mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-28 15:40:54 -05:00
Correct code-block lexers
Changing `bash` lexer to `console` because it is appropriate most of the time. Then after a manual review, some lexer have been changed. I used `text` each time I was unsure, and for prompt outputs. The page `/developer/building/qubes-iso-building.rst` still need to be reviewed (look for lines starting with `$ #`). I'm not sure about the Windows pages, should we use [doscon](https://pygments.org/docs/lexers/#pygments.lexers.shell.MSDOSSessionLexer) or `powershell`? Is there an appropriate lexer for `guid.conf` content? **Statistics - Before** 870 bash 9 python 9 c 2 yaml **Statistics - After** 684 console 111 text 44 bash 16 yaml 9 systemd 9 c 8 python 4 ini 4 doscon 2 markdown 2 desktop 1 xorg.conf 1 xml+jinja 1 xml 1 kconfig 1 html This suggests that the default lexer should be `console`.
This commit is contained in:
parent
a252dc4338
commit
4212c5eda8
98 changed files with 1022 additions and 1029 deletions
|
|
@ -142,7 +142,7 @@ dom0: request execution of ``cmd`` in domX
|
|||
|
||||
- **dom0**: ``qrexec-client`` is invoked in **dom0** as follows:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
qrexec-client -d domX [-l local_program] user:cmd
|
||||
|
||||
|
|
@ -189,7 +189,7 @@ domX: request execution of service ``admin.Service`` in dom0
|
|||
|
||||
- **domX**: ``qrexec-client-vm`` is invoked as follows:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
qrexec-client-vm dom0 admin.Service [local_program] [params]
|
||||
|
||||
|
|
@ -215,7 +215,7 @@ domX: request execution of service ``admin.Service`` in dom0
|
|||
|
||||
- **dom0**: If the RPC is allowed, ``qrexec-policy`` will launch a ``qrexec-client`` with the right command:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
qrexec-client -d dom0 -c domX,X,SOCKET11 "QUBESRPC admin.Service domX name dom0"
|
||||
|
||||
|
|
@ -258,7 +258,7 @@ domX: invoke execution of qubes service ``qubes.Service`` in domY
|
|||
|
||||
- **domX**: ``qrexec-client-vm`` is invoked as follows:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
qrexec-client-vm domY qubes.Service [local_program] [params]
|
||||
|
||||
|
|
@ -276,7 +276,7 @@ domX: invoke execution of qubes service ``qubes.Service`` in domY
|
|||
|
||||
- **dom0**: If the RPC is allowed, ``qrexec-policy`` will launch a ``qrexec-client`` with the right command:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
qrexec-client -d domY -c domX,X,SOCKET11 user:cmd "DEFAULT:QUBESRPC qubes.Service domX"
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue