core-agent-linux/vm-init.d
Jason Mehring 56b0685aaa whonix: Added protected-files file used to prevent scripts from modifying files that need to be protected
A file is created in /var/lib/qubes/protected-files.  Scripts can grep this file before modifying
        known files to be protected and skip any modifications if the file path is within protected-files.

        Usage Example:
            if ! grep -q "^/etc/hostname$" "${PROTECTED_FILE_LIST}" 2>/dev/null; then

        Also cleaned up maintainer scripts removing unneeded systemd status functions and streamlined
        the enable/disable systemd unit files functions
2015-04-25 02:36:43 +02:00
..
qubes-core whonix: Added protected-files file used to prevent scripts from modifying files that need to be protected 2015-04-25 02:36:43 +02:00
qubes-core-appvm remove 'bashisms' or explicit use bash 2015-02-05 05:42:08 +01:00
qubes-core-netvm remove 'bashisms' or explicit use bash 2015-02-05 05:42:08 +01:00
qubes-core.modules Do not load xen-usbfront automatically 2015-03-21 00:54:19 +01:00
qubes-firewall remove 'bashisms' or explicit use bash 2015-02-05 05:42:08 +01:00
qubes-misc.modules Use systemd mechanism for loading kernel modules (when available) 2014-09-29 21:31:10 +02:00
qubes-netwatcher remove 'bashisms' or explicit use bash 2015-02-05 05:42:08 +01:00
qubes-qrexec-agent remove 'bashisms' or explicit use bash 2015-02-05 05:42:08 +01:00
qubes-updates-proxy remove 'bashisms' or explicit use bash 2015-02-05 05:42:08 +01:00