Commit History

Author SHA1 Message Date
  Rusty Bird 4c4f2e7038 bind-dirs: run in DisposableVM, too 3 years ago
  lvh 2f674c9168 Voice informational messages in bind-dirs.sh 5 years ago
  Rusty Bird 744cab8639 bind-dirs.sh: don't fail on empty configuration directory 6 years ago
  Marek Marczykowski-Górecki aad6fa6d19 Hint shellcheck where to look for sourced files, if in repository 6 years ago
  Marek Marczykowski-Górecki d177e73bba Merge remote-tracking branch 'qubesos/pr/43' 7 years ago
  Robin Schneider e0814b481f bind-dirs: Create ro if bind target exists 7 years ago
  Robin Schneider a205c86bfe Fix more shellcheck warnings 7 years ago
  Robin Schneider 0facff3a01 Fix handling of binds containing spaces 7 years ago
  Patrick Schleizer 3cc1a855dc comment 7 years ago
  Manuel Amador (Rudd-O) 59aec8e5eb Clean up early initialization and setup of /rw 7 years ago
  HW42 be0e8a250f bind-dirs: copy from ro only if bind target doesn't exists 7 years ago
  Patrick Schleizer 15274f8bb8 comment legacy function 7 years ago
  Patrick Schleizer 67dd174cec empty legacy function 7 years ago
  Patrick Schleizer 23bdcb90a7 minor debug xtrace output 8 years ago
  Patrick Schleizer d14203f1ac fixed bind-dirs legacy import function 8 years ago
  Patrick Schleizer f4d367a6a7 refactoring / code simplification 8 years ago
  Patrick Schleizer e9fca8fb9f fixed broken file copy for files in multi level directories 8 years ago
  Patrick Schleizer 184f49dbbd also exit from bind-directories if file /var/run/qubes-service/qubes-dvm exists 8 years ago
  Patrick Schleizer 7e8649f8c7 use symlink_level_max rather than hardcoding 10; comment 8 years ago
  Patrick Schleizer 5a87313ea6 renamed: bind-dirs -> bind-dirs.sh 8 years ago