qubesome
Welcome to qubesome! This project is a command-line interface (CLI) tool aimed
to simplify managing Linux desktop configurations. It works by virtualizing
both the Window Manager and the workloads based on a declarative state from
a git repository.
How can this be useful?
- Test-drive Window Manager configurations without having to commit to them
or needing to impact your existing setup.
- Version control your window manager and workloads.
- Bump configuration and software versions via PRs - and roll them back in
the same way.
- Provide isolation across profiles and workloads (clipboard, network,
storage, etc).
Quick Start
Install
go install https://github.com/qubesome/cli@latest
Start Profile
Start one of the two profiles in the sample-dotfiles (i3 or awesome) repo:
qubesome start -git https://github.com/qubesome/sample-dotfiles <PROFILE>
NOTE: Press Ctrl+Shift to key and mouse grab in and out of
the qubesome profile.
NOTE 2: Each profile has a different display set in qubesome.config,
therefore their clipboards are isolated between themselves and the host.
To transfer clipboards between profiles use qubesome clipboard.
Usage
Check whether dependency requirements are met:
qubesome deps show
Use a local copy, and if not found fallback to a fresh clone:
qubesome start -git https://github.com/qubesome/sample-dotfiles -local <local_git_path> <profile>
Copy clipboard from the host to the i3 profile:
qubesome clipboard --from-host i3
Available Commands
qubesome start: Start a qubesome environment for a given profile.
qubesome run: Run qubesome workloads.
qubesome clipboard: Manage the images within your workloads.
qubesome images: Manage the images within your workloads.
qubesome xdg: Handle xdg-open based via qubesome.
For more information on each command, run qubesome <command> --help.
Requirements
Minimum
Qubesome requires docker, xhost and xrandr installed on a machine
running Xorg:
sudo zypper install -y docker xhost xrandr
By default, docker run its daemon as root. For it to have access to a given
user's X11, xhost must be installed and the user needs to provide local
access to their X session to root:
xhost +local:root
GPU pass-through
To enable GPU workloads (e.g. to enable meetups with background filters),
install NVidia's container-toolkit.
And make sure that NVIDIA drivers are installed correctly.
For Tumbleweed users, that may look like this:
zypper install openSUSE-repos-Tumbleweed-NVIDIA
zypper install-new-recommends --repo NVIDIA
FAQ
Does it provide any sort of isolation across profiles?
This largely depends on the configuration, but overall the main supported runner
is based on docker, which comes the limitations of container-level isolation.
But here are a few highlights:
Xorg instance isolation
Each Qubesome profile can be executed on its own Xorg display, which
translates into Clipboard isolation across workloads across different
profiles.
Host Access
Each profile can define host access (e.g. device, network, dbus) allowed for
its workloads. For example, having a Work profile and a Personal profile, it
is possible to limit what parts of the disk (or external storage) can be mounted
to each.
Per-workload Network Access (Experimental)
Ability to control network/internet access for each workload, and run the window
manager without internet access. Auditing access violations, for visibility of when
workloads are trying to access things they should not.
Is Rootless docker support?
Not at this point, potentially this could be introduced in the future.
License
This project is licensed under the Apache 2.0 License. Refer to the LICENSE
file for more information.