qusal/salt/reader
Ben Grande 422b01e0f6 feat: remove audiovm setting when unnecessary
Decrease audio attack surface to qubes that will never need to use it.
2024-01-20 19:34:39 +01:00
..
appmenus.sls fix: sync reader appmenus 2023-12-20 21:24:43 +01:00
appmenus.top fix: sync reader appmenus 2023-12-20 21:24:43 +01:00
clone.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
clone.top refactor: initial commit 2023-11-13 14:33:28 +00:00
create.sls feat: remove audiovm setting when unnecessary 2024-01-20 19:34:39 +01:00
create.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install.sls fix: install less browser packages in reader 2024-01-12 19:47:52 +01:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md fix: install less browser packages in reader 2024-01-12 19:47:52 +01:00

reader

Reader environment as the default_dispvm in Qubes OS.

Table of Contents

Description

Create a disposable template for reading documents and viewing images called "dvm-reader". It is designated to be the "default_dispvm", because of this, there is no "netvm", but if you assign one, you will get networking as the necessary packages will be installed in the template.

Installation

  • Top:
qubesctl top.enable reader
qubesctl --targets=tpl-reader state.apply
qubesctl top.disable reader
qubesctl state.apply reader.appmenus
  • State:
qubesctl state.apply reader.create
qubesctl --skip-dom0 --targets=tpl-reader state.apply reader.install
qubesctl state.apply reader.appmenus

Usage

The intended usage of this qube is a receiver of incoming files that the call originator/client did no trust to open in its environment. When you run qvm-open-in-dvm from a qube and it is using the global preferences default default_dispvm, it will open the file to be read in a disposable based on dvm-reader.

By default, there is no netvm, thus allowing you to set the networking chain you want before the disposable makes a connection.

Credits