Commit Graph

1807 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
3da7d2c315 Merge remote-tracking branch 'qubesos/pr/3'
* qubesos/pr/3:
  Mount /dev/xvdb with fs type "auto"
2015-09-02 01:14:10 +02:00
Marek Marczykowski-Górecki
f09d176d05 Merge commit '9644d86845d11f67751a099c56320ad269218354'
* commit '9644d86845d11f67751a099c56320ad269218354':
  sudoers.d: Stops QT from using the MIT-SHM X11 Shared Memory Extension
  debian: Move python-xdg to depends section in debian/control
2015-09-02 00:45:42 +02:00
Marek Marczykowski-Górecki
d9a8ab6f84 Merge remote-tracking branch 'origin/pr/20'
* origin/pr/20:
  added pulseaudio-kde and spice-vdagent to qubes-trigger-desktop-file-install
2015-09-02 00:31:26 +02:00
Marek Marczykowski-Górecki
c09d1d9d61
systemd: fix starting cups 2015-09-01 17:19:59 +02:00
Marek Marczykowski-Górecki
4f26006fa1
debian: fix /dev permissions on upgrade 2015-09-01 17:19:38 +02:00
Marek Marczykowski-Górecki
0b7ade11b8
qubes-desktop-run: don't crash on Debian wheezy (glib < 2.36)
Gio.DesktopAppInfo.get_boolean was introduced in glib 2.36. Instead of
crashing simply do not support DBusActivatable there. There is no such
application in default Debian wheezy template anyway.
2015-08-28 02:02:19 +02:00
Marek Marczykowski-Górecki
67357e051f
qubes-session-autostart: do not abort the whole process on invalid file 2015-08-27 22:41:51 +02:00
Marek Marczykowski-Górecki
4703e3fca7
Remove dynamically generated autostart desktop files
qubesos/qubes-issues#1151
2015-08-27 22:08:04 +02:00
Marek Marczykowski-Górecki
3d06ce1ee9
Implement dropins for /etc/xdg/autostart (#1151)
Usage of _static_ files (dropins) to override some of autostart entries
(enable/disable them in appropriate VM types) is much simpler and less
error prone than automatic generators.

Handling code is implemented in qubes-session-autostart, which is called
from qubes-session.

qubesos/qubes-issues#1151
2015-08-27 22:08:00 +02:00
Marek Marczykowski-Górecki
d710970e4d
Move .desktop launching code to python moules so it can be reused 2015-08-27 22:07:59 +02:00
Patrick Schleizer
313860e02c Allow passwordless login for user "user" (when using 'sudo xl console') for images being upgraded.
Thanks to @marmarek for help with this fix.
Fixes https://github.com/QubesOS/qubes-issues/issues/1130.
2015-08-27 17:30:02 +00:00
Patrick Schleizer
131f79944c Allow passwordless login for user "user" (when using 'sudo xl console').
Fixes https://github.com/QubesOS/qubes-issues/issues/1130.
2015-08-26 12:33:35 +00:00
Marek Marczykowski-Górecki
93e090469c
qubes-desktop-run: start the Dbus service (if needed)
Much tidier way to solve the issue, provided by @Unman.

qubesos/qubes-issues#1031
2015-08-26 02:08:33 +02:00
Marek Marczykowski-Górecki
0c2306dd0a
Revert "qubes-desktop-run: Activate via DBUS when desktop file contains DBusActivatable"
This reverts commit a5ee90b420.
Lets start the Dbus service the proper way.
2015-08-26 02:00:51 +02:00
Rusty Bird
78dd47ebfb Mount /dev/xvdb with fs type "auto"
Nice for btrfs. (auto is already used on /dev/xvdi.)
2015-08-16 16:51:04 +00:00
Jason Mehring
9644d86845
sudoers.d: Stops QT from using the MIT-SHM X11 Shared Memory Extension
Fedora now needs this sudoer rule.  Allows sudo to keep the `QT_X11_NO_MITSHM` ENV
variable which prevents MIT-SHM errors for Fedora and Debian when running a QT
application:

