Commit Graph

280 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
ca35c7ec70
Merge remote-tracking branch 'origin/pr/31'
* origin/pr/31:
  Fixed /etc/pam.d/su.qubes. (Moved line 'auth sufficient pam_permit.so' up. May not be low '@include' lines.)
  - Prevent 'su -' from asking for password in Debian [based] templates. Thanks to @unman and @marmarek for suggesting the fix! Fixes https://github.com/QubesOS/qubes-issues/issues/1128. - Changed 'ifeq (1,${DEBIANBUILD})' to 'ifeq ($(shell lsb_release -is), Debian)' to make the build work outside of Qubes Builder as well.

Conflicts:
	debian/control
2015-09-28 12:58:08 +02:00
Patrick Schleizer
e18a32d508
Fixed /etc/pam.d/su.qubes. (Moved line 'auth sufficient pam_permit.so' up. May not be low '@include' lines.) 2015-09-13 18:36:18 +00:00
Patrick Schleizer
665453da76
- Prevent 'su -' from asking for password in Debian [based] templates.
Thanks to @unman and @marmarek for suggesting the fix!
Fixes https://github.com/QubesOS/qubes-issues/issues/1128.
- Changed 'ifeq (1,${DEBIANBUILD})' to 'ifeq ($(shell lsb_release -is), Debian)' to make the build work outside of Qubes Builder as well.
2015-09-13 17:19:25 +00:00
Patrick Schleizer
fc013bd480 show error msg if qubes.ReceiveUpdates failed 2015-09-03 14:56:29 +00:00
Marek Marczykowski-Górecki
c8ac55b179 Merge branch 'autostart-dropins'
Conflicts:
	misc/qubes-trigger-desktop-file-install

Fixes qubesos/qubes-issues#1151
2015-09-02 01:16:19 +02:00
Marek Marczykowski-Górecki
3da7d2c315 Merge remote-tracking branch 'qubesos/pr/3'
* qubesos/pr/3:
  Mount /dev/xvdb with fs type "auto"
2015-09-02 01:14:10 +02:00
Marek Marczykowski-Górecki
d9a8ab6f84 Merge remote-tracking branch 'origin/pr/20'
* origin/pr/20:
  added pulseaudio-kde and spice-vdagent to qubes-trigger-desktop-file-install
2015-09-02 00:31:26 +02:00
Marek Marczykowski-Górecki
0b7ade11b8
qubes-desktop-run: don't crash on Debian wheezy (glib < 2.36)
Gio.DesktopAppInfo.get_boolean was introduced in glib 2.36. Instead of
crashing simply do not support DBusActivatable there. There is no such
application in default Debian wheezy template anyway.
2015-08-28 02:02:19 +02:00
Marek Marczykowski-Górecki
67357e051f
qubes-session-autostart: do not abort the whole process on invalid file 2015-08-27 22:41:51 +02:00
Marek Marczykowski-Górecki
4703e3fca7
Remove dynamically generated autostart desktop files
qubesos/qubes-issues#1151
2015-08-27 22:08:04 +02:00
Marek Marczykowski-Górecki
3d06ce1ee9
Implement dropins for /etc/xdg/autostart (#1151)
Usage of _static_ files (dropins) to override some of autostart entries
(enable/disable them in appropriate VM types) is much simpler and less
error prone than automatic generators.

Handling code is implemented in qubes-session-autostart, which is called
from qubes-session.

qubesos/qubes-issues#1151
2015-08-27 22:08:00 +02:00
Marek Marczykowski-Górecki
d710970e4d
Move .desktop launching code to python moules so it can be reused 2015-08-27 22:07:59 +02:00
Marek Marczykowski-Górecki
93e090469c
qubes-desktop-run: start the Dbus service (if needed)
Much tidier way to solve the issue, provided by @Unman.

