mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-07-23 06:51:23 -04:00
manual fixes
Manual fixes after the conversion tool. Mostly based on sphinx warnings.
This commit is contained in:
parent
d3f5fafcde
commit
5432f95705
13 changed files with 23 additions and 26 deletions
|
@ -145,7 +145,7 @@ To actually build RPMs, in qubes-builder:
|
|||
RPMs will appear in ``artifacts/repository/destination_name/package_name`` (for example ``artifacts/repository/host-fc37/linux-kernel-6.6.31-1.1/``
|
||||
|
||||
Useful :doc:`QubesBuilder </developer/building/qubes-builder-v2>` commands
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
|
||||
1. ``./qb package diff`` - show uncommitted changes
|
||||
|
|
|
@ -90,7 +90,7 @@ Project Ideas
|
|||
|
||||
These project ideas were contributed by our developers and may be incomplete. If you are interested in submitting a proposal based on these ideas, you should contact the :ref:`qubes-devel mailing list <introduction/support:qubes-devel>` and associated GitHub issue to learn more about the idea.
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
### Adding a Proposal
|
||||
|
||||
|
|
|
@ -762,7 +762,7 @@ Example backup profile:
|
|||
include:
|
||||
- work
|
||||
- personal
|
||||
- ``vault``
|
||||
- vault
|
||||
- banking
|
||||
|
||||
# Store the backup on external disk
|
||||
|
|
|
@ -3,7 +3,7 @@ Introduction
|
|||
============
|
||||
|
||||
What is Qubes OS?
|
||||
----------------
|
||||
-----------------
|
||||
|
||||
Qubes OS is a free and open-source, security-oriented operating system for
|
||||
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
||||
|
@ -67,7 +67,7 @@ Features
|
|||
|
||||
|
||||
Why Qubes OS?
|
||||
------------
|
||||
-------------
|
||||
|
||||
|
||||
Physical isolation is a given safeguard that the digital world lacks
|
||||
|
@ -127,7 +127,7 @@ fact, Qubes has `distinct advantages over physical air gaps <https://invisibleth
|
|||
|
||||
|
||||
Made to support vulnerable users and power users alike
|
||||
-----------------------------------------------------
|
||||
------------------------------------------------------
|
||||
|
||||
|
||||
Qubes provides practical, usable security to vulnerable and
|
||||
|
|
|
@ -17,6 +17,7 @@ Watch all the talks from Qubes OS Summit 2022, which took place September 9-11,
|
|||
:height: 315
|
||||
:width: 560
|
||||
:align: left
|
||||
|
||||
----
|
||||
|
||||
|
||||
|
@ -24,6 +25,7 @@ Watch all the talks from Qubes OS Summit 2022, which took place September 9-11,
|
|||
:height: 315
|
||||
:width: 560
|
||||
:align: left
|
||||
|
||||
----
|
||||
|
||||
|
||||
|
@ -35,7 +37,6 @@ Watch all the talks from Qubes OS Summit 2022, which took place September 9-11,
|
|||
|
||||
|
||||
|
||||
|
||||
Micah Lee presents "Qubes OS: The Operating System That Can Protect You Even If You Get Hacked"
|
||||
-----------------------------------------------------------------------------------------------
|
||||
|
||||
|
@ -55,10 +56,6 @@ Explaining Computers presents "Qubes OS: Security Oriented Operating System"
|
|||
----------------------------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
----
|
||||
|
||||
|
||||
.. youtube:: hWDvS_Mp6gc
|
||||
:height: 315
|
||||
:width: 560
|
||||
|
|
|
@ -31,7 +31,7 @@ The following example demonstrates one method of obtaining the qubes-secpack and
|
|||
|
||||
1. Use Git to clone the qubes-secpack repo.
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
$ git clone https://github.com/QubesOS/qubes-secpack.git
|
||||
Cloning into 'qubes-secpack'...
|
||||
|
@ -44,7 +44,7 @@ The following example demonstrates one method of obtaining the qubes-secpack and
|
|||
|
||||
2. Import the included PGP keys. See our `PGP key policies <#pgp-key-policies>`__ for important information about these keys.
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
$ gpg --import qubes-secpack/keys/*/*
|
||||
gpg: directory `/home/user/.gnupg' created
|
||||
|
|
|
@ -167,7 +167,7 @@ Once you’ve observed enough matching fingerprints from enough independent sour
|
|||
|
||||
Now that you’ve imported the authentic QMSK, set its trust level to “ultimate” so that it can be used to automatically verify all the keys signed by the QMSK (in particular, RSKs).
