mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-02-17 21:34:17 -05:00
Fix shell_session markup
This commit is contained in:
parent
7fb7f9bbe4
commit
f11175323b
@ -9,8 +9,7 @@ When removing any packages from a default TemplateVM, be sure to check what's be
|
|||||||
When removing certain packages, for instance Thunderbird, `apt` and `dnf` will attempt to remove many packages required by qubes for the template to function correctly under qubes.
|
When removing certain packages, for instance Thunderbird, `apt` and `dnf` will attempt to remove many packages required by qubes for the template to function correctly under qubes.
|
||||||
|
|
||||||
As an example from a terminal in a TemplateVM:
|
As an example from a terminal in a TemplateVM:
|
||||||
```
|
```shell_session
|
||||||
shell_session
|
|
||||||
$ sudo apt remove thunderbird
|
$ sudo apt remove thunderbird
|
||||||
Reading package lists... Done
|
Reading package lists... Done
|
||||||
Building dependency tree
|
Building dependency tree
|
||||||
@ -49,34 +48,46 @@ If you'd still like to remove one of these applications without breaking your Te
|
|||||||
1. In your TemplateVM terminal run:
|
1. In your TemplateVM terminal run:
|
||||||
```shell_session $ apt remove package-name```
|
```shell_session $ apt remove package-name```
|
||||||
Note the packages "no longer required"
|
Note the packages "no longer required"
|
||||||
2. If the list of "no longer required" packages includes anything beginning with `qubes-` or `salt-` make a note to yourself to **never** run `shell_session $ sudo apt autoremove` on this TemplateVM
|
2. If the list of "no longer required" packages includes anything beginning with `qubes-` or `salt-` make a note to yourself to **never** run `$ sudo apt autoremove` on this TemplateVM
|
||||||
|
|
||||||
**Recommended but optional:** Use `apt-mark` to make `apt autoremove` safe again.
|
**Recommended but optional:** Use `apt-mark` to make `apt autoremove` safe again.
|
||||||
```shell_session $ sudo apt mark-manual package-name package-name```
|
```shell_session
|
||||||
|
$ sudo apt mark-manual package-name package-name
|
||||||
|
```
|
||||||
|
|
||||||
Replace package-names with actual `qubes-*` and `salt-*` packages you'd like to retain.
|
Replace package-names with actual `qubes-*` and `salt-*` packages you'd like to retain.
|
||||||
|
|
||||||
For example, still in your TemplateVM terminal:
|
For example, still in your TemplateVM terminal:
|
||||||
```shell_session $ sudo apt-mark manual qubes-core-agent-dom0-updates qubes-core-agent-passwordless-root qubes-gpg-split qubes-img-converter qubes-input-proxy-sender qubes-mgmt-salt-vm-connector qubes-pdf-converter salt-common salt-ssh qubes-usb-proxy```
|
```shell_session
|
||||||
|
$ sudo apt-mark manual qubes-core-agent-dom0-updates qubes-core-agent-passwordless-root qubes-gpg-split qubes-img-converter qubes-input-proxy-sender qubes-mgmt-salt-vm-connector qubes-pdf-converter salt-common salt-ssh qubes-usb-proxy
|
||||||
|
```
|
||||||
|
|
||||||
`shell_session $ apt autoremove` should now be safe to use.
|
`$ apt autoremove` should now be safe to use.
|
||||||
|
|
||||||
### Fedora
|
### Fedora
|
||||||
In your TemplateVM terminal, run:
|
In your TemplateVM terminal, run:
|
||||||
```shell_session $ dnf remove --noautoremove package-name```
|
```shell_session
|
||||||
|
$ dnf remove --noautoremove package-name
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
## Recovering A TemplateVM which you've already removed needed qubes-* packages
|
## Recovering A TemplateVM which you've already removed needed qubes-* packages
|
||||||
If you've already removed packages, run `apt autoremove` and restarted your VM you've lost passwordless sudo access.
|
If you've already removed packages, run `apt autoremove` and restarted your VM you've lost passwordless sudo access.
|
||||||
You can login as root, open a terminal in dom0 and run:
|
You can login as root, open a terminal in dom0 and run:
|
||||||
```shell_session $ qvm-run -u root vmname xterm```
|
```shell_session
|
||||||
|
$ qvm-run -u root vmname xterm
|
||||||
|
```
|
||||||
This will open an xterm terminal in the TemplateVM named `vmname`
|
This will open an xterm terminal in the TemplateVM named `vmname`
|
||||||
|
|
||||||
Once you're logged in as root, reinstall these packages & their dependencies:
|
Once you're logged in as root, reinstall these packages & their dependencies:
|
||||||
|
|
||||||
### Debian
|
### Debian
|
||||||
```shell_session $ sudo apt install qubes-core-agent-dom0-updates qubes-core-agent-passwordless-root qubes-gpg-split qubes-img-converter qubes-input-proxy-sender qubes-mgmt-salt-vm-connector qubes-pdf-converter salt-common salt-ssh```
|
```shell_session
|
||||||
|
$ sudo apt install qubes-core-agent-dom0-updates qubes-core-agent-passwordless-root qubes-gpg-split qubes-img-converter qubes-input-proxy-sender qubes-mgmt-salt-vm-connector qubes-pdf-converter salt-common salt-ssh
|
||||||
|
```
|
||||||
|
|
||||||
### Fedora
|
### Fedora
|
||||||
Similar to Debian for example (package names may vary):
|
Similar to Debian for example (package names may vary):
|
||||||
```shell_session $ sudo dnf install qubes-core-agent-dom0-updates qubes-core-agent-passwordless-root qubes-gpg-split qubes-img-converter qubes-input-proxy-sender qubes-mgmt-salt-vm-connector qubes-pdf-converter salt-common salt-ssh```
|
```shell_session
|
||||||
|
$ sudo dnf install qubes-core-agent-dom0-updates qubes-core-agent-passwordless-root qubes-gpg-split qubes-img-converter qubes-input-proxy-sender qubes-mgmt-salt-vm-connector qubes-pdf-converter salt-common salt-ssh
|
||||||
|
```
|
||||||
|
Loading…
x
Reference in New Issue
Block a user