Commit Graph

533 Commits

Author SHA1 Message Date
Frédéric Pierret (fepitre)
cf76a3cbbb
travis: switch to bionic
QubesOS/qubes-issues#4613
2019-10-19 21:45:19 +02:00
Marek Marczykowski-Górecki
e5e006d933
Fix various issues with qubes-dom0-update
- fix unescaped dot in package_regex
- if any package fails verification, remove the whole directory, not
only that single package
- abort (and remove the whole directory) on any exception
- don't include file name in the error message, if it failed
verification

This, among other things, fix handling symlinks and directories sent by
potentially malicious UpdateVM. os.remove() can't remove non-empty
directories, so it would fail.
Fortunately metadata is created only after successful verification, so
dnf/yum wouldn't touch packages that failed verification and also
weren't removed. But make the code better handle such situations.

Reported-by: Hans Jerry Illikainen <hji@dyntopia.com>
2019-10-09 04:49:01 +02:00
Marek Marczykowski-Górecki
2dadbcfdcb
version 4.1.1 2019-09-24 03:45:11 +02:00
Marek Marczykowski-Górecki
9962fab124
repos rpc: use dnf native method of writing repository configuration
Since we have new enough dnf version, native write_raw_configfile() can
be used, instead of external iniparse module.

QubesOS/qubes-issues#4550
2019-08-28 16:40:13 +02:00
M. Vefa Bicakci
1089a7a07b
qubes-dom0-update: Quote arguments
This commit ensures that all arguments to qubes-download-dom0-updates.sh
are properly quoted. This allows the use of commands such as

  sudo qubes-dom0-update --action=distro-sync '*'

where, prior to this commit, the asterisk would be expanded in the
update virtual machine's home directory, whereas this commit prevents
the undesirable shell expansion of wildcards.

Fixes QubesOS/qubes-issues#5096
2019-07-20 20:41:54 -04:00
Marek Marczykowski-Górecki
c56c4a7a9d
kernel-install: adjust EFI check to look for xen.cfg
Even if EFI directory is present it may not be populated. kernel-install
part care specifically about xen.cfg file, so check it explicitly. If
grub2-efi is in use, the file wont be there and the script isn't
supposed to do anything.
2019-06-27 14:28:15 +02:00
Marek Marczykowski-Górecki
895415aee1
version 4.1.0 2019-06-08 05:25:20 +02:00
Marek Marczykowski-Górecki
8800a08150
Merge remote-tracking branch 'origin/pr/48'
* origin/pr/48:
  Add some comments to qubes.repos.List
  Don't write a trailing newline in qubes.repos.List
  Add qubes.repos.* services to the RPMs
  Print `ok` for repo enable/disable success
  Use qrexec service arguments
  Properly set the umask for repo files
  Enable/disable repos atomically
  Use Python whitespace conventions
  Rename admin.repos.* to qubes.repos.*
  Add admin.repos.* qrexec services
2019-06-08 05:12:03 +02:00
AJ Jordan
82806b53e2
Add some comments to qubes.repos.List 2019-04-08 12:55:55 -04:00
AJ Jordan
3786197ab2
Don't write a trailing newline in qubes.repos.List
This makes it annoying to parse.
2019-04-08 12:55:54 -04:00
AJ Jordan
75faa22dff
Add qubes.repos.* services to the RPMs 2019-04-08 12:55:52 -04:00
AJ Jordan
2283af8ce5
Print ok for repo enable/disable success 2019-04-08 12:55:50 -04:00
AJ Jordan
00c37b0b5b
Use qrexec service arguments 2019-04-08 12:55:49 -04:00
AJ Jordan
05658f0850
Properly set the umask for repo files 2019-04-08 12:55:48 -04:00
AJ Jordan
0af2769aca
Enable/disable repos atomically 2019-04-08 12:55:46 -04:00
AJ Jordan
529f5a1cd0
Use Python whitespace conventions 2019-04-08 12:55:44 -04:00
AJ Jordan
ce70209310
Rename admin.repos.* to qubes.repos.* 2019-04-08 12:55:43 -04:00
AJ Jordan
888073df05
Add admin.repos.* qrexec services
This is a prerequisite for QubesOS/qubes-issues#4550.
2019-04-08 12:55:41 -04:00
Marek Marczykowski-Górecki
6fa3e19f7e
travis: drop R4.0, switch to xenial
QubesOS/qubes-issues#4613
2019-04-08 16:10:30 +02:00
Marek Marczykowski-Górecki
15c55a4ef5
Remove qrexec related files
Move them to the core-qrexec repository.

QubesOS/qubes-issues#4955
2019-04-08 15:57:45 +02:00
Marek Marczykowski-Górecki
2ec29a4d4c
Cleanup lvm archived metadata files
Those files may easily accumulate in large quantities, to the point
where just listing the /etc/lvm/archive directory takes a long time.
This affects every lvm command call, so every VM start/stop.
Those archive files are rarely useful, as Qubes do multiple LVM
operations at each VM startup, so older data is really out of date very
quickly.

Automatically remove files in /etc/lvm/archive older than one day.

Fixes QubesOS/qubes-issues#4927
Fixes QubesOS/qubes-issues#2963
2019-04-02 18:04:26 +02:00
Marek Marczykowski-Górecki
330f155168
dom0-update: support rpm -K output of rpm 4.14
QubesOS/qubes-issues#4225
2019-04-02 17:58:30 +02:00
Marek Marczykowski-Górecki
fb1c284774
dom0-update: send dnf.conf to updatevm
There may be no yum.conf anymore (fc29), so send dnf.conf as this is the
config that is really used.

QubesOS/qubes-issues#4225
2019-04-02 17:57:07 +02:00
Marek Marczykowski-Górecki
d705fa6ed4
system-config: enable dbus in system- and user- presets
It is no longer enabled by default by systemd package.

