core-admin/core-modules
Marek Marczykowski-Górecki 3afc7b7d50
core: start qrexec-daemon as normal user, even when VM is started by root
qrexec-daemon will start new processes for called services, which
include starting new DispVM, starting other required VMs (like backend
GPG VM). Having those processes as root leads to many permissions
problems, like the one linked below. So when VM is started by root, make
sure that qrexec-daemon will be running as normal user (the first user
in group 'qubes' - there should be only one).

QubesOS/qubes-issues#1768
2016-05-26 01:34:53 +02:00
..
__init__.py
01QubesAppVm.py
01QubesDisposableVm.py dispvm: do not remove innocent files when cleaning up DispVM 2016-01-20 02:51:57 +01:00
01QubesHVm.py storage: use root-cow.img for HVM template, to support reverting changes 2016-01-07 05:48:32 +01:00
02QubesTemplateHVm.py storage: use root-cow.img for HVM template, to support reverting changes 2016-01-07 05:48:32 +01:00
000QubesVm.py core: start qrexec-daemon as normal user, even when VM is started by root 2016-05-26 01:34:53 +02:00
001QubesResizableVm.py qvm-grow-root: add --allow-start option 2015-12-26 04:10:20 +01:00
003QubesTemplateVm.py
005QubesNetVm.py
006QubesAdminVm.py
006QubesProxyVm.py
Makefile
README.txt

This directory contains Qubes core modules. It will be loaded in
lexicographical order, use numeric prefix to force load ordering.

0* - Qubes base modules
00* - Qubes core VM classes