Commit Graph

2270 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
e29a678c5d
Fix qubes-run-terminal.desktop permissions
Should be 644, not 755

Fixes QubesOS/qubes-issues#4329
2018-09-28 18:51:57 +02:00
Marek Marczykowski-Górecki
e92236e8e6
version 4.0.36 2018-09-13 14:32:02 +02:00
Marek Marczykowski-Górecki
e816a4600a
rpm: add workaround for Fedora's systemd package bug
https://bugzilla.redhat.com/1559286

Fixes QubesOS/qubes-issues#3983
2018-09-13 03:34:19 +02:00
Marek Marczykowski-Górecki
000d7890f8
version 4.0.35 2018-09-12 04:04:14 +02:00
Marek Marczykowski-Górecki
163aede1bf
Drop https from onion update repository urls
Tor already provide encryption and authentication, we don't run https on
onion services.
2018-09-06 19:44:03 +02:00
Marek Marczykowski-Górecki
581d9c12ed
Fix detection of root device resize
If xvda is not partitioned, checking size of device mounted as root dev
doesn't detect xvda resize - it will have the new size, while the fs on
it not. Change to checking actual filesystem size.

Also, improve log message to include the size.

Fixes QubesOS/qubes-issues#4274
2018-09-04 18:12:07 +02:00
0brand
aa5d955fbc
Comments to use qubes onion repository 2018-09-03 23:47:13 +02:00
0brand
cbd871fba8
Comments to use qubes onion repository 2018-09-03 23:44:29 +02:00
Marek Marczykowski-Górecki
d0159deccf
version 4.0.34 2018-09-03 11:17:14 +02:00
Marek Marczykowski-Górecki
8c22b3dc39
Slightly simplify @DIST@ substitution in repository definition 2018-09-02 07:35:20 +02:00
Marek Marczykowski-Górecki
d6ea74935c
Merge remote-tracking branch 'qubesos/pr/136'
* qubesos/pr/136:
  Install debian version of qrexec pam in Ubuntu templates
2018-09-02 07:11:27 +02:00
Marek Marczykowski-Górecki
c6e7d04b1c
Merge remote-tracking branch 'qubesos/pr/135'
* qubesos/pr/135:
  misc/qubes-run-terminal: which -> type
2018-09-02 07:10:49 +02:00
Marek Marczykowski-Górecki
43fba4e94a
debian: do not add user to sudo group, lock root account
The qubes-core-agent-passwordless-root package ships sudo configuration,
adding to sudo group isn't needed.

Basically revert all changes made by qubes-core-agent-passwordless-root
installation.

Fixes QubesOS/qubes-issues#4015
2018-09-02 07:05:06 +02:00
Marek Marczykowski-Górecki
09b192b2fe
Merge remote-tracking branch 'qubesos/pr/134'
* qubesos/pr/134:
  Remove user from sudo group on removing passwordless-root.
2018-09-02 06:59:07 +02:00
Marek Marczykowski-Górecki
c02306cdb7
Merge remote-tracking branch 'qubesos/pr/133'
* qubesos/pr/133:
  Add bionic, remove old Ubuntu versions
2018-09-02 06:54:18 +02:00
Marek Marczykowski-Górecki
30c7d77b94
Merge remote-tracking branch 'qubesos/pr/129'
* qubesos/pr/129:
  Handle CentOS vm repo
2018-09-02 06:29:44 +02:00
fepitre
5cb6cc8ebc
Handle CentOS vm repo 2018-09-01 15:49:11 +02:00
unman
771d1fa040
Install debian version of qrexec pam in Ubuntu templates 2018-08-31 09:53:16 +00:00
Rusty Bird
5ad945b674
misc/qubes-run-terminal: which -> type
'which' is an external tool, 'type' is a shell builtin. Using the latter
shaves off a bit of latency.

