doc: add default values to qvm-features man page

QubesOS/qubes-issues#
This commit is contained in:
Marek Marczykowski-Górecki 2017-08-10 15:26:55 +02:00
parent 414be0945d
commit 51a7b4493b
No known key found for this signature in database
GPG Key ID: 063938BA42CFA724

View File

@ -65,12 +65,17 @@ this feature to :py:obj:`True` enable gui-agent based GUI (i.e. with support of
tools installed inside of qube). Not setting this feature at all, enable showing
VGA emulated output.
Default: show emulated VGA output only
qrexec
^^^^^^
Qube has qrexec agent installed - i.e. it is possible to request staring a
command/service in there.
Default: assume qrexec not installed (do not wait for it while starting the
qube)
rpc-clipboard
^^^^^^^^^^^^^
@ -78,18 +83,24 @@ Use `qubes.ClipboardCopy` and `qubes.ClipboardPaste` qubes RPC services to
fetch/send clipboard content from/to this qube, instead of using GUI protocol.
This is supported (and required) by Qubes Windows Tools.
Default: use GUI protocol for clipboard operations
no-monitor-layout
^^^^^^^^^^^^^^^^^
When set to :py:pbj:`True`, monitor layout is not sent to this qube. That is
avoid calling `qubes.SetMonitorLayout` in this qube.
Default: send monitor layout
internal
^^^^^^^^
Internal qubes (with this feature set to :py:obj:`True`) are not included in the
menu.
Default: not internal VM
appmenus-legacy
^^^^^^^^^^^^^^^
@ -97,18 +108,24 @@ Generate legacy menu entries, using `qubes-desktop-run` command inside a VM,
instead of `qubes.StartApp` qrexec service. This is used for qubes imported from
previous Qubes version.
Default: new style menu entries, using `qubes.StartApp` service
appmenus-dispvm
^^^^^^^^^^^^^^^
Generate menu entries for starting applications in Disposable VM based on given
AppVM, instead of this AppVM directly.
Default: create menu entries for AppVM itself
qubes-firewall
^^^^^^^^^^^^^^
Setting this to :py:obj:`True` means that qube support enforcing firewall rules
set with `qvm-firewall` command.
Default: assume qubes-firewall not enforced
net.fake-ip
^^^^^^^^^^^
@ -118,23 +135,30 @@ qubes and it shouldn't cause any troubles (unless you want to two such qubes
communicate with each other). This feature does not affect address used in
firewall rules, routing tables etc.
Default: do not hide IP (qube's `ip` property) from the qube
net.fake-gateway
^^^^^^^^^^^^^^^^
Hide the real gateway of the qube from it, and configure it with value set to
this feature.
Default: do not hide geteway (qube's `gateway` property) from the qube
net.fake-netmask
^^^^^^^^^^^^^^^^
Hide the real netmask of the qube from it, and configure it with value set to
this feature.
Default: do not hide netmask (qube's `netmask` property) from the qube
updates-available
^^^^^^^^^^^^^^^^^
There are updates available.
Default: no updates available
Authors
-------