From c3aea61e286b6b7e334357a730792e4a04186648 Mon Sep 17 00:00:00 2001 From: Fabrizio Romano Genovese Date: Sat, 6 Jan 2018 01:54:15 +0000 Subject: [PATCH 1/3] Update fedora-minimal.md Information regarding fedora-26-minimal template and customization in Qubes 4.0 added. --- managing-os/templates/fedora-minimal.md | 27 +++++++++++++++++++++---- 1 file changed, 23 insertions(+), 4 deletions(-) diff --git a/managing-os/templates/fedora-minimal.md b/managing-os/templates/fedora-minimal.md index be9185a2..c3eda07c 100644 --- a/managing-os/templates/fedora-minimal.md +++ b/managing-os/templates/fedora-minimal.md @@ -52,7 +52,7 @@ The following table provides an overview of which packages are needed for which As expected, the required packages are to be installed in the running template with the following command. Replace "packages` with a space-delimited list of packages to be installed. ~~~ -[user@your-new-clone ~]$ sudo dnf install packages +[user@your-new-clone ~]$ sudo dnf --enablerepo=qubes-vm-*-current-testing install packages ~~~ Use case | Description | Required steps @@ -65,11 +65,30 @@ Use case | Description | Required steps **USB** | If you want USB input forwarding to use this template as the basis for a [USB](/doc/usb/) qube such as `sys-usb` | Install `qubes-input-proxy-sender` **VPN** | You can use this template as basis for a [VPN](/doc/vpn/) qube | Use the `dnf search "NetworkManager VPN plugin"` command to look up the VPN packages you need, based on the VPN technology you'll be using, and install them. Some GNOME related packages may be needed as well. After creation of a machine based on this template, follow the [VPN howto](/doc/vpn/#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager) to configure it. **DVM Template** | If you want to use this VM as a [DVM Template](/doc/glossary/#dvm-template) | Install `perl-Encode` - - - + A comprehensive guide to customizing the minimal template is available [here][GUIDE] +Qubes 4.0, fedora-26 +------ +In Qubes4.0 the `fedora-26-minimal` template is available and can be installed issuing the following command: + +~~~ +[user@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-25-minimal +~~~ + +This template is slightly bigger (~600MB). All the suggestions made in the previous section apply. In addiction to this, in many situations packages from the qubes-core-agent suite will be needed to make the customized minimal template to work properly. These packages are: + +- `qubes-core-agent-passwordless-root`, `polkit`: By default the 'fedora-26-minimal' template doesn't have passwordless root. These two packages fix the situation. +- `qubes-core-agent-nautilus`: This package provides integration with the Nautilus file manager (without it things like "copy to VM/open in disposable VM" will not be shown in Nautilus). +- `qubes-core-agent-qrexec`: Qubes qrexec agent. +- `qubes-core-agent-systemd`: Qubes unit files for SystemD init style. +- `qubes-core-agent-sysvinit`: Qubes unit files for SysV init style or upstart. +- `qubes-core-agent-networking`: Networking support. Useful if the template has to be used for a `sys-net` VM. +- `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template has to be used for a `sys-net` VM. +- `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM respondible for 'dom0' updates is based on must contain this package. + + + Logging ------- From f8549d43ee3d1a145eb02d04e9072ddfe323b312 Mon Sep 17 00:00:00 2001 From: Fabrizio Romano Genovese Date: Mon, 8 Jan 2018 18:53:43 +0000 Subject: [PATCH 2/3] Update fedora-minimal.md Changes implemented. --- managing-os/templates/fedora-minimal.md | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/managing-os/templates/fedora-minimal.md b/managing-os/templates/fedora-minimal.md index c3eda07c..1041b68a 100644 --- a/managing-os/templates/fedora-minimal.md +++ b/managing-os/templates/fedora-minimal.md @@ -52,7 +52,7 @@ The following table provides an overview of which packages are needed for which As expected, the required packages are to be installed in the running template with the following command. Replace "packages` with a space-delimited list of packages to be installed. ~~~ -[user@your-new-clone ~]$ sudo dnf --enablerepo=qubes-vm-*-current-testing install packages +[user@your-new-clone ~]$ sudo dnf install packages ~~~ Use case | Description | Required steps @@ -73,20 +73,21 @@ Qubes 4.0, fedora-26 In Qubes4.0 the `fedora-26-minimal` template is available and can be installed issuing the following command: ~~~ -[user@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-25-minimal +[user@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-26-minimal ~~~ This template is slightly bigger (~600MB). All the suggestions made in the previous section apply. In addiction to this, in many situations packages from the qubes-core-agent suite will be needed to make the customized minimal template to work properly. These packages are: + +- `qubes-core-agent-qrexec`: Qubes qrexec agent. Installed by default. +- `qubes-core-agent-systemd`: Qubes unit files for SystemD init style. Installed by default. - `qubes-core-agent-passwordless-root`, `polkit`: By default the 'fedora-26-minimal' template doesn't have passwordless root. These two packages fix the situation. - `qubes-core-agent-nautilus`: This package provides integration with the Nautilus file manager (without it things like "copy to VM/open in disposable VM" will not be shown in Nautilus). -- `qubes-core-agent-qrexec`: Qubes qrexec agent. -- `qubes-core-agent-systemd`: Qubes unit files for SystemD init style. - `qubes-core-agent-sysvinit`: Qubes unit files for SysV init style or upstart. - `qubes-core-agent-networking`: Networking support. Useful if the template has to be used for a `sys-net` VM. - `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template has to be used for a `sys-net` VM. - `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM respondible for 'dom0' updates is based on must contain this package. - +- `pulseaudio-qubes`: Needed to have audio on the template VM. Logging From b26fe7b8ce0410b5710717508cfa6f9fa355445f Mon Sep 17 00:00:00 2001 From: Andrew David Wong Date: Mon, 8 Jan 2018 22:29:42 -0600 Subject: [PATCH 3/3] Clean up and deduplicate content from Qubes 4.0 section --- managing-os/templates/fedora-minimal.md | 11 +++-------- 1 file changed, 3 insertions(+), 8 deletions(-) diff --git a/managing-os/templates/fedora-minimal.md b/managing-os/templates/fedora-minimal.md index 84675ecf..b8792323 100644 --- a/managing-os/templates/fedora-minimal.md +++ b/managing-os/templates/fedora-minimal.md @@ -74,16 +74,11 @@ Use case | Description | Required steps A comprehensive guide to customizing the minimal template is available [here][GUIDE] -Qubes 4.0, fedora-26 ------- -In Qubes4.0 the `fedora-26-minimal` template is available and can be installed issuing the following command: -~~~ -[user@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-26-minimal -~~~ - -This template is slightly bigger (~600MB). All the suggestions made in the previous section apply. In addiction to this, in many situations packages from the qubes-core-agent suite will be needed to make the customized minimal template to work properly. These packages are: +Qubes 4.0 +--------- +In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be needed to make the customized minimal template work properly. These packages are: - `qubes-core-agent-qrexec`: Qubes qrexec agent. Installed by default. - `qubes-core-agent-systemd`: Qubes unit files for SystemD init style. Installed by default.