core-agent-linux/package-managers
Marek Marczykowski-Górecki 587ac3b3a1
dnf: update for DNF 4+ API
Correctly extract packages from transaction items:
 - old (pre DNF 4): iterate over item.installs()
 - new (DNF 4+): item.pkg

The old DNF is not supported anymore, so do not care about it.
2020-06-27 05:37:55 +02:00
..
apt-conf-00notify-hook
apt-conf-10no-cache
apt-conf-70no-unattended Split items in misc directory by topic 2020-02-04 23:59:09 +00:00
apt-qubes-archive-keyring.gpg
apt-qubes-r4.list.in
dnf-qubes-hooks.conf
dnf-qubes-hooks.py dnf: update for DNF 4+ API 2020-06-27 05:37:55 +02:00
Makefile
qubes-download-dom0-updates.sh dom0-updates: output diagnostics messages to stderr 2020-03-16 02:10:14 +01:00
README.md Add README.md to package-managers 2020-02-05 00:12:23 +00:00
RPM-GPG-KEY-qubes-4-centos
RPM-GPG-KEY-qubes-4-primary Split items in misc directory by topic 2020-02-04 23:59:09 +00:00
RPM-GPG-KEY-qubes-4-unstable
upgrades-installed-check Split items in misc directory by topic 2020-02-04 23:59:09 +00:00
upgrades-status-notify
yum-qubes-hooks.conf
yum-qubes-hooks.py
yum-qubes-r4.repo.in

Package managers

Each Qubes VM should notify Qubes updater in dom0 of new updates available for the particular template or standalone VM. The is the configuration and hooks for various package managers to interact with Qubes updater. Moreover Qubes OS dom0 updates are downloaded by a Qubes VM, rather directly in dom0 which doesn't have networking configured at all.

dom0 updates download

qubes-download-dom0-updates.sh handles downloading packages for dom0 in VM. It needs to be installed in VM which will handle dom0 updates download only.

Apt

The configuration includes:

  1. Hook to notify dom0.
  2. Disabling unattended upgrades (Qubes updater).
  3. List of repos with Qubes packages for VM.