qubes-core-agent (4.1.12-1) unstable; urgency=medium [ Rusty Bird ] * qvm-run-vm: add +WaitForSession for modern @dispvm syntax too * qvm-run-vm: translate --dispvm to modern @dispvm syntax * qvm-run-vm: fix comment [ Paweł Marczewski ] * Enable root autologin on serial console * Lock root password in passwordless-root package * Use pam-configs to override Debian PAM config * Override PAM config for su in RPM package [ Marek Marczykowski-Górecki ] * qubes.ShowInTerminal needs a graphical session running [ Marta Marczykowska-Górecka ] * Added a qubes-open-file-manager.desktop file -- Marek Marczykowski-Górecki Mon, 25 May 2020 03:35:46 +0200 qubes-core-agent (4.1.11-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * dom0-updates: output diagnostics messages to stderr [ Frédéric Pierret (fepitre) ] * setup-ip: fallback to legacy if nmcli is no present -- Marek Marczykowski-Górecki Fri, 01 May 2020 02:39:18 +0200 qubes-core-agent (4.1.10-1) unstable; urgency=medium [ Frédéric Pierret (fepitre) ] * spec: fix missing python3 gi module * spec: add 'parted' dependency -- Marek Marczykowski-Górecki Sun, 01 Mar 2020 03:42:33 +0100 qubes-core-agent (4.1.9-1) unstable; urgency=medium [ Rusty Bird ] * misc/qubes-run-gnome-terminal: avoid external utility (grep) * misc/qubes-run-gnome-terminal: slightly restrict pattern [ Amadeusz Piotr Żołnowski ] * Remove no longer needed `xenstore-watch` and `close-window` * Remove dconfig-profile user as it is generated automatically * Split items in `misc` directory by topic * Move `qvm-console` to core-admin-client repository * Don't list `/var/run/qubes` in rpm files as it's dynamic dir * Move `qubes-firewall` from `sbin` to `bin` * Merge `app-defaults` and `sys-defaults` to `config-overrides` * Install 50-qubes-mem-hotplug.rules in /lib/udev instead of /etc/udev * Add README.md to package-managers [ unman ] * Do not reference sudo group when removing package [ Zaoqi ] * fix https://github.com/QubesOS/qubes-issues/issues/5619 * archlinux/PKGBUILD: remove python2 [ Frédéric Pierret (fepitre) ] * spec: replace python3 by python%{python3_pkgversion} [ Zaoqi ] * archlinux/PKGBUILD: fix typo [ Saswat Padhi ] * qubes.GetAppmenus: skip unreadable .desktop files * signed [ unman ] * Disable package caching in apt operations [ Amber M. Breslau ] * init/functions: fix DispVM detection * init/setup-rwdev: don't write a journal in DispVMs [ unman ] * Disable unnecessary services in Debian [ Neowutran ] * archlinux: update dependencies * archlinux: remove old maintainer key (olivier medoc) [ Yukikoo ] * archlinux: clean references to my server [ Frédéric Pierret (fepitre) ] * qubes-sysinit: set GUI_OPTS in gui-agent-linux [ Marek Marczykowski-Górecki ] * Adjust version of required qubes-gui-agent [ Rusty Bird ] * qubes.Restore: remove bashism found by new ShellCheck -- Marek Marczykowski-Górecki Sun, 01 Mar 2020 03:31:40 +0100 qubes-core-agent (4.1.8-1) unstable; urgency=medium [ Pawel Marczewski ] * qubes-run-terminal: use gnome-terminal --wait, if supported * Add qubes.VMExec call, for running a single command * Install faster console scripts for Python code * Advertise qubes.VMExec support as a feature * firewall: drop INVALID state TCP packets [ Marek Marczykowski-Górecki ] * travis: include PyGTK setup * travis: install also python xdg module [ Pawel Marczewski ] * Add qubes-run-gnome-terminal utility that uses --wait * Add /etc/qubes/applications override, use it for gnome-terminal -- Marek Marczykowski-Górecki Tue, 28 Jan 2020 21:44:36 +0100 qubes-core-agent (4.1.7-1) unstable; urgency=medium [ Jonas DOREL ] * Mention Update Proxy in configuration [ Marek Marczykowski-Górecki ] * Do not load u2mfn module anymore [ Patrick Schleizer ] * console=hvc0 must be last [ Pawel Marczewski ] * StartApp: remove workaround for .desktop suffix * Make the file copy operation respect default_user * GetAppmenus: ensure right app directories * Silence shellcheck * qubes.GetAppmenus: handle home directory properly in case of sudo [ Frédéric Pierret (fepitre) ] * travis: switch to dom0 Fedora 31 [ Pawel Marczewski ] * qubes-firewall: add anti-spoofing rules for connected machines * Update firewall tests * Update rule priorities for anti-spoofing * Update tests for anti-spoofing, add test for the method itself * qubes-firewall: correctly handle empty connected-ips list * firewall: fix family / family_name * update_connected_ips: correctly handle byte-string * get_connected_ips: handle empty and missing keys, add tests * update_connected_ips: reload nftables using one command * update_connected_ips: set iptables policy to drop while updating [ Marta Marczykowska-Górecka ] * Added "QubesIncoming" shortcut to Nautilus [ Pawel Marczewski ] * qubes-session-autostart: handle error when reading a directory [ AJ Jordan ] * Fix typo -- Marek Marczykowski-Górecki Fri, 17 Jan 2020 05:12:04 +0100 qubes-core-agent (4.1.6-1) unstable; urgency=medium [ Hans Jerry Illikainen ] * qubes-download-dom0-updates: verify package signatures [ Frédéric Pierret (fepitre) ] * travis: switch to bionic [ Amadeusz Piotr Żołnowski ] * Move qubes-rpc installation from the root Makefile to qubes-rpc Makefile * Remove no longer needed xorg-preload-apps.conf * Ignore build result: tar2qfile * Use built-in rules in qubes-rpc makefile * Don't clean tilda files in qubes-rpc * Install qubes-rpc files in Archlinux [ Otto Sabart ] * archlinux: fix proxy setting in XferCommand [ Frédéric Pierret (fepitre) ] * qubes.WaitForSession: refactor by waiting for qrexec-fork-server socket * vm-file-editor: drop old wait-for-session mechanism -- Marek Marczykowski-Górecki Wed, 13 Nov 2019 06:06:40 +0100 qubes-core-agent (4.1.5-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * dom0-updates: fix dnf.conf path [ unman ] * Fix typo * NetworkManager config - Add dns=default [ Patrick Schleizer ] * Mount /rw and /home with nosuid + nodev [ Marta Marczykowska-Górecka ] * Make qvm-copy/move[-to-vm] one script [ Marek Marczykowski-Górecki ] * Fix misleading error message on rootfs resize * resize-rootfs: wait for partition table to reload * network: don't fail the whole vif setup if IPv6 is disabled [ Frédéric Pierret (fepitre) ] * Update python2 dependencies to python3 and clean deprecated requirements * Require python setuptools [ Marek Marczykowski-Górecki ] * Minor codestyle fix in qubesadmin/firewall.py * Convert qubesagent module to python3 * Convert other scripts to python3 * Use spaces in xdg-icon script * debian: switch to python3 * rpm: switch deps to python3-setuptools on CentOS too -- Marek Marczykowski-Górecki Wed, 09 Oct 2019 04:15:20 +0200 qubes-core-agent (4.1.4-1) unstable; urgency=medium * Disable boot.automount which is created by systemd automatically -- Marek Marczykowski-Górecki Wed, 21 Aug 2019 10:34:49 +0200 qubes-core-agent (4.1.3-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * Remove dead code * Specify expected shell in su calls [ Patrick Schleizer ] * use long options rather than short options * use long rather than short option names; [ M. Vefa Bicakci ] * dom0-updates: Quote arguments [ Patrick Schleizer ] * use tor+http for onion [ Anastasia Cotorobai ] * yum-qubes-hooks: update with respect to dnf-qubes-hooks [ Frédéric Pierret (fepitre) ] * yum-plugin-hooks: package only for CentOS 7 * Allow creating TCP sockets between qubes * Add qvm-connect-tool to ease creating ad-hoc connections [ Marek Marczykowski-Górecki ] * debian: depend on xen-utils-guest * dnf: clear updates-available flag when dnf update yields no updates * Fix downloading dom0 updates on Debian -- Marek Marczykowski-Górecki Sun, 11 Aug 2019 07:26:02 +0200 qubes-core-agent (4.1.2-1) unstable; urgency=medium [ Frédéric Pierret (fepitre) ] * qvm-console: handle non-default bash shell (Debian) [ Marek Marczykowski-Górecki ] * dom0-updates: fix cleaning downloaded packages * Delay qubes-sync-time service after qrexec is started [ Frédéric Pierret (fepitre) ] * Refactor and handle new network qubesdb configuration * Handle legacy non-present /qubes-mac qubesdb entry * configure_network: use classical function parsing * init/functions: handle non-present /qubes-mac qubesdb and check if iface exists * Better use '-z' and '-n' for readibility * Handle errors for non-present ip gateways * init/functions: better not use ipcalc which is not present on minimal distro -- Marek Marczykowski-Górecki Thu, 27 Jun 2019 01:07:20 +0200 qubes-core-agent (4.1.1-1) unstable; urgency=medium * Update repositories to R4.1 * travis: switch to R4.1 -- Marek Marczykowski-Górecki Sun, 09 Jun 2019 18:35:55 +0200 qubes-core-agent (4.1.0-1) unstable; urgency=medium [ Frédéric Pierret (fepitre) ] * Disable useless Xen services in Qubes VM since we use upstream package * Handle tinyproxy path changed in upstream * Use exec to ease systemd handling the tinyproxy process * qubes-updates-proxy: make ShellCheck happy * Add qvm-showterminal * Rename qvm-showterminal to qvm-terminal and add print_usage * qvm-terminal: use usual '^]' as escape character * Add admin.vm.TerminalDispVM qubes-rpc * Rename and fix from Marek's comments * qubes.ShowInTerminal: simply exit if mktemp generate " character * Handle non-default 'eth0' Qubes managed interface * Make ShellCheck happy * Handle default value for get_qubes_managed_iface * Handle default value for get_iface_from_mac * setup-ip: only assign IP configuration of Qubes managed iface * setup-ip: handle default conf if /qubes-mac returns empty value * Handle network hooks located in /rw/config/network-hooks.d * Handle empty ip and vif_type [ Marek Marczykowski-Górecki ] * Remove qrexec-agent related files * travis: update for R4.1 [ Simon Gaiser ] * Pass GUI domain id to GUI agent [ Marek Marczykowski-Górecki ] * rpm,deb: add Conflicts: qubes-gui-agent < 4.1.0 -- Marek Marczykowski-Górecki Sat, 08 Jun 2019 05:45:54 +0200 qubes-core-agent (4.0.44-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * qrexec: add version negotiation * dom0-updates: improve dnf config handling * travis: update Fedora versions * rpm: fix python3-* packaging [ unman ] * Add new onion addresses to repo lists [ Marek Marczykowski-Górecki ] * Implement D-Bus Activation of desktop files manually -- Marek Marczykowski-Górecki Sat, 13 Apr 2019 05:26:00 +0200 qubes-core-agent (4.0.43-1) unstable; urgency=medium * Use sfdisk instead of parted to resize root partition table * Revert "Use sfdisk instead of parted to ..." on stretch and jessie -- Marek Marczykowski-Górecki Fri, 08 Mar 2019 03:07:40 +0100 qubes-core-agent (4.0.42-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * rpm: -networking package should depend on iproute * debian: make ShellCheck happy [ Lunar ] * Switch to HTTPS * Add apt-transport-https dependency [ Marek Marczykowski-Górecki ] * Introduce /usr/share/qubes/marker-vm [ AJ Jordan ] * Use dumpe2fs for filesystem size calculations [ Marek Marczykowski-Górecki ] * Add qubes version to marker-vm file -- Marek Marczykowski-Górecki Thu, 21 Feb 2019 05:12:59 +0100 qubes-core-agent (4.0.41-1) unstable; urgency=medium [ Bo Rydberg ] * Update spelling in setup-rw.sh [ Marek Marczykowski-Górecki ] * travis: switch to xenial * travis: disable "Prefer explicit escaping" shellcheck warning * Make shellcheck happy * Add dependency on e2fsprogs -- Marek Marczykowski-Górecki Wed, 09 Jan 2019 16:15:57 +0100 qubes-core-agent (4.0.40-1) unstable; urgency=medium [ AJ Jordan ] * Simplify block number calculation * Remove unnecessary quotes * Fix root volume size comparison * Remove weird spaces from script output * Rename variable to be more clear * Revert "Fix root volume size comparison" * Correct size_margin for rootfs resizes * Add quotes to placate ShellCheck * Rephrase comment [ Marek Marczykowski-Górecki ] * code style fix * Fix updates checking on Fedora with dnf * Fix updates notification on Fedora 29 [ Rudd-O ] * Allow per-VM protected file list * Fix logic bug. * /rw/config [ Marek Marczykowski-Górecki ] * is_protected_file: if no config dir is present, assume the file is _not_ protected [ AJ Jordan ] * Add XTerm as a dependency [ Marek Marczykowski-Górecki ] * qrexec: add startup notification -- Marek Marczykowski-Górecki Sat, 08 Dec 2018 22:44:06 +0100 qubes-core-agent (4.0.39-1) unstable; urgency=medium [ unman ] * make iproute2 a dependency for Debian core-networking [ Marek Marczykowski-Górecki ] * rpm, deb: add strict version dependency between qubes-core-agent-* pkgs * rpm: drop useless circular dependency -- Marek Marczykowski-Górecki Wed, 21 Nov 2018 03:06:24 +0100 qubes-core-agent (4.0.38-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * debian: don't create orig.tar.gz manually * Fix iptables-restore race condition in vif-route-qubes * vif-route-qubes: n -> \n * Do not force /bin/sh for /etc/qubes-rpc/qubes.GetAppmenus * Advertise supported qubes-services [ unman ] * Remove qubes-core-agent Debian dependency on xserver Mark xserver, xinit and x11-xserver-utils as Recommends [ Frédéric Pierret ] * spec: require 'hostname' as newer Fedora as moved out the dependency of initscripts into its network subpackage [ Marek Marczykowski-Górecki ] * Tell dom0 that VM is running Linux * Make shebang explicit /usr/bin/python2 where it's still there * archlinux: no longer need to mangle shebang for python scripts -- Marek Marczykowski-Górecki Mon, 29 Oct 2018 01:32:11 +0100 qubes-core-agent (4.0.37-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * Fix qubes-run-terminal.desktop permissions * tests: update yum.qubes-os.org IP address * appmenus: send only persistent appmenus entries, use $XDG_DATA_* * rpm: fix building on fc29 * travis: add fc29 [ lvh ] * Voice informational messages in bind-dirs.sh -- Marek Marczykowski-Górecki Wed, 10 Oct 2018 02:44:11 +0200 qubes-core-agent (4.0.36-1) unstable; urgency=medium * rpm: add workaround for Fedora's systemd package bug -- Marek Marczykowski-Górecki Thu, 13 Sep 2018 14:32:02 +0200 qubes-core-agent (4.0.35-1) unstable; urgency=medium [ 0brand ] * Comments to use qubes onion repository * Comments to use qubes onion repository [ Marek Marczykowski-Górecki ] * Fix detection of root device resize * Drop https from onion update repository urls -- Marek Marczykowski-Górecki Wed, 12 Sep 2018 04:04:14 +0200 qubes-core-agent (4.0.34-1) unstable; urgency=medium [ Marta Marczykowska-Górecka ] * Add proper help text to qvm-copy tools and fix incorrect behavior for qvm-move * Avoid leaking VM name in qvm-copy usage text [ Rusty Bird ] * qfile-agent.c: exit on EPIPE after gui progress write * Unify qvm-{copy,move}-to-vm.{gnome,kde} and fix some bugs [ unman ] * Install qubes control files for services in Ubuntu templates [ Marek Marczykowski-Górecki ] * rpm: use build flags provided by the distribution * travis: add fc28 and buster [ Olivier MEDOC ] * archlinux: ensure /usr/local is present in fstab (fix issue https://github.com/QubesOS/qubes-issues/issues/4196) [ fepitre ] * Handle CentOS vm repo [ unman ] * Add bionic, remove old Ubuntu versions * Remove user from sudo group on removing passwordless-root. [ Marek Marczykowski-Górecki ] * debian: do not add user to sudo group, lock root account [ Rusty Bird ] * misc/qubes-run-terminal: which -> type [ unman ] * Install debian version of qrexec pam in Ubuntu templates [ Marek Marczykowski-Górecki ] * Slightly simplify @DIST@ substitution in repository definition -- Marek Marczykowski-Górecki Mon, 03 Sep 2018 11:17:14 +0200 qubes-core-agent (4.0.33-1) unstable; urgency=medium [ Reynir Björnsson ] * bind mount /usr/local [ Marek Marczykowski-Górecki ] * Convert /usr/local from a symlink to a mount point on upgrade -- Marek Marczykowski-Górecki Tue, 17 Jul 2018 11:37:35 +0200 qubes-core-agent (4.0.32-1) unstable; urgency=medium [ awokd ] * grub: add noresume to kernel cmdline Under R4.0, when Debian HVMs are created from the debian-9 template, they hang on boot for 30 seconds without this option. [ Marek Marczykowski-Górecki ] * rpm: add R: tar, for qubes-dom0-update [ Peter Gerber ] * setup-rwdev.sh: Only check first 1 GiB for zeros -- Marek Marczykowski-Górecki Sun, 08 Jul 2018 03:48:51 +0200 qubes-core-agent (4.0.31-1) unstable; urgency=medium * debian: add Depends: qubesdb-vm -- Marek Marczykowski-Górecki Fri, 15 Jun 2018 14:32:23 +0200 qubes-core-agent (4.0.30-1) wheezy; urgency=medium [ Christopher Laprise ] * Fixes issue #3939 -- Marek Marczykowski-Górecki Tue, 05 Jun 2018 01:39:04 +0200 qubes-core-agent (4.0.29-1) unstable; urgency=medium * Drop leftovers of qubes-netwatcher service * qrexec: fix handling remote domain death * network: use iptables-restore --wait if available * rpm: add BR: systemd for pre/post install macros * qubes-rpc: fix code style - indent with spaces * qvm-open-in-vm: implement --view-only option * qvm-open-in-vm: mark file as read-only if opened with --view-only * Add file managers integration for qvm-open-in-dvm --view-only * Add build-time assert for filename buffer size -- Marek Marczykowski-Górecki Tue, 29 May 2018 00:40:11 +0200 qubes-core-agent (4.0.28-1) wheezy; urgency=medium [ Peter Gerber ] * Qubes firewall: correct syntax for icmpv6 rejects -- Marek Marczykowski-Górecki Thu, 10 May 2018 12:21:39 +0200 qubes-core-agent (4.0.27-1) unstable; urgency=medium [ X4lldux ] * Move/Copy many files in one step via nautilus extension [ Marek Marczykowski-Górecki ] * centos: exclude only dconf user profile, keep dpi config * travis: add centos7 * Fix packaging: 'user' group, BACKEND_VMM var * Create /etc/dconf/profile/user dynamically, if not present * Require dconf utility to (re)build /etc/dconf/db/local * Fix make clean * qubes-firewall: reject packets instead of dropping -- Marek Marczykowski-Górecki Wed, 02 May 2018 05:05:33 +0200 qubes-core-agent (4.0.26-1) unstable; urgency=medium * Change repository URLs to https -- Marek Marczykowski-Górecki Sun, 22 Apr 2018 00:29:02 +0200 qubes-core-agent (4.0.25-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * debian: don't call dconf if it isn't installed * qrexec: add qrexec-client-vm --buffer-size option [ unman ] * Add missing services in Ubuntu templates. [ Simon Gaiser ] * qrexec-fork-server: Always initialize addrlen argument of accept() [ Marek Marczykowski-Górecki ] * qrexec: fix arguments handling * Move 'qubesxdg' into qubesagent python package * Fix shell calls in Makefile * Fix waiting for application exit in qubesagent.xdg.launch * Load only test_* files when looking for tests (python) * qubes-session-autostart: do not wait for applications exit * Do not start dkms.service * network: do not assume IPv6 gateway is a link-local address * qubes-firewall: handle only traffic originating from VMs * network: make sure static NM configuration is created before NM start [ Davíð Steinn Geirsson ] * Add misc/qubes-run-terminal to launch any available terminal emulator [ Frédéric Pierret ] * Create .spec.in and Source0 * Remove _builddir * spec.in: add changelog placeholder * spec.in: fix %if expressions and remove useless conditions [ Vladimir Lushnikov ] * Problem: Unable to use pkg.install with Salt in dom0 when using UpdateVM that has only yum due to incorrect options passed by Salt assuming dnf presence [ Marek Marczykowski-Górecki ] * Use only /etc/skel to provision user's home directory of new VM * Update gitignore and make clean target * qubes-firewall: signal service readiness only after initial scripts [ Frédéric Pierret ] * Fix GCC8 warnings * Add missing python-setuptools dependency * Use %{python3_pkgversion} instead of duplicating python3 targets [ Marek Marczykowski-Górecki ] * travis: update Fedora versions -- Marek Marczykowski-Górecki Sat, 21 Apr 2018 15:10:20 +0200 qubes-core-agent (4.0.24-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * Drop Fedora < 22 support * Call qubes.PostInstall service to notify dom0 about all apps/features * dom0-updates: refactor for ease adding new actions with old yum * dom0-update: add some approximation of 'list', 'search' and 'reinstall' * Drop fakeroot for list/search actions on Debian [ Rusty Bird ] * Really enable qubes-sync-time.timer [ Frédéric Pierret ] * centos: fix conflict with dconf [ Marek Marczykowski-Górecki ] * Speed up initial /rw setup [ awokd ] * reinstal -> reinstall -- Marek Marczykowski-Górecki Tue, 27 Feb 2018 15:17:51 +0100 qubes-core-agent (4.0.23-1) unstable; urgency=medium * qrexec: launch services in login shell -- Marek Marczykowski-Górecki Thu, 22 Feb 2018 12:43:55 +0100 qubes-core-agent (4.0.22-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * Wait for user session as X session owner [ Christopher Laprise ] * Add qubes-firewall.d feature * Add /etc/qubes path [ Marek Marczykowski-Górecki ] * qrexec: use exec_qubes_rpc_if_requested() from qubes-utils * qrexec: translate keywords in target specification on the client side * rpm: adjust dependencies -- Marek Marczykowski-Górecki Tue, 20 Feb 2018 01:04:55 +0100 qubes-core-agent (4.0.21-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * Fix systemd-timesyncd.service startup * Do not sync VM time with clockvm if it's set to network time sync * network: reload DNS only on "up" event from NetworkManager [ Rusty Bird ] * bind-dirs.sh: don't fail on empty configuration directory [ unman ] * Stop Debian templates from forwarding by default. [ Marek Marczykowski-Górecki ] * qubes-firewall: call firewall-user-script at service startup * tests: check if qubes-firewall-user-script is called -- Marek Marczykowski-Górecki Tue, 13 Feb 2018 04:56:43 +0100 qubes-core-agent (4.0.20-1) unstable; urgency=medium * Add intel wifi drivers to suspend-module-blacklist -- Marek Marczykowski-Górecki Mon, 29 Jan 2018 21:57:11 +0100 qubes-core-agent (4.0.19-1) unstable; urgency=medium * Mount root fs with 'discard' option by default -- Marek Marczykowski-Górecki Wed, 24 Jan 2018 01:46:25 +0100 qubes-core-agent (4.0.18-1) unstable; urgency=medium * Place list of loaded modules in /var/run directly * Detach all drivers from PCI devices before suspend -- Marek Marczykowski-Górecki Tue, 23 Jan 2018 14:17:05 +0100 qubes-core-agent (4.0.17-1) unstable; urgency=medium [ Rusty Bird ] * Set 'wait-for-session=1' for 'qubes.VMShell+WaitForSession' * qvm-run-vm: appease ShellCheck without comment * qvm-run-vm: wait for X11 in DispVM case * Remove stranded block-snapshot script -- Marek Marczykowski-Górecki Thu, 18 Jan 2018 19:30:32 +0100 qubes-core-agent (4.0.16-1) unstable; urgency=medium * firewall: don't crash the whole qubes-firewall service on DNS fail * firewall: allow also related traffic * qrexec: fix infinite loop when multiple services are waiting for GUI * Fix kdialog --progressbar usage * Install KDE actions for KDE5 * Enable gnome settings daemon xsettings plugin * Disable automatic scaling in GNOME/GTK applications -- Marek Marczykowski-Górecki Fri, 12 Jan 2018 06:18:51 +0100 qubes-core-agent (4.0.15-1) unstable; urgency=medium [ MB ] * Fall back to direct execution when dbus is not installed or running [ Marek Marczykowski-Górecki ] * qrexec: setup process environment when not using fork server [ Patrick Schleizer ] * make apt-get apt-transport-tor broken in Qubes non-networked TemplateVMs [ Marek Marczykowski-Górecki ] * qubes.GetImageRGBA: fix handling '-' path without explicit type -- Marek Marczykowski-Górecki Sat, 23 Dec 2017 02:53:43 +0100 qubes-core-agent (4.0.14-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * Disable cups-browsed service together with cups [ Olivier Médoc ] * Makefile: split network install target from core agent install target * Makefile: ensure that everything is installed by default for rh based agents * archlinux: split core-agent from netvm-agent [ Olivier MEDOC ] * Makefile: add basic networking to the new install-corevm target * Makefile: fix typo created when spliting the install targets * Makefile: add network install targets to install-deb * archlinux: create a keyring package to install binary repository automatically * archlinux: fix shellcheck issues * Makefile: remove invalid reference to network dropins install target * archlinux: fix incorrect keyring being populated * archlinux: add recently splitted packages as optional dependencies of qubes-vm-core * Makefile: install-netvm shouldn't be a dependency of itself. * archlinux fix .service added twice in networking install script [ Marek Marczykowski-Górecki ] * network: configure IPv6 when enabled * network: IPv6-enabled firewall * network: drop unsolicited IPv6 neighbor advertisements by default * Fix IPv6 support in qubes-firewall * Add hint to use qvm-copy/qvm-move instead of qvm-*-to-vm [ Frédéric Pierret ] * Add support for Thunar Qubes VM tools * Disable Thunar thumbnails * Add debian package support * Fix ShellCheck comments * Fix UCA mistake and qvm-actions script [ TomZ ] * Fix language issues and usability issue [ Rusty Bird ] * qvm-{copy,move}: fix spurious deprecation message [ unman ] * Disable wpa_supplicant@.service [ Marek Marczykowski-Górecki ] * debian: use systemd-preset logic from rpm package -- Marek Marczykowski-Górecki Fri, 15 Dec 2017 09:23:22 +0100 qubes-core-agent (4.0.13-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * Fix starting time synchronization service [ Nedyalko Andreev ] * Disable dnf plugins when downloading dom0 updates in sys-firewall * Update the arch PKGBUILD script for QubesOS 4.0 * Fix the makefile for archlinux - SBINDIR is already /usr/bin * Restore the binary pacman repo and update it for QubesOS 4.0 * Add the 4.0 repo to the PKGBUILD sources list [ Olivier MEDOC ] * archlinux: remove deprecated setup of pam since v4.0.3 * archlinux: remove pam configuration for su and su-l * archlinux: do not mess with locales in post-install script * archlinux: ship pam.d/qrexec as a replacement of using su * archlinux: create user 'user' using bash by default instead of zsh * Makefile: avoid using python interpreter as a static name * archlinux: enforce usage of python2 in all scripts * archlinux: ensure [options] section is present in all pacman drop- ins * archlinux: remove python3 dependency * archlinux: restore setup of pam.d/su-l [ unman ] * Allow build for Xenial in 4.0 [ Paul Holcomb ] * Fix Ubuntu template builds [ Marek Marczykowski-Górecki ] * network: have safe fallback in case of qubes-firewall crash/error * Dumb down meminfo-writer enabling logic * Enable qubes-firewall also in "NetVM" [ Nedyalko Andreev ] * Fix the Archlinux template update proxy to work for HTTPS URLs as well [ Rusty Bird ] * Add iptables dep to qubes-core-agent-networking RPM spec [ Marek Marczykowski-Górecki ] * network: order qubes-firewall service before enabling IP forwarding -- Marek Marczykowski-Górecki Tue, 21 Nov 2017 04:51:27 +0100 qubes-core-agent (4.0.12-1) unstable; urgency=medium * Add support for new root volume partition layout to qubes.ResizeDisk * Resize root filesystem at VM startup if needed * debian: disable timer-based apt-get * network: fix rules for network setup on new udev * Fix removing temporary file after editing in (Disp)VM * debian: cleanup after splitting qubes-core-agent -- Marek Marczykowski-Górecki Thu, 19 Oct 2017 17:28:27 +0200 qubes-core-agent (4.0.11-1) unstable; urgency=medium [ Tray Torrance ] * Add archlinux support to upgrade checker [ Nedyalko Andreev ] * Fix an incorrect grep usage in archlinux upgrade check * Simplify archlinux upgrade check [ Marek Marczykowski-Górecki ] * Add convenient wrappers for qvm-copy-to-vm and qvm-move-to-vm * qrexec: code style fix - use spaces for indentation * qrexec: use user shell instead of hardcoded /bin/sh * qubes.ResizeDisk: handle dmroot being a symlink -- Marek Marczykowski-Górecki Sat, 07 Oct 2017 02:35:42 +0200 qubes-core-agent (4.0.10-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * centos: add package signing key, setup repository * network: fix issues found by shellcheck * qubes-rpc: fix issues found by shellcheck * init: fix issues found by shellcheck in init scripts * debian: fix shellcheck warnings in debian packaging * Fix shellcheck warnings in block-snapshot script * Fix shellcheck warnings in download-dom0-updates.sh * Few more shellcheck warnings fixes/ignores * Hint shellcheck where to look for sourced files, if in repository * travis: add shellcheck call for all scripts in the repository [ Nedyalko Andreev ] * Fix the archlinux package, use correct DROPIN dirs * Disable Oliver's binary pacman repo by default * Fix indentation and shellcheck issues for archlinux * Fix the install script after the shellcheck "fixes" * Fix the previous shellcheck-related "fixes" again [ Jussi Timperi ] * archlinux: add correct section to qubes-noupgrade.conf -- Marek Marczykowski-Górecki Wed, 04 Oct 2017 15:19:35 +0200 qubes-core-agent (4.0.9-1) unstable; urgency=medium [ Frédéric Pierret ] * dnf-qubes-hooks: handle newer DNF >= 2.x [ Marek Marczykowski-Górecki ] * travis: add fc26 build * Look for applications also in subdirectories of .../applications -- Marek Marczykowski-Górecki Tue, 26 Sep 2017 23:09:45 +0200 qubes-core-agent (4.0.8-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * dom0-updates: do not modify yum.conf [ Frederic Pierret (Epitre) ] * Add CENTOS/RHEL support (drop fedora-release dependancy as template builder will install it anyway and here it only make harder to support non-fedora builds) * Handle fallthrough with attribute(noreturn) for consistancy and compatiblity with older GCC [ Marek Marczykowski-Górecki ] * (redo) updates-proxy: explicitly block connection looping back to the proxy IP -- Marek Marczykowski-Górecki Fri, 15 Sep 2017 13:44:17 +0200 qubes-core-agent (4.0.7-1) unstable; urgency=medium * qrexec: add configurable waiting for session before starting service * document /etc/qubes/rpc-config * qubes-rpc: add 'wait-for-session=1' option for some services -- Marek Marczykowski-Górecki Fri, 11 Aug 2017 13:33:35 +0200 qubes-core-agent (4.0.6-1) unstable; urgency=medium * Announce if qubes-firewall service is supported+enabled in this template -- Marek Marczykowski-Górecki Sat, 29 Jul 2017 05:31:13 +0200 qubes-core-agent (4.0.5-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * qrexec: ship pam configuration for debian * rpm: add services enabling/disabling logic * qrexec: start process in a login shell [ Marta Marczykowska-Górecka ] * clock synchronization rewrite * minor amends to clock synchronization [ Marek Marczykowski-Górecki ] * clock sync: drop untrusted_ prefix after value validation, fix error msg -- Marek Marczykowski-Górecki Wed, 12 Jul 2017 23:40:54 +0200 qubes-core-agent (4.0.4-1) unstable; urgency=medium * grub: add console=tty0 to kernel cmdline * rpm: do not mess with locales in post-install script * Don't use 'su' in qubes.WaitForSession if not needed -- Marek Marczykowski-Górecki Wed, 05 Jul 2017 14:02:22 +0200 qubes-core-agent (4.0.3-1) unstable; urgency=medium [ unman ] * Enable build for Zesty [ Marek Marczykowski-Górecki ] * Do not load 'dummy-hcd' kernel module [ Vincent Penquerc'h ] * core-agent-linux: misc const fixups [ Marek Marczykowski-Górecki ] * qrexec: use PAM directly instead of calling su to setup the session -- Marek Marczykowski-Górecki Wed, 05 Jul 2017 02:37:51 +0200 qubes-core-agent (4.0.2-1) unstable; urgency=medium * Ship grub configuration * Ship Qubes 4.0 repository definition and keys * Update grub configuration * debian: install man pages * Add qrexec-client-vm man page * qrexec: exit with code 126 when service request was refused * qrexec: fix reporting exit code in qrexec-client-vm * qrexec: do not shutdown stdout socket inherited from parent -- Marek Marczykowski-Górecki Sat, 24 Jun 2017 02:19:14 +0200 qubes-core-agent (4.0.1-1) unstable; urgency=medium * Switch qubes.UpdatesProxy to socat * rpm,deb: fix dependencies -- Marek Marczykowski-Górecki Sun, 11 Jun 2017 00:02:49 +0200 qubes-core-agent (4.0.0-1) unstable; urgency=medium [ Marek Marczykowski-Górecki ] * qvm-copy-to-vm: fix handling empty target VM * Rename qubes.xdg python module to qubesxdg * Disable meminfo-writer if there is any PCI device attached [ Wojtek Porczyk ] * misc: add qvm-features-request [ Marek Marczykowski-Górecki ] * Add qubes.ResizeDisk service to adjust filesystem size * network: rewrite qubes-firewall daemon * network: remove qubes-netwatcher [ qubesuser ] * network: add vif-route-qubes-nat for IP address anonymization [ Marek Marczykowski-Górecki ] * network: reformat vif-route-qubes-nat * network: change vif-route-qubes-nat parameters * network: integrate vif-route-qubes-nat into vif-route-qubes * network: keep the same MAC on vif interfaces * network: properly handle DNS addresses in vif-qubes-nat.sh * network: use /32 netmask on internal IPs in NAT providing namespace * travis: drop debootstrap workaround * Add qubes.StartApp service * dom0-updates: restructure the script to not update metadata twice * tests: make firewall tests working regardless of python version * firewall: switch to python 3 * tests: add run-tests script, plug it into travis * Apply gschema overrides also to debian, rename according to guidelines * fedora,debian: update python3-daemon dependency * Remove duplicated 'close' button from titlebar of gnome applications * Ask for target VM for file-copy in dom0 * travis: update to Qubes 4.0 repositories * debian: fix qubes-firewall python packaging, make it more verbose * debian,fedora: split nautilus integration into separate package * Revert "firewall: switch to python 3" * Revert "fedora,debian: update python3-daemon dependency" * debian: add missing Build-Depends: python-setuptools * debian: make haveged.service patch less intrusive... * Rename qvm-run to qvm-run-vm * Implement qrexec-based connection to updates proxy * Implement qubes.PostInstall service * Fix detection of PCI passthrough * rpm: rename qubes-core-vm to qubes-core-agent * Rename qubes-nautilus to qubes-core-agent-nautilus * Split dom0-updates handling into subpackage * rpm: make file list more verbose to ease splitting the package * Split network-related files to -networking and -network-manager packages * Remove DisposableVM savefile related files * rpm: integrate documentation into main package * Adjust dependencies for clean upgrade * rpm: drop dependency on desktop-notification-daemon * Do not report spurious failure of qubes.WaitForSession service * deb,rpm: split passwordless root access configs into separate package * Remove old vusb scripts * debian: update basic metadata of package * rpm,deb: split qrexec-agent into separate subpackage * debian: drop explicit dependency on sudo * Cleanup kernel modules loading configuration * Add qubes.VMRootShell service * Make all scripts in qubes-rpc executable -- Marek Marczykowski-Górecki Fri, 09 Jun 2017 23:30:10 +0200 qubes-core-agent (3.2.18-1) unstable; urgency=medium * debian,fedora: drop gnome-packagekit from dependencies * systemd: fix race condition between qubes-db and qubes-early-vm- config * dispvm: don't use perl to decode base64-encoded script * rpm: don't "append" to not existing /etc/yum.conf -- Marek Marczykowski-Górecki Tue, 16 May 2017 00:54:18 +0200 qubes-core-agent (3.2.17-1) unstable; urgency=medium [ Jean-Philippe Ouellet ] * Remove dates from man pages [ Robin Schneider ] * bind-dirs: Create ro if bind target exists * Fix handling of binds containing spaces * Fix more shellcheck warnings [ unman ] * If there is only 1 DNS server make both DNAT rules point to it [ Daniel Moerner ] * network: Properly handle comments in NetworkManager.conf (#2584) -- Marek Marczykowski-Górecki Sat, 01 Apr 2017 21:45:29 +0200 qubes-core-agent (3.2.16-1) unstable; urgency=medium [ Andrew David Wong ] * Update Xen bug count in sudoers comment [ Nicklaus McClendon ] * Copied needed sources to build root [ Patrick Schleizer ] * comment [ Olivier MEDOC ] * archlinux: fix community repositories URL [ Lorenzo ] * Shut down after update only if it's a template. * Shut down after update only if it's a template. [ Olivier MEDOC ] * archlinux: fix lsb_release missing * archlinux: update installer script to use systemd preset file * archlinux: fix bash syntax errors * Makefile: enforce mode 750 for directories /etc/sudoers.d and /etc/polkit-1/rules.d * archlinux: fix pacman.d dropin not activated if pacman.conf does not already contains qubes markers * archlinux: add missing qubes-rpc dependencies [ Gregorio Guidi ] * Restore functionality of disable-default-route and disable-dns- server. [ unman ] * Stop anacron from starting in Debian using existing constraint on cron * Constrain cron and anacron in Ubuntu also * Reset iptables ACCEPT rule for updates proxy if service is running * Fix build for trusty - locales-all not available * Move trusty check and locales-all fix inside source-debian-quilt- copy-in * Apply gschema override preventing previews in nautilus in Debian [ Marek Marczykowski-Górecki ] * debian: fix lintian warning - command-with-path-in-maintainer-script * debian: don't fail the upgrade if glib-compile-schemas fails [ unman ] * Stop unnecessary services in Debian [ Marek Marczykowski-Górecki ] * systemd: place user dropins in /usr/lib instead of /lib * Use online resize2fs, and run filesystem check only when needed -- Marek Marczykowski-Górecki Tue, 07 Mar 2017 23:04:47 +0100 qubes-core-agent (3.2.15-1) wheezy; urgency=medium * Fix detection of dom0 updates -- Marek Marczykowski-Górecki Sun, 04 Dec 2016 22:39:01 +0100 qubes-core-agent (3.2.14-1) wheezy; urgency=medium [ unman ] * Add systemd override for haveged in xenial and stretch. (#2161) Reenable haveged.service after debian package installation [ Marek Marczykowski-Górecki ] * travis: drop debootstrap workaround [ Rusty Bird ] * v2: (vm) qvm-move-to-vm: don't "rm -rf" vm name argument -- Marek Marczykowski-Górecki Sun, 04 Dec 2016 21:57:10 +0100 qubes-core-agent (3.2.13-1) wheezy; urgency=medium [ Manuel Amador (Rudd-O) ] * Make signing optional for testing, and add program checks. * Clean up early initialization and setup of /rw * Better private.img size management. * Invert logic of systemd_version_changed. * Fix VM settings running while / is readonly. * Clean up specfile unit activation aspect. * Invert logic of SKIP_SIGNING. [ Marek Marczykowski-Górecki ] * Revert "network: disable proxy_arp" [ Jean-Philippe Ouellet ] * Keep Makefile DRY [ Marek Marczykowski-Górecki ] * Refactor qubes.InstallUpdatesGUI to reduce code duplication * Ask to shutdown the template after performing update * Prefer powerpill to update Archlinux VM [ Patrick Schleizer ] * fix reload_random_seed error handling [ Marek Marczykowski-Górecki ] * Write random seed directly to /dev/urandom [ Manuel Amador (Rudd-O) ] * Initialize home_volatile for disposable VMs. -- Marek Marczykowski-Górecki Fri, 18 Nov 2016 01:59:25 +0100 qubes-core-agent (3.2.12-1) wheezy; urgency=medium [ unman ] * Remove custom mount when starting cron, in favour of bind-dirs * use bind-dirs to handle crontab persistence * Revert version and correct unit files * Remove entry in changelog as version not bumped [ Rudd-O ] * Eliminate race condition with qubes-setup-dnat-to-ns -- Marek Marczykowski-Górecki Tue, 18 Oct 2016 15:55:40 +0200 qubes-core-agent (3.2.11-1) wheezy; urgency=medium [ HW42 ] * bind-dirs: copy from ro only if bind target doesn't exists [ Marek Marczykowski-Górecki ] * network: minor setup-ip fix * Configure NetworkManager to keep /etc/resolv.conf as plain file -- Marek Marczykowski-Górecki Mon, 03 Oct 2016 11:32:40 +0200 qubes-core-agent (3.2.10-1) wheezy; urgency=medium [ HW42 ] * systemd: fix qubes-mount-home path in cleanup script * systemd: remove obsolete symlinks with rm instead of systemctl [ Marek Marczykowski-Górecki ] * network: reload NM connection after setting it up * systemd: fix syntax error in preset file [ Patrick Schleizer ] * comment legacy function -- Marek Marczykowski-Górecki Mon, 08 Aug 2016 05:23:02 +0200 qubes-core-agent (3.2.9-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * systemd: cleanup removed services * systemd: order qubes-mount-dirs.service before local-fs.target * systemd: load xen-privcmd module * systemd: include tor-disabling drop-ins in the package * systemd: improve ordering of systemd units [ Patrick Schleizer ] * add /usr/lib/qubes/bind-dirs.sh compatibility symlink * empty legacy function -- Marek Marczykowski-Górecki Wed, 27 Jul 2016 06:08:56 +0200 qubes-core-agent (3.2.8-1) wheezy; urgency=medium * dom0-updates: fix cleaning downloaded packages * Revert "systemd: preset xendriverdomain on update" * systemd: don't mark updates check service failed * systemd: plug random seed loading into systemd-random-seed * Include Qubes Master Key in the VM template -- Marek Marczykowski-Górecki Sun, 17 Jul 2016 04:27:04 +0200 qubes-core-agent (3.2.7-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * systemd: preset xendriverdomain on update * rpm: fix misleading systemd warnings during upgrade [ Olivier MEDOC ] * archlinux: switch to usage of pacman.d drop-ins * archlinux: Setup default package repository * archlinux: ensure repositories are the last pacman.d files included * archlinux: fix update-proxy-configs to use pacman.d drop-ins [ Patrick Schleizer ] * fixed qubes-core-agent upgrading double package manager lock -- Marek Marczykowski-Górecki Wed, 13 Jul 2016 22:43:06 +0200 qubes-core-agent (3.2.6-1) wheezy; urgency=medium [ Patrick Schleizer ] * Do not start tor@default service in TemplateVM. [ Marek Marczykowski-Górecki ] * dom0-updates: use dnf --best --allowerasing [ Rusty Bird ] * Order network management units after network-pre.target * dvm, then xendriverdomain, then qrexec-agent * *Do* block until good random is available again * Remove 'if true' wrapper from 06a0d30d50ce4ea266532c06ef24880bf5363c1b * Enable xendriverdomain.service in 75-qubes-vm.preset [ Patrick Schleizer ] * add comment * add comment [ Olivier MEDOC ] * archlinux: update installer script in prevision of pacman.d drop-ins * archlinux: provide automatic qubes-trigger-sync-appmenus through pacman hooks * archlinux: remove unnecessary glib-compile-scheme -- Marek Marczykowski-Górecki Wed, 13 Jul 2016 04:38:17 +0200 qubes-core-agent (3.2.5-1) wheezy; urgency=medium * travis: add fc24 build * debian: add missing pkg-config build depends -- Marek Marczykowski-Górecki Mon, 06 Jun 2016 00:18:54 +0200 qubes-core-agent (3.2.4-1) wheezy; urgency=medium [ Patrick Schleizer ] * fix indent [ Marek Marczykowski-Górecki ] * dom0-updates: use dnf when available * Prefer 'dnf' over 'yum' for template update [ unman ] * Fall back to gnome utilities if kdialog not present [ Marek Marczykowski-Górecki ] * travis: initial version -- Marek Marczykowski-Górecki Sun, 05 Jun 2016 22:10:58 +0200 qubes-core-agent (3.2.3-1) wheezy; urgency=medium * Cleanup R3.1->R3.2 transitional package * Update repository definitions for R3.2 -- Marek Marczykowski-Górecki Wed, 18 May 2016 23:43:22 +0200 qubes-core-agent (3.2.2-1) wheezy; urgency=medium * systemd: order units checking for qubes-service after qubes-sysinit * qvm-open-in-vm: escape URL when wrapping it in HTML * Implement qubes.OpenURL service instead of wrapping URLs in HTML -- Marek Marczykowski-Górecki Wed, 18 May 2016 03:00:12 +0200 qubes-core-agent (3.2.1-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * qubes-rpc: fix SVG icon scaling * Fix bind-dirs.sh path [ Olivier MEDOC ] * archlinux: fix remaining loginctl privilege issues with invalid pam.d configuration [ Marek Marczykowski-Górecki ] * Remove obsolete policy files [ Patrick Schleizer ] * fixed bind-dirs legacy import function * fixed sh syntax error * minor debug xtrace output -- Marek Marczykowski-Górecki Thu, 05 May 2016 00:05:13 +0200 qubes-core-agent (3.2.0-1) wheezy; urgency=medium [ Patrick Schleizer ] * disable systemd-timesyncd [ Marek Marczykowski-Górecki ] * qrexec: write service stderr to both syslog and caller * qrexec: hide timing debug messages in vm-file-editor [ Patrick Schleizer ] * do not start the Tor service inside Qubes TemplateVMs * work on bind-dirs https://phabricator.whonix.org/T414 * work on bind-dirs * work on bind-dirs * renamed: misc/bind-dirs -> vm-systemd/bind-dirs * renamed: bind-dirs -> bind-dirs.sh * run /usr/lib/qubes/bind-dirs.sh from mount-dirs.sh * use symlink_level_max rather than hardcoding 10; comment * also exit from bind-directories if file /var/run/qubes-service/qubes- dvm exists * fixed broken file copy for files in multi level directories * refactoring / code simplification [ Rusty Bird ] * qvm-move-to-vm: Remove duplicated code * qvm-move-to-vm: Use '--' before file arguments * Use && in qvm-move-to-vm [ Andrew ] * Use proper space-expanded tabs, as per the coding guidelines. * Move usage information printing to separate function, and print usage to stderr; also added some spacing. * Use proper quoting around variables. * Properly handle case of empty domain name. [ Marek Marczykowski-Górecki ] * rpm: Add bind-dirs.sh to spec file * qubes.SuspendPreAll and qubes.SuspendPostAll services * qrexec: unify service environment preparation [ Patrick Schleizer ] * use 'true' rather than ':' for consistency * minor indent [ Rusty Bird ] * Remove exec in last line of qvm-copy-to-vm [ Marek Marczykowski-Górecki ] * qrexec: add service argument support * network: run setup-ip only on xen frontend interfaces -- Marek Marczykowski-Górecki Tue, 29 Mar 2016 14:41:34 +0200 qubes-core-agent (3.1.14-1) wheezy; urgency=medium * network: use `qubes-primary-dns` QubesDB entry if present -- Marek Marczykowski-Górecki Mon, 07 Mar 2016 13:47:01 +0100 qubes-core-agent (3.1.13-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * sysinit: Accept also old xenbus kernel interface [ adrianx64 ] * Proposed solution for issue #1657 [ Marek Marczykowski-Górecki ] * Move opening file viewer/editor into separate shell script * qubes-open: switch from mimeopen to xdg-open [ Olivier MEDOC ] * update qubes.InstallUpdateGUI to support archlinux * archlinux: add gcc and make as make dependencies * implement update proxy support for archlinux * archlinux: add Qubes Markers in pacman.conf so that changes done by qubes scripts are not inserted at the end of pacman.conf * archlinux: properly add qubes markers in pacman.conf * update-proxy: use curl instead of wget in archlinux in order to limit additional dependencies -- Marek Marczykowski-Górecki Mon, 08 Feb 2016 05:07:39 +0100 qubes-core-agent (3.1.12-1) wheezy; urgency=medium * Unload USB controllers drivers in USB VM before going to sleep * Do not try to signal NetworkManager before suspend if it isn't running -- Marek Marczykowski-Górecki Mon, 11 Jan 2016 21:59:34 +0100 qubes-core-agent (3.1.11-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * dom0-updates: add a message explaining yum deprecated warning [ noname ] * archlinux: Added python{2,3} as dependency. Solved python22 bug. [ Marek Marczykowski-Górecki ] * Fix time sync service -- Marek Marczykowski-Górecki Thu, 07 Jan 2016 05:52:35 +0100 qubes-core-agent (3.1.10-1) wheezy; urgency=medium * network: use more strict policy about incoming traffic * debian: add missing python-gtk2 dependency -- Marek Marczykowski-Górecki Thu, 31 Dec 2015 02:58:29 +0100 qubes-core-agent (3.1.9-1) wheezy; urgency=medium * dnf: drop shebang, it isn't standalone script * Package DNF plugin for both python2 and python3 * dom0-updates: fix reporting when no updates are available -- Marek Marczykowski-Górecki Sat, 26 Dec 2015 14:24:00 +0100 qubes-core-agent (3.1.8-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * open-in-vm: Fix path to mimeinfo database [ Olivier MEDOC ] * archlinux: fix invalid systemd path in make install directive * archlinux: remove quotes when checking system locales (in case it has been user defined) [ MB ] * [network-proxy-setup] Permit !CONFIG_MODuLES [ Rusty Bird ] * repo description: updates-testing -> security-testing [ Marek Marczykowski-Górecki ] * debian: add security-testing repository [ Olivier MEDOC ] * archlinux: ensure systemctl reset preset correctly (need to be started twice) [ Marek Marczykowski-Górecki ] * updates-proxy: restart on network configuration change to reload DNS -- Marek Marczykowski-Górecki Sun, 20 Dec 2015 03:12:39 +0100 qubes-core-agent (3.1.7-1) wheezy; urgency=medium * updates-proxy: explicitly block connection looping back to the proxy IP -- Marek Marczykowski-Górecki Fri, 04 Dec 2015 15:32:14 +0100 qubes-core-agent (3.1.6-1) wheezy; urgency=medium * Revert "network: use drop-ins for NetworkManager configuration (#1176)" -- Marek Marczykowski-Górecki Sun, 29 Nov 2015 00:34:34 +0100 qubes-core-agent (3.1.5-1) wheezy; urgency=medium [ Patrick Schleizer ] * clean up /etc/tinyproxy/filter-updates [ Olivier MEDOC ] * updates-proxy: remove remaining traces of proxy filtering file from Makefile * rpm_spec: declare InstallUpdateGUI qrexec_service * archlinux: enforce minimum versionning of qubes-utils [ Patrick Schleizer ] * Prevent services from being accidentally restarted by `needrestart`. * Have qubes-sysinit create /var/run/qubes VM type files. [ Marek Marczykowski-Górecki ] * Package needrestart config only for Debian * debian: reformat Build-Depends: * debian: update build-depends for split qubes-utils package * backup: Use 'type' instead of 'which' to prevent unnecessary dependency -- Marek Marczykowski-Górecki Sat, 28 Nov 2015 14:48:33 +0100 qubes-core-agent (3.1.4-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * Minor