New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make it easier to install new qrexec policy #1706

Closed
marmarek opened this Issue Jan 29, 2016 · 1 comment

Comments

Projects
None yet
3 participants
@marmarek
Member

marmarek commented Jan 29, 2016

Currently when one want to install some VM-VM qrexec service, he/she still needs to create at least one file in dom0: qrexec policy. If there is no such policy, service call will be denied (after a message that policy is missing).
It may be good idea to ask in such a case whether some default policy should be created (default: ask for every call). Such question should be hard to accept by default - at least having "No" as default, but better having non-standard action (like "draw a cat here" ;) ).
This should ease implementing new qrexec services.

@bnvk any idea for such hard to accept by mistake window?

@marmarek marmarek added this to the Release 3.1 milestone Jan 29, 2016

@andrewdavidwong andrewdavidwong added the UX label May 31, 2016

andrewdavidwong added a commit that referenced this issue May 31, 2016

@unman unman referenced this issue in QubesOS/qubes-core-admin-linux Apr 20, 2017

Merged

Prompt to create policy file for qubes-rpc if not present. #24

@unman

This comment has been minimized.

Show comment
Hide comment
@unman

unman Apr 24, 2017

Member

@andrewdavidwong Close please

Member

unman commented Apr 24, 2017

@andrewdavidwong Close please

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment