Commit Graph

2721 Commits

Author SHA1 Message Date
icequbes1
adf6568670
Overwrite .rpmdb for debian updatevm
Resolves issue where the dom0 rpm database does not get used on
successive calls to qubes-dom0-update for debian updatevms.

Also resolves "cannot remove .rpmdbold.####" occurrences.

qubesos/qubes-issues#6124
2020-10-28 06:21:20 -07:00
Frédéric Pierret (fepitre)
bab3ccb617
archlinux: disable check on unassigned pkgdir var 2020-10-21 08:37:53 +02:00
Frédéric Pierret (fepitre)
e38ec9743f
archlinux: remove uneeded 'rm -rf' after rework of makefiles 2020-10-21 07:35:18 +02:00
Frédéric Pierret (fepitre)
45745e80e6
archlinux: add passwordless-root package 2020-10-19 17:12:42 +02:00
Frédéric Pierret (fepitre)
5d8cd3249a
archlinux: ensure SYSLIBDIR and LIBDIR for app-menu and misc 2020-10-19 16:01:33 +02:00
Frédéric Pierret (fepitre)
d039eeaedc
archlinux: add missing misc content 2020-10-19 15:53:30 +02:00
Frédéric Pierret (fepitre)
168c41e8e3
Fix networking and remove qrexec pam related 2020-10-19 15:47:20 +02:00
Frédéric Pierret (fepitre)
37a4fe3fd3
archlinux: add missing qubes-session-autostart 2020-10-19 14:55:54 +02:00
Frédéric Pierret (fepitre)
ddeddae7b1
Fix root mount as ro 2020-10-19 14:48:11 +02:00
Frédéric Pierret (fepitre)
4e2eef52c1
Fix archlinux packaging 2020-10-18 14:28:02 +02:00
Marek Marczykowski-Górecki
d90f62f982
version 4.1.17 2020-10-10 05:13:44 +02:00
unman
2b32289ea4
Allow build for Focal
(cherry picked from commit e07297d3e613a90499a3468a8f95b576898b12e7)
2020-10-10 04:18:19 +02:00
Frédéric Pierret (fepitre)
5f8c52ea94
preset: handle dom0 and sys-usb qubes-psu-client 2020-10-03 19:34:58 +02:00
Saswat Padhi
4f55a3b085
Fixed menu item name 2020-09-26 22:48:35 +00:00
Frédéric Pierret (fepitre)
523ffc1ef8
vm-systemd: enable dummy modules and psu client 2020-09-20 15:13:03 +02:00
Marek Marczykowski-Górecki
748f254909
version 4.1.16 2020-09-17 14:37:05 +02:00
Marek Marczykowski-Górecki
214da30e82
Merge remote-tracking branch 'origin/pr/248'
* origin/pr/248:
  bind-dirs: run in DisposableVM, too
2020-09-17 04:17:44 +02:00
Marek Marczykowski-Górecki
ebd7ce87d5
Merge remote-tracking branch 'origin/pr/247'
* origin/pr/247:
  passwordless-root: sudo: grant access for group qubes
  passwordless-root: policykit: restrict access to group qubes
2020-09-17 04:17:32 +02:00
Marek Marczykowski-Górecki
e9466dd04f
Merge remote-tracking branch 'origin/pr/236'
* origin/pr/236:
  qvm-template: Add qubes.Template{Search,Download} files to the package.
  qubes.Template*: Add --refresh option and allow DNF cache to be used.
  qubes.Template*: Invoke curl with --silent.
  qubes.Template*: Change separator from : to | and include additional metadata.
  Fix shell quoting.
  Remove repofrompath.
  New qrexec calls for interacting with template repos.
2020-09-17 03:08:56 +02:00
Marek Marczykowski-Górecki
fee8f6cfef
Merge remote-tracking branch 'origin/pr/246'
* origin/pr/246:
  Advertise apparmor support
2020-09-17 02:57:27 +02:00
Marek Marczykowski-Górecki
5bb125fa67
Merge remote-tracking branch 'origin/pr/244'
* origin/pr/244:
  spec: don't build sysvinit for Fedora and CentOS
2020-09-17 02:48:28 +02:00
Marek Marczykowski-Górecki
87135138ac
Revert "rpm: do not build qubes-core-agent-sysvinit package"
This reverts commit 408bccdd5c.
2020-09-17 02:47:51 +02:00
Marek Marczykowski-Górecki
27d4ecefed
Merge remote-tracking branch 'origin/pr/245'
* origin/pr/245:
  Skip IGD when unbinding device drivers on suspend
2020-09-17 02:46:45 +02:00
Marek Marczykowski-Górecki
e729a8a8bc
debian: drop python2 in build deps
QubesOS/qubes-issues#5297
2020-09-16 16:40:07 +02:00
Marek Marczykowski-Górecki
408bccdd5c
rpm: do not build qubes-core-agent-sysvinit package
Since no currently supported distribution needs it, skip the build by
default. If necessary, can be enabled by adjusting %with_sysvinit macro
in the spec.
2020-09-16 16:14:02 +02:00
Marek Marczykowski-Górecki
55d8b99003
travis: allow bullseye install to fail - no dnf/yum available
QubesOS/qubes-issues#5940
2020-09-16 15:40:51 +02:00
Rusty Bird
4c4f2e7038
bind-dirs: run in DisposableVM, too
Allow the user to configure bind-dirs in the dvm template and have that
configuration applied when a DisposableVM is instantiated.

