mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-10-21 14:47:20 -04:00
Minor cleaning of code highlighting
* Most of text blocks are in fact output blocks * On qubes-iso-building.rst, try to get something correct for console lines starting with a comment * Fixing a wrong :menuselection: item. Statistics: 685 console 79 text 44 bash 35 output 16 yaml 9 systemd 9 c 8 python 4 ini 4 doscon 2 markdown 2 desktop 1 xorg.conf 1 xml+jinja 1 xml 1 kconfig 1 html
This commit is contained in:
parent
4212c5eda8
commit
6f4370f793
23 changed files with 61 additions and 49 deletions
|
@ -213,6 +213,6 @@ Requires installed `Whonix <https://forum.qubes-os.org/t/19014>`__.
|
|||
|
||||
Go to Qubes VM Manager -> System -> Global Settings. See the UpdateVM setting. Choose your desired Whonix-Gateway ProxyVM from the list. For example: sys-whonix.
|
||||
|
||||
:menusettings:`Qubes VM Manager -> System -> Global Settings -> UpdateVM -> sys-whonix`
|
||||
:menuselection:`Qubes VM Manager --> System --> Global Settings --> UpdateVM --> sys-whonix`
|
||||
|
||||
|
||||
|
|
|
@ -26,7 +26,7 @@ Decrypting the Disk
|
|||
|
||||
1. Open a Linux terminal in either dom0 or the app qube the disk was passed through to and enter ``lsblk``, which will result in an output similar to the following. In this example, the currently booted Qubes system is installed on ``sda`` and the qubes system to be accessed is on ``nvme0n1p2``.
|
||||
|
||||
.. code:: text
|
||||
.. code:: output
|
||||
|
||||
sda 8:0 0 111.8G 0 disk
|
||||
├─sda1 8:1 0 200M 0 part /boot/efi
|
||||
|
|
|
@ -193,7 +193,7 @@ Configuring a qube's System from Dom0
|
|||
|
||||
Salt can be used to configure qubes from dom0. Simply set the qube name as the target minion name in the top file. You can also use the ``qubes`` pillar module to select qubes with a particular property (see below). If you do so, then you need to pass additional arguments to the ``qubesctl`` tool:
|
||||
|
||||
.. code:: text
|
||||
.. code:: output
|
||||
|
||||
usage: qubesctl [-h] [--show-output] [--force-color] [--skip-dom0]
|
||||
[--targets TARGETS | --templates | --app | --all]
|
||||
|
|
|
@ -96,7 +96,7 @@ Qubes are template-based (i.e., :ref:`app qubes <user/reference/glossary:app qub
|
|||
|
||||
If you receive an error like this one, then you must first enable VT-x in your BIOS:
|
||||
|
||||
.. code:: text
|
||||
.. code:: w
|
||||
|
||||
libvirt.libvirtError: invalid argument: could not find capabilities for arch=x86_64
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue