sys-usb && qvm-prefs --set sys-usb template t-sys
|
||||
# qvm-kill sys-firewall && qvm-prefs --set sys-firewall template t-sys
|
||||
# qvm-kill sys-net && qvm-prefs --set sys-net template t-sys
|
||||
|
||||
# Install default minimal template in dom0
|
||||
sudo qubes-dom0-update qubes-template-fedora-26-minimal
|
||||
|
||||
# Clone template to keep the original template
|
||||
qvm-clone fedora-26-minimal t-sys
|
||||
|
||||
# Update all packages in the minimal template
|
||||
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf upgrade'"
|
||||
|
||||
# Install some basic applications, which are helpfull for troubleshooting
|
||||
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install gnome-terminal terminus-fonts less vim-minimal nano dejavu-sans-fontsl sudo pciutils psmisc gnome-keyring usbutils'"
|
||||
|
||||
# Install special Qubes-packages for the sys-vms
|
||||
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install qubes-core-agent-qrexec qubes-core-agent-systemd qubes-core-agent-passwordless-root polkit qubes-core-agent-nautilus qubes-core-agent-networking qubes-core-agent-network-manager network-manager-applet notification-daemon qubes-core-agent-dom0-updates qubes-usb-proxy pulseaudio-qubes NetworkManager-wwan NetworkManager NetworkManager-wifi'"
|
||||
|
||||
# Install USB proxy package from the testing repositories
|
||||
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install --enablerepo=qubes-vm-*-current-testing qubes-input-proxy-sender'"
|
||||
|
||||
# Install Linux Firmware
|
||||
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install linux-firmware'"
|
@ -1,108 +0,0 @@
|
||||
# This Howto describes all steps to create a windows 7 HVM starting from a windows 7 ISO
|
||||
# Warning: this is not a script which can be copy & pasted.
|
||||
# It is meant as a guide which steps must be completed to get a win7 HVM working
|
||||
# It will also cover how to install Qubes Windows Tools and fix networking
|
||||
# Initial author: [799] - https://github.com/one7two99
|
||||
# Date: 12.Mar 2018
|
||||
|
||||
# See also: https://www.qubes-os.org/doc/hvm/
|
||||
# See also: https://www.qubes-os.org/doc/windows-appvms/
|
||||
|
||||
# copy Windows-Installation ISO to an AppVM
|
||||
|
||||
# Create new AppVM
|
||||
qvm-create win7 --class StandaloneVM --property virt_mode=hvm --property kernel="" --property memory=4096 --property maxmem=4096 --property debug=True --label blue
|
||||
qvm-features win7 video-model cirrus
|
||||
|
||||
# Enlarge available diskspace in the new AppVM:
|
||||
# System storage max. size:
|
||||
qvm-volume extend win7:root 40GB
|
||||
# Private storage max. size:
|
||||
qvm-volume extend win7:private 20GB
|
||||
|
||||
# Start AppVM with Installation-ISO
|
||||
qvm-start win7 --cdrom=<APPVM>:/home/user/win7.iso
|
||||
|
||||
# Run through the Installer
|
||||
|
||||
# Check Qubes-Settings of the Windows VM and note down IP / Netmask / Gateway
|
||||
# optionally: Setup manual IP-Adress within the windows VM
|
||||
|
||||
# Disable Hybernation (cmd as Administrator)
|
||||
powercfg -h off
|
||||
|
||||
# Disable Login as user
|
||||
netplwiz
|
||||
# [ ] Users must enter a username and password to use this computer
|
||||
|
||||
# Apply all windows Updates which will take several reboots
|
||||
# Hint: make sure to search for updates again, even if windows claims to be on the latest version
|
||||
# It will take several reboots to get to the actual patch level
|
||||
|
||||
# Install other applications as needed Chocolatey
|
||||
choco install -y adobereader jre8 firefoxesr googlechrome notepadplusplus emacs vlc putty winscp rdm libreoffice calibre flashplayerplugin 7zip git paint.net gimp keepass thunderbird
|
||||
|
||||
# Backup VM in dom0, prior to installing Qubes Windows Tools
|
||||
# In this example the backup will be stored in my Backup-VM (my-backup) to the folder /home/user/backup
|
||||
# You can also use an external storage device here
|
||||
# Hint: make sure to have enough space available
|
||||
qvm-backup --verbose win7 --encrypt --compress --dest-vm my-backup /home/user/backup
|
||||
|
||||
# Install Qubes Windows Tools
|
||||
# Download qubes-windows-tools from Qubes 3.2 repository
|
||||
wget https://ftp.qubes-os.org/repo/yum/r3.2/current-testing/dom0/fc23/rpm/qubes-windows-tools-3.2.2-3.x86_64.rpm
|
||||
# move the rpm file to dom0, run in dom0
|
||||
qvm-run --pass-io my-untrusted 'cat /home/user/Download/qubes-windows-tools-3.2.2-3.x86_64.rpm' > qubes-windows-tools-3.2.2-3.x86_64.rpm
|
||||
# Verify rpm package
|
||||
rpm -K qubes-windows-tools-3.2.2-3.x86_64.rpm
|
||||
# Install rpm-package
|
||||
rpm -ivh qubes-windows-tools-3.2.2-3.x86_64.rpm
|
||||
# Qubes Windows Tools ISO will be located at /usr/lib/qubes/qubes-windows-tools.iso
|
||||
# Start windows VM with attached Qubes Windows Tools
|
||||
qvm-start win8 --install-windows-tools
|
||||
# Complete Qubes Tools installation, do not restart when prompted to do so but start after the installation has been completed.