qubesos/qubes-issues#1031
2015-08-26 02:08:33 +02:00
Marek Marczykowski-Górecki
0c2306dd0a
Revert "qubes-desktop-run: Activate via DBUS when desktop file contains DBusActivatable"
This reverts commit a5ee90b420.
Lets start the Dbus service the proper way.
2015-08-26 02:00:51 +02:00
Rusty Bird
78dd47ebfb Mount /dev/xvdb with fs type "auto"
Nice for btrfs. (auto is already used on /dev/xvdi.)
2015-08-16 16:51:04 +00:00
Patrick Schleizer
4ccf97cde9 added pulseaudio-kde and spice-vdagent to qubes-trigger-desktop-file-install
so those can be removed from https://github.com/adrelanos/qubes-whonix/blob/master/debian/qubes-whonix.postinst
2015-08-12 04:21:22 +02:00
Marek Marczykowski-Górecki
13c54badcb
Move /usr/share/qubes/xdg to /var/lib/qubes/xdg
No files in /usr should be modified during package runtime, `/var` is
for that. So move this data there.
2015-08-08 02:01:15 +02:00
Jason Mehring
a5ee90b420 qubes-desktop-run: Activate via DBUS when desktop file contains DBusActivatable 2015-08-07 11:58:13 -04:00
Jason Mehring
edc9dd404d fedora: Use 'slider' org.mate.NotificationDaemon theme 2015-08-07 09:20:44 -04:00
Jason Mehring
c4718c1675 debian: Switch to using org.mate.NotificationDaemon by default to eliminate popups not closing
- uses 'slider' theme
2015-08-07 09:20:18 -04:00
Jason Mehring
b6c19fc2ef qubes-desktop-file-install: Manages xdg desktop entry files
qubes-desktop-file-install is called by qubes-triggers-desktop-file-install. It's
arguments are based on the Gnome desktop-install-file utility to allow it to be replaced
by same.  Currently the Gnome utility can not be used since it automatically validates
the .desktop entry files with no option to skip validation and will fail on some third
party .desktop files that are not formed properly.

A single trigger script is shared between Fedora, Debian.  This script is used by the
package managers triggers and will copy original .desktop files from `/etc/xdg/autostart`
to `/usr/share/qubes/xdg/autostart` and modify the OnlyShownIn / NotShownIn, etc.  The
original .desktop files are left untouched and left in place.

Qubes modifies the XDG_CONFIG_DIRS to first include the `/usr/share/qubes/xdg`
directory (XDG_CONFIG_DIRS=/usr/share/qubes/xdg:/etc/xdg).

If a package gets removed, it's desktop entry is also removed from the /usr/share/qubes/xdg
directory.

