c129ce2e4d
Those parameters eventually may eventually be passed to a shell script (at least /usr/lib/qubes/qubes-rpc-multiplexer). While it is possible to properly escape shell special characters, lets do safer and less fragile thing: forbid such characters entirely. In case of target name, qrexec policy keywords are allowed, and after recent change, those contains '@', so allow this char. |
||
---|---|---|
doc | ||
dom0-updates | ||
dracut | ||
file-copy-vm | ||
pm-utils | ||
qrexec | ||
qubesappmenus | ||
rpm_spec | ||
system-config | ||
vaio-fixes | ||
.gitignore | ||
.travis.yml | ||
Makefile | ||
Makefile.builder | ||
README.txt | ||
version | ||
version_vaio_fixes |
This package contains Linux dom0 files. Mostly there are config files for different system services, but also some "addons" to Qubes core: - udev scripts for block and USB devices exposure (in qvm-block and qvm-usb) - appmenu generation for Linux GUI (including icons)