mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-29 01:06:24 -05:00
8a6890174d
Addresses without a slash are redirected to a version with slash, but with forced protocol http instead of https.
24 lines
933 B
Markdown
24 lines
933 B
Markdown
---
|
|
layout: doc
|
|
title: QubesService
|
|
permalink: /doc/QubesService/
|
|
redirect_from: /wiki/QubesService/
|
|
---
|
|
|
|
Usage documentation is on [qvm-service manual page](/doc/Dom0Tools/QvmService/). There are also described predefined services.
|
|
|
|
Under the hood enabled service in VM is signaled by file in /var/run/qubes-service. This can be used to implement almost enable/disable **per-VM** switch controlled by dom0. Adding support for systemd services is pretty simple:
|
|
|
|
1. Disable old service: `systemctl disable <service name>`
|
|
2. Create `/etc/systemd/system/<service name>.service` file containing:
|
|
|
|
{% highlight trac-wiki %}
|
|
.include /lib/systemd/system/<service name>.service
|
|
[Unit]
|
|
ConditionPathExists=/var/run/qubes-service/<service name>
|
|
{% endhighlight %}
|
|
|
|
3. Enable new service: `systemctl enable <service name>`.
|
|
|
|
This will cause service to be started only when you enable it with qvm-service for given VM.
|