Commit Graph

1718 Commits

Author SHA1 Message Date
Patrick Schleizer
cc000332b5
Do not start tor@default service in TemplateVM.
Not doing that already for the tor service.

Since the actual tor service was renamed to tor@default by upstream.

(cherry picked from commit 191b2a4cd9)
2016-06-21 04:59:51 +02:00
Marek Marczykowski-Górecki
73abc86ea8
debian: add missing pkg-config build depends
(cherry picked from commit 762189a0ae)
2016-06-21 04:59:38 +02:00
Marek Marczykowski-Górecki
96c909bbd2
Prefer 'dnf' over 'yum' for template update
QubesOS/qubes-issues#1282

(cherry picked from commit 520894e623)
2016-06-21 04:58:57 +02:00
unman
56b98cfe74
Fall back to gnome utilities if kdialog not present
(cherry picked from commit 8471605e6d)
2016-06-21 04:58:29 +02:00
Patrick Schleizer
999f6a0dcd
fix indent
(cherry picked from commit 3db93cdc87)
2016-06-21 04:58:14 +02:00
Marek Marczykowski-Górecki
8b89bff635
qvm-open-in-vm: escape URL when wrapping it in HTML
Thanks @v6ak for the report and solution.

Fixes QubesOS/qubes-issues#1462

(cherry picked from commit ff2678d2f5)
2016-06-21 04:57:52 +02:00
Marek Marczykowski-Górecki
5c1ba0bc84
systemd: order units checking for qubes-service after qubes-sysinit
Files in /var/run/qubes-service are created by qubes-sysinit.service. So
defer that condition check after that service start.

Thanks @adrelanos for the report.

Fixes QubesOS/qubes-issues#1985

(cherry picked from commit 5e08e2bc1d)
2016-06-21 04:57:34 +02:00
Patrick Schleizer
d4eb750da5
do not start the Tor service inside Qubes TemplateVMs
Private data inside /var/lib/tor should not be shared.
Tor should not be run inside TemplateVMs.

https://github.com/QubesOS/qubes-issues/issues/1625#issuecomment-172369781
(cherry picked from commit aee3f5ed12)
2016-06-21 04:57:27 +02:00
Patrick Schleizer
904c30d57e
fixed sh syntax error
https://forums.whonix.org/t/qvm-run-fails-in-whonix-vms

Thanks to entr0py for the bug report!
(cherry picked from commit 69780ef762)
2016-06-21 04:55:20 +02:00
Marek Marczykowski-Górecki
514a108ef4
Remove obsolete policy files
Qrexec policy is really stored in core-admin repo.

(cherry picked from commit 4d015432ce)
2016-06-21 04:55:05 +02:00
Olivier MEDOC
3eb1d4e7f2
archlinux: fix remaining loginctl privilege issues with invalid pam.d configuration
(cherry picked from commit ccb9a5b992)
2016-06-21 04:54:53 +02:00
Marek Marczykowski-Górecki
af8181ee48
version 3.1.16 2016-03-29 17:27:21 +02:00
Marek Marczykowski-Górecki
a1ce500aae
qubes-rpc: fix SVG icon scaling
rsvg-convert doesn't scale the image. Do it with convert, only when
really needed. Don't upscale the icon after converting to raster
version.

Fixes QubesOS/qubes-issues#1884

(cherry picked from commit 7b5f2b77d1)
2016-03-29 17:26:54 +02:00
Marek Marczykowski-Górecki
d90e2b0cd7
network: run setup-ip only on xen frontend interfaces
Fixes QubesOS/qubes-issues#1882

(cherry picked from commit 00698173ed)
2016-03-29 14:43:36 +02:00
Rusty Bird
7f12d7a659
Remove exec in last line of qvm-copy-to-vm
(cherry picked from commit 428d8f09bf)
2016-03-29 14:43:36 +02:00
Patrick Schleizer
4875303030
minor indent
(cherry picked from commit 5a1ea4f5e5)
2016-03-29 14:43:36 +02:00
Patrick Schleizer
8e9149e9b6
use 'true' rather than ':' for consistency
(cherry picked from commit 77d51a69ea)
2016-03-29 14:43:35 +02:00
Marek Marczykowski-Górecki
15a55e8072
version 3.1.15 2016-03-15 23:54:12 +01:00
Marek Marczykowski-Górecki
7979e402f0
qubes.SuspendPreAll and qubes.SuspendPostAll services
Those services are called just before/after host suspend.

Thanks @adrelanos for help.
Fixes QubesOS/qubes-issues#1663

(cherry picked from commit 7301a898a1)
2016-03-15 23:54:02 +01:00
Andrew
d6e6c394b7
Properly handle case of empty domain name.
(cherry picked from commit bc73cf1fe3)
2016-03-15 23:54:01 +01:00
Andrew
4eff6a42e9
Use proper quoting around variables.
(cherry picked from commit 561f588d1d)
2016-03-15 23:54:01 +01:00
Andrew
1cbe42c52b
Move usage information printing to separate function, and print usage to stderr; also added some spacing.
(cherry picked from commit 17d274ef48)
2016-03-15 23:54:01 +01:00
Andrew
b648c47c69
Use proper space-expanded tabs, as per the coding guidelines.
(cherry picked from commit 63f3392ff5)
2016-03-15 23:54:01 +01:00
Patrick Schleizer
e8e15e0f96
disable systemd-timesyncd
fixes https://github.com/QubesOS/qubes-issues/issues/1754
(cherry picked from commit 83d0ae6df4)
2016-03-15 23:54:00 +01:00
Rusty Bird
9314855f78
Use && in qvm-move-to-vm
&& is safer in case qvm-*copy*-to-vm is ever changed to call 'set +e'.

(cherry picked from commit c730340039)
2016-03-15 23:54:00 +01:00
Rusty Bird
4b75f2560c
qvm-move-to-vm: Use '--' before file arguments
(cherry picked from commit 160b05756b)
2016-03-15 23:54:00 +01:00
Rusty Bird
b708a508ed
qvm-move-to-vm: Remove duplicated code
(cherry picked from commit 3f600d03fa)
2016-03-15 23:54:00 +01:00
Marek Marczykowski-Górecki
8f1ec4ba1a
version 3.1.14 2016-03-07 13:47:01 +01:00
Marek Marczykowski-Górecki
fb9b3b62c0
network: use qubes-primary-dns QubesDB entry if present
For a long time the DNS address was the same as default gateway. This is
still the case in R3.x, but using `qubes-gateway` configuration
parameter for it is misleading. It should be up to dom0 to provide DNS
address (whether the value is the same as gateway or not).

Fixes QubesOS/qubes-issues#1817
2016-03-07 13:37:45 +01:00
Marek Marczykowski-Górecki
d181cf5cff
version 3.1.13 2016-02-08 05:07:39 +01:00
Marek Marczykowski-Górecki
a8d609704a
Merge remote-tracking branch 'origin/pr/61'
* origin/pr/61:
  update-proxy: use curl instead of wget in archlinux in order to limit additional dependencies
  archlinux: properly add qubes markers in pacman.conf
  archlinux: add Qubes Markers in pacman.conf so that changes done by qubes scripts are not inserted at the end of pacman.conf
  implement update proxy support for archlinux
  archlinux: add gcc and make as make dependencies
  update qubes.InstallUpdateGUI to support archlinux
2016-02-02 23:29:28 +01:00
Marek Marczykowski-Górecki
dca5265958
qubes-open: switch from mimeopen to xdg-open
xdg-open is more robust in choosing default application for particular
file type: it supports fallback if the preferred application isn't
working, and most importantly it support system-wide defaults
(/usr/share/applications/defaults.list,
 /usr/share/applications/mimeapps.list), so no "random" application is
chosen.

By default xdg-open tries to use environment-specific tool, like
gvfs-open - which isn't good for us, because many such tools do not wait
for editor/viewer termination. That would mean that DisposableVM would
be destroyed just after opening the file.
To avoid such effect, we set DE=generic.

Fixes QubesOS/qubes-issues#1621
2016-02-02 03:28:34 +01:00
Marek Marczykowski-Górecki
0211ea5d1d
Move opening file viewer/editor into separate shell script
No functional change.

