-
Notifications
You must be signed in to change notification settings - Fork 10
Open
Labels
T: enhancementNew feature or requestNew feature or request
Description
Commitment
I confirm that I have read the following resources:
- How to contribute to Qusal
- How Qusal is designed
- How to ask questions The Smart Way
- Writing the perfect question
- Question checklist
- Could you please make my preference the default?
Current problem (if any)
The sys-gui.install
state installs the following systems which are really optional to get it working:
- qubes-admin tools, qubes-manager, etc
- I personally want to minimize permissions, capabilities and background processes in my GUIVM(s) and keep systems administration in dom0 or mgmt. GUIVM shouldn't be allowed or trying to do maintenance or operations tasks. Turning GUIVM into admin is a step backwards in this frame.
- Currently something seems really broken if one actually tries to admin from guivm in any case. qrexec policies would need adjusting to make it meaningful. It keeps spuriously starting and not shutting down every template and triggers a flood of qrexec permission errors.
- XFCE Desktop Environment
Proposed solution
- Split out
sys-gui.install-xfce
fromsys-gui.install
- Split out
sys-gui.install-admin
fromsys-gui.install
- Update prefs and docs accordingly
Related:
Metadata
Metadata
Assignees
Labels
T: enhancementNew feature or requestNew feature or request