Ben Grande a67c6c6815
fix: receive Xfce configuration from dotfiles
The run-terminal program is not Qubes or Qusal specific and even could
be in the dotfiles, but Xfce helpers.rc depends on it to get any
available application.

For: https://github.com/ben-grande/dotfiles/pull/1
2025-02-27 11:47:57 +01:00
..
2023-12-20 21:24:43 +01:00
2023-12-20 21:24:43 +01:00
2023-11-13 14:33:28 +00:00
2023-11-13 14:33:28 +00:00
2025-01-08 16:12:31 +01:00
2023-11-13 14:33:28 +00:00
2023-11-13 14:33:28 +00:00
2024-07-04 17:27:31 +02:00

reader

Reader environment as the default_dispvm in Qubes OS.

Table of Contents

Description

Create a disposable template for reading documents and viewing images called "dvm-reader". It is designated to be the "default_dispvm", because of this, there is no "netvm", but if you assign one, you will get networking as the necessary packages will be installed in the template.

Installation

  • Top:
sudo qubesctl top.enable reader
sudo qubesctl --targets=tpl-reader,dvm-reader state.apply
sudo qubesctl top.disable reader
sudo qubesctl state.apply reader.appmenus
  • State:
sudo qubesctl state.apply reader.create
sudo qubesctl --skip-dom0 --targets=tpl-reader state.apply reader.install
sudo qubesctl --skip-dom0 --targets=dvm-reader state.apply reader.configure
sudo qubesctl state.apply reader.appmenus

Usage

The intended usage of this qube is a receiver of incoming files that the call originator/client did no trust to open in its environment. When you run qvm-open-in-dvm from a qube and it is using the global preferences default default_dispvm, it will open the file to be read in a disposable based on dvm-reader.

By default, there is no netvm, thus allowing you to set the networking chain you want before the disposable makes a connection.

Credits