Marek Marczykowski-Górecki b02dd6a768 dom0-updates: output diagnostics messages to stderr | 4 years ago | |
---|---|---|
.. | ||
Makefile | 4 years ago | |
README.md | 4 years ago | |
RPM-GPG-KEY-qubes-4-centos | 4 years ago | |
RPM-GPG-KEY-qubes-4-primary | 4 years ago | |
RPM-GPG-KEY-qubes-4-unstable | 4 years ago | |
apt-conf-00notify-hook | 4 years ago | |
apt-conf-10no-cache | 4 years ago | |
apt-conf-70no-unattended | 4 years ago | |
apt-qubes-archive-keyring.gpg | 4 years ago | |
apt-qubes-r4.list.in | 4 years ago | |
dnf-qubes-hooks.conf | 4 years ago | |
dnf-qubes-hooks.py | 4 years ago | |
qubes-download-dom0-updates.sh | 4 years ago | |
upgrades-installed-check | 4 years ago | |
upgrades-status-notify | 4 years ago | |
yum-qubes-hooks.conf | 4 years ago | |
yum-qubes-hooks.py | 4 years ago | |
yum-qubes-r4.repo.in | 4 years ago |
Each Qubes VM should notify Qubes updater in dom0 of new updates available for the particular template or standalone VM. The is the configuration and hooks for various package managers to interact with Qubes updater. Moreover Qubes OS dom0 updates are downloaded by a Qubes VM, rather directly in dom0 which doesn't have networking configured at all.
qubes-download-dom0-updates.sh
handles downloading packages for dom0
in VM. It needs to be installed in VM which will handle dom0 updates
download only.
The configuration includes: