Marek Marczykowski-Górecki
d2c28d12a2
Remove dead code
2019-07-05 20:35:31 +02:00
Frédéric Pierret (fepitre)
3f5dc53d75
init/functions: better not use ipcalc which is not present on minimal distro
2019-06-23 09:59:37 +02:00
Frédéric Pierret (fepitre)
967060eb32
init/functions: handle non-present /qubes-mac qubesdb and check if iface exists
2019-06-20 16:09:24 +02:00
Frédéric Pierret (fepitre)
325eff2b13
Refactor and handle new network qubesdb configuration
2019-06-18 18:49:42 +02:00
Frédéric Pierret (fepitre)
f7dd41206d
setup-ip: only assign IP configuration of Qubes managed iface
2019-05-21 17:21:51 +02:00
Frédéric Pierret (fepitre)
902da9f837
Handle default value for get_iface_from_mac
2019-05-21 17:21:51 +02:00
Frédéric Pierret (fepitre)
da162d7615
Handle default value for get_qubes_managed_iface
2019-05-21 17:21:51 +02:00
Frédéric Pierret (fepitre)
0ce79d4895
Handle non-default 'eth0' Qubes managed interface
2019-05-16 17:32:50 +02:00
Marek Marczykowski-Górecki
8ce95f0db1
is_protected_file: if no config dir is present, assume the file is _not_ protected
2018-12-06 14:44:42 +01:00
Rudd-O
03883ece96
/rw/config
2018-11-15 19:08:46 +00:00
Rudd-O
3b93db99f8
Fix logic bug.
2018-10-24 08:00:20 +00:00
Rudd-O
1ecb680b44
Allow per-VM protected file list
...
Hopefully this can be pushed as an update for Qubes 3.2 as well?
2018-10-24 07:32:19 +00:00
Marek Marczykowski-Górecki
82937e129e
Use only /etc/skel to provision user's home directory of new VM
...
Get rid of non-standard /home.orig handling.
Fixes QubesOS/qubes-issues#3771
2018-04-13 00:35:08 +02:00
Marek Marczykowski-Górecki
8bb152f76e
init: fix issues found by shellcheck in init scripts
...
Most of them are missing quotes, `` -> $(), and -o/-a usage in
conditions. Also add few directives disabling checks where were too
verbose.
2017-09-30 04:49:21 +02:00
Marek Marczykowski-Górecki
9a7dee5b46
dispvm: don't use perl to decode base64-encoded script
...
This looks like an overkill. And more importantly - required modules are
not installed by default, making it impossible to use in default minimal
template.
Fixes QubesOS/qubes-issues#1610
2017-05-14 23:29:52 +02:00
Marek Marczykowski-Górecki
a69acdabbf
Merge remote-tracking branch 'qubesos/pr/24'
...
* qubesos/pr/24:
Initialize home_volatile for disposable VMs.
2016-11-17 09:33:02 +01:00
Marek Marczykowski-Górecki
dbcd3e5f0a
Write random seed directly to /dev/urandom
...
Don't store it in some variable, as may contain non-ASCII or control
characters (or starts with '-').
2016-11-17 09:30:49 +01:00
Patrick Schleizer
b1f418ca76
fix reload_random_seed error handling
...
https://github.com/QubesOS/qubes-core-agent-linux/pull/21#pullrequestreview-8302473
2016-11-13 23:37:49 +01:00
Manuel Amador (Rudd-O)
6ca10b42eb
Initialize home_volatile for disposable VMs.
2016-11-13 21:20:46 +00:00
Manuel Amador (Rudd-O)
60adadff73
Invert logic of systemd_version_changed.
2016-10-28 05:02:53 +00:00
Manuel Amador (Rudd-O)
59aec8e5eb
Clean up early initialization and setup of /rw
2016-10-23 20:19:51 +00:00