Matt McCutchen
ff02e0da90
Add qvm-appmenu-replace tool.
...
This can be used to replace the Terminal shortcut
(QubesOS/qubes-issues#1428 ).
2015-12-05 12:25:29 -05:00
Marek Marczykowski-Górecki
8efde55755
version 3.1.3
2015-11-27 23:16:35 +01:00
Bahtiar `kalkin-` Gadimov
7f55410a02
Fix test basic/TC_01_Properties/test_000_rename
2015-11-22 22:31:22 +01:00
Bahtiar `kalkin-` Gadimov
6590931fcd
Make appmenu paths properties and not config attrs
...
This fixes a circular dependencies where get_attrs_config() in QubesVm is
executed, before the self.storage is initialised. See also
https://github.com/QubesOS/qubes-core-admin/pull/6#discussion-diff-45008401
2015-11-22 12:31:16 +01:00
Bahtiar `kalkin-` Gadimov
4d94309087
Remove unused imports from qubes-core-appmenus
2015-11-17 21:28:26 +01:00
Marek Marczykowski-Górecki
4d3a7ad5c6
appmenus: remove entries from AppVMs menus when removed from template
...
Fixes QubesOS/qubes-issues#1411
2015-11-13 02:48:15 +01:00
Marek Marczykowski-Górecki
f10442cc78
version 3.1.2
2015-11-11 06:31:33 +01:00
Marek Marczykowski-Górecki
8f52c83f0b
Require new enough qubes-utils package for updated libqrexec-utils (again)
...
It is required for additional file-copy functions, moved from
core-agent-linux (qfile-agent).
QubesOS/qubes-issues#1324
2015-11-11 05:12:42 +01:00
Marek Marczykowski-Górecki
4e498c90e6
Implement qvm-copy-to-vm and qvm-move-to-vm utilities
...
QubesOS/qubes-issues#1324
2015-11-11 05:09:21 +01:00
Marek Marczykowski-Górecki
520e250966
Require new enough qubes-utils package for updated libqrexec-utils
...
Required by 0c288aa
"qrexec: implement buffered write to child stdin to
prevent deadlock"
2015-10-30 15:10:18 +01:00
Marek Marczykowski-Górecki
0c288aa355
qrexec: implement buffered write to child stdin to prevent deadlock
...
Otherwise if the child process isn't reading its stdin at that time, it
would deadlock the whole qrexec connection (for example preventing
reading the data from the child, which may be a cause of that deadlock).
QubesOS/qubes-issues#1347
2015-10-30 14:16:53 +01:00
Marek Marczykowski-Górecki
4a7c2e2d42
version 3.1.1
2015-10-11 02:57:47 +02:00
Marek Marczykowski-Górecki
c8ce468c7f
qrexec: fallback to kdialog if zenity is not installed
...
Fixes QubesOS/qubes-issues#1277
2015-10-11 01:55:46 +02:00
Marek Marczykowski-Górecki
63e74a01d3
qrexec: fix handling autostarting RPC target VM
...
Do not reimplement manual VM state checking in qrexec-policy.
`qubes.xml` is loaded anyway, so just use QubesVM object to check if
domain is running.
Fixes QubesOS/qubes-issues#1283
2015-10-11 01:52:40 +02:00
Marek Marczykowski-Górecki
63dffb48c5
version 3.1.0
2015-09-29 16:48:32 +02:00
Marek Marczykowski-Górecki
867baa7266
kernel-install: add new kernel to xen.cfg for xen.efi
...
QubesOS/qubes-issues#794
2015-09-26 03:56:16 +02:00
Marek Marczykowski-Górecki
0e733bd0de
kernel-install: call grub2-mkconfig only when it is installed
...
On systems booting with EFI, there is no grub2 installed at all - the
system is started directly to xen.efi.
2015-09-26 02:54:32 +02:00
Marek Marczykowski-Górecki
71342f4bd2
version 3.0.15
2015-09-05 00:31:10 +02:00
Marek Marczykowski-Górecki
55f9ca5996
Merge remote-tracking branch 'origin/pr/3'
...
* origin/pr/3:
filter out tar time wrap warnings using grep
2015-09-04 15:24:27 +02:00
Patrick Schleizer
7d0b2479f5
filter out tar time wrap warnings using grep
...
https://phabricator.whonix.org/T401#6634
2015-09-04 00:54:50 +00:00
Marek Marczykowski-Górecki
0d69e8fe3e
doc: add some more details to qubes-dom0-update --action
2015-09-04 02:11:16 +02:00
Marek Marczykowski-Górecki
5f030b0033
Merge remote-tracking branch 'qubesos/pr/2'
2015-09-04 02:10:19 +02:00
Marek Marczykowski-Górecki
4e1f6b5bd5
core: use vm.absolute_path to parse paths in qubes.xml
...
This makes easier to handle some corner cases.
qubesos/qubes-issues#1124
Reported by @doncohen, thanks @wyory for providing more details.
2015-09-04 01:57:59 +02:00
Jeppler
7d9751048e
Merge pull request #1 from Jeeppler/Jeeppler-patch-1
...
added the --action parameter description
2015-09-03 23:56:20 +02:00
Jeppler
c88a2dceb9
added the --action parameter description
...
added the --action parameter description. The --action parameter is implemented since a long time, but was not documented at all.