improvements to packaging (based on rpmlint) [ Patrick Schleizer ] * removed confusing comments * minor indent * No longer start /etc/init.d/tinyproxy by default anymore. [ Marek Marczykowski-Górecki ] * Revert "preset disable tinyproxy by default" [ Patrick Schleizer ] * minor, removed trailing space * Improved upgrade notifications sent to QVMM. * fixed inverted logic issue in upgrades-installed-check * misc/upgrades-installed-check: handle apt-get errors [ Marek Marczykowski-Górecki ] * Explicitly fail upgrades-installed-check on other distributions [ qubesuser ] * Allow to provide customized DispVM home directly in the template VM [ Marek Marczykowski-Górecki ] * network: let NetworkManager configure VM uplink, if enabled * Use improved update-notify script also in Fedora * Implement qubes.InstallUpdatesGUI qrexec service * Really fix update-proxy rules for debian security fixes repo * updates-proxy: disable filtering at all * network: disable proxy_arp -- Marek Marczykowski-Górecki Sun, 15 Nov 2015 04:29:29 +0100 qubes-core-agent (3.1.3-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * network: forward TCP DNS queries [ Patrick Schleizer ] * removed trailing spaces * Renamed qubes-mount-home to qubes-mount-dirs. [ Marek Marczykowski-Górecki ] * qrexec: implement buffered write to a child stdin [ Olivier MEDOC ] * archlinux: update packaging and install script to use systemd DROPINs * archlinux: force running scripts with python2 even when /usr/bin/env is used * archlinux: readd notification-daemon as a dependency * archlinux: readd lines removed by error during merge [ Patrick Schleizer ] * disable leaking TCP timestamps by default [ Marek Marczykowski-Górecki ] * rpm: add /etc/sysctl.d/20_tcp_timestamps.conf * rpm: remove duplicated entry [ Patrick Schleizer ] * cleanup /etc/apt/apt.conf.d/00notiy-hook on existing systems [ erihe251 ] * Small language fixes * Update qubes.sudoers [ Marek Marczykowski-Górecki ] * Require new enough qubes-utils package for updated libqrexec-utils * debian: install locales-all instead of custom locales generation * makefile: cleanup help message * Setup updates proxy in dnf and PackageKit * backup: fix handling backup filename with spaces * backup: improve exit code reporting [ Rusty Bird ] * qfile-unpacker: Avoid data loss by checking for child errors [ Marek Marczykowski-Górecki ] * appmenus: ignore entries with NoDisplay=true * qfile-agent: move data handling code to libqubes-rpc-filecopy [ yaqu ] * Replacing "sleep 365d" with "sleep inf" [ Marek Marczykowski-Górecki ] * No longer disable auditd * dom0-updates: prefer yum-deprecated over dnf * fedora: Add skip_if_unavailable=False to Qubes repositories [ Olivier MEDOC ] * add DROPINS for org.cups.cupsd systemd files. * dropins: make current systemd dropins specific to systemd-system in order to introduce dropins for systemd-user * dropins: implement dropins for systemd user starting with pulseaudio systemd service and socket masking [ Marek Marczykowski-Górecki ] * qrexec: add some comments, minor improvement in readability * qrexec: use #define for protocol-specified strings * dracut: disable hostonly mode * dom0-updates: use yum-deprecated instead of dnf in all calls * updates-proxy-setup: use temporary file for config snippet * Implement dnf hooks for post-update actions * fedora: do not require/use yum-plugin-post-transaction-actions in F>=22 * Get rid of qubes-core-vm-kernel-placeholder * systemd: make sure that update check is started only after qrexec- agent * dom0-updates: do not use 'yum check-update -q' * Bump qubes-utils version requirement [ Patrick Schleizer ] * preset disable tinyproxy by default [ Marek Marczykowski-Górecki ] * updates-proxy: use separate directory for PID file -- Marek Marczykowski-Górecki Wed, 11 Nov 2015 06:29:21 +0100 qubes-core-agent (3.1.2-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * Enlarge /tmp and /dev/shm * network: use own iptables service instead of repurposing existing one [ Patrick Schleizer ] * removed iptables-persistent from Depends to improve usablity (avoid redundant debconf question) [ Marek Marczykowski-Górecki ] * debian: disable netfilter-persistent.service * Adjust progress message on file move operation * Run 'ldconfig' to update /usr/local/lib* cache, if applicable * updates-proxy: Disable 'Via: tinyproxy' header * Cleanup R3.0->R3.1 transitional package * network: use drop-ins for NetworkManager configuration (#1176) * network: fix 'qubes-uplink-eth0' NetworkManager connection (#1280) [ Patrick Schleizer ] * minor [ HW42 ] * qubes-random-seed: feed kernel rng with randomness from dom0 * reload qubes-random-seed when restoring DispVM [ Marek Marczykowski-Górecki ] * systemd: actually enable qubes-random-seed service * sysvinit: load random seed from dom0 provided data * Use 'type' instead of 'which' to prevent unnecessary dependency * Add missing R: dconf to hide nm-applet when not used * dom0-updates: Fix showing package list when --check-only option was used * dom0-updates: check "yum check-update" exit code, not only its output * dom0-updates: fix hostname in error message -- Marek Marczykowski-Górecki Sun, 11 Oct 2015 03:00:00 +0200 qubes-core-agent (3.1.1-1) wheezy; urgency=medium * Update repository definition for r3.1 -- Marek Marczykowski-Górecki Tue, 29 Sep 2015 16:55:35 +0200 qubes-core-agent (3.1.0-1) wheezy; urgency=medium [ Patrick Schleizer ] * Allow passwordless login for user "user" (when using 'sudo xl console'). * Allow passwordless login for user "user" (when using 'sudo xl console') for images being upgraded. * show error msg if qubes.ReceiveUpdates failed [ qubesuser ] * qubes-rpc: fix broken temporary file deletion in qubes.GetImageRGBA [ Patrick Schleizer ] * added missing dependency python-dbus to 'Depends:' [ Marek Marczykowski-Górecki ] * rpm: add dbus-python dependency [ qubesuser ] * qubes-rpc: fix broken temporary file deletion in qubes.GetImageRGBA * qubes-rpc: fix icon selection using pyxdg and support SVG icons [ Patrick Schleizer ] * fixed 'Debian 8 apt.config.d misconfiguration' * added missing dependency xserver-xorg-dev * - Prevent 'su -' from asking for password in Debian [based] templates. Thanks to @unman and @marmarek for suggesting the fix! Fixes https://github.com/QubesOS/qubes-issues/issues/1128. - Changed 'ifeq (1,${DEBIANBUILD})' to 'ifeq ($(shell lsb_release -is), Debian)' to make the build work outside of Qubes Builder as well. * Fixed /etc/pam.d/su.qubes. (Moved line 'auth sufficient pam_permit.so' up. May not be low '@include' lines.) * fix typo -- Marek Marczykowski-Górecki Tue, 29 Sep 2015 16:39:55 +0200 qubes-core-agent (3.0.16-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * debian: remove SELinux disabling code * Revert "qubes-desktop-run: Activate via DBUS when desktop file contains DBusActivatable" * qubes-desktop-run: start the Dbus service (if needed) [ Patrick Schleizer ] * added pulseaudio-kde and spice-vdagent to qubes-trigger-desktop- file-install [ Jason Mehring ] * debian: Move python-xdg to depends section in debian/control * sudoers.d: Stops QT from using the MIT-SHM X11 Shared Memory Extension [ Rusty Bird ] * Mount /dev/xvdb with fs type "auto" [ Marek Marczykowski-Górecki ] * Move .desktop launching code to python moules so it can be reused * Implement dropins for /etc/xdg/autostart (#1151) * Remove dynamically generated autostart desktop files * qubes-session-autostart: do not abort the whole process on invalid file * qubes-desktop-run: don't crash on Debian wheezy (glib < 2.36) * debian: fix /dev permissions on upgrade * systemd: fix starting cups * debian: depend on gawk * Fix show-hide-nm-applet.desktop - use OnlyShowIn=X-QUBES [ Patrick Schleizer ] * moved python-xdg from Recommends to Depends -- Marek Marczykowski-Górecki Thu, 03 Sep 2015 02:45:30 +0200 qubes-core-agent (3.0.15-1) wheezy; urgency=medium * debian: remove `Recommends: chrony` -- Marek Marczykowski-Górecki Sat, 08 Aug 2015 23:23:38 +0200 qubes-core-agent (3.0.14-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * kernel-placeholder: prevent xl2tpd from pulling kernel packages * qubes-core-vm-kernel-placeholder 1.0-3 [ Olivier MEDOC ] * archlinux: update dependency list based on .spec file * archlinux: reorganize install script to make it more easily compareable with the .spec file * archlinux: fix syntax errors in install file [ Marek Marczykowski-Górecki ] * debian: fix permissions of /var/lib/qubes/dom0-updates [ Patrick Schleizer ] * also inform in cli if no new updates are available [ Olivier MEDOC ] * archlinux: pulseaudio should be configured in gui agent and will break installation of pulseaudio if installed in core-agent-linux * archlinux: enabled configuration of all core agent dependencies * archlinux: ensure python2 is used for all scripts and fix dependencies for qubes-desktop-run [ Jason Mehring ] * debian: Renamed incorrect filename: 00notiy-hook -> 00notify-hook * debian: Comment out deb-src line in qubes-r3.list * Use 'which' to locate fuser since fuser path is different in Fedora and Debian * debian: Change triggers to use `interest-await` (execute triggers after all packages installed) * Remove '.service' from systemd enable loop as unit_name already contains .service in name * debian: remove cups/print-applet triggers * debian: Added cups, system-config-printer to Recommends * Makefile: Add systemd drop-in support which include conditionals to prevent services from starting * fedora: Add systemd drop-in support which include conditionals to prevent services from starting * debian: Add systemd drop-in support which include conditionals to prevent services from starting * Re-aranged qubes-vm.preset to indicate which services are specificly for Fedora only * vm-systemd: Add systemd drop-in support which include conditionals to prevent services from