mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-26 06:26:37 -05:00
Add prompts to all code blocks with bash session
This commit is contained in:
parent
b0395e618c
commit
2d2bcb06a6
72 changed files with 513 additions and 497 deletions
|
|
@ -75,9 +75,9 @@ If you have a Debian template from an earlier release that you want to use for s
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo apt-mark hold salt-common salt-ssh
|
||||
sudo apt update
|
||||
sudo apt upgrade
|
||||
$ sudo apt-mark hold salt-common salt-ssh
|
||||
$ sudo apt update
|
||||
$ sudo apt upgrade
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -205,14 +205,14 @@ When you install a new template or :ref:`upgrade <user/how-to-guides/how-to-upda
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-shutdown --wait --all; qvm-prefs <SYS_USB_DISPOSABLE_TEMPLATE> template <NEW_TEMPLATE>; qvm-start <USB_QUBE>
|
||||
$ qvm-shutdown --wait --all; qvm-prefs <SYS_USB_DISPOSABLE_TEMPLATE> template <NEW_TEMPLATE>; qvm-start <USB_QUBE>
|
||||
|
||||
|
||||
With substitutions, your command should look similar to this example. (**Warning:** This is just an example. Do not attempt to use it.)
|
||||
|
||||
.. code:: console
|
||||
|
||||
qvm-shutdown --wait --all; qvm-prefs fedora-01-dvm template fedora-02; qvm-start sys-usb
|
||||
$ qvm-shutdown --wait --all; qvm-prefs fedora-01-dvm template fedora-02; qvm-start sys-usb
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -122,8 +122,8 @@ This will allow you to install the Qubes Windows Tools on Windows 10 both as a S
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-features <VMname> gui 1
|
||||
qvm-prefs <VMname> qrexec_timeout 300
|
||||
$ qvm-features <VMname> gui 1
|
||||
$ qvm-prefs <VMname> qrexec_timeout 300
|
||||
|
||||
|
||||
|
||||
|
|
@ -135,7 +135,7 @@ This will allow you to install the Qubes Windows Tools on Windows 10 both as a S
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs <VMname> default_user <username>
|
||||
$ qvm-prefs <VMname> default_user <username>
|
||||
|
||||
|
||||
|
||||
|
|
@ -159,7 +159,7 @@ First, make sure that ``qubes-windows-tools`` is installed in your system:
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-windows-tools
|
||||
$ sudo qubes-dom0-update qubes-windows-tools
|
||||
|
||||
|
||||
|
||||
|
|
@ -169,7 +169,7 @@ You can also install the package from testing repositories, where we usually pub
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools
|
||||
$ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools
|
||||
|
||||
|
||||
|
||||
|
|
@ -191,7 +191,7 @@ To install the Qubes Windows Tools in a Windows VM one should start the VM passi
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-start lab-win7 --install-windows-tools
|
||||
$ qvm-start lab-win7 --install-windows-tools
|
||||
|
||||
|
||||
|
||||
|
|
@ -203,7 +203,7 @@ Qubes will automatically detect the tools has been installed in the VM and will
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs <your-appvm-name>
|
||||
$ qvm-prefs <your-appvm-name>
|
||||
|
||||
|
||||
|
||||
|
|
@ -211,7 +211,7 @@ Qubes will automatically detect the tools has been installed in the VM and will
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs <vm-name> qrexec_timeout 300
|
||||
$ qvm-prefs <vm-name> qrexec_timeout 300
|
||||
|
||||
|
||||
|
||||
|
|
@ -247,7 +247,7 @@ With Qubes Windows Tools installed the early graphical console provided in debug
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs -s win7new debug false
