Commit Graph

179 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
2695a6ec90
version 2.0.31 2015-10-01 11:51:42 +02:00
Marek Marczykowski-Górecki
af0fdb3cd3
rpm: move os-prober removing code to kernel-install subpackage
Main qubes-core-dom0 should not be installed as part of installer image,
but os-prober dependency pulls that in. So move it into
qubes-core-dom0-kernel-install subpackage. After all this is where grub
config regeneration code is placed, so it is more logical place.

(cherry picked from commit e062c431dd)
2015-10-01 11:51:20 +02:00
Marek Marczykowski-Górecki
1d5b55465f
Prevent installing all the qubes packages in the installer image
Split kernel-install hook into separate package, as only this part is
needed by the installer. This will prevent installing all the Qubes/Xen
staff in the installer, especially udev scripts and xenstored, which
doesn't play well with anaconda.

(cherry picked from commit 5e6d3a273d)

Conflicts:
	rpm_spec/core-dom0-linux.spec
2015-10-01 11:51:17 +02:00
Marek Marczykowski-Górecki
bc3c9fa422
Generate initramfs in kernel-install hook
The default one generates initramfs in location expected by Boot Loader
Specification, which as noted before, isn't useful for Qubes.

(cherry picked from commit fddeb4a23c)
2015-10-01 11:50:52 +02:00
Marek Marczykowski-Górecki
dab1417c24
rpm: provide qubes-core-dom0-linux-kernel-install virtual pkg
This is for kernel package dependencies, since we have the same kernel
packages for both R2 and R3.0

(cherry picked from commit f056e0341e)
2015-10-01 11:50:52 +02:00
Marek Marczykowski-Górecki
ed6ab1e598
Add kernel post-installation script to regenerate grub2 config
Since we now allow using Fedora kernel, add a script to generate proper
bootloader configuration then. Standard Fedora mechanism relies on
Boot Loader Specification support in grub2, which sadly does not support
Xen, so it is useless in Qubes.

(cherry picked from commit 2a14ae9c0b)

Conflicts:
	rpm_spec/core-dom0-linux.spec
2015-10-01 11:50:47 +02:00
Marek Marczykowski-Górecki
eccca4e59e
version 2.0.30 2015-09-29 10:50:41 +02:00
Marek Marczykowski-Górecki
740994b8d9
Disable lesspipe in dom0
It can be dangerous when processing untrusted content (for example VM
logs).
Details:
https://groups.google.com/d/msgid/qubes-users/20150527215812.GA13915%40mail-itl

(cherry picked from commit 8acd40905d)
2015-09-27 23:41:23 +02:00
Marek Marczykowski-Górecki
15451be6f8 version 2.0.29 2015-07-28 00:32:57 +02:00
Marek Marczykowski-Górecki
547854bed6 rpm: force removal os-prober package
It can be can be harmful, because it accesses (and mounts) every block
device, including VM controlled /dev/loop*.
2015-07-28 00:32:44 +02:00
Marek Marczykowski-Górecki
b96016101c version 2.0.28 2015-06-20 22:00:36 +02:00
Marek Marczykowski-Górecki
1c7fcb7de4 appmenus: allow '_' in Exec and other fields
(cherry picked from commit 07de8f7515)
2015-06-20 22:00:36 +02:00
Marek Marczykowski-Górecki
43f2865c41 dom0-update: improve package validation regexp - include DSA case (#988)
Apparently when package is signed with DSA key, rpm -K output is totally
different. This is the case for bumblebee package on rpmfusion.

Fixes qubesos/qubes-issues#988

(cherry picked from commit a5650d3251)
2015-06-20 22:00:36 +02:00
Marek Marczykowski-Górecki
3cbe2fa7e7 dom0-update: clear error marker before downloading new packages (#987)
Otherwise if some package download fails once - further tries will also
report errors.

Fixes qubesos/qubes-issues#987

(cherry picked from commit f2b5cf1cc0)
2015-06-20 22:00:35 +02:00
Marek Marczykowski-Górecki
690e10ffd4 dom0-update: prevent template package upgrades (#996)
This would override user changes to the template. Previous method
(Obsoletes: rpm header) doesn't work now, so add explicit exclude list
as yum option

Fixes qubesos/qubes-issues#996

(cherry picked from commit 4cab815317)

Conflicts:
	dom0-updates/qubes-dom0-update
2015-06-20 21:50:53 +02:00
Marek Marczykowski-Górecki
d276a1590c gitignore
(cherry picked from commit ed363452c9)
2015-05-16 23:17:30 +02:00
Marek Marczykowski-Górecki
d018452cd8 version 2.0.27 2015-02-10 06:47:33 +01:00
Marek Marczykowski-Górecki
49c1fe9004 Add "--" to separate options from (untrusted) non-options arguments
This will prevent passing an option instead of command (qvm-run) /
domain name (qrexec-policy). In both cases when VM tries to pass some
option it would fail because missing argument then - VM can not pass
additional arguments, so if one act as an option, one argument will be
missing).

