Commit Graph

1736 Commits

Author SHA1 Message Date
Olivier MEDOC
ef0155b15e
archlinux: fix update-proxy-configs to use pacman.d drop-ins
(cherry picked from commit 7cea09711a)
2016-11-19 00:21:38 +01:00
Olivier MEDOC
c439fe3934
archlinux: ensure repositories are the last pacman.d files included
(cherry picked from commit a346de7e46)
2016-11-19 00:21:38 +01:00
Olivier MEDOC
66f103bbf7
archlinux: Setup default package repository
(cherry picked from commit d449d75162)
2016-11-19 00:21:38 +01:00
Olivier MEDOC
70190e2490
archlinux: switch to usage of pacman.d drop-ins
(cherry picked from commit b6a6d4e4e0)
2016-11-19 00:21:00 +01:00
Olivier MEDOC
0a74cf593b
archlinux: remove unnecessary glib-compile-scheme
This is now automatically handled through pacman hooks

(cherry picked from commit 245c6d1716)
2016-11-19 00:20:56 +01:00
Olivier MEDOC
b042596702
archlinux: provide automatic qubes-trigger-sync-appmenus through pacman hooks
(cherry picked from commit c82b82d7b4)
2016-11-19 00:20:52 +01:00
Olivier MEDOC
81a10ecad7
archlinux: update installer script in prevision of pacman.d drop-ins
(cherry picked from commit 051d806f0a)
2016-11-19 00:20:47 +01:00
Rusty Bird
c82f1466e2
Enable xendriverdomain.service in 75-qubes-vm.preset
(cherry picked from commit 0cc4803a9d)
2016-11-19 00:20:20 +01:00
Patrick Schleizer
30a6785cd2
add comment
link to feature request 'implement /etc/PackageKit/conf.d'
(cherry picked from commit 80e68e90d9)
2016-11-19 00:20:09 +01:00
Patrick Schleizer
4fa41e3203
add comment
link to feature request 'implement /etc/dnf.conf.d drop-in configuration folder'
(cherry picked from commit 62d5b96355)
2016-11-19 00:20:02 +01:00
Rusty Bird
cd4e851d72
Remove 'if true' wrapper from 06a0d30d50
(cherry picked from commit ae1a334a1d)
2016-11-19 00:19:51 +01:00
Rusty Bird
a4b2fc11f4
*Do* block until good random is available again
(cherry picked from commit cb55dfa6ae)
2016-11-19 00:19:40 +01:00
Rusty Bird
ead3aad5c7
dvm, then xendriverdomain, then qrexec-agent
Fixes QubesOS/qubes-issues#2126
Fixes QubesOS/qubes-issues#1990

(cherry picked from commit fbf4c93730)
2016-11-19 00:19:33 +01:00
Rusty Bird
319aca1277
Order network management units after network-pre.target
Network management software should order itself after network-pre.target
(man 7 systemd.special) so that other units can order themselves before
the *beginning* of network initialization. (qubes-misc-post too because
it calls setup-ip.)

Relevant for QubesOS/qubes-issues#2108

(cherry picked from commit ca03e093f7)
2016-11-19 00:18:41 +01:00
Marek Marczykowski-Górecki
193eb55330
version 3.1.18 2016-07-28 00:17:22 +02:00
Marek Marczykowski-Górecki
a4b53f557a
qvm-open-in-vm: fix wrapping URL in HTML file
The first line of HTML wasn't written to the file.

Fixes QubesOS/qubes-issues#2205
2016-07-28 00:15:39 +02:00
Marek Marczykowski-Górecki
3bff27460e
upgrade: package for simplify upgrade from R3.1 to R3.2 2016-06-26 10:48:00 +02:00
Marek Marczykowski-Górecki
5518828c59
version 3.1.17 2016-06-25 15:48:13 +02:00
Patrick Schleizer
cc000332b5
Do not start tor@default service in TemplateVM.
Not doing that already for the tor service.

Since the actual tor service was renamed to tor@default by upstream.

