Skip to content

Commit

Permalink
Fix links to qrexec docs
Browse files Browse the repository at this point in the history
  • Loading branch information
pierwill committed Aug 23, 2019
1 parent c0a91ca commit 5e275fb
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 7 deletions.
2 changes: 1 addition & 1 deletion developer/services/qrexec2.md
Original file line number Diff line number Diff line change
Expand Up @@ -231,7 +231,7 @@ surfaces that are exposed to untrusted or less trusted VMs in that case.
# Qubes RPC internals #

(*This is about the implementation of qrexec v2. For the implementation of
qrexec v3, see [here](/doc/qrexec3/#qubes-rpc-internals). Note that the user
qrexec v3, see [here](/doc/qrexec-internals/). Note that the user
API in v3 is backward compatible: qrexec apps written for Qubes R2 should
run without modification on Qubes R3.*)

Expand Down
2 changes: 1 addition & 1 deletion user/advanced-configuration/disposablevm-customization.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ Additionally you may want to set it as default DisposableVM Template:

[user@dom0 ~]$ qubes-prefs default_dispvm custom-disposablevm-template

The above default is used whenever a qube request starting a new DisposableVM and do not specify which one (for example `qvm-open-in-dvm` tool). This can be also set in qube settings and will affect service calls from that qube. See [qrexec documentation](/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later) for details.
The above default is used whenever a qube request starting a new DisposableVM and do not specify which one (for example `qvm-open-in-dvm` tool). This can be also set in qube settings and will affect service calls from that qube. See [qrexec documentation](/doc/qrexec/#specifying-vms-tags-types-targets-etc) for details.

If you wish to use the `fedora-minimal` template as a DisposableVM Template, see the "DisposableVM Template" use case under [fedora-minimal customization](/doc/templates/fedora-minimal/#customization).

Expand Down
3 changes: 0 additions & 3 deletions user/common-tasks/copying-files.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,3 @@ It even applies to the scenario of copying files between air-gapped machines.
So, you should always copy data only from *more trusted* to *less trusted* qubes.

See also [this article](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) for more information on this topic, and some ideas of how we might solve this problem in some future version of Qubes.

You may also want to read how to [revoke "Yes to All" authorization](/doc/qrexec3/#revoking-yes-to-all-authorization)

4 changes: 2 additions & 2 deletions user/common-tasks/disposablevm.md
Original file line number Diff line number Diff line change
Expand Up @@ -168,7 +168,7 @@ This line means:

In other words, any VM will be allowed to create a new DisposableVM based on `online-dvm-template` and open a URL inside of that DisposableVM.

More information about RPC policies for DisposableVMs can be found [here][qrexec3-4.0].
More information about RPC policies for DisposableVMs can be found [here][qrexec].


## Customizing DisposableVMs ##
Expand All @@ -179,4 +179,4 @@ Full instructions can be found [here](/doc/disposablevm-customization/).


[DisposableVM Template]: /doc/glossary/#disposablevm-template
[qrexec3-4.0]: /doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later
[qrexec]: /doc/qrexec/#qubes-rpc-administration

0 comments on commit 5e275fb

Please sign in to comment.