2015-09-03 23:55:21 +02:00
Marek Marczykowski-Górecki
730db56623
version 3.0.14
2015-09-03 02:45:10 +02:00
Marek Marczykowski-Górecki
ccd8021af9
appmenus: do not create appmenus for DispVMs ( #1123 )
...
Fixes qubesos/qubes-issues#1123
2015-09-03 01:18:16 +02:00
Marek Marczykowski-Górecki
079d0b1060
version 3.0.13
2015-08-05 02:02:26 +02:00
Marek Marczykowski-Górecki
c2c34528a2
appmenus: fix broken import
2015-08-03 04:19:49 +02:00
Marek Marczykowski-Górecki
f795e58483
Undo 'Boot Loader Spec' by deleting /boot/MACHINE_ID
...
The specification doesn't cover how to boot Xen (or any other multiboot
binary), but the sole presence of such directory changes dracut default
path. So get rid of that directory.
2015-08-03 03:00:59 +02:00
Marek Marczykowski-Górecki
c85fc7a098
appmenus: Add offline mode to qubes-receive-appmenus
...
Will be useful during LiveUSB build - we can't start template at this
stage, but still need to somehow generate appmenus.
2015-08-02 14:43:17 +02:00
Marek Marczykowski-Górecki
5b4b4190a5
version 3.0.12
2015-07-29 21:45:01 +02:00
Marek Marczykowski-Górecki
e062c431dd
rpm: move os-prober removing code to kernel-install subpackage
...
Main qubes-core-dom0 should not be installed as part of installer image,
but os-prober dependency pulls that in. So move it into
qubes-core-dom0-kernel-install subpackage. After all this is where grub
config regeneration code is placed, so it is more logical place.
2015-07-29 21:35:04 +02:00
Marek Marczykowski-Górecki
a2da1c9e8d
version 3.0.11
2015-07-27 17:29:06 +02:00
Marek Marczykowski-Górecki
7fdff6a735
rpm: force removal os-prober package
...
It can be can be harmful, because it accesses (and mounts) every block
device, including VM controlled /dev/loop*.
2015-07-27 17:27:35 +02:00
Marek Marczykowski-Górecki
c752353471
version 3.0.10
2015-07-15 05:10:28 +02:00
Marek Marczykowski-Górecki
5e6d3a273d
Prevent installing all the qubes packages in the installer image
...
Split kernel-install hook into separate package, as only this part is
needed by the installer. This will prevent installing all the Qubes/Xen
staff in the installer, especially udev scripts and xenstored, which
doesn't play well with anaconda.
2015-07-14 23:27:03 +02:00
Marek Marczykowski-Górecki
5f1e7a77e6
version 3.0.9
2015-07-13 00:14:17 +02:00
Marek Marczykowski-Górecki
fddeb4a23c
Generate initramfs in kernel-install hook
...
The default one generates initramfs in location expected by Boot Loader
Specification, which as noted before, isn't useful for Qubes.
2015-07-12 01:54:53 +02:00
Marek Marczykowski-Górecki
f056e0341e
rpm: provide qubes-core-dom0-linux-kernel-install virtual pkg
...
This is for kernel package dependencies, since we have the same kernel
packages for both R2 and R3.0
2015-07-12 01:53:48 +02:00
Marek Marczykowski-Górecki
2a14ae9c0b
Add kernel post-installation script to regenerate grub2 config
...
Since we now allow using Fedora kernel, add a script to generate proper
bootloader configuration then. Standard Fedora mechanism relies on
Boot Loader Specification support in grub2, which sadly does not support
Xen, so it is useless in Qubes.
2015-07-10 17:54:24 +02:00
Marek Marczykowski-Górecki
20051e18c9
Update README
2015-07-10 17:50:25 +02:00
Marek Marczykowski-Górecki
c3331645e4
version 3.0.8
2015-07-08 05:57:52 +02:00
Marek Marczykowski-Górecki
cc7075ab65
appmenus: defer menu cache regeneration to speedup qvm-sync-appmenus
...
Call "xdg-desktop-menu forceupdate" at the end of the process, not for
every single item.
2015-07-08 05:56:38 +02:00
Marek Marczykowski-Górecki
5e3fbb1623
dom0-updates: ensure proper permissions on packages and metadata
...
This also includes possibly error flag file.
2015-07-08 04:54:34 +02:00
Marek Marczykowski-Górecki
fcd084f908
version 3.0.7
2015-07-01 07:18:18 +02:00
Marek Marczykowski-Górecki
4ce5e04d7e
dracut: fix assigning devices to xen-pciback
2015-07-01 07:16:59 +02:00
Marek Marczykowski-Górecki
8acd40905d
Disable lesspipe in dom0
...
It can be dangerous when processing untrusted content (for example VM
logs).
Details:
https://groups.google.com/d/msgid/qubes-users/20150527215812.GA13915%40mail-itl
2015-06-25 02:37:29 +02:00
Marek Marczykowski-Górecki
1288a13520
qrexec: do not terminate before sending all the data
...
Make sure that all the data from local process is sent (including final
EOF), before handling its exit code - which would include terminating
qrexec-client process.
2015-06-23 02:44:59 +02:00
Marek Marczykowski-Górecki
7ce62cbd98
dracut: support the case when xen-pciback is built-in, not a module
...
In such case, we can't set module parameters in initramfs. But we can
bind the driver to appropriate devices manually - which is also doable
in case of module.
2015-06-15 03:26:04 +02:00