Source: qubes-core-agent
Section: admin
Priority: extra
Maintainer: unman <unman@thirdeyesecurity.org>
Build-Depends:
    libpam0g-dev,
    libqrexec-utils-dev,
    libqubes-rpc-filecopy-dev (>= 3.1.3),
    libvchan-xen-dev,
    python,
    python-setuptools,
    debhelper,
    quilt,
    libxen-dev,
    pkg-config,
    dh-systemd (>= 1.5),
    dh-python,
    lsb-release,
    xserver-xorg-dev,
    config-package-dev,
    pandoc,
Standards-Version: 3.9.5
Homepage: https://www.qubes-os.org
Vcs-Git: https://github.com/QubesOS/qubes-core-agent-linux

Package: qubes-core-agent
Architecture: any
Depends:
    dconf-cli,
    dmsetup,
    gawk,
    imagemagick,
    init-system-helpers,
    initscripts,
    librsvg2-bin,
    locales,
    ncurses-term,
    psmisc,
    procps,
    util-linux,
    python2.7,
    python-daemon,
    python-qubesdb,
    python-gi,
    python-xdg,
    python-dbus,
    qubes-utils (>= 3.1.3),
    qubes-core-agent-qrexec,
    systemd,
    x11-xserver-utils,
    xdg-user-dirs,
    xdg-utils,
    xen-utils-common,
    xenstore-utils,
    xinit,
    xserver-xorg-core,
    ${python:Depends},
    ${shlibs:Depends},
    ${misc:Depends}
Recommends:
    cups,
    gnome-terminal,
    gnome-themes-standard,
    haveged,
    libnotify-bin,
    locales-all,
    mate-notification-daemon,
    ntpdate,
    system-config-printer,
    qubes-core-agent-nautilus,
    qubes-core-agent-networking,
    qubes-core-agent-network-manager,
    xsettingsd
Conflicts: qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
Description: Qubes core agent
 This package includes various daemons necessary for qubes domU support,
 such as qrexec.

Package: qubes-core-agent-qrexec
Architecture: any
Depends:
    libvchan-xen,
    ${shlibs:Depends},
    ${misc:Depends}
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Qubes qrexec agent
 Agent part of Qubes RPC system. A daemon responsible for starting processes as
 requested by dom0 or other VMs, according to dom0-enforced policy.

Package: qubes-core-agent-nautilus
Architecture: any
Depends:
    python-nautilus,
    qubes-core-agent-qrexec,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Qubes integration for Nautilus
 Nautilus addons for inter-VM file copy/move/open.

Package: qubes-core-agent-thunar
Architecture: any
Depends:
    thunar,
    qubes-core-agent-qrexec,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Qubes integration for Thunar
 Thunar addons for inter-VM file copy/move/open.

Package: qubes-core-agent-dom0-updates
Architecture: any
Depends:
    fakeroot,
    yum,
    yum-utils,
    qubes-core-agent-qrexec,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Scripts required to handle dom0 updates.
  Scripts required to handle dom0 updates. This will allow to use the VM as
  "Updates VM".

Package: qubes-core-agent-networking
Architecture: any
Depends:
    qubes-core-agent,
    tinyproxy,
    iptables,
    net-tools,
    ethtool,
    socat,
    tinyproxy,
    ${python:Depends},
    ${misc:Depends}
Suggests:
    nftables,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Networking support for Qubes VM
 This package provides:
  * basic network functionality (setting IP address, DNS, default gateway)
  * proxy service used by TemplateVMs to download updates
  * qubes-firewall service (FirewallVM)
 .
 Note: if you want to use NetworkManager (you do want it in NetVM), install
 also qubes-core-agent-network-manager.

Package: qubes-core-agent-network-manager
Architecture: any
Depends:
    qubes-core-agent-networking,
    libglib2.0-bin,
    network-manager (>= 0.8.1-1),
    network-manager-gnome,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: NetworkManager integration for Qubes VM
 Integration of NetworkManager for Qubes VM:
  * make connections config persistent
  * adjust DNS redirections when needed
  * show/hide NetworkManager applet icon

Package: qubes-core-agent-passwordless-root
Architecture: any
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Provides: ${diverted-files}
Conflicts: ${diverted-files}
Description: Passwordless root access from normal user
 Configure sudo, PolicyKit and similar tool to not ask for any password when
 switching from user to root. Since all the user data in a VM is accessible
 already from normal user account, there is not much more to guard there. Qubes
 VM is a single user system.