(cherry picked from commit d031126737)

Conflicts:
	qrexec/qrexec-daemon.c
2015-02-10 02:39:06 +01:00
Marek Marczykowski-Górecki
423bd89069 version 2.0.26 2015-01-30 23:38:33 +01:00
Marek Marczykowski-Górecki
4b27e24ac9 appmenus: call kbuildsycoca4 only once after template update (#886) 2015-01-26 03:59:22 +01:00
Marek Marczykowski-Górecki
ab708e0b6b version 2.0.25 2014-11-18 17:24:33 +01:00
Marek Marczykowski-Górecki
8f2a03e672 rpm: fix permissions of /etc/qubes-rpc{,/policy}
Group qubes should have write right there.
2014-10-30 06:40:34 +01:00
Marek Marczykowski-Górecki
28dfdddc0e Minor fixes in messages 2014-10-28 05:28:13 +01:00
Marek Marczykowski-Górecki
be43682df1 version 2.0.24 2014-10-25 01:47:13 +02:00
Marek Marczykowski-Górecki
6cca9a377f qrexec: add -q option to silence "Waiting for VM's qrexec agent" message 2014-10-24 22:03:46 +02:00
Marek Marczykowski-Górecki
1e8b3ea876 rpm: do not save removed udev script
As Qubes dom0 is standalone system, not an addon to Fedora (for some
time...), we do not longer need to save such scripts to handle
package remove.
2014-09-30 23:51:10 +02:00
Marek Marczykowski-Górecki
40178a161e appmenus: mute output when verbose=False 2014-09-18 07:46:00 +02:00
Marek Marczykowski-Górecki
a0eda3023f version 2.0.23 2014-09-09 22:29:31 +02:00
Marek Marczykowski-Górecki
4758fc1781 appmenus: create apps.tempicons directory if missing (#896) 2014-09-09 02:13:08 +02:00
Joanna Rutkowska
808d63c6b6 version 2.0.22 2014-07-12 14:02:46 +02:00
Joanna Rutkowska
df0db675f2 Merge branch 'master' of http://git.woju.eu/qubes/core-admin-linux 2014-07-12 14:01:58 +02:00
Wojciech Zygmunt Porczyk
0f7730c2e3 appmenus: use new label icons 2014-07-10 16:28:05 +02:00
Joanna Rutkowska
5e101ea389 version 2.0.21 2014-07-06 13:44:54 +02:00
Marek Marczykowski-Górecki
9687180a62 udev: prevent dom0 processes from accessing templates root image 2014-07-04 04:29:31 +02:00
Marek Marczykowski-Górecki
7bfa26bd2f version 2.0.20 2014-07-01 03:47:12 +02:00
Marek Marczykowski-Górecki
79abec9038 qrexec: fix deadlock in qrexec-client
When VM-VM qrexec service is called, two qrexec-clients are connected in
dom0. If both VMs are sending data simultaneously it can happen that
both qrexec-client processes will call write(2) and none of them will be
reading -> deadlock.
Solve it by handling I/O in two separate threads (one for reading from
VM, another for writing), at any time qrexec-client is ready to accept
data from either direction.
2014-07-01 03:24:46 +02:00
Marek Marczykowski-Górecki
6ab53c9456 version 2.0.19 2014-06-30 16:17:23 +02:00
Marek Marczykowski-Górecki
a74b69ce08 dom0-updates: ensure that metadata are available to normal user 2014-06-30 16:16:59 +02:00
Marek Marczykowski-Górecki
a013cb3eca dom0-updates: call "apper --updates" to go directly to updates tab 2014-06-30 16:16:08 +02:00
Marek Marczykowski-Górecki
8627ef9a80 dom0-updates: use GUI tool appropriate to current DE (#824) 2014-06-29 22:02:00 +02:00
Marek Marczykowski-Górecki
d63c27f79a version 2.0.18 2014-06-18 00:37:05 +02:00
Marek Marczykowski-Górecki
5af0530e8d udev: prevent VM disks content from being accessed by dom0 processes
To not expose dom0 processes like blkid for attacks from VM (e.g. by
placing malicious filesystem header in private.img).
2014-06-11 02:41:20 +02:00
Marek Marczykowski-Górecki
c443264fae dom0-updates: move GUI notification to qubes-manager (#824)
It is hard to get user session D-Bus address from outside of session. In
some cases there are even multiple dbus-daemon instances of the same
user...
2014-06-10 01:14:15 +02:00
Marek Marczykowski-Górecki
b8bd6e2d49 Additional options to hide PCI devices from dom0 (#861) 2014-05-29 05:12:42 +02:00
Marek Marczykowski-Górecki
9a206a5c4e version 2.0.17 2014-05-23 02:43:49 +02:00
Wojciech Zygmunt Porczyk
66234f41ee regexp fixes and validation (#829) 2014-05-19 13:36:02 +02:00
Wojciech Zygmunt Porczyk
38b1845e97 Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin-linux 2014-05-19 12:28:10 +02:00
Marek Marczykowski-Górecki
a7c43e6148 dom0-updates: clean local repo when --clean given 2014-05-12 00:30:48 +02:00
Marek Marczykowski-Górecki
15207dadcc doc: mention yum opts in qubes-dom0-update manual page 2014-05-11 17:49:52 +02:00
Wojciech Zygmunt Porczyk
df7e67784a qubes-receive-appmenus: filter categories
Allow only whitelisted categories, specified in freedesktop.org
"Desktop Menu Specification" 1.1-draft.

http://standards.freedesktop.org/menu-spec/latest/apa.html
2014-05-08 11:40:45 +02:00