mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-07-31 18:49:12 -04:00
Move current pages to /en/
subdirectory
This commit is contained in:
parent
f3ee78f223
commit
a91496e9d6
159 changed files with 2 additions and 2 deletions
41
en/managing-os/Templates/Archlinux.md
Normal file
41
en/managing-os/Templates/Archlinux.md
Normal file
|
@ -0,0 +1,41 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Archlinux template
|
||||
permalink: /en/doc/templates/archlinux/
|
||||
redirect_from:
|
||||
- /doc/Templates/Archlinux/
|
||||
- /wiki/Templates/Archlinux/
|
||||
---
|
||||
|
||||
Archlinux template
|
||||
===============
|
||||
|
||||
Archlinux template is one of the templates made by Qubes community. It should
|
||||
be considered experimental as Qubes developers team use mainly Fedora-based VMs
|
||||
to test new features/updates.
|
||||
|
||||
Main maintainer of this template is [Olivier Médoc](mailto:o_medoc@yahoo.fr).
|
||||
He also provides binary updates for the template, which are signed using this
|
||||
key:
|
||||
|
||||
pub 2048R/C1833B9C 2014-03-27 [expires: 2016-03-26]
|
||||
Key fingerprint = D85E E12F 9678 51CC F433 515A 2043 E7AC C183 3B9C
|
||||
uid Olivier MEDOC (Qubes-OS signing key) <o_medoc@yahoo.fr>
|
||||
|
||||
|
||||
Install
|
||||
-------
|
||||
|
||||
Currently we do not ship ready to use binary package. It can be compiled using
|
||||
[this instructions](/en/doc/building-archlinux-template/).
|
||||
|
||||
Olivier provides binary package build by himself, you can get it for:
|
||||
* Qubes R2 [here](https://groups.google.com/d/msgid/qubes-devel/54CE3FB1.3050708%40yahoo.fr).
|
||||
* Qubes R3 [here](https://groups.google.com/d/msg/qubes-users/RI3KQVEEc30/h5nsNw_SHTQJ)
|
||||
|
||||
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
If you want to help in improving the template, feel free to [contribute](/en/doc/contributing/).
|
47
en/managing-os/Templates/Debian.md
Normal file
47
en/managing-os/Templates/Debian.md
Normal file
|
@ -0,0 +1,47 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Debian
|
||||
permalink: /en/doc/templates/debian/
|
||||
redirect_from:
|
||||
- /doc/Templates/Debian/
|
||||
- /wiki/Templates/Debian/
|
||||
---
|
||||
|
||||
Debian template(s)
|
||||
===============
|
||||
|
||||
If you like to use Debian Linux distribution in your AppVMs, you can install one of available Debian templates.
|
||||
|
||||
Updates for this template are provided by ITL and are signed by this key:
|
||||
|
||||
pub 4096R/47FD92FA 2014-07-27
|
||||
Key fingerprint = 2D43 E932 54EE EA7C B31B 6A77 5E58 18AB 47FD 92FA
|
||||
uid Qubes OS Debian Packages Signing Key
|
||||
|
||||
The key is already installed when you install (signed) template package. You
|
||||
can also obtain the key from [git
|
||||
repository](https://github.com/QubesOS/qubes-core-agent-linux/blob/master/misc/qubes-archive-keyring.gpg),
|
||||
which is also integrity-protected using signed git tags.
|
||||
|
||||
Install
|
||||
-------
|
||||
|
||||
It can be installed via the following command:
|
||||
|
||||
Debian 7 (wheezy) - old stable:
|
||||
|
||||
[user@dom0 ~]$ sudo qubes-dom0-update qubes-template-debian-7
|
||||
|
||||
Debian 8 (jessie) - stable:
|
||||
|
||||
[user@dom0 ~]$ sudo qubes-dom0-update qubes-template-debian-8
|
||||
|
||||
Debian 9 (stretch) - testing:
|
||||
|
||||
A prebuilt template is not yet available, but you can build an experimental stretch template from source.
|
||||
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
If you want to help in improving the template, feel free to [contribute](/wiki/ContributingHowto).
|
78
en/managing-os/Templates/FedoraMinimal.md
Normal file
78
en/managing-os/Templates/FedoraMinimal.md
Normal file
|
@ -0,0 +1,78 @@
|
|||
---
|
||||
layout: doc
|
||||
title: FedoraMinimal
|
||||
permalink: /en/doc/templates/fedora-minimal/
|
||||
redirect_from:
|
||||
- /doc/Templates/FedoraMinimal/
|
||||
- /wiki/Templates/FedoraMinimal/
|
||||
---
|
||||
|
||||
Fedora - minimal
|
||||
================
|
||||
|
||||
We have uploaded a new "minimal" template to our templates-itl repo. The template weighs only 150MB and has most of the stuff cut off, except for minimal X and xterm.
