@@ -55,15 +55,31 @@ service:
55
55
file.managed :
56
56
- contents : " TARGET_DOMAIN=sys-gui-gpu"
57
57
58
+ {% if salt['pillar.get']('qvm:sys-usb:mouse-action', 'ask') == 'ask' %}
59
+ {% set mouse_action = 'ask user=root default_target=sys-gui-gpu' %}
60
+ {% elif salt['pillar.get']('qvm:sys-usb:mouse-action', 'ask') == 'allow' %}
61
+ {% set mouse_action = 'allow user=root target=sys-gui-gpu' %}
62
+ {% else %}
63
+ {% set mouse_action = 'deny' %}
64
+ {% endif %}
65
+
66
+ {% if salt['pillar.get']('qvm:sys-usb:keyboard-action', 'deny') == 'ask' %}
67
+ {% set keyboard_action = 'ask user=root default_target=sys-gui-gpu' %}
68
+ {% elif salt['pillar.get']('qvm:sys-usb:keyboard-action', 'deny') == 'allow' %}
69
+ {% set keyboard_action = 'allow user=root target=sys-gui-gpu' %}
70
+ {% else %}
71
+ {% set keyboard_action = 'deny' %}
72
+ {% endif %}
73
+
58
74
# Setup Qubes RPC policy for sys-usb to sys-gui-gpu
59
75
sys-usb-input-proxy :
60
76
file.managed :
61
77
- name : /etc/qubes/policy.d/45-sys-gui-gpu.policy
62
- {% if salt['pillar.get']('qvm:sys-usb:mouse-action', 'ask') == 'ask' %}
63
- - text : qubes.InputMouse * {{ salt['pillar.get']('qvm:sys-usb:name', 'sys-usb') }} dom0 ask user=root default_target=sys-gui-gpu
64
- {% elif salt['pillar.get']('qvm:sys-usb:mouse-action ', 'ask ') == 'allow' % }
65
- - text : qubes.InputMouse * {{ salt['pillar.get']('qvm:sys-usb:name', 'sys-usb') }} dom0 allow user=root target=sys-gui-gpu
66
- {% endif %}
78
+ - contents : |
79
+ qubes.InputMouse * {{ salt['pillar.get']('qvm:sys-usb:name', 'sys-usb') }} dom0 {{ mouse_action }}
80
+ qubes.InputKeyboard * {{ salt['pillar.get']('qvm:sys-usb:name ', 'sys-usb ') }} dom0 {{ keyboard_action } }
81
+ # not configurable by this state
82
+ qubes.InputTablet * {{ salt['pillar.get']('qvm:sys-usb:name', 'sys-usb') }} dom0 deny
67
83
68
84
{{ load(defaults) }}
69
85
{{ gui_common(defaults.name) }}
0 commit comments