mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-05-02 06:46:11 -04:00
Convert absolute to relative links
Absolute links break automatic onion redirection: https://groups.google.com/g/qubes-users/c/NJdzP27wvmM/
This commit is contained in:
parent
17544f4633
commit
30e7112f4a
16 changed files with 22 additions and 22 deletions
|
@ -51,4 +51,4 @@ Most settings are documented in *builder.conf.default* file, which can be used a
|
|||
Notes
|
||||
-----
|
||||
|
||||
* For a list of custom TemplateVMs available in QubesBuilder look at [Supported Versions page](https://www.qubes-os.org/doc/supported-versions/).
|
||||
* For a list of custom TemplateVMs available in QubesBuilder look at [Supported Versions page](/doc/supported-versions/).
|
||||
|
|
|
@ -616,9 +616,9 @@ Details, reference: [#2233](https://github.com/QubesOS/qubes-issues/issues/2233)
|
|||
### Admin API Fuzzer
|
||||
|
||||
**Project**: Develop a [Fuzzer](https://en.wikipedia.org/wiki/Fuzzing) for the
|
||||
[Qubes OS Admin API](https://www.qubes-os.org/doc/admin-api/).
|
||||
[Qubes OS Admin API](/doc/admin-api/).
|
||||
|
||||
**Brief explanation**: The [Qubes OS Admin API](https://www.qubes-os.org/doc/admin-api/)
|
||||
**Brief explanation**: The [Qubes OS Admin API](/doc/admin-api/)
|
||||
enables VMs to execute privileged actions on other VMs or dom0 - if allowed by the Qubes OS RPC policy.
|
||||
Programming errors in the Admin API however may cause these access rights to be more permissive
|
||||
than anticipated by the programmer.
|
||||
|
|
|
@ -97,7 +97,7 @@ This could be helped by writing consolidated guide with with a clear list of sym
|
|||
|
||||
**Expected results**:
|
||||
|
||||
- Review existing [troubleshooting guides](https://www.qubes-os.org/doc/#troubleshooting)
|
||||
- Review existing [troubleshooting guides](/doc/#troubleshooting)
|
||||
- Review [issues][doc-issues] containing common troubleshooting steps (checking specific logs etc)
|
||||
- Propose updated, consolidated troubleshooting documentation, including its layout
|
||||
|
||||
|
|
|
@ -79,7 +79,7 @@ Known issues
|
|||
|
||||
* List of USB devices may contain device identifiers instead of name
|
||||
|
||||
* With R4.0.1, which ships kernel-4.19, you may never reach the anaconda startup and be block on an idle black screen with blinking cursor. You can try to add `plymouth.ignore-serial-consoles` in the grub installer boot menu right after `quiet rhgb`. With legacy mode, you can do it directly when booting the DVD or USB key. In UEFI mode, follow the same procedure described for [disabling](https://www.qubes-os.org/doc/uefi-troubleshooting/#installation-freezes-before-getting-to-anaconda-qubes-40) `nouveau` module (related [solved issue](https://github.com/QubesOS/qubes-issues/issues/3849) in further version of Qubes).
|
||||
* With R4.0.1, which ships kernel-4.19, you may never reach the anaconda startup and be block on an idle black screen with blinking cursor. You can try to add `plymouth.ignore-serial-consoles` in the grub installer boot menu right after `quiet rhgb`. With legacy mode, you can do it directly when booting the DVD or USB key. In UEFI mode, follow the same procedure described for [disabling](/doc/uefi-troubleshooting/#installation-freezes-before-getting-to-anaconda-qubes-40) `nouveau` module (related [solved issue](https://github.com/QubesOS/qubes-issues/issues/3849) in further version of Qubes).
|
||||
|
||||
* For other known issues take a look at [our tickets](https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.0%22+label%3Abug)
|
||||
|
||||
|
|
|
@ -202,7 +202,7 @@ This is why `qubes.StartApp` uses our standard `qrexec` argument grammar to stri
|
|||
### Service policies with arguments
|
||||
|
||||
Sometimes a service name alone isn't enough to make reasonable qrexec policy.
|
||||
One example of such a situation is [qrexec-based USB passthrough](https://www.qubes-os.org/doc/usb-devices/).
|
||||
One example of such a situation is [qrexec-based USB passthrough](/doc/usb-devices/).
|
||||
Using just a service name would make it difficult to express the policy "allow access to devices X and Y, but deny to all others."
|
||||
It isn't feasible to create a separate service for every device: we would need to change the code in multiple files any time we wanted to update the service.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue