mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-06-07 06:22:58 -04:00
Removed outdated CentOS references
This commit is contained in:
parent
3c6c1726e1
commit
4b87eaa04d
3 changed files with 2 additions and 77 deletions
|
@ -55,7 +55,6 @@ Minimal templates of the following distros are available:
|
||||||
|
|
||||||
- Fedora
|
- Fedora
|
||||||
- Debian
|
- Debian
|
||||||
- CentOS
|
|
||||||
- Gentoo
|
- Gentoo
|
||||||
|
|
||||||
A list of all available templates can also be obtained with the [Template Manager](/doc/template-manager/) tool.
|
A list of all available templates can also be obtained with the [Template Manager](/doc/template-manager/) tool.
|
||||||
|
@ -305,75 +304,3 @@ Documentation on all of these can be found in the [docs](/doc/).
|
||||||
You could, of course, use `qubes-vm-recommended` to automatically install many
|
You could, of course, use `qubes-vm-recommended` to automatically install many
|
||||||
of these, but in that case you are well on the way to a standard Debian
|
of these, but in that case you are well on the way to a standard Debian
|
||||||
template.
|
template.
|
||||||
|
|
||||||
### CentOS
|
|
||||||
|
|
||||||
The following list provides an overview of which packages are needed for which
|
|
||||||
purpose. As usual, the required packages are to be installed in the running
|
|
||||||
template with the following command (replace `packages` with a space-delimited
|
|
||||||
list of packages to be installed):
|
|
||||||
|
|
||||||
```
|
|
||||||
[user@your-new-clone ~]$ sudo yum install packages
|
|
||||||
```
|
|
||||||
|
|
||||||
- Commonly used utilities: `pciutils` `vim-minimal` `less` `psmisc`
|
|
||||||
`gnome-keyring`
|
|
||||||
- Audio: `pulseaudio-qubes`.
|
|
||||||
- Networking: `qubes-core-agent-networking`, and whatever network tools
|
|
||||||
you want. N.B. minimal templates do not include any browser.
|
|
||||||
- [FirewallVM](/doc/firewall/), such as the template for `sys-firewall`: at
|
|
||||||
least `qubes-core-agent-networking`, and also `qubes-core-agent-dom0-updates`
|
|
||||||
if you want to use it as the `UpdateVM` (which is normally `sys-firewall`).
|
|
||||||
- NetVM, such as the template for `sys-net`: `qubes-core-agent-networking`
|
|
||||||
`qubes-core-agent-network-manager` `NetworkManager-wifi`
|
|
||||||
`network-manager-applet` `notification-daemon`
|
|
||||||
`gnome-keyring`. If your network devices need extra packages for a network
|
|
||||||
VM, use the `lspci` command to identify the devices, then find the package
|
|
||||||
that provides necessary firnware and install it. If you need utilities for
|
|
||||||
debugging and analyzing network connections, install the following packages:
|
|
||||||
`tcpdump` `telnet` `nmap` `nmap-ncat`
|
|
||||||
- [USB qube](/doc/usb-qubes/), such as the template for `sys-usb`:
|
|
||||||
`qubes-usb-proxy` to provide USB devices to other Qubes and
|
|
||||||
`qubes-input-proxy-sender` to provide keyboard or mouse input to dom0.
|
|
||||||
- [VPN
|
|
||||||
qube](https://forum.qubes-os.org/t/19061):
|
|
||||||
You may need to install network-manager VPN packages, depending on the VPN
|
|
||||||
technology you'll be using. After creating a machine based on this template,
|
|
||||||
follow the [VPN
|
|
||||||
howto](https://forum.qubes-os.org/t/19061#set-up-a-proxyvm-as-a-vpn-gateway-using-networkmanager)
|
|
||||||
to configure it.
|
|
||||||
- `default-mgmt-dvm`: requires `qubes-core-agent-passwordless-root` and
|
|
||||||
`qubes-mgmt-salt-vm-connector`.
