mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-12-11 22:19:53 -05:00
Add prompts to all code blocks with bash session
This commit is contained in:
parent
b0395e618c
commit
2d2bcb06a6
72 changed files with 513 additions and 497 deletions
|
|
@ -30,13 +30,13 @@ The same operations are also available via these command-line tools:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-copy [--without-progress] file [file]+
|
||||
$ qvm-copy [--without-progress] file [file]+
|
||||
|
||||
|
||||
|
||||
.. code:: console
|
||||
|
||||
qvm-move [--without-progress] file [file]+
|
||||
$ qvm-move [--without-progress] file [file]+
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -68,7 +68,7 @@ To enable automatic wiping of the clipboard after a minute use ``qvm-service``:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-service --enable VMNAME gui-agent-clipboard-wipe
|
||||
$ qvm-service --enable VMNAME gui-agent-clipboard-wipe
|
||||
|
||||
|
||||
|
||||
|
|
@ -80,8 +80,8 @@ The copy/paste shortcuts are configurable via ``qvm-features``, e.g.
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-features dom0 gui-default-secure-copy-sequence 'Mod4-c'
|
||||
qvm-features dom0 gui-default-secure-paste-sequence 'Mod4-v'
|
||||
$ qvm-features dom0 gui-default-secure-copy-sequence 'Mod4-c'
|
||||
$ qvm-features dom0 gui-default-secure-paste-sequence 'Mod4-v'
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -17,7 +17,7 @@ To copy a file from dom0 to a VM, simply use ``qvm-copy-to-vm``:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-copy-to-vm <target_vm> <file>
|
||||
$ qvm-copy-to-vm <target_vm> <file>
|
||||
|
||||
|
||||
|
||||
|
|
@ -73,7 +73,7 @@ If you are determined to copy some files to dom0 anyway, you can use the followi
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-run --pass-io <src-vm> 'cat /path/to/file_in_src_domain' > /path/to/file_name_in_dom0
|
||||
$ qvm-run --pass-io <src-vm> 'cat /path/to/file_in_src_domain' > /path/to/file_name_in_dom0
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -157,9 +157,9 @@ To temporarily enable any of these repos, use the ``--enablerepo=<repo-name>`` o
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo dnf upgrade --enablerepo=qubes-vm-*-current-testing
|
||||
sudo dnf upgrade --enablerepo=qubes-vm-*-security-testing
|
||||
sudo dnf upgrade --enablerepo=qubes-vm-*-unstable
|
||||
$ sudo dnf upgrade --enablerepo=qubes-vm-*-current-testing
|
||||
$ sudo dnf upgrade --enablerepo=qubes-vm-*-security-testing
|
||||
$ sudo dnf upgrade --enablerepo=qubes-vm-*-unstable
|
||||
|
||||
|
||||
|
||||
|
|
@ -195,11 +195,11 @@ If you would like to enable the `RPM Fusion <https://rpmfusion.org/>`__ reposito
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo dnf config-manager setopt rpmfusion-free.enabled=1
|
||||
sudo dnf config-manager setopt rpmfusion-free-updates.enabled=1
|
||||
sudo dnf config-manager setopt rpmfusion-nonfree.enabled=1
|
||||
sudo dnf config-manager setopt rpmfusion-nonfree-updates.enabled=1
|
||||
sudo dnf upgrade --refresh
|
||||
$ sudo dnf config-manager setopt rpmfusion-free.enabled=1
|
||||
$ sudo dnf config-manager setopt rpmfusion-free-updates.enabled=1
|
||||
$ sudo dnf config-manager setopt rpmfusion-nonfree.enabled=1
|
||||
$ sudo dnf config-manager setopt rpmfusion-nonfree-updates.enabled=1
|
||||
$ sudo dnf upgrade --refresh
|
||||
|
||||
|
||||
|
||||
|
|
@ -231,7 +231,7 @@ Root revert
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-volume revert <template>:root
|
||||
$ qvm-volume revert <template>:root
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -29,9 +29,9 @@ If not specified otherwise, block devices will show up as ``/dev/xvdi*`` in a li
|
|||
|
||||
.. code:: console
|
||||
|
||||
cd ~
|
||||
mkdir mnt
|
||||
