1
0
mirror of https://github.com/tommytran732/QubesOS-Scripts synced 2024-11-09 20:21:34 -05:00
QubesOS-Scripts/dom0.sh

18 lines
874 B
Bash
Raw Normal View History

2022-02-06 02:59:49 -05:00
#!/bin/bash
sudo mkdir /etc/gtk-3.0
2022-02-06 16:33:08 -05:00
echo '[Settings]
2022-02-06 02:59:49 -05:00
gtk-theme-name=Arc-Dark
gtk-application-prefer-dark-theme=1
' | sudo tee /etc/gtk-3.0/settings.ini
2022-02-06 15:30:24 -05:00
2022-02-08 02:14:11 -05:00
sudo qubes-dom0-update qubes-u2f-dom0 qubes-yubikey-dom0 qt5ct qt5-qtstyleplugins
2022-02-06 15:37:32 -05:00
qvm-service --enable personal qubes-u2f-proxy
2022-02-06 15:30:24 -05:00
qvm-service --enable work qubes-u2f-proxy
2022-02-08 02:14:11 -05:00
echo "export export QT_QPA_PLATFORMTHEME=gtk2" | sudo tee /etc/environment
2022-05-24 07:10:30 -04:00
#I am using the sys-usb VM for GPG here because I am using a PGP smartcard. You probably shouldn't do this if you store your GPG private key on disk. It **might** be safer to still have a dedicated gpg-backend VM for this, but then you will have to reassign the smartcard to the VM after every boot, which could be annoying.
2022-05-24 07:43:21 -04:00
echo "emails sys-usb allow" > /etc/qubes-rpc/policy/qubes.Gpg
2022-05-24 07:10:47 -04:00
echo "@anyvm @anyvm ask,default_target=sys-usb" >> /etc/qubes-rpc/policy/qubes.Gpg