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
$ gpg2 --edit-key 0x427F11FD0FAA4B080123F01CDDFA1A3E36879494
|
||||
gpg (GnuPG) 1.4.18; Copyright (C) 2014 Free Software Foundation, Inc.
|
||||
|
@ -647,7 +647,7 @@ Why am I getting "CRC error; […] no signature found […]"?
|
|||
You’re not verifying against the correct `detached PGP signature file <#how-to-verify-detached-pgp-signatures-on-qubes-isos>`__, or the signature file has been modified. Try downloading it again or from a different source.
|
||||
|
||||
Do I have to verify both the `detached PGP signature file <#how-to-verify-detached-pgp-signatures-on-qubes-isos>`__ and the `cryptographic hash values <#how-to-verify-the-cryptographic-hash-values-of-qubes-isos>`__?
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
|
||||
|
||||
No, either method is sufficient by itself, but you can do both if you like.
|
||||
|
|
|
@ -9,7 +9,7 @@ List of Download Mirrors
|
|||
------------------------
|
||||
|
||||
|
||||
The full list of known Qubes download mirrors is available `here <https://www.qubes-os.org/downloads/#mirrors>__.
|
||||
The full list of known Qubes download mirrors is available `here <https://www.qubes-os.org/downloads/#mirrors>`__.
|
||||
|
||||
Instructions for Mirror Operators
|
||||
---------------------------------
|
||||
|
|
|
@ -161,7 +161,7 @@ Because of above limitations, you will need to configure some of those manually.
|
|||
|
||||
2. Start the VM from command line:
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
[user@dom0 ~]$ qvm-start custom-template
|
||||
--> Loading the VM (type = template)...
|
||||
|
@ -177,7 +177,7 @@ Because of above limitations, you will need to configure some of those manually.
|
|||
|
||||
3. Access VM console:
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
[user@dom0 ~]$ virsh -c xen:/// console custom-template
|
||||
|
||||
|
|
|
@ -238,7 +238,7 @@ Set the debug flag in order to have a graphical console:
|
|||
|
||||
The second part of the installation process will crash with the standard VGA video adapter and the VM will stay in “transient” mode with the following error in ``guest-win7new-dm.log``:
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
qemu: /home/user/qubes-src/vmm-xen-stubdom-linux/build/qemu/exec.c:1187: cpu_physical_memory_snapshot_get_dirty: Assertion `start + length <= snap->end' failed.
|
||||
|
||||
|
|
|
@ -90,7 +90,7 @@ Never Install Unsigned Packages
|
|||
|
||||
If you see something like this:
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
WARNING: The following packages cannot be authenticated!
|
||||
icedove
|
||||
|
@ -106,7 +106,7 @@ Signature Verification Warnings
|
|||
|
||||
There should be none at the moment. If there was such a warning, it would look like this:
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
W: A error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://deb.torproject.org stable Release: The following signatures were invalid: KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681
|
||||
|
||||
|
@ -120,7 +120,7 @@ In past various apt repositories were signed with expired key: `The Tor Project
|
|||
|
||||
You saw the following warning:
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
W: A error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://deb.torproject.org stable Release: The following signatures were invalid: KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681
|
||||
|
||||
|
@ -139,7 +139,7 @@ Changed Configuration Files
|
|||
|
||||
If you see something like the following.
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
Setting up ifupdown ...
|
||||
Configuration file /etc/network/interfaces
|
||||
|
|
|
@ -26,7 +26,7 @@ There are a variety of other problems that could arise when using a USB installa
|
|||
|
||||
|
||||
"**Warning:** dracut-initqueue timeout - starting timeout scripts" during installation
|
||||
----------------------------------------------------------------------------------
|
||||
--------------------------------------------------------------------------------------
|
||||
|
||||
|
||||
This error message is related to the faulty creation of the USB installation medium. If you receive this error message during installation, please make sure you have followed the instructions on :ref:`how to write your ISO to a USB key <user/downloading-installing-upgrading/installation-guide:copying the iso onto the installation medium>`. Specifically, the ``dd`` command listed on that page has been verified to solve this issue on multiple Qubes installation versions.
|
||||
|
|
|
@ -51,7 +51,7 @@ Errors suggesting this issue:
|
|||
|
||||
- in ``xl dmesg`` output:
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
(XEN) [VT-D] It's disallowed to assign 0000:00:1a.0 with shared RMRR at dbe9a000 for Dom19.
|
||||
(XEN) XEN_DOMCTL_assign_device: assign 0000:00:1a.0 to dom19 failed (-1)
|
||||
|
@ -60,7 +60,7 @@ Errors suggesting this issue:
|
|||
|
||||
- during ``qvm-start sys-usb``:
|
||||
|
||||
.. code:: bash
|
||||
.. code::
|
||||
|
||||
internal error: Unable to reset PCI device [...] no FLR, PM reset or bus reset available.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue