delete staging/

This commit is contained in:
taradiddles 2018-04-01 09:01:51 +03:00
parent 094c4deb68
commit 75d1491737
4 changed files with 0 additions and 168 deletions

View File

@ -1,4 +0,0 @@
- create-minimal-sys-vms : should be a doc
- howto-build-win7-appvm : ditto
- qvm-backup-to-appvm : isn't backup related ; +, why not use qvm-run vmname 'mv ...' instead of helper script.

View File

@ -1,37 +0,0 @@
#!/bin/bash
# qubes-create-minimal-sys-vms
# Script to setup sys-net / sys-firewall / sys-usb based on a fedora-26.minimal template
# See also: https://www.qubes-os.org/doc/templates/fedora-minimal/
#
# Disclaimer:
# all scripts in the Qubes-Community docs have to be treated as alpha or beta status
# Do not use this scripts if you don't understand what the script is doing in each step
# If you have questions and comment, feel free to comment (and improve this script)
#
# Comments:
# After this script has been run, you should have a new Template t-sys which can be used as template for your sys-VMs
# To change the templates: shutdown or kill the sys-vms and then use qvm-prefs to set the new template
# qvm-kill sys-usb && qvm-prefs --set sys-usb template t-sys
# qvm-kill sys-firewall && qvm-prefs --set sys-firewall template t-sys
# qvm-kill sys-net && qvm-prefs --set sys-net template t-sys
# Install default minimal template in dom0
sudo qubes-dom0-update qubes-template-fedora-26-minimal
# Clone template to keep the original template
qvm-clone fedora-26-minimal t-sys
# Update all packages in the minimal template
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf upgrade'"
# Install some basic applications, which are helpfull for troubleshooting
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install gnome-terminal terminus-fonts less vim-minimal nano dejavu-sans-fontsl sudo pciutils psmisc gnome-keyring usbutils'"
# Install special Qubes-packages for the sys-vms
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install qubes-core-agent-qrexec qubes-core-agent-systemd qubes-core-agent-passwordless-root polkit qubes-core-agent-nautilus qubes-core-agent-networking qubes-core-agent-network-manager network-manager-applet notification-daemon qubes-core-agent-dom0-updates qubes-usb-proxy pulseaudio-qubes NetworkManager-wwan NetworkManager NetworkManager-wifi'"
# Install USB proxy package from the testing repositories
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install --enablerepo=qubes-vm-*-current-testing qubes-input-proxy-sender'"
# Install Linux Firmware
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install linux-firmware'"

