mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-24 23:09:29 -05:00
Merge branch 'feature/https-everywhere' of https://github.com/ypid/qubes-doc into ypid-feature/https-everywhere
This commit is contained in:
commit
5ea55b1ee8
@ -9,7 +9,7 @@ BUILDDIR = _build
|
|||||||
|
|
||||||
# User-friendly check for sphinx-build
|
# User-friendly check for sphinx-build
|
||||||
ifeq ($(shell which $(SPHINXBUILD) >/dev/null 2>&1; echo $$?), 1)
|
ifeq ($(shell which $(SPHINXBUILD) >/dev/null 2>&1; echo $$?), 1)
|
||||||
$(error The '$(SPHINXBUILD)' command was not found. Make sure you have Sphinx installed, then set the SPHINXBUILD environment variable to point to the full path of the '$(SPHINXBUILD)' executable. Alternatively you can add the directory with the executable to your PATH. If you don't have Sphinx installed, grab it from http://sphinx-doc.org/)
|
$(error The '$(SPHINXBUILD)' command was not found. Make sure you have Sphinx installed, then set the SPHINXBUILD environment variable to point to the full path of the '$(SPHINXBUILD)' executable. Alternatively you can add the directory with the executable to your PATH. If you don't have Sphinx installed, grab it from https://www.sphinx-doc.org/)
|
||||||
endif
|
endif
|
||||||
|
|
||||||
# Internal variables.
|
# Internal variables.
|
||||||
|
@ -124,7 +124,7 @@ Source Code management (Git) guidelines
|
|||||||
|
|
||||||
- Use git to maintain all code for Qubes project.
|
- Use git to maintain all code for Qubes project.
|
||||||
|
|
||||||
- Before you start using git, make sure you understand that git is a decentralized Source Code Management system, and that it doesn't behave like traditional, centralized source code management systems, such as SVN. Here's a good [introductory book on git](http://git-scm.com/book). Read it.
|
- Before you start using git, make sure you understand that git is a decentralized Source Code Management system, and that it doesn't behave like traditional, centralized source code management systems, such as SVN. Here's a good [introductory book on git](https://git-scm.com/book). Read it.
|
||||||
|
|
||||||
- Qubes code is divided into many git repositories. There are several reasons for that:
|
- Qubes code is divided into many git repositories. There are several reasons for that:
|
||||||
- This creates natural boundaries between different code blocks, enforcing proper interfaces, and easing independent development to be conducted on various code parts at the same time, without the fear of running into conflicts.
|
- This creates natural boundaries between different code blocks, enforcing proper interfaces, and easing independent development to be conducted on various code parts at the same time, without the fear of running into conflicts.
|
||||||
|
@ -13,4 +13,4 @@ Qubes OS License
|
|||||||
|
|
||||||
Qubes is a compilation of software packages, each under its own license. The compilation is made available under the GNU General Public License version 2.
|
Qubes is a compilation of software packages, each under its own license. The compilation is made available under the GNU General Public License version 2.
|
||||||
|
|
||||||
The full text of the GPL v2 license can be found [here](http://www.gnu.org/licenses/gpl-2.0.html).
|
The full text of the GPL v2 license can be found [here](https://www.gnu.org/licenses/gpl-2.0.html).
|
||||||
|
@ -44,7 +44,7 @@ Things get complicated if you need to perform kernel debugging or troubleshoot p
|
|||||||
...but there is a catch. Xen seems to process the traffic that goes through serial ports and changes all **0x0a** bytes into **0x0d, 0x0a** pairs (newline conversion). I didn't find a way to turn that off (setting ptys to raw mode didn't change anything) and it's not mentioned anywhere on the Internet, so maybe it's something on my system. If the above script works for you then you don't need anything more in dom0.
|
...but there is a catch. Xen seems to process the traffic that goes through serial ports and changes all **0x0a** bytes into **0x0d, 0x0a** pairs (newline conversion). I didn't find a way to turn that off (setting ptys to raw mode didn't change anything) and it's not mentioned anywhere on the Internet, so maybe it's something on my system. If the above script works for you then you don't need anything more in dom0.
|
||||||
|
|
||||||
- On the *target* system, run `bcdedit /set debug on` on the console to turn on kernel debugging. It defaults to the first serial port.
