Use local attachments

https://github.com/QubesOS/qubes-issues/issues/4693
This commit is contained in:
Andrew David Wong 2020-12-07 20:36:50 -08:00
parent f15fea378a
commit eba67ef937
No known key found for this signature in database
GPG Key ID: DB4DD3BC39503030
7 changed files with 45 additions and 45 deletions

View File

@ -18,11 +18,11 @@ Archlinux template building instructions
* The qube should be based on a Fedora template. I named the qube
`build-archlinux2`, based on the minimal Fedora template.
![arch-template-01](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-01.png)
![arch-template-01](/attachment/wiki/ArchlinuxTemplate/arch-template-01.png)
* Ensure there is at least 15GB of free space in the private storage.
![arch-template-02](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-02.png)
![arch-template-02](/attachment/wiki/ArchlinuxTemplate/arch-template-02.png)
2: Create GitHub Account (optional)
@ -30,7 +30,7 @@ Archlinux template building instructions
* It can be helpful. Creating only a basic account is all that is needed. This will allow you to help, going forward, with the Qubes project. You could be help edit errors in documentation. It can also be of use building other templates.
* Create user account here https://github.com
![arch-template-03](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-03.png)
![arch-template-03](/attachment/wiki/ArchlinuxTemplate/arch-template-03.png)
3: Install necessary packages to `build-archlinux2` qube for "Qubes Automated Build System"
-----------------------------------------------------------------------------------------------
@ -74,69 +74,69 @@ $ make install-deps
$ cd /home/user/qubes-builder/
$ ./setup
```
![arch-template-04](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-04.png)
![arch-template-04](/attachment/wiki/ArchlinuxTemplate/arch-template-04.png)
* Install the missing dependencies
![arch-template-05](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-05.png)
![arch-template-05](/attachment/wiki/ArchlinuxTemplate/arch-template-05.png)
* First screen will ask you to import 'Qubes-Master-Signing-key.asc'. The 'setup' script not only downloads but confirms the key to that of the key on Qubes-OS website.
* Select '**YES**'
* Select '**OK**' Press '**Enter**'
![arch-template-06](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-06.png)
![arch-template-06](/attachment/wiki/ArchlinuxTemplate/arch-template-06.png)
* Next screen will ask you to import Marek Marczykowski-Goracki (Qubes OS signing key). Again 'setup' will confirm this key to the fingerprint.
* Select '**YES**'
* Select '**OK**' Press '**Enter**'
![arch-template-07](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-07.png)
![arch-template-07](/attachment/wiki/ArchlinuxTemplate/arch-template-07.png)
* This screen will give you the choice of which Qubes Release to build the template for.
* Select '**Qubes Release 4.0**'
* Select '**OK**' Press '**Enter**'
![arch-template-08](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-08.png)
![arch-template-08](/attachment/wiki/ArchlinuxTemplate/arch-template-08.png)
* Screen "**Choose Repos To Use To Build Packages**"
* Select 'QubesOS/qubes- Stable - Default Repo'
* Select '**OK**' Press '**Enter**'
![arch-template-09](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-09.png)
![arch-template-09](/attachment/wiki/ArchlinuxTemplate/arch-template-09.png)
* Screen "**Git Clone Faster**"
* Select '**OK**' Press '**Enter**'
![arch-template-10](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-10.png)
![arch-template-10](/attachment/wiki/ArchlinuxTemplate/arch-template-10.png)
* Screen '**Choose Pre-Build Packages Repositories**'
* Select nothing, Press '**Enter**'
![arch-template-11](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-11.png)
![arch-template-11](/attachment/wiki/ArchlinuxTemplate/arch-template-11.png)
* Screen "**Build Template Only?**"
* Select '**Yes**' Press '**Enter**'
![arch-template-12](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-12.png)
![arch-template-12](/attachment/wiki/ArchlinuxTemplate/arch-template-12.png)
* Screen '**Template Distribution Selection**' will give choices of distributions to build
* Deselect everything
* Select '**archlinux**'
![arch-template-13](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-13.png)
![arch-template-13](/attachment/wiki/ArchlinuxTemplate/arch-template-13.png)
* Screen '**Builder Plugin Selection**' will give choices of builder plugins to use for the build.
* Deselect everything
* Select '**builder-archlinux**'
* Select '**OK**' Press **Enter**
![arch-template-14](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-14.png)
![arch-template-14](/attachment/wiki/ArchlinuxTemplate/arch-template-14.png)
* Screen '**Get sources**' wants to download additional packages needed for the choosen plugin/s.
* Select '**Yes**' Press '**Enter**'
![arch-template-15](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-15.png)
![arch-template-15](/attachment/wiki/ArchlinuxTemplate/arch-template-15.png)
* Then wait for download to finish and press '**OK**'
@ -192,7 +192,7 @@ $ ls
qubes-template-archlinux-X.X.X-XXXXXXXXXXXX.noarch.rpm
```
![arch-template-16](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-16.png)
![arch-template-16](/attachment/wiki/ArchlinuxTemplate/arch-template-16.png)
* **Transfer the install-templates.sh script file into Dom0**
*Note: as there is not a typical file transfer method for Dom0, for security reasons, this less than simple transfer function has to be used*

