sudoers.d: Stops QT from using the MIT-SHM X11 Shared Memory Extension
Fedora now needs this sudoer rule. Allows sudo to keep the `QT_X11_NO_MITSHM` ENV variable which prevents MIT-SHM errors for Fedora and Debian when running a QT application: `Defaults env_keep += "QT_X11_NO_MITSHM"` A complementary commit has been made in gui-agent-linux: Commit: a02e54b71a9ee17f4b10558065a8fc9deaf69984) Author: Jason Mehring <nrgaway@gmail.com> Date: Sat Aug 15 20:13:48 2015 -0400
This commit is contained in:
parent
07591cce86
commit
9644d86845
2
Makefile
2
Makefile
@ -121,6 +121,7 @@ install-common:
|
||||
install -m 0644 -D misc/fstab $(DESTDIR)/etc/fstab
|
||||
|
||||
install -D -m 0440 misc/qubes.sudoers $(DESTDIR)/etc/sudoers.d/qubes
|
||||
install -D -m 0440 misc/sudoers.d_qt_x11_no_mitshm $(DESTDIR)/etc/sudoers.d/qt_x11_no_mitshm
|
||||
|
||||
install -d $(DESTDIR)/var/lib/qubes
|
||||
|
||||
@ -220,6 +221,5 @@ install-deb: install-common install-systemd install-systemd-dropins
|
||||
install -m 644 network/80-qubes.conf $(DESTDIR)/etc/sysctl.d/
|
||||
install -D -m 644 misc/profile.d_qt_x11_no_mitshm.sh $(DESTDIR)/etc/profile.d/qt_x11_no_mitshm.sh
|
||||
install -D -m 440 misc/sudoers.d_umask $(DESTDIR)/etc/sudoers.d/umask
|
||||
install -D -m 440 misc/sudoers.d_qt_x11_no_mitshm $(DESTDIR)/etc/sudoers.d/qt_x11_no_mitshm
|
||||
|
||||
install-vm: install-rh install-common
|
||||
|
@ -357,6 +357,7 @@ rm -f %{name}-%{version}
|
||||
%config(noreplace) /etc/qubes-rpc/qubes.GetImageRGBA
|
||||
%config(noreplace) /etc/qubes-rpc/qubes.SetDateTime
|
||||
%config(noreplace) /etc/sudoers.d/qubes
|
||||
%config(noreplace) /etc/sudoers.d/qt_x11_no_mitshm
|
||||
%config(noreplace) /etc/sysconfig/iptables.qubes
|
||||
%config(noreplace) /etc/sysconfig/ip6tables.qubes
|
||||
/usr/lib/qubes/init/iptables
|
||||
|
Loading…
Reference in New Issue
Block a user