|
||||
# Run the first installation with the default setup options.
|
||||
|
||||
# Shutdown and restart the windows VM to finish installation of Qubes Windows Tools
|
||||
|
||||
# Disable debug mode to get seamless mode working.
|
||||
qvm-prefs --set win7 debug False
|
||||
|
||||
# Test seamless mode
|
||||
qvm-run --auto win7 explorer.exe
|
||||
|
||||
# Windows will show a yellow warning in the network icon located in the windows taskbar, even when a connection is available.
|
||||
# Open Properties of LAN-Card
|
||||
# Where you would normale configure IP-setting, choose Configure, which will open up Hardware Setttings window of your LAN-adapter
|
||||
# Choose 2nd Tab ("Advanced") and disable "IP4 Checksum Offload"
|
||||
# Go back to IP setting, disable IPv6 and configure a static IP for IPv4 using the IP which is shown for the HVM in Qubes Manager
|
||||
# Reboot, change should be persistent and the warning sign should be gone.
|
||||
|
||||
# Fix Networking after intalling Qubes Windows Tools
|
||||
# Link 1: https://github.com/QubesOS/qubes-issues/issues/3585
|
||||
# Check DNS Settings in of your Linux AppVMs
|
||||
cat /etc/resolv.conf
|
||||
# nameserver 10.139.1.1
|
||||
# nameserver 10.139.1.2
|
||||
# Check the IP-settings of your windows AppVM via QubesSetting or in dom0
|
||||
# write down IP-adress, subnetmask (255.255.255.255 and gateway=
|
||||
qvm-ls -n
|
||||
# Disable the "Qubes Network Setup" service via CMD as Administrator in the win-AppVM:
|
||||
# make sure to add a space after the equal sign
|
||||
sc config "QubesNetworkSetup" start= disabled
|
||||
# Go to your LAN-Card and edit its network properties
|
||||
# Right click on Network Icon in the taskbar / Open Network and Sharing Center / Change Adapter Settings
|
||||
# Right click on LAN-adapter > Properties:
|
||||
# Disable IPv6
|
||||
# Configure IPv4 via Properties with the settings you have noted before, Example:
|
||||
# Use the following IP address:
|
||||
# IP address: 10.137.0.17
|
||||
# Subnet mask: 255.255.255.255
|
||||
# Default Gateway: 10.137.0.6
|
||||
# Use the following DNS server addresses:
|
||||
# Preferred DNS server: 10.139.1.1
|
||||
# Alternate DNS server: 10.139.1.2
|
||||
# Ignore Warning ("The default gateway is not on the same network segment (subnet) that is defined by the IP
|
||||
# address and subnet mask. Do you want to save this configuration")
|
||||
# Click: Yes
|
||||
# Recommendation: Reboot Windows AppVM
|
@ -1,19 +0,0 @@
|
||||
#!/bin/bash
|
||||
# qvm-backup-to-appvm
|
||||
# Version: 0.1
|
||||
# Copy files from dom0 to an archive in an AppVM
|
||||
# Usage : qvm-backup-to-appvm <Source> <AppVM> <Destination> <Archive>
|
||||
# Example: qvm-backup-to-appvm ~/bin my-untrusted /home/user/backup backup.tgz
|
||||
|
||||
Source=$1
|
||||
AppVM=$2
|
||||
Destination=$3
|
||||
Archive=`date +%Y.%m.%d-%H.%M`_$4
|
||||
|
||||
tar -cvzf /tmp/$Archive $Source
|
||||
qvm-move-to-vm $AppVM /tmp/$Archive
|
||||
echo "mv ~/QubesIncoming/dom0/$Archive $Destination && \
|
||||
rm ~/QubesIncoming/dom0/qvm-backup_helperscript.sh" >> /tmp/qvm-backup_helperscript.sh
|
||||
chmod +x /tmp/qvm-backup_helperscript.sh
|
||||
qvm-move-to-vm $AppVM /tmp/qvm-backup_helperscript.sh
|
||||
qvm-run $AppVM /home/user/QubesIncoming/dom0/qvm-backup_helperscript.sh
|
Loading…
Reference in New Issue
Block a user