Merge branch 'patch-7' of https://github.com/mossy-nw/qubes-doc into mossy-nw-patch-7

This commit is contained in:
Andrew David Wong 2018-01-28 13:08:17 -06:00
commit ff244ec75a
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17

View File

@ -72,12 +72,6 @@ In Qubes R4.0, sudo is not installed by default in the minimal template. To upd
[user@dom0 ~]$ qvm-run -u root fedora-26-minimal xterm
~~~
If you would like to skip this step in future, please install the `sudo` package:
~~~
[user@your-new-clone ~]$ dnf install sudo
~~~
In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be needed to make the customized minimal template work properly. These packages are:
- `qubes-core-agent-qrexec`: Qubes qrexec agent. Installed by default.
@ -85,9 +79,11 @@ In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be neede
- `qubes-core-agent-passwordless-root`, `polkit`: By default the 'fedora-26-minimal' template doesn't have passwordless root. These two packages fix the situation.
- `qubes-core-agent-nautilus`: This package provides integration with the Nautilus file manager (without it things like "copy to VM/open in disposable VM" will not be shown in Nautilus).
- `qubes-core-agent-sysvinit`: Qubes unit files for SysV init style or upstart.
- `qubes-core-agent-networking`: Networking support. Useful if the template has to be used for a `sys-net` VM.
- `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template has to be used for a `sys-net` VM.
- `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM respondible for 'dom0' updates is based on must contain this package.
- `qubes-core-agent-networking`: Networking support. Required if the template is to be used for a `sys-net` or `sys-firewall` VM.
- `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template is to be used for a `sys-net` VM.
- `network-manager-applet`: Useful (together with `dejavu-sans-fonts` and `notification-daemon`) to have a system tray icon if the template is to be used for a `sys-net` VM.
- `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM responsible for 'dom0' updates (e.g. `sys-firewall`) is based on must contain this package.
- `qubes-usb-proxy`: Required if the template is to be used for a USB qube (`sys-usb`) or for any destination qube to which USB devices are to be attached (e.g `sys-net` if using USB network adapter).
- `pulseaudio-qubes`: Needed to have audio on the template VM.