doc: add default values to qvm-features man page
QubesOS/qubes-issues#
This commit is contained in:
		
							parent
							
								
									414be0945d
								
							
						
					
					
						commit
						51a7b4493b
					
				| @ -65,12 +65,17 @@ this feature to :py:obj:`True` enable gui-agent based GUI (i.e. with support of | |||||||
| tools installed inside of qube). Not setting this feature at all, enable showing | tools installed inside of qube). Not setting this feature at all, enable showing | ||||||
| VGA emulated output. | VGA emulated output. | ||||||
| 
 | 
 | ||||||
|  | Default: show emulated VGA output only | ||||||
|  | 
 | ||||||
| qrexec | qrexec | ||||||
| ^^^^^^ | ^^^^^^ | ||||||
| 
 | 
 | ||||||
| Qube has qrexec agent installed - i.e. it is possible to request staring a | Qube has qrexec agent installed - i.e. it is possible to request staring a | ||||||
| command/service in there. | command/service in there. | ||||||
| 
 | 
 | ||||||
|  | Default: assume qrexec not installed (do not wait for it while starting the | ||||||
|  | qube) | ||||||
|  | 
 | ||||||
| rpc-clipboard | rpc-clipboard | ||||||
| ^^^^^^^^^^^^^ | ^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| @ -78,18 +83,24 @@ Use `qubes.ClipboardCopy` and `qubes.ClipboardPaste` qubes RPC services to | |||||||
| fetch/send clipboard content from/to this qube, instead of using GUI protocol. | fetch/send clipboard content from/to this qube, instead of using GUI protocol. | ||||||
| This is supported (and required) by Qubes Windows Tools. | This is supported (and required) by Qubes Windows Tools. | ||||||
| 
 | 
 | ||||||
|  | Default: use GUI protocol for clipboard operations | ||||||
|  | 
 | ||||||
| no-monitor-layout | no-monitor-layout | ||||||
| ^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| When set to :py:pbj:`True`, monitor layout is not sent to this qube. That is | When set to :py:pbj:`True`, monitor layout is not sent to this qube. That is | ||||||
| avoid calling `qubes.SetMonitorLayout` in this qube. | avoid calling `qubes.SetMonitorLayout` in this qube. | ||||||
| 
 | 
 | ||||||
|  | Default: send monitor layout | ||||||
|  | 
 | ||||||
| internal | internal | ||||||
| ^^^^^^^^ | ^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| Internal qubes (with this feature set to :py:obj:`True`) are not included in the | Internal qubes (with this feature set to :py:obj:`True`) are not included in the | ||||||
| menu. | menu. | ||||||
| 
 | 
 | ||||||
|  | Default: not internal VM | ||||||
|  | 
 | ||||||
| appmenus-legacy | appmenus-legacy | ||||||
| ^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| @ -97,18 +108,24 @@ Generate legacy menu entries, using `qubes-desktop-run` command inside a VM, | |||||||
| instead of `qubes.StartApp` qrexec service. This is used for qubes imported from | instead of `qubes.StartApp` qrexec service. This is used for qubes imported from | ||||||
| previous Qubes version. | previous Qubes version. | ||||||
| 
 | 
 | ||||||
|  | Default: new style menu entries, using `qubes.StartApp` service | ||||||
|  | 
 | ||||||
| appmenus-dispvm | appmenus-dispvm | ||||||
| ^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| Generate menu entries for starting applications in Disposable VM based on given | Generate menu entries for starting applications in Disposable VM based on given | ||||||
| AppVM, instead of this AppVM directly. | AppVM, instead of this AppVM directly. | ||||||
| 
 | 
 | ||||||
|  | Default: create menu entries for AppVM itself | ||||||
|  | 
 | ||||||
| qubes-firewall | qubes-firewall | ||||||
| ^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| Setting this to :py:obj:`True` means that qube support enforcing firewall rules | Setting this to :py:obj:`True` means that qube support enforcing firewall rules | ||||||
| set with `qvm-firewall` command. | set with `qvm-firewall` command. | ||||||
| 
 | 
 | ||||||
|  | Default: assume qubes-firewall not enforced | ||||||
|  | 
 | ||||||
| net.fake-ip | net.fake-ip | ||||||
| ^^^^^^^^^^^ | ^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| @ -118,23 +135,30 @@ qubes and it shouldn't cause any troubles (unless you want to two such qubes | |||||||
| communicate with each other). This feature does not affect address used in | communicate with each other). This feature does not affect address used in | ||||||
| firewall rules, routing tables etc. | firewall rules, routing tables etc. | ||||||
| 
 | 
 | ||||||
|  | Default: do not hide IP (qube's `ip` property) from the qube | ||||||
|  | 
 | ||||||
| net.fake-gateway | net.fake-gateway | ||||||
| ^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| Hide the real gateway of the qube from it, and configure it with value set to | Hide the real gateway of the qube from it, and configure it with value set to | ||||||
| this feature. | this feature. | ||||||
| 
 | 
 | ||||||
|  | Default: do not hide geteway (qube's `gateway` property) from the qube | ||||||
|  | 
 | ||||||
| net.fake-netmask | net.fake-netmask | ||||||
| ^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| Hide the real netmask of the qube from it, and configure it with value set to | Hide the real netmask of the qube from it, and configure it with value set to | ||||||
| this feature. | this feature. | ||||||
| 
 | 
 | ||||||
|  | Default: do not hide netmask (qube's `netmask` property) from the qube | ||||||
|  | 
 | ||||||
| updates-available | updates-available | ||||||
| ^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| There are updates available. | There are updates available. | ||||||
| 
 | 
 | ||||||
|  | Default: no updates available | ||||||
| 
 | 
 | ||||||
| Authors | Authors | ||||||
| ------- | ------- | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user
	 Marek Marczykowski-Górecki
						Marek Marczykowski-Górecki