core-agent-linux/debian/control
Marek Marczykowski-Górecki a06b5b4d61
debian: drop explicit dependency on sudo
qubes-core-agent itself do not require sudo to work.

QubesOS/qubes-issues#2572
2017-06-08 22:11:37 +02:00

162 lines
4.2 KiB
Plaintext

Source: qubes-core-agent
Section: admin
Priority: extra
Maintainer: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Build-Depends:
libqrexec-utils-dev,
libqubes-rpc-filecopy-dev (>= 3.1.3),
libvchan-xen-dev,
python,
python-setuptools,
debhelper,
quilt,
libxen-dev,
pkg-config,
dh-systemd (>= 1.5),
dh-python,
lsb-release,
xserver-xorg-dev,
config-package-dev
Standards-Version: 3.9.5
Homepage: https://www.qubes-os.org
Vcs-Git: https://github.com/QubesOS/qubes-core-agent-linux
Package: qubes-core-agent
Architecture: any
Depends:
dmsetup,
gawk,
imagemagick,
init-system-helpers,
initscripts,
librsvg2-bin,
locales,
ncurses-term,
psmisc,
procps,
util-linux,
python2.7,
python-daemon,
python-qubesdb,
python-gi,
python-xdg,
python-dbus,
qubes-utils (>= 3.1.3),
qubes-core-agent-qrexec,
systemd,
x11-xserver-utils,
xdg-user-dirs,
xdg-utils,
xen-utils-common,
xenstore-utils,
xinit,
xserver-xorg-core,
${python:Depends},
${shlibs:Depends},
${misc:Depends}
Recommends:
cups,
gnome-terminal,
gnome-themes-standard,
haveged,
libnotify-bin,
locales-all,
mate-notification-daemon,
ntpdate,
system-config-printer,
qubes-core-agent-nautilus,
qubes-core-agent-networking,
qubes-core-agent-network-manager,
xsettingsd
Conflicts: qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
Description: Qubes core agent
This package includes various daemons necessary for qubes domU support,
such as qrexec.
Package: qubes-core-agent-qrexec
Architecture: any
Depends:
libvchan-xen,
${shlibs:Depends},
${misc:Depends}
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Qubes qrexec agent
Agent part of Qubes RPC system. A daemon responsible for starting processes as
requested by dom0 or other VMs, according to dom0-enforced policy.
Package: qubes-core-agent-nautilus
Architecture: any
Depends:
python-nautilus,
qubes-core-agent-qrexec,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Qubes integration for Nautilus
Nautilus addons for inter-VM file copy/move/open.
Package: qubes-core-agent-dom0-updates
Architecture: any
Depends:
fakeroot,
yum,
yum-utils,
qubes-core-agent-qrexec,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Scripts required to handle dom0 updates.
Scripts required to handle dom0 updates. This will allow to use the VM as
"Updates VM".
Package: qubes-core-agent-networking
Architecture: any
Depends:
qubes-core-agent,
tinyproxy,
iptables,
net-tools,
ethtool,
tinyproxy,
nmap-ncat,
${python:Depends},
${misc:Depends}
Recommends:
nftables,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: Networking support for Qubes VM
This package provides:
* basic network functionality (setting IP address, DNS, default gateway)
* proxy service used by TemplateVMs to download updates
* qubes-firewall service (FirewallVM)
.
Note: if you want to use NetworkManager (you do want it in NetVM), install
also qubes-core-agent-network-manager.
Package: qubes-core-agent-network-manager
Architecture: any
Depends:
qubes-core-agent-networking,
dconf,
network-manager (>= 0.8.1-1),
network-manager-gnome,
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Description: NetworkManager integration for Qubes VM
Integration of NetworkManager for Qubes VM:
* make connections config persistent
* adjust DNS redirections when needed
* show/hide NetworkManager applet icon
Package: qubes-core-agent-passwordless-root
Architecture: any
Replaces: qubes-core-agent (<< 4.0.0-1)
Breaks: qubes-core-agent (<< 4.0.0-1)
Provides: ${diverted-files}
Conflicts: ${diverted-files}
Description: Passwordless root access from normal user
Configure sudo, PolicyKit and similar tool to not ask for any password when
switching from user to root. Since all the user data in a VM is accessible
already from normal user account, there is not much more to guard there. Qubes
VM is a single user system.