From b3476a5ef8ef115db0ff64fddf3be6b8b46f6c7f Mon Sep 17 00:00:00 2001 From: Tommy Date: Tue, 12 Nov 2024 03:48:24 -0700 Subject: [PATCH] Add dom0 config for sudo prompts --- README.md | 2 +- dom0.sh | 5 +++++ 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 408b3d1..5fe248d 100644 --- a/README.md +++ b/README.md @@ -10,7 +10,7 @@ After you are done running those scripts, any other script can be used in a diff If you want to install Flatpak packages, install them inside of an AppVM as a **user Flatpak** and enable the update-user-flatpaks.service as a **user** systemd service for automatic updates. -It is recommended that you follow the docs [here](https://www.qubes-os.org/doc/vm-sudo/#replacing-passwordless-root-access-with-dom0-user-prompt) to make a prompt for root access on non-minimal VMs. dom0.sh already takes care dom dom0 so you only need to worry about the guests. +It is recommended that you follow the docs [here](https://www.qubes-os.org/doc/vm-sudo/#replacing-passwordless-root-access-with-dom0-user-prompt) to make a prompt for root access on non-minimal VMs. dom0.sh already takes care of dom0 so you only need to worry about the guests. ## Laptop Recommendations diff --git a/dom0.sh b/dom0.sh index 84a42b2..85da551 100644 --- a/dom0.sh +++ b/dom0.sh @@ -26,6 +26,11 @@ sudo qubes-dom0-update anti-evil-maid qubes-ctap-dom0 qt5ct qt5-qtstyleplugins sudo sed -i 's/ --pcr 19//' /etc/anti-evil-maid.conf sudo sed -i 's/="/="--pcr 0 --pcr 1 --pcr 2 --pcr 3 --pcr 4 --pcr 10 /' /etc/anti-evil-maid.conf +# Configure sudo prompt for domUs +echo "/usr/bin/echo 1" | sudo tee /etc/qubes-rpc/qubes.VMAuth +echo "@anyvm dom0 ask,default_target=dom0" | sudo tee /etc/qubes-rpc/policy/qubes.VMAuth +sudo chmod +x /etc/qubes-rpc/qubes.VMAuth + # Theming # After a reboot, run qt5ct and set the theme to gtk-2