Commit Graph

262 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
2d8e7f378e
pm-utils: call qubes.SuspendPreAll/qubes.SuspendPostAll services
Host suspend notification may be useful not only to driver domains. For
example Whonix needs to resync time after suspend.

Thanks @adrelanos for help.

Fixes QubesOS/qubes-issues#1663

(cherry picked from commit e0c875a367)
2016-05-01 21:36:22 +02:00
Marek Marczykowski-Górecki
978d87858a
dom0-update: remove cached metadata when --clean is used
Fixes QubesOS/qubes-issues#1748

(cherry picked from commit 6c7443223b)
2016-05-01 21:35:28 +02:00
Marek Marczykowski-Górecki
35a7d5ef53
pm-utils: do not leave background tasks - will be killed by systemd
qvm-sync-clock running in background is killed as soon as
qubes-suspend.service is terminated.
Additionally restore --verbose option, which was the case (implicitly)
in previous qvm-run based code.

Fixes QubesOS/qubes-issues#1795

(cherry picked from commit b19ba4dc2d)
2016-05-01 21:34:59 +02:00
Marek Marczykowski-Górecki
ab5e1182c5
Use qubes.SetDateTime instead of direct call in post-suspend time sync
Fixes QubesOS/qubes-issues#1728

(cherry picked from commit 8c0643092b)
2016-05-01 21:29:16 +02:00
Marek Marczykowski-Górecki
af1a352343
version 3.0.19 2016-02-29 14:37:38 +01:00
Marek Marczykowski-Górecki
d5ccd02fa0
dom0-update: do not output scary messagge about missing repomd.xml
... when no updates are available.

Fixes QubesOS/qubes-issues#1685

(cherry picked from commit 2198986d5c)
2016-02-26 15:00:12 +01:00
Marek Marczykowski-Górecki
85b848393d
version 3.0.18 2016-01-15 12:39:47 +01:00
Marek Marczykowski-Górecki
8563d1aa7d
Fix typo in "d9d48e8 qrexec: use tray notification when..."
Fixes QubesOS/qubes-issues#1446

Thanks HW42 for the report.

(cherry picked from commit fa8ebeb42d)
2016-01-14 05:35:01 +01:00
Marek Marczykowski-Górecki
fdd7daf436
qrexec: use tray notification when VM needs to be started
For both successful start and the failed one

Fixes QubesOS/qubes-issues#1446

(cherry picked from commit d9d48e8948)
2016-01-14 05:35:01 +01:00
Marek Marczykowski-Górecki
961616cb8e
dracut: include all USB controllers drivers
dracut in Fedora 20 doesn't know about *-pci modules (which were split
of *-hcd). So add them manually, in all flavors (ehci, ohci, xhci).

Fixes QubesOS/qubes-issues#1517

(cherry picked from commit f66be6c943)
2016-01-14 05:35:01 +01:00
Marek Marczykowski-Górecki
cdc1c719d4
dom0-updates: remove "updates pending" flag also when no actual updates were found
This allows to clear the flag when for some reason it wasn't cleared
immediately after installing updates.

Fixes QubesOS/qubes-issues#1511

(cherry picked from commit 6921400a7a)
2016-01-14 05:35:00 +01:00
Marek Marczykowski-Górecki
137ed7d331
dom0-updates: wait for apper to finish, then remove "updates pending" flag
Unfortunate side effect (to be solved at Qubes Manager side): it will
block Qubes Manager until all updates are installed (not only updater
launched).

