Marek Marczykowski-Górecki
15451be6f8
version 2.0.29
2015-07-28 00:32:57 +02:00
Marek Marczykowski-Górecki
547854bed6
rpm: force removal os-prober package
...
It can be can be harmful, because it accesses (and mounts) every block
device, including VM controlled /dev/loop*.
2015-07-28 00:32:44 +02:00
Marek Marczykowski-Górecki
b96016101c
version 2.0.28
2015-06-20 22:00:36 +02:00
Marek Marczykowski-Górecki
1c7fcb7de4
appmenus: allow '_' in Exec and other fields
...
(cherry picked from commit 07de8f7515
)
2015-06-20 22:00:36 +02:00
Marek Marczykowski-Górecki
43f2865c41
dom0-update: improve package validation regexp - include DSA case ( #988 )
...
Apparently when package is signed with DSA key, rpm -K output is totally
different. This is the case for bumblebee package on rpmfusion.
Fixes qubesos/qubes-issues#988
(cherry picked from commit a5650d3251
)
2015-06-20 22:00:36 +02:00
Marek Marczykowski-Górecki
3cbe2fa7e7
dom0-update: clear error marker before downloading new packages ( #987 )
...
Otherwise if some package download fails once - further tries will also
report errors.
Fixes qubesos/qubes-issues#987
(cherry picked from commit f2b5cf1cc0
)
2015-06-20 22:00:35 +02:00
Marek Marczykowski-Górecki
690e10ffd4
dom0-update: prevent template package upgrades ( #996 )
...
This would override user changes to the template. Previous method
(Obsoletes: rpm header) doesn't work now, so add explicit exclude list
as yum option
Fixes qubesos/qubes-issues#996
(cherry picked from commit 4cab815317
)
Conflicts:
dom0-updates/qubes-dom0-update
2015-06-20 21:50:53 +02:00
Marek Marczykowski-Górecki
d276a1590c
gitignore
...
(cherry picked from commit ed363452c9
)
2015-05-16 23:17:30 +02:00
Marek Marczykowski-Górecki
d018452cd8
version 2.0.27
2015-02-10 06:47:33 +01:00
Marek Marczykowski-Górecki
49c1fe9004
Add "--" to separate options from (untrusted) non-options arguments
...
This will prevent passing an option instead of command (qvm-run) /
domain name (qrexec-policy). In both cases when VM tries to pass some
option it would fail because missing argument then - VM can not pass
additional arguments, so if one act as an option, one argument will be
missing).
(cherry picked from commit d031126737
)
Conflicts:
qrexec/qrexec-daemon.c
2015-02-10 02:39:06 +01:00
Marek Marczykowski-Górecki
423bd89069
version 2.0.26
2015-01-30 23:38:33 +01:00
Marek Marczykowski-Górecki
4b27e24ac9
appmenus: call kbuildsycoca4 only once after template update ( #886 )
2015-01-26 03:59:22 +01:00
Marek Marczykowski-Górecki
ab708e0b6b
version 2.0.25
2014-11-18 17:24:33 +01:00
Marek Marczykowski-Górecki
8f2a03e672
rpm: fix permissions of /etc/qubes-rpc{,/policy}
...
Group qubes should have write right there.
2014-10-30 06:40:34 +01:00
Marek Marczykowski-Górecki
28dfdddc0e
Minor fixes in messages
2014-10-28 05:28:13 +01:00
Marek Marczykowski-Górecki
be43682df1
version 2.0.24
2014-10-25 01:47:13 +02:00
Marek Marczykowski-Górecki
6cca9a377f
qrexec: add -q option to silence "Waiting for VM's qrexec agent" message
2014-10-24 22:03:46 +02:00
Marek Marczykowski-Górecki
1e8b3ea876
rpm: do not save removed udev script
...
As Qubes dom0 is standalone system, not an addon to Fedora (for some
time...), we do not longer need to save such scripts to handle
package remove.
2014-09-30 23:51:10 +02:00
Marek Marczykowski-Górecki
40178a161e
appmenus: mute output when verbose=False
2014-09-18 07:46:00 +02:00
Marek Marczykowski-Górecki
a0eda3023f
version 2.0.23
2014-09-09 22:29:31 +02:00
Marek Marczykowski-Górecki
4758fc1781
appmenus: create apps.tempicons directory if missing ( #896 )
2014-09-09 02:13:08 +02:00
Joanna Rutkowska
808d63c6b6
version 2.0.22
2014-07-12 14:02:46 +02:00
Joanna Rutkowska
df0db675f2
Merge branch 'master' of http://git.woju.eu/qubes/core-admin-linux
2014-07-12 14:01:58 +02:00
Wojciech Zygmunt Porczyk
0f7730c2e3
appmenus: use new label icons
2014-07-10 16:28:05 +02:00
Joanna Rutkowska
5e101ea389
version 2.0.21
2014-07-06 13:44:54 +02:00
Marek Marczykowski-Górecki
9687180a62
udev: prevent dom0 processes from accessing templates root image
2014-07-04 04:29:31 +02:00
Marek Marczykowski-Górecki
7bfa26bd2f
version 2.0.20
2014-07-01 03:47:12 +02:00
Marek Marczykowski-Górecki
79abec9038
qrexec: fix deadlock in qrexec-client
...
