Marek Marczykowski-Górecki
519e82b7c0
init/functions: do not guess 'eth0' as Qubes-managed interface
...
... if it doesn't exist.
The /qubes-mac qubesdb entry is present on Qubes 4.1, but not 4.0. It is
ok to depend on it here, but keep safer fallback if this code would need
to be backported.
2020-12-04 12:30:57 +01:00
Marek Marczykowski-Górecki
8a3cd3db1d
Make init/functions suitable for running with 'set -u'
...
Initialize local variables.
2020-12-04 03:24:03 +01:00
Amber M. Breslau
be9155ef11
init/functions: fix DispVM detection
2020-02-14 11:24:29 -05:00
Marek Marczykowski-Górecki
d2c28d12a2
Remove dead code
2019-07-05 20:35:31 +02:00
Frédéric Pierret (fepitre)
3f5dc53d75
init/functions: better not use ipcalc which is not present on minimal distro
2019-06-23 09:59:37 +02:00
Frédéric Pierret (fepitre)
967060eb32
init/functions: handle non-present /qubes-mac qubesdb and check if iface exists
2019-06-20 16:09:24 +02:00
Frédéric Pierret (fepitre)
325eff2b13
Refactor and handle new network qubesdb configuration
2019-06-18 18:49:42 +02:00
Frédéric Pierret (fepitre)
f7dd41206d
setup-ip: only assign IP configuration of Qubes managed iface
2019-05-21 17:21:51 +02:00
Frédéric Pierret (fepitre)
902da9f837
Handle default value for get_iface_from_mac
2019-05-21 17:21:51 +02:00
Frédéric Pierret (fepitre)
da162d7615
Handle default value for get_qubes_managed_iface
2019-05-21 17:21:51 +02:00
Frédéric Pierret (fepitre)
0ce79d4895
Handle non-default 'eth0' Qubes managed interface
2019-05-16 17:32:50 +02:00
Marek Marczykowski-Górecki
8ce95f0db1
is_protected_file: if no config dir is present, assume the file is _not_ protected
2018-12-06 14:44:42 +01:00
Rudd-O
03883ece96
/rw/config
2018-11-15 19:08:46 +00:00
Rudd-O
3b93db99f8
Fix logic bug.
2018-10-24 08:00:20 +00:00
Rudd-O
1ecb680b44
Allow per-VM protected file list
...
Hopefully this can be pushed as an update for Qubes 3.2 as well?
2018-10-24 07:32:19 +00:00
Marek Marczykowski-Górecki
82937e129e
Use only /etc/skel to provision user's home directory of new VM
...
Get rid of non-standard /home.orig handling.
Fixes QubesOS/qubes-issues#3771
2018-04-13 00:35:08 +02:00
Marek Marczykowski-Górecki
8bb152f76e
init: fix issues found by shellcheck in init scripts
...
Most of them are missing quotes, `` -> $(), and -o/-a usage in
conditions. Also add few directives disabling checks where were too
verbose.
2017-09-30 04:49:21 +02:00
Marek Marczykowski-Górecki
9a7dee5b46
dispvm: don't use perl to decode base64-encoded script
...
This looks like an overkill. And more importantly - required modules are
not installed by default, making it impossible to use in default minimal
template.
Fixes QubesOS/qubes-issues#1610
2017-05-14 23:29:52 +02:00
Marek Marczykowski-Górecki
a69acdabbf
Merge remote-tracking branch 'qubesos/pr/24'
...
* qubesos/pr/24:
Initialize home_volatile for disposable VMs.
2016-11-17 09:33:02 +01:00
Marek Marczykowski-Górecki
dbcd3e5f0a
Write random seed directly to /dev/urandom
...
Don't store it in some variable, as may contain non-ASCII or control
characters (or starts with '-').
2016-11-17 09:30:49 +01:00
Patrick Schleizer
b1f418ca76
fix reload_random_seed error handling
...
https://github.com/QubesOS/qubes-core-agent-linux/pull/21#pullrequestreview-8302473
2016-11-13 23:37:49 +01:00
Manuel Amador (Rudd-O)
6ca10b42eb
Initialize home_volatile for disposable VMs.
2016-11-13 21:20:46 +00:00
Manuel Amador (Rudd-O)
60adadff73
Invert logic of systemd_version_changed.
2016-10-28 05:02:53 +00:00
Manuel Amador (Rudd-O)
59aec8e5eb
Clean up early initialization and setup of /rw
2016-10-23 20:19:51 +00:00