Commit Graph

514 Commits

Author SHA1 Message Date
donoban
994bd72363
Make dir dom0-updates if not exists on UpdateVM
https://github.com/QubesOS/qubes-issues/issues/3620
2018-02-23 10:48:06 +01:00
Marek Marczykowski-Górecki
d48f5599d3
Merge remote-tracking branch 'qubesos/pr/37'
* qubesos/pr/37:
  Fix typos in qubes-dom0-update
2018-02-22 21:38:42 +01:00
Marek Marczykowski-Górecki
cfc424667a
version 4.0.11 2018-02-20 01:14:06 +01:00
Marek Marczykowski-Górecki
e8c8515211
rpm: adjust dependencies 2018-02-20 01:13:33 +01:00
Marek Marczykowski-Górecki
c129ce2e4d
qrexec: forbid '$' in target and service name
Those parameters eventually may eventually be passed to a shell script
(at least /usr/lib/qubes/qubes-rpc-multiplexer). While it is possible to
properly escape shell special characters, lets do safer and less fragile
thing: forbid such characters entirely.
In case of target name, qrexec policy keywords are allowed, and after
recent change, those contains '@', so allow this char.
2018-02-19 03:30:26 +01:00
Marek Marczykowski-Górecki
d54d953af1
qrexec: use separate variables for original target type and value
Avoid passing special characters (like '$' or '@') to the service, even
if in environment variable. Use separate variable (and
qubes-rpc-multiplexer argument) to provide type of original target.
There are two:
 - specific VM by name ("name")
 - special name, like $adminvm, $dispvm etc ("keyword")

Then, use separate variables to provide actual value:
 - QREXEC_REQUESTED_TARGET_KEYWORD (if _TYPE == "keyword")
 - QREXEC_REQUESTED_TARGET (if _TYPE == "name")

The later one intentionally is the same as in previous implementation,
to preserve compatibility.
2018-02-19 03:30:04 +01:00
Marek Marczykowski-Górecki
32b0c659a1
qrexec: use exec_qubes_rpc_if_requested() from qubes-utils
This avoids duplicating service call parsing in multiple places. For
dom0 part it was in qrexec-policy tool.
Also, add execl() error handling.
2018-02-16 04:22:48 +01:00
Miguel Jacq
6a792ed056
Fix typos in qubes-dom0-update 2018-02-12 16:48:52 +11:00
Marek Marczykowski-Górecki
bdebfe330a
version 4.0.10 2018-01-19 18:13:44 +01:00
Rusty Bird
629d02948f
Don't let udev parse 'file' driver .img anywhere 2018-01-19 18:04:56 +01:00
Marek Marczykowski-Górecki
da61441bf9
version 4.0.9 2018-01-18 19:49:06 +01:00
Marek Marczykowski-Górecki
21c951201c
Merge remote-tracking branch 'qubesos/pr/36'
* qubesos/pr/36:
  Fix fall through
2018-01-12 17:34:10 +01:00
Marek Marczykowski-Górecki
b07706fd7a
dom0-updates: launch console update in terminal emulator as "GUI"
GUI updaters and Packagekit are confused by networkless dom0 and often
report that:
 - cannot check for updates (because of no network connection)
 - no updates are available, even if they are

The latter happen mostly because PackageKit does not load dnf.conf, so
try to use /etc/yum.repos.d (network repositories) instead of
/etc/yum.real.repos.d (local cache, downloaded by qubes-dom0-update).
Currently PackageKit does not support configuring it, the path is
hardcoded.

Until both of above issues get fixed, prefer console updater.

