Commit Graph

2551 Commits

Author SHA1 Message Date
AJ Jordan
bc6c729a82
Simplify block number calculation 2018-11-30 23:46:09 -05:00
AJ Jordan
b85c1cec75
Rephrase comment 2018-11-28 23:25:09 -05:00
Marek Marczykowski-Górecki
4036e50604
version 4.0.39 2018-11-21 03:06:24 +01:00
Rudd-O
03883ece96
/rw/config 2018-11-15 19:08:46 +00:00
Marek Marczykowski-Górecki
c227b8672b
rpm: drop useless circular dependency
qubes-core-agent depends on -qrexec, there is no need for the opposite
dependency. In fact one of the reasons for the package split was to
allow installing just -qrexec package.
2018-11-13 03:44:56 +01:00
Marek Marczykowski-Górecki
3fe42d4a27
rpm, deb: add strict version dependency between qubes-core-agent-* pkgs
Base qubes-core-agent package have common files used by various
subpackages. It is important to update them at the same time, otherwise
for example python stubs in /usr/bin/* (like qubes-firewall) will not
match actual python modules.

Fixes QubesOS/qubes-issues#4499
2018-11-13 03:42:24 +01:00
unman
afaf88f153
make iproute2 a dependency for Debian core-networking 2018-11-08 13:29:33 +00:00
Marek Marczykowski-Górecki
2ab738deb6
version 4.0.38 2018-10-29 01:32:11 +01:00
Rudd-O
3b93db99f8
Fix logic bug. 2018-10-24 08:00:20 +00:00
Rudd-O
1ecb680b44
Allow per-VM protected file list
Hopefully this can be pushed as an update for Qubes 3.2 as well?
2018-10-24 07:32:19 +00:00
Marek Marczykowski-Górecki
914c96c1f1
Merge branch 'advertise-services'
* advertise-services:
  archlinux: no longer need to mangle shebang for python scripts
  Make shebang explicit /usr/bin/python2 where it's still there
  Tell dom0 that VM is running Linux
2018-10-24 01:41:30 +02:00
Marek Marczykowski-Górecki
e8ef22b546
archlinux: no longer need to mangle shebang for python scripts
It's patched to python2 (where applicable) in the original sources.
2018-10-24 00:26:38 +02:00
Marek Marczykowski-Górecki
3b0f80e19f
Make shebang explicit /usr/bin/python2 where it's still there
Both Archlinux and Fedora 29 have guidelines to point explicitly at
/usr/bin/python2 where it expect python2.

Also, do not use env.

Fixes QubesOS/qubes-issues#4027
2018-10-24 00:24:50 +02:00
Marek Marczykowski-Górecki
adfe87ed06
Tell dom0 that VM is running Linux 2018-10-23 23:32:35 +02:00
Marek Marczykowski-Górecki
f604d76ed4
Merge remote-tracking branch 'origin/pr/140'
* origin/pr/140:
  spec: require 'hostname' as newer Fedora as moved out the dependency of initscripts into its network subpackage
2018-10-23 23:21:14 +02:00
Marek Marczykowski-Górecki
8b3e6b0069
Merge remote-tracking branch 'origin/pr/139'
* origin/pr/139:
  Remove qubes-core-agent Debian dependency on xserver Mark xserver, xinit and x11-xserver-utils as Recommends

Fixes QubesOS/qubes-issues#4202
2018-10-23 23:17:59 +02:00
Marek Marczykowski-Górecki
18dde5e877
Advertise supported qubes-services
List everything that can be enabled/disabled with qvm-service.

QubesOS/qubes-issues#4402
2018-10-23 11:02:24 +02:00
Marek Marczykowski-Górecki
d285cbf349
Do not force /bin/sh for /etc/qubes-rpc/qubes.GetAppmenus
Call it as normal executable instead of forcing it through /bin/sh.
Especially when now it have bash shebang.

