Qubes: Difference between revisions

From Legoktm
No edit summary
(gpg stuff)
Line 32: Line 32:
* <code>/etc/qubes-rpc/policy/qubes.InputTablet</code>
* <code>/etc/qubes-rpc/policy/qubes.InputTablet</code>
** <code>sys-usb dom0 allow</code>
** <code>sys-usb dom0 allow</code>
* <code>/etc/qubes-rpc/policy/qubes.Gpg</code>
** <code>DD gpg allow</code>
** <code>dev gpg allow</code>
** <code>personal gpg allow</code>
* <code>/etc/qubes-rpc/policy/qubes.GpgImportKey</code>
** <code>DD gpg allow</code>
** <code>dev gpg allow</code>
** <code>personal gpg allow</code>

Revision as of 00:45, 25 August 2019

VMs

  • DD (debian-10)
  • media (km-fedora-30)
    • flatpak: VLC, filezilla, transmission
  • personal (km-fedora-30)
    • flatpak: Signal
  • fopf (km-fedora-30)
  • school (km-fedora-30)
  • dev (km-fedora-30-dev)
  • wm-ssh (fedora-30)
    • firewall only allows ssh to bast4002.wikimedia.org
  • vault (km-fedora-30)
    • no network
  • vault-gpg (fedora-29)
    • no network

Template VMs

  • debian-9: upstream
  • debian-10: modified:
    • devscripts git-buildpackage dput-ng command-not-found gitk git-cola gir1.2-vte-2.91 (reportbug-gtk dep) webext-ublock-origin webext-https-everywhere
  • fedora-29: upstream
  • fedora-30: upstream
  • km-fedora-30: fork:
    • nextcloud-client-nautilus mozilla-https-everywhere mozilla-ublock-origin nano tree ack libgnome-keyring libreoffice quassel-client shotwell filezilla hugin mozilla-privacy-badger keepassxc pcsc-tools
  • km-fedora-30-dev:
    • ack atom composer docker-ce fish git-cola gitk jq mosh mozilla-https-everywhere mozilla-privacy-badger mozilla-ublock-origin nano netxcloud-client-nautilus npm php pipenv podman pycharm-community python3-pyside python3-tox python34 python35 python36 python38 quassel-client tree

Config

  • /etc/qubes-rpc/policy/qubes.InputKeyboard
    • sys-usb dom0 ask,default_target=dom0
  • /etc/qubes-rpc/policy/qubes.InputTablet
    • sys-usb dom0 allow
  • /etc/qubes-rpc/policy/qubes.Gpg
    • DD gpg allow
    • dev gpg allow
    • personal gpg allow
  • /etc/qubes-rpc/policy/qubes.GpgImportKey
    • DD gpg allow
    • dev gpg allow
    • personal gpg allow