f95f08e15f
* origin/pr/267: fix for ArchLinux: notify dom0 about installed updates The launch of the qubes-update-check service failed on ArchLinux, because the qubes-rpc uses the `service` command which isn't available for this OS. fix archlinux detection of available upgrades note: checkupdates return 2 when no updates are available (source: man page and source code) upgrades-installed-check requires pacman-contrib for checkupdates |
||
---|---|---|
.. | ||
apt-conf-00notify-hook | ||
apt-conf-10no-cache | ||
apt-conf-70no-unattended | ||
apt-qubes-archive-keyring.gpg | ||
apt-qubes-r4.list.in | ||
dnf-qubes-hooks.conf | ||
dnf-qubes-hooks.py | ||
Makefile | ||
qubes-download-dom0-updates.sh | ||
README.md | ||
RPM-GPG-KEY-qubes-4-centos | ||
RPM-GPG-KEY-qubes-4-primary | ||
RPM-GPG-KEY-qubes-4-unstable | ||
upgrades-installed-check | ||
upgrades-status-notify | ||
yum-qubes-hooks.conf | ||
yum-qubes-hooks.py | ||
yum-qubes-r4.repo.in |
Package managers
Each Qubes VM should notify Qubes updater in dom0 of new updates available for the particular template or standalone VM. The is the configuration and hooks for various package managers to interact with Qubes updater. Moreover Qubes OS dom0 updates are downloaded by a Qubes VM, rather directly in dom0 which doesn't have networking configured at all.
dom0 updates download
qubes-download-dom0-updates.sh
handles downloading packages for dom0
in VM. It needs to be installed in VM which will handle dom0 updates
download only.
Apt
The configuration includes:
- Hook to notify dom0.
- Disabling unattended upgrades (Qubes updater).
- List of repos with Qubes packages for VM.