|
- On the *target* system, run `bcdedit /set debug on` on the console to turn on kernel debugging. It defaults to the first serial port.
|
||||||
- On the *host* system, install [WinDbg](http://msdn.microsoft.com/en-us/library/windows/hardware/ff551063(v=vs.85).aspx) and start the kernel debug (Ctrl-K), choose **com1** as the debug port.
|
- On the *host* system, install [WinDbg](https://msdn.microsoft.com/en-us/library/windows/hardware/ff551063%28v=vs.85%29.aspx) and start the kernel debug (Ctrl-K), choose **com1** as the debug port.
|
||||||
- Reboot the *target* VM.
|
- Reboot the *target* VM.
|
||||||
- Run the above shell script in dom0.
|
- Run the above shell script in dom0.
|
||||||
- If everything is fine you should see the proper kernel debugging output in WinDbg. However, if you see something like that:
|
- If everything is fine you should see the proper kernel debugging output in WinDbg. However, if you see something like that:
|
||||||
|
@ -508,7 +508,7 @@ details in [#2618](https://github.com/QubesOS/qubes-issues/issues/2618).
|
|||||||
|
|
||||||
**Project**: Qubes Converters
|
**Project**: Qubes Converters
|
||||||
|
|
||||||
**Brief explanation**: One of the pioneering ideas of Qubes is to use disposable virtual machines to convert untrustworthy files (such as documents given to journalists by unknown and potentially malicious whistleblowers) into trustworthy files. See [Joanna's blog on the Qubes PDF Convert](http://theinvisiblethings.blogspot.co.uk/2013/02/converting-untrusted-pdfs-into-trusted.html) for details of the idea. Joanna has implemented a prototype for PDF documents. The goal of this project would be to generalize beyond the simple prototype to accommodate a wide variety of file formats, including Word documents, audio files, video files, spreadsheets, and so on. The converters should prioritise safety over faithful conversion. For example the Qubes PDF converter typically leads to lower quality PDFs (e.g. cut and paste is no longer possible), because this makes the conversion process safer.
|
**Brief explanation**: One of the pioneering ideas of Qubes is to use disposable virtual machines to convert untrustworthy files (such as documents given to journalists by unknown and potentially malicious whistleblowers) into trustworthy files. See [Joanna's blog on the Qubes PDF Convert](https://theinvisiblethings.blogspot.co.uk/2013/02/converting-untrusted-pdfs-into-trusted.html) for details of the idea. Joanna has implemented a prototype for PDF documents. The goal of this project would be to generalize beyond the simple prototype to accommodate a wide variety of file formats, including Word documents, audio files, video files, spreadsheets, and so on. The converters should prioritise safety over faithful conversion. For example the Qubes PDF converter typically leads to lower quality PDFs (e.g. cut and paste is no longer possible), because this makes the conversion process safer.
|
||||||
|
|
||||||
**Expected results**: We expect that in the timeframe, it will be possible to implement many converters for many file formats. However, if any unexpected difficulties arise, we would prioritise a small number of safe and high quality converters over a large number of unsafe or unuseful converters.
|
**Expected results**: We expect that in the timeframe, it will be possible to implement many converters for many file formats. However, if any unexpected difficulties arise, we would prioritise a small number of safe and high quality converters over a large number of unsafe or unuseful converters.
|
||||||
|
|
||||||
|
@ -60,7 +60,7 @@ The following **colors** are currently being used on the Qubes website and docum
|
|||||||
|
|
||||||
## Icons
|
## Icons
|
||||||
|
|
||||||
Currently, all the icons on the Qubes-OS.org website are generated using [FontAwesome](http://fortawesome.github.io/Font-Awesome/).
|
Currently, all the icons on the Qubes-OS.org website are generated using [FontAwesome](https://fontawesome.com/).
|
||||||
|
|
||||||
*As more custom work is done to generate icons for the operating system itself, they will be added here!*
|
*As more custom work is done to generate icons for the operating system itself, they will be added here!*
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@ redirect_from:
|
|||||||
Qubes R1.0 Release Notes
|
Qubes R1.0 Release Notes
|
||||||
========================
|
========================
|
||||||
|
|
||||||
Detailed release notes in [this blog post](http://blog.invisiblethings.org/2012/09/03/introducing-qubes-10.html).
