Pawel Marczewski
22a309d154
qubes-session-autostart: handle error when reading a directory
...
Fixes QubesOS/qubes-issues#5043 .
2020-01-15 11:20:21 +01:00
Frédéric Pierret (fepitre)
eac2e79483
travis: switch to dom0 Fedora 31
...
QubesOS/qubes-issues#5529
2020-01-11 11:38:27 +01:00
Marek Marczykowski-Górecki
cc68f165bc
Merge remote-tracking branch 'origin/pr/199'
...
* origin/pr/199:
qubes.GetAppmenus: handle home directory properly in case of sudo
Silence shellcheck
GetAppmenus: ensure right app directories
2020-01-09 01:38:12 +01:00
Pawel Marczewski
418a5ec6e3
qubes.GetAppmenus: handle home directory properly in case of sudo
2020-01-08 17:05:32 +01:00
Pawel Marczewski
2df17a4790
Silence shellcheck
...
See https://github.com/koalaman/shellcheck/wiki/SC1090
2020-01-08 10:29:36 +01:00
Marek Marczykowski-Górecki
cf2c91bc79
Merge remote-tracking branch 'origin/pr/200'
...
* origin/pr/200:
Make the file copy operation respect default_user
2020-01-08 02:21:59 +01:00
Pawel Marczewski
e78edba725
Make the file copy operation respect default_user
...
Previously, both file path and username were hardcoded.
Fixes QubesOS/qubes-issues#5385 .
2020-01-07 16:54:19 +01:00
Pawel Marczewski
552b6de862
GetAppmenus: ensure right app directories
...
The script depends on XDG_DATA_DIRS environment variable
being set up correctly, which is not the case when it is
running under sudo. As a result, a post-install trigger
for apt could remove application entries from other sources
(Snap, Flatpak).
Fixes QubesOS/qubes-issues#5477 .
2020-01-07 15:45:05 +01:00
Pawel Marczewski
03621e5792
StartApp: remove workaround for .desktop suffix
...
The workaround is no longer necessary, and it breaks when
the app name itself contains .desktop (such as org.telegram.desktop).
Fixes QubesOS/qubes-issues#5408 .
2020-01-07 13:06:57 +01:00
Patrick Schleizer
b20373213d
console=hvc0 must be last
...
https://github.com/QubesOS/qubes-issues/issues/5490#issuecomment-562263712
2019-12-07 16:56:53 +00:00
Marek Marczykowski-Górecki
1b28fcd4f1
Do not load u2mfn module anymore
...
It isn't used in Qubes R4.1 anymore
QubesOS/qubes-issues#4280
2019-12-03 13:55:49 +01:00
Jonas DOREL
281d1a5776
Mention Update Proxy in configuration
...
This makes it easier to understand why this configuration is present.
2019-12-01 13:41:54 +01:00
Marek Marczykowski-Górecki
a279b08e3f
version 4.1.6
2019-11-13 06:06:40 +01:00
Marek Marczykowski-Górecki
01aa61521b
Merge remote-tracking branch 'origin/pr/192'
...
* origin/pr/192:
vm-file-editor: drop old wait-for-session mechanism
qubes.WaitForSession: refactor by waiting for qrexec-fork-server socket
2019-11-13 05:43:55 +01:00
Frédéric Pierret (fepitre)
71ef524dec
vm-file-editor: drop old wait-for-session mechanism
2019-11-11 16:08:28 +01:00
Otto Sabart
b9d3e87438
archlinux: fix proxy setting in XferCommand
...
Starting from pacman v5.2.0 there is a problem with updating/installing
new packages:
$ pacman -Sy
...
debug: running command: ALL_PROXY=http://127.0.0.1:8082/ /usr/bin/curl -C - -f https://gluttony.sin.cvut.cz/arch/core/os/x86_64/core.db > /var/lib/pacman/sync/core.db.part
warning: running XferCommand: fork failed!
...
The problem is caused by change in pacman "run XferCommand via exec" [0].