(cherry picked from commit 191b2a4cd9)
2016-06-21 04:59:51 +02:00
Marek Marczykowski-Górecki
73abc86ea8
debian: add missing pkg-config build depends
(cherry picked from commit 762189a0ae)
2016-06-21 04:59:38 +02:00
Marek Marczykowski-Górecki
96c909bbd2
Prefer 'dnf' over 'yum' for template update
QubesOS/qubes-issues#1282

(cherry picked from commit 520894e623)
2016-06-21 04:58:57 +02:00
unman
56b98cfe74
Fall back to gnome utilities if kdialog not present
(cherry picked from commit 8471605e6d)
2016-06-21 04:58:29 +02:00
Patrick Schleizer
999f6a0dcd
fix indent
(cherry picked from commit 3db93cdc87)
2016-06-21 04:58:14 +02:00
Marek Marczykowski-Górecki
8b89bff635
qvm-open-in-vm: escape URL when wrapping it in HTML
Thanks @v6ak for the report and solution.

Fixes QubesOS/qubes-issues#1462

(cherry picked from commit ff2678d2f5)
2016-06-21 04:57:52 +02:00
Marek Marczykowski-Górecki
5c1ba0bc84
systemd: order units checking for qubes-service after qubes-sysinit
Files in /var/run/qubes-service are created by qubes-sysinit.service. So
defer that condition check after that service start.

Thanks @adrelanos for the report.

Fixes QubesOS/qubes-issues#1985

(cherry picked from commit 5e08e2bc1d)
2016-06-21 04:57:34 +02:00
Patrick Schleizer
d4eb750da5
do not start the Tor service inside Qubes TemplateVMs
Private data inside /var/lib/tor should not be shared.
Tor should not be run inside TemplateVMs.

https://github.com/QubesOS/qubes-issues/issues/1625#issuecomment-172369781
(cherry picked from commit aee3f5ed12)
2016-06-21 04:57:27 +02:00
Patrick Schleizer
904c30d57e
fixed sh syntax error
https://forums.whonix.org/t/qvm-run-fails-in-whonix-vms

Thanks to entr0py for the bug report!
(cherry picked from commit 69780ef762)
2016-06-21 04:55:20 +02:00
Marek Marczykowski-Górecki
514a108ef4
Remove obsolete policy files
Qrexec policy is really stored in core-admin repo.

(cherry picked from commit 4d015432ce)
2016-06-21 04:55:05 +02:00
Olivier MEDOC
3eb1d4e7f2
archlinux: fix remaining loginctl privilege issues with invalid pam.d configuration
(cherry picked from commit ccb9a5b992)
2016-06-21 04:54:53 +02:00
Marek Marczykowski-Górecki
af8181ee48
version 3.1.16 2016-03-29 17:27:21 +02:00
Marek Marczykowski-Górecki
a1ce500aae
qubes-rpc: fix SVG icon scaling
rsvg-convert doesn't scale the image. Do it with convert, only when
really needed. Don't upscale the icon after converting to raster
version.

Fixes QubesOS/qubes-issues#1884

(cherry picked from commit 7b5f2b77d1)
2016-03-29 17:26:54 +02:00
Marek Marczykowski-Górecki
d90e2b0cd7
network: run setup-ip only on xen frontend interfaces
Fixes QubesOS/qubes-issues#1882

(cherry picked from commit 00698173ed)
2016-03-29 14:43:36 +02:00
Rusty Bird
7f12d7a659
Remove exec in last line of qvm-copy-to-vm
(cherry picked from commit 428d8f09bf)
2016-03-29 14:43:36 +02:00
Patrick Schleizer
4875303030
minor indent
(cherry picked from commit 5a1ea4f5e5)
2016-03-29 14:43:36 +02:00
Patrick Schleizer
8e9149e9b6
use 'true' rather than ':' for consistency
(cherry picked from commit 77d51a69ea)
2016-03-29 14:43:35 +02:00
Marek Marczykowski-Górecki
15a55e8072
version 3.1.15 2016-03-15 23:54:12 +01:00
Marek Marczykowski-Górecki
7979e402f0
qubes.SuspendPreAll and qubes.SuspendPostAll services
Those services are called just before/after host suspend.

