Update fedora-minimal.md

Changes implemented.
This commit is contained in:
Fabrizio Romano Genovese 2018-01-08 18:53:43 +00:00 committed by GitHub
parent c3aea61e28
commit f8549d43ee
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -52,7 +52,7 @@ The following table provides an overview of which packages are needed for which
As expected, the required packages are to be installed in the running template with the following command. Replace "packages` with a space-delimited list of packages to be installed. As expected, the required packages are to be installed in the running template with the following command. Replace "packages` with a space-delimited list of packages to be installed.
~~~ ~~~
[user@your-new-clone ~]$ sudo dnf --enablerepo=qubes-vm-*-current-testing install packages [user@your-new-clone ~]$ sudo dnf install packages
~~~ ~~~
Use case | Description | Required steps Use case | Description | Required steps
@ -73,20 +73,21 @@ Qubes 4.0, fedora-26
In Qubes4.0 the `fedora-26-minimal` template is available and can be installed issuing the following command: In Qubes4.0 the `fedora-26-minimal` template is available and can be installed issuing the following command:
~~~ ~~~
[user@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-25-minimal [user@dom0 ~]$ sudo qubes-dom0-update qubes-template-fedora-26-minimal
~~~ ~~~
This template is slightly bigger (~600MB). All the suggestions made in the previous section apply. In addiction to this, in many situations packages from the qubes-core-agent suite will be needed to make the customized minimal template to work properly. These packages are: This template is slightly bigger (~600MB). All the suggestions made in the previous section apply. In addiction to this, in many situations packages from the qubes-core-agent suite will be needed to make the customized minimal template to work properly. These packages are:
- `qubes-core-agent-qrexec`: Qubes qrexec agent. Installed by default.
- `qubes-core-agent-systemd`: Qubes unit files for SystemD init style. Installed by default.
- `qubes-core-agent-passwordless-root`, `polkit`: By default the 'fedora-26-minimal' template doesn't have passwordless root. These two packages fix the situation. - `qubes-core-agent-passwordless-root`, `polkit`: By default the 'fedora-26-minimal' template doesn't have passwordless root. These two packages fix the situation.
- `qubes-core-agent-nautilus`: This package provides integration with the Nautilus file manager (without it things like "copy to VM/open in disposable VM" will not be shown in Nautilus). - `qubes-core-agent-nautilus`: This package provides integration with the Nautilus file manager (without it things like "copy to VM/open in disposable VM" will not be shown in Nautilus).
- `qubes-core-agent-qrexec`: Qubes qrexec agent.
- `qubes-core-agent-systemd`: Qubes unit files for SystemD init style.
- `qubes-core-agent-sysvinit`: Qubes unit files for SysV init style or upstart. - `qubes-core-agent-sysvinit`: Qubes unit files for SysV init style or upstart.
- `qubes-core-agent-networking`: Networking support. Useful if the template has to be used for a `sys-net` VM. - `qubes-core-agent-networking`: Networking support. Useful if the template has to be used for a `sys-net` VM.
- `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template has to be used for a `sys-net` VM. - `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template has to be used for a `sys-net` VM.
- `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM respondible for 'dom0' updates is based on must contain this package. - `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM respondible for 'dom0' updates is based on must contain this package.
- `pulseaudio-qubes`: Needed to have audio on the template VM.
Logging Logging