224312ed42
Make shell a little bit safer with: - add-default-case - check-extra-masked-returns - check-set-e-suppressed - quote-safe-variables - check-unassigned-uppercase Although there are some stylistic decisions for uniformity: - avoid-nullary-conditions - deprecated-which - require-variable-braces |
||
---|---|---|
.. | ||
files | ||
backup.sls | ||
backup.top | ||
desktop-awesome.sls | ||
desktop-awesome.top | ||
desktop-i3-settings.sls | ||
desktop-i3-settings.top | ||
desktop-i3.sls | ||
desktop-i3.top | ||
desktop-kde.sls | ||
desktop-kde.top | ||
dotfiles.sls | ||
dotfiles.top | ||
gui-user.jinja | ||
helpers.sls | ||
helpers.top | ||
init.sls | ||
init.top | ||
install-dev.sls | ||
install-dev.top | ||
install.sls | ||
install.top | ||
port-forward.sls | ||
port-forward.top | ||
README.md | ||
screenshot.sls | ||
screenshot.top | ||
update-settings.sls | ||
update-settings.top | ||
version | ||
xorg.sls | ||
xorg.top |
dom0
Dom0 environment in Qubes OS.
Table of Contents
Description
Configure Dom0 window manager, install packages, backup scripts and profile etc.
Installation
- Top:
sudo qubesctl top.enable dom0
sudo qubesctl state.apply
sudo qubesctl top.disable dom0
sudo qubesctl --skip-dom0 --templates --standalones state.apply update.qubes-vm
- State:
sudo qubesctl state.apply dom0
sudo qubesctl --skip-dom0 --templates --standalones state.apply update.qubes-vm
If you need to develop in Dom0, install some goodies (bare bones):
sudo qubesctl state.apply dom0.install-dev
To forward ports from qubes to the external world:
sudo qubesctl state.apply dom0.port-forward
Choose your Dom0 environment
Instead of running the state dom0
, you can select which states to apply:
- Window Manager i3:
sudo qubesctl state.apply dom0.desktop-i3,dom0.desktop-i3-settings
- Window Manager AwesomeWM:
sudo qubesctl state.apply dom0.desktop-awesome
Follow the same syntax for other dom0
states you desire.
Usage
You may have noticed the desktop experience in Dom0 has enhanced. You are
using KDE now. You can enforce domains to appear in certain activity with KWin
rules, a tool qubes-kde-win-rules
is provided to assist you.
Qubes backup has also improved, you have a profile provided as an example on
how to do backups with native Qubes OS tools. Use the tool
qvm-backup-find-last
to find the last Qubes Backup made locally to a qube or
a remote system, this facilitates verifying the last backup made with
qvm-backup-restore --verify-only
. An example is provided in
/etc/qubes/backup/qusal.conf.example
.