Thanks @adrelanos for help.
Fixes QubesOS/qubes-issues#1663

(cherry picked from commit 7301a898a1)
2016-03-15 23:54:02 +01:00
Andrew
d6e6c394b7
Properly handle case of empty domain name.
(cherry picked from commit bc73cf1fe3)
2016-03-15 23:54:01 +01:00
Andrew
4eff6a42e9
Use proper quoting around variables.
(cherry picked from commit 561f588d1d)
2016-03-15 23:54:01 +01:00
Andrew
1cbe42c52b
Move usage information printing to separate function, and print usage to stderr; also added some spacing.
(cherry picked from commit 17d274ef48)
2016-03-15 23:54:01 +01:00
Andrew
b648c47c69
Use proper space-expanded tabs, as per the coding guidelines.
(cherry picked from commit 63f3392ff5)
2016-03-15 23:54:01 +01:00
Patrick Schleizer
e8e15e0f96
disable systemd-timesyncd
fixes https://github.com/QubesOS/qubes-issues/issues/1754
(cherry picked from commit 83d0ae6df4)
2016-03-15 23:54:00 +01:00
Rusty Bird
9314855f78
Use && in qvm-move-to-vm
&& is safer in case qvm-*copy*-to-vm is ever changed to call 'set +e'.

(cherry picked from commit c730340039)
2016-03-15 23:54:00 +01:00
Rusty Bird
4b75f2560c
qvm-move-to-vm: Use '--' before file arguments
(cherry picked from commit 160b05756b)
2016-03-15 23:54:00 +01:00
Rusty Bird
b708a508ed
qvm-move-to-vm: Remove duplicated code
(cherry picked from commit 3f600d03fa)
2016-03-15 23:54:00 +01:00
Marek Marczykowski-Górecki
8f1ec4ba1a
version 3.1.14 2016-03-07 13:47:01 +01:00
Marek Marczykowski-Górecki
fb9b3b62c0
network: use qubes-primary-dns QubesDB entry if present
For a long time the DNS address was the same as default gateway. This is
still the case in R3.x, but using `qubes-gateway` configuration
parameter for it is misleading. It should be up to dom0 to provide DNS
address (whether the value is the same as gateway or not).

Fixes QubesOS/qubes-issues#1817
2016-03-07 13:37:45 +01:00
Marek Marczykowski-Górecki
d181cf5cff
version 3.1.13 2016-02-08 05:07:39 +01:00
Marek Marczykowski-Górecki
a8d609704a
Merge remote-tracking branch 'origin/pr/61'
* origin/pr/61:
  update-proxy: use curl instead of wget in archlinux in order to limit additional dependencies
  archlinux: properly add qubes markers in pacman.conf
  archlinux: add Qubes Markers in pacman.conf so that changes done by qubes scripts are not inserted at the end of pacman.conf
  implement update proxy support for archlinux
  archlinux: add gcc and make as make dependencies
  update qubes.InstallUpdateGUI to support archlinux
2016-02-02 23:29:28 +01:00
Marek Marczykowski-Górecki
dca5265958
qubes-open: switch from mimeopen to xdg-open
xdg-open is more robust in choosing default application for particular
file type: it supports fallback if the preferred application isn't
working, and most importantly it support system-wide defaults
(/usr/share/applications/defaults.list,
 /usr/share/applications/mimeapps.list), so no "random" application is
chosen.

By default xdg-open tries to use environment-specific tool, like
gvfs-open - which isn't good for us, because many such tools do not wait
for editor/viewer termination. That would mean that DisposableVM would
be destroyed just after opening the file.
To avoid such effect, we set DE=generic.

Fixes QubesOS/qubes-issues#1621
2016-02-02 03:28:34 +01:00