When VM-VM qrexec service is called, two qrexec-clients are connected in
dom0. If both VMs are sending data simultaneously it can happen that
both qrexec-client processes will call write(2) and none of them will be
reading -> deadlock.
Solve it by handling I/O in two separate threads (one for reading from
VM, another for writing), at any time qrexec-client is ready to accept
data from either direction.
2014-07-01 03:24:46 +02:00
Marek Marczykowski-Górecki
6ab53c9456
version 2.0.19
2014-06-30 16:17:23 +02:00
Marek Marczykowski-Górecki
a74b69ce08
dom0-updates: ensure that metadata are available to normal user
2014-06-30 16:16:59 +02:00
Marek Marczykowski-Górecki
a013cb3eca
dom0-updates: call "apper --updates" to go directly to updates tab
2014-06-30 16:16:08 +02:00
Marek Marczykowski-Górecki
8627ef9a80
dom0-updates: use GUI tool appropriate to current DE ( #824 )
2014-06-29 22:02:00 +02:00
Marek Marczykowski-Górecki
d63c27f79a
version 2.0.18
2014-06-18 00:37:05 +02:00
Marek Marczykowski-Górecki
5af0530e8d
udev: prevent VM disks content from being accessed by dom0 processes
...
To not expose dom0 processes like blkid for attacks from VM (e.g. by
placing malicious filesystem header in private.img).
2014-06-11 02:41:20 +02:00
Marek Marczykowski-Górecki
c443264fae
dom0-updates: move GUI notification to qubes-manager ( #824 )
...
It is hard to get user session D-Bus address from outside of session. In
some cases there are even multiple dbus-daemon instances of the same
user...
2014-06-10 01:14:15 +02:00
Marek Marczykowski-Górecki
b8bd6e2d49
Additional options to hide PCI devices from dom0 ( #861 )
2014-05-29 05:12:42 +02:00
Marek Marczykowski-Górecki
9a206a5c4e
version 2.0.17
2014-05-23 02:43:49 +02:00
Wojciech Zygmunt Porczyk
66234f41ee
regexp fixes and validation ( #829 )
2014-05-19 13:36:02 +02:00
Wojciech Zygmunt Porczyk
38b1845e97
Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin-linux
2014-05-19 12:28:10 +02:00
Marek Marczykowski-Górecki
a7c43e6148
dom0-updates: clean local repo when --clean given
2014-05-12 00:30:48 +02:00
Marek Marczykowski-Górecki
15207dadcc
doc: mention yum opts in qubes-dom0-update manual page
2014-05-11 17:49:52 +02:00
Wojciech Zygmunt Porczyk
df7e67784a
qubes-receive-appmenus: filter categories
...
Allow only whitelisted categories, specified in freedesktop.org
"Desktop Menu Specification" 1.1-draft.
http://standards.freedesktop.org/menu-spec/latest/apa.html
2014-05-08 11:40:45 +02:00
Marek Marczykowski-Górecki
c5129a04e0
Merge branch 'master' of http://git.woju.eu/qubes/core-admin-linux
2014-05-07 15:22:07 +02:00
Wojciech Zygmunt Porczyk
c6f24d8ba8
qubes-receive-appmenus: use old icons when retrieval fails ( #836 )
2014-05-07 14:54:59 +02:00
Marek Marczykowski-Górecki
dbd7be5c90
Merge branch 'master' of http://git.woju.eu/qubes/core-admin-linux
2014-05-07 03:18:33 +02:00
Marek Marczykowski-Górecki
c74ac87582
dom0-updates: only notify about updates from cron, do not install them ( #824 )
...
It doesn't work and isn't simple to fix (needs the whole user
environment). So just notify about updates and let the user install them
from Qubes Manager or cmdline.
2014-05-06 04:19:55 +02:00
Wojciech Zygmunt Porczyk
bad449f235
qubes-core-appmenus.py: create/remove appmenus only when attribtute changes
...
This is part of #827 bug.
2014-05-05 22:26:53 +02:00
Marek Marczykowski-Górecki
553e914af5
version 2.0.16
2014-05-05 21:31:01 +02:00
Wojciech Zygmunt Porczyk
a9980d6d34
qubes-core-appmenus.py: create/remove appmenus when re/setting internal
...
This is part of #827 bug.
2014-05-05 16:47:34 +02:00
Marek Marczykowski-Górecki
9de6171a43
qubes-rpc: log (local) service output to syslog, discard stderr from VMs ( #842 )
...
Basically - store the logs where the service is running.
2014-05-05 05:27:08 +02:00