1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2024-10-06 14:32:47 -04:00
My Scripts for template VMs
Go to file
xyhhx e352ff1302
jackwagon: fix fedora scripts (#3)
* fix: fix fedora scripts

* refactor: remove utils.sh
2024-09-11 18:29:51 -07:00
.github Ignore SC3040 2024-09-11 18:29:38 -07:00
debian-gnome Add set -u 2024-07-20 18:20:34 -07:00
etc Add lokinet-dns-fix.service 2024-05-24 21:08:50 -07:00
fedora-gnome jackwagon: fix fedora scripts (#3) 2024-09-11 18:29:51 -07:00
fedora-minimal jackwagon: fix fedora scripts (#3) 2024-09-11 18:29:51 -07:00
whonix Add set -u 2024-07-20 18:20:34 -07:00
.gitignore Create .gitignore 2023-01-16 00:39:37 -05:00
dom0.sh Add set -u to dom0 2024-07-20 18:22:21 -07:00
LICENSE Initial commit 2022-02-03 02:57:15 -05:00
README.md Add ShellCheck badge 2024-05-31 10:51:02 -07:00
Shortcuts.md Shortcuts for Lenovo ePrivacy 2024-05-01 06:47:53 -07:00

QubesOS-Scripts

ShellCheck

My scripts for setting up QubesOS.

Running these scripts should be very straight forward. For the default Fedora template, run fedora-gnome.sh to trim it down first.

After you are done running those scripts, any other script can be used in a different template based on those trimmed down templates to create their respective virtual machines.

If you want to install Flatpak packages, install them inside of an AppVM as a user Flatpak and enable the update-user-flatpaks.service as a user systemd service for automatic updates.

It is recommended that you follow the docs here to make a prompt for root access on non-minimal VMs. dom0.sh already takes care dom dom0 so you only need to worry about the guests.