|
||||
$ qvm-prefs -s win7new debug false
|
||||
|
||||
|
||||
|
||||
|
|
@ -261,7 +261,7 @@ Once you start a Windows-based AppVM with Qubes Tools installed, you can easily
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-run -a my-win7-appvm explorer.exe
|
||||
$ qvm-run -a my-win7-appvm explorer.exe
|
||||
|
||||
|
||||
|
||||
|
|
@ -305,7 +305,7 @@ In order to create a HVM TemplateVM one can use the following command, suitably
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --class TemplateVM win-template --property virt_mode=HVM --property kernel='' -l green
|
||||
$ qvm-create --class TemplateVM win-template --property virt_mode=HVM --property kernel='' -l green
|
||||
|
||||
|
||||
|
||||
|
|
@ -335,7 +335,7 @@ Once the template has been created and installed it is easy to create AppVMs bas
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --property virt_mode=hvm <new windows appvm name> --template <name of template vm> --label <label color>
|
||||
$ qvm-create --property virt_mode=hvm <new windows appvm name> --template <name of template vm> --label <label color>
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -39,7 +39,7 @@ Qubes Windows Tools (QWT) are a set of programs and drivers that provide integra
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-windows-tools-4.1.68
|
||||
$ sudo qubes-dom0-update qubes-windows-tools-4.1.68
|
||||
|
||||
|
||||
|
||||
|
|
@ -47,7 +47,7 @@ for Qubes R4.1.2, or
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-windows-tools-4.1.69
|
||||
$ sudo qubes-dom0-update qubes-windows-tools-4.1.69
|
||||
|
||||
|
||||
|
||||
|
|
@ -162,7 +162,7 @@ Installing the Qubes Windows Tools on Windows 7, 8.1, 10 and 11 both as a Standa
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-windows-tools
|
||||
$ sudo qubes-dom0-update qubes-windows-tools
|
||||
|
||||
|
||||
(If the above command does not work, it could be that the Qubes Tools are not in the stable repo yet. Try installing from the testing repo instead.)
|
||||
|
|
@ -170,14 +170,14 @@ Installing the Qubes Windows Tools on Windows 7, 8.1, 10 and 11 both as a Standa
|
|||
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools
|
||||
$ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools
|
||||
|
||||
|
||||
If an earlier version of Qubes Windows Tools is already installed, with enabled current-testing repo you need to specify as action to ``upgrade`` the existing package, because the default action is ``install``, which will fail if it detects that QWT is already present in Dom0:
|
||||
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --action=upgrade qubes-windows-tools
|
||||
$ sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing --action=upgrade qubes-windows-tools
|
||||
|
||||
|
||||
This package brings the ISO with Qubes Windows Tools that is passed to the VM when ``--install-windows-tools`` is specified for the ``qvm-start`` command. Please note that none of this software ever runs in Dom0 or any other part of the system except for the Windows AppVM in which it is to be installed.
|
||||
|
|
@ -195,7 +195,7 @@ Installing the Qubes Windows Tools on Windows 7, 8.1, 10 and 11 both as a Standa
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-start <VMname> --install-windows-tools
|
||||
$ qvm-start <VMname> --install-windows-tools
|
||||
|
||||
|
||||
Once the Windows VM boots, a CDROM should appear in the ‘My Computer’ menu (typically as ``D:`` or ``E:``) with the setup program ``qubes-tools-x64.msi`` in its main directory.
