From 1ffd52cd23957c610a5b64c734b8dbec2bd48af0 Mon Sep 17 00:00:00 2001 From: Marek Marczykowski Date: Wed, 18 Jan 2012 12:14:32 +0100 Subject: [PATCH 1/2] vm: enable cups by default --- vm-systemd/qubes-sysinit.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vm-systemd/qubes-sysinit.sh b/vm-systemd/qubes-sysinit.sh index 57cc2a3a..32d9a1a8 100755 --- a/vm-systemd/qubes-sysinit.sh +++ b/vm-systemd/qubes-sysinit.sh @@ -3,7 +3,7 @@ # List of services enabled by default (in case of absence of xenstore entry) DEFAULT_ENABLED_NETVM="network-manager qubes-network" DEFAULT_ENABLED_PROXYVM="meminfo-writer qubes-network qubes-firewall qubes-netwatcher" -DEFAULT_ENABLED_APPVM="meminfo-writer" +DEFAULT_ENABLED_APPVM="meminfo-writer cups" DEFAULT_ENABLED="meminfo-writer" XS_READ=/usr/bin/xenstore-read From 83cde6e841ce0913bdd46fdb4cc5c29833ec0d4f Mon Sep 17 00:00:00 2001 From: Marek Marczykowski Date: Wed, 18 Jan 2012 13:37:31 +0100 Subject: [PATCH 2/2] vm: enable qubes-firewall (#424) --- rpm_spec/core-vm.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rpm_spec/core-vm.spec b/rpm_spec/core-vm.spec index d268e034..1f74497a 100644 --- a/rpm_spec/core-vm.spec +++ b/rpm_spec/core-vm.spec @@ -495,7 +495,7 @@ The Qubes core startup configuration for SystemD init. %post systemd -for srv in qubes-dvm qubes-meminfo-writer qubes-qrexec-agent qubes-sysinit qubes-misc-post qubes-netwatcher qubes-network; do +for srv in qubes-dvm qubes-meminfo-writer qubes-qrexec-agent qubes-sysinit qubes-misc-post qubes-netwatcher qubes-network qubes-firewall; do /bin/systemctl enable $srv.service done