Also use the already open stderr file descriptor for redirection.
2018-08-28 10:54:09 +00:00
unman
35d12fd68d
Remove user from sudo group on removing passwordless-root. 2018-08-23 12:53:44 +00:00
unman
ee2afab9a0
Add bionic, remove old Ubuntu versions 2018-08-14 16:01:42 +00:00
Marek Marczykowski-Górecki
b2fccfef86
Merge remote-tracking branch 'qubesos/pr/130'
* qubesos/pr/130:
  archlinux: ensure /usr/local is present in fstab (fix issue https://github.com/QubesOS/qubes-issues/issues/4196)
2018-08-09 02:26:35 +02:00
Olivier MEDOC
8a150a84a2
archlinux: ensure /usr/local is present in fstab (fix issue https://github.com/QubesOS/qubes-issues/issues/4196)
Complete fix of the issue https://github.com/QubesOS/qubes-issues/issues/1150 for archlinux
2018-08-08 14:48:50 +02:00
Marek Marczykowski-Górecki
6f0566ba8f
travis: add fc28 and buster 2018-08-01 03:09:02 +02:00
Marek Marczykowski-Górecki
7667b0dc16
rpm: use build flags provided by the distribution
Among other things, this enable various hardening options.

QubesOS/qubes-issues#2259
2018-08-01 03:08:50 +02:00
Marek Marczykowski-Górecki
be09476a65
Merge remote-tracking branch 'qubesos/pr/128'
* qubesos/pr/128:
  Install qubes control files for services in Ubuntu templates

Fixes QubesOS/qubes-issues#3871
2018-07-26 17:44:52 +02:00
unman
053d0af999
Install qubes control files for services in Ubuntu templates 2018-07-26 13:01:20 +00:00
Rusty Bird
ff77c78ecc
Unify qvm-{copy,move}-to-vm.{gnome,kde} and fix some bugs
- Symlink the other three tools to qvm-copy-to-vm.gnome, use the same
  code where possible, and select differing behavior based on invoked
  name (like the CLI tools). This brings qvm-move-to-vm.kde up to date
  for R4.0 (bugfix on 89183e9).

- Get rid of a window focus race between zenity/kdialog and the
  qubes.Filecopy dom0 permission dialog: Only launch the GUI after the
  first line has been read from qfile-agent.

- Avoid visual glitches (e.g. for a non-existing file) by special-casing
  a no-op progress function for $SIZE == 0.

- Pass -- separator between 'rm -rf' and the files to be removed, in
  case someone or something ever invokes the tool on relative file names
  starting with a dash.

- Pass -b (implies --apparent-size) and -s to du, to simplify percentage
  calculation and to avoid unnecessary output.
2018-07-25 12:44:53 +00:00
Rusty Bird
8da7c7af60
qfile-agent.c: exit on EPIPE after gui progress write
The qvm-{copy,move}-to-vm.{gnome,kde} cancel buttons didn't actually
cancel, because qfile-agent ignored EPIPE and - via qfile_pack_init() -
SIGPIPE. So it never noticed when the local PROGRESS_TYPE=gui reader had
shut down.
2018-07-25 12:44:52 +00:00
Marek Marczykowski-Górecki
f037ffa852
Merge remote-tracking branch 'qubesos/pr/126'
* qubesos/pr/126:
  Avoid leaking VM name in qvm-copy usage text
  Add proper help text to qvm-copy tools and fix incorrect behavior for qvm-move
2018-07-17 11:39:07 +02:00
Marek Marczykowski-Górecki
7ea331960d
version 4.0.33 2018-07-17 11:37:35 +02:00
Marta Marczykowska-Górecka
99f239ea9e
Avoid leaking VM name in qvm-copy usage text
Do not display name of the qube in the usage text.
2018-07-16 18:33:54 +02:00
Marta Marczykowska-Górecka
96d8914c83
Add proper help text to qvm-copy tools and fix incorrect behavior
for qvm-move

