Commit Graph

2012 Commits

Author SHA1 Message Date
Rusty Bird
56a8b7da1d
qvm-{copy,move}-to-vm.kde: '-inputbox' -> '--inputbox'
Fixes #4200
2018-08-15 10:41:48 +00:00
Marek Marczykowski-Górecki
80a8c573a2
rpm: fix remaining %if 2018-07-27 14:59:42 +02:00
Marek Marczykowski-Górecki
8b98565a86
version 3.2.32 2018-07-26 23:39:44 +02:00
Marek Marczykowski-Górecki
c4abf9626a
Add build-time assert for filename buffer size
Suggested by @cfcs

(cherry picked from commit b5a9d9bf8e)
2018-07-26 23:08:19 +02:00
Marek Marczykowski-Górecki
b2fe97099b
qvm-open-in-vm: mark file as read-only if opened with --view-only
This will cause most applications to disallow changing the file and also
add some visual indication about the view being read only. This will
avoid making the changes that would be discarded later.

QubesOS/qubes-issues#1118

(cherry picked from commit 42b1355957)
2018-07-26 23:08:09 +02:00
Marek Marczykowski-Górecki
06b6276c1c
qvm-open-in-vm: implement --view-only option
Implement option to disallow (ignore in fact) modifications of file
opened in another VM (including DispVM).
This commit implements actual services part and handling in wrapping scripts.

Fixes QubesOS/qubes-issues#1118

(cherry picked from commit ef557ca460)
2018-07-26 23:06:36 +02:00
Marek Marczykowski-Górecki
84741bf187
travis: add buster 2018-07-26 18:26:24 +02:00
Rusty Bird
d56340ddd8
qfile-agent.c: exit on EPIPE after gui progress write
The qvm-{copy,move}-to-vm.{gnome,kde} cancel buttons didn't actually
cancel, because qfile-agent ignored EPIPE and - via qfile_pack_init() -
SIGPIPE. So it never noticed when the local PROGRESS_TYPE=gui reader had
shut down.

(cherry picked from commit 8da7c7af60)
2018-07-26 18:23:24 +02:00
Marek Marczykowski-Górecki
bdbce98394
qubes-rpc: fix code style - indent with spaces
(cherry picked from commit 5deac1802f)
2018-07-26 18:23:15 +02:00
Frédéric Pierret
b29ee53e13
spec.in: fix %if expressions and remove useless conditions
(cherry picked from commit 6036f1f65b)
2018-07-26 18:16:07 +02:00
Marek Marczykowski-Górecki
7e0895e2a4
version 3.2.31 2018-07-18 18:00:16 +02:00
Peter Gerber
7422d4b27b
setup-rwdev.sh: Only check first 1 GiB for zeros
As described in QubesOS/qubes-issues#3758, a VM may fail to start
if the volume is large. This because the whole volume is read to
ensure it's empty (=all zeros).

This changes limits the check to the first 1 GiB of the private
volume. As additional safety, a scan with blkid is done.

Fixes https://github.com/QubesOS/qubes-issues/issues/3758

(cherry picked from commit 8ff9cbe299)
2018-07-18 17:42:06 +02:00
Marek Marczykowski-Górecki
bfe284e7bf
debian: add Depends: qubesdb-vm
Make sure that qubesdb is configured (including service start) before
executing postinst of qubes-core-agent package, which will communicate
with qubesdb service.

Fixes QubesOS/qubes-issues#3951

(cherry picked from commit a715797589)
2018-07-18 17:40:16 +02:00
Christopher Laprise
90499bbf12
Fixes issue #3939
(cherry picked from commit b8783e65e4)
2018-07-18 17:32:32 +02:00
Marek Marczykowski-Górecki
c9cf96eeef
network: use iptables-restore --wait if available
Avoid bailing out early if multiple instances of iptables-restore are
called simultaneously.

Fixes QubesOS/qubes-issues#3665

(cherry picked from commit 8f6bd245bd)
2018-07-18 17:32:31 +02:00
Marek Marczykowski-Górecki
d482add57d
qrexec: fix handling remote domain death
Periodically (every 10s) check if connection is still alive, otherwise
killing remote domain (as it's the case of DispVM) will hang client
side.

(cherry picked from commit 5f81f0486d)
2018-07-18 17:30:56 +02:00
Marek Marczykowski-Górecki
2ee80b9b83
Convert /usr/local from a symlink to a mount point on upgrade
Fixes QubesOS/qubes-issues#1150

(cherry picked from commit f4c10d47da)
2018-07-18 17:22:09 +02:00
Reynir Björnsson
822cacac9a
bind mount /usr/local
(cherry picked from commit 86413df6d2)
2018-07-18 17:22:07 +02:00
Marek Marczykowski-Górecki
096a18fc96
version 3.2.30 2018-05-07 05:51:45 +02:00
Marek Marczykowski-Górecki
38e5d2e38f
debian: use default archive command
On plain Debian there is no need to modify anything, so use default
archive command. It is deterministic and also use excludes from
.gitignore.
2018-05-07 05:49:34 +02:00
Marek Marczykowski-Górecki
e5e19665f8
Update gitignore and make clean target
Debian build require clean sources (make clean must return the sources
to the state from before build).

(cherry picked from commit c278d56bea)
2018-05-07 05:45:29 +02:00
Marek Marczykowski-Górecki
3d0c1ba2dc
version 3.2.29 2018-05-07 05:32:42 +02:00
Marek Marczykowski-Górecki
e9fc4f5c8c
dom0-updates: do not modify yum.conf
Few reasons for this:
1. new templates use dnf to download packages, so yum.conf is unused
2. dom0 in Qubes 4.0 don't have this file at all (so sed fails here)
3. $OPTS already contains --setopt=reposdir=...

Fixes QubesOS/qubes-issues#2945

(cherry picked from commit 49b70f037c)
2018-05-07 05:24:52 +02:00
Marek Marczykowski-Górecki
8f10a95d14
travis: add Fedora 27, 28, CentOS 7 2018-05-07 04:48:16 +02:00
Marek Marczykowski-Górecki
503a7fdf59
Create /etc/dconf/profile/user dynamically, if not present
The /etc/dconf/profile/user file in some distributions is part of dconf
package, in some not. There are even cases where it changes between
package versions (Fedora 27 don't have it, but Fedora 28 do).
Also, base Debian Stretch don't have it, but Kali Linux based on it do.

To avoid overly complex dependency handling, create the file dynamically
on package installation if it's missing in that particular case. The
file content is canonical:

    user-db:user
    system-db:local

Fixes QubesOS/qubes-issues#3834

(cherry picked from commit 23250f84b2)
2018-05-05 18:03:13 +02:00
Marek Marczykowski-Górecki
b0d342eaa3
centos: exclude only dconf user profile, keep dpi config
(cherry picked from commit c29cc4c270)
2018-05-05 17:54:52 +02:00
Frédéric Pierret
3c7c258141
centos: fix conflict with dconf
(cherry picked from commit 39cb5888f8)
2018-05-05 17:54:31 +02:00
Frédéric Pierret
b65339b932
Fix GCC8 warnings
(cherry picked from commit c43c4df7b9)
2018-05-05 17:25:44 +02:00
Frédéric Pierret
0f43e62b06
Use %{python3_pkgversion} instead of duplicating python3 2018-04-21 12:24:37 +02:00
Frédéric Pierret
2ea04b7e49
Add missing python-setuptools dependency 2018-04-21 12:19:56 +02:00
Marek Marczykowski-Górecki
14c642b879
version 3.2.28 2018-03-30 23:20:46 +02:00
Marek Marczykowski-Górecki
00dbfebd47
qrexec: fix arguments handling
Don't parse options for local command as qrexec-client-vm's own options.

Fixes QubesOS/qubes-issues#3762

(cherry picked from commit 0ef6297bfc)
2018-03-30 23:20:10 +02:00
Marek Marczykowski-Górecki
fbfbceed5a
version 3.2.27 2018-03-22 01:03:39 +01:00
Simon Gaiser
431eb2dbbb
qrexec-fork-server: Always initialize addrlen argument of accept()
With the old code the addrlen argument were uninitialized on the first
call resulting in errors depending on the compiler behavior.

(cherry picked from commit f4c402e7c7)
2018-03-22 00:18:36 +01:00
Marek Marczykowski-Górecki
97de92eb57
qrexec: add qrexec-client-vm --buffer-size option
Add an option for custom vchan buffer size, to override default 64k (for
each direction). This is especially useful when the other side of
connection is MirageOS based, because of limited memory and default
grant table size (128 entries).

(cherry picked from commit 4a09023451)
2018-03-22 00:18:31 +01:00
Marek Marczykowski-Górecki
3bf52377a6
network: reload DNS only on "up" event from NetworkManager
NetworkManager reports a bunch of events, reloading DNS at each of them
doesn't make sense and is harmful - systemd have ratelimit on service
restart.

Fixes QubesOS/qubes-issues#3135

(cherry picked from commit 0639a4b932)
2018-03-22 00:12:37 +01:00
Rusty Bird
ac3c8a76b4
bind-dirs.sh: don't fail on empty configuration directory
nullglob must be active before a glob is used on a potentially empty
directory. Call shopt immediately after the shebang line.

Fixes QubesOS/qubes-issues#3552

(cherry picked from commit 744cab8639)
2018-03-22 00:12:18 +01:00
Marek Marczykowski-Górecki
f301bed804
debian: use dh_install --fail-missing
Avoid problems with missing .install entries in the future.

QubesOS/qubes-issues#3728
QubesOS/qubes-issues#3726
2018-03-21 16:40:52 +01:00
Marek Marczykowski-Górecki
80f2624209
debian: add missing autostart dropin to debian/qubes-core-agent.install 2018-03-21 16:39:56 +01:00
Marek Marczykowski-Górecki
9b6abb9786
debian: make haveged.service patch less intrusive...
...but installed on all Debian versions. This is mostly required by
vebose file list in debian/qubes-core-agent.install. But also make it
use new options when upstream will set them.

QubesOS/qubes-issues#2161

(cherry picked from commit 34fa6e7ced)
2018-03-21 16:30:07 +01:00
Marek Marczykowski-Górecki
0ba36c7349
debian: add missing dconf related files to debian/qubes-core-agent.install
This fixes ab80284 Disable automatic scaling in GNOME/GTK applications

Fixes QubesOS/qubes-issues#3726
2018-03-21 16:23:22 +01:00
Marek Marczykowski-Górecki
2d10773126
debian: list KDE5 actions in qubes-core-agent.install
This fixes 5957893 Install KDE actions for KDE5
2018-03-21 16:20:16 +01:00
unman
d2b82b6178
Add missing services in Ubuntu templates. 2018-03-19 17:18:16 +00:00
Marek Marczykowski-Górecki
9ee0d015df
version 3.2.26 2018-03-13 21:55:14 +01:00
Marek Marczykowski-Górecki
aad30a3ac6
debian: add back missing directories to package 2018-03-13 21:36:17 +01:00
Marek Marczykowski-Górecki
e8d4a1c43b
debian: don't call dconf if it isn't installed
The dconf package isn't required by qubes-core-agent - the package ships
a configuration for it, useful if user have it installed for other
reasons. Don't try to rebuild dconf database if dconf isn't installed -
avoid misleading error message.

Fixes QubesOS/qubes-issues#3492

(cherry picked from commit 24c875030e)
2018-03-13 21:14:44 +01:00
Ilpo Järvinen
857632e894
Fix qubes-dom0-update regression by restoring dom0-updates dir
This dir was present in 3.2.22 but then got removed from the
package. Missing that dir causes a problem for qubes-dom0-update
that expects to find that dir existing.

Fixes: QubesOS/qubes-issues#3620
2018-02-23 23:33:20 +02:00
Marek Marczykowski-Górecki
bdecd8ccc0
Remove 80-qubes.conf from .install file too
The file is removed by "Stop Debian templates from forwarding by
default" commit.
2018-02-22 21:16:05 +01:00
Marek Marczykowski-Górecki
e55baf7a6b
Merge remote-tracking branch 'qubesos/pr/88' into release3.2
* qubesos/pr/88:
  Stop Debian templates from forwarding by default.
2018-02-22 20:13:24 +01:00
Marek Marczykowski-Górecki
99826220ca
Merge remote-tracking branch 'qubesos/pr/86' into release3.2
* qubesos/pr/86:
  Configure for build of artful templates, and remove zesty.
2018-02-22 20:12:02 +01:00