qusal/salt/dom0/README.md

73 lines
1.9 KiB
Markdown
Raw Normal View History

2023-11-13 09:33:28 -05:00
# dom0
Dom0 environment in Qubes OS.
## Table of Contents
* [Description](#description)
* [Installation](#installation)
* [Choose your Dom0 environment](#choose-your-dom0-environment)
2023-11-13 09:33:28 -05:00
* [Usage](#usage)
## Description
Configure Dom0 window manager, install packages, backup scripts and profile
etc.
## Installation
2024-05-14 12:43:07 -04:00
- Top:
2023-11-13 09:33:28 -05:00
```sh
sudo qubesctl top.enable dom0
sudo qubesctl state.apply
sudo qubesctl top.disable dom0
sudo qubesctl --skip-dom0 --templates --standalones state.apply update.qubes-vm
2023-11-13 09:33:28 -05:00
```
2024-05-14 12:43:07 -04:00
- State:
2023-11-13 09:33:28 -05:00
<!-- pkg:begin:post-install -->
```sh
sudo qubesctl state.apply dom0
sudo qubesctl --skip-dom0 --templates --standalones state.apply update.qubes-vm
2023-11-13 09:33:28 -05:00
```
<!-- pkg:end:post-install -->
If you need to develop in Dom0, install some goodies (bare bones):
```sh
sudo qubesctl state.apply dom0.install-dev
```
To forward ports from qubes to the external world:
```sh
sudo qubesctl state.apply dom0.port-forward
```
### Choose your Dom0 environment
Instead of running the state `dom0`, you can select which states to apply:
- Window Manager i3:
```sh
sudo qubesctl state.apply dom0.desktop-i3,dom0.desktop-i3-settings
```
- Window Manager AwesomeWM:
```sh
sudo qubesctl state.apply dom0.desktop-awesome
```
Follow the same syntax for other `dom0` states you desire.
2023-11-13 09:33:28 -05:00
## Usage
You may have noticed the desktop experience in Dom0 has enhanced. You are
using KDE now. You can enforce domains to appear in certain activity with KWin
rules, a tool `qubes-kde-win-rules` is provided to assist you.
Qubes backup has also improved, you have a profile provided as an example on
how to do backups with native Qubes OS tools. Use the tool
`qvm-backup-find-last` to find the last Qubes Backup made locally to a qube or
a remote system, this facilitates verifying the last backup made with
`qvm-backup-restore --verify-only`. An example is provided in
`/etc/qubes/backup/qusal.conf.example`.