|
Detailed release notes in [this blog post](https://blog.invisiblethings.org/2012/09/03/introducing-qubes-10.html).
|
||||||
|
|
||||||
Known issues
|
Known issues
|
||||||
------------
|
------------
|
||||||
|
@ -9,7 +9,7 @@ redirect_from:
|
|||||||
Qubes R2.0 Release Notes
|
Qubes R2.0 Release Notes
|
||||||
========================
|
========================
|
||||||
|
|
||||||
Detailed release notes in [this blog post](http://blog.invisiblethings.org/2014/09/26/announcing-qubes-os-release-2.html)
|
Detailed release notes in [this blog post](https://blog.invisiblethings.org/2014/09/26/announcing-qubes-os-release-2.html)
|
||||||
|
|
||||||
New features since 1.0
|
New features since 1.0
|
||||||
----------------------
|
----------------------
|
||||||
|
@ -66,7 +66,7 @@ The initial published version of this Code of Conduct was adapted from the [Cont
|
|||||||
[discussion]: https://github.com/QubesOS/qubes-issues/issues/2163
|
[discussion]: https://github.com/QubesOS/qubes-issues/issues/2163
|
||||||
[Citizen Code of Conduct]: http://citizencodeofconduct.org/
|
[Citizen Code of Conduct]: http://citizencodeofconduct.org/
|
||||||
[discussion guidelines]: /support/#discussion-guidelines
|
[discussion guidelines]: /support/#discussion-guidelines
|
||||||
[Contributor Covenant, version 1.4]: http://contributor-covenant.org/version/1/4
|
[Contributor Covenant, version 1.4]: https://contributor-covenant.org/version/1/4
|
||||||
[Rust Code of Conduct]: https://www.rust-lang.org/en-US/conduct.html
|
[Rust Code of Conduct]: https://www.rust-lang.org/en-US/conduct.html
|
||||||
[Marek Marczykowski-Górecki]: /team/#marek-marczykowski-g%C3%B3recki
|
[Marek Marczykowski-Górecki]: /team/#marek-marczykowski-g%C3%B3recki
|
||||||
[Andrew David Wong]: /team/#andrew-david-wong
|
[Andrew David Wong]: /team/#andrew-david-wong
|
||||||
|
@ -772,7 +772,7 @@ There is also the unofficial [ansible-qubes toolkit][ansible].
|
|||||||
[Tails]: https://tails.boum.org/
|
[Tails]: https://tails.boum.org/
|
||||||
[Template]: /doc/template-implementation
|
[Template]: /doc/template-implementation
|
||||||
[terminal emulator]: https://en.wikipedia.org/wiki/Terminal_emulator
|
[terminal emulator]: https://en.wikipedia.org/wiki/Terminal_emulator
|
||||||
[this message]: http://groups.google.com/group/qubes-devel/msg/6412170cfbcb4cc5
|
[this message]: https://groups.google.com/group/qubes-devel/msg/6412170cfbcb4cc5
|
||||||
[this page]: /doc/vm-sudo/
|
[this page]: /doc/vm-sudo/
|
||||||
[Tor]: https://www.torproject.org/
|
[Tor]: https://www.torproject.org/
|
||||||
[USB]: /doc/usb-devices
|
[USB]: /doc/usb-devices
|
||||||
|
@ -324,7 +324,7 @@ Note that the app will autostart only when the AppVM starts. If you would like t
|
|||||||
[security]: /security/
|
[security]: /security/
|
||||||
[TemplateBasedVMs]: /doc/glossary/#templatebasedvm
|
[TemplateBasedVMs]: /doc/glossary/#templatebasedvm
|
||||||
[testing]: /doc/testing
|
[testing]: /doc/testing
|
||||||
[RPM Fusion]: http://rpmfusion.org/
|
[RPM Fusion]: https://rpmfusion.org/
|
||||||
[service framework]: /doc/qubes-service/
|
[service framework]: /doc/qubes-service/
|
||||||
[How to Reinstall a TemplateVM]: /doc/reinstall-template/
|
[How to Reinstall a TemplateVM]: /doc/reinstall-template/
|
||||||
[installing contributed packages]: /doc/installing-contributed-packages/
|
[installing contributed packages]: /doc/installing-contributed-packages/
|
||||||
|
Loading…
Reference in New Issue
Block a user