starting [ Marek Marczykowski-Górecki ] * archlinux: remove installOverridenServices as now handled by systemd dropins * fedora: do not own dropins directories * fedora: simulate preset-all only on first install, not upgrade * fedora: fix default locale generation * qrexec: fix exit code from qrexec-client-vm * qrexec: make sure that all the pipes/sockets are closed on cleanup [ Jason Mehring ] * qubes-desktop-file-install: Manages xdg desktop entry files * debian: Reformat depends in control for better readability * debian: qubes-desktop-file-install: Add misssing depend to contol * debian: Switch to using org.mate.NotificationDaemon by default to eliminate popups not closing * fedora: Use 'slider' org.mate.NotificationDaemon theme * qubes-desktop-run: Activate via DBUS when desktop file contains DBusActivatable [ Marek Marczykowski-Górecki ] * Move `/usr/share/qubes/xdg` to `/var/lib/qubes/xdg` [ Patrick Schleizer ] * fixed "in place upgrade issue - base-passwd debconf interative question asks 'Remove group "qubes"'" * fixed "in place upgrade issue - base-passwd debconf interative questi…on asks 'Remove group "qubes"'" for existing users -- Marek Marczykowski-Górecki Sat, 08 Aug 2015 04:16:52 +0200 qubes-core-agent (3.0.13-1) wheezy; urgency=medium * fedora: ensure that /etc/sysconfig/iptables exists (Fedora 20) * fedora/systemd: fix service enabling code * network: use iptables-restore instead of iptables --wait * network: guard iptables call with manual lock * network: disable tx csum offload on vif interfaces -- Marek Marczykowski-Górecki Wed, 01 Jul 2015 07:05:53 +0200 qubes-core-agent (3.0.12-1) wheezy; urgency=medium * dom0-updates: make the tool working on Debian * fedora, debian: make sure that default locale is generated * rpm: improve setting iptables rules * Do not override file pointed by /etc/localtime symlink -- Marek Marczykowski-Górecki Tue, 23 Jun 2015 20:06:22 +0200 qubes-core-agent (3.0.11-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * debian: fix apt sources.list generation (missing debian version field) [ Jason Mehring ] * Set a default locale if missing -- Marek Marczykowski-Górecki Thu, 11 Jun 2015 04:06:26 +0200 qubes-core-agent (3.0.10-1) wheezy; urgency=medium * rpm: ensure that all the services are enabled after upgrade * qrexec: do not show message about missing fork-sever - it isn't an error * rpm: add missing dependencies -- Marek Marczykowski-Górecki Tue, 02 Jun 2015 11:20:18 +0200 qubes-core-agent (3.0.9-1) wheezy; urgency=medium [ Jason Mehring ] * debian: Only notify dom0 on apt-get post hook; don't update package index * debian: Allow apt-get post hook to fail gracefully (won't work in chroot) [ Marek Marczykowski-Górecki ] * appmenus: hide message about missing /usr/local/share/applications * qrexec: prefer VM-local service file (if present) over default one * rpm: mark service files as configuration to not override user changes -- Marek Marczykowski-Górecki Fri, 15 May 2015 03:27:58 +0200 qubes-core-agent (3.0.8-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * Use iptables --wait only when it is supported [ Jason Mehring ] * debian: Update notification now notifies dom0 when an upgrade is completed -- Marek Marczykowski-Górecki Tue, 28 Apr 2015 12:51:48 +0200 qubes-core-agent (3.0.7-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * debian: install qubes-download-dom0-updates.sh * prepare-dvm: fix bashism * network: wait for iptables lock instead of aborting * rpm: cleanup R2->R3.0 transitional package [ Jason Mehring ] * whonix: Added protected-files file used to prevent scripts from modifying files that need to be protected * Changed location of PROTECTED_FILE_LIST to /etc/qubes/protected- files.d -- Marek Marczykowski-Górecki Sat, 25 Apr 2015 02:36:55 +0200 qubes-core-agent (3.0.6-1) wheezy; urgency=medium * qrexec: do not reset umask to 077 for every started process * rpm/systemd: do not use preset-all during package upgrade * systemd: disable avahi-daemon and dnf-makecache * dispvm: do not start GUI apps during prerun * Fix resizing of /rw partition (private.img) * Minor fixes in mount-home.sh -- Marek Marczykowski-Górecki Sat, 11 Apr 2015 03:40:57 +0200 qubes-core-agent (3.0.5-1) wheezy; urgency=medium * systemd: use presets to enable services, call preset-all * systemd: install overridden unit file for chronyd -- Marek Marczykowski-Górecki Tue, 07 Apr 2015 14:58:36 +0200 qubes-core-agent (3.0.4-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * qrexec: try to recover from fork-server communication error * rpm: add missing BuildRequires: libX11-devel * debian: fix handling SysV units in disableSystemdUnits * debian: update NetworkManager configuration [ Wojtek Porczyk ] * qubes-rpc-multiplexer: deprecate /etc/qubes_rpc, allow /usr/local * sudoers: do not require TTY [ Marek Marczykowski-Górecki ] * Update repository definition: r3 -> r3.0 -- Marek Marczykowski-Górecki Thu, 02 Apr 2015 00:55:09 +0200 qubes-core-agent (3.0.3-1) wheezy; urgency=medium * Enable updates repos by default -- Marek Marczykowski-Górecki Fri, 27 Mar 2015 01:24:43 +0100 qubes-core-agent (3.0.2-1) wheezy; urgency=medium [ Marek Marczykowski-Górecki ] * debian: fix version number * backup: fix qubes.Restore service - do not send garbage as backup data [ Jason Mehring ] * debian: Add extend-diff-ignore options to debian packager [ Marek Marczykowski-Górecki ] * qrexec: fork into background after setting up qrexec-fork-server socket * Fix "backup: fix qubes.Restore service - do not send garbage as backup data" [ Jason Mehring ] * Switched qvm-move-to-vm.{gnome,kde} scripts to use bash not sh * Removed nautilus-actions depend and replaced with nautilus-python * Removed code that deleted original nautilus actions [ Marek Marczykowski-Górecki ] * fc21: fix DispVM preparation - Xorg has new name * dispvm: kill all process after populating caches * dispvm: start gui agent early, do not kill Xorg * dispvm: close only visible windows during DispVM preparation * Move mounting /rw and /home to separate service * dispvm: use qubes.WaitForSession to wait for gui-agent startup * dispvm: include memory caches in "used memory" notification * dispvm: do not restart qubesdb-daemon, use watch instead * qrexec: simplify makefile * qrexec: handle data vchan directly from qrexec-client-vm * qrexec: return remote process status as qrexec-client-vm exit code * qrexec: better handle remote process termination * qrexec: do not break connection on duplicated SIGUSR1 * qrexec: minor readability fix * qrexec: process vchan data queue (esp MSG_EXIT_CODE) before sending anything * qrexec: add option to use real stdin/out of qrexec-client-vm * qrexec: do not leak FDs to logger process * qrexec: execute RPC service directly (without a shell) if it has executable bit set * qrexec: get rid of shell in services using EOF for any signaling * qrexec: move qrexec-client-vm to /usr/bin * Add support for comments in qubes-suspend-module-blacklist * Create filesystem if the private.img is empty * Provide stub files in /rw/config * qrexec: fix compile warning * qrexec: do not wait for local process if no one exists * qrexec: enable compiler optimization * Do not load xen-usbfront automatically * fedora: override iptables configuration on initial installation * Update comments and xenbus intf in startup scripts regarding vchan requirements * dom0-update: allow to specify custom yum action -- Marek Marczykowski-Górecki Thu, 26 Mar 2015 23:56:25 +0100 qubes-core-agent (3.0.1-1) jessie; urgency=medium [ Marek Marczykowski-Górecki ] * Reenable imsettings service * systemd: fix xenstore-ls path [ Jason Mehring ] * Allow hyphenated distro names in tinyproxy filter * Change condition test to compare to a link "-L" * debian: add xen-utils-common as a dependancy to allow Debian proxies * debian: Added maintainers scripts (pre / postinit + rm) - Currently in debug mode * debian: preinst needs a group and force no password entry on adduser * debian: Added less restrictive filter option for debian packages Sites like sourceforge append ?downloadxxx to end * debian: added new depends * debian: force shell to be bash since its default is dash and many qubes scripts rely on bash and will break in dash and added tinyproxy user [ HW42 ] * move fedora specific stuff to install-rh target * don't track debina/files (since it is autogenerated) * use systemd in debian * install iptables/forwarding for debian * various patches for debian * improve update of /etc/hosts * make source.list multiarch compatible * add xserver-xorg-video-dummy to the dependencies list of qubes-core- agent * dispvm-presun.sh needs bash * use sleep instead os usleep since it is more portable * debian: chown /home_volatile/user in posinst * fix xenstore-read path in network-proxy-setup.sh for debian * debian: add dependency on xen-utils since it's needed for proxy/netvm * debian: add support for qubes appmenus [ Marek Marczykowski-Górecki ] * debian: fix initialization of /etc/hosts [ Jason Mehring ] * debian: set -e added in place of set -x * debian: Made debian proxy filter rules more restrictive * debian: Cleanup * debian: Prepend package name to maintainers scripts * debian: Add qubes-update-check for Debian * debian: Revert back to original NetworkManager, ModemManager service names * debian: apt-get needs to update first * debian: Remove absolute path to xenstore-* * debian: Added more dependancies * debian: Added postrm disable of other Qubes packages * debian: Added all other outstanding triggers contained in rpm_spec as well as triggers if other packages get installed at a later date the configurations will run on them * debian: removed commented out depends * debian: Added more error reporting to track down any missing dependancies * debian: More depends for debian as netvm and some configuration tweaks. [ Marek Marczykowski-Górecki ] * network: do not use ifcfg-rh NM plugin * network: fix NM uplink config permissions [ Jason Mehring ] * debian: Add new notification agent depends; remove other * debian: Added functionality to move desktop entry config files to /usr/share/qubes/xdg/autostart to preserve originals * debian: Wrong variable name was used to create /usr/share/qubes/xdg/autostart [ Marek Marczykowski-Górecki ] * Fix compile flags order (-lX11 moved to the end) [ Jason Mehring ] * debian: Updated tinyproxy filter rules * debian: Don't display systemd info in chroot since systemd show does not work in chroot [ Marek Marczykowski-Górecki ] * network: fix indentation * Fix disabling nm-applet when NM is disabled * debian: create tinyproxy as system user * debian: fix generation of apt sources list file * debian: add missing python-gi to dependencies * debian: remove obsolete code from postinst script * debian: fix service name in postinst script * Update update-proxy rules for debian security fixes repo [ HW42 ] * debian: move not strictly required packages to Recommends-Section. * debian: remove unneeded acpid dependency [ Marek Marczykowski-Górecki ] * network: set uplink configuration based on MAC (NetworkManager) * network: fix NM config preparation [ Jason Mehring ] * fc21: iptables configurations conflict with fc21 yum package manager * fc21: Remove left-over code comment [ Marek Marczykowski-Górecki ] * fedora: Add security-testing repo definition * filecopy: prevent files/dirs movement outside incoming directory during transfer * fedora: Fix iptables config install script * fedora: Fix iptables config installation one more time [ HW42 ] * don't ignore asprintf() return value [ Marek Marczykowski-Górecki ] * network: support for not setting DNS and/or default gateway [ Olivier MEDOC ] * archlinux: fix new packaging requirements related to sbin, lib64, run ... * archlinux: align with fedora changes related to imsettings [ Marek Marczykowski-Górecki ] * fedora: reduce code duplication in systemd triggers * fedora: reload systemd only once * systemd: allow to start cron daemon (#909) * filecopy: fallback to "open(..., 000)" method when /proc inaccessible * network: support for not setting DNS and/or default gateway (v2) * rpm: add missing R: pygobject3-base [ HW42 ] * debian: fix for QSB #014 requires up to date qubes-utils * debian: postinst: use systemctl mask * debian: postinst: use dpkg-divert * debian: don't generate regular conf files in postinst * debian: postinst: don't remove /etc/udev/rules.d/* * debian: postinst: don't create /rw - it is already part of the package * debian: postinst: use systemctl to set default target * debian: postinst: remove fedora specific code * debian: postinst: enable netfilter-persistent service * debian: postinst: cleanup * debian: postinst: don't start systemd services * debian: postinst: enable haveged only if installed * debian: postinst: remove redundant and misleading trigger output * debian: install fstab as normal config file * debian: preinst: remove modification of /etc/modules * remove 'bashisms' or explicit use bash * debian: preinst: don't force the default shell to bash * debian: prerm: remove obsolete code * debian: preinst: cleanup user creation [ Wojtek Porczyk ] * spec: require linux-utils-3.0.1 [ Matt McCutchen ] * Switch to preset file for systemd units to disable. * Make qvm-run bidirectional and document its limitations. [ Marek Marczykowski-Górecki ] * debian: change systemctl set-default back to manual symlink * network: fix handling newline in firewall rules * qrexec: use sockets instead of pipes to communicate with child process * qrexec: reorganise code for upcoming change * qrexec: add simple "fork server" to spawn new processes inside user session * Adjust permissions of /var/run/qubes [ Jason Mehring ] * debian: Remove 'exit 0' in maintainer section scripts to all other debhelpers (if any) to also execute * Add a qubes group and then add the user 'user' to the group * Remove 'xen.evtchn' udev rule * Set permissions to /proc/xen/privcmd, so a user in qubes group can access * debian: Converted debian package to a quilt package to allow patches * debian: Refactor Debian quilt packaging for xen * debian: Remove 'exit 0' in maintainer section scripts to all other debhelpers (if any) to also execute * Add a qubes group and then add the user 'user' to the group * Remove 'xen.evtchn' udev rule * Set permissions to /proc/xen/privcmd, so a user in qubes group can access * debian: Converted debian package to a quilt package to allow patches * debian: Revert depends back to use libxen-dev * debian: Move creation of directories into debian.dirs configuration file * debian: Remove dist target from Makefile as copy-in is now being used * debian: Remove unneeded patch file and README * Make sure when user is added to qubes group that the group is appended [ Marek Marczykowski-Górecki ] * qrexec: fix compile warning * debian: reenable -Werror, mentioned warning already fixed * debian: exclude binary packages from source archive * updates-proxy: allow xz compressed metadata (fc21) -- Marek Marczykowski-Górecki Tue, 17 Feb 2015 14:14:16 +0100 qubes-core-agent (3.0.0-1) jessie; urgency=medium [ Marek Marczykowski-Górecki ] * Improve handling of .desktop files * suspend: do not disable network frontend devices * Handle tabs in /etc/hosts [ Marek Marczykowski ] * Update for new vchan API * spec: add dependencies on vchan package (both R: and BR:) * load xen-gntalloc module required by libxenvchan * spec: get backend_vmm from env variable * rpm: fix typo * Use Qubes DB instead of Xenstore * systemd: fix qubes-service handling * dispvm: restart qubesdb at DispVM start [ Marek Marczykowski-Górecki ] * qrexec: remove dom0 targets from makefile * code style: replace tabs with spaces * qrexec: new protocol - direct data vchan connections * Use xenstore.h instead of xs.h * qrexec: register exec function * Update repos and keys for Qubes R3 -- Marek Marczykowski-Górecki Sat, 22 Nov 2014 16:24:17 +0100 qubes-core-agent (2.1.42) jessie; urgency=medium * firewall: show error message only on actual error * Avoid 100MB reserved space in private ext4 partition * gui-fatal: do not run as root * fedora: workaround slow system shutdown (#852) * Rename qubes-yum-proxy service to qubes-updates-proxy * Rename yum-proxy-setup service to updates-proxy-setup * updates-proxy: add rules for debian repositories (#887) * qrexec: check for setuid() error when calling zenity/kdialog * Use systemd mechanism for loading kernel modules (when available) * Add missing u2mfn module load * archlinux: modules-load.d handled now in generic files * debian: migrate to native systemd services * updates-proxy-setup: support setting proxy for apt (#887) * Introduce qubes.SetDateTime service for time synchronization * systemd: fix 'service' path * Include /rw in the package * debian: custom dh_auto_clean no longer needed -- Marek Marczykowski-Górecki Sat, 25 Oct 2014 01:49:58 +0200 qubes-core-agent (2.1.41) jessie; urgency=medium [ Marek Marczykowski-Górecki ] * dispvm: slow down "spinlock" while waiting for save/restore [ Olivier MEDOC ] * archlinux: add notification daemon * archlinux: follow fedora20 qubes agent improvement * archlinux: follow fedora20 qubes agent improvement * archlinux: enable/disable services when corresponding packages got installed [ Marek Marczykowski-Górecki ] * network: use the same gateway IP generation method as backend * Revert "network: use the same gateway IP generation method as backend" -- Marek Marczykowski-Górecki Fri, 15 Aug 2014 17:45:15 +0200 qubes-core-agent (2.1.40) jessie; urgency=medium [ Marek Marczykowski-Górecki ] * Fix compiler warnings. * Enable compiler optimization. * rpm: do not disable abrt-applet autostart * systemd: relax qubes-sysinit dependencies * systemd: reexec systemd to ensure right version is running * rpm: fix notification-daemon setup * archlinux: do not fail mount /usr/lib/modules if already mounted * version 2.1.34 * suspend: fix dbus-send invocation * qubes-rpc: log service stderr to syslog instead of sending to dom0 (#842) * version 2.1.35 [ Wojciech Zygmunt Porczyk ] * misc: do not display file preview by default (#813) [ Vincent Penquerc'h ] * vm-file-editor: remove temporary file on exit [ Marek Marczykowski-Górecki ] * rpm: remove /lib/firmware/updates link * Hide nm-applet icon earlier (#857) * Configure only installed programs * network: setup NM connection when its active in the ProxyVM * version 2.1.36 * Add --dispvm to qvm-run documentation * Fix formating * Do not start nm-applet at all when no NetworkManager running (#857) * version 2.1.37 * rpm: require generic "desktop-notification-daemon" not a specific one * rpm: enable haveged service by default (#673) * Do not start nm-applet at all when no NetworkManager running - update (#857) * rpm: enable/disable services when corresponding packages got installed * dispvm: close all windows after apps prerun (#872) * version 2.1.38 * systemd: do not reexec when not necessary * version 2.1.39 * rpm: mark config files with %config(noreplace) [ Davíð Steinn Geirsson ] * Split install target into install-common and install-rh, and add all target * Fix make clean target * Check for xenstore-read in /usr/sbin as well (default on debian) * Use xenstore.h instead of xs.h when xen >= 4.2 * Explicitly specify /bin/bash for Makefile SHELL, since it's required. * Initial debian packaging [ Marek Marczykowski-Górecki ] * debian: update deps * qrexec: fix loop bounds * gitignore * Fix bashism * gitignore: fix binary packages declaration * debian: add updates repo definition and key * debian: fix qfile-unpacker perms -- Marek Marczykowski-Górecki Mon, 28 Jul 2014 02:38:59 +0200 qubes-core-agent (2.1.33) jessie; urgency=low * Initial Release. -- Davíð Steinn Geirsson Mon, 21 Apr 2014 01:31:55 +0000