ejose19
e09675c2b9
archlinux: improve pacman proxy implementation
2020-10-29 00:11:06 -03:00
Marek Marczykowski-Górecki
6262580660
Merge remote-tracking branch 'origin/pr/255'
...
* origin/pr/255:
Overwrite .rpmdb for debian updatevm
Fixes QubesOS/qubes-issues#6124
Fixes QubesOS/qubes-issues#5282
2020-10-29 01:37:23 +01:00
icequbes1
adf6568670
Overwrite .rpmdb for debian updatevm
...
Resolves issue where the dom0 rpm database does not get used on
successive calls to qubes-dom0-update for debian updatevms.
Also resolves "cannot remove .rpmdbold.####" occurrences.
qubesos/qubes-issues#6124
2020-10-28 06:21:20 -07:00
Frédéric Pierret (fepitre)
bab3ccb617
archlinux: disable check on unassigned pkgdir var
2020-10-21 08:37:53 +02:00
Frédéric Pierret (fepitre)
e38ec9743f
archlinux: remove uneeded 'rm -rf' after rework of makefiles
2020-10-21 07:35:18 +02:00
Frédéric Pierret (fepitre)
45745e80e6
archlinux: add passwordless-root package
2020-10-19 17:12:42 +02:00
Frédéric Pierret (fepitre)
5d8cd3249a
archlinux: ensure SYSLIBDIR and LIBDIR for app-menu and misc
2020-10-19 16:01:33 +02:00
Frédéric Pierret (fepitre)
d039eeaedc
archlinux: add missing misc content
2020-10-19 15:53:30 +02:00
Frédéric Pierret (fepitre)
168c41e8e3
Fix networking and remove qrexec pam related
2020-10-19 15:47:20 +02:00
Frédéric Pierret (fepitre)
37a4fe3fd3
archlinux: add missing qubes-session-autostart
2020-10-19 14:55:54 +02:00
Frédéric Pierret (fepitre)
ddeddae7b1
Fix root mount as ro
2020-10-19 14:48:11 +02:00
Frédéric Pierret (fepitre)
4e2eef52c1
Fix archlinux packaging
2020-10-18 14:28:02 +02:00
Marek Marczykowski-Górecki
d90f62f982
version 4.1.17
2020-10-10 05:13:44 +02:00
unman
2b32289ea4
Allow build for Focal
...
(cherry picked from commit e07297d3e613a90499a3468a8f95b576898b12e7)
2020-10-10 04:18:19 +02:00
Frédéric Pierret (fepitre)
5f8c52ea94
preset: handle dom0 and sys-usb qubes-psu-client
2020-10-03 19:34:58 +02:00
Saswat Padhi
4f55a3b085
Fixed menu item name
2020-09-26 22:48:35 +00:00
Frédéric Pierret (fepitre)
523ffc1ef8
vm-systemd: enable dummy modules and psu client
2020-09-20 15:13:03 +02:00
Marek Marczykowski-Górecki
748f254909
version 4.1.16
2020-09-17 14:37:05 +02:00
Marek Marczykowski-Górecki
214da30e82
Merge remote-tracking branch 'origin/pr/248'
...
* origin/pr/248:
bind-dirs: run in DisposableVM, too
2020-09-17 04:17:44 +02:00
Marek Marczykowski-Górecki
ebd7ce87d5
Merge remote-tracking branch 'origin/pr/247'
...
* origin/pr/247:
passwordless-root: sudo: grant access for group qubes
passwordless-root: policykit: restrict access to group qubes
2020-09-17 04:17:32 +02:00
Marek Marczykowski-Górecki
e9466dd04f
Merge remote-tracking branch 'origin/pr/236'
...
* origin/pr/236:
qvm-template: Add qubes.Template{Search,Download} files to the package.
qubes.Template*: Add --refresh option and allow DNF cache to be used.
qubes.Template*: Invoke curl with --silent.
qubes.Template*: Change separator from : to | and include additional metadata.
Fix shell quoting.
Remove repofrompath.
New qrexec calls for interacting with template repos.
2020-09-17 03:08:56 +02:00
Marek Marczykowski-Górecki
fee8f6cfef
Merge remote-tracking branch 'origin/pr/246'
...
* origin/pr/246:
Advertise apparmor support
2020-09-17 02:57:27 +02:00
Marek Marczykowski-Górecki
5bb125fa67
Merge remote-tracking branch 'origin/pr/244'
...
* origin/pr/244:
spec: don't build sysvinit for Fedora and CentOS
2020-09-17 02:48:28 +02:00
Marek Marczykowski-Górecki
87135138ac
Revert "rpm: do not build qubes-core-agent-sysvinit package"
...
This reverts commit 408bccdd5c
.
2020-09-17 02:47:51 +02:00
Marek Marczykowski-Górecki
27d4ecefed
Merge remote-tracking branch 'origin/pr/245'
...
* origin/pr/245:
Skip IGD when unbinding device drivers on suspend
2020-09-17 02:46:45 +02:00
Marek Marczykowski-Górecki
e729a8a8bc
debian: drop python2 in build deps
...
QubesOS/qubes-issues#5297
2020-09-16 16:40:07 +02:00
Marek Marczykowski-Górecki
408bccdd5c
rpm: do not build qubes-core-agent-sysvinit package
...
Since no currently supported distribution needs it, skip the build by
default. If necessary, can be enabled by adjusting %with_sysvinit macro
in the spec.
2020-09-16 16:14:02 +02:00
Marek Marczykowski-Górecki
55d8b99003
travis: allow bullseye install to fail - no dnf/yum available
...
