Commit Graph

21 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
32915fe126
deb,rpm: split passwordless root access configs into separate package
Make passwordless root access optional - ease integration qrexec
authorization for sudo.

QubesOS/qubes-issues#2695
2017-06-08 22:11:36 +02:00
Patrick Schleizer
2eb0ed2be1
removed trailing spaces 2015-10-15 04:34:55 +02:00
Marek Marczykowski-Górecki
54f8bb4169
Merge remote-tracking branch 'origin/pr/23'
* origin/pr/23:
  Allow passwordless login for user "user" (when using 'sudo xl console') for images being upgraded.
2015-09-28 12:09:12 +02:00
Marek Marczykowski-Górecki
cae488dd34
Merge remote-tracking branch 'origin/pr/22'
* origin/pr/22:
  Allow passwordless login for user "user" (when using 'sudo xl console').
2015-09-28 12:08:39 +02:00
Marek Marczykowski-Górecki
4f26006fa1
debian: fix /dev permissions on upgrade 2015-09-01 17:19:38 +02:00
Patrick Schleizer
313860e02c Allow passwordless login for user "user" (when using 'sudo xl console') for images being upgraded.
Thanks to @marmarek for help with this fix.
Fixes https://github.com/QubesOS/qubes-issues/issues/1130.
2015-08-27 17:30:02 +00:00
Patrick Schleizer
131f79944c Allow passwordless login for user "user" (when using 'sudo xl console').
Fixes https://github.com/QubesOS/qubes-issues/issues/1130.
2015-08-26 12:33:35 +00:00
Marek Marczykowski-Górecki
97a2f04f73
Merge remote-tracking branch 'origin/pr/18'
* origin/pr/18:
  fixed "in place upgrade issue - base-passwd debconf interative questi…on asks 'Remove group "qubes"'" for existing users
2015-08-08 03:09:42 +02:00
Patrick Schleizer
b72fec2988 fixed "in place upgrade issue - base-passwd debconf interative questi…on asks 'Remove group "qubes"'" for existing users
(reported by @adrelanos)
(thanks to @marmarek for help with the patch)
https://github.com/QubesOS/qubes-issues/issues/1105
2015-08-08 02:40:49 +02:00
Patrick Schleizer
f73484f750 fixed "in place upgrade issue - base-passwd debconf interative question asks 'Remove group "qubes"'"
(reported by @adrelanos)
fixed by no longer using static gid (fix suggested by @marmarek)
https://github.com/QubesOS/qubes-issues/issues/1105
2015-08-08 00:54:49 +02:00
Jason Mehring
567a045bcd
Make sure when user is added to qubes group that the group is appended
added -a option to usermod.
This will prevent other groups from being un-subscribed when qubes group is added
2015-02-13 15:00:54 -05:00
Jason Mehring
51c94ccc2b
debian: Move creation of directories into debian.dirs configuration file 2015-02-12 11:29:00 -05:00
Jason Mehring
fc42561586 Add a qubes group and then add the user 'user' to the group
This is to allow permissions to be set on some devices where the user needs
less restrictive permissions.  /etc/udev/rules.d/99-qubes-misc.rules changes
a few xen devices to allow the users in the qubes group access
2015-02-11 08:02:55 -05:00
Jason Mehring
bb850ab95d debian: Remove 'exit 0' in maintainer section scripts to all other debhelpers (if any) to also execute 2015-02-11 08:02:55 -05:00
HW42
97dd21bcff debian: preinst: cleanup user creation
Generate user-groups via -U instead of explicit via groupadd. This also
fix the problem that the tinyproxy group were not gererated as
"system"-group.

Also suppress unneeded output of the existence test.
2015-02-05 05:42:08 +01:00
HW42
5c54d48c36 debian: preinst: don't force the default shell to bash 2015-02-05 05:42:08 +01:00
HW42
dad5bfbd18 remove 'bashisms' or explicit use bash 2015-02-05 05:42:08 +01:00
HW42
77392fd3a9 debian: preinst: remove modification of /etc/modules
modules are already handled by systemd and /lib/modules-load/qubes-*
2015-02-05 01:23:00 +01:00
HW42
6ff749a13a debian: install fstab as normal config file 2015-02-05 01:23:00 +01:00
Marek Marczykowski-Górecki
995c758d14 debian: create tinyproxy as system user 2015-01-30 00:32:09 +01:00
Jason Mehring
132729bd79 debian: Prepend package name to maintainers scripts 2014-11-07 00:16:51 -05:00