qubes-core-agent-linux/vm-init.d
Jason Mehring 24cfe20e1f whonix: Added protected-files file used to prevent scripts from modifying files that need to be protected
A file is created in /var/lib/qubes/protected-files.  Scripts can grep this file before modifying
known files to be protected and skip any modifications if the file path is within protected-files.

Usage Example:
    if ! grep -q "^/etc/hostname$" "${PROTECTED_FILE_LIST}" 2>/dev/null; then

Also cleaned up maintainer scripts removing unneeded systemd status functions and streamlined
the enable/disable systemd unit files functions
2015-04-25 02:29:38 +02:00
..
qubes-core whonix: Added protected-files file used to prevent scripts from modifying files that need to be protected 2015-04-25 02:29:38 +02:00
qubes-core-appvm remove 'bashisms' or explicit use bash 2015-02-05 03:14:41 +01:00
qubes-core-netvm remove 'bashisms' or explicit use bash 2015-02-05 03:14:41 +01:00
qubes-core.modules Do not load xen-usbfront automatically 2015-04-16 03:01:51 +02:00
qubes-firewall remove 'bashisms' or explicit use bash 2015-02-05 03:14:41 +01:00
qubes-misc.modules Use systemd mechanism for loading kernel modules (when available) 2014-09-29 21:31:10 +02:00
qubes-netwatcher remove 'bashisms' or explicit use bash 2015-02-05 03:14:41 +01:00
qubes-qrexec-agent remove 'bashisms' or explicit use bash 2015-02-05 03:14:41 +01:00
qubes-updates-proxy remove 'bashisms' or explicit use bash 2015-02-05 03:14:41 +01:00