From 0a7a794a8998d21e31b4b284e6c8094c2c166591 Mon Sep 17 00:00:00 2001 From: mossy-nw <34462023+mossy-nw@users.noreply.github.com> Date: Mon, 22 Jan 2018 18:02:52 +0000 Subject: [PATCH 1/3] Update fedora-minimal.md --- managing-os/templates/fedora-minimal.md | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/managing-os/templates/fedora-minimal.md b/managing-os/templates/fedora-minimal.md index 8e725237..9febea4a 100644 --- a/managing-os/templates/fedora-minimal.md +++ b/managing-os/templates/fedora-minimal.md @@ -72,12 +72,6 @@ In Qubes R4.0, sudo is not installed by default in the minimal template. To upd [user@dom0 ~]$ qvm-run -u root fedora-26-minimal xterm ~~~ -If you would like to skip this step in future, please install the `sudo` package: - -~~~ -[user@your-new-clone ~]$ dnf install sudo -~~~ - In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be needed to make the customized minimal template work properly. These packages are: - `qubes-core-agent-qrexec`: Qubes qrexec agent. Installed by default. @@ -87,7 +81,8 @@ In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be neede - `qubes-core-agent-sysvinit`: Qubes unit files for SysV init style or upstart. - `qubes-core-agent-networking`: Networking support. Useful if the template has to be used for a `sys-net` VM. - `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template has to be used for a `sys-net` VM. -- `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM respondible for 'dom0' updates is based on must contain this package. +- `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM responsible for 'dom0' updates (e.g. `sys-firewall`) is based on must contain this package. +- `qubes-usb-proxy`: Required in minimal template for a USB qube (`sys-usb`) as well as in minimal template for any destination domains to which USB devices are to be attached (e.g `sys-net` if using USB network adapter). - `pulseaudio-qubes`: Needed to have audio on the template VM. From bcc9020c41248aefba1291f5b559e1772dc32f18 Mon Sep 17 00:00:00 2001 From: mossy-nw <34462023+mossy-nw@users.noreply.github.com> Date: Mon, 22 Jan 2018 19:24:00 +0000 Subject: [PATCH 2/3] Update fedora-minimal.md some grammar fixes and clarify that `qubes-core-agent-networking` also required for `sys-firewall` VM --- managing-os/templates/fedora-minimal.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/managing-os/templates/fedora-minimal.md b/managing-os/templates/fedora-minimal.md index 9febea4a..39a7c92a 100644 --- a/managing-os/templates/fedora-minimal.md +++ b/managing-os/templates/fedora-minimal.md @@ -79,10 +79,10 @@ In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be neede - `qubes-core-agent-passwordless-root`, `polkit`: By default the 'fedora-26-minimal' template doesn't have passwordless root. These two packages fix the situation. - `qubes-core-agent-nautilus`: This package provides integration with the Nautilus file manager (without it things like "copy to VM/open in disposable VM" will not be shown in Nautilus). - `qubes-core-agent-sysvinit`: Qubes unit files for SysV init style or upstart. -- `qubes-core-agent-networking`: Networking support. Useful if the template has to be used for a `sys-net` VM. -- `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template has to be used for a `sys-net` VM. +- `qubes-core-agent-networking`: Networking support. Required if the template is to be used for a `sys-net` or `sys-firewall` VM. +- `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template is to be used for a `sys-net` VM. - `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM responsible for 'dom0' updates (e.g. `sys-firewall`) is based on must contain this package. -- `qubes-usb-proxy`: Required in minimal template for a USB qube (`sys-usb`) as well as in minimal template for any destination domains to which USB devices are to be attached (e.g `sys-net` if using USB network adapter). +- `qubes-usb-proxy`: Required if the template is to be used for a USB qube (`sys-usb`) or for any destination qube to which USB devices are to be attached (e.g `sys-net` if using USB network adapter). - `pulseaudio-qubes`: Needed to have audio on the template VM. From 6fd6402c73cc292a11e6d881aad1f76505a27734 Mon Sep 17 00:00:00 2001 From: mossy-nw <34462023+mossy-nw@users.noreply.github.com> Date: Mon, 22 Jan 2018 19:38:09 +0000 Subject: [PATCH 3/3] Update fedora-minimal.md added network-manager-applet for system tray icon for minimal sys-net --- managing-os/templates/fedora-minimal.md | 1 + 1 file changed, 1 insertion(+) diff --git a/managing-os/templates/fedora-minimal.md b/managing-os/templates/fedora-minimal.md index 39a7c92a..48528a34 100644 --- a/managing-os/templates/fedora-minimal.md +++ b/managing-os/templates/fedora-minimal.md @@ -81,6 +81,7 @@ In Qubes 4.0, additional packages from the `qubes-core-agent` suite may be neede - `qubes-core-agent-sysvinit`: Qubes unit files for SysV init style or upstart. - `qubes-core-agent-networking`: Networking support. Required if the template is to be used for a `sys-net` or `sys-firewall` VM. - `qubes-core-agent-network-manager`: Integration for NetworkManager. Useful if the template is to be used for a `sys-net` VM. +- `network-manager-applet`: Useful (together with `dejavu-sans-fonts` and `notification-daemon`) to have a system tray icon if the template is to be used for a `sys-net` VM. - `qubes-core-agent-dom0-updates`: Script required to handle `dom0` updates. Any template which the VM responsible for 'dom0' updates (e.g. `sys-firewall`) is based on must contain this package. - `qubes-usb-proxy`: Required if the template is to be used for a USB qube (`sys-usb`) or for any destination qube to which USB devices are to be attached (e.g `sys-net` if using USB network adapter). - `pulseaudio-qubes`: Needed to have audio on the template VM.