mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-23 13:17:45 -05:00
Add prompts to all code blocks with bash session
This commit is contained in:
parent
b0395e618c
commit
2d2bcb06a6
72 changed files with 513 additions and 497 deletions
|
|
@ -144,7 +144,7 @@ dom0: request execution of ``cmd`` in domX
|
|||
|
||||
.. code:: console
|
||||
|
||||
qrexec-client -d domX [-l local_program] user:cmd
|
||||
$ qrexec-client -d domX [-l local_program] user:cmd
|
||||
|
||||
|
||||
|
||||
|
|
@ -191,7 +191,7 @@ domX: request execution of service ``admin.Service`` in dom0
|
|||
|
||||
.. code:: console
|
||||
|
||||
qrexec-client-vm dom0 admin.Service [local_program] [params]
|
||||
$ qrexec-client-vm dom0 admin.Service [local_program] [params]
|
||||
|
||||
|
||||
|
||||
|
|
@ -217,7 +217,7 @@ domX: request execution of service ``admin.Service`` in dom0
|
|||
|
||||
.. code:: console
|
||||
|
||||
qrexec-client -d dom0 -c domX,X,SOCKET11 "QUBESRPC admin.Service domX name dom0"
|
||||
$ qrexec-client -d dom0 -c domX,X,SOCKET11 "QUBESRPC admin.Service domX name dom0"
|
||||
|
||||
|
||||
|
||||
|
|
@ -260,7 +260,7 @@ domX: invoke execution of qubes service ``qubes.Service`` in domY
|
|||
|
||||
.. code:: console
|
||||
|
||||
qrexec-client-vm domY qubes.Service [local_program] [params]
|
||||
$ qrexec-client-vm domY qubes.Service [local_program] [params]
|
||||
|
||||
|
||||
|
||||
|
|
@ -278,7 +278,7 @@ domX: invoke execution of qubes service ``qubes.Service`` in domY
|
|||
|
||||
.. code:: console
|
||||
|
||||
qrexec-client -d domY -c domX,X,SOCKET11 user:cmd "DEFAULT:QUBESRPC qubes.Service domX"
|
||||
$ qrexec-client -d domY -c domX,X,SOCKET11 user:cmd "DEFAULT:QUBESRPC qubes.Service domX"
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -122,8 +122,8 @@ Start the socket using ``systemctl --user start``. Enable it using ``systemctl -
|
|||
|
||||
.. code:: console
|
||||
|
||||
systemctl --user start qubes-qrexec-policy-agent.socket
|
||||
systemctl --user enable qubes-qrexec-policy-agent.socket
|
||||
$ systemctl --user start qubes-qrexec-policy-agent.socket
|
||||
$ systemctl --user enable qubes-qrexec-policy-agent.socket
|
||||
|
||||
|
||||
|
||||
|
|
@ -131,7 +131,7 @@ Alternatively, you can enable the service by creating a symlink:
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo ln -s /lib/systemd/user/qubes-qrexec-policy-agent.socket /lib/systemd/user/sockets.target.wants/
|
||||
$ sudo ln -s /lib/systemd/user/qubes-qrexec-policy-agent.socket /lib/systemd/user/sockets.target.wants/
|
||||
|
||||
|
||||
|
||||
|
|
@ -143,7 +143,7 @@ Link in qubes-rpc
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo ln -s /var/run/qubes/policy-agent.sock /etc/qubes-rpc/policy.Ask
|
||||
$ sudo ln -s /var/run/qubes/policy-agent.sock /etc/qubes-rpc/policy.Ask
|
||||
|
||||
|
||||
|
||||
|
|
@ -157,7 +157,7 @@ Install the Python systemd library:
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo dnf install python3-systemd
|
||||
$ sudo dnf install python3-systemd
|
||||
|
||||
|
||||
|
||||
|
|
@ -240,7 +240,7 @@ The service is invoked in the same way as a standard Qubes RPC service:
|
|||
|
||||
.. code:: console
|
||||
|
||||
echo <input_data> | qrexec-client -d domX 'DEFAULT:QUBESRPC policy.Ask'
|
||||
$ echo <input_data> | qrexec-client -d domX 'DEFAULT:QUBESRPC policy.Ask'
|
||||
|
||||
|
||||
|
||||
|
|
@ -248,7 +248,7 @@ You can also connect to it locally, but remember to include the service descript
|
|||
|
||||
.. code:: console
|
||||
|
||||
echo -e 'policy.Ask dom0\0<input data>' | nc -U /etc/qubes-rpc/policy.Ask
|
||||
$ echo -e 'policy.Ask dom0\0<input data>' | nc -U /etc/qubes-rpc/policy.Ask
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -245,7 +245,7 @@ We’ll need to create a service called ``test.Add`` with its own definition and
|
|||
|
||||
.. code:: console
|
||||
|
||||
ln -s /usr/bin/our_test_add_server /etc/qubes-rpc/test.Add
|
||||
$ ln -s /usr/bin/our_test_add_server /etc/qubes-rpc/test.Add
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -114,7 +114,7 @@ In order to remove such authorization, issue this command from a Dom0 terminal (
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo nano /etc/qubes-rpc/policy/qubes.Filecopy
|
||||
$ sudo nano /etc/qubes-rpc/policy/qubes.Filecopy
|
||||
|
||||
|
||||
and then remove any line(s) ending in “allow” (before the first ``##`` comment) which are the “Yes to All” results.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue