5722a25779
Useful when Dom0 has the non-default username, less useful for DomUs. Fixes: https://github.com/ben-grande/qusal/issues/43 |
||
---|---|---|
.. | ||
files | ||
backup.sls | ||
backup.top | ||
dotfiles.sls | ||
dotfiles.top | ||
gui-user.jinja | ||
helpers.sls | ||
helpers.top | ||
init.sls | ||
init.top | ||
install-dev.sls | ||
install-dev.top | ||
install.sls | ||
install.top | ||
kde.sls | ||
kde.top | ||
port-forward.sls | ||
port-forward.top | ||
README.md | ||
screenshot.sls | ||
screenshot.top | ||
update-settings.sls | ||
update-settings.top | ||
xorg.sls | ||
xorg.top |
dom0
Dom0 environment in Qubes OS.
Table of Contents
Description
Configure Dom0 window manager, install packages, backup scripts and profile etc.
Installation
- Top
sudo qubesctl top.enable dom0
sudo qubesctl state.apply
sudo qubesctl top.disable dom0
- State
sudo qubesctl state.apply dom0
If you need to develop in Dom0, install some goodies (bare bones):
sudo qubesctl state.apply dom0.install-dev
To forward ports from qubes to the external world:
sudo qubesctl state.apply dom0.port-forward
Usage
You may have noticed the desktop experience in Dom0 has enhanced. You are
using KDE now. You can enforce domains to appear in certain activity with KWin
rules, a tool qubes-kde-win-rules
is provided to assist you.
Qubes backup has also improved, you have a profile provided as an example on
how to do backups with native Qubes OS tools. Use the tool
qvm-backup-find-last
to find the last Qubes Backup made locally to a qube or
a remote system, this facilitates verifying the last backup made with
qvm-backup-restore --verify-only
. An example is provided in
/etc/qubes/backup/qusal.conf.example
.