Ecosyste.ms: OpenCollective
An open API service for software projects hosted on Open Collective.
github.com/QubesOS/qubes-core-agent-linux
Qubes component: core-agent-linux
https://github.com/QubesOS/qubes-core-agent-linux
c283c45363206fe8348a3f8e7b29c271a36a7f45 authored 10 months ago by Marek Marczykowski-Górecki <[email protected]>
Recent change in socat made it prefer ::1 address for localhost. This
breaks updates proxy, beca...
* origin/pr/487:
#8991 - support for the dhcp4-change event in qubes-nmhook
Fixes QubesOS/qub...
3ca82b722c7378deed9737e8e7ecd71e50a12162 authored 10 months ago by Marek Marczykowski-Górecki <[email protected]>
* origin/pr/486:
Use O_NOFOLLOW for the log file
* origin/pr/485:
Ensure gnome-keyring always available
* origin/pr/484:
Refuse to copy "." or ".."
* origin/pr/483:
Skip sudo for unprivileged ports binds
b18f28db8d2c1294829cca0d5e1305fd3aa82eae authored 10 months ago by Marek Marczykowski-Górecki <[email protected]>
Found by shellcheck
58ebf4759f7cd864c5f55501a365b1569297063c authored 10 months ago by Marek Marczykowski-Górecki <[email protected]>72923d232ea1bfb6c1875bc62782db16a4f77ec2 authored 10 months ago by Marek Marczykowski-Górecki <[email protected]>
248aefe0a1e88db3f5b530e0ee2b0f671e4bc956 authored 10 months ago by Marek Marczykowski-Górecki <[email protected]>
GnuPG in F39 seems to use keyboxd and as a consequence, keyring choice
on import seems to be ign...
Prevents easy escalation to the "qubes" group via a symlink attack.
97fc9ac0856aa450d9afb0e7932349396b33d6c8 authored 10 months ago by Demi Marie Obenour <[email protected]>899c1027b083d43c00daf5fc118703fbdec36987 authored 10 months ago by Jan Hustak <[email protected]>
Sandboxed applications use a secrets portal implementation to store
secrets. Without it, Elemen...
In R4.2, these will be rejected on the receiving side with a confusing
error. Furthermore, the ...
Fixes: https://github.com/QubesOS/qubes-issues/issues/8923
531d3957aafc0ee86396d88a8a531e33cd299b8a authored 10 months ago by Ben Grande <[email protected]>afaf948a6fba5d2c87378525a67cd163b479bb87 authored 12 months ago by Marek Marczykowski-Górecki <[email protected]>
Sandboxed applications use this to store secrets. Without it, Element
cannot access its secrets...
* origin/pr/478:
Minor docs fix
b81e5fcd1eedd09e0bd12ed96eb80cb3b8edfb15 authored about 1 year ago by Marta Marczykowska-Górecka <[email protected]>
527c0bd529636372e36bb5333032e30c108cf4b0 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
* xfce-displays:
Do not show "Displays" prompt in every VM when new display is connected
Improve information for qvm-copy.
fixes QubesOS/qubes-issues#6374
140c1f202377f3c9bd15d288433fea6bb67b9151 authored about 1 year ago by Marta Marczykowska-Górecka <[email protected]>
Default Xfce setting is to prompt what to do when new display is
connected. It makes sense in do...
* origin/pr/474:
Parse '.rc' files in rc.local.d directory on boot
* origin/pr/476:
qvm-copy-to-vm.gnome: fix progress_kdialog() for large transfers
qvm-copy-t...
* origin/pr/473:
qubes-run-terminal: add gnome-console support
The estimated total size in bytes can be too large to use as kdialog's
maximum. Use the default ...
5043a45b745aaf3acf8ee79a33bd0fab2e84b876 authored about 1 year ago by Rusty Bird <[email protected]>
The new syntax has existed for more than six years:
https://invent.kde.org/utilities/kdialog/-/...
6c31dafb32bd4917f306adda1b40c197a0fa6ccb authored about 1 year ago by Rusty Bird <[email protected]>
A while ago qfile-agent was changed to show graphical error messages (in
addition to stderr mess...
In practice kdialog wasn't used, because the package was built without
USE_KDIALOG being defined...
Fixes https://github.com/QubesOS/qubes-issues/issues/8690
Fixes https://github.com/QubesOS/qubes...
5a29270b84666343913844a5372414bb220f3f7f authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
* origin/pr/469:
Detect and terminate infinite qrexec launch chains
* origin/pr/470:
setup-ip: adapt path for Gentoo compat
* origin/pr/472:
improve formatting of /etc/fstab
qubes-run-gnome-console is added for future proofness.
from kgx --help
--wait Wait until the ...
0032eec0ccdf833d9ed42f673b5cfb1e07e0cb74 authored about 1 year ago by Patrick Schleizer <[email protected]>
Some packages are named differently than on Fedora:
- python3-gobject-base -> python311-gobject
...
Move parts to appropriate subpackages (specifically dom0-updates part).
Call parts related to sp...
It isn't packaged there.
QubesOS/qubes-issues#6567
e206ce8cf1c112e33f69ee706a4987671d3ca13c authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>It was over 10 years ago, it isn't needed anymore.
QubesOS/qubes-issues#6567
14d4aa8552d05181271b175b22e9d73cb384e9b4 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
openSUSE checks for directory ownership at rpm build time, so some
runtime dependencies needs to...
It isn't packaged there.
QubesOS/qubes-issues#6567
4d4c51f5b0168775fd6e8d22b9099bfbbae5313c authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>It is optional.
QubesOS/qubes-issues#6567
a1f6b0061f8f2bcdc17421a3e005d00cea61f1d7 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>RPM does it itself there (moves to fstab.rpmorig).
QubesOS/qubes-issues#6567
da58aaf41386978f73aed847e496728155c1b4a5 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
It's no-op nowadays, because packages install their udev rules in
/lib/udev/rules.d. And removin...
python2 is not supported anymore
QubesOS/qubes-issues#5297
a1b54544952704bac825120becb7a7facc9b6a4d authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>QubesOS/qubes-issues#6567
23f44602240615e1b25bc9e80a474fded2950e76 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>QubesOS/qubes-issues#6567
dd336b3b5c25cd69fe654af133ec1f8347c1e225 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
/usr/share/qubes/xdg-overrides ships a bunch of symlinks not present
during build. This will req...
To require systemd-random-seed, show a config file in the package
instead of a (seemingly) broke...
It's a Fedora-specific package
QubesOS/qubes-issues#6567
6f6807b8999c84f15016ddbd353ab91d7f693915 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>OBS does not support @BACKEND_VMM@ replacement, use rpm macro instead.
QubesOS/qubes-issues#6567
9026a76eebb3c77a2c10d108ee9a7859f8b8b265 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>26a996ed0f30245e384551392a2410f5d393364d authored about 1 year ago by Frédéric Pierret (fepitre) <[email protected]>
If a VM is set to use a disposable VM to handle URLs and is also its
also default disposable VM ...
* origin/pr/468:
qfile-unpacker should not be an easy root hole
qfile-unpacker is setuid root so that it can call chroot(). Right now,
it will happily change i...
QubesDB path length limit doesn't allow full qrexec service name length.
This needs some better ...
Checking for qubes-qrexec-agent service is meant (among other things) to
detect for chroot, but ...
0d3df596931526c73b5b632e42a2262f8a0aed80 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
* origin/pr/466:
Make gnome-software work a bit better in a template
Set GIO_USE_NETWORK_MONITOR=base variable to avoid gnome-software
refusing any actual action jus...
'du --files0-from' was added to coreutils v5.3.0 on 2005-01-08, but
'find -files0-from' was add...
e14821446744561908a5abf02bdf076cca680bae authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
Some users report than with the current reclaim speed still take a long
time to release memory a...
a26854adb44c3b3201b1a272e11c5703680d7208 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
Recent Fedora broke firefox.desktop, by setting DBusActivatable=true,
while having invalid dbus ...
57fa6b4e1df766d900d6aa20a9c64e48c3e5676f authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
* origin/pr/461:
Add missing nft rule for ipv6 that is present for ipv4.
Add missing nft rul...
* origin/pr/459:
qvm-copy(-to-vm.gnome): fix size calculation for directories
qfile-agent: f...
* origin/pr/458:
Provide a alternate qfile-unpacker that is not SELinux-confined
* origin/pr/456:
ci: clone qubes-linux-utils, build and install its qrexec-lib
qfile-agent: ...
b640385d27e7d4bc9f221aa8549bf021b8925f9a authored about 1 year ago by 1cho1ce <[email protected]>
17c86bf771bd2a48d05ba751787daefa28689e45 authored about 1 year ago by 1cho1ce <[email protected]>
4df26806cb64b6d7d3f7ba315a2a771c29469290 authored about 1 year ago by 1cho1ce <[email protected]>
Fix mixed up IPv4 vs IPv6 gateway with NetworkManager based setup
05f5b8c8c6b2ad95ffc19f258d461af9a6e70628 authored about 1 year ago by Marek Marczykowski-Górecki <[email protected]>
Fix the case when qube provides IPv6 to others (for example via VPN), but
isn't itself connected...
Sum up only the sizes of regular files but not of directory inodes
themselves, so as to match qr...
$FILECOPY_TOTAL_SIZE was rounded up to the next KB by du, so qfile-agent
should round up the run...
3d6ef23896a646eca1bf093c196a36debbdc8788 authored about 1 year ago by Rusty Bird <[email protected]>
Using this in the Qubes executor will allow using the Qubes executor
with SELinux enforcing.
2aad93d17608b6de5a16cfeaebbbe533fa9d2e59 authored over 1 year ago by Rusty Bird <[email protected]>
Do not try to convert a relative pathname argument to an absolute
pathname. There were several w...
caf27a19e1f2e747fdca98c50fe92ec5ce6197b5 authored over 1 year ago by Rusty Bird <[email protected]>
6b98ff299b3c01fcc36b0894aac872fa8d1a9a28 authored over 1 year ago by Marek Marczykowski-Górecki <[email protected]>
* origin/pr/451:
Fix qubes.TemplateSearch with repo_gpgcheck=1
* origin/pr/453:
Remove outdated comment
* origin/pr/454:
Fix missing path separator for /net-config qubesdb prefix
d831b87b285895cf26c5b76e6a3f743af42574be authored over 1 year ago by Jonne Mickelin Sätherblom <[email protected]>
These protocols increase the attack surface of a VM that is exposed to
attackers that are networ...
Fixes QubesOS/qubes-issues#7237
Replaces #449
9278f0ddb3c0210ba88389c02c67cd21c3250197 authored over 1 year ago by Marek Marczykowski-Górecki <[email protected]>
* origin/pr/450:
Do not disable tracker and evolution-data-server in AppVMs
Add the signature from the master key.
936368477c1213e8c68619fd4ac3919af3097529 authored over 1 year ago by Marek Marczykowski-Górecki <[email protected]>
It used to be changed with a patch, but now we can configure the value
with unmodified kernel to...
qubes-core-agent-dom0-updates was missing a dependency on
qubes-repo-templates, so the OpenPGP k...
Contrary to initial tests, disbling those do break some applications.
So, do not disable them by...