Commit Graph

57 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
23250f84b2
Create /etc/dconf/profile/user dynamically, if not present
The /etc/dconf/profile/user file in some distributions is part of dconf
package, in some not. There are even cases where it changes between
package versions (Fedora 27 don't have it, but Fedora 28 do).
Also, base Debian Stretch don't have it, but Kali Linux based on it do.

To avoid overly complex dependency handling, create the file dynamically
on package installation if it's missing in that particular case. The
file content is canonical:

    user-db:user
    system-db:local

Fixes QubesOS/qubes-issues#3834
2018-05-02 02:57:37 +02:00
Marek Marczykowski-Górecki
d25ecb4e40
Fix packaging: 'user' group, BACKEND_VMM var
- BACKEND_VMM may not be available as env variable (mock build), provide
it explicitly
- 'user' group may not exists at package build time, set it at package
installation
2018-05-01 17:34:52 +02:00
Olivier Médoc
6e723dca64 archlinux: split core-agent from netvm-agent 2017-10-29 03:24:51 -04:00
Olivier MEDOC
5971cdd5bc archlinux: restore setup of pam.d/su-l
qubes-gui agent calls su-l instead of initializing its own pam
session such as qrexec.
pam.d/su-l qubes specific configuration must be restored to ensure
that the user login session is properly initialized:
https://github.com/QubesOS/qubes-issues/issues/3185
2017-10-25 15:03:16 +02:00
Olivier MEDOC
5e4ca2ac74 archlinux: create user 'user' using bash by default instead of zsh
The bash/zsh bug should not be present anymore in Qubes 4.0
as discussed in the issue 2888.
(https://github.com/QubesOS/qubes-issues/issues/2888)
2017-10-23 09:35:24 +02:00
Olivier MEDOC
0bf69ebc24 archlinux: do not mess with locales in post-install script
Locales must be setup properly in the template.
2017-10-23 07:53:23 +02:00
Olivier MEDOC
f65ab12c46 archlinux: remove deprecated setup of pam since v4.0.3
PAM is now used directly instead of calling su
2017-10-22 21:43:47 +02:00
Nedyalko Andreev
c71609df19
Fix the previous shellcheck-related "fixes" again
(cherry picked from commit 8c06c1eabd8f36d307f5956b5fea8d3bbcbb317f)
2017-10-03 03:21:01 +02:00
Nedyalko Andreev
42676bafb8
Fix the install script after the shellcheck "fixes"
(cherry picked from commit 6d28d4dfaf0632477321248cdb07b31fcb31ffb2)
2017-10-03 03:21:00 +02:00
Nedyalko Andreev
74ce135461
Fix indentation and shellcheck issues for archlinux
(cherry picked from commit 60ee036f04d5f22d1a3a694586f219f5b6ce30a1)
2017-10-03 03:20:55 +02:00
Marek Marczykowski-Górecki
7e608a8bb4
Remove DisposableVM savefile related files
In Qubes 4.0 we no longer use two-stage DisposableVM startup.
2017-06-08 22:11:35 +02:00
Marek Marczykowski-Górecki
ce70887a57
Merge branch 'core3-devel' 2017-05-20 14:43:53 +02:00
Olivier MEDOC
0159cd6a77 archlinux: fix pacman.d dropin not activated if pacman.conf does not already contains qubes markers 2017-01-29 15:27:14 +01:00
Olivier MEDOC
98b4f1f265 archlinux: fix bash syntax errors 2017-01-29 14:34:50 +01:00
Olivier MEDOC
8584290295 archlinux: update installer script to use systemd preset file 2017-01-29 13:55:35 +01:00
Manuel Amador (Rudd-O)
59aec8e5eb Clean up early initialization and setup of /rw 2016-10-23 20:19:51 +00:00
Marek Marczykowski-Górecki
2c8fe644f3
network: remove qubes-netwatcher
This tool/service is obsolete for a long time (it does nothing on R3.0
and later).
2016-09-12 05:58:26 +02:00
Olivier MEDOC
b6a6d4e4e0 archlinux: switch to usage of pacman.d drop-ins 2016-07-11 17:21:55 +02:00
Olivier MEDOC
245c6d1716 archlinux: remove unnecessary glib-compile-scheme
This is now automatically handled through pacman hooks
2016-07-11 15:32:36 +02:00
Olivier MEDOC
051d806f0a archlinux: update installer script in prevision of pacman.d drop-ins 2016-07-11 15:15:45 +02:00
Olivier MEDOC
ccb9a5b992 archlinux: fix remaining loginctl privilege issues with invalid pam.d configuration 2016-04-26 12:57:36 +02:00
Olivier MEDOC
eb105540c5 archlinux: properly add qubes markers in pacman.conf 2016-01-21 18:21:44 +01:00
Olivier MEDOC
1bbcf126ad archlinux: add Qubes Markers in pacman.conf so that changes done by qubes scripts are not inserted at the end of pacman.conf 2016-01-21 07:59:35 +01:00
Olivier MEDOC
1c09b88fae archlinux: ensure systemctl reset preset correctly (need to be started twice) 2015-12-15 16:20:03 +01:00
Olivier MEDOC
33aa1782ca archlinux: remove quotes when checking system locales (in case it has been user defined) 2015-12-08 15:32:30 +01:00
Marek Marczykowski-Górecki
a11897a1d0
Revert "network: use drop-ins for NetworkManager configuration (#1176)"
Apparently unmanaged devices are loaded only from main
NetworkManager.conf. Exactly the same line pasted (not typed!) to main
NetworkManager.conf works, but in
/etc/NetworkManager/conf.d/30-qubes.conf it doesn't.
BTW There was a typo in option name ("unmanaged_devices" instead of
"unmanaged-devices", but it wasn't the cause).

This reverts commit 6c4831339c.

QubesOS/qubes-issues#1176
2015-11-28 17:43:15 +01:00
Marek Marczykowski-Górecki
7cca1b23ee
Get rid of qubes-core-vm-kernel-placeholder
Since /lib/modules is not mounted read-only anymore (only a selected
subdirectory there), it is no longer required to prevent kernel package
installation. Even more - since PV Grub being supported, it makes sense
to have kernel installed in the VM.

QubesOS/qubes-issues#1354
2015-11-11 02:36:57 +01:00
Olivier MEDOC
2d4b86c020 archlinux: readd lines removed by error during merge 2015-10-18 11:11:45 +02:00
Olivier MEDOC
fcee020cf5 Merge branch 'master' of https://github.com/marmarek/qubes-core-agent-linux
Conflicts:
	archlinux/PKGBUILD.install
2015-10-18 10:56:18 +02:00
Olivier MEDOC
9954cd82f1 archlinux: update packaging and install script to use systemd DROPINs 2015-10-16 14:34:15 +02:00
Patrick Schleizer
f063b4a90f
Renamed qubes-mount-home to qubes-mount-dirs.
Renamed qubes-mount-home service and mount-home.sh script to qubes-mount-dirs service and mount-dirs.sh.
Because mount-home.sh also processed /rw/usrlocal.
preparation to fix the following issues:
- upstream bind-directories functionality to Qubes - https://phabricator.whonix.org/T414
- Bind mount /rw/usrlocal -> /usr/local instead of symlink - https://github.com/QubesOS/qubes-issues/issues/1150
- /bin/sync hangs forever in whonix-ws-dvm - https://github.com/QubesOS/qubes-issues/issues/1328
2015-10-15 20:57:43 +00:00
Patrick Schleizer
2eb0ed2be1
removed trailing spaces 2015-10-15 04:34:55 +02:00
Marek Marczykowski-Górecki
6c4831339c
network: use drop-ins for NetworkManager configuration (#1176)
Do not modify main /etc/NetworkManager/NetworkManager.conf as it would
cause conflicts during updates. Use
/etc/NetworkManager/conf.d/30-qubes.conf instead.
Also remove some dead code for dynamically generated parts (no longer
required to "blacklist" eth0 in VMs - we have proper connection
generated for it). It was commented out for some time already

Fixes QubesOS/qubes-issues#1176
2015-10-06 15:15:26 +02:00
Marek Marczykowski-Górecki
1287decd20
archlinux: remove installOverridenServices as now handled by systemd dropins 2015-08-04 17:26:44 +02:00
Olivier MEDOC
2cfd4e6a13 archlinux: enabled configuration of all core agent dependencies 2015-07-28 16:12:07 +02:00
Olivier MEDOC
20c7f85f1f archlinux: pulseaudio should be configured in gui agent and will break installation of pulseaudio if installed in core-agent-linux 2015-07-28 16:11:16 +02:00
Olivier MEDOC
78dcdd0f6a archlinux: fix syntax errors in install file 2015-07-14 08:09:11 +02:00
Olivier MEDOC
d84c07295b archlinux: reorganize install script to make it more easily compareable with the .spec file 2015-07-08 15:01:21 +02:00
Jason Mehring
567a045bcd
Make sure when user is added to qubes group that the group is appended
added -a option to usermod.
This will prevent other groups from being un-subscribed when qubes group is added
2015-02-13 15:00:54 -05:00
Jason Mehring
fc42561586 Add a qubes group and then add the user 'user' to the group
This is to allow permissions to be set on some devices where the user needs
less restrictive permissions.  /etc/udev/rules.d/99-qubes-misc.rules changes
a few xen devices to allow the users in the qubes group access
2015-02-11 08:02:55 -05:00
Olivier MEDOC
898f223cd4 archlinux: align with fedora changes related to imsettings 2015-01-30 00:48:56 +01:00
Olivier MEDOC
6c8ef2ddd8 archlinux: enable/disable services when corresponding packages got installed 2014-08-02 23:47:19 +02:00
Olivier MEDOC
eb1dcd750e archlinux: follow fedora20 qubes agent improvement 2014-08-02 23:47:19 +02:00
Olivier MEDOC
b488be3ff8 archlinux: add notification daemon 2014-08-02 23:47:19 +02:00
Olivier MEDOC
3dcb434142 archlinux: move xinitrc bugfix to qubes-gui-agent 2014-02-16 21:17:39 +01:00
Olivier MEDOC
59ea1741dd archlinux: fixes for working user session 2014-02-16 21:13:53 +01:00
Olivier MEDOC
d931ba237e archlinux: ensure /lib/modules is mounted before xenfs using a systemd service
This systemd service is not disruptive to the boot process if it fails to mount /lib/modules (because it has been mounted before systemd switched the root directory to the real one).
The advantage is that it will boot /usr/lib/modules even if dracut doesn't handle root switch pre-hook, which is the case on archlinux.
It then allows booting an archlinux AppVM using an archlinux kernel.
2014-02-08 23:16:52 +01:00
Olivier MEDOC
6547577ce9 archlinux: fix bugs in added package install/remove commands 2014-02-08 23:16:00 +01:00
Olivier MEDOC
e0a00899cf archlinux: fixes in package uninstall trigger and disable additionnal qubes services 2014-02-08 23:15:14 +01:00
Olivier MEDOC
6757337bd3 archlinux: forgot to enable qubes-sysinit when installing package 2014-02-08 23:14:34 +01:00