Ecosyste.ms: OpenCollective

An open API service for software projects hosted on Open Collective.

github.com/QubesOS/qubes-app-linux-input-proxy


https://github.com/QubesOS/qubes-app-linux-input-proxy

receiver: use helper function instead of raw bit operations

Improve readability.

78c53a3429ba4a659f5eceb4d519147f2aaa01ff authored almost 7 years ago
tests: make them working locally, outside qubes dom0

Use socat to connect input-proxy-sender and input-proxy-receiver
processes directly (without qre...

cdd0e0de7ff9ffc2416559771666844582fff4f6 authored almost 7 years ago
tests: Update for python 3

- string.uppercase -> string.ascii_uppercase
- str/bytes on handling subprocesses
- buffering is...

0c322ceede7bf72811f8bb336f131de2e6e6d071 authored almost 7 years ago
Fix GCC8 warnings

b2df1a9d01155c4e77f785877c6789a194e1b5f3 authored almost 7 years ago
spec.in: add changelog placeholder

f6eaa6f63692f45d55dfe712bd075ae42207ca4c authored almost 7 years ago
Create .spec.in and Source0

b5ae6c16f8b038997bfc9f7a0ed5dbd932c4d931 authored about 7 years ago
version 1.0.10

d16212d677cc0df9d828ec4da1ed97e59fee2ed0 authored over 7 years ago
Add sudo configuration for post-GUI startup trigger

Since "allow all" sudo configuration may not be present, ship specific
configuration needed by t...

4e67b0da3fc5b47972dfba0df62772b6d971a962 authored over 7 years ago
Ignore platform devices exposed by qemu in HVM

d98961fff8193e751307e9d6e869d9254194285a authored over 7 years ago
Merge remote-tracking branch 'qubesos/pr/4'

* qubesos/pr/4:
Move security warning to qubes-doc

8a59eda3bd75801ea8dcd6e011610d34570ed4c2 authored over 7 years ago
version 1.0.9

3625dfbc80730951a80476ad4282ecf08086358f authored over 7 years ago
travis: drop Qubes 3.1, add Qubes 4.0

1904d06c61a00c66c937ef09915b7e135a356cdb authored over 7 years ago
Use ID_INPUT_KEY udev variable to detect "keyboard"

There are some keyboard-like devices (like multimedia keys, apparently
visible as separate devic...

20ebd32a9a8ed2237f0e709a3fa2cd9701e0dc23 authored over 7 years ago
Move security warning to qubes-doc

See: https://github.com/QubesOS/qubes-doc/pull/310#discussion_r106574106

1ef00baf229ef8426e57b5ca5f1a6fec50c59f47 authored almost 8 years ago
travis: drop debootstrap workaround

Move to qubes-builder

Signed-off-by: Marek Marczykowski-Górecki <[email protected]>

240b73ca66777d70c7767580a820d2ea246aaa25 authored about 8 years ago
version 1.0.8

1a8ff213d2ca08d505bd4df3cf66c06ffd82fe75 authored about 8 years ago
tests: enable networking before (trying to) download uinput module

51b774ff290d03dc5c92e20e54ee3a884e71e929 authored over 8 years ago
Update README

Typos, formatting.

e119a1eacfdb91917195e15e6b08e1e6feba1d9c authored over 8 years ago
tests: fix combined mouse+keyboard test

It is one device, don't look for separate mouse and keyboard.

80a5d42fd8f889cdfc60edaea02f1e9984581d50 authored over 8 years ago
version 1.0.7

61799816db83f73cb19fc54b71c6c3dc7838fb2e authored over 8 years ago
tests: fix test for mouse+keyboard devices

On fc23-based dom0 a single mouse+keyboard device is listed as two
devices (one in "pointer" sec...

9e4acc2ab369ebfd4aea0759e780558e94388fe9 authored over 8 years ago
tests: adjust for fc23-based dom0

xinput tests-xi2 output is slightly different - event values are in
'valuators', not 'flags' sec...

8fd22696fdb35b0b9aae6b629ce6b40d287b8f41 authored over 8 years ago
tests: skip on Whonix templates

During tests Whonix VMs do not have network access, so it isn't possible
to install required sof...

fa0225e960a80c4542299542cdfc2fe210174c6e authored over 8 years ago
debian: udevadm is in /bin

On Fedora it doesn't matter because /bin is symlinked to /usr/bin

QubesOS/qubes-issues#1930

6215323f366a3b275f34380aa8e8abbc85cd02d8 authored over 8 years ago
travis: initial version

QubesOS/qubes-issues#1926

fec2b5525e1b56a0dbbaa8a5e6abc463413e3330 authored over 8 years ago
rpm/deb: add missing build-requires: python-setuptools

be7703b40f57608346a721ec221f5ea0936a40e3 authored over 8 years ago
version 1.0.6

e438b3611f30703f118f1b7a15daa8b56cce6c0a authored over 8 years ago
receiver: compile fix on Debian wheezy

5e34df7c7dc7f74840d2e0dfe1083611f04f235f authored over 8 years ago
version 1.0.5

920e58e44de25ef98256870187d239dc5f71a7ed authored over 8 years ago
Pass original device name, then use it sanitized and prefixed with VM name

This requires protocol change.

