Commit Graph

543 Commits

Author SHA1 Message Date
2df917e7a5
dracut: add roadrunner2/macbook12-spi-driver on MacBook HW 2020-02-27 19:26:44 +01:00
3hhh
c600b1b39c
Proper argument escaping for special characters.
Fixes side note of QubesOS/qubes-issues#5562
2020-01-15 15:38:28 +01:00
3hhh
f4f5731bdc
Don't pass stdin to VMs unless necessary.
Fixes QubesOS/qubes-issues#5562
2020-01-15 15:16:41 +01:00
Frédéric Pierret (fepitre)
0d53697917
travis: switch to dom0 Fedora 31
QubesOS/qubes-issues#5529
2020-01-11 11:38:17 +01:00
Marek Marczykowski-Górecki
a4006f5046
version 4.1.3 2020-01-04 20:54:17 +01:00
Marek Marczykowski-Górecki
264ded8101
Merge remote-tracking branch 'origin/pr/53'
* origin/pr/53:
  Added enabling of qrexec-policy-daemon.service
2020-01-04 20:54:05 +01:00
Marek Marczykowski-Górecki
4a88c520ac
kernel-install: consider both grub2 and grub2-efi configs
Since EFI boot now also use grub2, update its config too when present.

Reported-by: @JarrahG
QubesOS/qubes-issues#4902
2019-12-19 05:33:34 +01:00
Marta Marczykowska-Górecka
761b5b1ef4
Added enabling of qrexec-policy-daemon.service
used by https://github.com/QubesOS/qubes-core-qrexec/pull/6
references QubesOS/qubes-issues#5125
2019-12-03 20:01:18 +01:00
Marek Marczykowski-Górecki
257d9e5b78
version 4.1.2 2019-10-28 04:20:28 +01:00
Marek Marczykowski-Górecki
9cf273d187
qubes-dom0-update: fix removing backup template after the operation
qvm-remove got confirmation prompt, add -f to avoid it.
2019-10-21 03:47:39 +02:00
Frédéric Pierret (fepitre)
cf76a3cbbb
travis: switch to bionic
QubesOS/qubes-issues#4613
2019-10-19 21:45:19 +02:00
Marek Marczykowski-Górecki
e5e006d933
Fix various issues with qubes-dom0-update
- fix unescaped dot in package_regex
- if any package fails verification, remove the whole directory, not
only that single package
- abort (and remove the whole directory) on any exception
- don't include file name in the error message, if it failed
verification

This, among other things, fix handling symlinks and directories sent by
potentially malicious UpdateVM. os.remove() can't remove non-empty
directories, so it would fail.
Fortunately metadata is created only after successful verification, so
dnf/yum wouldn't touch packages that failed verification and also
weren't removed. But make the code better handle such situations.

Reported-by: Hans Jerry Illikainen <hji@dyntopia.com>
2019-10-09 04:49:01 +02:00
Marek Marczykowski-Górecki
2dadbcfdcb
version 4.1.1 2019-09-24 03:45:11 +02:00
Marek Marczykowski-Górecki
9962fab124
repos rpc: use dnf native method of writing repository configuration
Since we have new enough dnf version, native write_raw_configfile() can
be used, instead of external iniparse module.

QubesOS/qubes-issues#4550
2019-08-28 16:40:13 +02:00
M. Vefa Bicakci
1089a7a07b
qubes-dom0-update: Quote arguments
This commit ensures that all arguments to qubes-download-dom0-updates.sh
are properly quoted. This allows the use of commands such as

  sudo qubes-dom0-update --action=distro-sync '*'

where, prior to this commit, the asterisk would be expanded in the
update virtual machine's home directory, whereas this commit prevents
the undesirable shell expansion of wildcards.

Fixes QubesOS/qubes-issues#5096
2019-07-20 20:41:54 -04:00
Marek Marczykowski-Górecki
c56c4a7a9d
kernel-install: adjust EFI check to look for xen.cfg
Even if EFI directory is present it may not be populated. kernel-install
part care specifically about xen.cfg file, so check it explicitly. If
grub2-efi is in use, the file wont be there and the script isn't
supposed to do anything.
2019-06-27 14:28:15 +02:00
Marek Marczykowski-Górecki
895415aee1
version 4.1.0 2019-06-08 05:25:20 +02:00
Marek Marczykowski-Górecki
8800a08150
Merge remote-tracking branch 'origin/pr/48'
* origin/pr/48:
  Add some comments to qubes.repos.List
  Don't write a trailing newline in qubes.repos.List
  Add qubes.repos.* services to the RPMs
  Print `ok` for repo enable/disable success
  Use qrexec service arguments
  Properly set the umask for repo files
  Enable/disable repos atomically
  Use Python whitespace conventions
  Rename admin.repos.* to qubes.repos.*
  Add admin.repos.* qrexec services
2019-06-08 05:12:03 +02:00
AJ Jordan
82806b53e2
Add some comments to qubes.repos.List 2019-04-08 12:55:55 -04:00
AJ Jordan
3786197ab2
Don't write a trailing newline in qubes.repos.List
This makes it annoying to parse.
2019-04-08 12:55:54 -04:00
AJ Jordan
75faa22dff
Add qubes.repos.* services to the RPMs 2019-04-08 12:55:52 -04:00
AJ Jordan
2283af8ce5
Print ok for repo enable/disable success 2019-04-08 12:55:50 -04:00
AJ Jordan
00c37b0b5b
Use qrexec service arguments 2019-04-08 12:55:49 -04:00
AJ Jordan
05658f0850
Properly set the umask for repo files 2019-04-08 12:55:48 -04:00
AJ Jordan
0af2769aca
Enable/disable repos atomically 2019-04-08 12:55:46 -04:00
AJ Jordan
529f5a1cd0
Use Python whitespace conventions 2019-04-08 12:55:44 -04:00
AJ Jordan
ce70209310
Rename admin.repos.* to qubes.repos.* 2019-04-08 12:55:43 -04:00
AJ Jordan
888073df05
Add admin.repos.* qrexec services
This is a prerequisite for QubesOS/qubes-issues#4550.
2019-04-08 12:55:41 -04:00
Marek Marczykowski-Górecki
6fa3e19f7e
travis: drop R4.0, switch to xenial
QubesOS/qubes-issues#4613
2019-04-08 16:10:30 +02:00
Marek Marczykowski-Górecki
15c55a4ef5
Remove qrexec related files
Move them to the core-qrexec repository.

