mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-07 14:12:18 -04:00
Correct code-block lexers
Changing `bash` lexer to `console` because it is appropriate most of the time. Then after a manual review, some lexer have been changed. I used `text` each time I was unsure, and for prompt outputs. The page `/developer/building/qubes-iso-building.rst` still need to be reviewed (look for lines starting with `$ #`). I'm not sure about the Windows pages, should we use [doscon](https://pygments.org/docs/lexers/#pygments.lexers.shell.MSDOSSessionLexer) or `powershell`? Is there an appropriate lexer for `guid.conf` content? **Statistics - Before** 870 bash 9 python 9 c 2 yaml **Statistics - After** 684 console 111 text 44 bash 16 yaml 9 systemd 9 c 8 python 4 ini 4 doscon 2 markdown 2 desktop 1 xorg.conf 1 xml+jinja 1 xml 1 kconfig 1 html This suggests that the default lexer should be `console`.
This commit is contained in:
parent
b53776e1eb
commit
ba399ac488
98 changed files with 1022 additions and 1029 deletions
|
@ -31,7 +31,7 @@ Note that dom0 in R2 is based on Fedora 20, in contrast to Fedora 18 in previous
|
|||
|
||||
2. Install all the updates for Dom0:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update
|
||||
|
||||
|
@ -49,7 +49,7 @@ After this step you should have ``qubes-release-2-5`` in your Dom0. Important: i
|
|||
|
||||
**Note:** be sure that the VM used as a update-downloading-vm (by default its the firewallvm based on the default template) has been updated to the latest Qubes packages, specifically ``qubes-core-vm-2.1.33`` or later. This doesn’t imply that the VM must already be upgraded to fc20 – for Dom0 upgrade we could still use an fc18-based VM (updatevm) it is only important to install the latest Qubes packages there.
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-dom0-dist-upgrade
|
||||
sudo qubes-dom0-update
|
||||
|
@ -64,7 +64,7 @@ After this step you should have ``qubes-release-2-5`` in your Dom0. Important: i
|
|||
|
||||
4a. If you chose not to upgrade your fc18 templates, but instead to download our new fc20-based template you should now be able to do that by simply typing:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-template-fedora-20-x64
|
||||
|
||||
|
|
|
@ -19,7 +19,7 @@ By default, in Qubes R1, there is only one template, however users are free to c
|
|||
|
||||
2. Install ``qubes-upgrade-vm`` package (this package brings in R2 repo definitions and R2 keys)
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum install qubes-upgrade-vm
|
||||
|
||||
|
@ -27,14 +27,14 @@ By default, in Qubes R1, there is only one template, however users are free to c
|
|||
|
||||
3. Proceed with normal update in the template (this should bring in also the R2 packages for the VMs):
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum update
|
||||
|
||||
|
||||
The installer (yum) will prompt to accept the new Qubes R2 signing key:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
Importing GPG key 0x0A40E458:
|
||||
Userid : "Qubes OS Release 2 Signing Key"
|
||||
|
@ -70,7 +70,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
2. Upgrade the ``qubes-release`` package to the latest version which brings in new repo definitions and R2 signing keys:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-release
|
||||
|
||||
|
@ -79,7 +79,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
3. Install R2 packages:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --releasever=2
|
||||
|
||||
|
|
|
@ -17,7 +17,7 @@ By default, in Qubes R1, there is only one template, however users are free to c
|
|||
|
||||
2. Install ``qubes-upgrade-vm`` package (this package brings in R2 repo definitions and R2 keys)
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum install qubes-upgrade-vm
|
||||
|
||||
|
@ -25,14 +25,14 @@ By default, in Qubes R1, there is only one template, however users are free to c
|
|||
|
||||
3. Proceed with normal update in the template (this should bring in also the R2 packages for the VMs):
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum update
|
||||
|
||||
|
||||
The installer (yum) will prompt to accept the new Qubes R2 signing key:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
Importing GPG key 0x0A40E458:
|
||||