'qubes-desktop-file-install' options:
   --dir DIR                          Install desktop files to the DIR directory (default: <FILE>)
   --force                            Force overwrite of existing desktop files (default: False)
   --remove-show-in                   Remove the "OnlyShowIn" and "NotShowIn" entries from the desktop file (default: False)
   --remove-key KEY                   Remove the KEY key from the desktop files, if present
   --set-key (KEY VALUE)              Set the KEY key to VALUE
   --remove-only-show-in ENVIRONMENT  Remove ENVIRONMENT from the list of desktop environment where the desktop files should be displayed
   --add-only-show-in ENVIRONMENT     Add ENVIRONMENT to the list of desktop environment where the desktop files should be displayed
   --remove-not-show-in ENVIRONMENT   Remove ENVIRONMENT from the list of desktop environment where the desktop files should not be displayed
   --add-not-show-in ENVIRONMENT      Add ENVIRONMENT to the list of desktop environment where the desktop files should not be displayed
2015-08-07 09:15:30 -04:00
Jason Mehring
d04e5b5039
debian: Comment out deb-src line in qubes-r3.list 2015-08-02 17:45:26 -04:00
Patrick Schleizer
e1e5162720 also inform in cli if no new updates are available 2015-07-19 01:59:07 +02:00
Marek Marczykowski-Górecki
3fdb67ac2b dom0-updates: make the tool working on Debian
Restore support for older yum: no --downloadonly option, so use
yumdownloader.
Also add some a code to handle some Debian quirks - especially default
rpmdb location in user home...
2015-06-16 02:22:42 +02:00
Marek Marczykowski-Górecki
3c8a294221 dispvm: do not start GUI apps during prerun
Apparently it doesn't help much with DispVM startup time, but causes a
lot of problems when such app do not close in time (either can be killed
forcibly and will complain about it at next run, or will spontaneously
show itself when DispVM is started).
2015-04-11 02:43:03 +02:00
Marek Marczykowski-Górecki
6f303a9bf2 Update repository definition: r3 -> r3.0 2015-04-02 00:53:18 +02:00
Marek Marczykowski-Górecki
5c3ab559c6 Merge branch 'master' of git://github.com/woju/qubes-core-agent-linux 2015-03-31 22:25:23 +02:00
Marek Marczykowski-Górecki
905e30ceb9 Enable updates repos by default 2015-03-27 01:24:18 +01:00
Marek Marczykowski-Górecki
d4023791a2 dom0-update: allow to specify custom yum action 2015-03-26 01:00:55 +01:00
Wojtek Porczyk
daf4a72f28 sudoers: do not require TTY
This is required to run sudo from qubes-rpc.
2015-03-21 01:49:17 +01:00
Marek Marczykowski-Górecki
88d7ca7940 Move mounting /rw and /home to separate service
Many services depended on misc-post only because this was where /home
gets mounted. Move that to separate service, started earlier.
2015-03-04 01:52:18 +01:00
Marek Marczykowski-Górecki
5c4e88a765 dispvm: close only visible windows during DispVM preparation
Closing some invisible window can cause e.g. Firefox crash. Send the
message to visible windows and others should be cleaned up by the
application.
2015-03-04 01:48:11 +01:00
Marek Marczykowski-Górecki
8118037820 dispvm: kill all process after populating caches
Do not longer rely on killing X server.
2015-03-02 02:28:59 +01:00
Jason Mehring
6836420c3c
Removed nautilus-actions depend and replaced with nautilus-python
nautilus-actions was orphaned in fc21, so all nautilus context menus have
been re-written as nautilus-python extensions
2015-02-27 00:52:17 -05:00
Jason Mehring
fe7ba5e9d6 Remove 'xen.evtchn' udev rule
This rule already gets set in linux-utils
linux-utils/udev/udev-qubes-misc.rules:KERNEL=="xen/evtchn", MODE="0660", GROUP="qubes"
2015-02-11 08:02:55 -05:00
HW42
dad5bfbd18 remove 'bashisms' or explicit use bash 2015-02-05 05:42:08 +01:00
HW42
47550ee2b6 debian: don't generate regular conf files in postinst 2015-02-05 01:22:19 +01:00
Marek Marczykowski-Górecki
50b536bee3 fedora: Add security-testing repo definition
Conflicts:
	misc/qubes-r2.repo
2015-01-30 00:45:02 +01:00
Marek Marczykowski-Górecki
9130636c88 Merge branch 'debian'
Conflicts:
	misc/qubes-r2.list.in
	misc/qubes-trigger-sync-appmenus.sh
	network/30-qubes-external-ip
	network/qubes-firewall
	vm-systemd/network-proxy-setup.sh
	vm-systemd/prepare-dvm.sh
	vm-systemd/qubes-sysinit.sh
2015-01-30 00:30:24 +01:00
Marek Marczykowski-Górecki
1f1a33be21 Disable R3 repos by default 2014-11-20 17:04:36 +01:00
Marek Marczykowski-Górecki
9b71e6db8b Update repos and keys for Qubes R3 2014-11-20 17:01:10 +01:00
Marek Marczykowski-Górecki
17350f6f69 Use xenstore.h instead of xs.h 2014-11-19 15:34:34 +01:00
Marek Marczykowski
db35abadc8 Use Qubes DB instead of Xenstore 2014-11-19 15:34:33 +01:00
Marek Marczykowski-Górecki
9bb9e8d9e5 Fix compile flags order (-lX11 moved to the end) 2014-11-11 01:22:26 +01:00
HW42
f9b658e6ad debian: add support for qubes appmenus 2014-11-04 05:53:36 +01:00
HW42
63e915f6d4 Tag for commit 5d68e2cc70
-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
 iQIcBAABAgAGBQJUTruhAAoJEAY5OLpCz6ck7IcP/i4JXNEMO8vDSgphM50NIIz6
 +hLb+kXBGeL9SsQKRlz000BUOcIsg+d2ibwnTsi1kNuq2OgJOAHAp5hHgHGc5ddG
 0PLFf/Ddexl7/2cG/hKekXiIpXGcuhqgsIfatqcKB228mVLG8y/kqwViIDbMgg10
 X8Aiq1ba0EeHI7xskkPb1hzkszOfLFoEXCRjt+BQsmr+Bll+sAzCS3G9vSbhczFl
 wmTtgOiu2fWsPgOB2O6HYeO0PUUX+jGF/jncZYf85pEwMccNqRIWjSJC6ti533zv
 5x1bWKWFymBAUcTS+xi00FPeatmQ7b5ywMxTwbqIQkE1Mrt436Dz/B1r0E58q0AH
 gu4qG/KPBNdRBD4vPrvLKiyood/XIpvz0+6QqS9rFMKt71OSzmMR1WeLgclCn768
 cR510iZyJjmqe9lLQQTCJr+oqvwiVot7sfsgj1XP5PozalTkdIawioIZjeX5Zz4O
 +zo+P+jIV+P6QbN+0nD+vrW8kSZlM8vt+OVBPhon/bMFxGKZervs7kFUCNPn6fUK
 WNw8lSrKQqJe/a805Ktku8moatVElmexj7XTkII1nnAnEu6/bokJqjCHQ933794l
 ERRwitFN+BWm3OBXq/BsdSnCotT+gnlMEDtuHiD0JHQBGwxAZGQtliQhWLF25Ekh
 BJkmYBjqgnjCsQFUBMnn
 =shGW
 -----END PGP SIGNATURE-----

Merge tag 'mm_5d68e2cc' into debian-systemd

Tag for commit 5d68e2cc70

Conflicts:
	Makefile
	debian/rules
	network/qubes-firewall
	vm-systemd/misc-post.sh
	vm-systemd/qubes-sysinit.sh
2014-11-03 04:28:00 +01:00
Marek Marczykowski-Górecki
0613a58961 Improve handling of .desktop files
Instead of directly using Exec= line, parse the file (at the launch
time) with Gio library. The main reason for this change is to handle
Terminal= option, but generally this approach should be more
bulletproof, especially when some fancy options are present in desktop
files.
2014-10-27 12:25:45 +01:00
HW42
5fcf7505fc dispvm-presun.sh needs bash 2014-10-01 02:21:12 +02:00
Marek Marczykowski-Górecki
4bccdb0ba5 Use systemd mechanism for loading kernel modules (when available)
One more thing done in more generic way (not Fedora-specific).
2014-09-29 21:31:10 +02:00
HW42
217b5a4a5d make source.list multiarch compatible
tell apt that the qubes repos provides only packages for amd64. Without
this "apt-get update" will fail if multiarch is used in the templatevm.
2014-09-29 05:50:24 +02:00
Marek Marczykowski-Górecki
1e842c985d fedora: workaround slow system shutdown (#852)
It looks to be related to this report:
https://bugzilla.redhat.com/show_bug.cgi?id=1088619
Workaround idea was from comment 37.

The hanging process in Qubes VM is most likely dconf-service, but there
is a lot of possible causes. To start with a non-standard method of
accessing the X session (no real login manager, processes started by
qrexec-agent). So instead of wasting a lot of time on digging through
gnome services, simply shorten the stop timeout - the processes would be
killed anyway.
2014-09-24 14:17:24 +02:00
Marek Marczykowski-Górecki
48b6bc5e5e debian: add updates repo definition and key 2014-07-28 02:27:56 +02:00
Davíð Steinn Geirsson
e5fa610b0d Use xenstore.h instead of xs.h when xen >= 4.2 2014-07-23 05:13:06 +02:00
Marek Marczykowski-Górecki
fd42d99803 dispvm: close all windows after apps prerun (#872)
Killing Xorg makes "unclean" termination of applications. Some apps
(Firefox) complains about that at next startup.
2014-07-04 18:51:02 +02:00
Wojciech Zygmunt Porczyk
40fcbdebaa misc: do not display file preview by default (#813) 2014-05-08 14:17:24 +02:00
Marek Marczykowski-Górecki
efe7612fbf dom0-updates: confirm yum transaction (yum -y)
Otherwise yum waits for confirmation, without showing the prompt.
2014-04-15 04:09:53 +02:00
Marek Marczykowski-Górecki
3b55facb2e Update repo file for R2rc1 repo 2014-04-10 04:08:49 +02:00
Marek Marczykowski-Górecki
a4fc4822ef dom0-updates: use yum --downloadonly instead of yumdownloader
This better handles dependencies (especially of "Obsolete:" type).
Unfortunately yum install/upgrade checks if running as root. Because we
are only downloading packages, using local "system root" (--installroot
option) no real root access is requires, so use fakeroot to mute yum
error.
2014-03-28 06:52:31 +01:00
Marek Marczykowski-Górecki
c632f0d067 Add -Wextra -Werror to all C code 2014-02-16 11:34:22 +01:00
Marek Marczykowski-Górecki
f54e44ac8f Fix compile warning 2014-02-07 02:10:13 +01:00
Marek Marczykowski-Górecki
4e98a28017 dom0-updates: ignore "Obsoleting" word in package list
Apparently -q option do not disable all the headers.
2014-01-10 03:35:04 +01:00
Marek Marczykowski-Górecki
fd55d48126 Move meminfo-writer to linux-utils repo
It is common for both dom0 and VM.  So move to linux-specific repo (not
VM-specific).
2014-01-05 05:38:10 +01:00
Marek Marczykowski-Górecki
dee9c6782f Disable r2-beta2 repo on r2-beta3 system 2013-12-08 19:21:21 +01:00
Marek Marczykowski-Górecki
3cc566f539 Split R2 yum repository for individual beta releases. 2013-12-06 13:02:22 +01:00
Marek Marczykowski-Górecki
d72ac05dcf vm-file-editor: add override for mimeinfo *.png entry (#753)
MIME-info database contains multiple entries for *.png, namely image/png
and image/x-apple-ios-png. The later one doesn't have associated handler
program, but this one is selected by mimeopen tool.