Added more descriptive usage text to the
qvm-copy/qvm-move/qvm-copy-to-vm/qvm-move-to-vm family of tools.
Also fixed bug that removed the file being moved for qvm-move-to-vm,
but not for qvm-move.

fixes QubesOS/qubes-issues#3529
fixes QubesOS/qubes-issues#4020
2018-07-16 18:33:39 +02:00
Marek Marczykowski-Górecki
f4c10d47da
Convert /usr/local from a symlink to a mount point on upgrade
Fixes QubesOS/qubes-issues#1150
2018-07-11 15:27:34 +02:00
Marek Marczykowski-Górecki
c11dd76006
Merge remote-tracking branch 'qubesos/pr/125'
* qubesos/pr/125:
  bind mount /usr/local

Fixes QubesOS/qubes-issues#1150
2018-07-11 13:25:37 +02:00
Reynir Björnsson
86413df6d2
bind mount /usr/local 2018-07-11 11:14:47 +02:00
Marek Marczykowski-Górecki
ec251da5d8
version 4.0.32 2018-07-08 03:48:51 +02:00
Marek Marczykowski-Górecki
e7aec0d874
Merge remote-tracking branch 'qubesos/pr/124'
* qubesos/pr/124:
  setup-rwdev.sh: Only check first 1 GiB for zeros
2018-07-04 02:08:45 +02:00
Peter Gerber
8ff9cbe299
setup-rwdev.sh: Only check first 1 GiB for zeros
As described in QubesOS/qubes-issues#3758, a VM may fail to start
if the volume is large. This because the whole volume is read to
ensure it's empty (=all zeros).

This changes limits the check to the first 1 GiB of the private
volume. As additional safety, a scan with blkid is done.

Fixes https://github.com/QubesOS/qubes-issues/issues/3758
2018-07-03 20:07:12 +00:00
Marek Marczykowski-Górecki
4a7d3515d0
rpm: add R: tar, for qubes-dom0-update
Fixes QubesOS/qubes-issues#4032
2018-07-02 22:25:45 +02:00
awokd
6c965a6dac
grub: add noresume to kernel cmdline
Under R4.0, when Debian HVMs are created from the debian-9 template, they hang on boot for 30 seconds without this option.
2018-06-26 05:02:34 -06:00
awokd
c4c28605c9
Merge pull request #1 from QubesOS/master
merge update
2018-06-26 10:49:16 +00:00
Marek Marczykowski-Górecki
8569829889
version 4.0.31 2018-06-15 14:32:23 +02:00
Marek Marczykowski-Górecki
a715797589
debian: add Depends: qubesdb-vm
Make sure that qubesdb is configured (including service start) before
executing postinst of qubes-core-agent package, which will communicate
with qubesdb service.

Fixes QubesOS/qubes-issues#3951
2018-06-13 16:58:35 +02:00
Marek Marczykowski-Górecki
b397821e41
version 4.0.30 2018-06-05 01:39:04 +02:00
Marek Marczykowski-Górecki
8b1cb80db1
Merge remote-tracking branch 'qubesos/pr/120'
* qubesos/pr/120:
  Fixes issue #3939

Fixes QubesOS/qubes-issues#3939
2018-06-05 01:37:32 +02:00
Christopher Laprise
b8783e65e4
Fixes issue #3939 2018-05-31 14:02:15 -04:00
Marek Marczykowski-Górecki
f49e3415a8
version 4.0.29 2018-05-29 00:40:11 +02:00
Marek Marczykowski-Górecki
b5a9d9bf8e
Add build-time assert for filename buffer size
Suggested by @cfcs
2018-05-28 22:45:39 +02:00
Marek Marczykowski-Górecki
bd445742fb
Merge branch 'view-only'
* view-only:
  Add file managers integration for qvm-open-in-dvm --view-only
  qvm-open-in-vm: mark file as read-only if opened with --view-only
  qvm-open-in-vm: implement --view-only option
  qubes-rpc: fix code style - indent with spaces
2018-05-26 22:41:05 +02:00