diff --git a/code/staging/README.md b/code/staging/README.md deleted file mode 100644 index 0be9bfd..0000000 --- a/code/staging/README.md +++ /dev/null @@ -1,4 +0,0 @@ -- create-minimal-sys-vms : should be a doc -- howto-build-win7-appvm : ditto -- qvm-backup-to-appvm : isn't backup related ; +, why not use qvm-run vmname 'mv ...' instead of helper script. - diff --git a/code/staging/create-minimal-sys-vms b/code/staging/create-minimal-sys-vms deleted file mode 100644 index e37a979..0000000 --- a/code/staging/create-minimal-sys-vms +++ /dev/null @@ -1,37 +0,0 @@ -#!/bin/bash -# qubes-create-minimal-sys-vms -# Script to setup sys-net / sys-firewall / sys-usb based on a fedora-26.minimal template -# See also: https://www.qubes-os.org/doc/templates/fedora-minimal/ -# -# Disclaimer: -# all scripts in the Qubes-Community docs have to be treated as alpha or beta status -# Do not use this scripts if you don't understand what the script is doing in each step -# If you have questions and comment, feel free to comment (and improve this script) -# -# Comments: -# After this script has been run, you should have a new Template t-sys which can be used as template for your sys-VMs -# To change the templates: shutdown or kill the sys-vms and then use qvm-prefs to set the new template -# qvm-kill sys-usb && qvm-prefs --set sys-usb template t-sys -# qvm-kill sys-firewall && qvm-prefs --set sys-firewall template t-sys -# qvm-kill sys-net && qvm-prefs --set sys-net template t-sys - -# Install default minimal template in dom0 -sudo qubes-dom0-update qubes-template-fedora-26-minimal - -# Clone template to keep the original template -qvm-clone fedora-26-minimal t-sys - -# Update all packages in the minimal template -qvm-run --auto --user root t-sys "xterm -hold -e 'dnf upgrade'" - -# Install some basic applications, which are helpfull for troubleshooting -qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install gnome-terminal terminus-fonts less vim-minimal nano dejavu-sans-fontsl sudo pciutils psmisc gnome-keyring usbutils'" - -# Install special Qubes-packages for the sys-vms -qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install qubes-core-agent-qrexec qubes-core-agent-systemd qubes-core-agent-passwordless-root polkit qubes-core-agent-nautilus qubes-core-agent-networking qubes-core-agent-network-manager network-manager-applet notification-daemon qubes-core-agent-dom0-updates qubes-usb-proxy pulseaudio-qubes NetworkManager-wwan NetworkManager NetworkManager-wifi'" - -# Install USB proxy package from the testing repositories -qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install --enablerepo=qubes-vm-*-current-testing qubes-input-proxy-sender'" - -# Install Linux Firmware -qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install linux-firmware'" diff --git a/code/staging/howto-build-win7-appvm b/code/staging/howto-build-win7-appvm deleted file mode 100644 index 2f45b51..0000000 --- a/code/staging/howto-build-win7-appvm +++ /dev/null @@ -1,108 +0,0 @@ -# This Howto describes all steps to create a windows 7 HVM starting from a windows 7 ISO -# Warning: this is not a script which can be copy & pasted. -# It is meant as a guide which steps must be completed to get a win7 HVM working -# It will also cover how to install Qubes Windows Tools and fix networking -# Initial author: [799] - https://github.com/one7two99 -# Date: 12.Mar 2018 - -# See also: https://www.qubes-os.org/doc/hvm/ -# See also: https://www.qubes-os.org/doc/windows-appvms/ - -# copy Windows-Installation ISO to an AppVM - -# Create new AppVM -qvm-create win7 --class StandaloneVM --property virt_mode=hvm --property kernel="" --property memory=4096 --property maxmem=4096 --property debug=True --label blue -qvm-features win7 video-model cirrus - -# Enlarge available diskspace in the new AppVM: -# System storage max. size: -qvm-volume extend win7:root 40GB -# Private storage max. size: -qvm-volume extend win7:private 20GB - -# Start AppVM with Installation-ISO -qvm-start win7 --cdrom=:/home/user/win7.iso - -# Run through the Installer - -# Check Qubes-Settings of the Windows VM and note down IP / Netmask / Gateway -# optionally: Setup manual IP-Adress within the windows VM - -# Disable Hybernation (cmd as Administrator) -powercfg -h off - -# Disable Login as user -netplwiz -# [ ] Users must enter a username and password to use this computer - -# Apply all windows Updates which will take several reboots -# Hint: make sure to search for updates again, even if windows claims to be on the latest version -# It will take