qusal/salt/dom0
2023-12-20 17:17:05 +01:00
..
files fix: qubes-update superseded by qubes-vm-update 2023-12-19 14:44:33 +01:00
backup.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
backup.top refactor: initial commit 2023-11-13 14:33:28 +00:00
dotfiles.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
dotfiles.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-dev.sls feat: provide development environment for dom0 2023-12-20 17:17:05 +01:00
install-dev.top feat: provide development environment for dom0 2023-12-20 17:17:05 +01:00
install.sls feat: provide development environment for dom0 2023-12-20 17:17:05 +01:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
kde.sls fix: salt syntax with missing characters 2023-12-19 13:02:04 +01:00
kde.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md feat: provide development environment for dom0 2023-12-20 17:17:05 +01:00
xorg.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
xorg.top refactor: initial commit 2023-11-13 14:33:28 +00:00

dom0

Dom0 environment in Qubes OS.

Table of Contents

Description

Configure Dom0 window manager, install packages, backup scripts and profile etc.

Installation

  • Top
qubesctl top.enable dom0
qubesctl state.apply
qubesctl top.disable dom0
  • State
qubesctl state.apply dom0

If you need to develop in Dom0, install some goodies (bare bones):

qubesctl state.apply dom0.install-dev

Usage

You may have noticed the desktop experience in Dom0 has enhanced. You are using KDE now. You can enforce domains to appear in certain activity with KWin rules, a tool qubes-kde-win-rules is provided to assist you.

Qubes backup has also improved, you may use qvm-backup --profile qusal, the profile provided is an example. Use the tool qvm-backup-find-last to find the last Qubes Backup made locally to a qube or a remote system, this facilitates verifying the last backup made with qvm-backup-restore --verify-only. An example is provided in /etc/qubes/backup/qusal.conf.