control 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161
  1. Source: qubes-core-agent
  2. Section: admin
  3. Priority: extra
  4. Maintainer: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  5. Build-Depends:
  6. libqrexec-utils-dev,
  7. libqubes-rpc-filecopy-dev (>= 3.1.3),
  8. libvchan-xen-dev,
  9. python,
  10. python-setuptools,
  11. debhelper,
  12. quilt,
  13. libxen-dev,
  14. pkg-config,
  15. dh-systemd (>= 1.5),
  16. dh-python,
  17. lsb-release,
  18. xserver-xorg-dev,
  19. config-package-dev
  20. Standards-Version: 3.9.5
  21. Homepage: https://www.qubes-os.org
  22. Vcs-Git: https://github.com/QubesOS/qubes-core-agent-linux
  23. Package: qubes-core-agent
  24. Architecture: any
  25. Depends:
  26. dmsetup,
  27. gawk,
  28. imagemagick,
  29. init-system-helpers,
  30. initscripts,
  31. librsvg2-bin,
  32. locales,
  33. ncurses-term,
  34. psmisc,
  35. procps,
  36. util-linux,
  37. python2.7,
  38. python-daemon,
  39. python-qubesdb,
  40. python-gi,
  41. python-xdg,
  42. python-dbus,
  43. qubes-utils (>= 3.1.3),
  44. qubes-core-agent-qrexec,
  45. systemd,
  46. x11-xserver-utils,
  47. xdg-user-dirs,
  48. xdg-utils,
  49. xen-utils-common,
  50. xenstore-utils,
  51. xinit,
  52. xserver-xorg-core,
  53. ${python:Depends},
  54. ${shlibs:Depends},
  55. ${misc:Depends}
  56. Recommends:
  57. cups,
  58. gnome-terminal,
  59. gnome-themes-standard,
  60. haveged,
  61. libnotify-bin,
  62. locales-all,
  63. mate-notification-daemon,
  64. ntpdate,
  65. system-config-printer,
  66. qubes-core-agent-nautilus,
  67. qubes-core-agent-networking,
  68. qubes-core-agent-network-manager,
  69. xsettingsd
  70. Conflicts: qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
  71. Description: Qubes core agent
  72. This package includes various daemons necessary for qubes domU support,
  73. such as qrexec.
  74. Package: qubes-core-agent-qrexec
  75. Architecture: any
  76. Depends:
  77. libvchan-xen,
  78. ${shlibs:Depends},
  79. ${misc:Depends}
  80. Replaces: qubes-core-agent (<< 4.0.0-1)
  81. Breaks: qubes-core-agent (<< 4.0.0-1)
  82. Description: Qubes qrexec agent
  83. Agent part of Qubes RPC system. A daemon responsible for starting processes as
  84. requested by dom0 or other VMs, according to dom0-enforced policy.
  85. Package: qubes-core-agent-nautilus
  86. Architecture: any
  87. Depends:
  88. python-nautilus,
  89. qubes-core-agent-qrexec,
  90. Replaces: qubes-core-agent (<< 4.0.0-1)
  91. Breaks: qubes-core-agent (<< 4.0.0-1)
  92. Description: Qubes integration for Nautilus
  93. Nautilus addons for inter-VM file copy/move/open.
  94. Package: qubes-core-agent-dom0-updates
  95. Architecture: any
  96. Depends:
  97. fakeroot,
  98. yum,
  99. yum-utils,
  100. qubes-core-agent-qrexec,
  101. Replaces: qubes-core-agent (<< 4.0.0-1)
  102. Breaks: qubes-core-agent (<< 4.0.0-1)
  103. Description: Scripts required to handle dom0 updates.
  104. Scripts required to handle dom0 updates. This will allow to use the VM as
  105. "Updates VM".
  106. Package: qubes-core-agent-networking
  107. Architecture: any
  108. Depends:
  109. qubes-core-agent,
  110. tinyproxy,
  111. iptables,
  112. net-tools,
  113. ethtool,
  114. socat,
  115. tinyproxy,
  116. ${python:Depends},
  117. ${misc:Depends}
  118. Recommends:
  119. nftables,
  120. Replaces: qubes-core-agent (<< 4.0.0-1)
  121. Breaks: qubes-core-agent (<< 4.0.0-1)
  122. Description: Networking support for Qubes VM
  123. This package provides:
  124. * basic network functionality (setting IP address, DNS, default gateway)
  125. * proxy service used by TemplateVMs to download updates
  126. * qubes-firewall service (FirewallVM)
  127. .
  128. Note: if you want to use NetworkManager (you do want it in NetVM), install
  129. also qubes-core-agent-network-manager.
  130. Package: qubes-core-agent-network-manager
  131. Architecture: any
  132. Depends:
  133. qubes-core-agent-networking,
  134. dconf,
  135. network-manager (>= 0.8.1-1),
  136. network-manager-gnome,
  137. Replaces: qubes-core-agent (<< 4.0.0-1)
  138. Breaks: qubes-core-agent (<< 4.0.0-1)
  139. Description: NetworkManager integration for Qubes VM
  140. Integration of NetworkManager for Qubes VM:
  141. * make connections config persistent
  142. * adjust DNS redirections when needed
  143. * show/hide NetworkManager applet icon
  144. Package: qubes-core-agent-passwordless-root
  145. Architecture: any
  146. Replaces: qubes-core-agent (<< 4.0.0-1)
  147. Breaks: qubes-core-agent (<< 4.0.0-1)
  148. Provides: ${diverted-files}
  149. Conflicts: ${diverted-files}
  150. Description: Passwordless root access from normal user
  151. Configure sudo, PolicyKit and similar tool to not ask for any password when
  152. switching from user to root. Since all the user data in a VM is accessible
  153. already from normal user account, there is not much more to guard there. Qubes
  154. VM is a single user system.