From c4d890d7c001d92c1642fd457584bbf8b0b9318d Mon Sep 17 00:00:00 2001 From: parulin <161326115+parulin@users.noreply.github.com> Date: Mon, 15 Sep 2025 05:03:50 -0400 Subject: [PATCH 1/2] Fix wrong roles warnings and wording --- introduction/intro.rst | 4 ++-- introduction/screenshots.rst | 2 +- user/advanced-topics/standalones-and-hvms.rst | 2 +- user/how-to-guides/how-to-edit-a-policy.rst | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/introduction/intro.rst b/introduction/intro.rst index 4b70a70b..d6c7946f 100644 --- a/introduction/intro.rst +++ b/introduction/intro.rst @@ -14,8 +14,8 @@ Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS `leverages Xen-based virtualization `__ to allow for the creation and management of isolated compartments called :term:`qubes `. -These qubes, which are implemented as :ref:`virtual machines (VMs)`, have specific: - +These qubes, which are implemented as :term:`virtual machines (VMs)`, have specific: + - **Purposes:** with a predefined set of one or many isolated applications, for personal or professional projects, to manage the :doc:`network stack `, :doc:`the firewall `, or to fulfill other diff --git a/introduction/screenshots.rst b/introduction/screenshots.rst index 3a2d2841..1497e153 100644 --- a/introduction/screenshots.rst +++ b/introduction/screenshots.rst @@ -29,7 +29,7 @@ In this example, the word processor runs in the “work” domain, which has bee |r2b3-windows-seamless-1.png| -Qubes Release 2 can also run Windows AppVMs in seamless mode, integrated onto the common Qubes trusted desktop, just like Linux AppVMs! The seamless GUI integration has been introduced in Qubes R2 Beta 3. This requires :doc:`Qubes Windows Tools ` to be installed in the Windows VMs first. +Qubes Release 2 can also run Windows AppVMs in seamless mode, integrated onto the common Qubes trusted desktop, just like Linux AppVMs! The seamless GUI integration has been introduced in Qubes R2 Beta 3. This requires :doc:`Qubes Windows Tools ` to be installed in the Windows VMs first. ---- diff --git a/user/advanced-topics/standalones-and-hvms.rst b/user/advanced-topics/standalones-and-hvms.rst index b356d618..7d850381 100644 --- a/user/advanced-topics/standalones-and-hvms.rst +++ b/user/advanced-topics/standalones-and-hvms.rst @@ -209,7 +209,7 @@ Set memory as appropriate and install the OS into this template in the same way You can then create a new qube using the new template. If you use this Template as is, then any HVMs based on it will effectively be disposables. All file system changes will be wiped when the HVM is shut down. -Please see :ref:`this page ` for specific advice on installing and using Windows-based templates. +:doc:`/user/templates/windows/windows` gives specific advice on installing and using Windows-based templates. Cloning HVMs ------------ diff --git a/user/how-to-guides/how-to-edit-a-policy.rst b/user/how-to-guides/how-to-edit-a-policy.rst index 4eb0d150..d35121c8 100644 --- a/user/how-to-guides/how-to-edit-a-policy.rst +++ b/user/how-to-guides/how-to-edit-a-policy.rst @@ -2,7 +2,7 @@ How to edit a policy ==================== -There are three ways to edit a :ref:`policy `: +There are three ways to edit a :term:`policy `: * with :program:`Qubes OS Global Config`, the **recommended way** for the most common policies From 1d3298cf6d422236fcb3f6c82b7d457df55e4df0 Mon Sep 17 00:00:00 2001 From: parulin <161326115+parulin@users.noreply.github.com> Date: Tue, 16 Sep 2025 03:47:13 -0400 Subject: [PATCH 2/2] Correct "Windows as a template" ref on Standalones --- user/advanced-topics/standalones-and-hvms.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/user/advanced-topics/standalones-and-hvms.rst b/user/advanced-topics/standalones-and-hvms.rst index 7d850381..45854900 100644 --- a/user/advanced-topics/standalones-and-hvms.rst +++ b/user/advanced-topics/standalones-and-hvms.rst @@ -209,7 +209,7 @@ Set memory as appropriate and install the OS into this template in the same way You can then create a new qube using the new template. If you use this Template as is, then any HVMs based on it will effectively be disposables. All file system changes will be wiped when the HVM is shut down. -:doc:`/user/templates/windows/windows` gives specific advice on installing and using Windows-based templates. +:ref:`user/templates/windows/qubes-windows:windows as a template` gives specific advice on installing and using Windows-based templates. Cloning HVMs ------------