Marek Marczykowski-Górecki
aaff61921b
Require new enough qubes-utils package for updated libqrexec-utils
...
Required by 97a3793
"qrexec: implement buffered write to a child stdin"
2015-10-30 15:31:12 +01:00
Patrick Schleizer
0fc6c73068
cleanup /etc/apt/apt.conf.d/00notiy-hook on existing systems
...
00notiy-hook was renamed to 00notify-hook in
'debian: Renamed incorrect filename: 00notiy-hook -> 00notify-hook'
15f1df4947
but the old file was not removed.
(Files in /etc do not automatically get removed on Debian systems when these are removed from the package.)
This is an independent, but supporting fix for:
'Improved upgrade notifications sent to QVMM.'
- https://github.com/marmarek/qubes-core-agent-linux/pull/39
- https://github.com/QubesOS/qubes-issues/issues/1066#issuecomment-150044906
Added debian/qubes-core-agent.maintscript.
(cherry picked from commit f2e6dc9391
)
2015-10-30 15:28:45 +01:00
Marek Marczykowski-Górecki
d0bba59f86
rpm: remove duplicated entry
...
(cherry picked from commit 457578280b
)
2015-10-30 15:28:38 +01:00
Marek Marczykowski-Górecki
c7713810fb
qrexec: implement buffered write to a child stdin
...
Implement one of TODOs left in the code. Without this buffering, it may
happen that qrexec-agent will hang waiting on write(2) to the child
process, while that child will do the same (try to write something to
the qrexec-agent), without reading its stdin. This would end up in a
deadlock.
Fixes QubesOS/qubes-issues#1347
(cherry picked from commit 97a3793345
)
2015-10-30 15:27:27 +01:00
erihe251
68f514ce0a
Update qubes.sudoers
...
(cherry picked from commit de293f12d5
)
2015-10-30 15:27:14 +01:00
erihe251
297dec2c72
Small language fixes
...
(cherry picked from commit 0f410ed2de
)
2015-10-30 15:26:59 +01:00
Patrick Schleizer
62fca99fde
removed trailing spaces
...
(cherry picked from commit 2eb0ed2be1
)
Conflicts:
network/qubes-iptables
2015-10-30 15:23:59 +01:00
Marek Marczykowski-Górecki
41502281ab
network: forward TCP DNS queries
...
Fixes QubesOS/qubes-issues#1325
(cherry picked from commit ce443b2e18
)
2015-10-30 15:22:35 +01:00
Marek Marczykowski-Górecki
f7fa61e0b3
version 3.0.18
2015-10-11 03:13:55 +02:00
Marek Marczykowski-Górecki
e2e19d6851
dom0-updates: fix hostname in error message
...
(cherry picked from commit 801c5c62f1
)
2015-10-11 03:06:29 +02:00
Marek Marczykowski-Górecki
eb243ec8c5
dom0-updates: check "yum check-update" exit code, not only its output
...
QubesOS/qubes-issues#1168
(cherry picked from commit 520178d5dc
)
2015-10-11 03:06:29 +02:00
Marek Marczykowski-Górecki
ec38a0c4bc
dom0-updates: Fix showing package list when --check-only option was used
...
Fixes QubesOS/qubes-issues#1294
(cherry picked from commit 397f6fdc52
)
2015-10-11 03:06:29 +02:00
Marek Marczykowski-Górecki
949b79650f
Add missing R: dconf to hide nm-applet when not used
...
Without dconf, gsettings uses "memory" backend which isn't saved
anywhere and isn't shared across applications. This makes gsettings
pretty useless.
Fixes QubesOS/qubes-issues#1299
(cherry picked from commit afb70cf040
)
2015-10-11 03:06:29 +02:00
Marek Marczykowski-Górecki
8fcc7f7e05
Use 'type' instead of 'which' to prevent unnecessary dependency
...
QubesOS/qubes-issues#1299
(cherry picked from commit 7e321ba63c
)
2015-10-11 03:06:29 +02:00
Marek Marczykowski-Górecki
44fcaf4870
sysvinit: load random seed from dom0 provided data
...
QubesOS/qubes-issues#1311
(cherry picked from commit 13fb6e2fc3
)
2015-10-11 03:06:29 +02:00
Marek Marczykowski-Górecki
e0a5b709c5
systemd: actually enable qubes-random-seed service
...
QubesOS/qubes-issues#1311
(cherry picked from commit 7963fb91c7
)
Conflicts:
rpm_spec/core-vm.spec
vm-systemd/75-qubes-vm.preset
2015-10-11 03:06:26 +02:00
HW42
be9fdeb258
reload qubes-random-seed when restoring DispVM
...
