From 1ca4a280bccec2acee478d4b426742c11b75a14c Mon Sep 17 00:00:00 2001 From: Marek Marczykowski Date: Wed, 18 Jan 2012 12:14:32 +0100 Subject: [PATCH 1/2] vm: enable cups by default --- vm-systemd/qubes-sysinit.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vm-systemd/qubes-sysinit.sh b/vm-systemd/qubes-sysinit.sh index 57cc2a3..32d9a1a 100755 --- a/vm-systemd/qubes-sysinit.sh +++ b/vm-systemd/qubes-sysinit.sh @@ -3,7 +3,7 @@ # List of services enabled by default (in case of absence of xenstore entry) DEFAULT_ENABLED_NETVM="network-manager qubes-network" DEFAULT_ENABLED_PROXYVM="meminfo-writer qubes-network qubes-firewall qubes-netwatcher" -DEFAULT_ENABLED_APPVM="meminfo-writer" +DEFAULT_ENABLED_APPVM="meminfo-writer cups" DEFAULT_ENABLED="meminfo-writer" XS_READ=/usr/bin/xenstore-read From 1a71d29cd495bc657d71834180f91e3223bdf88a Mon Sep 17 00:00:00 2001 From: Marek Marczykowski Date: Wed, 18 Jan 2012 13:37:31 +0100 Subject: [PATCH 2/2] vm: enable qubes-firewall (#424) --- rpm_spec/core-vm.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rpm_spec/core-vm.spec b/rpm_spec/core-vm.spec index d268e03..1f74497 100644 --- a/rpm_spec/core-vm.spec +++ b/rpm_spec/core-vm.spec @@ -495,7 +495,7 @@ The Qubes core startup configuration for SystemD init. %post systemd -for srv in qubes-dvm qubes-meminfo-writer qubes-qrexec-agent qubes-sysinit qubes-misc-post qubes-netwatcher qubes-network; do +for srv in qubes-dvm qubes-meminfo-writer qubes-qrexec-agent qubes-sysinit qubes-misc-post qubes-netwatcher qubes-network qubes-firewall; do /bin/systemctl enable $srv.service done