149 lines
3.8 KiB
Plaintext
149 lines
3.8 KiB
Plaintext
Source: qubes-core-agent
|
|
Section: admin
|
|
Priority: extra
|
|
Maintainer: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
|
|
Build-Depends:
|
|
libqrexec-utils-dev,
|
|
libqubes-rpc-filecopy-dev (>= 3.1.3),
|
|
libvchan-xen-dev,
|
|
python,
|
|
python-setuptools,
|
|
debhelper,
|
|
quilt,
|
|
libxen-dev,
|
|
pkg-config,
|
|
dh-systemd (>= 1.5),
|
|
dh-python,
|
|
lsb-release,
|
|
xserver-xorg-dev,
|
|
config-package-dev
|
|
Standards-Version: 3.9.5
|
|
Homepage: https://www.qubes-os.org
|
|
Vcs-Git: https://github.com/QubesOS/qubes-core-agent-linux
|
|
|
|
Package: qubes-core-agent
|
|
Architecture: any
|
|
Depends:
|
|
dmsetup,
|
|
gawk,
|
|
imagemagick,
|
|
init-system-helpers,
|
|
initscripts,
|
|
librsvg2-bin,
|
|
libvchan-xen,
|
|
locales,
|
|
ncurses-term,
|
|
psmisc,
|
|
procps,
|
|
util-linux,
|
|
python2.7,
|
|
python-daemon,
|
|
python-qubesdb,
|
|
python-gi,
|
|
python-xdg,
|
|
python-dbus,
|
|
qubes-utils (>= 3.1.3),
|
|
sudo,
|
|
systemd,
|
|
x11-xserver-utils,
|
|
xdg-user-dirs,
|
|
xdg-utils,
|
|
xen-utils-common,
|
|
xenstore-utils,
|
|
xinit,
|
|
xserver-xorg-core,
|
|
${python:Depends},
|
|
${shlibs:Depends},
|
|
${misc:Depends}
|
|
Recommends:
|
|
cups,
|
|
gnome-terminal,
|
|
gnome-themes-standard,
|
|
haveged,
|
|
libnotify-bin,
|
|
locales-all,
|
|
mate-notification-daemon,
|
|
ntpdate,
|
|
system-config-printer,
|
|
qubes-core-agent-nautilus,
|
|
qubes-core-agent-networking,
|
|
qubes-core-agent-network-manager,
|
|
xsettingsd
|
|
Conflicts: qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
|
|
Description: Qubes core agent
|
|
This package includes various daemons necessary for qubes domU support,
|
|
such as qrexec.
|
|
|
|
Package: qubes-core-agent-nautilus
|
|
Architecture: any
|
|
Depends:
|
|
python-nautilus,
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: Qubes integration for Nautilus
|
|
Nautilus addons for inter-VM file copy/move/open.
|
|
|
|
Package: qubes-core-agent-dom0-updates
|
|
Architecture: any
|
|
Depends:
|
|
fakeroot,
|
|
yum,
|
|
yum-utils
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: Scripts required to handle dom0 updates.
|
|
Scripts required to handle dom0 updates. This will allow to use the VM as
|
|
"Updates VM".
|
|
|
|
Package: qubes-core-agent-networking
|
|
Architecture: any
|
|
Depends:
|
|
qubes-core-agent,
|
|
tinyproxy,
|
|
iptables,
|
|
net-tools,
|
|
ethtool,
|
|
tinyproxy,
|
|
nmap-ncat,
|
|
${python:Depends},
|
|
${misc:Depends}
|
|
Recommends:
|
|
nftables,
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: Networking support for Qubes VM
|
|
This package provides:
|
|
* basic network functionality (setting IP address, DNS, default gateway)
|
|
* proxy service used by TemplateVMs to download updates
|
|
* qubes-firewall service (FirewallVM)
|
|
.
|
|
Note: if you want to use NetworkManager (you do want it in NetVM), install
|
|
also qubes-core-agent-network-manager.
|
|
|
|
Package: qubes-core-agent-network-manager
|
|
Architecture: any
|
|
Depends:
|
|
qubes-core-agent-networking,
|
|
dconf,
|
|
network-manager (>= 0.8.1-1),
|
|
network-manager-gnome,
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: NetworkManager integration for Qubes VM
|
|
Integration of NetworkManager for Qubes VM:
|
|
* make connections config persistent
|
|
* adjust DNS redirections when needed
|
|
* show/hide NetworkManager applet icon
|
|
|
|
Package: qubes-core-agent-passwordless-root
|
|
Architecture: any
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Provides: ${diverted-files}
|
|
Conflicts: ${diverted-files}
|
|
Description: Passwordless root access from normal user
|
|
Configure sudo, PolicyKit and similar tool to not ask for any password when
|
|
switching from user to root. Since all the user data in a VM is accessible
|
|
already from normal user account, there is not much more to guard there. Qubes
|
|
VM is a single user system.
|