This commit is contained in:
Axon 2015-10-28 22:14:40 +00:00
parent 2e68758b50
commit fc385586b6
No known key found for this signature in database
GPG key ID: 8CE137352A019A17
162 changed files with 638 additions and 508 deletions

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Upgrading the Fedora 18 Temlpate
permalink: /en/doc/fedora-template-upgrade-18/
permalink: /doc/fedora-template-upgrade-18/
redirect_from:
- /en/doc/fedora-template-upgrade-18/
- /doc/FedoraTemplateUpgrade18/
- /wiki/FedoraTemplateUpgrade/
---
@ -10,7 +11,7 @@ redirect_from:
Upgrading the Fedora 18 Temlpate
================================
(**Note:** There is a [newer version of this page for upgrading from Fedora 20 to Fedora 21](/en/doc/fedora-template-upgrade-20/).)
(**Note:** There is a [newer version of this page for upgrading from Fedora 20 to Fedora 21](/doc/fedora-template-upgrade-20/).)
This instruction in simplified version of [official Fedora instruction](https://fedoraproject.org/wiki/Upgrading_Fedora_using_yum). Note that only "yum" method will work in Qubes template VM (if you are curious why: mostly because template VM does not have own bootloader).

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Upgrading the Fedora 20 Template
permalink: /en/doc/fedora-template-upgrade-20/
permalink: /doc/fedora-template-upgrade-20/
redirect_from:
- /en/doc/fedora-template-upgrade-20/
- /doc/FedoraTemplateUpgrade20/
- /wiki/FedoraTemplateUpgrade20/
---
@ -197,7 +198,7 @@ As mentioned above, you may encounter the following `yum` error:
In this case, you have several options:
1. [Increase the TemplateVM's disk image size](/en/doc/resize-disk-image/).
1. [Increase the TemplateVM's disk image size](/doc/resize-disk-image/).
This is the solution mentioned in the main instructions above.
2. Delete files in order to free up space. One way to do this is by
uninstalling packages. You may then reinstalling them again after you

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Creating and Using HVM Domains
permalink: /en/doc/hvm-create/
permalink: /doc/hvm-create/
redirect_from:
- /en/doc/hvm-create/
- /doc/HvmCreate/
- /wiki/HvmCreate/
---
@ -195,12 +196,12 @@ In the near future we plan on introducing shared template also for HVM domains,
Installing Qubes support tools in Windows 7 VMs
-----------------------------------------------
Windows specific steps are described on [separate page](/en/doc/windows-appvms/).
Windows specific steps are described on [separate page](/doc/windows-appvms/).
Assigning PCI devices to HVM domains
------------------------------------
HVM domains (including Windows VMs) can be [assigned PCI devices](/en/doc/assigning-devices/) just like normal AppVMs. E.g. one can assign one of the USB controllers to the Windows VM and should be able to use various devices that require Windows software, such as phones, electronic devices that are configured via FTDI, etc.
HVM domains (including Windows VMs) can be [assigned PCI devices](/doc/assigning-devices/) just like normal AppVMs. E.g. one can assign one of the USB controllers to the Windows VM and should be able to use various devices that require Windows software, such as phones, electronic devices that are configured via FTDI, etc.
Once problem, however, at the moment, is that after the whole system gets suspend into S3 sleep, and subsequently resumed, such attached devices stop working and should be restarted within the VM. Under Windows this can be achieved by opening the Device Manager, selecting the actual device, such as a USB controller, and then first 'Disabling', and then 'Enabling' the device again. This is illustrated on the screenshot below:
@ -211,5 +212,5 @@ Further reading
Other documents related to HVM:
- [LinuxHVMTips](/en/doc/linux-hvm-tips/)
- [LinuxHVMTips](/doc/linux-hvm-tips/)

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Linux HVM Tips
permalink: /en/doc/linux-hvm-tips/
permalink: /doc/linux-hvm-tips/
redirect_from:
- /en/doc/linux-hvm-tips/
- /doc/LinuxHVMTips/
- /wiki/LinuxHVMTips/
---

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Templates
permalink: /en/doc/templates/
permalink: /doc/templates/
redirect_from:
- /en/doc/templates/
- /doc/Templates/
- /wiki/Templates/
---
@ -16,15 +17,15 @@ TemplateBasedVMs is installed. The default template is based on Fedora,
but there are additional templates based on other Linux distributions. There
are also templates available with or without certain software preinstalled. The
concept of TemplateVMs is initially described
[here](/en/doc/getting-started/#appvms-domains-and-templatevms). The technical
[here](/doc/getting-started/#appvms-domains-and-templatevms). The technical
details of this implementation are described in the developer documentation
[here](/en/doc/template-implementation/).
[here](/doc/template-implementation/).
Some templates are available in ready-to-use binary form, but some of them are
available only as source code, which can be built using
[Qubes Builder](/en/doc/qubes-builder/). In particular, some template "flavors"
[Qubes Builder](/doc/qubes-builder/). In particular, some template "flavors"
are available in source code form only. Take a look at the [Qubes Builder
documentation](/en/doc/qubes-builder/) for instructions on how to compile them.
documentation](/doc/qubes-builder/) for instructions on how to compile them.
ITL Supported templates
@ -35,8 +36,8 @@ for. ITL guarantees that the binary updates are compiled from exactly the same
source code as we publish.
* Fedora (default base template)
* [Fedora - Minimal](/en/doc/templates/fedora-minimal)
* [Debian](/en/doc/templates/debian/)
* [Fedora - Minimal](/doc/templates/fedora-minimal)
* [Debian](/doc/templates/debian/)
Community Supported templates
@ -52,9 +53,9 @@ By installing these templates, you are trusting not only ITL and the
distribution maintainers, but also the template maintainer. In addition,
these templates may be somewhat less stable, since ITL does not test them.
* [Whonix](/en/doc/templates/whonix/)
* [Ubuntu](/en/doc/templates/ubuntu/)
* [Archlinux](/en/doc/templates/archlinux/)
* [Whonix](/doc/templates/whonix/)
* [Ubuntu](/doc/templates/ubuntu/)
* [Archlinux](/doc/templates/archlinux/)
Important Notes

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Archlinux Template
permalink: /en/doc/templates/archlinux/
permalink: /doc/templates/archlinux/
redirect_from:
- /en/doc/templates/archlinux/
- /doc/Templates/Archlinux/
- /wiki/Templates/Archlinux/
---
@ -27,7 +28,7 @@ Install
-------
Currently we do not ship ready to use binary package. It can be compiled using
[this instructions](/en/doc/building-archlinux-template/).
[this instructions](/doc/building-archlinux-template/).
Olivier provides binary package build by himself, you can get it for:
* Qubes R2 [here](https://groups.google.com/d/msgid/qubes-devel/54CE3FB1.3050708%40yahoo.fr).
@ -38,4 +39,4 @@ Olivier provides binary package build by himself, you can get it for:
Known issues
------------
If you want to help in improving the template, feel free to [contribute](/en/doc/contributing/).
If you want to help in improving the template, feel free to [contribute](/doc/contributing/).

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Debian Template
permalink: /en/doc/templates/debian/
permalink: /doc/templates/debian/
redirect_from:
- /en/doc/templates/debian/
- /doc/Templates/Debian/
- /wiki/Templates/Debian/
---

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Fedora Minimal Template
permalink: /en/doc/templates/fedora-minimal/
permalink: /doc/templates/fedora-minimal/
redirect_from:
- /en/doc/templates/fedora-minimal/
- /doc/Templates/FedoraMinimal/
- /wiki/Templates/FedoraMinimal/
---

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Ubuntu Template
permalink: /en/doc/templates/ubuntu/
permalink: /doc/templates/ubuntu/
redirect_from:
- /en/doc/templates/ubuntu/
- /doc/Templates/Ubuntu/
- /wiki/Templates/Ubuntu/
---
@ -20,7 +21,7 @@ to redistribute a modified Ubuntu. The redistribution is not allowed by their
Install
-------
It can built using [Qubes Builder](/en/doc/qubes-builder/). You can also access its
It can built using [Qubes Builder](/doc/qubes-builder/). You can also access its
documentation in the [source code
repository](https://github.com/QubesOS/qubes-builder/blob/master/README.md).

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Whonix template
permalink: /en/doc/templates/whonix/
permalink: /doc/templates/whonix/
redirect_from:
- /en/doc/templates/whonix/
- /doc/Templates/Whonix/
- /wiki/Templates/Whonix/
---

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Uninstalling Windows Tools 2
permalink: /en/doc/uninstalling-windows-tools-2/
permalink: /doc/uninstalling-windows-tools-2/
redirect_from:
- /en/doc/uninstalling-windows-tools-2/
- /doc/UninstallingWindowsTools2/
- /wiki/UninstallingWindowsTools2/
---

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Windows AppVms
permalink: /en/doc/windows-appvms/
permalink: /doc/windows-appvms/
redirect_from:
- /en/doc/windows-appvms/
- /doc/WindowsAppVms/
- /wiki/WindowsAppVms/
---
@ -15,8 +16,8 @@ Qubes provides special support for running Windows-based AppVMs. This requires t
Qubes support tools for Windows is a set of programs and drivers that provide integration of Windows AppVMs with the rest of the Qubes system. Currently the following features are available for Windows VMs after installation of those tools:
- Seamless GUI mode that integrates apps windows onto the common Qubes trusted desktop (available on Qubes R2 Beta 3 and later)
- Support for [secure clipboard copy/paste](/en/doc/copy-paste/) between the Windows VM and other AppVMs
- Support for [secure file exchange](/en/doc/copying-files/) between the Windows VM and other AppVMs
- Support for [secure clipboard copy/paste](/doc/copy-paste/) between the Windows VM and other AppVMs
- Support for [secure file exchange](/doc/copying-files/) between the Windows VM and other AppVMs
- Support for qvm-run and generic qrexec for the Windows VM (e.g. ability to run custom service within/from the Windows VM)
- Xen PV drivers for Windows that increase performance compared to qemu emulated devices
@ -27,7 +28,7 @@ NOTE: Currently only 64-bit versions of Windows 7 are support by Qubes Windows T
Installing Windows OS in a Qubes VM
-----------------------------------
Please refer to [this page](/en/doc/hvm-create/) for instructions on how to install Windows in a Qubes VM.
Please refer to [this page](/doc/hvm-create/) for instructions on how to install Windows in a Qubes VM.
Installing Qubes support tools in Windows 7 VMs
-----------------------------------------------
@ -103,7 +104,7 @@ Qubes allows HVM VMs to share a common root filesystem from a select Template VM
qvm-create --hvm-template win7-x64-template -l green
~~~
... and install Windows OS (or other OS) into this template the same way as you would install it into a normal HVM -- please see [this page](/en/doc/hvm-create/) instructions. However, it would make lots of sense to store the `C:\Users` directory on the 2nd disk which is automatically exposed by Qubes to all HVMs. This 2nd disk is backed by the `private.img` file in the AppVMs' and is not reset upon AppVMs reboot, so the user's directories and profiles would survive the AppVMs reboot, unlike the "root" filesystem which will be reverted to the "golden image" from the Template VM automatically. To facilitate such separation of user profiles, Qubes Windows Tools provide an option to automatically move `C:\Users` directory to the 2nd disk backed by `private.img`. It's a selectable feature of the installer, enabled by default. If that feature is selected during installation, completion of the process requires two reboots:
... and install Windows OS (or other OS) into this template the same way as you would install it into a normal HVM -- please see [this page](/doc/hvm-create/) instructions. However, it would make lots of sense to store the `C:\Users` directory on the 2nd disk which is automatically exposed by Qubes to all HVMs. This 2nd disk is backed by the `private.img` file in the AppVMs' and is not reset upon AppVMs reboot, so the user's directories and profiles would survive the AppVMs reboot, unlike the "root" filesystem which will be reverted to the "golden image" from the Template VM automatically. To facilitate such separation of user profiles, Qubes Windows Tools provide an option to automatically move `C:\Users` directory to the 2nd disk backed by `private.img`. It's a selectable feature of the installer, enabled by default. If that feature is selected during installation, completion of the process requires two reboots:
- The private disk is initialized and formatted on the first reboot after tools installation. It can't be done **during** the installation because Xen mass storage drivers are not yet active.
- User profiles are moved to the private disk on the next reboot after the private disk is initialized. Reboot is required because the "mover utility" runs very early in the boot process so OS can't yet lock any files in there. This can take some time depending on the profiles' size and because the GUI agent is not yet active dom0/Qubes Manager may complain that the AppVM failed to boot. That's a false alarm (you can increase AppVM's default boot timeout using `qvm-prefs`), the VM should appear "green" in Qubes Manager shortly after.

View file

@ -1,8 +1,9 @@
---
layout: doc
title: Windows Tools 2
permalink: /en/doc/windows-tools-2/
permalink: /doc/windows-tools-2/
redirect_from:
- /en/doc/windows-tools-2/
- /doc/WindowsTools2/
- /wiki/WindowsTools2/
---
@ -36,7 +37,7 @@ If the install process fails you can retry it using the command line below to ge
Uninstalling
------------
See [this page](/en/doc/uninstalling-windows-tools-2/).
See [this page](/doc/uninstalling-windows-tools-2/).
Configuration
-------------

View file

@ -1,13 +1,12 @@
---
layout: doc
title: Windows Tools 3
permalink: /en/doc/windows-tools-3/
permalink: /doc/windows-tools-3/
redirect_from:
- /en/doc/windows-tools-3/
- /doc/WindowsTools3/
- /wiki/WindowsTools/
redirect_from:
-
- /doc/WindowsTools/
- /wiki/WindowsTools/
---
Qubes Tools for Windows: advanced settings and troubleshooting