    `Defaults env_keep += "QT_X11_NO_MITSHM"`

A complementary commit has been made in gui-agent-linux:
    Commit: a02e54b71a9ee17f4b10558065a8fc9deaf69984)
    Author: Jason Mehring <nrgaway@gmail.com>
    Date:   Sat Aug 15 20:13:48 2015 -0400
2015-08-16 08:22:19 -04:00
Jason Mehring
07591cce86
debian: Move python-xdg to depends section in debian/control
Otherwise it `qubes-desktop-file-install` fails in minimal template
2015-08-15 20:52:38 -04:00
Patrick Schleizer
4ccf97cde9 added pulseaudio-kde and spice-vdagent to qubes-trigger-desktop-file-install
so those can be removed from https://github.com/adrelanos/qubes-whonix/blob/master/debian/qubes-whonix.postinst
2015-08-12 04:21:22 +02:00
Patrick Schleizer
dce75cf56e moved python-xdg from Recommends to Depends
to fix 'ImportError: No module named xdg.DesktopEntry'
https://github.com/QubesOS/qubes-issues/issues/1113
2015-08-11 14:51:03 +02:00
Marek Marczykowski-Górecki
3ccbde9a3c
debian: disable netfilter-persistent.service
This is now handled by qubes-iptables.service

qubesos/qubes-issues#1067
2015-08-09 20:32:35 +02:00
Marek Marczykowski-Górecki
9e17db2901
Merge remote-tracking branch 'qubesos/pr/2' into qubes-iptables
* qubesos/pr/2:
  removed iptables-persistent from Depends to improve usablity (avoid redundant debconf question)

Conflicts:
	debian/control
2015-08-09 20:25:45 +02:00
Marek Marczykowski-Górecki
65e9e4c72c
network: use own iptables service instead of repurposing existing one
There were multiple problems with reusing existing one:
 - need to sync with upstream changes (configuration path etc)
 - conflicts resolution on updates
 - lack of iptables --wait, which causes firewall fail to load sometimes

QubesOS/qubes-issues#1067
2015-08-09 20:09:51 +02:00
Marek Marczykowski-Górecki
c6fa6c9b19
debian: remove SELinux disabling code
Debian doesn't have it enabled anyway. Do not prevent the user from
tinkering with that.

(reported by @adrelanos)
Fixes qubesos/qubes-issues#1103
2015-08-09 20:06:59 +02:00
Marek Marczykowski-Górecki
a32020fb25
version 3.0.15 2015-08-08 23:23:39 +02:00
Marek Marczykowski-Górecki
af03300b3a
debian: remove Recommends: chrony
It isn't used anywhere - we only call `ntpdate` as part of
qubes.SyncNtpTime.

If user want to install it, he/she is free to do that.

(reported by @adrelanos)
Fixes qubesos/qubes-issues#1102
2015-08-08 17:14:43 +02:00
Marek Marczykowski-Górecki
63b69e4cf0
version 3.0.14 2015-08-08 04:16:52 +02:00
Marek Marczykowski-Górecki
97a2f04f73
Merge remote-tracking branch 'origin/pr/18'
* origin/pr/18:
  fixed "in place upgrade issue - base-passwd debconf interative questi…on asks 'Remove group "qubes"'" for existing users
2015-08-08 03:09:42 +02:00
Patrick Schleizer
b72fec2988 fixed "in place upgrade issue - base-passwd debconf interative questi…on asks 'Remove group "qubes"'" for existing users
(reported by @adrelanos)
(thanks to @marmarek for help with the patch)
https://github.com/QubesOS/qubes-issues/issues/1105
2015-08-08 02:40:49 +02:00
Marek Marczykowski-Górecki
6d9ab6a17c
Merge remote-tracking branch 'origin/pr/16'
* origin/pr/16:
  fixed "in place upgrade issue - base-passwd debconf interative question asks 'Remove group "qubes"'"
2015-08-08 02:03:54 +02:00
Marek Marczykowski-Górecki
13c54badcb
Move /usr/share/qubes/xdg to /var/lib/qubes/xdg
No files in /usr should be modified during package runtime, `/var` is
for that. So move this data there.
2015-08-08 02:01:15 +02:00
Marek Marczykowski-Górecki
e2cb9b9d74 Tag for commit a5ee90b420
-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
 iQIcBAABAgAGBQJVxNW6AAoJEBu5sftaTG2tsW4P/RZIU57IDSlLZmLKKCgouQMR
 TE1KrgTexaPuzagcZ0rf8op1gXqyt8EBY8mQkOHh/TmF+r0JLsSuddCNAVxkm0fw
 MKJKFviAr6CZbA8nvRRiJEKIdmHV8TyLvPrXMr0CIXkx+pV24b5LUpPx8EmQMk4J
 k+ljGX6uPMIAdgXRvjnRk1BJMuAJEi98iKBAupqyNTmj4409x3xNCEsBTJcu174Z
 sznoK4eqyxGVK9GQRDin9swVp1anIZ8ppRtmIyNTac1zYFctALenWa4xMZlOjFOW
 UGou5ToQRrN3MLuRrJYqM3ZOahH9EO4APd1dd3azuwXzVDHLkZTsLrgRI+XB0T09
 5YGOM60Tjd8lArm8r4e3TwGPJJYeH/t7JtOCSdk78sD2a3sh0+jyRshan/XxqpJp
 xHe43cpe2k4eJ5aezi5S6CapbwdoO8pOE6bg2AoDqCLwKd5YHSGxmVP2TuRYkYvV
 QPOlgfJMF/sCdWBT5YqM/vQTsHaZzmKfN/1sRLj2Tbpchw+sM4mRXTy4LBLhY7Ln
 HmVHFRTQqWuvwvj1BJ/iFZHXE1zYhp4Cl0ABSdRT5dEd88YN3hJFJ9zpehntKvLJ
 R73PQnFafm3mBALxckaAeIR7cNGuuWhBMYP+GwE2tgUmk/SuG9vogccXkBAlYAJd
 vQBQcMF/45EWTs2s1/gY
 =H2wk
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
 iQIcBAABCAAGBQJVxUXQAAoJEAY5OLpCz6ckKHYP/2dvWgWMahZ1mlWtV0fgFYgQ
 wtSUza1XxhSPpHwI+mjt+OqQz8nZWhxkobrGYwUXBGryV6rBvt+Wdw5N+rWE/J5Q
 PNPZiWkrMHAgHpui+T0KtiSVJkePeOtiUbW/8zPQH2J/5oDae6P8a7jts5VIjp72
 TWwlAFgxxMTRUOjZ6Fkcj55A4/kJcVPhvEypZoReFW34eRWGbPYMws54iAy5BN3k
 eDPUplY9ICRHGBezqSA0lxZfYG0QgseVoPnbnxhtOlqfHGghH5pTXdYO0iX6jTG+
 Grzfeczno7hKgsHVNxtT3EdR86vtqrUByGjf44T+HXAUJvdr0iTrK4dIkvDoOk0M
 pn5eHLcHvLK6MKKyY5gkfGRminQgLfakQSukgbP9d/Sp+bBo6G1B1bmcPXeufNi2
 2XUzQDliWFJrdCP7FTvQxKZZI3mwi2vdu4gWMfz/mPwR/stue2RrCDfQZMXfCBVr
 wPmdPY4tuF6Fw/cP96/y24kCtCB13UPSSm5E3CJ/wtu2iItHHKP6oBjIXec39Vtk
 QWe2zluC+b6Tgt4YrlsHnSfAsVE5pW1WWzAq3DxDhuu7OOlU7WdLasAb5OglEVWQ
 TzWM6b/sanBb9FPI/s0VZqF6/Zzy4UcO9+esxA6YgapfJ7pYTzYs8dDFvX2ABpQz
 dHn6Vj3UDycL/WTxel9m
 =TS2/
 -----END PGP SIGNATURE-----

Merge tag 'jm_a5ee90b4'

Tag for commit a5ee90b420

* tag 'jm_a5ee90b4':
  qubes-desktop-run: Activate via DBUS when desktop file contains DBusActivatable

Fixes qubesos/qubes-issues#1031
2015-08-08 01:56:22 +02:00
Marek Marczykowski-Górecki
a0bfbda04d Tag for commit edc9dd404d
-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
 iQIcBAABAgAGBQJVxLEBAAoJEBu5sftaTG2tTTkP/2TLJ68Qx6FnLS9AIcRS7gWJ
 9Bj8oXU2vc1YPrFPHpgV3nLkt1TQ0AO/Z6i5SlXj7ExJllDVi1fq++iph6gITfNH
 K5MA+8/XhoXfyLuFXqfzJo5QN18Kg39T9LPUWT149b39l1/4kI+1utDD8TSzEmuD
 tAD3eLEgFl4BDKoOkOX5lF7zhJU8E/U0xuhnA8DQmy40jmKd6wwkDgXMqp8cC5Me
 UioNv/JbxXuYsmv4RG4FUQfY700ZcK7Z8vtmrAOOT/ILsoGAo26LYTATBr9WRyqD
 HsmVi2RAUhWZECfRFdWXnF2q16J0lCjbF9ORZAruvgwNrk9dR3RIqR6blZc1Ptdn
 DLjD3ZjCSZR1M78++kSIJiS+MbuMN17ZV952VhBZMQj90okdcpJJpTHP+sII+Qpt
 X353s6pEBSfydXlawZiMhQ75h96zZVKxTsnnZLZ1ZrbeHgreLK8S1QJcdx0Y4wZt
 ATGMV+M5aQZWM/kj/u8q0JIeN55iFG4x8y5y/4XZrbugpIV+eK/Z1qFyZRgYt899
 oubxzOg9mGG5lnGhNhV9DH05dQe4khqs9A1kk3AuFY/kxQ5ZxNzlye50P7w5qD4r
 K4xOMTnl0Csg5GYExucbL6bjdFSdmH056pl76z/FVpdsNpGQzq7+lWpTcxml+ZB/
 3IioarpI+yR52MBiMLHA
 =Yg7C
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
 iQIcBAABCAAGBQJVxUV1AAoJEAY5OLpCz6ck5iEQALXiOprb35A6kr6DsNRyvF3z
 kL/nguhzA1QXJIeMtG303JTsF/5CBut6Lpe6qo+Ghh/j7GZY2U3yXq6DJ/dGTTlq
 LlV1/q9c6z7kAg5aUzGWlyPAU2mnlUSD89xf1Wkti56jrb5mAz4OG0mDuJEMBDny
 IId/eYMio0L7mulY8sIN5y06lBqDiwzY9dPw7wj/DS+89IwpkmUkdtfB+1GC7ZFt
 labo/vf06dskLXHl8s3eXCJlfV9zqAB8/C3r071LmymV8lVuFvC3ig51j1G5AyEZ
 +ZWRTgqB4JDefGY1XYAYmEO+96J6tTWHxT21C70314Df74/mYmSw40a/2jcrZT29
 e2B+bF6rU7CFGnNQM3YK8q5+cPjpbT1gJrYt+67GGI/IqLHWMOcMkpK9YJauGSU7
 3YgTXf7meDrxkyoYSpUZfdx2wtkwHfAcWFgqhX43ntsXLcYOrKlDQyPkxDvNEz2Y
 K66TA83LD1r7cTWHlKi3jLeYvWmHEf0iNVlIFGCxB6C4c0qZeXiHsO3W4Bkbg97p
 ovfa86S6vLcqGbLRThZnzqcDxROU518mDDJVGMbJPLWg6aceEGP9PMVc5RzaNcwj
 gTT9FT1JXIbfg+W2nrZFq3VhKmdOQvz+0AruFC9WwHIYFGyCxfbx55C++BOM8xj0
 LI3o4KAI/JZMao9hIpuK
 =Vd5+
 -----END PGP SIGNATURE-----

Merge tag 'jm_edc9dd40'

Tag for commit edc9dd404d

# gpg: Signature made Fri 07 Aug 2015 03:22:09 PM CEST using RSA key ID 5A4C6DAD
# gpg: Good signature from "Jason Mehring (Qubes OS Signing Key) <nrgaway@gmail.com>"
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg:          There is no indication that the signature belongs to the owner.
# Primary key fingerprint: E0E3 2283 FDCA C1A5 1007  8F27 1BB9 B1FB 5A4C 6DAD

* tag 'jm_edc9dd40':
  fedora: Use 'slider' org.mate.NotificationDaemon theme
  debian: Switch to using org.mate.NotificationDaemon by default to eliminate popups not closing
2015-08-08 01:55:33 +02:00
Marek Marczykowski-Górecki
6da04600c6 Tag for commit 0c62c58d75
-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
 iQIcBAABAgAGBQJVxK+EAAoJEBu5sftaTG2ttrkP/3NA8v1BFATlgxDCPSUWEz0w
 1lDNvq6NwlBqe32A+7MguY1irMUzAYAeS1n60Pw6eoYxI/48XNm3S8hh4jrTaNQH
 obBkkxLsDIH+GrUJbcUllx3Bm+C6J80H0ADcREPCtQ2L0oA+rIECUNnrWhv/dh1Z
 oJHSVS5JAJb4v+wFqXZxLWSVORsv66/fSLAO/7W9AOXO6eGDJbTt5RVet6HHhvAy
 z7KVzx4VRlHUPjCXV4QHLpAp8kBw2L1/mBIokgt4/tDazRmewk47bSjh0eiSPcMz
 ciAMbcc/WQhvzxx6Al+ihwZ7eFuwYTsUEA3rOkJBfkWExZTP512IaQzaVbmmG+5K
 K1B011UXagTRLkXrSgH2OZrfzN+DF6ZkthmgVbD3zepnF0fPVNrO38ImT30tjtZa
 jrug5DP6xKPHrayDPgnLl91qszKWJU71UPgdggtHkaunY1ZhHhrNCBqO9fWVSLiF
 FV4sZC8wV1zZ1Wdp75mvyJRlS+lTRYXDOhaLxPr8cFLwjddq8POISP/GIg3gfjSS
 o2YiT/Mq6PpHHJhxkZYcyXJZoG7L+ecH5Dqqv8qzwScLP5YSVGQPuAoSnmvsi632
 r8fucRPSVi9L/oF00gQLArIRjGZDxsouuf/VnyKj6IlDuBc+Jl5a23HbqDWrxHj4
 plMaJ924DNxVXJmJP4rf
 =uGoF
 -----END PGP SIGNATURE-----
gpgsig -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
 iQIcBAABCAAGBQJVxUVMAAoJEAY5OLpCz6ckdQsQAMKPhsubgP9qQmu+L2xmCAgg
 6OB582gC3Z3njWlvylqNOQgvjEiqoCeES6UE16La/+qVEGoC4T4/n6xbx5O5YdOB
 RWFwUcckiADiP+Kwpa7DFJoNdemXUK8CsxiJxAs37AMie5UmZ7GPyBsAacYqcaX9
 nNRZlX2j8Z3iUbcRl54Ty3D39NX9tk4yyrMEw56w1L//63Hlxjv/8hMQhmL7SX7m
 nUXinbnjf7Ba1ycFB6CBR68T9kTMG0YM7ckqXMlcU7NJ4pyNNkYgbygeASAHtIMO
 PZRBiHtmV3CU+uZ86E6iz1loxJanMyHJ/Tyn2iag8pn/cnmtYX7dSMrYzHR4DPFw
 s1oZWmPmxe4UKqh3T6m7xsECiLOrrM+s6zaWuP2u1RiLHNFARPbWjChNF7JHGNh+
 /iddUVTBsrDj+rHfsHprNJP4t0cAdR9iT6z2ASmwEdVYJw5sGb1UBB5/b4SReS5E
 hPVcjAMyGLIjbVsPYZtwhYGHGq0ALmiE8U6rbkJGqvluOvLOnzCvgf2jB/kLXiFq
 sBzoA1cBvc/U3uBG7DQGCJHX/DcN1yFbKjYMGl1ZQZrpi/d7w137Jkee+MwwnnDh
 WEIlTTW0j8YB9CrM+A2hA318auEXLWyUSEJNJof0yIO9YFo+Z9BJXx96TUkkPXa0
 DHWVrsX0rQEdghMfyNKY
 =qv5o
 -----END PGP SIGNATURE-----

Merge tag 'jm_0c62c58d'

Tag for commit 0c62c58d75

# gpg: Signature made Fri 07 Aug 2015 03:15:48 PM CEST using RSA key ID 5A4C6DAD
# gpg: Good signature from "Jason Mehring (Qubes OS Signing Key) <nrgaway@gmail.com>"
# gpg: WARNING: This key is not certified with a trusted signature!
# gpg:          There is no indication that the signature belongs to the owner.
# Primary key fingerprint: E0E3 2283 FDCA C1A5 1007  8F27 1BB9 B1FB 5A4C 6DAD

* tag 'jm_0c62c58d':
  debian: qubes-desktop-file-install: Add misssing depend to contol
  debian: Reformat depends in control for better readability
  qubes-desktop-file-install: Manages xdg desktop entry files
2015-08-08 01:54:52 +02:00
Marek Marczykowski-Górecki
51e2d6d356
qrexec: make sure that all the pipes/sockets are closed on cleanup
This will ensure that the child process will receive info that the
connection is closed. Otherwise it could hang on write() or in some
cases read() - on its stdin/stdout.

Thanks @adrelanos for help with debugging.
2015-08-08 01:52:59 +02:00
Patrick Schleizer
f73484f750 fixed "in place upgrade issue - base-passwd debconf interative question asks 'Remove group "qubes"'"
(reported by @adrelanos)
fixed by no longer using static gid (fix suggested by @marmarek)
https://github.com/QubesOS/qubes-issues/issues/1105
2015-08-08 00:54:49 +02:00
Marek Marczykowski-Górecki
cc83b8d344
qrexec: fix exit code from qrexec-client-vm
It should be remote process exit code, not the local one.
Also do not 'return' from the middle of the look, just use 'break' to
execute common cleanup code (which will be introduced in next commit).
2015-08-07 21:36:49 +02:00
Jason Mehring
a5ee90b420 qubes-desktop-run: Activate via DBUS when desktop file contains DBusActivatable 2015-08-07 11:58:13 -04:00
Jason Mehring
edc9dd404d fedora: Use 'slider' org.mate.NotificationDaemon theme 2015-08-07 09:20:44 -04:00
Jason Mehring
c4718c1675 debian: Switch to using org.mate.NotificationDaemon by default to eliminate popups not closing
- uses 'slider' theme
2015-08-07 09:20:18 -04:00
Jason Mehring
0c62c58d75 debian: qubes-desktop-file-install: Add misssing depend to contol 2015-08-07 09:15:40 -04:00
Jason Mehring
e2b4961c5b debian: Reformat depends in control for better readability 2015-08-07 09:15:40 -04:00
Jason Mehring
b6c19fc2ef qubes-desktop-file-install: Manages xdg desktop entry files
qubes-desktop-file-install is called by qubes-triggers-desktop-file-install. It's
arguments are based on the Gnome desktop-install-file utility to allow it to be replaced
by same.  Currently the Gnome utility can not be used since it automatically validates
the .desktop entry files with no option to skip validation and will fail on some third
party .desktop files that are not formed properly.

A single trigger script is shared between Fedora, Debian.  This script is used by the
package managers triggers and will copy original .desktop files from `/etc/xdg/autostart`
to `/usr/share/qubes/xdg/autostart` and modify the OnlyShownIn / NotShownIn, etc.  The
original .desktop files are left untouched and left in place.

Qubes modifies the XDG_CONFIG_DIRS to first include the `/usr/share/qubes/xdg`
directory (XDG_CONFIG_DIRS=/usr/share/qubes/xdg:/etc/xdg).

If a package gets removed, it's desktop entry is also removed from the /usr/share/qubes/xdg
directory.

'qubes-desktop-file-install' options:
   --dir DIR                          Install desktop files to the DIR directory (default: <FILE>)
   --force                            Force overwrite of existing desktop files (default: False)
   --remove-show-in                   Remove the "OnlyShowIn" and "NotShowIn" entries from the desktop file (default: False)
   --remove-key KEY                   Remove the KEY key from the desktop files, if present
   --set-key (KEY VALUE)              Set the KEY key to VALUE
   --remove-only-show-in ENVIRONMENT  Remove ENVIRONMENT from the list of desktop environment where the desktop files should be displayed
   --add-only-show-in ENVIRONMENT     Add ENVIRONMENT to the list of desktop environment where the desktop files should be displayed
   --remove-not-show-in ENVIRONMENT   Remove ENVIRONMENT from the list of desktop environment where the desktop files should not be displayed
   --add-not-show-in ENVIRONMENT      Add ENVIRONMENT to the list of desktop environment where the desktop files should not be displayed
2015-08-07 09:15:30 -04:00
Marek Marczykowski-Górecki
e9e38c04a2
fedora: fix default locale generation
If /etc/locale/conf contains LANG="en_US.UTF-8" (with quotes), it was
improperly parsed.
2015-08-04 23:20:11 +02:00
Marek Marczykowski-Górecki
1ca8b51c03
fedora: simulate preset-all only on first install, not upgrade 2015-08-04 20:42:14 +02:00
Marek Marczykowski-Górecki
050bfe42db
fedora: do not own dropins directories
It may cause conflicts in the future
2015-08-04 18:49:02 +02:00
Marek Marczykowski-Górecki
1287decd20
archlinux: remove installOverridenServices as now handled by systemd dropins 2015-08-04 17:26:44 +02:00
Jason Mehring
b3a692b8cc vm-systemd: Add systemd drop-in support which include conditionals to prevent services from starting
Added all the drop-ins and remove older .service overrides
2015-08-04 10:32:41 -04:00
Jason Mehring
579f731e5e Re-aranged qubes-vm.preset to indicate which services are specificly for Fedora only 2015-08-04 10:32:41 -04:00
Jason Mehring
f95c3990ba debian: Add systemd drop-in support which include conditionals to prevent services from starting
Modified postinst to use drop-ins and removed old code that was using overrides
2015-08-04 10:32:29 -04:00
Jason Mehring
9c53ed7d47 fedora: Add systemd drop-in support which include conditionals to prevent services from starting
Modified core-vm.spec to use drop-ins and removed old code that was using overrides
2015-08-04 10:32:20 -04:00