mirror of
https://github.com/tommytran732/QubesOS-Scripts
synced 2024-11-22 01:41:34 -05:00
Update dom0.sh
This commit is contained in:
parent
9633e02f17
commit
34cf913810
4
dom0.sh
4
dom0.sh
@ -11,3 +11,7 @@ qvm-service --enable personal qubes-u2f-proxy
|
|||||||
qvm-service --enable work qubes-u2f-proxy
|
qvm-service --enable work qubes-u2f-proxy
|
||||||
|
|
||||||
echo "export export QT_QPA_PLATFORMTHEME=gtk2" | sudo tee /etc/environment
|
echo "export export QT_QPA_PLATFORMTHEME=gtk2" | sudo tee /etc/environment
|
||||||
|
|
||||||
|
#I am using the sys-usb VM for GPG here because I am using a PGP smartcard. You probably shouldn't do this if you store your GPG private key on disk. It **might** be safer to still have a dedicated gpg-backend VM for this, but then you will have to reassign the smartcard to the VM after every boot, which could be annoying.
|
||||||
|
echo "emails sys-usb allow" >> /etc/qubes-rpc/policy/qubes.Gpg
|
||||||
|
echo "@anyvm @anyvm ask,default_target=work-gpg" >> /etc/qubes-rpc/policy/qubes.Gpg
|
||||||
|
Loading…
Reference in New Issue
Block a user