mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-11 23:39:38 -05:00
Use long keyID in key upload instructions for code signing
This commit is contained in:
commit
34e7e64a89
@ -65,7 +65,9 @@ Currently, [these](https://github.com/marmarek/signature-checker/blob/master/che
|
|||||||
|
|
||||||
In the example below, we will use `keyserver.ubuntu.com`.
|
In the example below, we will use `keyserver.ubuntu.com`.
|
||||||
|
|
||||||
Replace 6E2F4E7AF50A5827 with your key ID, which is the last 16 hex digits of the long number in the second line of the output above:
|
Replace 6E2F4E7AF50A5827 with your key ID, preferably the **long keyID**
|
||||||
|
which is the last 16 hex digits of the long number in the second line
|
||||||
|
of the output above:
|
||||||
```
|
```
|
||||||
pub rsa3072 2021-12-30 [SC] [expires: 2023-12-30]
|
pub rsa3072 2021-12-30 [SC] [expires: 2023-12-30]
|
||||||
87975838063F97A968D503266E2F4E7AF50A5827
|
87975838063F97A968D503266E2F4E7AF50A5827
|
||||||
@ -76,11 +78,6 @@ $ gpg --send-keys --keyserver hkps://keyserver.ubuntu.com 6E2F4E7AF50A5827
|
|||||||
gpg: sending key 6E2F4E7AF50A5827 to hkps://keyserver.ubuntu.com
|
gpg: sending key 6E2F4E7AF50A5827 to hkps://keyserver.ubuntu.com
|
||||||
```
|
```
|
||||||
|
|
||||||
```
|
|
||||||
$ gpg --send-keys --keyserver hkps://keyserver.ubuntu.com 6E2F4E7AF50A5827
|
|
||||||
gpg: sending key 6E2F4E7AF50A5827 to hkps://keyserver.ubuntu.com
|
|
||||||
```
|
|
||||||
|
|
||||||
## Using PGP with Git
|
## Using PGP with Git
|
||||||
|
|
||||||
If you're submitting a patch via GitHub (or a similar Git server), please sign
|
If you're submitting a patch via GitHub (or a similar Git server), please sign
|
||||||
|
@ -56,14 +56,21 @@ You can create a standalone in the Qube Manager by selecting the "Type" of
|
|||||||
"Standalone qube copied from a template" or "Empty standalone qube (install
|
"Standalone qube copied from a template" or "Empty standalone qube (install
|
||||||
your own OS)."
|
your own OS)."
|
||||||
|
|
||||||
Alternatively, from the dom0 command line:
|
Alternatively, to create an empty standalone from the dom0 command line:
|
||||||
|
|
||||||
```
|
```
|
||||||
qvm-create --class StandaloneVM --label <YOUR_COLOR> --property virt_mode=hvm <NEW_STANDALONE_NAME>
|
qvm-create --class StandaloneVM --label <YOUR_COLOR> --property virt_mode=hvm <NEW_STANDALONE_NAME>
|
||||||
```
|
```
|
||||||
|
|
||||||
(Note: Technically, `virt_mode=hvm` is not necessary for every standalone.
|
Or to create a standalone copied from a template:
|
||||||
However, it makes sense if you want to use a kernel from within the qube.)
|
```
|
||||||
|
qvm-create --class StandaloneVM --label <YOUR_COLOR> --property virt_mode=hvm --template <TEMPLATE_QUBE_NAME> <NEW_STANDALONE_NAME>
|
||||||
|
```
|
||||||
|
|
||||||
|
Notes:
|
||||||
|
- Technically, `virt_mode=hvm` is not necessary for every standalone.
|
||||||
|
However, it is needed if you want to use a kernel from within the qube.
|
||||||
|
- If you want to make software installed in a template available in your standalone, pass in the name of the template using the `--template` option.
|
||||||
|
|
||||||
## Updating standalones
|
## Updating standalones
|
||||||
|
|
||||||
|
@ -144,7 +144,7 @@ list of packages to be installed):
|
|||||||
(which is normally `sys-firewall`).
|
(which is normally `sys-firewall`).
|
||||||
- NetVM, such as the template for `sys-net`: `qubes-core-agent-networking`
|
- NetVM, such as the template for `sys-net`: `qubes-core-agent-networking`
|
||||||
`qubes-core-agent-network-manager` `NetworkManager-wifi`
|
`qubes-core-agent-network-manager` `NetworkManager-wifi`
|
||||||
`network-manager-applet` `wireless-tools` `notification-daemon`
|
`network-manager-applet` `notification-daemon`
|
||||||
`gnome-keyring` `polkit` `@hardware-support`. If your network devices need
|
`gnome-keyring` `polkit` `@hardware-support`. If your network devices need
|
||||||
extra packages for the template to work as a network VM, use the `lspci`
|
extra packages for the template to work as a network VM, use the `lspci`
|
||||||
command to identify the devices, then run `dnf search firmware` (replace
|
command to identify the devices, then run `dnf search firmware` (replace
|
||||||
@ -324,7 +324,7 @@ list of packages to be installed):
|
|||||||
if you want to use it as the `UpdateVM` (which is normally `sys-firewall`).
|
if you want to use it as the `UpdateVM` (which is normally `sys-firewall`).
|
||||||
- NetVM, such as the template for `sys-net`: `qubes-core-agent-networking`
|
- NetVM, such as the template for `sys-net`: `qubes-core-agent-networking`
|
||||||
`qubes-core-agent-network-manager` `NetworkManager-wifi`
|
`qubes-core-agent-network-manager` `NetworkManager-wifi`
|
||||||
`network-manager-applet` `wireless-tools` `notification-daemon`
|
`network-manager-applet` `notification-daemon`
|
||||||
`gnome-keyring`. If your network devices need extra packages for a network
|
`gnome-keyring`. If your network devices need extra packages for a network
|
||||||
VM, use the `lspci` command to identify the devices, then find the package
|
VM, use the `lspci` command to identify the devices, then find the package
|
||||||
that provides necessary firnware and install it. If you need utilities for
|
that provides necessary firnware and install it. If you need utilities for
|
||||||
|
Loading…
Reference in New Issue
Block a user