(cherry picked from commit 05292c0ac5
)
2015-10-11 03:05:30 +02:00
HW42
e52716d9b9
qubes-random-seed: feed kernel rng with randomness from dom0
...
(cherry picked from commit 0ffa746678
)
2015-10-11 03:05:30 +02:00
Patrick Schleizer
0fae2e9ebb
minor
...
(cherry picked from commit 9664c97e55
)
2015-10-11 03:05:30 +02:00
Marek Marczykowski-Górecki
4ac04e4c2b
network: fix 'qubes-uplink-eth0' NetworkManager connection ( #1280 )
...
According to the specification[1], the setting name is 'addresses', not
'address'. The later apparently worked on some NetworkManager versions,
but for example not on the one in Debian wheezy. Also fix value
format (IP;netmask;gateway).
[1] htts://developer.gnome.org/NetworkManager/unstable/ref-settings.html
Fixes QubesOS/qubes-issues#1280
(cherry picked from commit 580d21acdc
)
2015-10-11 03:05:30 +02:00
Marek Marczykowski-Górecki
b51aceb949
Adjust progress message on file move operation
...
Fixes QubesOS/qubes-issues#1269
(cherry picked from commit 03f6ddc41a
)
2015-10-11 03:05:30 +02:00
Marek Marczykowski-Górecki
9b05c42577
Enlarge /tmp and /dev/shm
...
Initial size of those tmpfs-mounted directories is calculated as 50% of
RAM at VM startup time. Which happen to be quite small number, like
150M. Having such small /tmp and/or /dev/shm apparently isn't enough for
some applications like Google chrome. So set the size statically at 1GB,
which would be the case for baremetal system with 2GB of RAM.
Fixes QubesOS/qubes-issues#1003
(cherry picked from commit 2a39adfe0f
)
2015-10-11 03:05:29 +02:00
Marek Marczykowski-Górecki
dc7ff69dae
version 3.0.17
2015-09-29 16:45:05 +02:00
Marek Marczykowski-Górecki
b836bc1cfa
rpm: add dbus-python dependency
...
This package is required by lots of stuff in Fedora anyway, but this
doesn't mean that we can have broken dependencies.
(cherry picked from commit 3552bc7e41
)
2015-09-29 16:44:57 +02:00
Patrick Schleizer
567a0a60c8
fix typo
...
(cherry picked from commit cf55fa54c9
)
2015-09-29 16:44:57 +02:00
Patrick Schleizer
b980ccf8e0
added missing dependency xserver-xorg-dev
...
(cherry picked from commit 3f19b581cd
)
2015-09-29 16:44:56 +02:00
Patrick Schleizer
4881ab4112
fixed 'Debian 8 apt.config.d misconfiguration'
...
prevent the Acquire::http::Proxy setting ending up multiple times inside /etc/apt/apt.conf.d/01qubes-proxy
(reported by @Scinawa)
https://github.com/QubesOS/qubes-issues/issues/1186
(cherry picked from commit c13e11d57e
)
2015-09-29 16:44:56 +02:00
Patrick Schleizer
67f26e4e03
added missing dependency python-dbus to 'Depends:'
...
https://github.com/marmarek/qubes-core-agent-linux/blob/master/misc/qubes-desktop-run depends on python-dbus.
(0b7ade11b8/misc/xdg.py (L5)
)
(cherry picked from commit 5078b2030f
)
2015-09-29 16:44:36 +02:00
qubesuser
3b669d0d54
qubes-rpc: fix broken temporary file deletion in qubes.GetImageRGBA
...
(cherry picked from commit 76c0f95c34
)
2015-09-29 16:44:36 +02:00
Patrick Schleizer
ca539a075b
show error msg if qubes.ReceiveUpdates failed
...
(cherry picked from commit fc013bd480
)
2015-09-29 16:44:36 +02:00
Marek Marczykowski-Górecki
e924758c54
version 3.0.16
2015-09-03 02:45:30 +02:00
Marek Marczykowski-Górecki
6d10970590
Merge remote-tracking branch 'origin/pr/19'
2015-09-03 02:30:53 +02:00
Marek Marczykowski-Górecki
a99e184e3d
Fix show-hide-nm-applet.desktop - use OnlyShowIn=X-QUBES
2015-09-03 00:43:54 +02:00
Marek Marczykowski-Górecki
d491ade917
debian: depend on gawk
...
qubes.GetAppmenus uses "nextfile" which is gawk-specific.
