qusal/salt/dom0/README.md
2024-05-14 18:43:07 +02:00

1.3 KiB

dom0

Dom0 environment in Qubes OS.

Table of Contents

Description

Configure Dom0 window manager, install packages, backup scripts and profile etc.

Installation

  • Top:
sudo qubesctl top.enable dom0
sudo qubesctl state.apply
sudo qubesctl top.disable dom0
  • State:
sudo qubesctl state.apply dom0

If you need to develop in Dom0, install some goodies (bare bones):

sudo qubesctl state.apply dom0.install-dev

To forward ports from qubes to the external world:

sudo qubesctl state.apply dom0.port-forward

Usage

You may have noticed the desktop experience in Dom0 has enhanced. You are using KDE now. You can enforce domains to appear in certain activity with KWin rules, a tool qubes-kde-win-rules is provided to assist you.

Qubes backup has also improved, you have a profile provided as an example on how to do backups with native Qubes OS tools. Use the tool qvm-backup-find-last to find the last Qubes Backup made locally to a qube or a remote system, this facilitates verifying the last backup made with qvm-backup-restore --verify-only. An example is provided in /etc/qubes/backup/qusal.conf.example.