Fixes QubesOS/qubes-issues#1511

(cherry picked from commit cb6a52a652)
2016-01-14 05:35:00 +01:00
Marek Marczykowski-Górecki
0376f2f940
dom0-updates: ensure proper permissions on "updates pending" flag
QubesOS/qubes-issues#1511

(cherry picked from commit 4a556dcab1)
2016-01-14 05:35:00 +01:00
Marek Marczykowski-Górecki
cbd33cd5c6
dom0-updates: remove unused code from cron job
(cherry picked from commit d9a2a66073)
2016-01-14 05:35:00 +01:00
Marek Marczykowski-Górecki
d2f5e0a97f
version 3.0.17 2015-10-30 15:39:34 +01:00
Marek Marczykowski-Górecki
7286eee2ef
Require new enough qubes-utils package for updated libqrexec-utils
Required by 0c288aa "qrexec: implement buffered write to child stdin to
prevent deadlock"

(cherry picked from commit 520e250966)
2015-10-30 15:39:18 +01:00
Marek Marczykowski-Górecki
819204bc73
qrexec: implement buffered write to child stdin to prevent deadlock
Otherwise if the child process isn't reading its stdin at that time, it
would deadlock the whole qrexec connection (for example preventing
reading the data from the child, which may be a cause of that deadlock).

QubesOS/qubes-issues#1347

(cherry picked from commit 0c288aa355)
2015-10-30 15:38:44 +01:00
Marek Marczykowski-Górecki
95b10d1843
version 3.0.16 2015-10-11 02:59:05 +02:00
Marek Marczykowski-Górecki
b20e40b6cf
qrexec: fallback to kdialog if zenity is not installed
Fixes QubesOS/qubes-issues#1277

(cherry picked from commit c8ce468c7f)
2015-10-11 02:58:59 +02:00
Marek Marczykowski-Górecki
dac1b7702f
qrexec: fix handling autostarting RPC target VM
Do not reimplement manual VM state checking in qrexec-policy.
`qubes.xml` is loaded anyway, so just use QubesVM object to check if
domain is running.

Fixes QubesOS/qubes-issues#1283

(cherry picked from commit 63e74a01d3)
2015-10-11 02:58:59 +02:00
Marek Marczykowski-Górecki
71342f4bd2 version 3.0.15 2015-09-05 00:31:10 +02:00
Marek Marczykowski-Górecki
55f9ca5996 Merge remote-tracking branch 'origin/pr/3'
* origin/pr/3:
  filter out tar time wrap warnings using grep
2015-09-04 15:24:27 +02:00
Patrick Schleizer
7d0b2479f5 filter out tar time wrap warnings using grep
https://phabricator.whonix.org/T401#6634
2015-09-04 00:54:50 +00:00
Marek Marczykowski-Górecki
0d69e8fe3e doc: add some more details to qubes-dom0-update --action 2015-09-04 02:11:16 +02:00
Marek Marczykowski-Górecki
5f030b0033 Merge remote-tracking branch 'qubesos/pr/2' 2015-09-04 02:10:19 +02:00
Marek Marczykowski-Górecki
4e1f6b5bd5 core: use vm.absolute_path to parse paths in qubes.xml
This makes easier to handle some corner cases.

