87230fc042
This restores Qubes R3.2 behavior Before this patch, the following: qvm-run -p sys-firewall 'echo -e "\e[0;46mcyan!" >&2' | wc -l leaks the escape sequences through to the dom0 terminal via stderr, in this case demonstrated by the ability to change the text color while it should be fixed to red. This can also be abused with xterm reporting sequences to cause input to be sent to the dom0 terminal. This is potentially a security issue. |
||
---|---|---|
ci | ||
debian | ||
doc | ||
etc | ||
qubesadmin | ||
rpm_spec | ||
test-packages | ||
.gitignore | ||
.travis.yml | ||
LICENSE | ||
Makefile | ||
Makefile.builder | ||
README.md | ||
run-tests | ||
setup.py | ||
version |
This is client side implementation of Qubes Admin API. See https://www.qubes-os.org/doc/admin-api/ for protocol specification.
Compatibility
Most of the API modules are compatible with Python >= 2.7. Very few parts require Python >= 3.4:
- tools (
qvm-*
) - qubesadmin.events module (for asyncio module)
Parts not compatible with Python < 3.4, are not installed in such environment.