Update documentation on updating Qubes OS

- Warn against using direct commands (in part due to
  QubesOS/qubes-issues#6275).
- Remove duplicate content from dom0 and domU pages. Link to main update
  page instead.
- Add information on command-line equivalents to the Qubes Update tool,
  since many Qubes users prefer to run updates via the command-line.
This commit is contained in:
Andrew David Wong 2021-05-06 06:34:50 -07:00
parent ead482a604
commit 9eea4db0a6
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17
3 changed files with 13 additions and 21 deletions

View File

@ -36,17 +36,7 @@ While we could, in theory, write a custom solution, it would only be effective i
## How to update dom0
In the Qube Manager, simply select dom0 in the VM list, then click the **Update VM system** button (the blue, downward-pointing arrow).
In addition, updating dom0 has been made more convenient: You will be prompted on the desktop whenever new dom0 updates are available and given the choice to run the update with a single click.
Alternatively, command-line tools are available for accomplishing various update-related tasks (some of which are not available via Qubes VM Manager).
In order to update dom0 from the command line, start a console in dom0 and then run one of the following commands:
To check and install updates for dom0 software:
```
$ sudo qubes-dom0-update
```
See [Updating Qubes OS](/doc/updating-qubes-os/).
## How to install a specific package

View File

@ -34,14 +34,7 @@ To permanently install new software in a TemplateVM:
## Updating software in TemplateVMs
The recommended way to update your TemplateVMs is to use the **Qubes Update** tool.
By default, the icon for this tool will appear in your Notification Area when updates are available.
Simply click on it and follow the guided steps.
If you wish to open this tool directly, you can find it in the System Tools area of the Applications menu.
You can also update TemplateVMs individually.
In the Qube Manager, select the desired TemplateVM, then click **Update qube**.
Advanced users can execute the standard update command for that operating system from the command line, e.g. `dnf update` in Fedora and `apt-get update` in Debian.
See [Updating Qubes OS](/doc/updating-qubes-os/).
## Testing repositories

View File

@ -12,6 +12,13 @@ Updating Qubes OS
*This page is about updating your system while staying on the same [supported version of Qubes OS](/doc/supported-versions/#qubes-os).
If you're instead looking to upgrade from your current version of Qubes OS to a newer version, see the [Upgrade Guides](/doc/upgrade/).*
<div class="alert alert-danger" role="alert">
<i class="fa fa-exclamation-triangle"></i>
<b>Warning:</b> Updating with direct commands such as <code>qubes-dom0-update</code>, <code>dnf update</code>, and <code>apt update</code> is <b>not</b> recommended, since these bypasses built-in Qubes OS update security measures.
Instead, we strongly recommend using the <b>Qubes Update</b> tool or its command-line equivalents, as described below.
(By contrast, <a href="/doc/software-update-domu/#installing-software-in-templatevms">installing</a> packages using direct package manager commands is fine.)
</div>
It is very important to keep your Qubes OS system up-to-date to ensure you have the latest [security](/security/) updates, as well as the latest non-security enhancements and bug fixes.
Fully updating your Qubes OS system means updating:
@ -31,8 +38,10 @@ By default, the Qubes Update tool will appear as an icon in the Notification Are
However, you can also start the tool manually by selecting it in the Applications Menu under "System Tools."
Even if no updates have been detected, you can use this tool to check for updates manually at any time by selecting "Enable updates for qubes without known available updates," then selecting all desired items from the list and clicking "Next."
As an alterntaive to the Qubes Update tool, advanced users can update each of the three types of VMs manually.
Visit the pages linked above for details about updating each type.
<div class="alert alert-info" role="alert">
<i class="fa fa-info-circle"></i>
<b>Note:</b> For the command-line equivalents of using the <b>Qubes Update</b> tool, see the Salt formulae <a href="/doc/salt/#updatequbes-dom0"><code>update.qubes-dom0</code></a> and <a href="/doc/salt/#updatequbes-vm"><code>update.qubes-vm</code></a>.
</div>
The final step is to make sure that all of your VMs are running a supported operating system so that they're all receiving upstream security updates.
For example, you might be using a [Fedora TemplateVM](/doc/templates/fedora/).