163 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			163 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| Source: qubes-core-agent
 | |
| Section: admin
 | |
| Priority: extra
 | |
| Maintainer: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
 | |
| Build-Depends:
 | |
|     libqrexec-utils-dev,
 | |
|     libqubes-rpc-filecopy-dev (>= 3.1.3),
 | |
|     libvchan-xen-dev,
 | |
|     python,
 | |
|     python-setuptools,
 | |
|     debhelper,
 | |
|     quilt,
 | |
|     libxen-dev,
 | |
|     pkg-config,
 | |
|     dh-systemd (>= 1.5),
 | |
|     dh-python,
 | |
|     lsb-release,
 | |
|     xserver-xorg-dev,
 | |
|     config-package-dev,
 | |
|     pandoc,
 | |
| Standards-Version: 3.9.5
 | |
| Homepage: https://www.qubes-os.org
 | |
| Vcs-Git: https://github.com/QubesOS/qubes-core-agent-linux
 | |
| 
 | |
| Package: qubes-core-agent
 | |
| Architecture: any
 | |
| Depends:
 | |
|     dmsetup,
 | |
|     gawk,
 | |
|     imagemagick,
 | |
|     init-system-helpers,
 | |
|     initscripts,
 | |
|     librsvg2-bin,
 | |
|     locales,
 | |
|     ncurses-term,
 | |
|     psmisc,
 | |
|     procps,
 | |
|     util-linux,
 | |
|     python2.7,
 | |
|     python-daemon,
 | |
|     python-qubesdb,
 | |
|     python-gi,
 | |
|     python-xdg,
 | |
|     python-dbus,
 | |
|     qubes-utils (>= 3.1.3),
 | |
|     qubes-core-agent-qrexec,
 | |
|     systemd,
 | |
|     x11-xserver-utils,
 | |
|     xdg-user-dirs,
 | |
|     xdg-utils,
 | |
|     xen-utils-common,
 | |
|     xenstore-utils,
 | |
|     xinit,
 | |
|     xserver-xorg-core,
 | |
|     ${python:Depends},
 | |
|     ${shlibs:Depends},
 | |
|     ${misc:Depends}
 | |
| Recommends:
 | |
|     cups,
 | |
|     gnome-terminal,
 | |
|     gnome-themes-standard,
 | |
|     haveged,
 | |
|     libnotify-bin,
 | |
|     locales-all,
 | |
|     mate-notification-daemon,
 | |
|     ntpdate,
 | |
|     system-config-printer,
 | |
|     qubes-core-agent-nautilus,
 | |
|     qubes-core-agent-networking,
 | |
|     qubes-core-agent-network-manager,
 | |
|     xsettingsd
 | |
| Conflicts: qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
 | |
| Description: Qubes core agent
 | |
|  This package includes various daemons necessary for qubes domU support,
 | |
|  such as qrexec.
 | |
| 
 | |
| Package: qubes-core-agent-qrexec
 | |
| Architecture: any
 | |
| Depends:
 | |
|     libvchan-xen,
 | |
|     ${shlibs:Depends},
 | |
|     ${misc:Depends}
 | |
| Replaces: qubes-core-agent (<< 4.0.0-1)
 | |
| Breaks: qubes-core-agent (<< 4.0.0-1)
 | |
| Description: Qubes qrexec agent
 | |
|  Agent part of Qubes RPC system. A daemon responsible for starting processes as
 | |
|  requested by dom0 or other VMs, according to dom0-enforced policy.
 | |
| 
 | |
| Package: qubes-core-agent-nautilus
 | |
| Architecture: any
 | |
| Depends:
 | |
|     python-nautilus,
 | |
|     qubes-core-agent-qrexec,
 | |
| Replaces: qubes-core-agent (<< 4.0.0-1)
 | |
| Breaks: qubes-core-agent (<< 4.0.0-1)
 | |
| Description: Qubes integration for Nautilus
 | |
|  Nautilus addons for inter-VM file copy/move/open.
 | |
| 
 | |
| Package: qubes-core-agent-dom0-updates
 | |
| Architecture: any
 | |
| Depends:
 | |
|     fakeroot,
 | |
|     yum,
 | |
|     yum-utils,
 | |
|     qubes-core-agent-qrexec,
 | |
| Replaces: qubes-core-agent (<< 4.0.0-1)
 | |
| Breaks: qubes-core-agent (<< 4.0.0-1)
 | |
| Description: Scripts required to handle dom0 updates.
 | |
|   Scripts required to handle dom0 updates. This will allow to use the VM as
 | |
|   "Updates VM".
 | |
| 
 | |
| Package: qubes-core-agent-networking
 | |
| Architecture: any
 | |
| Depends:
 | |
|     qubes-core-agent,
 | |
|     tinyproxy,
 | |
|     iptables,
 | |
|     net-tools,
 | |
|     ethtool,
 | |
|     socat,
 | |
|     tinyproxy,
 | |
|     ${python:Depends},
 | |
|     ${misc:Depends}
 | |
| Suggests:
 | |
|     nftables,
 | |
| Replaces: qubes-core-agent (<< 4.0.0-1)
 | |
| Breaks: qubes-core-agent (<< 4.0.0-1)
 | |
| Description: Networking support for Qubes VM
 | |
|  This package provides:
 | |
|   * basic network functionality (setting IP address, DNS, default gateway)
 | |
|   * proxy service used by TemplateVMs to download updates
 | |
|   * qubes-firewall service (FirewallVM)
 | |
|  .
 | |
|  Note: if you want to use NetworkManager (you do want it in NetVM), install
 | |
|  also qubes-core-agent-network-manager.
 | |
| 
 | |
| Package: qubes-core-agent-network-manager
 | |
| Architecture: any
 | |
| Depends:
 | |
|     qubes-core-agent-networking,
 | |
|     libglib2.0-bin,
 | |
|     network-manager (>= 0.8.1-1),
 | |
|     network-manager-gnome,
 | |
| Replaces: qubes-core-agent (<< 4.0.0-1)
 | |
| Breaks: qubes-core-agent (<< 4.0.0-1)
 | |
| Description: NetworkManager integration for Qubes VM
 | |
|  Integration of NetworkManager for Qubes VM:
 | |
|   * make connections config persistent
 | |
|   * adjust DNS redirections when needed
 | |
|   * show/hide NetworkManager applet icon
 | |
| 
 | |
| Package: qubes-core-agent-passwordless-root
 | |
| Architecture: any
 | |
| Replaces: qubes-core-agent (<< 4.0.0-1)
 | |
| Breaks: qubes-core-agent (<< 4.0.0-1)
 | |
| Provides: ${diverted-files}
 | |
| Conflicts: ${diverted-files}
 | |
| Description: Passwordless root access from normal user
 | |
|  Configure sudo, PolicyKit and similar tool to not ask for any password when
 | |
|  switching from user to root. Since all the user data in a VM is accessible
 | |
|  already from normal user account, there is not much more to guard there. Qubes
 | |
|  VM is a single user system.
 | 
