Marek Marczykowski-Górecki
be43682df1
version 2.0.24
2014-10-25 01:47:13 +02:00
Marek Marczykowski-Górecki
6cca9a377f
qrexec: add -q option to silence "Waiting for VM's qrexec agent" message
2014-10-24 22:03:46 +02:00
Marek Marczykowski-Górecki
1e8b3ea876
rpm: do not save removed udev script
...
As Qubes dom0 is standalone system, not an addon to Fedora (for some
time...), we do not longer need to save such scripts to handle
package remove.
2014-09-30 23:51:10 +02:00
Marek Marczykowski-Górecki
40178a161e
appmenus: mute output when verbose=False
2014-09-18 07:46:00 +02:00
Marek Marczykowski-Górecki
a0eda3023f
version 2.0.23
2014-09-09 22:29:31 +02:00
Marek Marczykowski-Górecki
4758fc1781
appmenus: create apps.tempicons directory if missing ( #896 )
2014-09-09 02:13:08 +02:00
Joanna Rutkowska
808d63c6b6
version 2.0.22
2014-07-12 14:02:46 +02:00
Joanna Rutkowska
df0db675f2
Merge branch 'master' of http://git.woju.eu/qubes/core-admin-linux
2014-07-12 14:01:58 +02:00
Wojciech Zygmunt Porczyk
0f7730c2e3
appmenus: use new label icons
2014-07-10 16:28:05 +02:00
Joanna Rutkowska
5e101ea389
version 2.0.21
2014-07-06 13:44:54 +02:00
Marek Marczykowski-Górecki
9687180a62
udev: prevent dom0 processes from accessing templates root image
2014-07-04 04:29:31 +02:00
Marek Marczykowski-Górecki
7bfa26bd2f
version 2.0.20
2014-07-01 03:47:12 +02:00
Marek Marczykowski-Górecki
79abec9038
qrexec: fix deadlock in qrexec-client
...
When VM-VM qrexec service is called, two qrexec-clients are connected in
dom0. If both VMs are sending data simultaneously it can happen that
both qrexec-client processes will call write(2) and none of them will be
reading -> deadlock.
Solve it by handling I/O in two separate threads (one for reading from
VM, another for writing), at any time qrexec-client is ready to accept
data from either direction.
2014-07-01 03:24:46 +02:00
Marek Marczykowski-Górecki
6ab53c9456
version 2.0.19
2014-06-30 16:17:23 +02:00
Marek Marczykowski-Górecki
a74b69ce08
dom0-updates: ensure that metadata are available to normal user
2014-06-30 16:16:59 +02:00
Marek Marczykowski-Górecki
a013cb3eca
dom0-updates: call "apper --updates" to go directly to updates tab
2014-06-30 16:16:08 +02:00
Marek Marczykowski-Górecki
8627ef9a80
dom0-updates: use GUI tool appropriate to current DE ( #824 )
2014-06-29 22:02:00 +02:00
Marek Marczykowski-Górecki
d63c27f79a
version 2.0.18
2014-06-18 00:37:05 +02:00
Marek Marczykowski-Górecki
5af0530e8d
udev: prevent VM disks content from being accessed by dom0 processes
...
To not expose dom0 processes like blkid for attacks from VM (e.g. by
placing malicious filesystem header in private.img).
2014-06-11 02:41:20 +02:00
Marek Marczykowski-Górecki
c443264fae
dom0-updates: move GUI notification to qubes-manager ( #824 )
...
It is hard to get user session D-Bus address from outside of session. In
some cases there are even multiple dbus-daemon instances of the same
user...
2014-06-10 01:14:15 +02:00
Marek Marczykowski-Górecki
b8bd6e2d49
Additional options to hide PCI devices from dom0 ( #861 )
2014-05-29 05:12:42 +02:00
Marek Marczykowski-Górecki
9a206a5c4e
version 2.0.17
2014-05-23 02:43:49 +02:00
Wojciech Zygmunt Porczyk
66234f41ee
regexp fixes and validation ( #829 )
2014-05-19 13:36:02 +02:00
Wojciech Zygmunt Porczyk
38b1845e97
Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin-linux
2014-05-19 12:28:10 +02:00
Marek Marczykowski-Górecki
a7c43e6148
dom0-updates: clean local repo when --clean given
2014-05-12 00:30:48 +02:00
Marek Marczykowski-Górecki
15207dadcc
doc: mention yum opts in qubes-dom0-update manual page
2014-05-11 17:49:52 +02:00
Wojciech Zygmunt Porczyk
df7e67784a
qubes-receive-appmenus: filter categories
...
