From 60d60c5ca71b3d6b2072c11ca9a87947edb64ae2 Mon Sep 17 00:00:00 2001 From: pierwill <19642016+pierwill@users.noreply.github.com> Date: Sun, 11 Aug 2019 23:45:41 -0500 Subject: [PATCH] Remove outdated sentence in qrexec doc --- developer/services/qrexec.md | 1 - 1 file changed, 1 deletion(-) diff --git a/developer/services/qrexec.md b/developer/services/qrexec.md index 6ff54d18..c0200566 100644 --- a/developer/services/qrexec.md +++ b/developer/services/qrexec.md @@ -111,7 +111,6 @@ These files contain lines with the following format: You can specify srcvm and destvm by name or by one of three reserved keywords: `@anyvm`, `@dispvm`, and `dom0` (without the `@`). Only `@anyvm` keyword makes sense in srcvm field. (Service calls from dom0 are currently always allowed, `@dispvm` means "new VM created for this particular request," so it is never a source of request.) -Currently there is no way to specify source VM by type. Whenever a RPC request for an action is received, the domain checks the first matching line of the relevant file in `/etc/qubes-rpc/policy/` to determine access: whether to allow the request, what VM to redirect the execution to, and what user account the program should run under. Note that if the request is redirected (`target=` parameter), policy action remains the same - even if there is another rule which would otherwise deny such request.