Ecosyste.ms: OpenCollective
An open API service for software projects hosted on Open Collective.
github.com/QubesOS/qubes-app-linux-input-proxy
https://github.com/QubesOS/qubes-app-linux-input-proxy
Improve readability.
78c53a3429ba4a659f5eceb4d519147f2aaa01ff authored almost 7 years ago
Use socat to connect input-proxy-sender and input-proxy-receiver
processes directly (without qre...
- string.uppercase -> string.ascii_uppercase
- str/bytes on handling subprocesses
- buffering is...
b2df1a9d01155c4e77f785877c6789a194e1b5f3 authored almost 7 years ago
f6eaa6f63692f45d55dfe712bd075ae42207ca4c authored almost 7 years ago
b5ae6c16f8b038997bfc9f7a0ed5dbd932c4d931 authored about 7 years ago
d16212d677cc0df9d828ec4da1ed97e59fee2ed0 authored over 7 years ago
Since "allow all" sudo configuration may not be present, ship specific
configuration needed by t...
d98961fff8193e751307e9d6e869d9254194285a authored over 7 years ago
* qubesos/pr/4:
Move security warning to qubes-doc
3625dfbc80730951a80476ad4282ecf08086358f authored over 7 years ago
1904d06c61a00c66c937ef09915b7e135a356cdb authored over 7 years ago
There are some keyboard-like devices (like multimedia keys, apparently
visible as separate devic...
See: https://github.com/QubesOS/qubes-doc/pull/310#discussion_r106574106
1ef00baf229ef8426e57b5ca5f1a6fec50c59f47 authored almost 8 years agoMove to qubes-builder
Signed-off-by: Marek Marczykowski-Górecki <[email protected]>
240b73ca66777d70c7767580a820d2ea246aaa25 authored about 8 years ago1a8ff213d2ca08d505bd4df3cf66c06ffd82fe75 authored about 8 years ago
51b774ff290d03dc5c92e20e54ee3a884e71e929 authored over 8 years ago
It is one device, don't look for separate mouse and keyboard.
80a5d42fd8f889cdfc60edaea02f1e9984581d50 authored over 8 years ago61799816db83f73cb19fc54b71c6c3dc7838fb2e authored over 8 years ago
On fc23-based dom0 a single mouse+keyboard device is listed as two
devices (one in "pointer" sec...
xinput tests-xi2 output is slightly different - event values are in
'valuators', not 'flags' sec...
During tests Whonix VMs do not have network access, so it isn't possible
to install required sof...
On Fedora it doesn't matter because /bin is symlinked to /usr/bin
QubesOS/qubes-issues#1930
6215323f366a3b275f34380aa8e8abbc85cd02d8 authored over 8 years agoQubesOS/qubes-issues#1926
fec2b5525e1b56a0dbbaa8a5e6abc463413e3330 authored over 8 years agobe7703b40f57608346a721ec221f5ea0936a40e3 authored over 8 years ago
e438b3611f30703f118f1b7a15daa8b56cce6c0a authored over 8 years ago
5e34df7c7dc7f74840d2e0dfe1083611f04f235f authored over 8 years ago
920e58e44de25ef98256870187d239dc5f71a7ed authored over 8 years ago
This requires protocol change.
Fixes QubesOS/qubes-issues#1679
227cee920d2af074bd0414e5b88505d006e1dbb6 authored over 8 years ago078a4b240e1716e8a3264393ffca70826e240dda authored over 8 years ago
Make is sensitive on space/tab usage.
QubesOS/qubes-issues#1984
cec54cca33c6a88950cfb14e072dbed71129fd89 authored over 8 years ago
* qubesos/pr/3:
Update to allow build from qubes-builder
Initial release 1.0.4 for debian
Q...
667676479725d5df89cfc985d28f182b9f62e960 authored over 8 years ago7762f4e0b09dda90c39df0cbf9b48ec2625c0a34 authored over 8 years ago
83f86c59d7249b45ee5487d5cc688c6770b42d6b authored over 8 years ago
cc6fc3a311f0b65b0b6ed66df230e625ee3f18e4 authored almost 9 years ago
This will start again appropriate systemd units, so if any of them
failed initially because of i...
Otherwise /dev/uinput permissions will not be fixed by udev rule.
Fixes QubesOS/qubes-issues#1613
9c23c42c551168886cc9a88629496577a6d5d710 authored almost 9 years agoFixes QubesOS/qubes-issues#1881
ae68823298bfda7c0e532869d2bd77f04da7187d authored almost 9 years ago317031e14f761c97ea23553172feae4cfd75a1aa authored almost 9 years ago
Protocol is already designed to handle minor changes in device
capabilities info (bigger or smal...
Fixes QubesOS/qubes-issues#1513
299dd2088028abe8857ebac3df3df530ed357c2c authored almost 9 years ago
This way possible fallback service wouldn't be triggered for already
disconnected device
QubesO...
87e76510244e3ca0a0261292a2532298cd4069e4 authored almost 9 years ago
1. Allow service qubes.InputKeyboard to handle also mouse events -
allowing keyboard events give...
This makes it possible to start input-proxy-receiver as normal user (so
no need for user=root in...
f3a88242ae32729bd82adf920abcc9b35946b12a authored about 9 years ago
QubesOS/qubes-issues#1436
42441df9b6dfacb304d8925cc05afef1b00b7163 authored about 9 years ago2e552bb373e1756fb229a12938fe431a91629359 authored about 9 years ago
5aa3b600c5d591647f1f18b4b614ff6e3414e935 authored about 9 years ago
Now, the only think user needs to do, is to configure qrexec policy.
Also rename packages (but ...
53206c11f8374f0e9ae5a7b45ea62bda160fc16e authored about 9 years ago9f185d52c9bcd1785a486ca77d1087ddb65797db authored over 9 years ago
7477e06b89eca837a732cf98851fb2642add00bc authored over 9 years ago
a0ad76d1dc3715cc8e4ff24e30e65e254cfa7cba authored over 9 years ago