Not sure how this tool should behave in case of multiple matches (IOW is
it a bug in File::MimeInfo perl module used by mimeopen).  Instead of
switching to different tool, which probably will break other files
(check #423), add override for this particular file type.
2013-11-14 22:21:17 +01:00
Marek Marczykowski-Górecki
099971dcd5 fedora: update spec and serial.conf to match /usr/sbin path 2013-08-14 03:53:40 +02:00
Marek Marczykowski
44fab139f4 Add qrexec back, use qubes-utils libraries for common code 2013-03-20 06:23:44 +01:00
Marek Marczykowski
09050236bc The Underscores Revolution: adjust qrexec path 2013-03-14 04:29:19 +01:00
Marek Marczykowski
30ca124784 The Underscores Revolution: xenstore paths 2013-03-14 04:29:15 +01:00
Marek Marczykowski
7686fd5d92 The Underscores Revolution: RPC services 2013-03-14 04:25:31 +01:00
Marek Marczykowski
ecc812f350 The Underscores Revolution: filenames
Get rid of underscores in filenames, use dashes instead.
This is first part of cleanup in filenames.
"qubes_rpc" still untouched - will be in separate commit.
2013-03-14 01:07:49 +01:00
Marek Marczykowski
b2904f03ae vm/fstab: enable "discard" option for /rw
This, in conjunction with support in xen-blkfront/back, shrinks private.img in
dom0 with every removed file in VM. So no longer manual cleaning unused space
with some dd + cp trickery.
2013-03-03 21:20:09 +01:00
Marek Marczykowski
3e4b8cf8a9 vm/fstab: remove comment about anaconda 2013-03-03 21:19:54 +01:00
Marek Marczykowski
b18d40fb08 vm: Use nautilus-actions to provide "Copy to other AppVM" etc nautilus commands
No more ugly symlink creation at VM startup, nautilus-actions have system-wide
dir (in opposite to nautilus-scripts).

Currently old symlinks are not cleaned up. Maybe it should, but leaving them
have one advantage: will not break existing users behavior.
2013-02-21 16:44:16 +01:00
Marek Marczykowski
1029f5af59 dom0+vm/udev: force QUBES_EXPOSED variable available to block_add_change script 2013-02-19 04:59:27 +01:00
Marek Marczykowski
d6a0ddc8bd dom0: make block-snapshot more robust about finding the right loop dev
Use losetup -j to find already assigned loop device, instead of manually
parsing losetup -a output (which have changed between fc13 and fc18).
2013-02-12 01:38:30 +01:00
Marek Marczykowski
750859bdc8 vm: move polkit configs from qubes-gui-vm package 2013-02-12 01:38:29 +01:00
Marek Marczykowski
bf059e4050 dom0/udev: allow only one xenstore-write at the time
This apparently causes deadlocks when many xenstore-write (one for each block
device) called at the same time.
2013-01-27 00:02:30 +01:00
Marek Marczykowski
213380a7c3 vm: setup /dev/xen/evtchn permissions using udev rule
This works also when the device is recreated, which is the case in DispVM
(during xl restore).
2012-11-22 00:51:18 +01:00
Marek Marczykowski
d5a2d9d054 vm: load dummy-hcd module to suppress libusb bug
libusb crashes when no USB controller is present, load dummy-hcd as workaround.
2012-11-19 17:52:16 +01:00
Marek Marczykowski
a26b3e7016 vm/core: use mount --bind instead of symlink for /home
Many applications doesn't like /home as symlink ($HOME differs from real
location).
2012-11-16 14:03:36 +01:00
Marek Marczykowski
8c007b593d vm: release 2 yum repository and verification keys (#671) 2012-11-15 20:35:29 +01:00
Marek Marczykowski
97aa4ed9cb dom0/core: API CHANGE: pass username as keyword param to vm.run() (#577)
Get rid of ugly embedding username into commandline. This will make much easier
avoid hardcoding username in dom0 code.
Currently dom0 is free of hardcoded "user" username ("root" still is used).
2012-11-13 04:42:25 +01:00
Marek Marczykowski
ef2a3092ac vm/dispvm: use of user-provided DispVM settings (#651)
When /rw/home/user/.qubes-dispvm-customized is present use /rw/home/user
instead of default /etc/dispvm-dotfiles.tbz. Also make sure that /rw will not
remain mounted during DispVM creation.
2012-11-12 13:44:10 +01:00
grwl
bb35a6836f dom0+vm/usb: refactoring 2012-10-28 02:27:06 +01:00
grwl
c8fa6c44af dom0+vm/usb: refactoring 2012-10-28 02:24:17 +01:00
Alexandre Bezroutchko
dce3acab81 dom0+vm/usb: add USB version to device list displayed by qvm-usb -l' 2012-10-26 23:09:36 +02:00
Alexandre Bezroutchko
7953a0f145 dom0+vm/usb: store USB version in XS 2012-10-24 22:05:57 +02:00
Alexandre Bezroutchko
47e9f5536d dom0+vm/usb: make original device name available 2012-10-24 22:02:55 +02:00
Alexandre Bezroutchko
dfc40ea0cf dom0+vm/qvm-usb: store USB version in XS 2012-10-24 22:00:27 +02:00
Marek Marczykowski
6fe9132e0a dom0+vm/qvm-usb: improve USB hubs detection
This method filter out also "rate matching hub", which is device 2.
2012-10-23 05:44:37 +02:00
Marek Marczykowski
158ac0bd6a dom+vm/qvm-usb: improve handling devices like "2-1.4"
xenstore doesn't allow '.' in key name, so translate it to '_'
2012-10-23 05:42:39 +02:00
Alexandre Bezroutchko
7f7e9999f4 dvp/qvm-usb: converted installer scripts into RPM 2012-10-21 15:10:40 +02:00
Alexandre Bezroutchko
908c83eaa8 dom0/qvm-usb: detach operation appears to work 2012-10-21 14:59:39 +02:00
Alexandre Bezroutchko
2741201e24 dom0/qvm-usb: now use vm.run() to call vusb-ctl bind/unbind 2012-10-21 14:59:38 +02:00
Alexandre Bezroutchko
a0e3e55787 dom0/qvm-usb: attach works again for dom0 backend 2012-10-21 14:59:38 +02:00
Alexandre Bezroutchko
f8f04f4b38 dom0+vm/qvm-usb: intermediate 2012-10-21 14:59:38 +02:00
Alexandre Bezroutchko
88c446c6f3 dom0+vm/qvm-usb: added vusb helper script to usbvm 2012-10-21 14:59:38 +02:00
Alexandre Bezroutchko
ca57a67fd0 dom0+vm/qvm-usb: cosmetic: removed debugging code, adjusted fixmes 2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
1a4dbdacff dvp/qvm-usb: implemented usb_check_attached method, now "qvm-usb -l" indicate attachments 2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
361a087562 dom0+vm/qvm-usb: changed XS path naming scheme again 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
850353dcfc dom0+vm/qvm-usb: adjust usb_remove to the new XS naming scheme 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
4c4889ec1a dom0+vm/qvm-usb: changed the structure of XS pathes 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
c39b653079 dvp/qvm-usb: Added some debugging code. 2012-10-21 14:59:34 +02:00
Alexandre Bezroutchko
314fda5694 dom0+vm/qvm-usb: cosmetic 2012-10-21 14:59:34 +02:00
Alexandre Bezroutchko
ce9e7aa967 dom0+vm/qvm-usb: autoload pvusb backend driver 2012-10-21 14:59:34 +02:00
Alexandre Bezroutchko
e1fc07613d dom0+vm/qvm-usb: First implementation of udev rules and supporting scripts. 2012-10-21 14:59:34 +02:00
Marek Marczykowski
9e72a46e8c dom0/meminfo-writer: fork into background after first info sent to qmemman (#635) 2012-07-20 16:42:12 +02:00
Marek Marczykowski
8129032c9e vm: implement qubes.GetAppmenus to reduce code duplication
As one-liner services are now real one-line, just do it.
2012-07-15 02:41:23 +02:00
Marek Marczykowski
3af500fc80 vm: provide dispvm-dotfiles and dispvm-prerun.sh in rpm package (#620) 2012-07-12 14:22:44 +02:00
Marek Marczykowski
a952fc503d vm/qubes-dom0-update: rebuild dom0 rpmdb before touching it with yum
Dom0 can have different (older) rpmdb version than VM. Starting from FC17 yum
refuses to work without rebuild.
2012-06-13 04:56:11 +02:00
Marek Marczykowski
975c0a0bc7 vm: fix yum-qubes-hooks
Program must be given as full path to qrexec_client_vm - it is passed directly
to execv.
2012-06-11 22:35:44 +02:00
Marek Marczykowski
64a9c54ba6 vm: enable yum-qubes-hooks plugin (#592) 2012-06-11 22:35:44 +02:00
Marek Marczykowski
20c170427d vm: disable gnome update plugin, not only unattended installation 2012-06-11 22:35:44 +02:00
Marek Marczykowski
871d4485b9 dom0+vm/qvm-block: speed up udev block handler (#560)
xenstore is very slow, so don't bother it when unneeded. Namely do not try to
remove entries, which haven't even created.
2012-06-11 22:35:44 +02:00
Marek Marczykowski
06c4d57b60 vm: yum plugin to notify dom0 about installed updates (#592) 2012-06-05 21:21:53 +02:00
Marek Marczykowski
ab0b4b4030 vm: include /proc/xen in fstab (#466) 2012-05-02 00:09:00 +02:00
Marek Marczykowski
232c00590a dom0+vm/hotplug-script: improve error checking, log only important messages (#477) 2012-04-25 23:43:50 +02:00
Marek Marczykowski
e5478d6578 vm/qubes-dom0-update: display info when no updates available 2012-04-25 23:43:50 +02:00
Joanna Rutkowska
be3ff05867 Merge branch 'master' of git.qubes-os.org:/var/lib/qubes/git/marmarek/core 2012-04-15 16:21:50 +02:00
Marek Marczykowski
d0296d9783 vm: load block backend in every VM (#516) 2012-04-04 11:55:48 +02:00
Joanna Rutkowska
cb9b76d039 Merge branch 'master' of git.qubes-os.org:/var/lib/qubes/git/marmarek/core 2012-03-31 19:52:28 +02:00
Marek Marczykowski
3b55fc51e8 dom0+vm: qvm-block --attach-file
Allow to attach disk image from different VM as block device. File attached
with qvm-block -A will be visible as loopX device and as such can be detached.
File path will be in device description.
2012-03-31 19:04:50 +02:00
Joanna Rutkowska
bdf6016b5a New signing key cleanup (removed the unused encryption key) 2012-03-31 14:57:26 +02:00
Joanna Rutkowska
069ae8e520 Update Qubes Signing key 2012-03-31 13:04:22 +02:00
Marek Marczykowski
67369b170b vm/dom-updates: always use --resolve
Required when update needs some additional packages
2012-03-02 00:34:36 +01:00
Marek Marczykowski
cd45ef1de6 vm/yum.repo: use separate key for unstable repo 2012-02-26 13:10:04 +01:00
Marek Marczykowski
4bb485ea68 vm/dom0-update: suppress annoying yum warning (#437)
This is workaround of yum bug: when --installroot given its also set different
config path (inside this install root), but then issue warning because implicit
config path is different than explicit --config option (which was empty).
2012-02-14 21:08:48 +01:00
Marek Marczykowski
d3e1bf36bf vm: disable silent automatic update *installation* in FC15 (#415)
Do not silently download and install updates, especially in NonUpdateableVM.
2012-01-14 01:37:22 +01:00
Marek Marczykowski
240d35259f vm(+dom0): major rearrage VM files in repo; merge core-*vm packages 2012-01-06 21:31:12 +01:00