View File

@ -1,108 +0,0 @@
# This Howto describes all steps to create a windows 7 HVM starting from a windows 7 ISO
# Warning: this is not a script which can be copy & pasted.
# It is meant as a guide which steps must be completed to get a win7 HVM working
# It will also cover how to install Qubes Windows Tools and fix networking
# Initial author: [799] - https://github.com/one7two99
# Date: 12.Mar 2018
# See also: https://www.qubes-os.org/doc/hvm/
# See also: https://www.qubes-os.org/doc/windows-appvms/
# copy Windows-Installation ISO to an AppVM
# Create new AppVM
qvm-create win7 --class StandaloneVM --property virt_mode=hvm --property kernel="" --property memory=4096 --property maxmem=4096 --property debug=True --label blue
qvm-features win7 video-model cirrus
# Enlarge available diskspace in the new AppVM:
# System storage max. size:
qvm-volume extend win7:root 40GB
# Private storage max. size:
qvm-volume extend win7:private 20GB
# Start AppVM with Installation-ISO
qvm-start win7 --cdrom=<APPVM>:/home/user/win7.iso
# Run through the Installer
# Check Qubes-Settings of the Windows VM and note down IP / Netmask / Gateway
# optionally: Setup manual IP-Adress within the windows VM
# Disable Hybernation (cmd as Administrator)
powercfg -h off
# Disable Login as user
netplwiz
# [ ] Users must enter a username and password to use this computer
# Apply all windows Updates which will take several reboots
# Hint: make sure to search for updates again, even if windows claims to be on the latest version
# It will take several reboots to get to the actual patch level
# Install other applications as needed Chocolatey
choco install -y adobereader jre8 firefoxesr googlechrome notepadplusplus emacs vlc putty winscp rdm libreoffice calibre flashplayerplugin 7zip git paint.net gimp keepass thunderbird
# Backup VM in dom0, prior to installing Qubes Windows Tools
# In this example the backup will be stored in my Backup-VM (my-backup) to the folder /home/user/backup
# You can also use an external storage device here
# Hint: make sure to have enough space available
qvm-backup --verbose win7 --encrypt --compress --dest-vm my-backup /home/user/backup
# Install Qubes Windows Tools
# Download qubes-windows-tools from Qubes 3.2 repository
wget https://ftp.qubes-os.org/repo/yum/r3.2/current-testing/dom0/fc23/rpm/qubes-windows-tools-3.2.2-3.x86_64.rpm
# move the rpm file to dom0, run in dom0
qvm-run --pass-io my-untrusted 'cat /home/user/Download/qubes-windows-tools-3.2.2-3.x86_64.rpm' > qubes-windows-tools-3.2.2-3.x86_64.rpm
# Verify rpm package
rpm -K qubes-windows-tools-3.2.2-3.x86_64.rpm
# Install rpm-package
rpm -ivh qubes-windows-tools-3.2.2-3.x86_64.rpm
# Qubes Windows Tools ISO will be located at /usr/lib/qubes/qubes-windows-tools.iso
# Start windows VM with attached Qubes Windows Tools
qvm-start win8 --install-windows-tools
# Complete Qubes Tools installation, do not restart when prompted to do so but start after the installation has been completed.
# Run the first installation with the default setup options.
# Shutdown and restart the windows VM to finish installation of Qubes Windows Tools
# Disable debug mode to get seamless mode working.
qvm-prefs --set win7 debug False
# Test seamless mode
qvm-run --auto win7 explorer.exe
# Windows will show a yellow warning in the network icon located in the windows taskbar, even when a connection is available.
# Open Properties of LAN-Card
# Where you would normale configure IP-setting, choose Configure, which will open up Hardware Setttings window of your LAN-adapter
# Choose 2nd Tab ("Advanced") and disable "IP4 Checksum Offload"
# Go back to IP setting, disable IPv6 and configure a static IP for IPv4 using the IP which is shown for the HVM in Qubes Manager
# Reboot, change should be persistent and the warning sign should be gone.
# Fix Networking after intalling Qubes Windows Tools
# Link 1: https://github.com/QubesOS/qubes-issues/issues/3585
# Check DNS Settings in of your Linux AppVMs
cat /etc/resolv.conf
# nameserver 10.139.1.1
# nameserver 10.139.1.2
# Check the IP-settings of your windows AppVM via QubesSetting or in dom0
# write down IP-adress, subnetmask (255.255.255.255 and gateway=
qvm-ls -n
# Disable the "Qubes Network Setup" service via CMD as Administrator in the win-AppVM:
# make sure to add a space after the equal sign
sc config "QubesNetworkSetup" start= disabled
# Go to your LAN-Card and edit its network properties
# Right click on Network Icon in the taskbar / Open Network and Sharing Center / Change Adapter Settings
# Right click on LAN-adapter > Properties:
# Disable IPv6
# Configure IPv4 via Properties with the settings you have noted before, Example:
# Use the following IP address:
# IP address: 10.137.0.17
# Subnet mask: 255.255.255.255
# Default Gateway: 10.137.0.6
# Use the following DNS server addresses:
# Preferred DNS server: 10.139.1.1
# Alternate DNS server: 10.139.1.2
# Ignore Warning ("The default gateway is not on the same network segment (subnet) that is defined by the IP
# address and subnet mask. Do you want to save this configuration")
# Click: Yes
# Recommendation: Reboot Windows AppVM

View File

@ -1,19 +0,0 @@
#!/bin/bash
# qvm-backup-to-appvm
# Version: 0.1
# Copy files from dom0 to an archive in an AppVM
# Usage : qvm-backup-to-appvm <Source> <AppVM> <Destination> <Archive>
# Example: qvm-backup-to-appvm ~/bin my-untrusted /home/user/backup backup.tgz
Source=$1
AppVM=$2
Destination=$3
Archive=`date +%Y.%m.%d-%H.%M`_$4
tar -cvzf /tmp/$Archive $Source
qvm-move-to-vm $AppVM /tmp/$Archive
echo "mv ~/QubesIncoming/dom0/$Archive $Destination && \
rm ~/QubesIncoming/dom0/qvm-backup_helperscript.sh" >> /tmp/qvm-backup_helperscript.sh
chmod +x /tmp/qvm-backup_helperscript.sh
qvm-move-to-vm $AppVM /tmp/qvm-backup_helperscript.sh
qvm-run $AppVM /home/user/QubesIncoming/dom0/qvm-backup_helperscript.sh