core-agent-linux/misc
MB 3339df739d
Fall back to direct execution when dbus is not installed or running
I have been using this with a dbus-less Gentoo template since the original
change, and have tested recently on whonix-gw with dbus enabled and running.

(cherry picked from commit bf69335074b45157734b881cc14d54ea43e7902a)
2017-12-20 20:56:29 +01:00
..
.gitignore
20_org.gnome.desktop.wm.preferences.qubes.gschema.override
20_org.gnome.nautilus.qubes.gschema.override
20_org.gnome.settings-daemon.plugins.updates.qubes.gschema.override
20_org.mate.NotificationDaemon.qubes.gschema.override
20_tcp_timestamps.conf
30_cron.conf use bind-dirs to handle crontab persistence 2016-10-16 01:14:02 +01:00
50_qubes.conf
apt-conf-70no-unattended
block-snapshot
close-window.c dispvm: close only visible windows during DispVM preparation 2015-03-04 01:48:11 +01:00
dnf-qubes-hooks.conf
dnf-qubes-hooks.py
dracut-qubes.conf
fstab
grub.qubes
Makefile
mime-globs
pam.d_su.qubes Fixed /etc/pam.d/su.qubes. (Moved line 'auth sufficient pam_permit.so' up. May not be low '@include' lines.) 2015-09-13 18:36:18 +00:00
polkit-1-qubes-allow-all.pkla
polkit-1-qubes-allow-all.rules vm: move polkit configs from qubes-gui-vm package 2013-02-12 01:38:29 +01:00
profile.d_qt_x11_no_mitshm.sh debian: don't generate regular conf files in postinst 2015-02-05 01:22:19 +01:00
qubes-archive-keyring.gpg
qubes-desktop-run
qubes-download-dom0-updates.sh
qubes-master-key.asc
qubes-r4.list.in
qubes-r4.repo
qubes-serial-login
qubes-session-autostart
qubes-suspend-module-blacklist
qubes-trigger-sync-appmenus.action
qubes-trigger-sync-appmenus.sh
qubes.sudoers
qubesxdg.py
qvm-features-request
resize-rootfs
RPM-GPG-KEY-qubes-4-centos
RPM-GPG-KEY-qubes-4-primary
RPM-GPG-KEY-qubes-4-unstable
serial.conf
session-stop-timeout.conf
sudoers.d_qt_x11_no_mitshm
sudoers.d_umask
thunar.xml
uca_qubes.xml
udev-qubes-misc.rules
upgrades-installed-check
upgrades-status-notify
xenstore-watch.c
xorg-preload-apps.conf
yum-qubes-hooks.conf
yum-qubes-hooks.py