qusal/salt/dom0
Ben Grande 0887c24a19 fix: remove unicode from used files
No considering license, copyright notices kept outside of the installed
directories, but excluding keys that have unicode in their comment
section.
2024-01-18 15:23:52 +01:00
..
files fix: remove unicode from used files 2024-01-18 15:23:52 +01:00
backup.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
backup.top refactor: initial commit 2023-11-13 14:33:28 +00:00
dotfiles.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
dotfiles.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-dev.sls fix: dom0 as sys-git client 2024-01-18 09:21:21 +01:00
install-dev.top feat: provide development environment for dom0 2023-12-20 17:17:05 +01:00
install.sls feat: qubes-vm-update global settings 2024-01-02 18:04:54 +01:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
kde.sls fix: salt syntax with missing characters 2023-12-19 13:02:04 +01:00
kde.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md feat: provide development environment for dom0 2023-12-20 17:17:05 +01:00
xorg.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
xorg.top refactor: initial commit 2023-11-13 14:33:28 +00:00

dom0

Dom0 environment in Qubes OS.

Table of Contents

Description

Configure Dom0 window manager, install packages, backup scripts and profile etc.

Installation

  • Top
qubesctl top.enable dom0
qubesctl state.apply
qubesctl top.disable dom0
  • State
qubesctl state.apply dom0

If you need to develop in Dom0, install some goodies (bare bones):

qubesctl state.apply dom0.install-dev

Usage

You may have noticed the desktop experience in Dom0 has enhanced. You are using KDE now. You can enforce domains to appear in certain activity with KWin rules, a tool qubes-kde-win-rules is provided to assist you.

Qubes backup has also improved, you may use qvm-backup --profile qusal, the profile provided is an example. Use the tool qvm-backup-find-last to find the last Qubes Backup made locally to a qube or a remote system, this facilitates verifying the last backup made with qvm-backup-restore --verify-only. An example is provided in /etc/qubes/backup/qusal.conf.