Fixes QubesOS/qubes-issues#4624
Fixes QubesOS/qubes-issues#5618
2020-09-15 10:52:59 +00:00
Peter Gerber
42fb54da20 passwordless-root: sudo: grant access for group qubes
For consistency with `su` and policykit, grant access to group
qubes rather than user user.
2020-09-13 14:17:06 +00:00
Peter Gerber
a8b29c3fa6 passwordless-root: policykit: restrict access to group qubes
Without this restriction system users can start processes with
root privileges:

  $ sudo -u mail systemd-run --pipe -q id
  uid=0(root) gid=0(root) groups=0(root)
2020-09-13 14:16:07 +00:00
herypt
9271763a6f
Advertise apparmor support 2020-09-02 14:37:25 +02:00
Frédéric Pierret (fepitre)
562b871188
spec: don't build sysvinit for Fedora and CentOS 2020-08-28 13:48:18 +02:00
Artur Puzio
21864ab563
Skip IGD when unbinding device drivers on suspend 2020-08-25 17:08:38 +02:00
WillyPillow
e83408d601
qvm-template: Add qubes.Template{Search,Download} files to the package. 2020-08-25 11:11:24 +08:00
Frédéric Pierret (fepitre)
60ed2c0a1b
Workaround for gpg not resolving key servers used behing proxy
See QubesOS/qubes-issues#6013
2020-08-22 22:55:33 +02:00
Marek Marczykowski-Górecki
a695902d68
version 4.1.15 2020-08-07 03:52:18 +02:00
Marek Marczykowski-Górecki
0f3e1ae8af
Merge remote-tracking branch 'origin/pr/184'
* origin/pr/184:
  Add services for paranoid backup restore mode
  qfile-unpacker: add option (-w) to wait for disk space before extracting
  tar2qfile: fix argument parser
  qfile-unpacker: add option for custom user and target directory
2020-08-07 03:01:25 +02:00
Marek Marczykowski-Górecki
cb4f06d464
Merge remote-tracking branch 'origin/pr/239'
* origin/pr/239:
  xendriverdomain: remove placeholder for sbinpath
  Fix regex in qubes-fix-nm-conf.sh
  Update travis
  xendriverdomain: remove Requires and After proc-xen.mount
  Drop legacy xen entry in fstab
2020-08-06 05:32:45 +02:00
Marek Marczykowski-Górecki
629f836177
debian: fix version detection for python3?-nautilus dependency
On buster and stretch use python-nautilus, but /etc/debian_version
contains numeric version, not a codename.

Reported by @0spinboson
2020-08-06 05:30:37 +02:00
Marek Marczykowski-Górecki
497dd8d50d
Merge remote-tracking branch 'origin/pr/242'
* origin/pr/242:
  tinyproxy: support rsync for Gentoo
2020-08-06 05:23:13 +02:00
Frédéric Pierret (fepitre)
239ea3d04b
tinyproxy: support rsync for Gentoo 2020-08-04 12:24:09 +02:00
Ivan Kardykov
e5041783a5
Fix open path in qubes-open-file-manager.desktop
Looks like desktop entries doesn`t allow environment variables in Exec string.
qubes.StartApp+qubes-open-file-manager-dom0[1782]: gio: file:///home/user/$HOME: Error when getting information for file “/home/user/$HOME”: No such file or directory

switching to '.' resolve it.
2020-08-04 12:40:02 +03:00
Frédéric Pierret (fepitre)
b804cfb270
xendriverdomain: remove placeholder for sbinpath 2020-08-03 13:18:26 +02:00
Marek Marczykowski-Górecki
8066129445
Add services for paranoid backup restore mode
Add a pair of services:
1. qubes.RegisterBackupLocation - called by dom0, registers what backup
location (including both file and command options) can be accessed.
Registered location gets an ID returned to the caller. The location (and
its ID) is valid as long as the service call remains open.

2. qubes.RestoreById - called by restoring DispVM to retrieve the backup
content. The service expects location ID as an argument, and then list
of files/directories (separated with spaces) on the first line of stdin.
This is very similar to qubes.Restore service, with exception for the
archive location control.

QubesOS/qubes-issues#5310
2020-08-03 03:43:09 +02:00
Marek Marczykowski-Górecki
7c261f45da
qfile-unpacker: add option (-w) to wait for disk space before extracting
Add -w MARGIN option to always leave at least MARGIN bytes of free
space.

QubesOS/qubes-issues#4791
2020-08-03 03:25:37 +02:00
Marek Marczykowski-Górecki
13eef467bf
tar2qfile: fix argument parser
There is only one input, other arguments are files/directories to
extract. There is no need for a loop.
2020-08-03 03:25:36 +02:00
Marek Marczykowski-Górecki
cee32d4f90
qfile-unpacker: add option for custom user and target directory
QubesOS/qubes-issues#930
2020-08-03 03:25:36 +02:00
WillyPillow
b0edd5f209 qubes.Template*: Add --refresh option and allow DNF cache to be used. 2020-07-29 20:02:47 +08:00
WillyPillow
9bedf50786 qubes.Template*: Invoke curl with --silent. 2020-07-29 20:02:42 +08:00
WillyPillow
686d0d3c12 qubes.Template*: Change separator from : to | and include additional metadata. 2020-07-29 20:02:36 +08:00
Frédéric Pierret (fepitre)
91bce584a2
Fix regex in qubes-fix-nm-conf.sh 2020-07-28 16:02:34 +02:00