control 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. Source: qubes-core-agent
  2. Section: admin
  3. Priority: extra
  4. Maintainer: unman <unman@thirdeyesecurity.org>
  5. Build-Depends:
  6. libpam0g-dev,
  7. libqubes-rpc-filecopy-dev (>= 3.1.3),
  8. libvchan-xen-dev,
  9. python,
  10. python-setuptools,
  11. debhelper,
  12. quilt,
  13. libxen-dev,
  14. pkg-config,
  15. dh-systemd (>= 1.5),
  16. dh-python,
  17. lsb-release,
  18. xserver-xorg-dev,
  19. config-package-dev,
  20. pandoc,
  21. Standards-Version: 3.9.5
  22. Homepage: https://www.qubes-os.org
  23. Vcs-Git: https://github.com/QubesOS/qubes-core-agent-linux
  24. Package: qubes-core-agent
  25. Architecture: any
  26. Depends:
  27. apt-transport-https,
  28. dconf-cli,
  29. dmsetup,
  30. gawk,
  31. imagemagick,
  32. init-system-helpers,
  33. initscripts,
  34. librsvg2-bin,
  35. locales,
  36. ncurses-term,
  37. psmisc,
  38. procps,
  39. util-linux,
  40. e2fsprogs,
  41. python2.7,
  42. python-daemon,
  43. python-qubesdb,
  44. python-gi,
  45. python-xdg,
  46. python-dbus,
  47. qubes-utils (>= 3.1.3),
  48. qubes-core-qrexec,
  49. qubesdb-vm,
  50. systemd,
  51. xdg-user-dirs,
  52. xdg-utils,
  53. xen-utils-common,
  54. xenstore-utils,
  55. ${python:Depends},
  56. ${shlibs:Depends},
  57. ${misc:Depends}
  58. Recommends:
  59. cups,
  60. gnome-terminal,
  61. gnome-themes-standard,
  62. haveged,
  63. libnotify-bin,
  64. locales-all,
  65. mate-notification-daemon,
  66. ntpdate,
  67. system-config-printer,
  68. qubes-core-agent-nautilus,
  69. qubes-core-agent-networking,
  70. qubes-core-agent-network-manager,
  71. x11-xserver-utils,
  72. xinit,
  73. xserver-xorg-core,
  74. xsettingsd,
  75. xterm
  76. Conflicts: qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
  77. Description: Qubes core agent
  78. This package includes various daemons necessary for qubes domU support,
  79. such as qrexec services.
  80. Package: qubes-core-agent-nautilus
  81. Architecture: any
  82. Depends:
  83. python-nautilus,
  84. qubes-core-qrexec,
  85. Replaces: qubes-core-agent (<< 4.0.0-1)
  86. Breaks: qubes-core-agent (<< 4.0.0-1)
  87. Description: Qubes integration for Nautilus
  88. Nautilus addons for inter-VM file copy/move/open.
  89. Package: qubes-core-agent-thunar
  90. Architecture: any
  91. Depends:
  92. thunar,
  93. qubes-core-qrexec,
  94. Replaces: qubes-core-agent (<< 4.0.0-1)
  95. Breaks: qubes-core-agent (<< 4.0.0-1)
  96. Description: Qubes integration for Thunar
  97. Thunar addons for inter-VM file copy/move/open.
  98. Package: qubes-core-agent-dom0-updates
  99. Architecture: any
  100. Depends:
  101. fakeroot,
  102. yum,
  103. yum-utils,
  104. qubes-core-qrexec,
  105. Replaces: qubes-core-agent (<< 4.0.0-1)
  106. Breaks: qubes-core-agent (<< 4.0.0-1)
  107. Description: Scripts required to handle dom0 updates.
  108. Scripts required to handle dom0 updates. This will allow to use the VM as
  109. "Updates VM".
  110. Package: qubes-core-agent-networking
  111. Architecture: any
  112. Depends:
  113. qubes-core-agent (= ${binary:Version}),
  114. tinyproxy,
  115. iptables,
  116. net-tools,
  117. ethtool,
  118. socat,
  119. tinyproxy,
  120. iproute2,
  121. ${python:Depends},
  122. ${misc:Depends}
  123. Suggests:
  124. nftables,
  125. Replaces: qubes-core-agent (<< 4.0.0-1)
  126. Breaks: qubes-core-agent (<< 4.0.0-1)
  127. Description: Networking support for Qubes VM
  128. This package provides:
  129. * basic network functionality (setting IP address, DNS, default gateway)
  130. * proxy service used by TemplateVMs to download updates
  131. * qubes-firewall service (FirewallVM)
  132. .
  133. Note: if you want to use NetworkManager (you do want it in NetVM), install
  134. also qubes-core-agent-network-manager.
  135. Package: qubes-core-agent-network-manager
  136. Architecture: any
  137. Depends:
  138. qubes-core-agent-networking (= ${binary:Version}),
  139. libglib2.0-bin,
  140. network-manager (>= 0.8.1-1),
  141. network-manager-gnome,
  142. Replaces: qubes-core-agent (<< 4.0.0-1)
  143. Breaks: qubes-core-agent (<< 4.0.0-1)
  144. Description: NetworkManager integration for Qubes VM
  145. Integration of NetworkManager for Qubes VM:
  146. * make connections config persistent
  147. * adjust DNS redirections when needed
  148. * show/hide NetworkManager applet icon
  149. Package: qubes-core-agent-passwordless-root
  150. Architecture: any
  151. Replaces: qubes-core-agent (<< 4.0.0-1)
  152. Breaks: qubes-core-agent (<< 4.0.0-1)
  153. Provides: ${diverted-files}
  154. Conflicts: ${diverted-files}
  155. Description: Passwordless root access from normal user
  156. Configure sudo, PolicyKit and similar tool to not ask for any password when
  157. switching from user to root. Since all the user data in a VM is accessible
  158. already from normal user account, there is not much more to guard there. Qubes
  159. VM is a single user system.