sudo mount /dev/xvdi2 mnt
|
||||
$ cd ~
|
||||
$ mkdir mnt
|
||||
$ sudo mount /dev/xvdi2 mnt
|
||||
|
||||
|
||||
|
||||
|
|
@ -57,7 +57,7 @@ In case of a USB-drive, make sure it’s attached to your computer. If you don
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-block
|
||||
$ qvm-block
|
||||
|
||||
|
||||
This will list all available block devices in your system across all VMs. The name of the qube hosting the block device is displayed before the colon in the device ID. The string after the colon is the ID of the device used within the qube, like so:
|
||||
|
|
@ -73,7 +73,7 @@ In case of a USB-drive, make sure it’s attached to your computer. If you don
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-block attach work sys-usb:sdb
|
||||
$ qvm-block attach work sys-usb:sdb
|
||||
|
||||
|
||||
|
||||
|
|
@ -87,9 +87,9 @@ In case of a USB-drive, make sure it’s attached to your computer. If you don
|
|||
|
||||
.. code:: console
|
||||
|
||||
cd ~
|
||||
mkdir mnt
|
||||
sudo mount /dev/xvdi mnt
|
||||
$ cd ~
|
||||
$ mkdir mnt
|
||||
$ sudo mount /dev/xvdi mnt
|
||||
|
||||
|
||||
|
||||
|
|
@ -101,7 +101,7 @@ In case of a USB-drive, make sure it’s attached to your computer. If you don
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo umount mnt
|
||||
$ sudo umount mnt
|
||||
|
||||
|
||||
|
||||
|
|
@ -109,7 +109,7 @@ In case of a USB-drive, make sure it’s attached to your computer. If you don
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-block detach work sys-usb:sdb
|
||||
$ qvm-block detach work sys-usb:sdb
|
||||
|
||||
|
||||
|
||||
|
|
@ -177,7 +177,7 @@ To attach a file as block device to another qube, first turn it into a loopback
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo losetup -f --show /path/to/file
|
||||
$ sudo losetup -f --show /path/to/file
|
||||
|
||||
|
||||
`This command <https://linux.die.net/man/8/losetup>`__ will create the device node ``/dev/loop0`` or, if that is already in use, increase the trailing integer until that name is still available. Afterwards it prints the device-node-name it found.
|
||||
|
|
@ -201,7 +201,7 @@ To attach a file as block device to another qube, first turn it into a loopback
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-block a targetVM sourceVM:loop0
|
||||
$ qvm-block a targetVM sourceVM:loop0
|
||||
|
||||
|
||||
|
||||
|
|
@ -209,7 +209,7 @@ To attach a file as block device to another qube, first turn it into a loopback
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo losetup -d /dev/loop0
|
||||
$ sudo losetup -d /dev/loop0
|
||||
|
||||
|
||||
|
||||
|
|
@ -231,7 +231,7 @@ usage example:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-block a work sys-usb:sda1 -o frontend-dev=xvdz
|
||||
$ qvm-block a work sys-usb:sda1 -o frontend-dev=xvdz
|
||||
|
||||
|
||||
|
||||
|
|
@ -249,7 +249,7 @@ usage example:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-block a work sys-usb:sda1 -o read-only=true
|
||||
$ qvm-block a work sys-usb:sda1 -o read-only=true
|
||||
|
||||
|
||||
|
||||
|
|
@ -257,7 +257,7 @@ There exists a shortcut to set read-only ``true``, ``--ro``:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-block a work sys-usb:sda1 --ro
|
||||
$ qvm-block a work sys-usb:sda1 --ro
|
||||
|
||||
|
||||
|
||||
|
|
@ -273,7 +273,7 @@ usage example:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-block a work sys-usb:sda1 -o devtype=cdrom
|
||||
$ qvm-block a work sys-usb:sda1 -o devtype=cdrom
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -65,7 +65,7 @@ You can set any app qube to have the ability to act as a disposable template wit
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs <APP_QUBE> template_for_dispvms True
|
||||
$ qvm-prefs <APP_QUBE> template_for_dispvms True
|
||||
|
||||
|
||||
|
||||
