qusal/salt/dom0/README.md
2024-05-14 18:43:07 +02:00

54 lines
1.3 KiB
Markdown

# dom0
Dom0 environment in Qubes OS.
## Table of Contents
* [Description](#description)
* [Installation](#installation)
* [Usage](#usage)
## Description
Configure Dom0 window manager, install packages, backup scripts and profile
etc.
## Installation
- Top:
```sh
sudo qubesctl top.enable dom0
sudo qubesctl state.apply
sudo qubesctl top.disable dom0
```
- State:
<!-- pkg:begin:post-install -->
```sh
sudo qubesctl state.apply dom0
```
<!-- pkg:end:post-install -->
If you need to develop in Dom0, install some goodies (bare bones):
```sh
sudo qubesctl state.apply dom0.install-dev
```
To forward ports from qubes to the external world:
```sh
sudo qubesctl state.apply dom0.port-forward
```
## Usage
You may have noticed the desktop experience in Dom0 has enhanced. You are
using KDE now. You can enforce domains to appear in certain activity with KWin
rules, a tool `qubes-kde-win-rules` is provided to assist you.
Qubes backup has also improved, you have a profile provided as an example on
how to do backups with native Qubes OS tools. Use the tool
`qvm-backup-find-last` to find the last Qubes Backup made locally to a qube or
a remote system, this facilitates verifying the last backup made with
`qvm-backup-restore --verify-only`. An example is provided in
`/etc/qubes/backup/qusal.conf.example`.