QubesOS/qubes-issues#4225
2019-04-01 06:23:21 +02:00
Marek Marczykowski-Górecki
61ec339c2d
qrexec: add version negotiation
Use lower version from (local, remote).

QubesOS/qubes-issues#4909
2019-03-31 19:23:40 +02:00
Marek Marczykowski-Górecki
b6e3f360c9
version 4.0.18 2019-03-09 23:59:36 +01:00
Marek Marczykowski-Górecki
edf406c172
travis: fix R4.1 line 2019-03-02 16:38:44 +01:00
Marek Marczykowski-Górecki
1ffa0d69cb
rpm: add BR: gcc 2019-03-02 16:32:05 +01:00
Marek Marczykowski-Górecki
d5e667d0ee
qvm-copy: fix handling VM names starting with dash
Reported by @v6ak
2019-03-02 16:31:17 +01:00
Marek Marczykowski-Górecki
e5deabe0aa
suspend: let errors be logged into journald
The \0 after error code prevent logging error message which is after it.
This change clobber qubesd-query exit code with tr exit code (mostly 0),
but this is a good thing - failing qubes-suspend service does not
prevent the suspend, but do prevent the stop hooks being called, which
for example breaks time synchronization or may leave some domains
paused.

QubesOS/qubes-issues#3489
2019-02-24 15:51:57 +01:00
Marek Marczykowski-Górecki
59ecf8eb83
dom0-update: fix backup template name calculation
VM name is limited to 31 chars, not 32.

Fixes QubesOS/qubes-issues#4829
2019-02-18 05:05:24 +01:00
Marek Marczykowski-Górecki
72a3459119
version 4.0.17 2018-12-09 18:43:03 +01:00
Marek Marczykowski-Górecki
9c3a4e7b00
dom0-updates: use qvm-run -q
One of the calls missed -q option.
2018-12-08 12:03:33 +01:00
Marek Marczykowski-Górecki
d7c23e1b7f
dom0-updates: fix command line for dnf4
dnf4 (Fedora 29) does not like final coma in --exclude option. If it's
there, the whole --exclude is ignored on misinterpreted (as one long
package name?).
2018-12-06 15:20:22 +01:00
Marek Marczykowski-Górecki
07c286fad5
Merge remote-tracking branch 'origin/pr/47'
* origin/pr/47:
  Fix GCC8 warning
  tracis-ci: add support for fc29 dom0
2018-12-06 14:05:41 +01:00
Marek Marczykowski-Górecki
8555ff4ced
dom-updates: drop 'distroverpkg' from dnf.conf
It does nothing in dnf (was useful in yum era).

QubesOS/qubes-issues#4477
2018-12-04 21:04:14 +01:00
Marek Marczykowski-Górecki
c03fbecb4e
dom0-updates: use qvm-service for disabling dom0 updates check
Use the same mechanism as VMs - first it's compatible with Admin API (in
contrary to flag files); second it ease handling it.

Migrate old setting on package upgrade.
2018-12-04 21:04:09 +01:00
fepitre
b36f298815 Fix GCC8 warning
QubesOS/qubes-issues#4225
2018-11-22 19:30:55 +01:00
Frédéric Pierret (fepitre)
7064279316 tracis-ci: add support for fc29 dom0 2018-11-22 19:30:55 +01:00
Marek Marczykowski-Górecki
10960564cf
dom0-updates: use qvm-features to report dom0 updates
Use the same as thing as VMs.
2018-11-02 01:58:27 +01:00
Kushal Das
0a94e59325
Adds info & search actions for template packages
Now we can do --action=info or --action=search
for a template. This will not shutdown the template and simply
execute search or info command for dnf.
2018-10-30 08:06:15 +05:30
Marek Marczykowski-Górecki
3cc4f5bed3
Merge remote-tracking branch 'origin/pr/44'
* origin/pr/44:
  Error in qubes-dom0-update --gui
2018-09-29 13:52:49 +02:00
Marek Marczykowski-Górecki
4495000703
Fix mock-based build 2018-09-29 02:39:23 +02:00
Marta Marczykowska-Górecka
879b62c353
Error in qubes-dom0-update --gui
Fixed error with zenity in qubes-dom0-update --gui,
in which zenity was called with insufficient parameters.

fixes QubesOS/qubes-issues#4339
2018-09-27 21:05:28 +02:00
Marek Marczykowski-Górecki
912861c8b0
version 4.0.16 2018-09-13 23:39:13 +02:00
Marek Marczykowski-Górecki
b1c038e882
Merge remote-tracking branch 'qubesos/pr/43'
* qubesos/pr/43:
  Fix some references to `yum` instead of `dnf`
2018-09-02 07:41:51 +02:00
Marek Marczykowski-Górecki
a10d724bb1
Add missing R: createrepo_c
Dom0 update scripts need it.

Fixes QubesOS/qubes-issues#4099
2018-09-02 02:04:35 +02:00
AJ Jordan
a5d6dd3001
Fix some references to yum instead of dnf
I didn't change any of the variable names because it made me nervous and I was too lazy to test.
2018-08-18 01:11:50 -04:00
Marta Marczykowska-Górecka
9a039f0753
Added dummy qvm-move/qvm-copy do dom0
While qvm-move and qvm-copy cannot work in dom0, their
absence is confusing. Thus, stub tools that output message
informing the user that these tools are unavailable and
qvm-move-to-vm/qvm-copy-to-vm should be used instead.

fixes QubesOS/qubes-issues#4021
2018-07-16 18:30:36 +02:00
Marek Marczykowski-Górecki
6d08882978
version 4.0.15 2018-07-03 21:08:56 +02:00