mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Add qubes-vm-update and new CLI update recommendation
QubesOS/qubes-issues#7443
This commit is contained in:
parent
427acfb8a5
commit
4a14fb0f67
@ -16,6 +16,7 @@ permalink: /doc/releases/4.2/release-notes/
|
|||||||
- Qubes Global Settings ([#6898](https://github.com/QubesOS/qubes-issues/issues/6898))
|
- Qubes Global Settings ([#6898](https://github.com/QubesOS/qubes-issues/issues/6898))
|
||||||
- Create New Qube
|
- Create New Qube
|
||||||
- Qubes Update ([#7443](https://github.com/QubesOS/qubes-issues/issues/7443))
|
- Qubes Update ([#7443](https://github.com/QubesOS/qubes-issues/issues/7443))
|
||||||
|
- New `qubes-vm-update` tool ([#7443](https://github.com/QubesOS/qubes-issues/issues/7443))
|
||||||
- Unified `grub.cfg` location for both UEFI and legacy boot ([#7985](https://github.com/QubesOS/qubes-issues/issues/7985))
|
- Unified `grub.cfg` location for both UEFI and legacy boot ([#7985](https://github.com/QubesOS/qubes-issues/issues/7985))
|
||||||
- PipeWire support ([#6358](https://github.com/QubesOS/qubes-issues/issues/6358))
|
- PipeWire support ([#6358](https://github.com/QubesOS/qubes-issues/issues/6358))
|
||||||
- fwupd integration for firmware updates ([#4855](https://github.com/QubesOS/qubes-issues/issues/4855))
|
- fwupd integration for firmware updates ([#4855](https://github.com/QubesOS/qubes-issues/issues/4855))
|
||||||
@ -68,6 +69,8 @@ We strongly recommend [updating Qubes OS](/doc/how-to-update/) immediately after
|
|||||||
|
|
||||||
For more information, see [RPC policies](/doc/rpc-policy/) and [Qube configuration interface](/doc/vm-interface/#qubes-rpc).
|
For more information, see [RPC policies](/doc/rpc-policy/) and [Qube configuration interface](/doc/vm-interface/#qubes-rpc).
|
||||||
|
|
||||||
|
- Beginning with Qubes 4.2, the recommended way to update Qubes OS via the command line has changed. Salt is no longer the preferred method, though it is still supported. Instead, `qubes-dom0-update` is recommended for updating dom0, and `qubes-vm-update` is recommended for updating templates and standalones. (The recommended way to update via the GUI has not changed. The Qubes Update tool is still the preferred method.) For more information, see [How to update](/doc/how-to-update/).
|
||||||
|
|
||||||
## Download
|
## Download
|
||||||
|
|
||||||
All Qubes ISOs and associated [verification files](/security/verifying-signatures/) are available on the [downloads](/downloads/) page.
|
All Qubes ISOs and associated [verification files](/security/verifying-signatures/) are available on the [downloads](/downloads/) page.
|
||||||
|
Loading…
Reference in New Issue
Block a user