Allow only whitelisted categories, specified in freedesktop.org
"Desktop Menu Specification" 1.1-draft.
http://standards.freedesktop.org/menu-spec/latest/apa.html
2014-05-08 11:40:45 +02:00
Marek Marczykowski-Górecki
c5129a04e0
Merge branch 'master' of http://git.woju.eu/qubes/core-admin-linux
2014-05-07 15:22:07 +02:00
Wojciech Zygmunt Porczyk
c6f24d8ba8
qubes-receive-appmenus: use old icons when retrieval fails ( #836 )
2014-05-07 14:54:59 +02:00
Marek Marczykowski-Górecki
dbd7be5c90
Merge branch 'master' of http://git.woju.eu/qubes/core-admin-linux
2014-05-07 03:18:33 +02:00
Marek Marczykowski-Górecki
c74ac87582
dom0-updates: only notify about updates from cron, do not install them ( #824 )
...
It doesn't work and isn't simple to fix (needs the whole user
environment). So just notify about updates and let the user install them
from Qubes Manager or cmdline.
2014-05-06 04:19:55 +02:00
Wojciech Zygmunt Porczyk
bad449f235
qubes-core-appmenus.py: create/remove appmenus only when attribtute changes
...
This is part of #827 bug.
2014-05-05 22:26:53 +02:00
Marek Marczykowski-Górecki
553e914af5
version 2.0.16
2014-05-05 21:31:01 +02:00
Wojciech Zygmunt Porczyk
a9980d6d34
qubes-core-appmenus.py: create/remove appmenus when re/setting internal
...
This is part of #827 bug.
2014-05-05 16:47:34 +02:00
Marek Marczykowski-Górecki
9de6171a43
qubes-rpc: log (local) service output to syslog, discard stderr from VMs ( #842 )
...
Basically - store the logs where the service is running.
2014-05-05 05:27:08 +02:00
Marek Marczykowski-Górecki
c103f3713c
dom0-updates: force 'C' locale for rpm --checksig call
...
Otherwise "OK", searched by regex, might be translated (which is the
case for es_ES locale).
2014-05-05 04:00:52 +02:00
Marek Marczykowski-Górecki
85dd4a84f6
version 2.0.15
2014-04-19 16:48:53 +02:00
Marek Marczykowski-Górecki
5bac404079
appmenus: use os.path.join instead of manual string concatenation
...
This will ease porting the code to other OSes. Also be consistent with
other parts of the script.
2014-04-19 16:46:49 +02:00
Marek Marczykowski-Górecki
ffd8db5d06
appmenus: don't output untrusted strings on terminal
...
Especially those which failed verification.
2014-04-19 16:46:03 +02:00
Marek Marczykowski-Górecki
0afaa60093
appmenus: fix regexp for parsing received line
...
The '-' must be the last character. Otherwise it means character range.
In this case it was ')-_', which include '/', so path was incorrectly
sanitised.
2014-04-19 16:39:37 +02:00
Marek Marczykowski-Górecki
1483f009e6
version 2.0.14
2014-04-16 17:06:03 +02:00
Marek Marczykowski-Górecki
6fc4c0ae3f
appmenus: allow '_' in filenames
2014-04-16 17:00:25 +02:00
Marek Marczykowski-Górecki
7afc15dcf0
appmenus: workarounds for non-refreshing icon caches ( #751 )
2014-04-16 16:59:47 +02:00
Marek Marczykowski-Górecki
3e66cfbd97
version 2.0.13
2014-04-15 13:23:03 +02:00
Marek Marczykowski-Górecki
46f85b7f3f
dom0-updates: fix command quotation, hide only harmless error msgs
2014-04-15 13:22:28 +02:00
Marek Marczykowski-Górecki
f55d04eef8
version 2.0.12
2014-04-15 04:08:16 +02:00
Marek Marczykowski-Górecki
793dec27ff
dom0-updates: use qvm-run, not qrexec-client directly
2014-04-15 03:32:52 +02:00
Marek Marczykowski-Górecki
0be6f8431f
qrexec: add support for filtering terminal escape chars
2014-04-15 03:12:53 +02:00
Marek Marczykowski-Górecki
6f1ba98230
rpm: disable non-Xen grub entry on upgrade
2014-04-14 04:14:18 +02:00
Marek Marczykowski-Górecki
167f30d063
dracut: fix loading xen-pciback module into initramfs
...
instmods will not install module in hostonly mode, so forcefully disable
hostonly mode (this is the way recommended by dracut documentation).
2014-04-14 04:12:51 +02:00