View File

@ -48,11 +48,11 @@ Set up a ProxyVM as a VPN gateway using NetworkManager
1. Create a new VM, name it, click the ProxyVM radio button, and choose a color and template.
![Create\_New\_VM.png](https://www.qubes-os.org/attachment/wiki/VPN/Create_New_VM.png)
![Create\_New\_VM.png](/attachment/wiki/VPN/Create_New_VM.png)
2. Add the `network-manager` service to this new VM.
![Settings-services.png](https://www.qubes-os.org/attachment/wiki/VPN/Settings-services.png)
![Settings-services.png](/attachment/wiki/VPN/Settings-services.png)
3. Set up your VPN as described in the NetworkManager documentation linked above.
@ -92,7 +92,7 @@ Set up a ProxyVM as a VPN gateway using NetworkManager
6. Configure your AppVMs to use the new VM as a NetVM.
![Settings-NetVM.png](https://www.qubes-os.org/attachment/wiki/VPN/Settings-NetVM.png)
![Settings-NetVM.png](/attachment/wiki/VPN/Settings-NetVM.png)
7. Optionally, you can install some [custom icons](https://github.com/Zrubi/qubes-artwork-proxy-vpn) for your VPN
@ -107,7 +107,7 @@ Before proceeding, you will need to download a copy of your VPN provider's confi
1. Create a new VM, name it, choose "provides network", and choose a color and template.
![Create\_New\_VM.png](https://www.qubes-os.org/attachment/wiki/VPN/Create_New_VM.png)
![Create\_New\_VM.png](/attachment/wiki/VPN/Create_New_VM.png)
Note: Do not enable NetworkManager in the ProxyVM, as it can interfere with the scripts' DNS features.
If you enabled NetworkManager or used other methods in a previous attempt, do not re-use the old ProxyVM...
@ -310,7 +310,7 @@ Usage
Configure your AppVMs to use the VPN VM as a NetVM...
![Settings-NetVM.png](https://www.qubes-os.org/attachment/wiki/VPN/Settings-NetVM.png)
![Settings-NetVM.png](/attachment/wiki/VPN/Settings-NetVM.png)
If you want to update your TemplateVMs through the VPN, you can enable the `qubes-updates-proxy` service for your new VPN VM and configure the [qubes-rpc policy](https://www.qubes-os.org/doc/software-update-domu/#updates-proxy).

View File

@ -13,10 +13,10 @@ Dark KDE in Dom0
The following text describes how to change the default light theme to a dark theme. This is just an example, feel free to adjust the appearance to your taste.
The image below shows the default light theme after installation.
![begin light theme](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-fresh-installed-standard.png)
![begin light theme](/attachment/wiki/Dark-Theme/kde-fresh-installed-standard.png)
This is the result after applying the steps described here.
![end result dark theme](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-end-result.png)
![end result dark theme](/attachment/wiki/Dark-Theme/kde-end-result.png)
1. Change `Workspace Appearance`
@ -24,17 +24,17 @@ This is the result after applying the steps described here.
Qubes Menu -> System Tools -> System Settings -> Workspace Appearance
![Workspace Appearance](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-app-appearance-menu-style.png)
![Workspace Appearance](/attachment/wiki/Dark-Theme/kde-app-appearance-menu-style.png)
2. Go to `Desktop Theme`
![Desktop Menu](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-appearance-settings-desktop-theme-oxygen.png)
![Desktop Menu](/attachment/wiki/Dark-Theme/kde-appearance-settings-desktop-theme-oxygen.png)
3. Select `Oxygen` and `Apply` the change
2. (Optional) Remove blue glowing task items
![blue glowing task bar items](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-taskbar-blue-glowing-border.png)
![blue glowing task bar items](/attachment/wiki/Dark-Theme/kde-taskbar-blue-glowing-border.png)
1. Adjust Oxygen `Details`
@ -44,11 +44,11 @@ This is the result after applying the steps described here.
3. Change `Theme Item -> Task Items` from `Oxygen Task Items` to `Air Task Items`
![Change Task items look](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-desktop-theme-details.png)
![Change Task items look](/attachment/wiki/Dark-Theme/kde-desktop-theme-details.png)
4. Apply changes
![task bar items blue glowing removed](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-taskbar-blue-glowing-removed.png)
![task bar items blue glowing removed](/attachment/wiki/Dark-Theme/kde-taskbar-blue-glowing-removed.png)
3. Change `Application Appearance`
@ -58,17 +58,17 @@ This is the result after applying the steps described here.
2. Go to `Colors`
![colors tab](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-app-appearance-menu-colors.png)
![colors tab](/attachment/wiki/Dark-Theme/kde-app-appearance-menu-colors.png)
3. Select `Obsidian Coast`
![set to Obsidian Coast](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-app-appearance-menu-colors-set.png)
![set to Obsidian Coast](/attachment/wiki/Dark-Theme/kde-app-appearance-menu-colors-set.png)
4. Apply Changes
Qubes VM Manager should now look like the image below.
![result black Qubes Manager](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-black-qubes-manager.png)
![result black Qubes Manager](/attachment/wiki/Dark-Theme/kde-black-qubes-manager.png)
**Note:** Changing the `Window Decorations` from `Plastik for Qubes` will remove the border color and the VM name. The problem with `Plastik for Qubes` is that it does not overwrite the background and text color for Minimize, Maximize and Close buttons. The three buttons are therefore hard to read.
@ -78,10 +78,10 @@ Dark XCFE in Dom0
The following text describes how to change the default light theme to a dark theme. This is just an example, feel free to adjust the appearance to your taste.
The image below shows the default light theme after installation.
![begin light theme](https://www.qubes-os.org/attachment/wiki/Dark-Theme/xfce-fresh-installed.png)
![begin light theme](/attachment/wiki/Dark-Theme/xfce-fresh-installed.png)
This is the result after applying the steps described here.
![end result dark theme](https://www.qubes-os.org/attachment/wiki/Dark-Theme/xfce-end-result.png)
![end result dark theme](/attachment/wiki/Dark-Theme/xfce-end-result.png)
1. Change Appearance
@ -89,7 +89,7 @@ This is the result after applying the steps described here.
Qubes Menu -> System Tools -> Appearance
![appearance dialog](https://www.qubes-os.org/attachment/wiki/Dark-Theme/xfce-appearance-dialog.png)
![appearance dialog](/attachment/wiki/Dark-Theme/xfce-appearance-dialog.png)
2. Change Style to `Albatross`
@ -101,7 +101,7 @@ This is the result after applying the steps described here.
Qubes Menu -> System Tools -> Appearance
![window manager dialog](https://www.qubes-os.org/attachment/wiki/Dark-Theme/xfce-window-manager-theme.png)
![window manager dialog](/attachment/wiki/Dark-Theme/xfce-window-manager-theme.png)
2. Change the Theme in the `Style` Tab (e. g. Defcon-IV). All available themes work.
@ -140,7 +140,7 @@ The advantage of creating a dark themed Template VM is, that each AppVM which is
2. Select `Tweak Tool` and press the `>` button to add it
![Application Dialog](https://www.qubes-os.org/attachment/wiki/Dark-Theme/dialog-add-gnome-tweak-tool.png)
![Application Dialog](/attachment/wiki/Dark-Theme/dialog-add-gnome-tweak-tool.png)
5. Enable `Global Dark Theme`
@ -153,7 +153,7 @@ The advantage of creating a dark themed Template VM is, that each AppVM which is
2. Start `Tweak Tool` from the VM application menu and set the `Global Dark Theme` switch to `on`
![Global Dark Theme enabled](https://www.qubes-os.org/attachment/wiki/Dark-Theme/gnome-tweak-tool.png)
![Global Dark Theme enabled](/attachment/wiki/Dark-Theme/gnome-tweak-tool.png)
6. *(Optional)* Modify Firefox

