qusal/salt/dev
2024-06-17 21:46:21 +02:00
..
clone.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
clone.top refactor: initial commit 2023-11-13 14:33:28 +00:00
configure-dvm.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
configure-dvm.top refactor: initial commit 2023-11-13 14:33:28 +00:00
configure.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
configure.top refactor: initial commit 2023-11-13 14:33:28 +00:00
create.sls feat: add TCP proxy for remote hosts 2024-06-13 18:01:08 +02:00
create.top refactor: initial commit 2023-11-13 14:33:28 +00:00
home-cleanup.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
home-cleanup.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-python-tools.sls fix: remove extraneous package repository updates 2024-03-18 17:51:36 +01:00
install-python-tools.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-salt-tools.sls fix: remove extraneous package repository updates 2024-03-18 17:51:36 +01:00
install-salt-tools.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-terminal.sls feat: Bitcoin Core and Electrum servers and wallet 2024-02-17 00:07:33 +01:00
install-terminal.top feat: Bitcoin Core and Electrum servers and wallet 2024-02-17 00:07:33 +01:00
install.sls feat: add TCP proxy for remote hosts 2024-06-13 18:01:08 +02:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md doc: qusal proxy service requires configuration 2024-06-17 21:46:21 +02:00

dev

Development environment in Qubes OS.

Table of Contents

Description

Setup a development qube named "dev". Defines the user interactive shell, installing goodies, applying dotfiles, being client of sys-pgp, sys-git and sys-ssh-agent. The qube has netvm but can reach remote servers if the policy allows.

Installation

  • Top
sudo qubesctl top.enable dev
sudo qubesctl --targets=tpl-dev,dvm-dev,dev state.apply
sudo qubesctl top.disable dev
  • State
sudo qubesctl state.apply dev.create
sudo qubesctl --skip-dom0 --targets=tpl-dev state.apply dev.install
sudo qubesctl --skip-dom0 --targets=dvm-dev state.apply dev.configure-dvm
sudo qubesctl --skip-dom0 --targets=dev state.apply dev.configure

Usage

The development qube dev can be used for:

  • code development;
  • building programs;
  • signing commits, tags, pushes and verifying with split-gpg;
  • fetching and pushing to and from local qube repository with split-git; and
  • fetching and pushing to and from remote repository with split-ssh-agent and without direct network connection, you can open port to the desired SSH or HTTP server.

As the dev qube has no netvm, configure the Qrexec policy to allow or ask calls to the qusal.ConnectTCP RPC service, so the qube can communicate with a remote repository for example.