Fixes QubesOS/qubes-issues#1679

227cee920d2af074bd0414e5b88505d006e1dbb6 authored over 8 years ago
tests: initial version

078a4b240e1716e8a3264393ffca70826e240dda authored over 8 years ago
Makefile fix

Make is sensitive on space/tab usage.

QubesOS/qubes-issues#1984

cec54cca33c6a88950cfb14e072dbed71129fd89 authored over 8 years ago
Merge remote-tracking branch 'qubesos/pr/3'

* qubesos/pr/3:
Update to allow build from qubes-builder
Initial release 1.0.4 for debian

Q...

667676479725d5df89cfc985d28f182b9f62e960 authored over 8 years ago
Update to allow build from qubes-builder

7762f4e0b09dda90c39df0cbf9b48ec2625c0a34 authored over 8 years ago
Initial release 1.0.4 for debian

83f86c59d7249b45ee5487d5cc688c6770b42d6b authored over 8 years ago
version 1.0.4

cc6fc3a311f0b65b0b6ed66df230e625ee3f18e4 authored almost 9 years ago
sender: trigger udev add event after user login

This will start again appropriate systemd units, so if any of them
failed initially because of i...

86b955a64f4c0ac98b88c9f211f5d427bb235a28 authored almost 9 years ago
Load 'uinput' module at dom0 startup

Otherwise /dev/uinput permissions will not be fixed by udev rule.

Fixes QubesOS/qubes-issues#1613

9c23c42c551168886cc9a88629496577a6d5d710 authored almost 9 years ago
Allow additional mouse buttons

Fixes QubesOS/qubes-issues#1881

ae68823298bfda7c0e532869d2bd77f04da7187d authored almost 9 years ago
version 1.0.3

317031e14f761c97ea23553172feae4cfd75a1aa authored almost 9 years ago
receiver: handle minor protocol changes gracefully

Protocol is already designed to handle minor changes in device
capabilities info (bigger or smal...

4fee98c6ef5532526edcca4801ccf3163054a79a authored almost 9 years ago
receiver: really handle --vendor and --product parameters

Fixes QubesOS/qubes-issues#1513

299dd2088028abe8857ebac3df3df530ed357c2c authored almost 9 years ago
sender: do not treat device disconnection as an error

This way possible fallback service wouldn't be triggered for already
disconnected device

QubesO...

87e76510244e3ca0a0261292a2532298cd4069e4 authored almost 9 years ago
Handle keyboard+mouse hybrid devices properly

1. Allow service qubes.InputKeyboard to handle also mouse events -
allowing keyboard events give...

0a0b886737a0ae0ae58f13d278694671541be79b authored almost 9 years ago
Adjust permissions of /dev/uinput in dom0

This makes it possible to start input-proxy-receiver as normal user (so
no need for user=root in...

9749fc0d6f5978ad79383817d50f40f861a7f12a authored about 9 years ago
version 1.0.2

f3a88242ae32729bd82adf920abcc9b35946b12a authored about 9 years ago
Fix service paths in RPC configuration

QubesOS/qubes-issues#1436

42441df9b6dfacb304d8925cc05afef1b00b7163 authored about 9 years ago
version 1.0.1

2e552bb373e1756fb229a12938fe431a91629359 authored about 9 years ago
README: minor correction

5aa3b600c5d591647f1f18b4b614ff6e3414e935 authored about 9 years ago
Add udev, systemd and qubes-rpc configuration, split into two packages.

Now, the only think user needs to do, is to configure qrexec policy.

Also rename packages (but ...

53206c11f8374f0e9ae5a7b45ea62bda160fc16e authored about 9 years ago
doc: add security notice

9f185d52c9bcd1785a486ca77d1087ddb65797db authored over 9 years ago
doc: update udev/systemd configuration

7477e06b89eca837a732cf98851fb2642add00bc authored over 9 years ago
Initial commit

a0ad76d1dc3715cc8e4ff24e30e65e254cfa7cba authored over 9 years ago