control 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162
  1. Source: qubes-core-agent
  2. Section: admin
  3. Priority: extra
  4. Maintainer: unman <unman@thirdeyesecurity.org>
  5. Build-Depends:
  6. libqrexec-utils-dev,
  7. libqubes-rpc-filecopy-dev (>= 3.1.3),
  8. libvchan-xen-dev,
  9. python,
  10. python-setuptools,
  11. debhelper,
  12. quilt,
  13. libxen-dev,
  14. pkg-config,
  15. dh-systemd (>= 1.5),
  16. dh-python,
  17. lsb-release,
  18. xserver-xorg-dev,
  19. config-package-dev,
  20. pandoc,
  21. Standards-Version: 3.9.5
  22. Homepage: https://www.qubes-os.org
  23. Vcs-Git: https://github.com/QubesOS/qubes-core-agent-linux
  24. Package: qubes-core-agent
  25. Architecture: any
  26. Depends:
  27. dmsetup,
  28. gawk,
  29. imagemagick,
  30. init-system-helpers,
  31. initscripts,
  32. librsvg2-bin,
  33. locales,
  34. ncurses-term,
  35. psmisc,
  36. procps,
  37. util-linux,
  38. python2.7,
  39. python-daemon,
  40. python-qubesdb,
  41. python-gi,
  42. python-xdg,
  43. python-dbus,
  44. qubes-utils (>= 3.1.3),
  45. qubes-core-agent-qrexec,
  46. systemd,
  47. x11-xserver-utils,
  48. xdg-user-dirs,
  49. xdg-utils,
  50. xen-utils-common,
  51. xenstore-utils,
  52. xinit,
  53. xserver-xorg-core,
  54. ${python:Depends},
  55. ${shlibs:Depends},
  56. ${misc:Depends}
  57. Recommends:
  58. cups,
  59. gnome-terminal,
  60. gnome-themes-standard,
  61. haveged,
  62. libnotify-bin,
  63. locales-all,
  64. mate-notification-daemon,
  65. ntpdate,
  66. system-config-printer,
  67. qubes-core-agent-nautilus,
  68. qubes-core-agent-networking,
  69. qubes-core-agent-network-manager,
  70. xsettingsd
  71. Conflicts: qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
  72. Description: Qubes core agent
  73. This package includes various daemons necessary for qubes domU support,
  74. such as qrexec.
  75. Package: qubes-core-agent-qrexec
  76. Architecture: any
  77. Depends:
  78. libvchan-xen,
  79. ${shlibs:Depends},
  80. ${misc:Depends}
  81. Replaces: qubes-core-agent (<< 4.0.0-1)
  82. Breaks: qubes-core-agent (<< 4.0.0-1)
  83. Description: Qubes qrexec agent
  84. Agent part of Qubes RPC system. A daemon responsible for starting processes as
  85. requested by dom0 or other VMs, according to dom0-enforced policy.
  86. Package: qubes-core-agent-nautilus
  87. Architecture: any
  88. Depends:
  89. python-nautilus,
  90. qubes-core-agent-qrexec,
  91. Replaces: qubes-core-agent (<< 4.0.0-1)
  92. Breaks: qubes-core-agent (<< 4.0.0-1)
  93. Description: Qubes integration for Nautilus
  94. Nautilus addons for inter-VM file copy/move/open.
  95. Package: qubes-core-agent-dom0-updates
  96. Architecture: any
  97. Depends:
  98. fakeroot,
  99. yum,
  100. yum-utils,
  101. qubes-core-agent-qrexec,
  102. Replaces: qubes-core-agent (<< 4.0.0-1)
  103. Breaks: qubes-core-agent (<< 4.0.0-1)
  104. Description: Scripts required to handle dom0 updates.
  105. Scripts required to handle dom0 updates. This will allow to use the VM as
  106. "Updates VM".
  107. Package: qubes-core-agent-networking
  108. Architecture: any
  109. Depends:
  110. qubes-core-agent,
  111. tinyproxy,
  112. iptables,
  113. net-tools,
  114. ethtool,
  115. socat,
  116. tinyproxy,
  117. ${python:Depends},
  118. ${misc:Depends}
  119. Suggests:
  120. nftables,
  121. Replaces: qubes-core-agent (<< 4.0.0-1)
  122. Breaks: qubes-core-agent (<< 4.0.0-1)
  123. Description: Networking support for Qubes VM
  124. This package provides:
  125. * basic network functionality (setting IP address, DNS, default gateway)
  126. * proxy service used by TemplateVMs to download updates
  127. * qubes-firewall service (FirewallVM)
  128. .
  129. Note: if you want to use NetworkManager (you do want it in NetVM), install
  130. also qubes-core-agent-network-manager.
  131. Package: qubes-core-agent-network-manager
  132. Architecture: any
  133. Depends:
  134. qubes-core-agent-networking,
  135. libglib2.0-bin,
  136. network-manager (>= 0.8.1-1),
  137. network-manager-gnome,
  138. Replaces: qubes-core-agent (<< 4.0.0-1)
  139. Breaks: qubes-core-agent (<< 4.0.0-1)
  140. Description: NetworkManager integration for Qubes VM
  141. Integration of NetworkManager for Qubes VM:
  142. * make connections config persistent
  143. * adjust DNS redirections when needed
  144. * show/hide NetworkManager applet icon
  145. Package: qubes-core-agent-passwordless-root
  146. Architecture: any
  147. Replaces: qubes-core-agent (<< 4.0.0-1)
  148. Breaks: qubes-core-agent (<< 4.0.0-1)
  149. Provides: ${diverted-files}
  150. Conflicts: ${diverted-files}
  151. Description: Passwordless root access from normal user
  152. Configure sudo, PolicyKit and similar tool to not ask for any password when
  153. switching from user to root. Since all the user data in a VM is accessible
  154. already from normal user account, there is not much more to guard there. Qubes
  155. VM is a single user system.