Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

provide GUI mechanism (Qubes Manager, Settings, etc) for enabling USB keyboard #2329

Closed
mfc opened this issue Sep 20, 2016 · 3 comments
Closed
Labels
C: manager/widget P: minor Priority: minor. The lowest priority, below "default." T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. ux User experience

Comments

@mfc
Copy link
Member

mfc commented Sep 20, 2016

I couldn't find a ticket tracking this. The options available to the user for enabling USB keyboard should be available to the user through a GUI, with appropriate warning.

@mfc mfc added T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. help wanted This issue will probably not get done in a timely fashion without help from community contributors. C: manager/widget P: minor Priority: minor. The lowest priority, below "default." ux User experience labels Sep 20, 2016
@andrewdavidwong andrewdavidwong added this to the Far in the future milestone Dec 24, 2016
@mfc mfc mentioned this issue Jan 31, 2017
2 tasks
@jpouellet
Copy link
Contributor

jpouellet commented Apr 2, 2017

Here's some more wishful thinking:

Even better would be to detect how the keyboard is attached during install and set this automatically. I have had friends reinstall without sys-usb because they were unable to enable it without a working keyboard with which to do so.

Additionally, some informative message could be shown during install or on first boot stating that this is the case on your system, and pointing them to the security warning in the docs about usb keyboards making sys-usb more trusted (or perhaps duplicate the warning directly in a message rather than point them at the docs).

Yes, input from sys-usb is not without danger, but I believe it's in people's best interest to have a system with a high-liability sys-usb (and be informed of that) than to have their initial Qubes install not have any way of giving input to dom0. See also #2736

@mfc
Copy link
Member Author

mfc commented Apr 3, 2017

I would make that a separate ticket.

@andrewdavidwong andrewdavidwong removed this from the Release TBD milestone Aug 13, 2023
@marmarta
Copy link
Member

marmarta commented Sep 5, 2023

So, this is in the new global config tool (no CLI needed), closing this.

@marmarta marmarta closed this as completed Sep 5, 2023
@andrewdavidwong andrewdavidwong removed the help wanted This issue will probably not get done in a timely fashion without help from community contributors. label Sep 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: manager/widget P: minor Priority: minor. The lowest priority, below "default." T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. ux User experience
Projects
None yet
Development

No branches or pull requests

4 participants