QubesOS/qubes-issues#5940
2020-09-16 15:40:51 +02:00
Rusty Bird
4c4f2e7038
bind-dirs: run in DisposableVM, too
...
Allow the user to configure bind-dirs in the dvm template and have that
configuration applied when a DisposableVM is instantiated.
Fixes QubesOS/qubes-issues#4624
Fixes QubesOS/qubes-issues#5618
2020-09-15 10:52:59 +00:00
Peter Gerber
42fb54da20
passwordless-root: sudo: grant access for group qubes
...
For consistency with `su` and policykit, grant access to group
qubes rather than user user.
2020-09-13 14:17:06 +00:00
Peter Gerber
a8b29c3fa6
passwordless-root: policykit: restrict access to group qubes
...
Without this restriction system users can start processes with
root privileges:
$ sudo -u mail systemd-run --pipe -q id
uid=0(root) gid=0(root) groups=0(root)
2020-09-13 14:16:07 +00:00
herypt
9271763a6f
Advertise apparmor support
2020-09-02 14:37:25 +02:00
Frédéric Pierret (fepitre)
562b871188
spec: don't build sysvinit for Fedora and CentOS
2020-08-28 13:48:18 +02:00
Artur Puzio
21864ab563
Skip IGD when unbinding device drivers on suspend
2020-08-25 17:08:38 +02:00
WillyPillow
e83408d601
qvm-template: Add qubes.Template{Search,Download} files to the package.
2020-08-25 11:11:24 +08:00
Frédéric Pierret (fepitre)
60ed2c0a1b
Workaround for gpg not resolving key servers used behing proxy
...
See QubesOS/qubes-issues#6013
2020-08-22 22:55:33 +02:00
Marek Marczykowski-Górecki
a695902d68
version 4.1.15
2020-08-07 03:52:18 +02:00
Marek Marczykowski-Górecki
0f3e1ae8af
Merge remote-tracking branch 'origin/pr/184'
...
* origin/pr/184:
Add services for paranoid backup restore mode
qfile-unpacker: add option (-w) to wait for disk space before extracting
tar2qfile: fix argument parser
qfile-unpacker: add option for custom user and target directory
2020-08-07 03:01:25 +02:00
Marek Marczykowski-Górecki
cb4f06d464
Merge remote-tracking branch 'origin/pr/239'
...
* origin/pr/239:
xendriverdomain: remove placeholder for sbinpath
Fix regex in qubes-fix-nm-conf.sh
Update travis
xendriverdomain: remove Requires and After proc-xen.mount
Drop legacy xen entry in fstab
2020-08-06 05:32:45 +02:00
Marek Marczykowski-Górecki
629f836177
debian: fix version detection for python3?-nautilus dependency
...
On buster and stretch use python-nautilus, but /etc/debian_version
contains numeric version, not a codename.
Reported by @0spinboson
2020-08-06 05:30:37 +02:00
Marek Marczykowski-Górecki
497dd8d50d
Merge remote-tracking branch 'origin/pr/242'
...
* origin/pr/242:
tinyproxy: support rsync for Gentoo
2020-08-06 05:23:13 +02:00
Frédéric Pierret (fepitre)
239ea3d04b
tinyproxy: support rsync for Gentoo
2020-08-04 12:24:09 +02:00
Ivan Kardykov
e5041783a5
Fix open path in qubes-open-file-manager.desktop
...
Looks like desktop entries doesn`t allow environment variables in Exec string.
qubes.StartApp+qubes-open-file-manager-dom0[1782]: gio: file:///home/user/$HOME: Error when getting information for file “/home/user/$HOME”: No such file or directory
switching to '.' resolve it.
2020-08-04 12:40:02 +03:00
Frédéric Pierret (fepitre)
b804cfb270
xendriverdomain: remove placeholder for sbinpath
2020-08-03 13:18:26 +02:00
Marek Marczykowski-Górecki
8066129445
Add services for paranoid backup restore mode
...
Add a pair of services:
1. qubes.RegisterBackupLocation - called by dom0, registers what backup
location (including both file and command options) can be accessed.
Registered location gets an ID returned to the caller. The location (and
its ID) is valid as long as the service call remains open.
2. qubes.RestoreById - called by restoring DispVM to retrieve the backup
content. The service expects location ID as an argument, and then list
of files/directories (separated with spaces) on the first line of stdin.
This is very similar to qubes.Restore service, with exception for the
archive location control.
QubesOS/qubes-issues#5310
2020-08-03 03:43:09 +02:00
Marek Marczykowski-Górecki
7c261f45da
qfile-unpacker: add option (-w) to wait for disk space before extracting
...
Add -w MARGIN option to always leave at least MARGIN bytes of free
space.
QubesOS/qubes-issues#4791
2020-08-03 03:25:37 +02:00
Marek Marczykowski-Górecki
13eef467bf
tar2qfile: fix argument parser
...
There is only one input, other arguments are files/directories to
extract. There is no need for a loop.
2020-08-03 03:25:36 +02:00
Marek Marczykowski-Górecki
cee32d4f90
qfile-unpacker: add option for custom user and target directory
...
QubesOS/qubes-issues#930
2020-08-03 03:25:36 +02:00
WillyPillow
b0edd5f209
qubes.Template*: Add --refresh option and allow DNF cache to be used.
2020-07-29 20:02:47 +08:00
WillyPillow
9bedf50786
qubes.Template*: Invoke curl with --silent.
2020-07-29 20:02:42 +08:00