Add Wi-Fi requirement to Debian minimal templates

Removed:
- qubes-core-agent-networking: already a dependency of
  qubes-core-agent-network-manager;
Added:
- wpasupplicant: required for Wi-Fi, it is recommended by
  network-manager but is not installed if not installing recommends.
  It is required on Fedora by NetworkManager-wifi and was installed by
  default on Debian Minimal before
  https://github.com/QubesOS/qubes-builder-debian/pull/74;
- gnome-keyring: already recommended on the Fedora section, saves Wi-Fi
  password;
This commit is contained in:
Ben Grande 2023-10-04 21:16:40 +00:00
parent 269a29ff74
commit 09ec281344
No known key found for this signature in database
GPG Key ID: 00C64E14F51F9E56
1 changed files with 8 additions and 6 deletions

View File

@ -240,12 +240,14 @@ list of packages to be installed):
- [FirewallVM](/doc/firewall/), such as the template for `sys-firewall`: at
least `qubes-core-agent-networking`, and also `qubes-core-agent-dom0-updates`
if you want to use it as the `UpdateVM` (which is normally `sys-firewall`).
- NetVM, such as the template for `sys-net`: `qubes-core-agent-networking`
`qubes-core-agent-network-manager`. If your network devices need extra
packages for a network VM, use the `lspci` command to identify the devices,
then find the package that provides necessary firmware and install it. If you
need utilities for debugging and analyzing network connections, install the
following packages: `tcpdump` `telnet` `nmap` `ncat`.
- NetVM, such as the template for `sys-net`: Ethernet requires
`qubes-core-agent-network-manager`, and Wi-Fi requires the previous
package(s) plus `wpasupplicant`, optionally `gnome-keyring` for saving the
Wi-Fi password. If your network devices need extra packages for a network
VM, use the `lspci` command to identify the devices, then find the package
that provides necessary firmware and install it. If you need utilities for
debugging and analyzing network connections, install the following packages:
`tcpdump` `telnet` `nmap` `ncat`.
- [USB qube](/doc/usb-qubes/), such as the template for `sys-usb`:
`qubes-usb-proxy` to provide USB devices to other Qubes and
`qubes-input-proxy-sender` to provide keyboard or mouse input to dom0.