mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-10-01 01:05:51 -04:00
38 lines
2.2 KiB
Bash
38 lines
2.2 KiB
Bash
#!/bin/bash
|
|
# qubes-create-minimal-sys-vms
|
|
# Script to setup sys-net / sys-firewall / sys-usb based on a fedora-26.minimal template
|
|
# See also: https://www.qubes-os.org/doc/templates/fedora-minimal/
|
|
#
|
|
# Disclaimer:
|
|
# all scripts in the Qubes-Community docs have to be treated as alpha or beta status
|
|
# Do not use this scripts if you don't understand what the script is doing in each step
|
|
# If you have questions and comment, feel free to comment (and improve this script)
|
|
#
|
|
# Comments:
|
|
# After this script has been run, you should have a new Template t-sys which can be used as template for your sys-VMs
|
|
# To change the templates: shutdown or kill the sys-vms and then use qvm-prefs to set the new template
|
|
# qvm-kill sys-usb && qvm-prefs --set sys-usb template t-sys
|
|
# qvm-kill sys-firewall && qvm-prefs --set sys-firewall template t-sys
|
|
# qvm-kill sys-net && qvm-prefs --set sys-net template t-sys
|
|
|
|
# Install default minimal template in dom0
|
|
sudo qubes-dom0-update qubes-template-fedora-26-minimal
|
|
|
|
# Clone template to keep the original template
|
|
qvm-clone fedora-26-minimal t-sys
|
|
|
|
# Update all packages in the minimal template
|
|
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf upgrade'"
|
|
|
|
# Install some basic applications, which are helpfull for troubleshooting
|
|
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install gnome-terminal terminus-fonts less vim-minimal nano dejavu-sans-fontsl sudo pciutils psmisc gnome-keyring usbutils'"
|
|
|
|
# Install special Qubes-packages for the sys-vms
|
|
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install qubes-core-agent-qrexec qubes-core-agent-systemd qubes-core-agent-passwordless-root polkit qubes-core-agent-nautilus qubes-core-agent-networking qubes-core-agent-network-manager network-manager-applet notification-daemon qubes-core-agent-dom0-updates qubes-usb-proxy pulseaudio-qubes NetworkManager-wwan NetworkManager NetworkManager-wifi'"
|
|
|
|
# Install USB proxy package from the testing repositories
|
|
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install --enablerepo=qubes-vm-*-current-testing qubes-input-proxy-sender'"
|
|
|
|
# Install Linux Firmware
|
|
qvm-run --auto --user root t-sys "xterm -hold -e 'dnf -y install linux-firmware'"
|