qusal/salt/reader
Ben Grande c84dfea48e
fix: generate RPM Specs for Qubes Builder V2
It doesn't checkout the current directory when querying the spec, so we
provide the already modified version of the spec.
2024-06-21 17:00:06 +02:00
..
appmenus.sls fix: sync reader appmenus 2023-12-20 21:24:43 +01:00
appmenus.top fix: sync reader appmenus 2023-12-20 21:24:43 +01:00
clone.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
clone.top refactor: initial commit 2023-11-13 14:33:28 +00:00
configure.sls fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
configure.top fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
create.sls fix: add Fedora 40 Firefox desktop file to appmenu 2024-06-09 12:36:39 +02:00
create.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top fix: thunar requires xfce helpers to find terminal 2024-01-31 14:42:17 +01:00
install.sls feat: add manual page reader 2024-05-28 11:00:04 +02:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md doc: prefix qubesctl with sudo 2024-02-23 16:55:11 +01:00
version fix: generate RPM Specs for Qubes Builder V2 2024-06-21 17:00:06 +02:00

reader

Reader environment as the default_dispvm in Qubes OS.

Table of Contents

Description

Create a disposable template for reading documents and viewing images called "dvm-reader". It is designated to be the "default_dispvm", because of this, there is no "netvm", but if you assign one, you will get networking as the necessary packages will be installed in the template.

Installation

  • Top:
sudo qubesctl top.enable reader
sudo qubesctl --targets=tpl-reader,dvm-reader state.apply
sudo qubesctl top.disable reader
sudo qubesctl state.apply reader.appmenus
  • State:
sudo qubesctl state.apply reader.create
sudo qubesctl --skip-dom0 --targets=tpl-reader state.apply reader.install
sudo qubesctl --skip-dom0 --targets=dvm-reader state.apply reader.configure
sudo qubesctl state.apply reader.appmenus

Usage

The intended usage of this qube is a receiver of incoming files that the call originator/client did no trust to open in its environment. When you run qvm-open-in-dvm from a qube and it is using the global preferences default default_dispvm, it will open the file to be read in a disposable based on dvm-reader.

By default, there is no netvm, thus allowing you to set the networking chain you want before the disposable makes a connection.

Credits