Qubes: Difference between revisions
(→Template VMs: more packages) |
(→Template VMs: fix) |
||
Line 32: | Line 32: | ||
*** <code>sudo dnf config-manager --set-enabled rpmfusion-free-updates</code> |
*** <code>sudo dnf config-manager --set-enabled rpmfusion-free-updates</code> |
||
** enabled pycharm-community, vscodium |
** enabled pycharm-community, vscodium |
||
** fuse-exfat exfat-utils chromium ffmpeg vlc pcsc-tools mozilla-privacy-badger filezilla shotwell youtube-dl libreoffice libgnome-keyring tree ack nano mozilla-https-everywhere mozilla-ublock-origin nextcloud-client-nautilus quassel-client mosh mono-core mono-devel mono-locale-extras mediainfo curl transmission-gtk fish python3 |
** fuse-exfat exfat-utils chromium ffmpeg vlc pcsc-tools mozilla-privacy-badger filezilla shotwell youtube-dl libreoffice libgnome-keyring tree ack nano mozilla-https-everywhere mozilla-ublock-origin nextcloud-client-nautilus quassel-client mosh mono-core mono-devel mono-locale-extras mediainfo curl transmission-gtk fish python3 python3.6 python3.7 python3.8 python3.9 python3.10 composer php-cli php-mysqli git-cola gitk podman pycharm-community codium nano keepassxc qubes-gpg-split pinentry-gtk tokei sqlite jq git-lfs tox poetry php-devel bind-utils gh mtr traceroute httpd-devel devscripts mariadb |
||
== Config == |
== Config == |
Revision as of 17:17, 1 June 2022
Note: after restoring from a backup make sure to recreate the templates from the base again to save disk space because of copy-on-write.
VMs
- DD (km-d11)
- media (km-f34)
- flatpak: handbrake, kdenlive, picard
- personal (km-f34)
- flatpak: Signal, xournalpp, hexchat, runelite, dolphinemu
- fpf (km-f34)
- flatpak: Signal, Wire
- school (km-f34)
- dev (km-f34)
- flatpak: Element
- gpg (km-f34)
- no network
- vault (km-f34)
- no network
- vault-gpg (fedora-34)
- no network
- sys-mullvad-vpn (fedora-34)
Template VMs
- km-d11: fork:
- (from backports) devscripts git-buildpackage dput-ng lintian
- command-not-found gitk git-cola webext-ublock-origin webext-https-everywhere dh-php php-dev dh-buildinfo apache2-dev ack webext-privacy-badger ubuntu-dev-tools pkg-kde-tools dh-python cython3 python3-setuptools neomutt vlc gnome-system-monitor curl php-mbstring php-intl php-sqlite3 php-apcu python3-isort python3-sphinx
- fedora-34: upstream
- km-f34: fork:
- enabled rpmfusion
sudo dnf config-manager --set-enabled rpmfusion-free
sudo dnf config-manager --set-enabled rpmfusion-free-updates
- enabled pycharm-community, vscodium
- fuse-exfat exfat-utils chromium ffmpeg vlc pcsc-tools mozilla-privacy-badger filezilla shotwell youtube-dl libreoffice libgnome-keyring tree ack nano mozilla-https-everywhere mozilla-ublock-origin nextcloud-client-nautilus quassel-client mosh mono-core mono-devel mono-locale-extras mediainfo curl transmission-gtk fish python3 python3.6 python3.7 python3.8 python3.9 python3.10 composer php-cli php-mysqli git-cola gitk podman pycharm-community codium nano keepassxc qubes-gpg-split pinentry-gtk tokei sqlite jq git-lfs tox poetry php-devel bind-utils gh mtr traceroute httpd-devel devscripts mariadb
- enabled rpmfusion
Config
/etc/qubes-rpc/policy/qubes.InputKeyboard
sys-usb dom0 ask,default_target=dom0
/etc/qubes-rpc/policy/qubes.InputTablet
sys-usb dom0 allow
/etc/qubes-rpc/policy/qubes.Gpg
DD gpg allow
dev gpg allow
fpf gpg allow
personal gpg allow
/etc/qubes-rpc/policy/qubes.GpgImportKey
DD gpg allow
dev gpg allow
fpf gpg allow
personal gpg allow
Follow https://github.com/Qubes-Community/Contents/blob/master/docs/customization/dpi-scaling.md for getting it to work with my 4k display. Went back to a non-4k display.
dom0
Appearance -> Style -> Adwaita-dark
In /etc/qubes/guid.conf
:
secure_copy_sequence = "Mod4-c"; secure_paste_sequence = "Mod4-v";
In Qubes 4.1 that no longer works and you need (source):
$ qvm-features dom0 gui-default-secure-copy-sequence 'Mod4-c'
$ qvm-features dom0 gui-default-secure-paste-sequence 'Mod4-v'
Create /usr/local/bin/vault
, mapped to ctrl+shift+x
#!/bin/sh exec qvm-run vault keepassxc
Clock format: %a %F %r
Redshift, following https://www.bryceguinta.me/install-configure-and-autostart-redshift-on-qubes-40.html, except place the config file at ~/redshift.conf
so it gets included in dom0 backups and use Settings -> Session and Startup to add the autostart entry.