|
|
||||||
|
|
||||||
In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be
|
|
||||||
needed to make the customized minimal template work properly. These packages
|
|
||||||
are:
|
|
||||||
|
|
||||||
- `qubes-core-agent-nautilus`: This package provides integration with the
|
|
||||||
Nautilus file manager (without it, items like "copy to VM/open in disposable"
|
|
||||||
will not be shown in Nautilus).
|
|
||||||
- `qubes-core-agent-thunar`: This package provides integration with the thunar
|
|
||||||
file manager (without it, items like "copy to VM/open in disposable" will not
|
|
||||||
be shown in thunar).
|
|
||||||
- `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates.
|
|
||||||
Any template on which the qube responsible for 'dom0' updates (e.g.
|
|
||||||
`sys-firewall`) is based must contain this package.
|
|
||||||
- `qubes-menus`: Defines menu layout.
|
|
||||||
- `qubes-desktop-linux-common`: Contains icons and scripts to improve desktop
|
|
||||||
experience.
|
|
||||||
|
|
||||||
Also, there are packages to provide additional services:
|
|
||||||
|
|
||||||
- `qubes-gpg-split`: For implementing split GPG.
|
|
||||||
- `qubes-pdf-converter`: For implementing safe conversion of PDFs.
|
|
||||||
- `qubes-img-converter`: For implementing safe conversion of images.
|
|
||||||
- `qubes-snapd-helper`: If you want to use snaps in qubes.
|
|
||||||
- `qubes-mgmt-salt-vm-connector`: If you want to use salt management on the
|
|
||||||
template and qubes.
|
|
||||||
|
|
||||||
Documentation on all of these can be found in the [docs](/doc/).
|
|
||||||
|
|
||||||
You could, of course, use `qubes-vm-recommended` to automatically install many
|
|
||||||
of these, but in that case you are well on the way to a standard Debian
|
|
||||||
template.
|
|
||||||
|
|
|
@ -78,8 +78,6 @@ developers do not test them.
|
||||||
* [Whonix](/doc/templates/whonix/)
|
* [Whonix](/doc/templates/whonix/)
|
||||||
* [Ubuntu](/doc/templates/ubuntu/)
|
* [Ubuntu](/doc/templates/ubuntu/)
|
||||||
* [Arch Linux](/doc/building-archlinux-template/)
|
* [Arch Linux](/doc/building-archlinux-template/)
|
||||||
* [CentOS](/doc/templates/centos/)
|
|
||||||
* [CentOS Minimal](/doc/templates/minimal/)
|
|
||||||
* [Gentoo](/doc/templates/gentoo/)
|
* [Gentoo](/doc/templates/gentoo/)
|
||||||
* [Gentoo Minimal](/doc/templates/minimal/)
|
* [Gentoo Minimal](/doc/templates/minimal/)
|
||||||
|
|
||||||
|
|
|
@ -13,7 +13,7 @@ title: Xfce templates
|
||||||
---
|
---
|
||||||
|
|
||||||
If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your qubes,
|
If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your qubes,
|
||||||
you can install one of the available Xfce templates for [Fedora](/doc/templates/fedora/), [Debian](/doc/templates/debian/), [CentOS](/doc/templates/centos/), or [Gentoo](/doc/templates/gentoo/).
|
you can install one of the available Xfce templates for [Fedora](/doc/templates/fedora/), [Debian](/doc/templates/debian/) or [Gentoo](/doc/templates/gentoo/).
|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
|
@ -30,7 +30,7 @@ You may wish to try again with the testing repository enabled:
|
||||||
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-itl-testing qubes-template-X-xfce
|
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-itl-testing qubes-template-X-xfce
|
||||||
```
|
```
|
||||||
|
|
||||||
If you would like to install a community distribution, like CentOS or Gentoo, try the install command by enabling the community repository:
|
If you would like to install a community distribution such as Gentoo, try the install command by enabling the community repository:
|
||||||
|
|
||||||
```
|
```
|
||||||
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-X-xfce
|
[user@dom0 ~]$ sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-X-xfce
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue