Qubes: Difference between revisions
From Legoktm
(→VMs: update) |
(→dom0: copy paste) |
||
Line 46: | Line 46: | ||
== dom0 == |
== dom0 == |
||
In <code>/etc/qubes/guid.conf</code>: |
|||
<pre> |
|||
secure_copy_sequence = "Mod4-c"; |
|||
secure_paste_sequence = "Mod4-v"; |
|||
</pre> |
|||
<code>/usr/local/bin/vault</code>, mapped to ctrl+shift+x |
<code>/usr/local/bin/vault</code>, mapped to ctrl+shift+x |
||
<pre> |
<pre> |
Revision as of 06:38, 31 March 2021
VMs
- DD (km-d10-dev)
- media (km-f33)
- flatpak: handbrake, kdenlive, picard
- personal (km-f33)
- flatpak: Signal, xournalpp, hexchat, runelite, dolphinemu
- fopf (km-f33)
- school (km-f33)
- dev (km-f33-dev)
- gpg (km-f33)
- no network
- vault (km-f33-vault)
- no network
- vault-gpg (fedora-33)
- no network
- sys-riseup-vpn (km-d10-leap)
- see Qubes/riseup-vpn setup guide
Template VMs
- km-d10-dev: fork:
- devscripts git-buildpackage dput-ng command-not-found gitk git-cola gir1.2-vte-2.91 (reportbug-gtk dep) webext-ublock-origin webext-https-everywhere dh-php php-dev lintian-brush lintian (from backports) dh-buildinfo apache2-dev ack
- fedora-33: upstream
- km-f33: fork:
- enabled rpmfusion
- fuse-exfat exfat-utils chromium ffmpeg vlc inkscape pcsc-tools mozilla-privacy-badger hugin filezilla shotwell youtube-dl libreoffice libgnome-keyring tree ack nano mozilla-https-everywhere mozilla-ublock-origin nextcloud-client-nautilus quassel-client mosh mono-core mono-devel mono-locale-extras mediainfo curl transmission-gtk
- km-f33-dev:
- enabled codium, pycharm-community, rpmfusion
- quassel-client mozilla-https-everywhere mozilla-ublock-origin python3 python3.5 python3.6 python3.8 python3.9 python3.10 composer php npm tox fish pipenv git-cola gitk podman nano tree ack jq mosh mozilla-privacy-badger ffmpeg php-apcu ruby bind-utils devscripts poetry twine sqlite pycharm-community codium golang toolbox fpaste openssl-devel g++ vlc sqlite-devel php-gmp chromium redis mariadb-devel colordiff
- km-f33-vault: (fork of minimal)
- nano keepassxc qubes-gpg-split pinentry-gtk
Config
/etc/qubes-rpc/policy/qubes.InputKeyboard
sys-usb dom0 ask,default_target=dom0
/etc/qubes-rpc/policy/qubes.InputTablet
sys-usb dom0 allow
/etc/qubes-rpc/policy/qubes.Gpg
DD gpg allow
dev gpg allow
personal gpg allow
/etc/qubes-rpc/policy/qubes.GpgImportKey
DD gpg allow
dev gpg allow
personal gpg allow
dom0
In /etc/qubes/guid.conf
:
secure_copy_sequence = "Mod4-c"; secure_paste_sequence = "Mod4-v";
/usr/local/bin/vault
, mapped to ctrl+shift+x
#!/bin/sh exec qvm-run vault keepassxc
Clock format: %a %F %r
Redshift, following https://www.bryceguinta.me/install-configure-and-autostart-redshift-on-qubes-40.html