qusal/salt/reader
Ben Grande 011a71a36d
style: limit line length per file extension
Editorconfig can only act based on file extension and path, not
attributes, it remains a mean only for multiple collaborators to use the
same configuration on their editor. When it is too restrictive, such as
not considering the file syntax, use a lint tool for the specific file
type instead of trusting editorconfig. Changes were made to increase
readability.
2024-07-09 17:42:07 +02:00
..
appmenus.sls fix: sync reader appmenus 2023-12-20 21:24:43 +01:00
appmenus.top fix: sync reader appmenus 2023-12-20 21:24:43 +01:00
clone.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
clone.top refactor: initial commit 2023-11-13 14:33:28 +00:00
configure.sls fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
configure.top fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
create.sls style: limit line length per file extension 2024-07-09 17:42:07 +02:00
create.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
install.sls feat: add manual page reader 2024-05-28 11:00:04 +02:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md doc: lint markdown files 2024-07-04 17:27:31 +02:00
version fix: generate RPM Specs for Qubes Builder V2 2024-06-21 17:00:06 +02:00

reader

Reader environment as the default_dispvm in Qubes OS.

Table of Contents

Description

Create a disposable template for reading documents and viewing images called "dvm-reader". It is designated to be the "default_dispvm", because of this, there is no "netvm", but if you assign one, you will get networking as the necessary packages will be installed in the template.

Installation

  • Top:
sudo qubesctl top.enable reader
sudo qubesctl --targets=tpl-reader,dvm-reader state.apply
sudo qubesctl top.disable reader
sudo qubesctl state.apply reader.appmenus
  • State:
sudo qubesctl state.apply reader.create
sudo qubesctl --skip-dom0 --targets=tpl-reader state.apply reader.install
sudo qubesctl --skip-dom0 --targets=dvm-reader state.apply reader.configure
sudo qubesctl state.apply reader.appmenus

Usage

The intended usage of this qube is a receiver of incoming files that the call originator/client did no trust to open in its environment. When you run qvm-open-in-dvm from a qube and it is using the global preferences default default_dispvm, it will open the file to be read in a disposable based on dvm-reader.

By default, there is no netvm, thus allowing you to set the networking chain you want before the disposable makes a connection.

Credits