Fixes QubesOS/qubes-issues#1378
2018-01-12 04:54:07 +01:00
BaN-Co
3a176fa658
Fix fall through
It's necessary to add the break at the end of "case -1" statement else the compiler will treat it as fall through and GCC 7 will throw an error because of -Werror=implicit-fallthrough=.
2018-01-09 15:36:37 +07:00
Marek Marczykowski-Górecki
8689170368
dom0-updates: move PackageKit cache refresh to GUI handling
PackageKit is used only by GUI updaters, refresh its cache only then.
Since PackageKit daemon do not read dnf.conf, it doesn't know  the right
repository location, so try to access network, which results in
timeouts. But at the same time, it invalidate previous cache, which is
what we need.
Do not delay every qubes-dom0-update call by pkcon call.
2018-01-08 01:40:18 +01:00
Marek Marczykowski-Górecki
6c8537fab1
version 4.0.8 2017-12-23 02:53:11 +01:00
Jean-Philippe Ouellet
c69662eb28
Improve qrexec protocol mismatch error dialog
- only have one button, because "yes/no" makes no sense in this context
- inform use to use "-t pv" for xl console, because otherwise it won't
  work for HVM domains.
- use the actual VM name, not "vmname"
2017-12-07 14:42:33 -05:00
Marek Marczykowski-Górecki
be9e759697
Merge remote-tracking branch 'qubesos/pr/33'
* qubesos/pr/33:
  qubes-dom0-update: Adapt template backup failsafe for R4
2017-12-05 23:10:02 +01:00
Marek Marczykowski-Górecki
7902979470
Merge remote-tracking branch 'qubesos/pr/32'
* qubesos/pr/32:
  qubes-dom0-update: Simplify
2017-12-05 23:06:12 +01:00
Jean-Philippe Ouellet
552fd062ea
qubes-dom0-update: Adapt template backup failsafe for R4
Perhaps the UpdateVM template should be temporarily switched to the
backup too. That would make it really failsafe. Currently it requires
manual recovery (by setting template of UpdateVM to the backup).
2017-11-30 08:52:13 -05:00
Jean-Philippe Ouellet
aeb04e24e2
qubes-dom0-update: Simplify
qvm-run auto-starts VMs by default
2017-11-30 08:51:14 -05:00
Jean-Philippe Ouellet
686db90032
qubes-dom0-update: Remove dependency on Xen as vmm 2017-11-30 08:46:28 -05:00
Marek Marczykowski-Górecki
7a644b6d61
version 4.0.7 2017-11-03 22:37:48 +01:00
Marek Marczykowski-Górecki
21df9d55bb
Add qubes-core-dom0 to dnf protected packages set
This will prevent its accidental removal, which would lead to completely
broken system.
2017-11-03 03:27:10 +01:00
Marek Marczykowski-Górecki
b79aa05014
version 4.0.6 2017-10-07 02:35:09 +02:00
Marek Marczykowski-Górecki
68dd013585
Drop dracut workaround for missing LUKS-related modules
It isn't needed for a long time, but at the same time some modules have
changed names, so now it cause errors/warnings.
2017-10-02 21:38:51 +02:00
Marek Marczykowski-Górecki
54d5c7b35c
qrexec: allow ':' in call target specification
':' is used in DispVM special tags, like '$dispvm:something'.

Fixes QubesOS/qubes-issues#3137
2017-10-01 13:19:42 +02:00
Frédéric Pierret
69d230d065
fix fallthrough: add specific error message with respect to 'select' return value 2017-09-26 23:05:09 +02:00
Marek Marczykowski-Górecki
a93a846687
version 4.0.5 2017-09-15 13:43:44 +02:00
Marek Marczykowski-Górecki
6ba03ed65b
Mark /var/lib/qubes to not expose loop devices pointing inside
DM_UDEV_DISABLE_DISK_RULES_FLAG flag sometimes isn't properly
propagated, so just to be sure, add a flag file
/var/lib/qubes/.qubes-exclude-block-devices to exclude that directory.

Fixes 5c84a0b "udev: don't exclude loop devices pointing outside of
/var/lib/qubes"

QubesOS/qubes-issues#3084
2017-09-15 05:15:23 +02:00
Marek Marczykowski-Górecki
1f6546f484
version 4.0.4 2017-09-12 04:25:04 +02:00
Marek Marczykowski-Górecki
5c84a0be92
udev: don't exclude loop devices pointing outside of /var/lib/qubes
Generally list loop devices in qvm-block, but exclude only those
pointing at files in /var/lib/qubes (VM disk images).