This will make it easier to switch the tool (without recompiling
vm-file-editor), or even use differrent tools depending on some
conditions.

QubesOS/qubes-issues#1621
2016-02-01 12:17:15 +01:00
Olivier MEDOC
57e5026963 update-proxy: use curl instead of wget in archlinux in order to limit additional dependencies 2016-01-21 18:23:48 +01:00
Olivier MEDOC
eb105540c5 archlinux: properly add qubes markers in pacman.conf 2016-01-21 18:21:44 +01:00
Olivier MEDOC
1bbcf126ad archlinux: add Qubes Markers in pacman.conf so that changes done by qubes scripts are not inserted at the end of pacman.conf 2016-01-21 07:59:35 +01:00
Marek Marczykowski-Górecki
858ee225e5
Merge remote-tracking branch 'qubesos/pr/8'
* qubesos/pr/8:
  Proposed solution for issue #1657

Fixes QubesOS/qubes-issues#1657
2016-01-20 02:37:27 +01:00
adrianx64
d3966b0f6c Proposed solution for issue #1657
qvm-sync-appmenus fails when a shortcut have spaces in the file name #1657
2016-01-18 23:02:30 -06:00
Olivier MEDOC
9556931808 implement update proxy support for archlinux 2016-01-16 12:11:06 +01:00
Olivier MEDOC
857598cbfc archlinux: add gcc and make as make dependencies 2016-01-16 11:54:04 +01:00
Olivier MEDOC
b06c29c6dc update qubes.InstallUpdateGUI to support archlinux 2016-01-16 11:52:49 +01:00
Marek Marczykowski-Górecki
fb470fe86f
sysinit: Accept also old xenbus kernel interface
qubes-sysinit.sh waits for xenbus initialization by watching its
interface file presence. In linux before 3.10 there is no
/dev/xen/xenbus, which is the case in Debian 7 (3.2 kernel). The problem
applies only to the VMs with PVGrub enabled, because otherwise VM would
use dom0 privided kernel, which is much newer.

Fixes QubesOS/qubes-issues#1609
2016-01-13 05:05:00 +01:00
Marek Marczykowski-Górecki
5570c899b8
version 3.1.12 2016-01-11 21:59:35 +01:00
Marek Marczykowski-Górecki
cb5c457fba
Do not try to signal NetworkManager before suspend if it isn't running
Sending dbus calls to a service which isn't running _and is blocked to
not be started_ would result in timeout, which would delay the whole
system suspend.

Fixes QubesOS/qubes-issues#1419
2016-01-11 19:40:32 +01:00
Marek Marczykowski-Górecki
d4c238c45e
Unload USB controllers drivers in USB VM before going to sleep
Many USB controllers doesn't play nice with suspend when attached to PV
domain, so unload those drivers by default. This is just a configuration
file, so user is free to change this setting if his/shes particular
controller doesn't have such problem.

Fixes QubesOS/qubes-issues#1565
2016-01-11 19:34:10 +01:00
Marek Marczykowski-Górecki
b36146961f
version 3.1.11 2016-01-07 05:52:36 +01:00
Marek Marczykowski-Górecki
0e062ff31e
Fix time sync service
It is expected to not output anything on stdout. Especially remote end
may be already terminated, so writing there would result in EPIPE.

Fixes QubesOS/qubes-issues#1592
2016-01-07 05:06:39 +01:00
Marek Marczykowski-Górecki
bd68fb973b
Merge remote-tracking branch 'origin/pr/59'
* origin/pr/59:
  archlinux: Added python{2,3} as dependency. Solved python22 bug.
2016-01-06 02:29:21 +01:00
Marek Marczykowski-Górecki
c4ff490844 dom0-updates: add a message explaining yum deprecated warning
Thanks @axon-qubes for the idea.

Fixes QubesOS/qubes-issues#1574
2016-01-04 02:13:21 +01:00
Marek Marczykowski-Górecki
89d5f8990f
version 3.1.10 2015-12-31 02:58:29 +01:00