Refs.:
- [0] https://git.archlinux.org/pacman.git/commit/?id=808a4f15ce82d2ed7eeb06de73d0f313620558ee
- [1] https://github.com/QubesOS/qubes-issues/issues/5443
2019-11-04 10:18:20 +01:00
Frédéric Pierret (fepitre)
a44e73900e
qubes.WaitForSession: refactor by waiting for qrexec-fork-server socket
2019-11-02 23:11:32 +01:00
Amadeusz Piotr Żołnowski
8c8666451e
Install qubes-rpc files in Archlinux
2019-10-21 23:00:51 +01:00
Amadeusz Piotr Żołnowski
c104d73a85
Don't clean tilda files in qubes-rpc
...
These are not created by build system, but by some editors. Developers
should deal with extra files created by theirs editors outside of build
files.
2019-10-21 22:45:36 +01:00
Marek Marczykowski-Górecki
e43e262b2d
Merge remote-tracking branch 'origin/pr/188'
...
* origin/pr/188:
Use built-in rules in qubes-rpc makefile
Ignore build result: tar2qfile
Remove no longer needed xorg-preload-apps.conf
Move qubes-rpc installation from the root Makefile to qubes-rpc Makefile
2019-10-21 00:45:47 +02:00
Amadeusz Piotr Żołnowski
863c7e130f
Use built-in rules in qubes-rpc makefile
...
That allows a build system to customize compiler and linker and pass
extra flags to these.
Remove `-g` as default flag and enable it only when `DEBUG` variable is
set.
2019-10-20 09:12:08 +01:00
Amadeusz Piotr Żołnowski
e98d9332fa
Ignore build result: tar2qfile
2019-10-20 09:12:08 +01:00
Amadeusz Piotr Żołnowski
6b0179c107
Remove no longer needed xorg-preload-apps.conf
2019-10-20 09:12:07 +01:00
Amadeusz Piotr Żołnowski
3152c609a9
Move qubes-rpc installation from the root Makefile to qubes-rpc Makefile
...
qubes-rpc has its own Makefile that's responsible for building some
executables. The root Makefile was installing qubes-rpc files. To make
qubes-rpc a bit more indepdent from core-agent root Makefile and to ease
potential maintainer work on packaging qubes-rpc separately, the
installation has been moved to qubes-rpc Makefile. Moreover that should
make the Makefiles easier to read and maintain.
2019-10-20 09:12:07 +01:00
Marek Marczykowski-Górecki
22246c5fdf
Merge remote-tracking branch 'origin/pr/189'
...
* origin/pr/189:
travis: switch to bionic
2019-10-20 01:47:39 +02:00
Frédéric Pierret (fepitre)
bd94953783
travis: switch to bionic
...
QubesOS/qubes-issues#4613
2019-10-19 21:45:31 +02:00
Hans Jerry Illikainen
b9a5fb7e3f
qubes-download-dom0-updates: verify package signatures
2019-10-12 20:43:38 +00:00
Marek Marczykowski-Górecki
b7f714b742
version 4.1.5
2019-10-09 04:15:20 +02:00
Marek Marczykowski-Górecki
3c47a7890f
Merge branch 'fc31'
...
* fc31:
rpm: switch deps to python3-setuptools on CentOS too
debian: switch to python3
Use spaces in xdg-icon script
Convert other scripts to python3
Convert qubesagent module to python3
Minor codestyle fix in qubesadmin/firewall.py
Require python setuptools
Update python2 dependencies to python3 and clean deprecated requirements
2019-10-06 07:00:10 +02:00
Marek Marczykowski-Górecki
033f544d9b
Merge branch 'bug5110'
...
* bug5110:
network: don't fail the whole vif setup if IPv6 is disabled
2019-10-06 06:33:40 +02:00
Marek Marczykowski-Górecki
34921cd9c0
network: don't fail the whole vif setup if IPv6 is disabled
...
Detect if IPv6 is disabled in the kernel (like it is in Whonix Gateway)
and skip setting IPv6 in that case. Otherwise 'ip' call would fail and
since the script is with 'set -e', it would interrupt setting IPv4 too.
Log error message in that case anyway.
Fixes QubesOS/qubes-issues#5110
2019-10-06 06:19:16 +02:00
Marek Marczykowski-Górecki
2dcaebd110
resize-rootfs: wait for partition table to reload
...
partprobe triggers reloading partition table, but apparently it isn't
guaranteed udev re-create device nodes at the time it finishes. This may lead
to /dev/mapper/dmroot pointing to nowhere. Fix this by calling udevadm settle
after reloading partition table.