|
||||
|
||||
More into in ticket \#828
|
||||
|
||||
Install
|
||||
-------
|
||||
|
||||
It can be installed via the following command:
|
||||
|
||||
~~~
|
||||
[user@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-21-minimal
|
||||
~~~
|
||||
|
||||
Usage
|
||||
-----
|
||||
|
||||
It is a good idea to clone the original template, and make any changes in the new clone instead:
|
||||
|
||||
~~~
|
||||
[user@dom0 ~]$ qvm-clone fedora-21-minimal <your new template name>
|
||||
~~~
|
||||
|
||||
The sudo package is not installed by default, so let's install it:
|
||||
|
||||
~~~
|
||||
[user@F21-Minimal ~]$ su -
|
||||
[user@F21-Minimal ~]$ yum install sudo
|
||||
~~~
|
||||
|
||||
The rsyslog logging service is not installed by default. All logging is now being handled by the systemd journal. Users requiring the rsyslog service should install it manually.
|
||||
|
||||
To access the journald log, use the `journalctl` command.
|
||||
|
||||
### as a NetVM
|
||||
|
||||
If you want to use this template to for standard NetVMs you should install some more packeges:
|
||||
|
||||
~~~
|
||||
[user@F21-Minimal ~]$ sudo yum install NetworkManager NetworkManager-wifi network-manager-applet wireless-tools dbus-x11 dejavu-sans-fonts tar tinyproxy
|
||||
~~~
|
||||
|
||||
And maybe some more optional but useful packages as well:
|
||||
|
||||
~~~
|
||||
[user@F21-Minimal ~]$ sudo yum install pciutils vim-minimal less tcpdump telnet psmisc nmap nmap-ncat gnome-keyring
|
||||
~~~
|
||||
|
||||
If your network device needs some firmware then you should also install the corresponding packages as well. The `lspci; yum search firmware` command will help to choose the right one :)
|
||||
|
||||
### as a ProxyVM
|
||||
|
||||
If you want to use this template as a ProxyVM you may want to install even more packages
|
||||
|
||||
#### Firewall
|
||||
|
||||
This template is ready to use for a standard firewall VM.
|
||||
|
||||
#### VPN
|
||||
|
||||
The needed packages depend on the VPN technology. The `yum search "NetworkManager VPN plugin"` command may help you to choose the right one.
|
||||
|
||||
[More details about setting up a VPN Gateway](/wiki/VPN#ProxyVM)
|
||||
|
||||
#### TOR
|
||||
|
||||
[UserDoc/TorVM](/wiki/UserDoc/TorVM)
|
35
en/managing-os/Templates/Ubuntu.md
Normal file
35
en/managing-os/Templates/Ubuntu.md
Normal file
|
@ -0,0 +1,35 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Ubuntu
|
||||
permalink: /en/doc/templates/ubuntu/
|
||||
redirect_from:
|
||||
- /doc/Templates/Ubuntu/
|
||||
- /wiki/Templates/Ubuntu/
|
||||
---
|
||||
|
||||
Ubuntu template(s)
|
||||
==================
|
||||
|
||||
If you like to use Ubuntu Linux distribution in your AppVMs, you can build and
|
||||
install one of available Ubuntu templates. Those template currently are not
|
||||
available in ready to use binary packages, because Canonical does not allow
|
||||
to redistribute a modified Ubuntu. The redistribution is not allowed by their
|
||||
[Intellectual property rights policy](http://www.ubuntu.com/legal/terms-and-policies/intellectual-property-policy).
|
||||
|
||||
|
||||
Install
|
||||
-------
|
||||
|
||||
It can built using [Qubes Builder](/en/doc/qubes-builder/). You can also access its
|
||||
documentation in the [source code
|
||||
repository](https://github.com/QubesOS/qubes-builder/blob/master/README.md).
|
||||
|
||||
To quickly prepare the builder configuration, you can use `setup` script
|
||||
available in the repository - it will interactively ask you which templates you
|
||||
want to build.
|
||||
|
||||
Known issues
|
||||
------------
|
||||
|
||||
If you want to help in improving the template, feel free to
|
||||
[contribute](/wiki/ContributingHowto).
|
20
en/managing-os/Templates/Whonix.md
Normal file
20
en/managing-os/Templates/Whonix.md
Normal file
|
@ -0,0 +1,20 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Whonix template
|
||||
permalink: /en/doc/templates/whonix/
|
||||
redirect_from:
|
||||
- /doc/Templates/Whonix/
|
||||
- /wiki/Templates/Whonix/
|
||||
---
|
||||
|
||||
Whonix template(s)
|
||||
==================
|
||||
|
||||
Whonix is an operating system focused on anonymity, privacy and security. It's
|
||||
based on the Tor anonymity network, Debian GNU/Linux and security by isolation.
|
||||
Its primary isolation mechanism is VirtualBox, but now it is also possible to
|
||||
run it on top of Qubes OS!
|
||||
|
||||
Whonix template(s) are another Qubes community contribution. Currently Whonix actively maintains those templates.
|
||||
|
||||
More details, including installation instructions on [Whonix Qubes web page](https://www.whonix.org/wiki/Qubes).
|
Loading…
Add table
Add a link
Reference in a new issue