steps. This document assumes that you are familiar with C programming
and have checked out the libvirt code from the source code repository
and successfully built the existing tree. Instructions on how to check
-out and build the code can be found at:
-
-https://libvirt.org/downloads.html
+out and build the code can be found at the `downloads <downloads.html>`__ page.
Once you have a working development environment, the steps to create a
new API are:
.. _Untriaged issues: https://gitlab.com/libvirt/libvirt/-/issues/?sort=created_date&state=opened¬%5Blabel_name%5D%5B%5D=state%3A%3Aunconfirmed¬%5Blabel_name%5D%5B%5D=state%3A%3Aneedinfo¬%5Blabel_name%5D%5B%5D=state%3A%3Aconfirmed&first_page_size=100
.. _Unconfirmed bugs: https://gitlab.com/libvirt/libvirt/-/issues/?sort=created_date&state=opened&label_name%5B%5D=kind%3A%3Abug&label_name%5B%5D=state%3A%3Aunconfirmed&first_page_size=100
.. _Unconfirmed features: https://gitlab.com/libvirt/libvirt/-/issues/?sort=created_date&state=opened&label_name%5B%5D=kind%3A%3Aenhancement&label_name%5B%5D=state%3A%3Aunconfirmed&first_page_size=100
-.. _debug logs: https://libvirt.org/kbase/debuglogs.html
+.. _debug logs: kbase/debuglogs.html
.. _code of conduct: governance.html#code-of-conduct
</disk>
This makes libvirt follow the settings as configured in the XML. Note that this
-is supported only when the https://libvirt.org/formatdomaincaps.html#backingstoreinput
-capability is present.
+is supported only when the `backingStoreInput
+<../formatdomaincaps.html#backingstoreinput>`_ capability is present.
An empty ``<backingStore/>`` element signals the end of the chain. Using this
will prevent libvirt or qemu from probing the backing chain.
mode, depending on the configuration of the host and available permission
levels.
-The `connection URI <https://libvirt.org/uri.html>`__ influences which daemon
-the client will communicate with.
+The `connection URI <../uri.html>`__ influences which daemon the client will
+communicate with.
System daemon mode
~~~~~~~~~~~~~~~~~~
Glossary
========
-See the knowledge base article on
-`domain state capture <https://libvirt.org/kbase/domainstatecapture.html>`_ for
-a deeper explanation of some of the concepts.
+See the knowledge base article on `domain state capture
+<../domainstatecapture.html>`_ for a deeper explanation of some of the
+concepts.
Checkpoint
================
SEV is enabled in the XML by specifying the
-`<launchSecurity> <https://libvirt.org/formatdomain.html#launch-security>`__
+`<launchSecurity> <../formatdomain.html#launch-security>`__
element. However, specifying ``launchSecurity`` isn't enough to boot an
SEV VM. Further configuration requirements are discussed below.
Live full disk backups are preferred in many scenarios, *despite* their
space requirements. The following outlines an efficient method to do
that using libvirt's APIs. This method involves concepts: the notion of
-`backing chains <https://libvirt.org/kbase/backing_chains.html>`_,
+`backing chains <backing_chains.html>`_,
`QCOW2 overlays
<https://www.qemu.org/docs/master/interop/live-block-operations.html#disk-image-backing-chain-notation>`_,
and a special operation called "active block-commit", which allows
Context
=======
-Sometimes a `disk image chain
-<https://libvirt.org/kbase/backing_chains.html>`_ can get long and
+Sometimes a `disk image chain <backing_chains.html>`_ can get long and
cumbersome. For the purpose of illustration, consider this smaller disk
image chain::
about it.
The same principles used in the `live full disk backup
-<https://libvirt.org/kbase/live_full_disk_backup.html>`_ document are
-used here too.
+<live_full_disk_backup.html>`_ document are used here too.
Reducing the disk image chain length
====================================
* libvirt-docs
- A local copy of the `libvirt website <https://libvirt.org>`_ website content
+ A local copy of the libvirt website website content
that matches the deployed version of libvirt.
* libvirt-libs
by the host, it is necessary to use shared memory ('bounce buffers').
Since libvirt 7.6.0 the
-`<launchSecurity> <https://libvirt.org/formatdomain.html#launch-security>`__
+`<launchSecurity> <../formatdomain.html#launch-security>`__
element with type ``s390-pv`` should be used on protected virtualization guests.
Without ``launchSecurity`` you must enable all virtio devices to use shared
buffers by configuring them with platform_iommu enabled.
../configure --with-dtrace
For libvirt **6.7.0** or later, configure it by the ``meson`` (seeing
-`libvirt compiling <https://libvirt.org/compiling.html>`__):
+`libvirt compiling <../compiling.html>`__):
::
repository <https://gitlab.com/libvirt/libvirt-security-notice>`__ and
`published online <https://security.libvirt.org>`__ in text, HTML and XML
formats. Security notices are published on the `libvirt-announce mailing
-list <https://libvirt.org/contact.html#mailing-lists>`__ when any embargo is
+list <contact.html#mailing-lists>`__ when any embargo is
lifted, or as soon as triaged if already public knowledge.
Security team
utilized to run integration test suite as well. In this case, one needs to
get a copy of their libvirt repository containing the changes to be tested
inside the VM (either by cloning it manually or sharing the repo e.g. via
-`virtiofs <https://libvirt.org/kbase/virtiofs.html>`__). Make sure that the
+`virtiofs <kbase/virtiofs.html>`__). Make sure that the
user which is going to execute the following has passwordless "sudo" permissions
(lcitool's default "test" user does). Then it's just a matter of running
--------------------------------
Details on the capabilities, certificates, and connection string syntax used for
-connecting to VMware ESX and vSphere can be found online here:
-
-https://libvirt.org/drvesx.html
+connecting to VMware ESX and vSphere can be found on the
+`ESX driver <drvesx.html>`_ page.
TLS Certificates
----------------