Ludovic Bellier
1841ba7878
upgrades-installed-check requires pacman-contrib for checkupdates
2020-11-28 23:53:42 +01:00
Marek Marczykowski-Górecki
c3761ac7e7
Merge remote-tracking branch 'origin/pr/264'
...
* origin/pr/264:
qubes.ShowInTerminal requires socat
2020-11-26 00:20:39 +01:00
Demi Marie Obenour
5e0d1cd1d8
qubes.ShowInTerminal requires socat
2020-11-24 17:38:14 -05:00
Marek Marczykowski-Górecki
156e18190f
gitlab-ci: install test dependencies
...
- python3-gobject-base (for PyGTK)
- ShellCheck
2020-11-23 12:49:38 +01:00
Marek Marczykowski-Górecki
3b6a878851
gitlab-ci: include codecov
2020-11-23 05:10:30 +01:00
Marek Marczykowski-Górecki
7c42fb68bb
gitlab-ci: move tests earlier, rename job
...
It isn't just shellcheck
2020-11-23 04:55:32 +01:00
Frédéric Pierret (fepitre)
b28f8a27e8
Add .gitlab-ci.yml
2020-11-17 16:53:26 +01:00
Marek Marczykowski-Górecki
05a213a7e3
Relax private.img condition for mkfs even further
...
Check just 10 MiB of the private volume + blkid before considering it
empty and calling mkfs. Avoid reading 1GB of data at the VM boot -
which should speed up startup even further, especially for fresh
DispVMs.
QubesOS/qubes-issues#3758
2020-11-06 16:00:31 +01:00
Marek Marczykowski-Górecki
2d7a10add7
Drop systemd re-exec during boot
...
We don't have systemd in dom0-provided initrd anymore, so this
workaround is not needed now.
Fixes QubesOS/qubes-issues#5992
2020-11-03 05:20:15 +01:00
Marek Marczykowski-Górecki
7f15690e43
Add a service to enable swap early - before fsck of the root filesystem
...
fsck may require significant amount of RAM, enable swap earlier to avoid
out of memory condition. Implement this as a separate service unit, not
a swap unit, because the latter requires udev running (implicit
dependency on dev-xvdc1.device) which is not the case before remounting
root filesystem read-write.
QubesOS/qubes-issues#6174
2020-11-03 05:18:57 +01:00
Marek Marczykowski-Górecki
aa50b2fedc
grub: override GRUB_DEVICE with /dev/mapper/dmroot
...
Grub scripts are very persistent in trying to use what is currently
mounted as /. Even if currently (TemplateVM) /dev/xvda3 is mounted
directly, all the configuration should use /dev/mapper/dmroot, to work
also in AppVM.
GRUB_DEVICE is used in various places as root device (including
constructing root= parameter in some versions). Force it to
/dev/mapper/dmroot
QubesOS/qubes-issues#6174
2020-11-02 04:33:56 +01:00
Marek Marczykowski-Górecki
75ffdf6a53
version 4.1.18
2020-10-31 05:39:07 +01:00
Frédéric Pierret (fepitre)
c16fb05d2d
dnf-plugin: restrict to only version provided by plateform-python
...
Fix multiple indentations
2020-10-30 10:46:56 +01:00
Marek Marczykowski-Górecki
0fd872f717
Merge remote-tracking branch 'origin/pr/254'
...
* origin/pr/254:
archlinux: improve pacman proxy implementation
2020-10-29 04:19:02 +01:00
ejose19
e09675c2b9
archlinux: improve pacman proxy implementation
2020-10-29 00:11:06 -03:00
Marek Marczykowski-Górecki
6262580660
Merge remote-tracking branch 'origin/pr/255'
...
* origin/pr/255:
Overwrite .rpmdb for debian updatevm
Fixes QubesOS/qubes-issues#6124
Fixes QubesOS/qubes-issues#5282
2020-10-29 01:37:23 +01:00
icequbes1
adf6568670
Overwrite .rpmdb for debian updatevm
...
Resolves issue where the dom0 rpm database does not get used on
successive calls to qubes-dom0-update for debian updatevms.
Also resolves "cannot remove .rpmdbold.####" occurrences.
qubesos/qubes-issues#6124
2020-10-28 06:21:20 -07:00
Frédéric Pierret (fepitre)
bab3ccb617
archlinux: disable check on unassigned pkgdir var
2020-10-21 08:37:53 +02:00
Frédéric Pierret (fepitre)
e38ec9743f
archlinux: remove uneeded 'rm -rf' after rework of makefiles
2020-10-21 07:35:18 +02:00
Frédéric Pierret (fepitre)
45745e80e6
archlinux: add passwordless-root package
2020-10-19 17:12:42 +02:00
Frédéric Pierret (fepitre)
5d8cd3249a
archlinux: ensure SYSLIBDIR and LIBDIR for app-menu and misc
2020-10-19 16:01:33 +02:00
Frédéric Pierret (fepitre)
d039eeaedc
archlinux: add missing misc content
2020-10-19 15:53:30 +02:00
Frédéric Pierret (fepitre)
168c41e8e3
Fix networking and remove qrexec pam related
2020-10-19 15:47:20 +02:00
Frédéric Pierret (fepitre)
37a4fe3fd3
archlinux: add missing qubes-session-autostart
2020-10-19 14:55:54 +02:00
Frédéric Pierret (fepitre)
ddeddae7b1
Fix root mount as ro
2020-10-19 14:48:11 +02:00
Frédéric Pierret (fepitre)
4e2eef52c1
Fix archlinux packaging
2020-10-18 14:28:02 +02:00
Marek Marczykowski-Górecki
d90f62f982
version 4.1.17
2020-10-10 05:13:44 +02:00
unman
2b32289ea4
Allow build for Focal
...