|
|
@ -75,7 +75,7 @@ You can change this behavior for individual qubes: in the Application Menu, open
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs <QUBE> default_dispvm <DISPOSABLE_TEMPLATE>
|
||||
$ qvm-prefs <QUBE> default_dispvm <DISPOSABLE_TEMPLATE>
|
||||
|
||||
|
||||
|
||||
|
|
@ -91,7 +91,7 @@ A disposable launched from the app menu inherits the net qube and firewall setti
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-features <DISPOSABLE_TEMPLATE> appmenus-dispvm 1
|
||||
$ qvm-features <DISPOSABLE_TEMPLATE> appmenus-dispvm 1
|
||||
|
||||
|
||||
|
||||
|
|
@ -99,7 +99,7 @@ To launch a disposable template from the command line, execute the following com
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-run --dispvm=<DISPOSABLE_TEMPLATE> --service qubes.StartApp+<APPLICATION>
|
||||
$ qvm-run --dispvm=<DISPOSABLE_TEMPLATE> --service qubes.StartApp+<APPLICATION>
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -55,7 +55,7 @@ To figure out what device to attach, first list the available PCI devices by run
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-pci
|
||||
$ qvm-pci
|
||||
|
||||
|
||||
|
||||
|
|
@ -63,7 +63,7 @@ This will show you the ``backend:BDF`` (Bus_Device.Function) address of each PCI
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-pci attach targetVM sourceVM:[BDF] --persistent
|
||||
$ qvm-pci attach targetVM sourceVM:[BDF] --persistent
|
||||
|
||||
|
||||
|
||||
|
|
@ -73,7 +73,7 @@ For example, if ``00_1a.0`` is the BDF of the device you want to attach to the
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-pci attach work dom0:00_1a.0 --persistent
|
||||
$ qvm-pci attach work dom0:00_1a.0 --persistent
|
||||
|
||||
|
||||
|
||||
|
|
@ -101,7 +101,7 @@ usage example:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-pci a work dom0:00_1a.0 --persistent -o no-strict-reset=true
|
||||
$ qvm-pci a work dom0:00_1a.0 --persistent -o no-strict-reset=true
|
||||
|
||||
|
||||
|
||||
|
|
@ -115,7 +115,7 @@ usage example:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-pci a work dom0:00_1a.0 --persistent -o permissive=true
|
||||
$ qvm-pci a work dom0:00_1a.0 --persistent -o permissive=true
|
||||
|
||||
|
||||
|
||||
|
|
@ -141,10 +141,10 @@ or
|
|||
|
||||
.. code:: console
|
||||
|
||||
echo <BDF> > /sys/bus/pci/drivers/pciback/unbind
|
||||
MODALIAS=`cat /sys/bus/pci/devices/<BDF>/modalias`
|
||||
MOD=`modprobe -R $MODALIAS | head -n 1`
|
||||
echo <BDF> > /sys/bus/pci/drivers/$MOD/bind
|
||||
$ echo <BDF> > /sys/bus/pci/drivers/pciback/unbind
|
||||
$ MODALIAS=`cat /sys/bus/pci/devices/<BDF>/modalias`
|
||||
$ MOD=`modprobe -R $MODALIAS | head -n 1`
|
||||
$ echo <BDF> > /sys/bus/pci/drivers/$MOD/bind
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -104,7 +104,7 @@ If you receive this error: ``ERROR: qubes-usb-proxy not installed in the qube``,
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo dnf install qubes-usb-proxy
|
||||
$ sudo dnf install qubes-usb-proxy
|
||||
|
||||
|
||||
|
||||
|
|
@ -112,7 +112,7 @@ If you receive this error: ``ERROR: qubes-usb-proxy not installed in the qube``,
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo apt-get install qubes-usb-proxy
|
||||
$ sudo apt-get install qubes-usb-proxy
|
||||
|
||||
|
||||
|
||||
|
|
@ -138,7 +138,7 @@ First, find out which USB bus the device is connected to (note that these steps
|
|||
|
||||
.. code:: console
|
||||
|
||||
lsusb
|
||||
$ lsusb
|
||||
|
||||
|
||||
|
||||
|
|
@ -174,7 +174,7 @@ Now you see the path: the text between ``/pci0000:00/0000:`` and ``/usb3`` i.e.
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-pci attach --persistent personal dom0:00_1a.0
|
||||
$ qvm-pci attach --persistent personal dom0:00_1a.0
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue