4329eab307
Some applications complains if compiled version of dconf database is missing ("dconf-WARNING **: unable to open file '/etc/dconf/db/local': Failed to open file '/etc/dconf/db/local': open() failed: No such file or directory; expect degraded performance"). There is only one entry in that database, but generate its binary version anyway to avoid that warning message. The dconf call is already included in package scripts, now only make sure the utility is really installed. QubesOS/qubes-issues#1951
175 lines
4.5 KiB
Plaintext
175 lines
4.5 KiB
Plaintext
Source: qubes-core-agent
|
|
Section: admin
|
|
Priority: extra
|
|
Maintainer: unman <unman@thirdeyesecurity.org>
|
|
Build-Depends:
|
|
libpam0g-dev,
|
|
libqrexec-utils-dev,
|
|
libqubes-rpc-filecopy-dev (>= 3.1.3),
|
|
libvchan-xen-dev,
|
|
python,
|
|
python-setuptools,
|
|
debhelper,
|
|
quilt,
|
|
libxen-dev,
|
|
pkg-config,
|
|
dh-systemd (>= 1.5),
|
|
dh-python,
|
|
lsb-release,
|
|
xserver-xorg-dev,
|
|
config-package-dev,
|
|
pandoc,
|
|
Standards-Version: 3.9.5
|
|
Homepage: https://www.qubes-os.org
|
|
Vcs-Git: https://github.com/QubesOS/qubes-core-agent-linux
|
|
|
|
Package: qubes-core-agent
|
|
Architecture: any
|
|
Depends:
|
|
dconf-cli,
|
|
dmsetup,
|
|
gawk,
|
|
imagemagick,
|
|
init-system-helpers,
|
|
initscripts,
|
|
librsvg2-bin,
|
|
locales,
|
|
ncurses-term,
|
|
psmisc,
|
|
procps,
|
|
util-linux,
|
|
python2.7,
|
|
python-daemon,
|
|
python-qubesdb,
|
|
python-gi,
|
|
python-xdg,
|
|
python-dbus,
|
|
qubes-utils (>= 3.1.3),
|
|
qubes-core-agent-qrexec,
|
|
systemd,
|
|
x11-xserver-utils,
|
|
xdg-user-dirs,
|
|
xdg-utils,
|
|
xen-utils-common,
|
|
xenstore-utils,
|
|
xinit,
|
|
xserver-xorg-core,
|
|
${python:Depends},
|
|
${shlibs:Depends},
|
|
${misc:Depends}
|
|
Recommends:
|
|
cups,
|
|
gnome-terminal,
|
|
gnome-themes-standard,
|
|
haveged,
|
|
libnotify-bin,
|
|
locales-all,
|
|
mate-notification-daemon,
|
|
ntpdate,
|
|
system-config-printer,
|
|
qubes-core-agent-nautilus,
|
|
qubes-core-agent-networking,
|
|
qubes-core-agent-network-manager,
|
|
xsettingsd
|
|
Conflicts: qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
|
|
Description: Qubes core agent
|
|
This package includes various daemons necessary for qubes domU support,
|
|
such as qrexec.
|
|
|
|
Package: qubes-core-agent-qrexec
|
|
Architecture: any
|
|
Depends:
|
|
libvchan-xen,
|
|
${shlibs:Depends},
|
|
${misc:Depends}
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: Qubes qrexec agent
|
|
Agent part of Qubes RPC system. A daemon responsible for starting processes as
|
|
requested by dom0 or other VMs, according to dom0-enforced policy.
|
|
|
|
Package: qubes-core-agent-nautilus
|
|
Architecture: any
|
|
Depends:
|
|
python-nautilus,
|
|
qubes-core-agent-qrexec,
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: Qubes integration for Nautilus
|
|
Nautilus addons for inter-VM file copy/move/open.
|
|
|
|
Package: qubes-core-agent-thunar
|
|
Architecture: any
|
|
Depends:
|
|
thunar,
|
|
qubes-core-agent-qrexec,
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: Qubes integration for Thunar
|
|
Thunar addons for inter-VM file copy/move/open.
|
|
|
|
Package: qubes-core-agent-dom0-updates
|
|
Architecture: any
|
|
Depends:
|
|
fakeroot,
|
|
yum,
|
|
yum-utils,
|
|
qubes-core-agent-qrexec,
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: Scripts required to handle dom0 updates.
|
|
Scripts required to handle dom0 updates. This will allow to use the VM as
|
|
"Updates VM".
|
|
|
|
Package: qubes-core-agent-networking
|
|
Architecture: any
|
|
Depends:
|
|
qubes-core-agent,
|
|
tinyproxy,
|
|
iptables,
|
|
net-tools,
|
|
ethtool,
|
|
socat,
|
|
tinyproxy,
|
|
${python:Depends},
|
|
${misc:Depends}
|
|
Suggests:
|
|
nftables,
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: Networking support for Qubes VM
|
|
This package provides:
|
|
* basic network functionality (setting IP address, DNS, default gateway)
|
|
* proxy service used by TemplateVMs to download updates
|
|
* qubes-firewall service (FirewallVM)
|
|
.
|
|
Note: if you want to use NetworkManager (you do want it in NetVM), install
|
|
also qubes-core-agent-network-manager.
|
|
|
|
Package: qubes-core-agent-network-manager
|
|
Architecture: any
|
|
Depends:
|
|
qubes-core-agent-networking,
|
|
libglib2.0-bin,
|
|
network-manager (>= 0.8.1-1),
|
|
network-manager-gnome,
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Description: NetworkManager integration for Qubes VM
|
|
Integration of NetworkManager for Qubes VM:
|
|
* make connections config persistent
|
|
* adjust DNS redirections when needed
|
|
* show/hide NetworkManager applet icon
|
|
|
|
Package: qubes-core-agent-passwordless-root
|
|
Architecture: any
|
|
Replaces: qubes-core-agent (<< 4.0.0-1)
|
|
Breaks: qubes-core-agent (<< 4.0.0-1)
|
|
Provides: ${diverted-files}
|
|
Conflicts: ${diverted-files}
|
|
Description: Passwordless root access from normal user
|
|
Configure sudo, PolicyKit and similar tool to not ask for any password when
|
|
switching from user to root. Since all the user data in a VM is accessible
|
|
already from normal user account, there is not much more to guard there. Qubes
|
|
VM is a single user system.
|