Fixes qubesos/qubes-issues#1062
2015-09-02 02:36:35 +02:00
Marek Marczykowski-Górecki
c8ac55b179
Merge branch 'autostart-dropins'
...
Conflicts:
misc/qubes-trigger-desktop-file-install
Fixes qubesos/qubes-issues#1151
2015-09-02 01:16:19 +02:00
Marek Marczykowski-Górecki
3da7d2c315
Merge remote-tracking branch 'qubesos/pr/3'
...
* qubesos/pr/3:
Mount /dev/xvdb with fs type "auto"
2015-09-02 01:14:10 +02:00
Marek Marczykowski-Górecki
f09d176d05
Merge commit '9644d86845d11f67751a099c56320ad269218354'
...
* commit '9644d86845d11f67751a099c56320ad269218354':
sudoers.d: Stops QT from using the MIT-SHM X11 Shared Memory Extension
debian: Move python-xdg to depends section in debian/control
2015-09-02 00:45:42 +02:00
Marek Marczykowski-Górecki
d9a8ab6f84
Merge remote-tracking branch 'origin/pr/20'
...
* origin/pr/20:
added pulseaudio-kde and spice-vdagent to qubes-trigger-desktop-file-install
2015-09-02 00:31:26 +02:00
Marek Marczykowski-Górecki
c09d1d9d61
systemd: fix starting cups
2015-09-01 17:19:59 +02:00
Marek Marczykowski-Górecki
4f26006fa1
debian: fix /dev permissions on upgrade
2015-09-01 17:19:38 +02:00
Marek Marczykowski-Górecki
0b7ade11b8
qubes-desktop-run: don't crash on Debian wheezy (glib < 2.36)
...
Gio.DesktopAppInfo.get_boolean was introduced in glib 2.36. Instead of
crashing simply do not support DBusActivatable there. There is no such
application in default Debian wheezy template anyway.
2015-08-28 02:02:19 +02:00
Marek Marczykowski-Górecki
67357e051f
qubes-session-autostart: do not abort the whole process on invalid file
2015-08-27 22:41:51 +02:00
Marek Marczykowski-Górecki
4703e3fca7
Remove dynamically generated autostart desktop files
...
qubesos/qubes-issues#1151
2015-08-27 22:08:04 +02:00
Marek Marczykowski-Górecki
3d06ce1ee9
Implement dropins for /etc/xdg/autostart ( #1151 )
...
Usage of _static_ files (dropins) to override some of autostart entries
(enable/disable them in appropriate VM types) is much simpler and less
error prone than automatic generators.
Handling code is implemented in qubes-session-autostart, which is called
from qubes-session.
qubesos/qubes-issues#1151
2015-08-27 22:08:00 +02:00
Marek Marczykowski-Górecki
d710970e4d
Move .desktop launching code to python moules so it can be reused
2015-08-27 22:07:59 +02:00
Marek Marczykowski-Górecki
93e090469c
qubes-desktop-run: start the Dbus service (if needed)
...
Much tidier way to solve the issue, provided by @Unman.
qubesos/qubes-issues#1031
2015-08-26 02:08:33 +02:00
Marek Marczykowski-Górecki
0c2306dd0a
Revert "qubes-desktop-run: Activate via DBUS when desktop file contains DBusActivatable"
...
This reverts commit a5ee90b420
.
Lets start the Dbus service the proper way.
2015-08-26 02:00:51 +02:00
Rusty Bird
78dd47ebfb
Mount /dev/xvdb with fs type "auto"
...
Nice for btrfs. (auto is already used on /dev/xvdi.)
2015-08-16 16:51:04 +00:00
Jason Mehring
9644d86845
sudoers.d: Stops QT from using the MIT-SHM X11 Shared Memory Extension
...
Fedora now needs this sudoer rule. Allows sudo to keep the `QT_X11_NO_MITSHM` ENV
variable which prevents MIT-SHM errors for Fedora and Debian when running a QT
application:
`Defaults env_keep += "QT_X11_NO_MITSHM"`
A complementary commit has been made in gui-agent-linux:
Commit: a02e54b71a9ee17f4b10558065a8fc9deaf69984)
Author: Jason Mehring <nrgaway@gmail.com>
Date: Sat Aug 15 20:13:48 2015 -0400
2015-08-16 08:22:19 -04:00
Jason Mehring
07591cce86
debian: Move python-xdg to depends section in debian/control
...
Otherwise it `qubes-desktop-file-install` fails in minimal template
2015-08-15 20:52:38 -04:00