Qubes
From Legoktm
VMs
- DD (debian-10)
- media (km-fedora-30)
- flatpak: VLC, filezilla, transmission
- personal (km-fedora-30)
- flatpak: Signal
- fopf (km-fedora-30)
- school (km-fedora-30)
- dev (km-fedora-30-dev)
- wm-ssh (fedora-30)
- firewall only allows ssh to bast4002.wikimedia.org
- gpg (km-fedora-30)
- no network
- vault (km-fedora-30)
- no network
- vault-gpg (fedora-29)
- no network
Template VMs
- debian-9: upstream
- debian-10: modified:
- devscripts git-buildpackage dput-ng command-not-found gitk git-cola gir1.2-vte-2.91 (reportbug-gtk dep) webext-ublock-origin webext-https-everywhere
- fedora-29: upstream
- fedora-30: upstream
- km-fedora-30: fork:
- nextcloud-client-nautilus mozilla-https-everywhere mozilla-ublock-origin nano tree ack libgnome-keyring libreoffice quassel-client shotwell filezilla hugin mozilla-privacy-badger keepassxc pcsc-tools
- km-fedora-30-dev:
- ack atom composer docker-ce fish git-cola gitk jq mosh mozilla-https-everywhere mozilla-privacy-badger mozilla-ublock-origin nano netxcloud-client-nautilus npm php pipenv podman pycharm-community python3-pyside python3-tox python34 python35 python36 python38 quassel-client tree
Config
/etc/qubes-rpc/policy/qubes.InputKeyboard
sys-usb dom0 ask,default_target=dom0
/etc/qubes-rpc/policy/qubes.InputTablet
sys-usb dom0 allow
/etc/qubes-rpc/policy/qubes.Gpg
DD gpg allow
dev gpg allow
personal gpg allow
/etc/qubes-rpc/policy/qubes.GpgImportKey
DD gpg allow
dev gpg allow
personal gpg allow