diff --git a/user/templates/minimal-templates.md b/user/templates/minimal-templates.md index d85e8a0d..c80a02c9 100644 --- a/user/templates/minimal-templates.md +++ b/user/templates/minimal-templates.md @@ -55,7 +55,6 @@ Minimal templates of the following distros are available: - Fedora - Debian - - CentOS - Gentoo A list of all available templates can also be obtained with the [Template Manager](/doc/template-manager/) tool. @@ -305,75 +304,3 @@ Documentation on all of these can be found in the [docs](/doc/). You could, of course, use `qubes-vm-recommended` to automatically install many of these, but in that case you are well on the way to a standard Debian template. - -### CentOS - -The following list provides an overview of which packages are needed for which -purpose. As usual, the required packages are to be installed in the running -template with the following command (replace `packages` with a space-delimited -list of packages to be installed): - -``` -[user@your-new-clone ~]$ sudo yum install packages -``` - -- Commonly used utilities: `pciutils` `vim-minimal` `less` `psmisc` - `gnome-keyring` -- Audio: `pulseaudio-qubes`. -- Networking: `qubes-core-agent-networking`, and whatever network tools - you want. N.B. minimal templates do not include any browser. -- [FirewallVM](/doc/firewall/), such as the template for `sys-firewall`: at - least `qubes-core-agent-networking`, and also `qubes-core-agent-dom0-updates` - if you want to use it as the `UpdateVM` (which is normally `sys-firewall`). -- NetVM, such as the template for `sys-net`: `qubes-core-agent-networking` - `qubes-core-agent-network-manager` `NetworkManager-wifi` - `network-manager-applet` `notification-daemon` - `gnome-keyring`. If your network devices need extra packages for a network - VM, use the `lspci` command to identify the devices, then find the package - that provides necessary firnware and install it. If you need utilities for - debugging and analyzing network connections, install the following packages: - `tcpdump` `telnet` `nmap` `nmap-ncat` -- [USB qube](/doc/usb-qubes/), such as the template for `sys-usb`: - `qubes-usb-proxy` to provide USB devices to other Qubes and - `qubes-input-proxy-sender` to provide keyboard or mouse input to dom0. -- [VPN - qube](https://forum.qubes-os.org/t/19061): - You may need to install network-manager VPN packages, depending on the VPN - technology you'll be using. After creating a machine based on this template, - follow the [VPN - howto](https://forum.qubes-os.org/t/19061#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager) - to configure it. -- `default-mgmt-dvm`: requires `qubes-core-agent-passwordless-root` and - `qubes-mgmt-salt-vm-connector`. - -In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be -needed to make the customized minimal template work properly. These packages -are: - -- `qubes-core-agent-nautilus`: This package provides integration with the - Nautilus file manager (without it, items like "copy to VM/open in disposable" - will not be shown in Nautilus). -- `qubes-core-agent-thunar`: This package provides integration with the thunar - file manager (without it, items like "copy to VM/open in disposable" will not - be shown in thunar). -- `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. - Any template on which the qube responsible for 'dom0' updates (e.g. - `sys-firewall`) is based must contain this package. -- `qubes-menus`: Defines menu layout. -- `qubes-desktop-linux-common`: Contains icons and scripts to improve desktop - experience. - -Also, there are packages to provide additional services: - -- `qubes-gpg-split`: For implementing split GPG. -- `qubes-pdf-converter`: For implementing safe conversion of PDFs. -- `qubes-img-converter`: For implementing safe conversion of images. -- `qubes-snapd-helper`: If you want to use snaps in qubes. -- `qubes-mgmt-salt-vm-connector`: If you want to use salt management on the - template and qubes. - -Documentation on all of these can be found in the [docs](/doc/). - -You could, of course, use `qubes-vm-recommended` to automatically install many -of these, but in that case you are well on the way to a standard Debian -template. diff --git a/user/templates/templates.md b/user/templates/templates.md index d12e5585..b363e04d 100644 --- a/user/templates/templates.md +++ b/user/templates/templates.md @@ -78,8 +78,6 @@ developers do not test them. * [Whonix](/doc/templates/whonix/) * [Ubuntu](/doc/templates/ubuntu/) * [Arch Linux](/doc/building-archlinux-template/) -* [CentOS](/doc/templates/centos/) -* [CentOS Minimal](/doc/templates/minimal/) * [Gentoo](/doc/templates/gentoo/) * [Gentoo Minimal](/doc/templates/minimal/) diff --git a/user/templates/xfce-templates.md b/user/templates/xfce-templates.md index 71d9f81b..3fe99de2 100644 --- a/user/templates/xfce-templates.md +++ b/user/templates/xfce-templates.md @@ -13,7 +13,7 @@ title: Xfce templates --- If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your qubes, -you can install one of the available Xfce templates for [Fedora](/doc/templates/fedora/), [Debian](/doc/templates/debian/), [CentOS](/doc/templates/centos/), or [Gentoo](/doc/templates/gentoo/). +you can install one of the available Xfce templates for [Fedora](/doc/templates/fedora/), [Debian](/doc/templates/debian/) or [Gentoo](/doc/templates/gentoo/). ## Installation @@ -30,7 +30,7 @@ You may wish to try again with the testing repository enabled: [user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-itl-testing qubes-template-X-xfce ``` -If you would like to install a community distribution, like CentOS or Gentoo, try the install command by enabling the community repository: +If you would like to install a community distribution such as Gentoo, try the install command by enabling the community repository: ``` [user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-X-xfce