QubesOS/qubes-issues#4955
2019-04-08 15:57:45 +02:00
Marek Marczykowski-Górecki
2ec29a4d4c
Cleanup lvm archived metadata files
Those files may easily accumulate in large quantities, to the point
where just listing the /etc/lvm/archive directory takes a long time.
This affects every lvm command call, so every VM start/stop.
Those archive files are rarely useful, as Qubes do multiple LVM
operations at each VM startup, so older data is really out of date very
quickly.

Automatically remove files in /etc/lvm/archive older than one day.

Fixes QubesOS/qubes-issues#4927
Fixes QubesOS/qubes-issues#2963
2019-04-02 18:04:26 +02:00
Marek Marczykowski-Górecki
330f155168
dom0-update: support rpm -K output of rpm 4.14
QubesOS/qubes-issues#4225
2019-04-02 17:58:30 +02:00
Marek Marczykowski-Górecki
fb1c284774
dom0-update: send dnf.conf to updatevm
There may be no yum.conf anymore (fc29), so send dnf.conf as this is the
config that is really used.

QubesOS/qubes-issues#4225
2019-04-02 17:57:07 +02:00
Marek Marczykowski-Górecki
d705fa6ed4
system-config: enable dbus in system- and user- presets
It is no longer enabled by default by systemd package.

QubesOS/qubes-issues#4225
2019-04-01 06:23:21 +02:00
Marek Marczykowski-Górecki
61ec339c2d
qrexec: add version negotiation
Use lower version from (local, remote).

QubesOS/qubes-issues#4909
2019-03-31 19:23:40 +02:00
Marek Marczykowski-Górecki
b6e3f360c9
version 4.0.18 2019-03-09 23:59:36 +01:00
Marek Marczykowski-Górecki
edf406c172
travis: fix R4.1 line 2019-03-02 16:38:44 +01:00
Marek Marczykowski-Górecki
1ffa0d69cb
rpm: add BR: gcc 2019-03-02 16:32:05 +01:00
Marek Marczykowski-Górecki
d5e667d0ee
qvm-copy: fix handling VM names starting with dash
Reported by @v6ak
2019-03-02 16:31:17 +01:00
Marek Marczykowski-Górecki
e5deabe0aa
suspend: let errors be logged into journald
The \0 after error code prevent logging error message which is after it.
This change clobber qubesd-query exit code with tr exit code (mostly 0),
but this is a good thing - failing qubes-suspend service does not
prevent the suspend, but do prevent the stop hooks being called, which
for example breaks time synchronization or may leave some domains
paused.

QubesOS/qubes-issues#3489
2019-02-24 15:51:57 +01:00
Marek Marczykowski-Górecki
59ecf8eb83
dom0-update: fix backup template name calculation
VM name is limited to 31 chars, not 32.

Fixes QubesOS/qubes-issues#4829
2019-02-18 05:05:24 +01:00
Marek Marczykowski-Górecki
72a3459119
version 4.0.17 2018-12-09 18:43:03 +01:00
Marek Marczykowski-Górecki
9c3a4e7b00
dom0-updates: use qvm-run -q
One of the calls missed -q option.
2018-12-08 12:03:33 +01:00
Marek Marczykowski-Górecki
d7c23e1b7f
dom0-updates: fix command line for dnf4
dnf4 (Fedora 29) does not like final coma in --exclude option. If it's
there, the whole --exclude is ignored on misinterpreted (as one long
package name?).
2018-12-06 15:20:22 +01:00
Marek Marczykowski-Górecki
07c286fad5
Merge remote-tracking branch 'origin/pr/47'
* origin/pr/47:
  Fix GCC8 warning
  tracis-ci: add support for fc29 dom0
2018-12-06 14:05:41 +01:00
Marek Marczykowski-Górecki
8555ff4ced
dom-updates: drop 'distroverpkg' from dnf.conf
It does nothing in dnf (was useful in yum era).

QubesOS/qubes-issues#4477
2018-12-04 21:04:14 +01:00
Marek Marczykowski-Górecki
c03fbecb4e
dom0-updates: use qvm-service for disabling dom0 updates check
Use the same mechanism as VMs - first it's compatible with Admin API (in
contrary to flag files); second it ease handling it.

Migrate old setting on package upgrade.
2018-12-04 21:04:09 +01:00
fepitre
b36f298815 Fix GCC8 warning
QubesOS/qubes-issues#4225
2018-11-22 19:30:55 +01:00
Frédéric Pierret (fepitre)
7064279316 tracis-ci: add support for fc29 dom0 2018-11-22 19:30:55 +01:00
Marek Marczykowski-Górecki
10960564cf
dom0-updates: use qvm-features to report dom0 updates
Use the same as thing as VMs.
2018-11-02 01:58:27 +01:00