Fixes QubesOS/qubes-issues#4417
2018-10-22 16:25:51 +02:00
Frédéric Pierret
bf42fe0aef spec: require 'hostname' as newer Fedora as moved out the dependency of initscripts into its network subpackage 2018-10-22 14:44:55 +02:00
unman
9114a3b92d
Remove qubes-core-agent Debian dependency on xserver
Mark xserver, xinit and x11-xserver-utils as Recommends
2018-10-21 13:30:24 +00:00
Marek Marczykowski-Górecki
e3db225aab
vif-route-qubes: \n -> \\n
Make shellcheck happy.
2018-10-15 06:20:32 +02:00
Marek Marczykowski-Górecki
336754426b
Fix iptables-restore race condition in vif-route-qubes
In rare cases when vif-route-qubes is called simultaneously with some
other iptables-restore instance, it fails because of missing --wait (and
recent iptables-restore defaults to aborting instead of waiting
for lock). That other call may be from qubes-firewall or user script.

Related to QubesOS/qubes-issues#3665
2018-10-15 06:20:25 +02:00
Marek Marczykowski-Górecki
5ff462004a
debian: don't create orig.tar.gz manually
Rely on builder-debian doing it. This way it will be reproducible.

QubesOS/qubes-issues#2775
2018-10-13 03:33:18 +02:00
Marek Marczykowski-Górecki
eef5d4a3bb
version 4.0.37 2018-10-10 02:44:11 +02:00
Marek Marczykowski-Górecki
fae277bca0
Merge remote-tracking branch 'origin/pr/137'
* origin/pr/137:
  Voice informational messages in bind-dirs.sh
2018-10-10 00:01:15 +02:00
Marek Marczykowski-Górecki
eb8395dac5
travis: add fc29 2018-10-09 14:54:34 +02:00
Marek Marczykowski-Górecki
0c5b52f467
rpm: fix building on fc29
- add BR: gcc
 - name python2 macros explicitly

QubesOS/qubes-issues#4223
2018-10-09 06:15:48 +02:00
Marek Marczykowski-Górecki
d1f55ffeb8
appmenus: send only persistent appmenus entries, use $XDG_DATA_*
It may be useful to create AppVM-specific menu entries in AppVM itself.
It may be an application installed there (in /usr/local, or using snap
QubesOS/qubes-issues#2766), but it may be also some user custom
shortcut.
To support this, dom0 will accept menu entries also from
TemplateBasedVMs. But to avoid duplicates, qubes.GetAppmenus service
should send only menu entries actually stored in that VM, not inherited
from its template. To distingush them, first check what type of
persistence this VM has (from qubesdb-read /qubes-vm-persistence). If
it's rw-only, send only entries stored on /rw.

To make it more robust, use $XDG_DATA_DIRS and $XDG_DATA_HOME to
discover directories, instead of looking only for
/usr/{,local/}share/applications. This makes snap and flatpak handled
for free.

Fixes QubesOS/qubes-issues#4152
2018-10-09 06:06:58 +02:00
lvh
2f674c9168
Voice informational messages in bind-dirs.sh
Previously, bind-dirs.sh had a bunch of `true comment goes here` style debug messages (no-ops). Presumably this was done because these messages are intended as debug messages and would only be displayed when calling bind-dirs.sh with xtrace enabled. However, this includes some fatal errors, which are necessary to debug why bind-dirs.sh is ostensibly not working. For example, I tried to mount /var/lib/docker, didn't realize it did not exist (as an empty directory) in my base template, and there was no journalctl output at all. After this change, journalctl will contain the (very helpful) error message.
2018-10-01 16:07:01 -05:00
Marek Marczykowski-Górecki
ff5e9d0d56
tests: update yum.qubes-os.org IP address
The test rely on some real domain name to be resolved to an IP address.
yum.qubes-os.org recently have changed its IP.
2018-09-28 19:06:16 +02:00
Marek Marczykowski-Górecki
e29a678c5d
Fix qubes-run-terminal.desktop permissions
Should be 644, not 755

Fixes QubesOS/qubes-issues#4329
2018-09-28 18:51:57 +02:00
Marek Marczykowski-Górecki
e92236e8e6
version 4.0.36 2018-09-13 14:32:02 +02:00
Marek Marczykowski-Górecki
e816a4600a
rpm: add workaround for Fedora's systemd package bug
https://bugzilla.redhat.com/1559286

Fixes QubesOS/qubes-issues#3983
2018-09-13 03:34:19 +02:00
Marek Marczykowski-Górecki
000d7890f8
version 4.0.35 2018-09-12 04:04:14 +02:00
Marek Marczykowski-Górecki
163aede1bf
Drop https from onion update repository urls
Tor already provide encryption and authentication, we don't run https on
onion services.
2018-09-06 19:44:03 +02:00
Marek Marczykowski-Górecki
581d9c12ed
Fix detection of root device resize
If xvda is not partitioned, checking size of device mounted as root dev
doesn't detect xvda resize - it will have the new size, while the fs on
it not. Change to checking actual filesystem size.

Also, improve log message to include the size.

Fixes QubesOS/qubes-issues#4274
2018-09-04 18:12:07 +02:00
0brand
aa5d955fbc
Comments to use qubes onion repository 2018-09-03 23:47:13 +02:00
0brand
cbd871fba8
Comments to use qubes onion repository 2018-09-03 23:44:29 +02:00
Marek Marczykowski-Górecki
d0159deccf
version 4.0.34 2018-09-03 11:17:14 +02:00
Marek Marczykowski-Górecki
8c22b3dc39
Slightly simplify @DIST@ substitution in repository definition 2018-09-02 07:35:20 +02:00
Marek Marczykowski-Górecki
d6ea74935c
Merge remote-tracking branch 'qubesos/pr/136'
* qubesos/pr/136:
  Install debian version of qrexec pam in Ubuntu templates
2018-09-02 07:11:27 +02:00
Marek Marczykowski-Górecki
c6e7d04b1c
Merge remote-tracking branch 'qubesos/pr/135'
* qubesos/pr/135:
  misc/qubes-run-terminal: which -> type
2018-09-02 07:10:49 +02:00
Marek Marczykowski-Górecki
43fba4e94a
debian: do not add user to sudo group, lock root account
The qubes-core-agent-passwordless-root package ships sudo configuration,
adding to sudo group isn't needed.

Basically revert all changes made by qubes-core-agent-passwordless-root
installation.

Fixes QubesOS/qubes-issues#4015
2018-09-02 07:05:06 +02:00
Marek Marczykowski-Górecki
09b192b2fe
Merge remote-tracking branch 'qubesos/pr/134'
* qubesos/pr/134:
  Remove user from sudo group on removing passwordless-root.
2018-09-02 06:59:07 +02:00
Marek Marczykowski-Górecki
c02306cdb7
Merge remote-tracking branch 'qubesos/pr/133'
* qubesos/pr/133:
  Add bionic, remove old Ubuntu versions
2018-09-02 06:54:18 +02:00
Marek Marczykowski-Górecki
30c7d77b94
Merge remote-tracking branch 'qubesos/pr/129'
* qubesos/pr/129:
  Handle CentOS vm repo
2018-09-02 06:29:44 +02:00
fepitre
5cb6cc8ebc
Handle CentOS vm repo 2018-09-01 15:49:11 +02:00
unman
771d1fa040
Install debian version of qrexec pam in Ubuntu templates 2018-08-31 09:53:16 +00:00
Rusty Bird
5ad945b674
misc/qubes-run-terminal: which -> type
'which' is an external tool, 'type' is a shell builtin. Using the latter
shaves off a bit of latency.

Also use the already open stderr file descriptor for redirection.
2018-08-28 10:54:09 +00:00
unman
35d12fd68d
Remove user from sudo group on removing passwordless-root. 2018-08-23 12:53:44 +00:00