qusal/salt/dom0
2024-07-15 10:08:19 +02:00
..
files fix: shell syntax typos 2024-07-15 10:08:19 +02:00
backup.sls fix: convert backup profile to example type 2024-02-24 22:58:15 +01:00
backup.top refactor: initial commit 2023-11-13 14:33:28 +00:00
desktop-awesome.sls feat: add state for desktop i3 and AwesomeWM 2024-06-04 10:43:16 +02:00
desktop-awesome.top feat: add state for desktop i3 and AwesomeWM 2024-06-04 10:43:16 +02:00
desktop-i3-settings.sls feat: add state for desktop i3 and AwesomeWM 2024-06-04 10:43:16 +02:00
desktop-i3-settings.top feat: add state for desktop i3 and AwesomeWM 2024-06-04 10:43:16 +02:00
desktop-i3.sls feat: add state for desktop i3 and AwesomeWM 2024-06-04 10:43:16 +02:00
desktop-i3.top feat: add state for desktop i3 and AwesomeWM 2024-06-04 10:43:16 +02:00
desktop-kde.sls fix: KDE with outdated require id 2024-06-08 06:17:09 +02:00
desktop-kde.top feat: add state for desktop i3 and AwesomeWM 2024-06-04 10:43:16 +02:00
dotfiles.sls fix: discover non-root username at runtime 2024-04-30 16:04:40 +02:00
dotfiles.top refactor: initial commit 2023-11-13 14:33:28 +00:00
gui-user.jinja feat: get GUI user with salt modules 2024-06-28 19:28:49 +02:00
helpers.sls feat: helper to show mgmt property information 2024-06-24 11:14:31 +02:00
helpers.top feat: better dom0 terminal usability 2024-02-23 16:47:27 +01:00
init.sls feat: add state for desktop i3 and AwesomeWM 2024-06-04 10:43:16 +02:00
init.top refactor: initial commit 2023-11-13 14:33:28 +00:00
install-dev.sls fix: remove extraneous package repository updates 2024-03-18 17:51:36 +01:00
install-dev.top feat: provide development environment for dom0 2023-12-20 17:17:05 +01:00
install.sls fix: remove extraneous package repository updates 2024-03-18 17:51:36 +01:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
port-forward.sls chore: move port forward to dom0 formula 2024-01-29 12:11:51 +01:00
port-forward.top chore: move port forward to dom0 formula 2024-01-29 12:11:51 +01:00
README.md doc: lint markdown files 2024-07-04 17:27:31 +02:00
screenshot.sls fix: prefer maim for screenshot 2024-05-24 22:56:32 +02:00
screenshot.top fix: install screenshot dependencies 2024-03-15 11:03:00 +01:00
update-settings.sls fix: missing load import 2024-03-22 16:45:29 +01:00
update-settings.top feat: better dom0 terminal usability 2024-02-23 16:47:27 +01:00
version fix: generate RPM Specs for Qubes Builder V2 2024-06-21 17:00:06 +02:00
xorg.sls fix: remove extraneous package repository updates 2024-03-18 17:51:36 +01:00
xorg.top refactor: initial commit 2023-11-13 14:33:28 +00:00

dom0

Dom0 environment in Qubes OS.

Table of Contents

Description

Configure Dom0 window manager, install packages, backup scripts and profile etc.

Installation

  • Top:
sudo qubesctl top.enable dom0
sudo qubesctl state.apply
sudo qubesctl top.disable dom0
sudo qubesctl --skip-dom0 --templates --standalones state.apply update.qubes-vm
  • State:
sudo qubesctl state.apply dom0
sudo qubesctl --skip-dom0 --templates --standalones state.apply update.qubes-vm

If you need to develop in Dom0, install some goodies (bare bones):

sudo qubesctl state.apply dom0.install-dev

To forward ports from qubes to the external world:

sudo qubesctl state.apply dom0.port-forward

Choose your Dom0 environment

Instead of running the state dom0, you can select which states to apply:

  • Window Manager i3:
sudo qubesctl state.apply dom0.desktop-i3,dom0.desktop-i3-settings
  • Window Manager AwesomeWM:
sudo qubesctl state.apply dom0.desktop-awesome

Follow the same syntax for other dom0 states you desire.

Usage

You may have noticed the desktop experience in Dom0 has enhanced. You are using KDE now. You can enforce domains to appear in certain activity with KWin rules, a tool qubes-kde-win-rules is provided to assist you.

Qubes backup has also improved, you have a profile provided as an example on how to do backups with native Qubes OS tools. Use the tool qvm-backup-find-last to find the last Qubes Backup made locally to a qube or a remote system, this facilitates verifying the last backup made with qvm-backup-restore --verify-only. An example is provided in /etc/qubes/backup/qusal.conf.example.