doc: add default values to qvm-features man page
QubesOS/qubes-issues#
This commit is contained in:
parent
414be0945d
commit
51a7b4493b
@ -65,12 +65,17 @@ this feature to :py:obj:`True` enable gui-agent based GUI (i.e. with support of
|
|||||||
tools installed inside of qube). Not setting this feature at all, enable showing
|
tools installed inside of qube). Not setting this feature at all, enable showing
|
||||||
VGA emulated output.
|
VGA emulated output.
|
||||||
|
|
||||||
|
Default: show emulated VGA output only
|
||||||
|
|
||||||
qrexec
|
qrexec
|
||||||
^^^^^^
|
^^^^^^
|
||||||
|
|
||||||
Qube has qrexec agent installed - i.e. it is possible to request staring a
|
Qube has qrexec agent installed - i.e. it is possible to request staring a
|
||||||
command/service in there.
|
command/service in there.
|
||||||
|
|
||||||
|
Default: assume qrexec not installed (do not wait for it while starting the
|
||||||
|
qube)
|
||||||
|
|
||||||
rpc-clipboard
|
rpc-clipboard
|
||||||
^^^^^^^^^^^^^
|
^^^^^^^^^^^^^
|
||||||
|
|
||||||
@ -78,18 +83,24 @@ Use `qubes.ClipboardCopy` and `qubes.ClipboardPaste` qubes RPC services to
|
|||||||
fetch/send clipboard content from/to this qube, instead of using GUI protocol.
|
fetch/send clipboard content from/to this qube, instead of using GUI protocol.
|
||||||
This is supported (and required) by Qubes Windows Tools.
|
This is supported (and required) by Qubes Windows Tools.
|
||||||
|
|
||||||
|
Default: use GUI protocol for clipboard operations
|
||||||
|
|
||||||
no-monitor-layout
|
no-monitor-layout
|
||||||
^^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
When set to :py:pbj:`True`, monitor layout is not sent to this qube. That is
|
When set to :py:pbj:`True`, monitor layout is not sent to this qube. That is
|
||||||
avoid calling `qubes.SetMonitorLayout` in this qube.
|
avoid calling `qubes.SetMonitorLayout` in this qube.
|
||||||
|
|
||||||
|
Default: send monitor layout
|
||||||
|
|
||||||
internal
|
internal
|
||||||
^^^^^^^^
|
^^^^^^^^
|
||||||
|
|
||||||
Internal qubes (with this feature set to :py:obj:`True`) are not included in the
|
Internal qubes (with this feature set to :py:obj:`True`) are not included in the
|
||||||
menu.
|
menu.
|
||||||
|
|
||||||
|
Default: not internal VM
|
||||||
|
|
||||||
appmenus-legacy
|
appmenus-legacy
|
||||||
^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
@ -97,18 +108,24 @@ Generate legacy menu entries, using `qubes-desktop-run` command inside a VM,
|
|||||||
instead of `qubes.StartApp` qrexec service. This is used for qubes imported from
|
instead of `qubes.StartApp` qrexec service. This is used for qubes imported from
|
||||||
previous Qubes version.
|
previous Qubes version.
|
||||||
|
|
||||||
|
Default: new style menu entries, using `qubes.StartApp` service
|
||||||
|
|
||||||
appmenus-dispvm
|
appmenus-dispvm
|
||||||
^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
Generate menu entries for starting applications in Disposable VM based on given
|
Generate menu entries for starting applications in Disposable VM based on given
|
||||||
AppVM, instead of this AppVM directly.
|
AppVM, instead of this AppVM directly.
|
||||||
|
|
||||||
|
Default: create menu entries for AppVM itself
|
||||||
|
|
||||||
qubes-firewall
|
qubes-firewall
|
||||||
^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^
|
||||||
|
|
||||||
Setting this to :py:obj:`True` means that qube support enforcing firewall rules
|
Setting this to :py:obj:`True` means that qube support enforcing firewall rules
|
||||||
set with `qvm-firewall` command.
|
set with `qvm-firewall` command.
|
||||||
|
|
||||||
|
Default: assume qubes-firewall not enforced
|
||||||
|
|
||||||
net.fake-ip
|
net.fake-ip
|
||||||
^^^^^^^^^^^
|
^^^^^^^^^^^
|
||||||
|
|
||||||
@ -118,23 +135,30 @@ qubes and it shouldn't cause any troubles (unless you want to two such qubes
|
|||||||
communicate with each other). This feature does not affect address used in
|
communicate with each other). This feature does not affect address used in
|
||||||
firewall rules, routing tables etc.
|
firewall rules, routing tables etc.
|
||||||
|
|
||||||
|
Default: do not hide IP (qube's `ip` property) from the qube
|
||||||
|
|
||||||
net.fake-gateway
|
net.fake-gateway
|
||||||
^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
Hide the real gateway of the qube from it, and configure it with value set to
|
Hide the real gateway of the qube from it, and configure it with value set to
|
||||||
this feature.
|
this feature.
|
||||||
|
|
||||||
|
Default: do not hide geteway (qube's `gateway` property) from the qube
|
||||||
|
|
||||||
net.fake-netmask
|
net.fake-netmask
|
||||||
^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
Hide the real netmask of the qube from it, and configure it with value set to
|
Hide the real netmask of the qube from it, and configure it with value set to
|
||||||
this feature.
|
this feature.
|
||||||
|
|
||||||
|
Default: do not hide netmask (qube's `netmask` property) from the qube
|
||||||
|
|
||||||
updates-available
|
updates-available
|
||||||
^^^^^^^^^^^^^^^^^
|
^^^^^^^^^^^^^^^^^
|
||||||
|
|
||||||
There are updates available.
|
There are updates available.
|
||||||
|
|
||||||
|
Default: no updates available
|
||||||
|
|
||||||
Authors
|
Authors
|
||||||
-------
|
-------
|
||||||
|
Loading…
Reference in New Issue
Block a user