|
||||
|
|
|
|||
|
|
@ -124,8 +124,8 @@ Importing should work, simply make sure that you are not using Xen’s newer lin
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-features VMNAME linux-stubdom ''
|
||||
qvm-prefs VMNAME virt_mode hvm
|
||||
$ qvm-features VMNAME linux-stubdom ''
|
||||
$ qvm-prefs VMNAME virt_mode hvm
|
||||
|
||||
|
||||
|
||||
|
|
@ -147,23 +147,23 @@ Summary
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --class StandaloneVM --label red --property virt_mode=hvm win7new
|
||||
qvm-prefs win7new memory 4096
|
||||
qvm-prefs win7new maxmem 4096
|
||||
qvm-prefs win7new kernel ''
|
||||
qvm-volume extend win7new:root 25g
|
||||
qvm-prefs win7new debug true
|
||||
qvm-features win7new video-model cirrus
|
||||
qvm-start --cdrom=untrusted:/home/user/windows_install.iso win7new
|
||||
$ qvm-create --class StandaloneVM --label red --property virt_mode=hvm win7new
|
||||
$ qvm-prefs win7new memory 4096
|
||||
$ qvm-prefs win7new maxmem 4096
|
||||
$ qvm-prefs win7new kernel ''
|
||||
$ qvm-volume extend win7new:root 25g
|
||||
$ qvm-prefs win7new debug true
|
||||
$ qvm-features win7new video-model cirrus
|
||||
$ qvm-start --cdrom=untrusted:/home/user/windows_install.iso win7new
|
||||
# restart after the first part of the windows installation process ends
|
||||
qvm-start win7new
|
||||
$ qvm-start win7new
|
||||
# once Windows is installed and working
|
||||
qvm-prefs win7new memory 2048
|
||||
qvm-prefs win7new maxmem 2048
|
||||
qvm-features --unset win7new video-model
|
||||
qvm-prefs win7new qrexec_timeout 300
|
||||
$ qvm-prefs win7new memory 2048
|
||||
$ qvm-prefs win7new maxmem 2048
|
||||
$ qvm-features --unset win7new video-model
|
||||
$ qvm-prefs win7new qrexec_timeout 300
|
||||
# with Qubes Windows Tools installed:
|
||||
qvm-prefs win7new debug false
|
||||
$ qvm-prefs win7new debug false
|
||||
|
||||
|
||||
|
||||
|
|
@ -187,7 +187,7 @@ Create a VM named win7new in :doc:`HVM </user/advanced-topics/standalones-and-hv
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --class StandaloneVM --label red --property virt_mode=hvm win7new
|
||||
$ qvm-create --class StandaloneVM --label red --property virt_mode=hvm win7new
|
||||
|
||||
|
||||
|
||||
|
|
@ -207,8 +207,8 @@ So, increase the VM’s memory to 4096MB (memory = maxmem because we don’t use
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs win7new memory 4096
|
||||
qvm-prefs win7new maxmem 4096
|
||||
$ qvm-prefs win7new memory 4096
|
||||
$ qvm-prefs win7new maxmem 4096
|
||||
|
||||
|
||||
|
||||
|
|
@ -216,7 +216,7 @@ Disable direct boot so that the VM will go through the standard cdrom/HDD boot s
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs win7new kernel ''
|
||||
$ qvm-prefs win7new kernel ''
|
||||
|
||||
|
||||
|
||||
|
|
@ -224,7 +224,7 @@ A typical Windows 7 installation requires between 15GB up to 19GB of disk space
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-volume extend win7new:root 25g
|
||||
$ qvm-volume extend win7new:root 25g
|
||||
|
||||
|
||||
|
||||
|
|
@ -232,7 +232,7 @@ Set the debug flag in order to have a graphical console:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs win7new debug true
|
||||
$ qvm-prefs win7new debug true
|
||||
|
||||
|
||||
|
||||
|
|
@ -248,7 +248,7 @@ To avoid that error we temporarily have to switch the video adapter to ‘cirrus
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-features win7new video-model cirrus
|
||||
$ qvm-features win7new video-model cirrus
|
||||
|
||||
|
||||
|
||||
|
|
@ -256,7 +256,7 @@ The VM is now ready to be started; the best practice is to use an installation I
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-start --cdrom=untrusted:/home/user/windows_install.iso win7new
|
||||
$ qvm-start --cdrom=untrusted:/home/user/windows_install.iso win7new
|
||||
|
||||
|
||||
|
||||
|
|
@ -280,8 +280,8 @@ Decrease the VM’s memory to a more reasonable value (memory balancing on Windo
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs win7new memory 2048
|
||||
qvm-prefs win7new maxmem 2048
|
||||
$ qvm-prefs win7new memory 2048
|
||||
$ qvm-prefs win7new maxmem 2048
|
||||
|
||||
|
||||
|
||||
|
|
@ -289,7 +289,7 @@ Revert to the standard VGA adapter: the ‘cirrus’ adapter will limit the maxi
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-features --unset win7new video-model
|
||||
$ qvm-features --unset win7new video-model
|
||||
|
||||
|
||||
|
||||
|
|
@ -297,7 +297,7 @@ Finally, increase the VM’s ``qrexec_timeout``: in case you happen to get a BSO
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs win7new qrexec_timeout 300
|
||||
$ qvm-prefs win7new qrexec_timeout 300
|
||||
|
||||
|
||||
|
||||
|
|
@ -311,7 +311,7 @@ Windows 7 and 10 can be installed as TemplateVM by selecting
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --class TemplateVM --property virt_mode=HVM --property kernel='' --label black Windows-template
|
||||
$ qvm-create --class TemplateVM --property virt_mode=HVM --property kernel='' --label black Windows-template
|
||||
|
||||
|
||||
|
||||
|
|
@ -329,7 +329,7 @@ AppVMs based on these templates can be created the normal way by using the Qube
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --class=AppVM --template=<VMname>
|
||||
$ qvm-create --class=AppVM --template=<VMname>
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -132,14 +132,14 @@ Create a VM named WindowsNew in :doc:`HVM </user/advanced-topics/standalones-and
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --class StandaloneVM --label orange --property virt_mode=hvm WindowsNew
|
||||
$ qvm-create --class StandaloneVM --label orange --property virt_mode=hvm WindowsNew
|
||||
|
||||
|
||||
and for a template:
|
||||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --class TemplateVM --label black --property virt_mode=hvm WindowsNew
|
||||
$ qvm-create --class TemplateVM --label black --property virt_mode=hvm WindowsNew
|
||||
|
||||
|
||||
|
||||
|
|
@ -149,11 +149,11 @@ Create a VM named WindowsNew in :doc:`HVM </user/advanced-topics/standalones-and
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-volume extend WindowsNew:root 60g
|
||||
qvm-prefs WindowsNew memory 4096
|
||||
qvm-prefs WindowsNew maxmem 4096
|
||||
qvm-prefs WindowsNew kernel ''
|
||||
qvm-prefs WindowsNew qrexec_timeout 7200
|
||||
$ qvm-volume extend WindowsNew:root 60g
|
||||
$ qvm-prefs WindowsNew memory 4096
|
||||
$ qvm-prefs WindowsNew maxmem 4096
|
||||
$ qvm-prefs WindowsNew kernel ''
|
||||
$ qvm-prefs WindowsNew qrexec_timeout 7200
|
||||
|
||||
|
||||
|
||||
|
|
@ -184,7 +184,7 @@ These parameters are set for the following reasons:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs WindowsNew qrexec_timeout 7200
|
||||
$ qvm-prefs WindowsNew qrexec_timeout 7200
|
||||
|
||||
|
||||
|
||||
|
|
@ -215,7 +215,7 @@ These parameters are set for the following reasons:
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-start --cdrom=untrusted:/home/user/windows_install.iso WindowsNew
|
||||
$ qvm-start --cdrom=untrusted:/home/user/windows_install.iso WindowsNew
|
||||
|
||||
|
||||
|
||||
|
|
@ -396,7 +396,7 @@ AppVMs based on these templates can be created the normal way by using the Qube
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-create --class=AppVM --template=<VMname>
|
||||
$ qvm-create --class=AppVM --template=<VMname>
|
||||
|
||||
|
||||
|
||||
|
|
@ -408,7 +408,7 @@ Furthermore, if manual IP setup was used for the template, the IP address select
|
|||
|
||||
.. code:: console
|
||||
|
||||
qvm-prefs WindowsNew ip 10.137.0.x
|
||||
$ qvm-prefs WindowsNew ip 10.137.0.x
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue