Forráskód Böngészése

doc: add default values to qvm-features man page

QubesOS/qubes-issues#
Marek Marczykowski-Górecki 6 éve
szülő
commit
51a7b4493b
1 módosított fájl, 24 hozzáadás és 0 törlés
  1. 24 0
      doc/manpages/qvm-features.rst

+ 24 - 0
doc/manpages/qvm-features.rst

@@ -65,12 +65,17 @@ this feature to :py:obj:`True` enable gui-agent based GUI (i.e. with support of
 tools installed inside of qube). Not setting this feature at all, enable showing
 VGA emulated output.
 
+Default: show emulated VGA output only
+
 qrexec
 ^^^^^^
 
 Qube has qrexec agent installed - i.e. it is possible to request staring a
 command/service in there.
 
+Default: assume qrexec not installed (do not wait for it while starting the
+qube)
+
 rpc-clipboard
 ^^^^^^^^^^^^^
 
@@ -78,18 +83,24 @@ Use `qubes.ClipboardCopy` and `qubes.ClipboardPaste` qubes RPC services to
 fetch/send clipboard content from/to this qube, instead of using GUI protocol.
 This is supported (and required) by Qubes Windows Tools.
 
+Default: use GUI protocol for clipboard operations
+
 no-monitor-layout
 ^^^^^^^^^^^^^^^^^
 
 When set to :py:pbj:`True`, monitor layout is not sent to this qube. That is
 avoid calling `qubes.SetMonitorLayout` in this qube.
 
+Default: send monitor layout
+
 internal
 ^^^^^^^^
 
 Internal qubes (with this feature set to :py:obj:`True`) are not included in the
 menu.
 
+Default: not internal VM
+
 appmenus-legacy
 ^^^^^^^^^^^^^^^
 
@@ -97,18 +108,24 @@ Generate legacy menu entries, using `qubes-desktop-run` command inside a VM,
 instead of `qubes.StartApp` qrexec service. This is used for qubes imported from
 previous Qubes version.
 
+Default: new style menu entries, using `qubes.StartApp` service
+
 appmenus-dispvm
 ^^^^^^^^^^^^^^^
 
 Generate menu entries for starting applications in Disposable VM based on given
 AppVM, instead of this AppVM directly.
 
+Default: create menu entries for AppVM itself
+
 qubes-firewall
 ^^^^^^^^^^^^^^
 
 Setting this to :py:obj:`True` means that qube support enforcing firewall rules
 set with `qvm-firewall` command.
 
+Default: assume qubes-firewall not enforced
+
 net.fake-ip
 ^^^^^^^^^^^
 
@@ -118,23 +135,30 @@ qubes and it shouldn't cause any troubles (unless you want to two such qubes
 communicate with each other). This feature does not affect address used in
 firewall rules, routing tables etc.
 
+Default: do not hide IP (qube's `ip` property) from the qube
+
 net.fake-gateway
 ^^^^^^^^^^^^^^^^
 
 Hide the real gateway of the qube from it, and configure it with value set to
 this feature.
 
+Default: do not hide geteway (qube's `gateway` property) from the qube
+
 net.fake-netmask
 ^^^^^^^^^^^^^^^^
 
 Hide the real netmask of the qube from it, and configure it with value set to
 this feature.
 
+Default: do not hide netmask (qube's `netmask` property) from the qube
+
 updates-available
 ^^^^^^^^^^^^^^^^^
 
 There are updates available.
 
+Default: no updates available
 
 Authors
 -------