qusal/salt/dom0
2023-12-19 13:02:04 +01:00
..
files chore: Fix unman copyright contact 2023-11-13 18:18:06 +00:00
backup.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
backup.top refactor: initial commit 2023-11-13 14:33:28 +00:00
dotfiles.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
dotfiles.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install.sls fix: salt syntax with missing characters 2023-12-19 13:02:04 +01:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
kde.sls fix: salt syntax with missing characters 2023-12-19 13:02:04 +01:00
kde.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md refactor: initial commit 2023-11-13 14:33:28 +00:00
xorg.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
xorg.top refactor: initial commit 2023-11-13 14:33:28 +00:00

dom0

Dom0 environment in Qubes OS.

Table of Contents

Description

Configure Dom0 window manager, install packages, backup scripts and profile etc.

Installation

  • Top
qubesctl top.enable dom0
qubesctl state.apply
qubesctl top.disable dom0
  • State
qubesctl state.apply dom0

Usage

You may have noticed the desktop experience in Dom0 has enhanced. You are using KDE now. You can enforce domains to appear in certain activity with KWin rules, a tool qubes-kde-win-rules is provided to assist you.

Qubes backup has also improved, you may use qvm-backup --profile qusal, the profile provided is an example. Use the tool qvm-backup-find-last to find the last Qubes Backup made locally to a qube or a remote system, this facilitates verifying the last backup made with qvm-backup-restore --verify-only. An example is provided in /etc/qubes/backup/qusal.conf.