core-agent-linux/misc
Marek Marczykowski-Górecki 07c442f534
dom0-updates: use dnf when available
Since yum-deprecated is slowly removed from Fedora (in Fedora 23 is not
installed by default), we're forced to migrate to dnf. The main problem
with dnf here is lack of --downloaddir option
(https://bugzilla.redhat.com/show_bug.cgi?id=1279001). As nobody is
going to implement it, simply extract downloaded packages from cache
directory (thanks to provided config file, it is always /var/cache/yum).

This basically replaces "dom0-updates: use yum-deprecated instead of dnf
in all calls" with a set of workarounds for dnf missing parts.

Related to QubesOS/qubes-issues#1574
2016-06-01 05:10:18 +02:00
..
.gitignore
20_tcp_timestamps.conf
50_qubes.conf
block-snapshot removed trailing spaces 2015-10-15 04:34:55 +02:00
close-window.c
dispvm-dotfiles.tbz
dispvm-prerun.sh
dnf-qubes-hooks.conf Implement dnf hooks for post-update actions 2015-11-11 02:36:57 +01:00
dnf-qubes-hooks.py dnf: drop shebang, it isn't standalone script 2015-12-21 13:12:51 +01:00
dracut-qubes.conf dracut: disable hostonly mode 2015-11-10 16:36:00 +01:00
fstab
Makefile
mime-globs vm-file-editor: add override for mimeinfo *.png entry (#753) 2013-11-14 22:21:17 +01:00
org.gnome.nautilus.gschema.override
org.gnome.settings-daemon.plugins.updates.gschema.override
org.mate.NotificationDaemon.gschema.override fedora: Use 'slider' org.mate.NotificationDaemon theme 2015-08-07 09:20:44 -04:00
pam.d_su.qubes Fixed /etc/pam.d/su.qubes. (Moved line 'auth sufficient pam_permit.so' up. May not be low '@include' lines.) 2015-09-13 18:36:18 +00:00
polkit-1-qubes-allow-all.pkla vm: move polkit configs from qubes-gui-vm package 2013-02-12 01:38:29 +01:00
polkit-1-qubes-allow-all.rules
profile.d_qt_x11_no_mitshm.sh debian: don't generate regular conf files in postinst 2015-02-05 01:22:19 +01:00
qubes-archive-keyring.gpg debian: add updates repo definition and key 2014-07-28 02:27:56 +02:00
qubes-desktop-run
qubes-download-dom0-updates.sh dom0-updates: use dnf when available 2016-06-01 05:10:18 +02:00
qubes-r3.list.in
qubes-r3.repo
qubes-serial-login
qubes-session-autostart qubes-session-autostart: do not abort the whole process on invalid file 2015-08-27 22:41:51 +02:00
qubes-suspend-module-blacklist
qubes-trigger-sync-appmenus.action
qubes-trigger-sync-appmenus.sh Merge branch 'debian' 2015-01-30 00:30:24 +01:00
qubes.sudoers Update qubes.sudoers 2015-10-19 22:34:34 +02:00
RPM-GPG-KEY-qubes-3-primary Update repos and keys for Qubes R3 2014-11-20 17:01:10 +01:00
RPM-GPG-KEY-qubes-3-unstable
serial.conf
session-stop-timeout.conf
sudoers.d_qt_x11_no_mitshm
sudoers.d_umask
udev-qubes-misc.rules
upgrades-installed-check Explicitly fail upgrades-installed-check on other distributions 2015-11-12 00:36:43 +01:00
upgrades-status-notify Improved upgrade notifications sent to QVMM. 2015-11-11 15:45:00 +00:00
vusb-ctl.py dom0+vm/qvm-usb: intermediate 2012-10-21 14:59:38 +02:00
xdg.py
xenstore-watch.c
xl-qvm-usb-attach.py
xl-qvm-usb-detach.py
xorg-preload-apps.conf
yum-qubes-hooks.conf
yum-qubes-hooks.py removed trailing spaces 2015-10-15 04:34:55 +02:00