(cherry picked from commit e07297d3e613a90499a3468a8f95b576898b12e7)
2020-10-10 04:18:19 +02:00
Frédéric Pierret (fepitre)
5f8c52ea94
preset: handle dom0 and sys-usb qubes-psu-client
2020-10-03 19:34:58 +02:00
Saswat Padhi
4f55a3b085
Fixed menu item name
2020-09-26 22:48:35 +00:00
Frédéric Pierret (fepitre)
523ffc1ef8
vm-systemd: enable dummy modules and psu client
2020-09-20 15:13:03 +02:00
Marek Marczykowski-Górecki
748f254909
version 4.1.16
2020-09-17 14:37:05 +02:00
Marek Marczykowski-Górecki
214da30e82
Merge remote-tracking branch 'origin/pr/248'
...
* origin/pr/248:
bind-dirs: run in DisposableVM, too
2020-09-17 04:17:44 +02:00
Marek Marczykowski-Górecki
ebd7ce87d5
Merge remote-tracking branch 'origin/pr/247'
...
* origin/pr/247:
passwordless-root: sudo: grant access for group qubes
passwordless-root: policykit: restrict access to group qubes
2020-09-17 04:17:32 +02:00
Marek Marczykowski-Górecki
e9466dd04f
Merge remote-tracking branch 'origin/pr/236'
...
* origin/pr/236:
qvm-template: Add qubes.Template{Search,Download} files to the package.
qubes.Template*: Add --refresh option and allow DNF cache to be used.
qubes.Template*: Invoke curl with --silent.
qubes.Template*: Change separator from : to | and include additional metadata.
Fix shell quoting.
Remove repofrompath.
New qrexec calls for interacting with template repos.
2020-09-17 03:08:56 +02:00
Marek Marczykowski-Górecki
fee8f6cfef
Merge remote-tracking branch 'origin/pr/246'
...
* origin/pr/246:
Advertise apparmor support
2020-09-17 02:57:27 +02:00
Marek Marczykowski-Górecki
5bb125fa67
Merge remote-tracking branch 'origin/pr/244'
...
* origin/pr/244:
spec: don't build sysvinit for Fedora and CentOS
2020-09-17 02:48:28 +02:00
Marek Marczykowski-Górecki
87135138ac
Revert "rpm: do not build qubes-core-agent-sysvinit package"
...
This reverts commit 408bccdd5c
.
2020-09-17 02:47:51 +02:00
Marek Marczykowski-Górecki
27d4ecefed
Merge remote-tracking branch 'origin/pr/245'
...
* origin/pr/245:
Skip IGD when unbinding device drivers on suspend
2020-09-17 02:46:45 +02:00
Marek Marczykowski-Górecki
e729a8a8bc
debian: drop python2 in build deps
...
QubesOS/qubes-issues#5297
2020-09-16 16:40:07 +02:00
Marek Marczykowski-Górecki
408bccdd5c
rpm: do not build qubes-core-agent-sysvinit package
...
Since no currently supported distribution needs it, skip the build by
default. If necessary, can be enabled by adjusting %with_sysvinit macro
in the spec.
2020-09-16 16:14:02 +02:00
Marek Marczykowski-Górecki
55d8b99003
travis: allow bullseye install to fail - no dnf/yum available
...
QubesOS/qubes-issues#5940
2020-09-16 15:40:51 +02:00
Rusty Bird
4c4f2e7038
bind-dirs: run in DisposableVM, too
...
Allow the user to configure bind-dirs in the dvm template and have that
configuration applied when a DisposableVM is instantiated.
Fixes QubesOS/qubes-issues#4624
Fixes QubesOS/qubes-issues#5618
2020-09-15 10:52:59 +00:00
Peter Gerber
42fb54da20
passwordless-root: sudo: grant access for group qubes
...
For consistency with `su` and policykit, grant access to group
qubes rather than user user.
2020-09-13 14:17:06 +00:00
Peter Gerber
a8b29c3fa6
passwordless-root: policykit: restrict access to group qubes
...
Without this restriction system users can start processes with
root privileges:
$ sudo -u mail systemd-run --pipe -q id
uid=0(root) gid=0(root) groups=0(root)
2020-09-13 14:16:07 +00:00
herypt
9271763a6f
Advertise apparmor support
2020-09-02 14:37:25 +02:00
Frédéric Pierret (fepitre)
562b871188
spec: don't build sysvinit for Fedora and CentOS
2020-08-28 13:48:18 +02:00
Artur Puzio
21864ab563
Skip IGD when unbinding device drivers on suspend
2020-08-25 17:08:38 +02:00
WillyPillow
e83408d601
qvm-template: Add qubes.Template{Search,Download} files to the package.
2020-08-25 11:11:24 +08:00
Frédéric Pierret (fepitre)
60ed2c0a1b
Workaround for gpg not resolving key servers used behing proxy
...
See QubesOS/qubes-issues#6013
2020-08-22 22:55:33 +02:00