doc: add default values to qvm-features man page
QubesOS/qubes-issues#
This commit is contained in:
parent
414be0945d
commit
51a7b4493b
@ -65,12 +65,17 @@ this feature to :py:obj:`True` enable gui-agent based GUI (i.e. with support of
|
||||
tools installed inside of qube). Not setting this feature at all, enable showing
|
||||
VGA emulated output.
|
||||
|
||||
Default: show emulated VGA output only
|
||||
|
||||
qrexec
|
||||
^^^^^^
|
||||
|
||||
Qube has qrexec agent installed - i.e. it is possible to request staring a
|
||||
command/service in there.
|
||||
|
||||
Default: assume qrexec not installed (do not wait for it while starting the
|
||||
qube)
|
||||
|
||||
rpc-clipboard
|
||||
^^^^^^^^^^^^^
|
||||
|
||||
@ -78,18 +83,24 @@ Use `qubes.ClipboardCopy` and `qubes.ClipboardPaste` qubes RPC services to
|
||||
fetch/send clipboard content from/to this qube, instead of using GUI protocol.
|
||||
This is supported (and required) by Qubes Windows Tools.
|
||||
|
||||
Default: use GUI protocol for clipboard operations
|
||||
|
||||
no-monitor-layout
|
||||
^^^^^^^^^^^^^^^^^
|
||||
|
||||
When set to :py:pbj:`True`, monitor layout is not sent to this qube. That is
|
||||
avoid calling `qubes.SetMonitorLayout` in this qube.
|
||||
|
||||
Default: send monitor layout
|
||||
|
||||
internal
|
||||
^^^^^^^^
|
||||
|
||||
Internal qubes (with this feature set to :py:obj:`True`) are not included in the
|
||||
menu.
|
||||
|
||||
Default: not internal VM
|
||||
|
||||
appmenus-legacy
|
||||
^^^^^^^^^^^^^^^
|
||||
|
||||
@ -97,18 +108,24 @@ Generate legacy menu entries, using `qubes-desktop-run` command inside a VM,
|
||||
instead of `qubes.StartApp` qrexec service. This is used for qubes imported from
|
||||
previous Qubes version.
|
||||
|
||||
Default: new style menu entries, using `qubes.StartApp` service
|
||||
|
||||
appmenus-dispvm
|
||||
^^^^^^^^^^^^^^^
|
||||
|
||||
Generate menu entries for starting applications in Disposable VM based on given
|
||||
AppVM, instead of this AppVM directly.
|
||||
|
||||
Default: create menu entries for AppVM itself
|
||||
|
||||
qubes-firewall
|
||||
^^^^^^^^^^^^^^
|
||||
|
||||
Setting this to :py:obj:`True` means that qube support enforcing firewall rules
|
||||
set with `qvm-firewall` command.
|
||||
|
||||
Default: assume qubes-firewall not enforced
|
||||
|
||||
net.fake-ip
|
||||
^^^^^^^^^^^
|
||||
|
||||
@ -118,23 +135,30 @@ qubes and it shouldn't cause any troubles (unless you want to two such qubes
|
||||
communicate with each other). This feature does not affect address used in
|
||||
firewall rules, routing tables etc.
|
||||
|
||||
Default: do not hide IP (qube's `ip` property) from the qube
|
||||
|
||||
net.fake-gateway
|
||||
^^^^^^^^^^^^^^^^
|
||||
|
||||
Hide the real gateway of the qube from it, and configure it with value set to
|
||||
this feature.
|
||||
|
||||
Default: do not hide geteway (qube's `gateway` property) from the qube
|
||||
|
||||
net.fake-netmask
|
||||
^^^^^^^^^^^^^^^^
|
||||
|
||||
Hide the real netmask of the qube from it, and configure it with value set to
|
||||
this feature.
|
||||
|
||||
Default: do not hide netmask (qube's `netmask` property) from the qube
|
||||
|
||||
updates-available
|
||||
^^^^^^^^^^^^^^^^^
|
||||
|
||||
There are updates available.
|
||||
|
||||
Default: no updates available
|
||||
|
||||
Authors
|
||||
-------
|
||||
|
Loading…
Reference in New Issue
Block a user