mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-12-10 21:49:07 -05:00
merge changes from pr #1508 excluding admin-api (only spaces in diff)
This commit is contained in:
commit
d05bb2b25b
7 changed files with 263 additions and 1536 deletions
|
|
@ -113,8 +113,8 @@ Answering an RPC call
|
|||
|
||||
In other for a RPC call to be answered in the target VM, a file in either of the following locations must exist, containing the file name of the program that will be invoked, or being that program itself – in which case it must have executable permission set (``chmod +x``):
|
||||
|
||||
- ``/etc/qubes-rpc/RPC_ACTION_NAME`` when you make it in the template qube;
|
||||
- ``/usr/local/etc/qubes-rpc/RPC_ACTION_NAME`` for making it only in an app qube.
|
||||
- ``/etc/qubes-rpc/RPC_ACTION_NAME`` when you make it in the template qube;
|
||||
- ``/usr/local/etc/qubes-rpc/RPC_ACTION_NAME`` for making it only in an app qube.
|
||||
|
||||
The source VM name can then be accessed in the server process via ``QREXEC_REMOTE_DOMAIN`` environment variable. (Note the source VM has *no* control over the name provided in this variable–the name of the VM is provided by dom0, and so is trusted.)
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue