Commit Graph

2566 Commits

Author SHA1 Message Date
Frédéric Pierret (fepitre)
da162d7615
Handle default value for get_qubes_managed_iface 2019-05-21 17:21:51 +02:00
Frédéric Pierret (fepitre)
b18efe3257
Make ShellCheck happy 2019-05-21 17:21:51 +02:00
Frédéric Pierret (fepitre)
0ce79d4895
Handle non-default 'eth0' Qubes managed interface 2019-05-16 17:32:50 +02:00
Frédéric Pierret (fepitre)
0c3421cfa8
qubes.ShowInTerminal: simply exit if mktemp generate " character 2019-05-11 11:54:24 +02:00
Frédéric Pierret (fepitre)
2b2752f936
Rename and fix from Marek's comments 2019-05-07 15:01:34 +02:00
Frédéric Pierret (fepitre)
4324dc1564
Add admin.vm.TerminalDispVM qubes-rpc 2019-05-05 17:59:44 +02:00
Frédéric Pierret (fepitre)
3dddff532c
qvm-terminal: use usual '^]' as escape character 2019-05-05 14:51:18 +02:00
Frédéric Pierret (fepitre)
71989cf72d
Rename qvm-showterminal to qvm-terminal and add print_usage 2019-04-30 17:23:25 +02:00
Frédéric Pierret (fepitre)
95e2d11e61
Add qvm-showterminal 2019-04-30 11:42:38 +02:00
Marek Marczykowski-Górecki
280d389d0e
travis: switch to R4.1 2019-04-22 00:32:01 +02:00
Marek Marczykowski-Górecki
4bb7bd9cdd
Update repositories to R4.1 2019-04-22 00:31:28 +02:00
Marek Marczykowski-Górecki
0aae0c189c
Merge remote-tracking branch 'qubesos/pr/157'
* qubesos/pr/157:
  qubes-updates-proxy: make ShellCheck happy
  Use exec to ease systemd handling the tinyproxy process
  Handle tinyproxy path changed in upstream
2019-04-19 04:27:00 +02:00
Marek Marczykowski-Górecki
63d5640146
Merge remote-tracking branch 'qubesos/pr/156'
* qubesos/pr/156:
  Disable useless Xen services in Qubes VM since we use upstream package
2019-04-19 04:25:36 +02:00
Frédéric Pierret (fepitre)
46c2b9789d
qubes-updates-proxy: make ShellCheck happy 2019-04-17 13:33:04 +02:00
Frédéric Pierret (fepitre)
94dad3640c
Use exec to ease systemd handling the tinyproxy process
From Marek's comments
2019-04-17 12:47:22 +02:00
Frédéric Pierret (fepitre)
0fd8da62b6
Handle tinyproxy path changed in upstream
Related commit 8d0ea71486
Fixes QubesOS/qubes-issues#4973 and QubesOS/qubes-issues#4929
2019-04-16 11:41:44 +02:00
Frédéric Pierret (fepitre)
dda290d511
Disable useless Xen services in Qubes VM since we use upstream package
QubesOS/qubes-issues#3945
2019-04-14 12:59:41 +02:00
Marek Marczykowski-Górecki
dbd94fe8f0
version 4.0.44 2019-04-13 05:26:00 +02:00
Marek Marczykowski-Górecki
feeb4b3816
Merge branch 'dbusactivation-v1'
* dbusactivation-v1:
  Implement D-Bus Activation of desktop files manually
2019-04-13 04:31:04 +02:00
Marek Marczykowski-Górecki
40a6c2b48f
Merge remote-tracking branch 'origin/pr/154'
* origin/pr/154:
  Add new onion addresses to repo lists
2019-04-12 05:06:25 +02:00
unman
8eb51542c5
Add new onion addresses to repo lists 2019-04-10 12:44:31 +00:00
Marek Marczykowski-Górecki
95e3b43f6b
travis: update for R4.1 2019-04-08 18:22:39 +02:00
Marek Marczykowski-Górecki
20285bc6c2
Remove qrexec-agent related files
Move it to the core-qrexec repository.

QubesOS/qubes-issues#4955
2019-04-08 18:22:38 +02:00
Marek Marczykowski-Górecki
f28235df41
rpm: fix python3-* packaging
Use %{python3_pkgversion} instead of python3-/python34- directly.
Recently CentOS switched to python36-, which made it even more
important.
2019-04-08 17:55:58 +02:00
Marek Marczykowski-Górecki
cb55bda8d1
travis: update Fedora versions 2019-04-08 16:15:19 +02:00
Marek Marczykowski-Górecki
10399e8ab3
dom0-updates: improve dnf config handling
Dom0 may not sent /etc/yum.conf but only /etc/dnf/dnf.conf - handle this
case too. Since dom0 use dnf for a long time, prefer dnf.conf.

Not all versions of dnf supports cachedir option, so handle also the
case when it's set by default to /var/cache/dnf (instead of overriden
with /var/cache/yum with yum.conf). Simply look for packages in whole
/var/cache.

QubesOS/qubes-issues#4225
2019-04-01 18:45:40 +02:00
Marek Marczykowski-Górecki
1aeec025e0
qrexec: add version negotiation
Use lower version from (local, remote).

QubesOS/qubes-issues#4909
2019-04-01 18:14:10 +02:00
Marek Marczykowski-Górecki
75e54cd5ef
Implement D-Bus Activation of desktop files manually
This part of GIO library isn't suitable for short-lived processes (the
call is done asynchronously and may not reach the application before
qubes-desktop-run process is terminated). To fix this, implement dbus
activation manually, synchronously.
While at it, implement waiting for application to terminate (useful in
DispVM), by waiting for its dbus name to disappear.
dbus-python API isn't particularly nice, but don't switch to completely different
library as a stable update.

Fixes QubesOS/qubes-issues#2449
2019-03-20 05:04:58 +01:00
Marek Marczykowski-Górecki
3d65517886
version 4.0.43 2019-03-08 03:07:40 +01:00
Marek Marczykowski-Górecki
70d6237caa
Revert "Use sfdisk instead of parted to ..." on stretch and jessie
util-linux is too old there

QubesOS/qubes-issues#4419
2019-02-24 05:15:04 +01:00
Marek Marczykowski-Górecki
9792438b3f
Use sfdisk instead of parted to resize root partition table
parted tries to load random data for possible partiont table UUID
generation, even though there is no need to generate new UUID. In case
of early VM startup, this is very undesirable as random entropy pool may
not be initialized yet, which will cause parted to block.

Use sfdisk instead, which doesn't try to do that. And also can relocate
backup GPT and resize partition in one go.

Fixes QubesOS/qubes-issues#4419
2019-02-24 03:12:14 +01:00
Marek Marczykowski-Górecki
45d3b8d159
version 4.0.42 2019-02-21 05:12:59 +01:00
Marek Marczykowski-Górecki
75dd034ceb
Add qubes version to marker-vm file
QubesOS/qubes-issues#1963
2019-02-11 19:28:35 +01:00
Marek Marczykowski-Górecki
9a125af36b
Merge remote-tracking branch 'origin/pr/152'
* origin/pr/152:
  Use dumpe2fs for filesystem size calculations
2019-02-11 15:03:57 +01:00
Marek Marczykowski-Górecki
3b538df5d0
Merge remote-tracking branch 'origin/pr/151'
* origin/pr/151:
  Introduce /usr/share/qubes/marker-vm
2019-02-11 14:59:04 +01:00
Marek Marczykowski-Górecki
6ac171a238
Merge remote-tracking branch 'origin/pr/150'
* origin/pr/150:
  Add apt-transport-https dependency
  Switch to HTTPS
2019-02-11 14:58:31 +01:00
AJ Jordan
593724c05b
Use dumpe2fs for filesystem size calculations
The previous approach used `df` to get usable space and then added a
fixed size to that number in order to account for filesystem
overhead. However, at some point that stopped working for me. It
appears that ext4 filesystem overhead can vary over time or because of
other factors. (Certainly now that I think about it the old code would
only work well for people with the exact same filesystem size as me.)

So the new approach is to just completely ignore what `df` tells us
and instead go directly to the source: the filesystem's internal
notion of exactly how much space it takes up. We use `dumpe2fs` to
retrieve this information and calculate the on-disk size dynamically
from that. Then we add the space that boot data takes up (unchanged),
and we add 5MB padding because when I tested this it didn't quite add
up otherwise. https://unix.stackexchange.com/a/13551/29146 suggests
that this unaccounted-for data may be e.g. additional copies of the
superblock.
2019-02-07 16:04:11 -05:00
Lunar
0b34737665
Add apt-transport-https dependency 2019-01-19 11:32:11 -06:00
Marek Marczykowski-Górecki
d4fa357faa
Introduce /usr/share/qubes/marker-vm
Make it easy for packages to detect Qubes VM.

Fixes QubesOS/qubes-issues#1963
2019-01-18 23:21:18 +01:00
Marek Marczykowski-Górecki
6799aad15e
debian: make ShellCheck happy 2019-01-15 21:10:27 +01:00
Lunar
84080005d3
Switch to HTTPS
https://github.com/QubesOS/qubes-issues/issues/4415
2019-01-15 13:06:01 -06:00
Marek Marczykowski-Górecki
1f41ee0e41
rpm: -networking package should depend on iproute
Network setup scripts, especially for network backend use 'ip' tool, so
the iproute package should be installed for this to work.

QubesOS/qubes-issues#4411
2019-01-13 12:27:56 +01:00
Marek Marczykowski-Górecki
81a5b2cc3a
version 4.0.41 2019-01-09 16:15:57 +01:00
Marek Marczykowski-Górecki
fed30c1da7
Add dependency on e2fsprogs
It is needed by the startup scripts to create fs on fresh private image.
Otherwise /rw (and thus /home) isn't mounted and user applications fail
to start.

Fixes QubesOS/qubes-issues#4671
2019-01-08 18:14:06 +01:00
Marek Marczykowski-Górecki
b47a61adcf
Make shellcheck happy 2018-12-15 23:45:34 +01:00
Marek Marczykowski-Górecki
b026524ec4
travis: disable "Prefer explicit escaping" shellcheck warning
People are used to using single backslash in grep (grep "\(xxx\)" etc)
and similar context, lets not make it confusing everywhere.
2018-12-15 23:21:10 +01:00
Marek Marczykowski-Górecki
f5ecf46362
travis: switch to xenial
QubesOS/qubes-issues#4613
2018-12-15 17:08:20 +01:00
Bo Rydberg
c9ec752923
Update spelling in setup-rw.sh 2018-12-14 17:07:28 +01:00
Marek Marczykowski-Górecki
7d7f6a3e69
version 4.0.40 2018-12-08 22:44:06 +01:00
Marek Marczykowski-Górecki
1b48bb1af8
Merge branch 'qrexec-notify'
* qrexec-notify:
  qrexec: add startup notification
2018-12-08 22:21:57 +01:00