From 5e275fbdc1a6cb2ff878573616d554d3b405fbff Mon Sep 17 00:00:00 2001 From: pierwill <19642016+pierwill@users.noreply.github.com> Date: Fri, 23 Aug 2019 10:13:40 -0500 Subject: [PATCH] Fix links to qrexec docs --- developer/services/qrexec2.md | 2 +- user/advanced-configuration/disposablevm-customization.md | 2 +- user/common-tasks/copying-files.md | 3 --- user/common-tasks/disposablevm.md | 4 ++-- 4 files changed, 4 insertions(+), 7 deletions(-) diff --git a/developer/services/qrexec2.md b/developer/services/qrexec2.md index 79ea7d1474..1f5f3c480b 100644 --- a/developer/services/qrexec2.md +++ b/developer/services/qrexec2.md @@ -231,7 +231,7 @@ surfaces that are exposed to untrusted or less trusted VMs in that case. # Qubes RPC internals # (*This is about the implementation of qrexec v2. For the implementation of -qrexec v3, see [here](/doc/qrexec3/#qubes-rpc-internals). Note that the user +qrexec v3, see [here](/doc/qrexec-internals/). Note that the user API in v3 is backward compatible: qrexec apps written for Qubes R2 should run without modification on Qubes R3.*) diff --git a/user/advanced-configuration/disposablevm-customization.md b/user/advanced-configuration/disposablevm-customization.md index 581da8b338..b4e9596bb6 100644 --- a/user/advanced-configuration/disposablevm-customization.md +++ b/user/advanced-configuration/disposablevm-customization.md @@ -48,7 +48,7 @@ Additionally you may want to set it as default DisposableVM Template: [user@dom0 ~]$ qubes-prefs default_dispvm custom-disposablevm-template -The above default is used whenever a qube request starting a new DisposableVM and do not specify which one (for example `qvm-open-in-dvm` tool). This can be also set in qube settings and will affect service calls from that qube. See [qrexec documentation](/doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later) for details. +The above default is used whenever a qube request starting a new DisposableVM and do not specify which one (for example `qvm-open-in-dvm` tool). This can be also set in qube settings and will affect service calls from that qube. See [qrexec documentation](/doc/qrexec/#specifying-vms-tags-types-targets-etc) for details. If you wish to use the `fedora-minimal` template as a DisposableVM Template, see the "DisposableVM Template" use case under [fedora-minimal customization](/doc/templates/fedora-minimal/#customization). diff --git a/user/common-tasks/copying-files.md b/user/common-tasks/copying-files.md index ea8ddb49d1..21688795bf 100644 --- a/user/common-tasks/copying-files.md +++ b/user/common-tasks/copying-files.md @@ -57,6 +57,3 @@ It even applies to the scenario of copying files between air-gapped machines. So, you should always copy data only from *more trusted* to *less trusted* qubes. See also [this article](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) for more information on this topic, and some ideas of how we might solve this problem in some future version of Qubes. - -You may also want to read how to [revoke "Yes to All" authorization](/doc/qrexec3/#revoking-yes-to-all-authorization) - diff --git a/user/common-tasks/disposablevm.md b/user/common-tasks/disposablevm.md index 981144f588..4e211367f2 100644 --- a/user/common-tasks/disposablevm.md +++ b/user/common-tasks/disposablevm.md @@ -168,7 +168,7 @@ This line means: In other words, any VM will be allowed to create a new DisposableVM based on `online-dvm-template` and open a URL inside of that DisposableVM. -More information about RPC policies for DisposableVMs can be found [here][qrexec3-4.0]. +More information about RPC policies for DisposableVMs can be found [here][qrexec]. ## Customizing DisposableVMs ## @@ -179,4 +179,4 @@ Full instructions can be found [here](/doc/disposablevm-customization/). [DisposableVM Template]: /doc/glossary/#disposablevm-template -[qrexec3-4.0]: /doc/qrexec3/#extra-keywords-available-in-qubes-40-and-later +[qrexec]: /doc/qrexec/#qubes-rpc-administration