Fixes QubesOS/qubes-issues#3084
2017-09-12 04:22:25 +02:00
Andrew (anoa)
02ced3a639
Switch to createrepo_c
Fixes QubesOS/qubes-core-admin-linux#2815
2017-07-31 20:36:20 -07:00
Marek Marczykowski-Górecki
afa673ff46
version 4.0.3 2017-07-18 05:23:29 +02:00
Marek Marczykowski-Górecki
f609afddb6
Merge remote-tracking branch 'qubesos/pr/28' 2017-07-12 12:54:55 +02:00
Marta Marczykowska-Górecka
6d424f91a5
clock synchronization rewrite
clock synchronization mechanism rewritten to use systemd-timesync instead of NtpDate; at the moment, requires:
- modifying /etc/qubes-rpc/policy/qubes.GetDate to redirect GetDate to designated clockvm
- enabling clocksync service in clockvm ( qvm-features clockvm-name service/clocksync true )

Works as specified in issue listed below, except for:
- each VM synces with clockvm after boot and every 6h
- clockvm synces time with the Internet using systemd-timesync
- dom0 synces itself with clockvm every 1h (using cron)

fixes QubesOS/qubes-issues#1230
2017-07-06 23:37:26 +02:00
Marek Marczykowski-Górecki
955762b71e
version 4.0.2 2017-07-06 19:55:44 +02:00
Marek Marczykowski-Górecki
6ffac092ed
udev: exclude LVM volumes for VM images
QubesOS/qubes-issues#2319
2017-07-06 19:41:44 +02:00
Marek Marczykowski-Górecki
e0ce4a8348
version 4.0.1 2017-07-05 14:28:07 +02:00
Marek Marczykowski-Górecki
2fb94bd3e6
qvm-copy-to-vm: use --service option
qvm-run got --service option, so use it. Old method doesn't work
anymore, because qubes.VMShell service is used, instead of qrexec
command directly.
2017-07-05 14:26:11 +02:00
Marek Marczykowski-Górecki
005fed6cdf
Merge remote-tracking branch 'qubesos/pr/27'
* qubesos/pr/27:
  Fix root.img handling bug
2017-06-07 10:09:03 +02:00
Christopher Laprise
6d251d5c58
Fix root.img handling bug
Per issue https://github.com/QubesOS/qubes-issues/issues/2848
2017-06-07 01:35:34 -04:00
Marek Marczykowski-Górecki
51abb471b9
Instruct qubesd to suspend VMs before going to sleep
Move suspend handling into qubesd.
2017-06-06 20:48:12 +02:00
Marek Marczykowski-Górecki
9b75dd1321
systemd: remove qubes-block-cleaner 2017-06-06 01:25:54 +02:00
Marek Marczykowski-Górecki
8719e5d74c
qrexec: fix pending requests cleanup code (cont)
There was a second place with exactly the same bug. See
dad208a "qrexec: fix pending requests cleanup code" for details.

Fixes QubesOS/qubes-issues#2699
2017-05-29 20:51:16 +02:00
Marek Marczykowski-Górecki
e4cf07c107
rpm: add R: qubes-core-admin-client
qubes-dom0-update script use qvm-run tool, which is in
qubes-core-admin-client package (python3-qubesadmin isn't enough).
Also, this should fix package installation order during install:
template needs to be installed after qubes-core-admin-client (for
qvm-template-postprocess tool). But we can't add this dependency there
directly, as it will not work on Qubes < 4.0.
2017-05-29 05:47:36 +02:00
Marek Marczykowski-Górecki
b69f263c10
Merge remote-tracking branch 'qubesos/pr/22'
* qubesos/pr/22:
  Move qvm-xkill to different repo/pkg
2017-05-28 13:13:00 +02:00
Marek Marczykowski-Górecki
e62acf815a
Really disable lesspipe
Only files with .sh suffix are loaded.

Fixes QubesOS/qubes-issues#2808
2017-05-26 05:44:33 +02:00
Marek Marczykowski-Górecki
1447ecad57
dom0-updates: migrate qubes-receive-updates script to use Admin API
Don't import qubes.xml directly.
2017-05-25 02:20:04 +02:00
Marek Marczykowski-Górecki
1057309951
rpm: drop unused python3-PyQt4 dependency
It was used for policy confirmation, but it isn't in this repository
anymore.
2017-05-25 02:20:04 +02:00