qusal/salt/reader
Ben Grande 44ea4c5db2
feat: add manual page reader
Ability to read the program's manual from the terminal is much better
than to ask the user to search the manual page on the internet, we
already trust the installed program and documentation, but we should not
trust every manual page on the internet.
2024-05-28 11:00:04 +02:00
..
appmenus.sls fix: sync reader appmenus 2023-12-20 21:24:43 +01:00
appmenus.top fix: sync reader appmenus 2023-12-20 21:24:43 +01:00
clone.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
clone.top refactor: initial commit 2023-11-13 14:33:28 +00:00
configure.sls fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
configure.top fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
create.sls chore: copyright update 2024-01-29 16:49:54 +01:00
create.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
install.sls feat: add manual page reader 2024-05-28 11:00:04 +02:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md doc: prefix qubesctl with sudo 2024-02-23 16:55:11 +01:00

reader

Reader environment as the default_dispvm in Qubes OS.

Table of Contents

Description

Create a disposable template for reading documents and viewing images called "dvm-reader". It is designated to be the "default_dispvm", because of this, there is no "netvm", but if you assign one, you will get networking as the necessary packages will be installed in the template.

Installation

  • Top:
sudo qubesctl top.enable reader
sudo qubesctl --targets=tpl-reader,dvm-reader state.apply
sudo qubesctl top.disable reader
sudo qubesctl state.apply reader.appmenus
  • State:
sudo qubesctl state.apply reader.create
sudo qubesctl --skip-dom0 --targets=tpl-reader state.apply reader.install
sudo qubesctl --skip-dom0 --targets=dvm-reader state.apply reader.configure
sudo qubesctl state.apply reader.appmenus

Usage

The intended usage of this qube is a receiver of incoming files that the call originator/client did no trust to open in its environment. When you run qvm-open-in-dvm from a qube and it is using the global preferences default default_dispvm, it will open the file to be read in a disposable based on dvm-reader.

By default, there is no netvm, thus allowing you to set the networking chain you want before the disposable makes a connection.

Credits