View File

@ -68,7 +68,7 @@ possible to do sudo ptf/ptf
sudo ptf
![PTF start banner](https://www.qubes-os.org/attachment/wiki/PTF/ptf-banner.png)
![PTF start banner](/attachment/wiki/PTF/ptf-banner.png)
2. Show available modules (tools)

View File

@ -184,7 +184,7 @@ Once you start a Windows-based AppVM with Qubes Tools installed, you can easily
qvm-run -a my-win7-appvm explorer.exe
~~~
![windows-seamless-4.png](https://www.qubes-os.org/attachment/wiki/WindowsAppVms/windows-seamless-4.png) ![windows-seamless-1.png](https://www.qubes-os.org/attachment/wiki/WindowsAppVms/windows-seamless-1.png)
![windows-seamless-4.png](/attachment/wiki/WindowsAppVms/windows-seamless-4.png) ![windows-seamless-1.png](/attachment/wiki/WindowsAppVms/windows-seamless-1.png)
Also, the inter-VM services work as usual -- e.g. to request opening a document or URL in the Windows AppVM from another VM:
@ -202,7 +202,7 @@ Inter-VM file copy and clipboard works for Windows AppVMs the same way as for Li
To simulate CTRL-ALT-DELETE in the HVM (SAS, Secure Attention Sequence), press Ctrl-Alt-Home while having any window of this VM in the foreground.
![windows-seamless-7.png](https://www.qubes-os.org/attachment/wiki/WindowsAppVms/windows-seamless-7.png)
![windows-seamless-7.png](/attachment/wiki/WindowsAppVms/windows-seamless-7.png)
Changing between seamless and full desktop mode
-----------------------------------------------
@ -303,7 +303,7 @@ Debug and Verbose levels can generate large volume of logs and are intended for
To override global settings for a specific component, create a new key under the root key mentioned above and name it as the executable name, without `.exe` extension. For example, to change qrexec-agent's log level to Debug, set it like this:
![qtw-log-level.png](https://www.qubes-os.org/attachment/wiki/WindowsTools/qtw-log-level.png)
![qtw-log-level.png](/attachment/wiki/WindowsTools/qtw-log-level.png)
Component-specific settings currently available:

View File

@ -39,7 +39,7 @@ Select the connection to randomize and click Edit.
Select the Cloned MAC Address drop down and set to Random or Stable.
Stable will generate a random address that persists until reboot, while Random will generate an address each time a link goes up.
![Edit Connection](https://www.qubes-os.org/attachment/wiki/RandomizeMAC/networkmanager-mac-random.png)
![Edit Connection](/attachment/wiki/RandomizeMAC/networkmanager-mac-random.png)
Save the change and reconnect the connection (click on Network Manager tray icon and click disconnect under the connection, it should automatically reconnect).

View File

@ -105,15 +105,15 @@ is largely the same.
If you are prompted to scan a QR code, instead select the option (if
available) to view the secret key as text:
![Secret Key Example 0](https://www.qubes-os.org/attachment/wiki/Multi-factorAuthentication/secret-key-example-0.png)
![Secret Key Example 0](/attachment/wiki/Multi-factorAuthentication/secret-key-example-0.png)
You should then see the secret key as text:
![Secret Key Example 1](https://www.qubes-os.org/attachment/wiki/Multi-factorAuthentication/secret-key-example-1.png)
![Secret Key Example 1](/attachment/wiki/Multi-factorAuthentication/secret-key-example-1.png)
Note that the length and format of the secret key may vary by service:
![Secret Key Example 2](https://www.qubes-os.org/attachment/wiki/Multi-factorAuthentication/secret-key-example-2.png)
![Secret Key Example 2](/attachment/wiki/Multi-factorAuthentication/secret-key-example-2.png)
2. In your MFA AppVM, you can now use `oathtool` to generate base32 TOTP
authentication tokens just like Google Authenticator would. In this example,