..
.gitignore
dom0+vm: Tools for downloading dom0 update by VM ( #198 )
2011-06-22 00:44:48 +02:00
check_and_remove_appmenu.sh
Initial public commit.
2010-04-05 20:58:57 +02:00
convert_apptemplate2vm.sh
Initial public commit.
2010-04-05 20:58:57 +02:00
convert_dirtemplate2vm.sh
Initial public commit.
2010-04-05 20:58:57 +02:00
create_apps_for_appvm.sh
dom0: Fix appmenu-select desktop file name ( #266 )
2011-07-12 19:46:00 +02:00
Makefile
dom0+vm: Tools for downloading dom0 update by VM ( #198 )
2011-06-22 00:44:48 +02:00
patch_appvm_initramfs.sh
patch_appvm_initramfs: move qubes_core_setup.sh to pre-udev
2010-06-18 01:46:43 +02:00
qfile-dom0-unpacker.c
dom0: Allow UID as parameter to qfile-dom0-unpacker
2011-07-17 01:28:14 +02:00
qubes-dom0.modules
dom0: load pciback module ( #252 )
2011-07-09 20:43:27 +02:00
qubes-receive-updates
dom0: force permissions on qubes-dom0-cache repo dirs
2011-07-17 01:30:44 +02:00
qubes-watch-updates.sh
Revert "Dom0: use kpackagekit for updates GUI"
2011-08-02 13:01:42 +02:00
qubes.ReceiveUpdates
qrexec: adjust updates fetching to the new qrexec api
2011-07-06 14:44:40 +02:00
qubes.ReceiveUpdates.policy
Add comments to policy files.
2011-07-22 16:11:03 +02:00
regenerate_initramfs.sh
dom0: script for initrd regeneration ( #7 )
2011-07-15 12:52:01 +02:00
remove_appvm_appmenus.sh
Remove desktop files after uninstalling it ( #45 )
2011-05-24 00:10:17 +02:00
remove_dom0_appmenus.sh
Initial public commit.
2010-04-05 20:58:57 +02:00
reset_vm_configs.py
Check if template_vm is set when recreating config files ( #131 )
2011-03-24 21:44:07 -04:00
sync_rpmdb_updatevm.sh
dom0: hide warnings from tar ( #265 )
2011-07-17 01:20:13 +02:00
unbind_all_network_devices
Dom0: Do not try to load non-existent xen-pciback module...
2011-07-02 13:18:11 +02:00
unbind_pci_device.sh
dom0: automatically bind PCI devices to pciback at VM start ( #252 )
2011-07-05 22:10:45 +02:00