qubesos/qubes-issues#1124
Reported by @doncohen, thanks @wyory for providing more details.
2015-09-04 01:57:59 +02:00
Jeppler
7d9751048e Merge pull request #1 from Jeeppler/Jeeppler-patch-1
added the --action parameter description
2015-09-03 23:56:20 +02:00
Jeppler
c88a2dceb9 added the --action parameter description
added the --action parameter description. The --action parameter is implemented since a long time, but was not documented at all.
2015-09-03 23:55:21 +02:00
Marek Marczykowski-Górecki
730db56623 version 3.0.14 2015-09-03 02:45:10 +02:00
Marek Marczykowski-Górecki
ccd8021af9 appmenus: do not create appmenus for DispVMs (#1123)
Fixes qubesos/qubes-issues#1123
2015-09-03 01:18:16 +02:00
Marek Marczykowski-Górecki
079d0b1060
version 3.0.13 2015-08-05 02:02:26 +02:00
Marek Marczykowski-Górecki
c2c34528a2
appmenus: fix broken import 2015-08-03 04:19:49 +02:00
Marek Marczykowski-Górecki
f795e58483
Undo 'Boot Loader Spec' by deleting /boot/MACHINE_ID
The specification doesn't cover how to boot Xen (or any other multiboot
binary), but the sole presence of such directory changes dracut default
path. So get rid of that directory.
2015-08-03 03:00:59 +02:00
Marek Marczykowski-Górecki
c85fc7a098
appmenus: Add offline mode to qubes-receive-appmenus
Will be useful during LiveUSB build - we can't start template at this
stage, but still need to somehow generate appmenus.
2015-08-02 14:43:17 +02:00
Marek Marczykowski-Górecki
5b4b4190a5
version 3.0.12 2015-07-29 21:45:01 +02:00
Marek Marczykowski-Górecki
e062c431dd
rpm: move os-prober removing code to kernel-install subpackage
Main qubes-core-dom0 should not be installed as part of installer image,
but os-prober dependency pulls that in. So move it into
qubes-core-dom0-kernel-install subpackage. After all this is where grub
config regeneration code is placed, so it is more logical place.
2015-07-29 21:35:04 +02:00
Marek Marczykowski-Górecki
a2da1c9e8d version 3.0.11 2015-07-27 17:29:06 +02:00
Marek Marczykowski-Górecki
7fdff6a735 rpm: force removal os-prober package
It can be can be harmful, because it accesses (and mounts) every block
device, including VM controlled /dev/loop*.
2015-07-27 17:27:35 +02:00
Marek Marczykowski-Górecki
c752353471
version 3.0.10 2015-07-15 05:10:28 +02:00
Marek Marczykowski-Górecki
5e6d3a273d
Prevent installing all the qubes packages in the installer image
Split kernel-install hook into separate package, as only this part is
needed by the installer. This will prevent installing all the Qubes/Xen
staff in the installer, especially udev scripts and xenstored, which
doesn't play well with anaconda.
2015-07-14 23:27:03 +02:00
Marek Marczykowski-Górecki
5f1e7a77e6
version 3.0.9 2015-07-13 00:14:17 +02:00
Marek Marczykowski-Górecki
fddeb4a23c
Generate initramfs in kernel-install hook
The default one generates initramfs in location expected by Boot Loader
Specification, which as noted before, isn't useful for Qubes.
2015-07-12 01:54:53 +02:00
Marek Marczykowski-Górecki
f056e0341e
rpm: provide qubes-core-dom0-linux-kernel-install virtual pkg
This is for kernel package dependencies, since we have the same kernel
packages for both R2 and R3.0
2015-07-12 01:53:48 +02:00
Marek Marczykowski-Górecki
2a14ae9c0b
Add kernel post-installation script to regenerate grub2 config
Since we now allow using Fedora kernel, add a script to generate proper
bootloader configuration then. Standard Fedora mechanism relies on
Boot Loader Specification support in grub2, which sadly does not support
Xen, so it is useless in Qubes.
2015-07-10 17:54:24 +02:00
Marek Marczykowski-Górecki
20051e18c9
Update README 2015-07-10 17:50:25 +02:00
Marek Marczykowski-Górecki
c3331645e4 version 3.0.8 2015-07-08 05:57:52 +02:00
Marek Marczykowski-Górecki
cc7075ab65 appmenus: defer menu cache regeneration to speedup qvm-sync-appmenus
Call "xdg-desktop-menu forceupdate" at the end of the process, not for
every single item.
2015-07-08 05:56:38 +02:00
Marek Marczykowski-Górecki
5e3fbb1623 dom0-updates: ensure proper permissions on packages and metadata
This also includes possibly error flag file.
2015-07-08 04:54:34 +02:00
Marek Marczykowski-Górecki
fcd084f908 version 3.0.7 2015-07-01 07:18:18 +02:00
Marek Marczykowski-Górecki
4ce5e04d7e dracut: fix assigning devices to xen-pciback 2015-07-01 07:16:59 +02:00