Userid : "Qubes OS Release 2 Signing Key"
|
||||
|
@ -86,7 +86,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
2. Upgrade the ``qubes-release`` package to the latest version which brings in new repo definitions and R2 signing keys:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-release
|
||||
|
||||
|
@ -95,7 +95,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
3. Install R2 upgrade package:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --releasever=1 qubes-dist-upgrade
|
||||
|
||||
|
@ -103,7 +103,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
4. Start upgrade process:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dist-upgrade
|
||||
|
||||
|
@ -115,7 +115,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
7. When system starts up, login and start start
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dist-upgrade
|
||||
|
||||
|
|
|
@ -21,7 +21,7 @@ It is critical to complete this step **before** proceeding to dom0 upgrade. Othe
|
|||
|
||||
2. Proceed with normal update in the template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum update
|
||||
|
||||
|
@ -29,7 +29,7 @@ It is critical to complete this step **before** proceeding to dom0 upgrade. Othe
|
|||
|
||||
3. Ensure that you’ve got qubes-core-vm package version 2.1.13-3.fc18:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
rpm -q qubes-core-vm
|
||||
|
||||
|
@ -37,7 +37,7 @@ It is critical to complete this step **before** proceeding to dom0 upgrade. Othe
|
|||
|
||||
4. Update the system to R2 beta3 packages:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum --enablerepo=qubes-vm-r2b3-current update
|
||||
|
||||
|
@ -57,7 +57,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
2. Upgrade the ``qubes-release`` package to the latest version which brings in new repo definitions and R2 signing keys:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-release
|
||||
|
||||
|
@ -66,7 +66,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
3. Upgrade dom0 to R2 beta3:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --enablerepo=qubes-dom0-r2b3-current
|
||||
|
||||
|
@ -76,7 +76,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
5. Now is the time to shutdown all the VMs:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
qvm-shutdown --all --wait
|
||||
|
||||
|
|
|
@ -27,7 +27,7 @@ Upgrade Fedora template:
|
|||
|
||||
2. Install ``qubes-upgrade-vm`` package:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum install qubes-upgrade-vm
|
||||
|
||||
|
@ -35,7 +35,7 @@ Upgrade Fedora template:
|
|||
|
||||
3. Proceed with normal update in the template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum update
|
||||
|
||||
|
@ -54,7 +54,7 @@ Upgrade Debian template:
|
|||
|
||||
2. Update repository definition:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo cp /etc/apt/sources.list.d/qubes-r2.list
|
||||
/etc/apt/sources.list.d/qubes-r3-upgrade.list
|
||||
|
@ -64,7 +64,7 @@ Upgrade Debian template:
|
|||
|
||||
3. Proceed with normal update in the template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo apt-get update
|
||||
sudo apt-get dist-upgrade
|
||||
|
@ -86,7 +86,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
2. Upgrade the ``qubes-release`` package to the latest version which brings in new repo definitions and R2 signing keys:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-release
|
||||
|
||||
|
@ -95,7 +95,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
3. Upgrade dom0 to R3.0:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --releasever=3.0
|
||||
|
||||
|
@ -106,7 +106,7 @@ Be sure to do steps described in this section after *all* your template and stan
|
|||
|
||||
5. Enable Xen services:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo systemctl enable xenconsoled.service xenstored.service
|
||||
|
||||
|
@ -124,7 +124,7 @@ Please note that if you use Anti Evil Maid, then it won’t be able to unseal th
|
|||
|
||||
Now, when you have dom0 upgraded, you can install new templates from Qubes R3.0 repositories. Especially Fedora 21 - default Qubes R3.0 template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-template-fedora-21
|
||||
|
||||
|
@ -161,7 +161,7 @@ Because of above limitations, you will need to configure some of those manually.
|
|||
|
||||
2. Start the VM from command line:
|
||||
|
||||
.. code::
|
||||
.. code:: console
|
||||
|
||||
[user@dom0 ~]$ qvm-start custom-template
|
||||
--> Loading the VM (type = template)...
|
||||
|
@ -177,14 +177,14 @@ Because of above limitations, you will need to configure some of those manually.
|
|||
|
||||
3. Access VM console:
|
||||
|
||||
.. code::
|
||||
.. code:: console
|
||||
|
||||
[user@dom0 ~]$ virsh -c xen:/// console custom-template
|
||||
|
||||
|
||||
4. Configure network according to parameters retrieved in first step:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
ip addr add 10.137.1.53/32 dev eth0
|
||||
ip route add 10.137.1.1/32 dev eth0
|
||||
|
|
|
@ -21,7 +21,7 @@ Upgrade Fedora templates:
|
|||
|
||||
2. Install the ``qubes-upgrade-vm`` package:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum install qubes-upgrade-vm
|
||||
|
||||
|
@ -29,7 +29,7 @@ Upgrade Fedora templates:
|
|||
|
||||
3. Proceed with a normal upgrade in the template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo yum upgrade
|
||||
|
||||
|
@ -47,7 +47,7 @@ Upgrade Debian (and Whonix) templates:
|
|||
|
||||
2. Update repository definition:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo cp /etc/apt/sources.list.d/qubes-r3.list /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
||||
sudo sed -i 's/r3.0/r3.1/' /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
||||
|
@ -56,7 +56,7 @@ Upgrade Debian (and Whonix) templates:
|
|||
|
||||
3. Proceed with a normal update in the template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo apt-get update
|
||||
sudo apt-get dist-upgrade
|
||||
|
@ -65,7 +65,7 @@ Upgrade Debian (and Whonix) templates:
|
|||
|
||||
4. Remove unnecessary now file:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo rm -f /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
||||
|
||||
|
@ -85,7 +85,7 @@ Upgrading dom0
|
|||
|
||||
2. Upgrade dom0 to R3.1:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --releasever=3.1
|
||||
|
||||
|
@ -108,7 +108,7 @@ If you use USB VM, you may encounter problem with starting it on updated Xen ver
|
|||
|
||||
Once you have upgraded dom0, you can install new templates from Qubes R3.1 repositories, in particular the new default Fedora 23 template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update qubes-template-fedora-23
|
||||
|
||||
|
|
|
@ -17,7 +17,7 @@ Upgrading dom0
|
|||
|
||||
3. Install ``qubes-release`` package carrying R3.2 repository information.
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update --releasever=3.2 qubes-release
|
||||
|
||||
|
@ -29,7 +29,7 @@ Upgrading dom0
|
|||
|
||||
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update systemd-compat-libs perl-libwww-perl perl-Term-ANSIColor perl-Term-Cap gdk-pixbuf2-xlib speexdsp qubes-mgmt-salt-admin-tools lvm2
|
||||
(...)
|
||||
|
@ -37,7 +37,7 @@ Upgrading dom0
|
|||
===============================================================
|
||||
Install 16 Packages (+ 31 Dependent packages)
|
||||
Upgrade 4 Packages (+200 Dependent packages)
|
||||
|
||||
|
||||
Total download size: 173 M
|
||||
Is this ok [y/d/N]: n
|
||||
Exiting on user command
|
||||
|
@ -48,7 +48,7 @@ Upgrading dom0
|
|||
|
||||
4. Upgrade dom0 to R3.2:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update
|
||||
|
||||
|
@ -66,7 +66,7 @@ Upgrading dom0
|
|||
|
||||
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
warning: /etc/salt/minion.d/f_defaults.conf created as /etc/salt/minion.d/f_defaults.conf.rpmnew
|
||||
|
||||
|
@ -76,7 +76,7 @@ Upgrading dom0
|
|||
|
||||
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
rm -f /etc/group.rpmnew
|
||||
rm -f /etc/shadow.rpmnew
|
||||
|
@ -116,7 +116,7 @@ Upgrade Fedora templates:
|
|||
|
||||
2. Install the ``qubes-upgrade-vm`` package:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo dnf install --refresh qubes-upgrade-vm
|
||||
|
||||
|
@ -124,7 +124,7 @@ Upgrade Fedora templates:
|
|||
|
||||
3. Proceed with a normal upgrade in the template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo dnf upgrade --refresh
|
||||
|
||||
|
@ -132,7 +132,7 @@ Upgrade Fedora templates:
|
|||
|
||||
4. Add new packages (only needed in default template):
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo dnf install qubes-mgmt-salt-vm-connector
|
||||
|
||||
|
@ -150,7 +150,7 @@ Upgrade Debian (and Whonix) templates:
|
|||
|
||||
2. Update repository definition:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo cp /etc/apt/sources.list.d/qubes-r3.list /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
||||
sudo sed -i 's/r3.1/r3.2/' /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
||||
|
@ -159,7 +159,7 @@ Upgrade Debian (and Whonix) templates:
|
|||
|
||||
3. Proceed with a normal update in the template:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo apt-get update
|
||||
sudo apt-get dist-upgrade
|
||||
|
@ -168,7 +168,7 @@ Upgrade Debian (and Whonix) templates:
|
|||
|
||||
4. Add new packages (only needed in default template):
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo apt-get install qubes-mgmt-salt-vm-connector
|
||||
|
||||
|
@ -176,7 +176,7 @@ Upgrade Debian (and Whonix) templates:
|
|||
|
||||
5. Remove unnecessary now file:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo rm -f /etc/apt/sources.list.d/qubes-r3-upgrade.list
|
||||
|
||||
|
|
|
@ -63,7 +63,7 @@ Restore from your backup
|
|||
|
||||
2. Since patches may have been released since your installation image was created, update Qubes R4.0 by going to the dom0 command line (**Qubes menu -> Terminal Emulator**) then running:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update
|
||||
|
||||
|
|
|
@ -37,7 +37,7 @@ The upgrade may take several hours, and will download several gigabytes of data.
|
|||
|
||||
In place upgrade is a complex operation. For this reason, we provide a ``qubes-dist-upgrade`` tool to handle all the necessary steps automatically. You can install it with the following command in the dom0 terminal:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update -y qubes-dist-upgrade
|
||||
|
||||
|
@ -47,12 +47,12 @@ The upgrade consists of seven stages — six before restarting the system — la
|
|||
|
||||
Full list of options can be obtained with ``qubes-dist-upgrade --help``:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
Usage: qubes-dist-upgrade [OPTIONS]...
|
||||
|
||||
|
||||
This script is used for updating current QubesOS R4.0 to R4.1.
|
||||
|
||||
|
||||
Options:
|
||||
--double-metadata-size, -d (STAGE 0) Double current LVM thin pool metadata size.
|
||||
--update, -t (STAGE 1) Update of dom0, TemplatesVM and StandaloneVM.
|
||||
|
@ -61,7 +61,7 @@ Full list of options can be obtained with ``qubes-dist-upgrade --help``:
|
|||
--dist-upgrade, -s (STAGE 4) Upgrade to Qubes R4.1 and Fedora 32 repositories.
|
||||
--setup-efi-grub, -g (STAGE 5) Setup EFI Grub.
|
||||
--all, -a Execute all the above stages in one call.
|
||||
|
||||
|
||||
--assumeyes, -y Automatically answer yes for all questions.
|
||||
--usbvm, -u Current UsbVM defined (default 'sys-usb').
|
||||
--netvm, -n Current NetVM defined (default 'sys-net').
|
||||
|
@ -74,7 +74,7 @@ Full list of options can be obtained with ``qubes-dist-upgrade --help``:
|
|||
Can be useful if multiple updates proxy VMs are configured.
|
||||
--max-concurrency How many TemplateVM/StandaloneVM to update in parallel in STAGE 1
|
||||
(default 4).
|
||||
|
||||
|
||||
--resync-appmenus-features Resync applications and features. To be ran individually
|
||||
after reboot.
|
||||
|
||||
|
@ -82,7 +82,7 @@ Full list of options can be obtained with ``qubes-dist-upgrade --help``:
|
|||
|
||||
After installing the tool, upgrade can be performed all at once with:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dist-upgrade --all
|
||||
|
||||
|
@ -94,7 +94,7 @@ Alternatively, each upgrade stage can be started separately (see the list of opt
|
|||
|
||||
After completing “STAGE 0” through “STAGE 5”, restart the system. Then perform the final step:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dist-upgrade --resync-appmenus-features
|
||||
|
||||
|
|
|
@ -21,7 +21,7 @@ If you would prefer to perform a clean installation rather than upgrading in-pla
|
|||
|
||||
2. Install the ``qubes-dist-upgrade`` tool. This is the inplace upgrade tool, which is not what we’re doing. However it will be needed in order to prepare the templates for the 4.2 version. You install it with the following command in the dom0 terminal:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update -y qubes-dist-upgrade
|
||||
|
||||
|
@ -29,7 +29,7 @@ If you would prefer to perform a clean installation rather than upgrading in-pla
|
|||
|
||||
3. Change your templates to use the 4.2 repositories instead of the 4.1 ones. You do this with the following command in the dom0 terminal:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
qubes-dist-upgrade --template-standalone-upgrade
|
||||
|
||||
|
@ -56,7 +56,7 @@ The upgrade may take several hours, and will download several gigabytes of data.
|
|||
|
||||
In place upgrade is a complex operation. For this reason, we provide a ``qubes-dist-upgrade`` tool to handle all the necessary steps automatically. You can install it with the following command in the dom0 terminal:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dom0-update -y qubes-dist-upgrade
|
||||
|
||||
|
@ -66,12 +66,12 @@ The upgrade consists of six stages — three before restarting the system — la
|
|||
|
||||
Full list of options can be obtained with ``qubes-dist-upgrade --help``:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: text
|
||||
|
||||
Usage: qubes-dist-upgrade [OPTIONS]...
|
||||
|
||||
|
||||
This script is used for updating current QubesOS R4.1 to R4.2.
|
||||
|
||||
|
||||
Options:
|
||||
--update, -t (STAGE 1) Update of dom0, TemplatesVM and StandaloneVM.
|
||||
--release-upgrade, -r (STAGE 2) Update 'qubes-release' for Qubes R4.2.
|
||||
|
@ -84,7 +84,7 @@ Full list of options can be obtained with ``qubes-dist-upgrade --help``:
|
|||
to the new format in /etc/qubes/policy.d.
|
||||
--all-pre-reboot Execute stages 1 to 3
|
||||
--all-post-reboot Execute stages 4 to 6
|
||||
|
||||
|
||||
--assumeyes, -y Automatically answer yes for all questions.
|
||||
--usbvm, -u Current UsbVM defined (default 'sys-usb').
|
||||
--netvm, -n Current NetVM defined (default 'sys-net').
|
||||
|
@ -102,7 +102,7 @@ Full list of options can be obtained with ``qubes-dist-upgrade --help``:
|
|||
|
||||
After installing the tool, before-reboot stages can be performed at once with:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dist-upgrade --all-pre-reboot
|
||||
|
||||
|
@ -114,7 +114,7 @@ Alternatively, each upgrade stage can be started separately (see the list of opt
|
|||
|
||||
After completing “STAGE 1” through “STAGE 3”, restart the system. Then perform the final steps:
|
||||
|
||||
.. code:: bash
|
||||
.. code:: console
|
||||
|
||||
sudo qubes-dist-upgrade --all-post-reboot
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue