Marek Marczykowski-Górecki
5dfcf06ef4
firewall: switch to python 3
2017-05-20 13:20:08 +02:00
Marek Marczykowski-Górecki
d73221ba3b
version 3.2.18
2017-05-16 00:54:18 +02:00
Marek Marczykowski-Górecki
ee0255b385
debian,fedora: drop gnome-packagekit from dependencies
...
We don't use it currently - xterm with console updater is used by
default.
2017-04-24 00:17:34 +02:00
Marek Marczykowski-Górecki
03b0b2e481
version 3.2.17
2017-04-01 21:45:29 +02:00
Marek Marczykowski-Górecki
bd6ea489e3
version 3.2.16
2017-03-07 23:04:47 +01:00
Marek Marczykowski-Górecki
cf97f4f8e7
Merge remote-tracking branch 'qubesos/pr/40'
...
* qubesos/pr/40:
Stop unnecessary services in Debian
2017-02-20 23:27:07 +01:00
Marek Marczykowski-Górecki
d9cacf66dd
debian: don't fail the upgrade if glib-compile-schemas fails
...
Thanks @adrelanos
2017-02-20 23:25:39 +01:00
Marek Marczykowski-Górecki
7d97fd3a82
debian: fix lintian warning - command-with-path-in-maintainer-script
...
Reported by @adrelanos
https://github.com/QubesOS/qubes-core-agent-linux/pull/39#issuecomment-280951206
2017-02-19 22:43:06 +01:00
unman
1ed2954f91
Stop unnecessary services in Debian
2017-02-16 22:41:14 +00:00
unman
8d1b74d732
Apply gschema override preventing previews in nautilus in Debian
2017-02-12 03:06:48 +00:00
Marek Marczykowski-Górecki
fb8c356216
version 3.2.15
2016-12-04 22:39:01 +01:00
Marek Marczykowski-Górecki
bb53619d3d
version 3.2.14
2016-12-04 21:57:10 +01:00
Marek Marczykowski-Górecki
41e3d591ef
Merge remote-tracking branch 'qubesos/pr/25'
...
* qubesos/pr/25:
Add systemd override for haveged in xenial and stretch. (#2161 ) Reenable haveged.service after debian package installation
Fixes QubesOS/qubes-issues#2161
2016-11-28 15:02:32 +01:00
Marek Marczykowski-Górecki
938d184ef4
version 3.2.13
2016-11-18 01:59:25 +01:00
unman
58febd6d20
Add systemd override for haveged in xenial and stretch. ( #2161 )
...
Reenable haveged.service after debian package installation
2016-11-14 02:33:20 +00:00
Manuel Amador (Rudd-O)
59aec8e5eb
Clean up early initialization and setup of /rw
2016-10-23 20:19:51 +00:00
Marek Marczykowski-Górecki
3b65f98db8
version 3.2.12
2016-10-18 15:55:40 +02:00
unman
1b58c7602f
Remove entry in changelog as version not bumped
2016-10-16 22:24:38 +01:00
unman
da82d93780
use bind-dirs to handle crontab persistence
2016-10-16 01:14:02 +01:00
Marek Marczykowski-Górecki
dd30d91375
version 3.2.11
2016-10-03 11:32:40 +02:00
Marek Marczykowski-Górecki
2c8fe644f3
network: remove qubes-netwatcher
...
This tool/service is obsolete for a long time (it does nothing on R3.0
and later).
2016-09-12 05:58:26 +02:00
Marek Marczykowski-Górecki
ee0a292b21
network: rewrite qubes-firewall daemon
...
This rewrite is mainly to adopt new interface for Qubes 4.x.
Main changes:
- change language from bash to python, introduce qubesagent python package
- support both nftables (preferred) and iptables
- new interface (https://qubes-os.org/doc/vm-interface/ )
- IPv6 support
- unit tests included
- nftables version support running along with other firewall loaded
Fixes QubesOS/qubes-issues#1815
QubesOS/qubes-issues#718
2016-09-12 05:22:53 +02:00
Marek Marczykowski-Górecki
1a601ddbe9
version 3.2.10
2016-08-08 05:23:02 +02:00
HW42
7c15b9b0ea
systemd: remove obsolete symlinks with rm instead of systemctl
...
The systemctl in Debian unstable fails when trying to disable a removed
service. The manpage do not mention a switch to change this behaviour.
But it says:
Note that this operation creates only the suggested symlinks for
the units. While this command is the recommended way to manipulate
the unit configuration directory, the administrator is free to make
additional changes manually by placing or removing symlinks in the
directory.
So a simple rm should be fine.
2016-07-28 21:54:50 +02:00
HW42
5ab7e80306
systemd: fix qubes-mount-home path in cleanup script
2016-07-28 21:54:38 +02:00
Marek Marczykowski-Górecki
fd8a116744
version 3.2.9
2016-07-27 06:08:56 +02:00
Marek Marczykowski-Górecki
bad589bc00
Merge remote-tracking branch 'origin/pr/80'
2016-07-27 05:20:12 +02:00
Marek Marczykowski-Górecki
90be5be630
systemd: cleanup removed services
...
Fixes QubesOS/qubes-issues#2192
2016-07-27 05:19:46 +02:00
Patrick Schleizer
a003093953
add /usr/lib/qubes/bind-dirs.sh compatibility symlink
...
https://github.com/QubesOS/qubes-issues/issues/2191
2016-07-23 21:44:00 +00:00
Marek Marczykowski-Górecki
979e2d2bf8
version 3.2.8
2016-07-17 04:27:04 +02:00
Marek Marczykowski-Górecki
8781a5c588
version 3.2.7
2016-07-13 22:43:06 +02:00
Marek Marczykowski-Górecki
e7b1711e21
version 3.2.6
2016-07-13 04:38:18 +02:00
Marek Marczykowski-Górecki
d47a89ec76
version 3.2.5
2016-06-06 00:18:54 +02:00
Marek Marczykowski-Górecki
762189a0ae
debian: add missing pkg-config build depends
2016-06-05 22:32:54 +02:00
Marek Marczykowski-Górecki
49304180c3
version 3.2.4
2016-06-05 22:10:58 +02:00
Marek Marczykowski-Górecki
2fa8c76eec
version 3.2.3
2016-05-18 23:43:23 +02:00
Marek Marczykowski-Górecki
4c1ae75e35
version 3.2.2
2016-05-18 03:00:12 +02:00
Marek Marczykowski-Górecki
737922bf87
version 3.2.1
2016-05-05 00:05:13 +02:00
Marek Marczykowski-Górecki
1c251487fa
version 3.2.0
2016-03-29 14:41:34 +02:00
Marek Marczykowski-Górecki
8f1ec4ba1a
version 3.1.14
2016-03-07 13:47:01 +01:00
Marek Marczykowski-Górecki
d181cf5cff
version 3.1.13
2016-02-08 05:07:39 +01:00
Marek Marczykowski-Górecki
dca5265958
qubes-open: switch from mimeopen to xdg-open
...
xdg-open is more robust in choosing default application for particular
file type: it supports fallback if the preferred application isn't
working, and most importantly it support system-wide defaults
(/usr/share/applications/defaults.list,
/usr/share/applications/mimeapps.list), so no "random" application is
chosen.
By default xdg-open tries to use environment-specific tool, like
gvfs-open - which isn't good for us, because many such tools do not wait
for editor/viewer termination. That would mean that DisposableVM would
be destroyed just after opening the file.
To avoid such effect, we set DE=generic.
Fixes QubesOS/qubes-issues#1621
2016-02-02 03:28:34 +01:00
Marek Marczykowski-Górecki
5570c899b8
version 3.1.12
2016-01-11 21:59:35 +01:00
Marek Marczykowski-Górecki
b36146961f
version 3.1.11
2016-01-07 05:52:36 +01:00
Marek Marczykowski-Górecki
89d5f8990f
version 3.1.10
2015-12-31 02:58:29 +01:00
Marek Marczykowski-Górecki
5a04fb34ed
debian: add missing python-gtk2 dependency
...
qvm-mru-entry requires it.
Fixes QubesOS/qubes-issues#1567
2015-12-30 15:16:23 +01:00
Marek Marczykowski-Górecki
7835f4da2b
version 3.1.9
2015-12-26 14:24:03 +01:00
Marek Marczykowski-Górecki
ba5041579a
version 3.1.8
2015-12-20 03:12:39 +01:00
Marek Marczykowski-Górecki
8064682e9e
version 3.1.7
2015-12-04 15:32:14 +01:00
Marek Marczykowski-Górecki
5aa0f32c78
version 3.1.6
2015-11-29 00:34:34 +01:00
Marek Marczykowski-Górecki
a11897a1d0
Revert "network: use drop-ins for NetworkManager configuration ( #1176 )"
...
Apparently unmanaged devices are loaded only from main
NetworkManager.conf. Exactly the same line pasted (not typed!) to main
NetworkManager.conf works, but in
/etc/NetworkManager/conf.d/30-qubes.conf it doesn't.
BTW There was a typo in option name ("unmanaged_devices" instead of
"unmanaged-devices", but it wasn't the cause).
This reverts commit 6c4831339c
.
QubesOS/qubes-issues#1176
2015-11-28 17:43:15 +01:00
Marek Marczykowski-Górecki
8482fbbd13
version 3.1.5
2015-11-28 14:48:34 +01:00
Marek Marczykowski-Górecki
c99dca37ce
debian: update build-depends for split qubes-utils package
...
QubesOS/qubes-issues#1416
2015-11-26 22:26:50 +01:00
Marek Marczykowski-Górecki
d4cf78652c
debian: reformat Build-Depends:
...
QubesOS/qubes-issues#1416
2015-11-26 21:10:23 +01:00
Patrick Schleizer
7a0286d58f
clean up /etc/tinyproxy/filter-updates
...
https://github.com/QubesOS/qubes-issues/issues/1188
2015-11-15 12:31:32 +00:00
Marek Marczykowski-Górecki
b725c050c7
version 3.1.4
2015-11-15 04:29:30 +01:00
Marek Marczykowski-Górecki
5d74a8cbc0
version 3.1.3
2015-11-11 06:29:21 +01:00
Marek Marczykowski-Górecki
164387426b
Bump qubes-utils version requirement
...
Those commits needs updated qubes-utils:
823954c
qrexec: use #define for protocol-specified strings
5774c78
qfile-agent: move data handling code to libqubes-rpc-filecopy
QubesOS/qubes-issues#1324
QubesOS/qubes-issues#1392
2015-11-11 05:25:17 +01:00
Marek Marczykowski-Górecki
7cca1b23ee
Get rid of qubes-core-vm-kernel-placeholder
...
Since /lib/modules is not mounted read-only anymore (only a selected
subdirectory there), it is no longer required to prevent kernel package
installation. Even more - since PV Grub being supported, it makes sense
to have kernel installed in the VM.
QubesOS/qubes-issues#1354
2015-11-11 02:36:57 +01:00
Marek Marczykowski-Górecki
9d52b7d178
debian: install locales-all instead of custom locales generation
...
The custom way proved to be unreliable - for example does not survive
`locales` package upgrade. So settle on much more reliable way.
Fixes QubesOS/qubes-issues#1195
2015-10-27 00:23:20 +01:00
Marek Marczykowski-Górecki
22365369d2
Require new enough qubes-utils package for updated libqrexec-utils
...
Required by 97a3793
"qrexec: implement buffered write to a child stdin"
2015-10-24 22:25:19 +02:00
Patrick Schleizer
f2e6dc9391
cleanup /etc/apt/apt.conf.d/00notiy-hook on existing systems
...
00notiy-hook was renamed to 00notify-hook in
'debian: Renamed incorrect filename: 00notiy-hook -> 00notify-hook'
15f1df4947
but the old file was not removed.
(Files in /etc do not automatically get removed on Debian systems when these are removed from the package.)
This is an independent, but supporting fix for:
'Improved upgrade notifications sent to QVMM.'
- https://github.com/marmarek/qubes-core-agent-linux/pull/39
- https://github.com/QubesOS/qubes-issues/issues/1066#issuecomment-150044906
Added debian/qubes-core-agent.maintscript.
2015-10-24 21:05:32 +02:00
Patrick Schleizer
2eb0ed2be1
removed trailing spaces
2015-10-15 04:34:55 +02:00
Marek Marczykowski-Górecki
d3bf3e0978
version 3.1.2
2015-10-11 03:00:00 +02:00
Patrick Schleizer
9664c97e55
minor
2015-10-06 17:13:52 +00:00
Marek Marczykowski-Górecki
6c4831339c
network: use drop-ins for NetworkManager configuration ( #1176 )
...
Do not modify main /etc/NetworkManager/NetworkManager.conf as it would
cause conflicts during updates. Use
/etc/NetworkManager/conf.d/30-qubes.conf instead.
Also remove some dead code for dynamically generated parts (no longer
required to "blacklist" eth0 in VMs - we have proper connection
generated for it). It was commented out for some time already
Fixes QubesOS/qubes-issues#1176
2015-10-06 15:15:26 +02:00
Marek Marczykowski-Górecki
8e497bffc0
Merge branch 'qubes-iptables'
...
Conflicts:
debian/control
rpm_spec/core-vm.spec
QubesOS/qubes-issues#1067
2015-10-05 01:47:01 +02:00
Marek Marczykowski-Górecki
ff40be9c99
version 3.1.1
2015-09-29 16:55:35 +02:00
Marek Marczykowski-Górecki
47a9940a8e
version 3.1.0
2015-09-29 16:39:55 +02:00
Marek Marczykowski-Górecki
0695a18020
Merge remote-tracking branch 'origin/pr/32'
...
* origin/pr/32:
fix typo
2015-09-28 12:58:30 +02:00
Marek Marczykowski-Górecki
ca35c7ec70
Merge remote-tracking branch 'origin/pr/31'
...
* origin/pr/31:
Fixed /etc/pam.d/su.qubes. (Moved line 'auth sufficient pam_permit.so' up. May not be low '@include' lines.)
- Prevent 'su -' from asking for password in Debian [based] templates. Thanks to @unman and @marmarek for suggesting the fix! Fixes https://github.com/QubesOS/qubes-issues/issues/1128 . - Changed 'ifeq (1,${DEBIANBUILD})' to 'ifeq ($(shell lsb_release -is), Debian)' to make the build work outside of Qubes Builder as well.
Conflicts:
debian/control
2015-09-28 12:58:08 +02:00
Marek Marczykowski-Górecki
4342dc5c66
Merge remote-tracking branch 'origin/pr/30'
...
* origin/pr/30:
added missing dependency xserver-xorg-dev
2015-09-28 12:57:13 +02:00
Marek Marczykowski-Górecki
c615afb88f
Merge remote-tracking branch 'origin/pr/28'
...
* origin/pr/28:
qubes-rpc: fix icon selection using pyxdg and support SVG icons
qubes-rpc: fix broken temporary file deletion in qubes.GetImageRGBA
Conflicts:
qubes-rpc/qubes.GetImageRGBA
rpm_spec/core-vm.spec
2015-09-28 12:47:49 +02:00
Marek Marczykowski-Górecki
34b2e822ec
Merge remote-tracking branch 'origin/pr/27'
...
* origin/pr/27:
added missing dependency python-dbus to 'Depends:'
2015-09-28 12:20:57 +02:00
Marek Marczykowski-Górecki
54f8bb4169
Merge remote-tracking branch 'origin/pr/23'
...
* origin/pr/23:
Allow passwordless login for user "user" (when using 'sudo xl console') for images being upgraded.
2015-09-28 12:09:12 +02:00
Marek Marczykowski-Górecki
cae488dd34
Merge remote-tracking branch 'origin/pr/22'
...
* origin/pr/22:
Allow passwordless login for user "user" (when using 'sudo xl console').
2015-09-28 12:08:39 +02:00
Patrick Schleizer
cf55fa54c9
fix typo
2015-09-20 04:01:57 +00:00
Patrick Schleizer
665453da76
- Prevent 'su -' from asking for password in Debian [based] templates.
...
Thanks to @unman and @marmarek for suggesting the fix!
Fixes https://github.com/QubesOS/qubes-issues/issues/1128 .
- Changed 'ifeq (1,${DEBIANBUILD})' to 'ifeq ($(shell lsb_release -is), Debian)' to make the build work outside of Qubes Builder as well.
2015-09-13 17:19:25 +00:00
Patrick Schleizer
3f19b581cd
added missing dependency xserver-xorg-dev
2015-09-12 22:54:26 +00:00
qubesuser
7f9fdc8327
qubes-rpc: fix icon selection using pyxdg and support SVG icons
2015-09-06 22:02:27 +02:00
Patrick Schleizer
5078b2030f
added missing dependency python-dbus to 'Depends:'
...
https://github.com/marmarek/qubes-core-agent-linux/blob/master/misc/qubes-desktop-run depends on python-dbus.
(0b7ade11b8/misc/xdg.py (L5)
)
2015-09-06 16:02:52 +00:00
Marek Marczykowski-Górecki
e924758c54
version 3.0.16
2015-09-03 02:45:30 +02:00
Marek Marczykowski-Górecki
d491ade917
debian: depend on gawk
...
qubes.GetAppmenus uses "nextfile" which is gawk-specific.
Fixes qubesos/qubes-issues#1062
2015-09-02 02:36:35 +02:00
Marek Marczykowski-Górecki
c8ac55b179
Merge branch 'autostart-dropins'
...
Conflicts:
misc/qubes-trigger-desktop-file-install
Fixes qubesos/qubes-issues#1151
2015-09-02 01:16:19 +02:00
Marek Marczykowski-Górecki
4f26006fa1
debian: fix /dev permissions on upgrade
2015-09-01 17:19:38 +02:00
Marek Marczykowski-Górecki
4703e3fca7
Remove dynamically generated autostart desktop files
...
qubesos/qubes-issues#1151
2015-08-27 22:08:04 +02:00
Patrick Schleizer
313860e02c
Allow passwordless login for user "user" (when using 'sudo xl console') for images being upgraded.
...
Thanks to @marmarek for help with this fix.
Fixes https://github.com/QubesOS/qubes-issues/issues/1130 .
2015-08-27 17:30:02 +00:00
Patrick Schleizer
131f79944c
Allow passwordless login for user "user" (when using 'sudo xl console').
...
Fixes https://github.com/QubesOS/qubes-issues/issues/1130 .
2015-08-26 12:33:35 +00:00
Jason Mehring
07591cce86
debian: Move python-xdg to depends section in debian/control
...
Otherwise it `qubes-desktop-file-install` fails in minimal template
2015-08-15 20:52:38 -04:00
Marek Marczykowski-Górecki
9e17db2901
Merge remote-tracking branch 'qubesos/pr/2' into qubes-iptables
...
* qubesos/pr/2:
removed iptables-persistent from Depends to improve usablity (avoid redundant debconf question)
Conflicts:
debian/control
2015-08-09 20:25:45 +02:00
Marek Marczykowski-Górecki
c6fa6c9b19
debian: remove SELinux disabling code
...
Debian doesn't have it enabled anyway. Do not prevent the user from
tinkering with that.
(reported by @adrelanos)
Fixes qubesos/qubes-issues#1103
2015-08-09 20:06:59 +02:00
Marek Marczykowski-Górecki
a32020fb25
version 3.0.15
2015-08-08 23:23:39 +02:00
Marek Marczykowski-Górecki
af03300b3a
debian: remove Recommends: chrony
...
It isn't used anywhere - we only call `ntpdate` as part of
qubes.SyncNtpTime.
If user want to install it, he/she is free to do that.
(reported by @adrelanos)
Fixes qubesos/qubes-issues#1102
2015-08-08 17:14:43 +02:00
Marek Marczykowski-Górecki
63b69e4cf0
version 3.0.14
2015-08-08 04:16:52 +02:00
Marek Marczykowski-Górecki
97a2f04f73
Merge remote-tracking branch 'origin/pr/18'
...
* origin/pr/18:
fixed "in place upgrade issue - base-passwd debconf interative questi…on asks 'Remove group "qubes"'" for existing users
2015-08-08 03:09:42 +02:00
Patrick Schleizer
b72fec2988
fixed "in place upgrade issue - base-passwd debconf interative questi…on asks 'Remove group "qubes"'" for existing users
...
(reported by @adrelanos)
(thanks to @marmarek for help with the patch)
https://github.com/QubesOS/qubes-issues/issues/1105
2015-08-08 02:40:49 +02:00
Marek Marczykowski-Górecki
6d9ab6a17c
Merge remote-tracking branch 'origin/pr/16'
...
* origin/pr/16:
fixed "in place upgrade issue - base-passwd debconf interative question asks 'Remove group "qubes"'"
2015-08-08 02:03:54 +02:00
Patrick Schleizer
f73484f750
fixed "in place upgrade issue - base-passwd debconf interative question asks 'Remove group "qubes"'"
...
(reported by @adrelanos)
fixed by no longer using static gid (fix suggested by @marmarek)
https://github.com/QubesOS/qubes-issues/issues/1105
2015-08-08 00:54:49 +02:00
Jason Mehring
c4718c1675
debian: Switch to using org.mate.NotificationDaemon by default to eliminate popups not closing
...
- uses 'slider' theme
2015-08-07 09:20:18 -04:00
Jason Mehring
0c62c58d75
debian: qubes-desktop-file-install: Add misssing depend to contol
2015-08-07 09:15:40 -04:00
Jason Mehring
e2b4961c5b
debian: Reformat depends in control for better readability
2015-08-07 09:15:40 -04:00
Jason Mehring
b6c19fc2ef
qubes-desktop-file-install: Manages xdg desktop entry files
...
qubes-desktop-file-install is called by qubes-triggers-desktop-file-install. It's
arguments are based on the Gnome desktop-install-file utility to allow it to be replaced
by same. Currently the Gnome utility can not be used since it automatically validates
the .desktop entry files with no option to skip validation and will fail on some third
party .desktop files that are not formed properly.
A single trigger script is shared between Fedora, Debian. This script is used by the
package managers triggers and will copy original .desktop files from `/etc/xdg/autostart`
to `/usr/share/qubes/xdg/autostart` and modify the OnlyShownIn / NotShownIn, etc. The
original .desktop files are left untouched and left in place.
Qubes modifies the XDG_CONFIG_DIRS to first include the `/usr/share/qubes/xdg`
directory (XDG_CONFIG_DIRS=/usr/share/qubes/xdg:/etc/xdg).
If a package gets removed, it's desktop entry is also removed from the /usr/share/qubes/xdg
directory.
'qubes-desktop-file-install' options:
--dir DIR Install desktop files to the DIR directory (default: <FILE>)
--force Force overwrite of existing desktop files (default: False)
--remove-show-in Remove the "OnlyShowIn" and "NotShowIn" entries from the desktop file (default: False)
--remove-key KEY Remove the KEY key from the desktop files, if present
--set-key (KEY VALUE) Set the KEY key to VALUE
--remove-only-show-in ENVIRONMENT Remove ENVIRONMENT from the list of desktop environment where the desktop files should be displayed
--add-only-show-in ENVIRONMENT Add ENVIRONMENT to the list of desktop environment where the desktop files should be displayed
--remove-not-show-in ENVIRONMENT Remove ENVIRONMENT from the list of desktop environment where the desktop files should not be displayed
--add-not-show-in ENVIRONMENT Add ENVIRONMENT to the list of desktop environment where the desktop files should not be displayed
2015-08-07 09:15:30 -04:00
Jason Mehring
f95c3990ba
debian: Add systemd drop-in support which include conditionals to prevent services from starting
...
Modified postinst to use drop-ins and removed old code that was using overrides
2015-08-04 10:32:29 -04:00
Jason Mehring
511b2f9339
debian: Added cups, system-config-printer to Recommends
2015-08-02 17:45:50 -04:00
Jason Mehring
a006fdff86
debian: remove cups/print-applet triggers
2015-08-02 17:45:45 -04:00
Jason Mehring
8d7d13fb17
debian: Change triggers to use interest-await
(execute triggers after all packages installed)
2015-08-02 17:45:36 -04:00
Patrick Schleizer
9b05427596
removed iptables-persistent from Depends to improve usablity (avoid redundant debconf question)
2015-08-02 21:44:51 +02:00
Marek Marczykowski-Górecki
51d55c03dc
debian: fix permissions of /var/lib/qubes/dom0-updates
...
qubesos/qubes-issues#1029
2015-07-18 15:06:40 +02:00
Marek Marczykowski-Górecki
a122380624
version 3.0.13
2015-07-01 07:05:53 +02:00
Marek Marczykowski-Górecki
ea0615d4da
version 3.0.12
2015-06-23 20:06:23 +02:00
Marek Marczykowski-Górecki
b368ffe5c6
fedora, debian: make sure that default locale is generated
...
Otherwise some GUI applications would not start.
2015-06-16 02:27:23 +02:00
Marek Marczykowski-Górecki
3fdb67ac2b
dom0-updates: make the tool working on Debian
...
Restore support for older yum: no --downloadonly option, so use
yumdownloader.
Also add some a code to handle some Debian quirks - especially default
rpmdb location in user home...
2015-06-16 02:22:42 +02:00
Marek Marczykowski-Górecki
cdebf33cf6
version 3.0.11
2015-06-11 04:06:26 +02:00
Marek Marczykowski-Górecki
f05268bf59
debian: fix apt sources.list generation (missing debian version field)
...
Add Build-Depends: lsb-release, which is used for that.
2015-06-08 08:47:22 +02:00
Marek Marczykowski-Górecki
bd9a3bf515
version 3.0.10
2015-06-02 11:20:18 +02:00
Marek Marczykowski-Górecki
eb3e0c8c25
version 3.0.9
2015-05-15 03:27:58 +02:00
Marek Marczykowski-Górecki
4a7b355490
version 3.0.8
2015-04-28 12:51:48 +02:00
Marek Marczykowski-Górecki
32374123cd
version 3.0.7
2015-04-25 02:36:55 +02:00
Jason Mehring
4373cda566
Changed location of PROTECTED_FILE_LIST to /etc/qubes/protected-files.d
2015-04-25 02:36:43 +02:00
Jason Mehring
56b0685aaa
whonix: Added protected-files file used to prevent scripts from modifying files that need to be protected
...
A file is created in /var/lib/qubes/protected-files. Scripts can grep this file before modifying
known files to be protected and skip any modifications if the file path is within protected-files.
Usage Example:
if ! grep -q "^/etc/hostname$" "${PROTECTED_FILE_LIST}" 2>/dev/null; then
Also cleaned up maintainer scripts removing unneeded systemd status functions and streamlined
the enable/disable systemd unit files functions
2015-04-25 02:36:43 +02:00
Marek Marczykowski-Górecki
ab38410f5c
debian: install qubes-download-dom0-updates.sh
2015-04-14 00:22:35 +02:00
Marek Marczykowski-Górecki
3768426306
version 3.0.6
2015-04-11 03:40:57 +02:00
Marek Marczykowski-Górecki
e8c9f010ad
version 3.0.5
2015-04-07 14:58:36 +02:00
Marek Marczykowski-Górecki
2951e1ba02
version 3.0.4
2015-04-02 00:55:09 +02:00
Marek Marczykowski-Górecki
d41ae5bc7f
debian: update NetworkManager configuration
...
Especially add unmanaged-devices, otherwise NM will break vif*
configuration.
2015-03-30 22:49:50 +02:00
Marek Marczykowski-Górecki
52d502bce2
debian: fix handling SysV units in disableSystemdUnits
...
systemctl is-enabled always reports "disabled" for them (actually not a
real "disabled", but and error, but exit code is the same). So simply
always disable the unit, it is no-op for already disabled ones.
BTW systemctl preset also do not work for them.
2015-03-30 21:46:01 +02:00
Marek Marczykowski-Górecki
b05fa062be
version 3.0.3
2015-03-27 01:24:43 +01:00
Marek Marczykowski-Górecki
add158d8e7
version 3.0.2
2015-03-26 23:56:25 +01:00
Jason Mehring
da2b0cde16
Removed code that deleted original nautilus actions
...
dpkg/rpm should handle this automatically on upgrading package
2015-02-27 16:17:44 -05:00
Jason Mehring
6836420c3c
Removed nautilus-actions depend and replaced with nautilus-python
...
nautilus-actions was orphaned in fc21, so all nautilus context menus have
been re-written as nautilus-python extensions
2015-02-27 00:52:17 -05:00
Jason Mehring
de51e155f3
debian: Add extend-diff-ignore options to debian packager
...
This will ignore excluded deb, rpm, pkg and .git directories that were
tar'ed for the .orig.tar.gz debian upstream package file and will prevent
build errors
2015-02-19 19:56:23 -05:00
Marek Marczykowski-Górecki
3c67f98a9b
debian: fix version number
2015-02-17 16:25:01 +01:00
Marek Marczykowski-Górecki
4947c0c53a
version 3.0.1
2015-02-17 14:14:16 +01:00
Jason Mehring
567a045bcd
Make sure when user is added to qubes group that the group is appended
...
added -a option to usermod.
This will prevent other groups from being un-subscribed when qubes group is added
2015-02-13 15:00:54 -05:00
Jason Mehring
197fa604ed
debian: Remove unneeded patch file and README
2015-02-12 11:34:13 -05:00
Jason Mehring
51c94ccc2b
debian: Move creation of directories into debian.dirs configuration file
2015-02-12 11:29:00 -05:00
Jason Mehring
45cbeda244
debian: Revert depends back to use libxen-dev
2015-02-12 11:27:35 -05:00
Jason Mehring
6e3be531c5
Merge branch 'r3-templates' of github.com:nrgaway/core-agent-linux into r3-templates
...
Conflicts:
debian/rules
2015-02-11 08:06:45 -05:00
Jason Mehring
2274e65a32
debian: Refactor Debian quilt packaging for xen
...
- Use copy-in for debian-quilt package in Makefile.builder instead of hook (to be removed) in Makefile.debian
- Remove patches from debian/patches; they are now applied dynamicly from series-debian-vm.conf
2015-02-11 08:02:55 -05:00
Jason Mehring
79650f0c4c
debian: Converted debian package to a quilt package to allow patches
...
Applied patch to qrexec Makefile to prevent compile failure on warnings
qrexec: Disable all warnings being treated as errors
gcc -g -O2 -fstack-protector-strong -Wformat -Werror=format-security -I. -g -Wall -Wextra -Werror -pie -fPIC `pkg-config --cflags vchan-xen` -D_FORTIFY_SOURCE=2 -c -o qrexec-agent-data.o qrexec-agent-data.c
qrexec-agent-data.c: In function 'handle_remote_data':
qrexec-agent-data.c:217:17: error: dereferencing type-punned pointer will break strict-aliasing rules [-Werror=strict-aliasing]
status = *(unsigned int *)buf;
^
cc1: all warnings being treated as errors
<builtin>: recipe for target 'qrexec-agent-data.o' failed
2015-02-11 08:02:55 -05:00
Jason Mehring
fc42561586
Add a qubes group and then add the user 'user' to the group
...
This is to allow permissions to be set on some devices where the user needs
less restrictive permissions. /etc/udev/rules.d/99-qubes-misc.rules changes
a few xen devices to allow the users in the qubes group access
2015-02-11 08:02:55 -05:00
Jason Mehring
bb850ab95d
debian: Remove 'exit 0' in maintainer section scripts to all other debhelpers (if any) to also execute
2015-02-11 08:02:55 -05:00
Marek Marczykowski-Górecki
b40c791914
debian: change systemctl set-default back to manual symlink
...
systemd in wheezy is old enough to not have this option.
2015-02-10 17:22:04 +01:00
Jason Mehring
0df84c7796
debian: Converted debian package to a quilt package to allow patches
...
Applied patch to qrexec Makefile to prevent compile failure on warnings
qrexec: Disable all warnings being treated as errors
gcc -g -O2 -fstack-protector-strong -Wformat -Werror=format-security -I. -g -Wall -Wextra -Werror -pie -fPIC `pkg-config --cflags vchan-xen` -D_FORTIFY_SOURCE=2 -c -o qrexec-agent-data.o qrexec-agent-data.c
qrexec-agent-data.c: In function 'handle_remote_data':
qrexec-agent-data.c:217:17: error: dereferencing type-punned pointer will break strict-aliasing rules [-Werror=strict-aliasing]
status = *(unsigned int *)buf;
^
cc1: all warnings being treated as errors
<builtin>: recipe for target 'qrexec-agent-data.o' failed
2015-02-10 10:40:51 -05:00
Jason Mehring
ccff1f3149
Add a qubes group and then add the user 'user' to the group
...
This is to allow permissions to be set on some devices where the user needs
less restrictive permissions. /etc/udev/rules.d/99-qubes-misc.rules changes
a few xen devices to allow the users in the qubes group access
2015-02-07 06:07:35 -05:00
Jason Mehring
328430d3bf
debian: Remove 'exit 0' in maintainer section scripts to all other debhelpers (if any) to also execute
2015-02-07 04:51:45 -05:00
HW42
97dd21bcff
debian: preinst: cleanup user creation
...
Generate user-groups via -U instead of explicit via groupadd. This also
fix the problem that the tinyproxy group were not gererated as
"system"-group.
Also suppress unneeded output of the existence test.
2015-02-05 05:42:08 +01:00
HW42
166ec3323f
debian: prerm: remove obsolete code
...
this code has been obsoleted by commit 56607800, eb18af4c and 707be87a.
2015-02-05 05:42:08 +01:00
HW42
5c54d48c36
debian: preinst: don't force the default shell to bash
2015-02-05 05:42:08 +01:00
HW42
dad5bfbd18
remove 'bashisms' or explicit use bash
2015-02-05 05:42:08 +01:00
HW42
77392fd3a9
debian: preinst: remove modification of /etc/modules
...
modules are already handled by systemd and /lib/modules-load/qubes-*
2015-02-05 01:23:00 +01:00
HW42
6ff749a13a
debian: install fstab as normal config file
2015-02-05 01:23:00 +01:00
HW42
641c516d76
debian: postinst: remove redundant and misleading trigger output
2015-02-05 01:22:21 +01:00
HW42
60a181b3f4
debian: postinst: enable haveged only if installed
2015-02-05 01:22:21 +01:00
HW42
05da6e6379
debian: postinst: don't start systemd services
...
Starting services in the postinst script doesn't make much sense since
the package is normally installed in the template. In addition the start
can fail when executed through a trigger.
2015-02-05 01:22:20 +01:00
HW42
e8f25bfac8
debian: postinst: cleanup
2015-02-05 01:22:20 +01:00
HW42
de53e1d0bb
debian: postinst: enable netfilter-persistent service
2015-02-05 01:22:20 +01:00
HW42
5080c7c2d3
debian: postinst: remove fedora specific code
...
/etc/iptables/rules.* are already part of the packet.
The removed code has never done something in debian (since
/etc/iptables/rules.* already exists).
2015-02-05 01:22:20 +01:00
HW42
07c2f2a5f4
debian: postinst: use systemctl to set default target
2015-02-05 01:22:20 +01:00
HW42
a5fbbea98d
debian: postinst: don't create /rw - it is already part of the package
2015-02-05 01:22:20 +01:00
HW42
b2307cfee6
debian: postinst: don't remove /etc/udev/rules.d/*
...
removing /etc/udev/rules.d/* in debian makes no sense since this folder
is only for custom udev rules.
2015-02-05 01:22:20 +01:00
HW42
47550ee2b6
debian: don't generate regular conf files in postinst
2015-02-05 01:22:19 +01:00
HW42
8a9d2378f6
debian: postinst: use dpkg-divert
...
dpkg-divert is not ideal for config files but should work better than
direct cp/mv.
2015-02-05 01:22:19 +01:00
HW42
4faece9e89
debian: postinst: use systemctl mask
2015-02-05 01:22:19 +01:00
HW42
d7fac08792
debian: fix for QSB #014 requires up to date qubes-utils
2015-02-05 01:22:19 +01:00
Jason Mehring
33d3a6c9ea
fc21: iptables configurations conflict with fc21 yum package manager
...
Moved iptables configuration to /usr/lib/qubes/init
fc21 + debian + arch will place them in proper place on postinst
Fixes dedian bug of not having them in proper place
2015-01-30 00:43:31 +01:00
HW42
dbd19698b3
debian: remove unneeded acpid dependency
...
https://groups.google.com/forum/?_escaped_fragment_=msg/qubes-devel/oY7m9zNEXFw/N94pknsTg7oJ
Conflicts:
debian/control
2015-01-30 00:39:35 +01:00
HW42
6f056486e0
debian: move not strictly required packages to Recommends-Section.
...
https://groups.google.com/forum/?_escaped_fragment_=msg/qubes-devel/oY7m9zNEXFw/N94pknsTg7oJ
Conflicts:
debian/control
2015-01-30 00:38:07 +01:00
Marek Marczykowski-Górecki
a4ad010a45
debian: fix service name in postinst script
2015-01-30 00:32:56 +01:00
Marek Marczykowski-Górecki
c3ef00303f
debian: remove obsolete code from postinst script
...
NetworkManager-dispatcher.service issue seems to be already fixed in
upstream package.
2015-01-30 00:32:56 +01:00
Marek Marczykowski-Górecki
45e7cbb2ac
debian: add missing python-gi to dependencies
...
Required for qubes-desktop-run tool.
2015-01-30 00:32:56 +01:00
Marek Marczykowski-Górecki
995c758d14
debian: create tinyproxy as system user
2015-01-30 00:32:09 +01:00
Marek Marczykowski-Górecki
9130636c88
Merge branch 'debian'
...
Conflicts:
misc/qubes-r2.list.in
misc/qubes-trigger-sync-appmenus.sh
network/30-qubes-external-ip
network/qubes-firewall
vm-systemd/network-proxy-setup.sh
vm-systemd/prepare-dvm.sh
vm-systemd/qubes-sysinit.sh
2015-01-30 00:30:24 +01:00
Marek Marczykowski-Górecki
3a0ad108d4
version 3.0.0
2014-11-22 16:24:18 +01:00
Jason Mehring
4420df01ea
debian: Don't display systemd info in chroot since systemd show does not work in chroot
2014-11-12 03:39:17 -05:00
Jason Mehring
da6f6bd22b
debian: Wrong variable name was used to create /usr/share/qubes/xdg/autostart
2014-11-09 13:27:38 -05:00
Jason Mehring
51cac340ca
debian: Added functionality to move desktop entry config files to /usr/share/qubes/xdg/autostart to preserve originals
...
Added trigger for new notify agent; removed trigger for old one
2014-11-09 12:58:57 -05:00
Jason Mehring
ef50c0d7b6
debian: Add new notification agent depends; remove other
2014-11-09 12:58:48 -05:00
Jason Mehring
cadb102781
debian: More depends for debian as netvm and some configuration tweaks.
...
Jessie base loads as netvm; wheezy base giving bad window error when trying to start nm-applet
Fixed qt MIT-SHM graphics issue
2014-11-08 02:58:07 -05:00
Jason Mehring
1f93dc0a60
debian: Added more error reporting to track down any missing dependancies
...
Prints various systemd messages when a unit fails to enable/disable/start/stop
Fixed issue with alternate NetworkManager* systemd files not being placed
Removed 'basename -s' since -s option not supported in wheezy
2014-11-07 22:52:32 -05:00
Jason Mehring
afcff2ca4b
debian: removed commented out depends
2014-11-07 18:29:05 -05:00
Jason Mehring
9e065d6d9c
debian: Added all other outstanding triggers contained in rpm_spec as well as triggers if other packages get installed at a later date the configurations will run on them
2014-11-07 18:28:04 -05:00
Jason Mehring
79db86a94a
debian: Added postrm disable of other Qubes packages
2014-11-07 18:26:21 -05:00
Jason Mehring
abcc01b874
debian: Added more dependancies
2014-11-07 18:25:12 -05:00
Jason Mehring
dbffe57bc9
debian: Revert back to original NetworkManager, ModemManager service names
2014-11-07 03:32:06 -05:00
Jason Mehring
132729bd79
debian: Prepend package name to maintainers scripts
2014-11-07 00:16:51 -05:00
Jason Mehring
4c30f28864
debian: Cleanup
...