2019-10-06 03:12:56 +02:00
Marek Marczykowski-Górecki
2dbdb1e66f
Fix misleading error message on rootfs resize
...
The partition being extended is in use and sfdisk can't reload such
partition table. Tell it to not even try, it will be done by partprobe
call below.
2019-09-30 04:03:06 +02:00
Marek Marczykowski-Górecki
e024b195bc
rpm: switch deps to python3-setuptools on CentOS too
...
Since qubesagent module is py3 completely, switch dependency on CentOS
too.
Fixes QubesOS/qubes-issues#5290
2019-09-24 22:58:48 +02:00
Marek Marczykowski-Górecki
bee2e9667c
debian: switch to python3
...
QubesOS/qubes-issues#5297
2019-09-19 04:57:56 +02:00
Marek Marczykowski-Górecki
274c950af7
Use spaces in xdg-icon script
2019-09-19 04:57:55 +02:00
Marek Marczykowski-Górecki
5c9903db46
Convert other scripts to python3
...
QubesOS/qubes-issues#5289
2019-09-19 04:57:55 +02:00
Marek Marczykowski-Górecki
a899adb69e
Convert qubesagent module to python3
...
This and all files using it.
QubesOS/qubes-issues#5297
2019-09-19 04:57:55 +02:00
Marek Marczykowski-Górecki
73648ca038
Minor codestyle fix in qubesadmin/firewall.py
...
Fix indentation, use double-quotes for docstrings.
2019-09-18 00:14:23 +02:00
Marek Marczykowski-Górecki
0c0149f361
Merge remote-tracking branch 'origin/pr/182'
...
* origin/pr/182:
Make qvm-copy/move[-to-vm] one script
2019-09-10 02:39:07 +02:00
Marta Marczykowska-Górecka
dffe0b2f1a
Make qvm-copy/move[-to-vm] one script
...
Instead of two scripts calling one another, now it's
only one script, with added variable names inside for clarity.
Also hopefully finally fixes the help messages for good.
fixes QubesOS/qubes-issues#4058
2019-09-09 22:03:48 +02:00
Frédéric Pierret (fepitre)
0bb7463d8b
Require python setuptools
...
QubesOS/qubes-issues#5290
2019-09-08 10:38:28 +02:00
Frédéric Pierret (fepitre)
310af146d5
Update python2 dependencies to python3 and clean deprecated requirements
...
QubesOS/qubes-issues#5289
QubesOS/qubes-issues#5297
2019-09-08 10:38:25 +02:00
Marek Marczykowski-Górecki
017eecfbbf
Merge remote-tracking branch 'origin/pr/180'
...
* origin/pr/180:
Mount /rw and /home with nosuid + nodev
2019-09-07 23:14:32 +02:00
Marek Marczykowski-Górecki
cd62ae693c
Merge remote-tracking branch 'origin/pr/179'
...
* origin/pr/179:
NetworkManager config - Add dns=default
2019-09-07 23:14:07 +02:00
unman
e5e5dfb154
Fix typo
...
(cherry picked from commit 051afaabe9c71fe02fd2c33521d30c091cced6d6)
2019-09-07 23:11:42 +02:00
Patrick Schleizer
5dbca47811
Mount /rw and /home with nosuid + nodev
...
implements https://github.com/QubesOS/qubes-issues/issues/5263
2019-08-28 11:01:09 +00:00
Marek Marczykowski-Górecki
347f98b8b6
dom0-updates: fix dnf.conf path
...
If dnf.conf is there, really use it instead of yum.conf.
Fixes 10399e8a
"dom0-updates: improve dnf config handling"
2019-08-25 13:24:13 +02:00
Marek Marczykowski-Górecki
045653c966
version 4.1.4
2019-08-21 10:34:49 +02:00
Marek Marczykowski-Górecki
b3d3c2c98c
Disable boot.automount which is created by systemd automatically
...
systemd-gpt-auto-generator creates boot.automount for existing ESP
partition. But Qubes templates have only placeholder ESP there, with no
even filesystem created. Disable it with drop-in file, until it will
become used.
Fixes QubesOS/qubes-issues#5261
2019-08-20 16:37:23 +02:00