several reboots to get to the actual patch level - -# Install other applications as needed Chocolatey -choco install -y adobereader jre8 firefoxesr googlechrome notepadplusplus emacs vlc putty winscp rdm libreoffice calibre flashplayerplugin 7zip git paint.net gimp keepass thunderbird - -# Backup VM in dom0, prior to installing Qubes Windows Tools -# In this example the backup will be stored in my Backup-VM (my-backup) to the folder /home/user/backup -# You can also use an external storage device here -# Hint: make sure to have enough space available -qvm-backup --verbose win7 --encrypt --compress --dest-vm my-backup /home/user/backup - -# Install Qubes Windows Tools -# Download qubes-windows-tools from Qubes 3.2 repository -wget https://ftp.qubes-os.org/repo/yum/r3.2/current-testing/dom0/fc23/rpm/qubes-windows-tools-3.2.2-3.x86_64.rpm -# move the rpm file to dom0, run in dom0 -qvm-run --pass-io my-untrusted 'cat /home/user/Download/qubes-windows-tools-3.2.2-3.x86_64.rpm' > qubes-windows-tools-3.2.2-3.x86_64.rpm -# Verify rpm package -rpm -K qubes-windows-tools-3.2.2-3.x86_64.rpm -# Install rpm-package -rpm -ivh qubes-windows-tools-3.2.2-3.x86_64.rpm -# Qubes Windows Tools ISO will be located at /usr/lib/qubes/qubes-windows-tools.iso -# Start windows VM with attached Qubes Windows Tools -qvm-start win8 --install-windows-tools -# Complete Qubes Tools installation, do not restart when prompted to do so but start after the installation has been completed. -# Run the first installation with the default setup options. - -# Shutdown and restart the windows VM to finish installation of Qubes Windows Tools - -# Disable debug mode to get seamless mode working. -qvm-prefs --set win7 debug False - -# Test seamless mode -qvm-run --auto win7 explorer.exe - -# Windows will show a yellow warning in the network icon located in the windows taskbar, even when a connection is available. -# Open Properties of LAN-Card -# Where you would normale configure IP-setting, choose Configure, which will open up Hardware Setttings window of your LAN-adapter -# Choose 2nd Tab ("Advanced") and disable "IP4 Checksum Offload" -# Go back to IP setting, disable IPv6 and configure a static IP for IPv4 using the IP which is shown for the HVM in Qubes Manager -# Reboot, change should be persistent and the warning sign should be gone. - -# Fix Networking after intalling Qubes Windows Tools -# Link 1: https://github.com/QubesOS/qubes-issues/issues/3585 -# Check DNS Settings in of your Linux AppVMs -cat /etc/resolv.conf -# nameserver 10.139.1.1 -# nameserver 10.139.1.2 -# Check the IP-settings of your windows AppVM via QubesSetting or in dom0 -# write down IP-adress, subnetmask (255.255.255.255 and gateway= -qvm-ls -n -# Disable the "Qubes Network Setup" service via CMD as Administrator in the win-AppVM: -# make sure to add a space after the equal sign -sc config "QubesNetworkSetup" start= disabled -# Go to your LAN-Card and edit its network properties -# Right click on Network Icon in the taskbar / Open Network and Sharing Center / Change Adapter Settings -# Right click on LAN-adapter > Properties: -# Disable IPv6 -# Configure IPv4 via Properties with the settings you have noted before, Example: -# Use the following IP address: -# IP address: 10.137.0.17 -# Subnet mask: 255.255.255.255 -# Default Gateway: 10.137.0.6 -# Use the following DNS server addresses: -# Preferred DNS server: 10.139.1.1 -# Alternate DNS server: 10.139.1.2 -# Ignore Warning ("The default gateway is not on the same network segment (subnet) that is defined by the IP -# address and subnet mask. Do you want to save this configuration") -# Click: Yes -# Recommendation: Reboot Windows AppVM diff --git a/code/staging/qvm-backup-to-appvm b/code/staging/qvm-backup-to-appvm deleted file mode 100644 index 9dd75c1..0000000 --- a/code/staging/qvm-backup-to-appvm +++ /dev/null @@ -1,19 +0,0 @@ -#!/bin/bash -# qvm-backup-to-appvm -# Version: 0.1 -# Copy files from dom0 to an archive in an AppVM -# Usage : qvm-backup-to-appvm -# Example: qvm-backup-to-appvm ~/bin my-untrusted /home/user/backup backup.tgz - -Source=$1 -AppVM=$2 -Destination=$3 -Archive=`date +%Y.%m.%d-%H.%M`_$4 - -tar -cvzf /tmp/$Archive $Source -qvm-move-to-vm $AppVM /tmp/$Archive -echo "mv ~/QubesIncoming/dom0/$Archive $Destination && \ - rm ~/QubesIncoming/dom0/qvm-backup_helperscript.sh" >> /tmp/qvm-backup_helperscript.sh -chmod +x /tmp/qvm-backup_helperscript.sh -qvm-move-to-vm $AppVM /tmp/qvm-backup_helperscript.sh -qvm-run $AppVM /home/user/QubesIncoming/dom0/qvm-backup_helperscript.sh