'set -e' in place of 'set -x'
Seperated out 'QT_X11_NO_MITSHM=1' export into own profile.d file
Seperated out 'QT_X11_NO_MITSHM=1' sudoers rule to own sudoers.d file
Commented out some services that were being enabled that are not installed (yet)
Reformated trigger section to allow for multiple triggers
2014-11-07 00:09:54 -05:00
Jason Mehring
802626c197
debian: set -e added in place of set -x
2014-11-07 00:08:26 -05:00
Marek Marczykowski-Górecki
a2bba58877
debian: fix initialization of /etc/hosts
2014-11-05 05:10:42 +01:00
Marek Marczykowski-Górecki
36b1793739
debian: support for appmenus
...
-----BEGIN PGP SIGNATURE-----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=hvgM
-----END PGP SIGNATURE-----
Merge tag 'hw42_appmenus' into debian
debian: support for appmenus
Conflicts:
debian/qubes-core-agent.postinst
2014-11-05 04:37:34 +01:00
Marek Marczykowski-Górecki
c817bb0282
little fix for the official template
...
-----BEGIN PGP SIGNATURE-----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=6kCH
-----END PGP SIGNATURE-----
Merge tag 'hw42_debian-systemd-3' into debian
Conflicts:
debian/control
Merged postinst scripts from hw42 and nrgaway
2014-11-05 04:35:23 +01:00
HW42
f9b658e6ad
debian: add support for qubes appmenus
2014-11-04 05:53:36 +01:00
HW42
457196ba58
debian: add dependency on xen-utils since it's needed for proxy/netvm
...
xen-utils provides the /etc/xen/ scripts which are needed for the
network setup.
2014-11-04 04:59:17 +01:00
HW42
63e915f6d4
Tag for commit 5d68e2cc70
...
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=shGW
-----END PGP SIGNATURE-----
Merge tag 'mm_5d68e2cc' into debian-systemd
Tag for commit 5d68e2cc70
Conflicts:
Makefile
debian/rules
network/qubes-firewall
vm-systemd/misc-post.sh
vm-systemd/qubes-sysinit.sh
2014-11-03 04:28:00 +01:00
Jason Mehring
be37c6cc5b
debian: force shell to be bash since its default is dash and many qubes scripts rely on bash and will break in dash and added tinyproxy user
2014-11-02 16:28:50 -05:00
Jason Mehring
ef787ce40b
debian: added new depends
2014-11-02 16:24:41 -05:00
Jason Mehring
d34268a085
debian: preinst needs a group and force no password entry on adduser
2014-10-31 03:04:42 -04:00
Jason Mehring
0937a3b3c6
debian: Added maintainers scripts (pre / postinit + rm) - Currently in debug mode
2014-10-31 01:59:20 -04:00
Jason Mehring
5c351bf4ae
debian: add xen-utils-common as a dependancy to allow Debian proxies
2014-10-31 01:57:41 -04:00
Marek Marczykowski-Górecki
d208e9baa5
version 2.1.42
2014-10-25 01:49:58 +02:00
Marek Marczykowski-Górecki
20a2cfbce7
debian: custom dh_auto_clean no longer needed
...
qubes-builder now takes care of it
2014-10-21 05:29:20 +02:00
HW42
00e846bbbe
debian: chown /home_volatile/user in posinst
2014-10-01 03:45:03 +02:00
HW42
bbb0b3610b
add xserver-xorg-video-dummy to the dependencies list of qubes-core-agent
...
the dummy video module is needed by the dvm prepare script
2014-10-01 02:17:29 +02:00
Marek Marczykowski-Górecki
e83a91e3d3
debian: migrate to native systemd services
2014-09-30 00:54:33 +02:00
HW42
0d0261d1c1
improve update of /etc/hosts
...
* use 127.0.1.1 under debian (since it's the default there)
* also set the IPv6 loopback address (::1) since some tools tries to
AAAA resolve the hostname (for example sendmail)
* ensure proper /etc/hosts format through postinst-script (hostname as
last entry)
2014-09-29 05:25:32 +02:00
HW42
70bbc7923d
install iptables/forwarding for debian
2014-09-29 05:25:14 +02:00
HW42
435c04e8a4
use systemd in debian
2014-09-29 05:24:26 +02:00
HW42
dad11bd378
don't track debina/files (since it is autogenerated)
2014-09-26 23:19:01 +02:00
Marek Marczykowski-Górecki
1a712c3a4a
version 2.1.41
2014-08-15 17:45:15 +02:00
Marek Marczykowski-Górecki
77abedee36
version 2.1.40
2014-07-28 02:38:59 +02:00
Marek Marczykowski-Górecki
3bcf34942a
debian: do not restart service during upgrade
...
It will break the VM (qrexec daemon will not be restarted, so VM will be
isolated from any qrexec calls, like qvm-run).
2014-07-28 02:29:26 +02:00
Marek Marczykowski-Górecki
9fc9b8ede7
debian: fix qfile-unpacker perms
...
Leave suid in place, it is required here.
2014-07-28 02:29:00 +02:00
Marek Marczykowski-Górecki
48b6bc5e5e
debian: add updates repo definition and key
2014-07-28 02:27:56 +02:00
Marek Marczykowski-Górecki
27a12a0aac
debian: update deps
2014-07-26 01:57:58 +02:00
Davíð Steinn Geirsson
65e8e96a68
Initial debian packaging
2014-07-23 05:13:32 +02:00