Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upUnable to disable autostart applications in fedora23 #2351
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Oct 1, 2016
Contributor
Also, using OnlyShowIn= (empty value) instead of Hidden=true appears to have the same effect.
|
Also, using |
andrewdavidwong
added
the
C: Fedora
label
Oct 1, 2016
andrewdavidwong
added this to the Release 3.2 milestone
Oct 1, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 2, 2016
Member
Take a look here: https://github.com/QubesOS/qubes-gui-agent-linux/blob/master/appvm-scripts/usrbin/qubes-session#L43-L45
It is done this way exactly to make SSH_AUTH_SOCK (and others) available in environment. So, for now the only way is to start ssh-agent later (manually?)...
Any better idea for propagation environment variables from autostart applications?
|
Take a look here: https://github.com/QubesOS/qubes-gui-agent-linux/blob/master/appvm-scripts/usrbin/qubes-session#L43-L45 It is done this way exactly to make |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Oct 5, 2016
Contributor
Ah yes. I was really confused as to how the env vars were being propagated.
You may want to consider propagating env vars from autostart scripts in a way like this jpouellet/qubes-gui-agent-linux@e0d8bf9 (untested - just to illustrate the idea) where the autostart.desktop Exec would actually point to a wrapper which extracts the desired var from the agent's stdout and qubes-session-export's it.
Although, upon looking into it I do not see why nm-applet actually needs gnome-keychain in qubes. It appears to only be used when the user wishes to only save a network credential for their own user (as opposed to system-wide, and having root put it in /etc/NetworkManager/system-connections), but in the case of a net-vm with passwordless sudo, these appear to me to have no meaningful difference at all. Am I missing something?
|
Ah yes. I was really confused as to how the env vars were being propagated. You may want to consider propagating env vars from autostart scripts in a way like this jpouellet/qubes-gui-agent-linux@e0d8bf9 (untested - just to illustrate the idea) where the autostart.desktop Exec would actually point to a wrapper which extracts the desired var from the agent's stdout and qubes-session-export's it. Although, upon looking into it I do not see why nm-applet actually needs gnome-keychain in qubes. It appears to only be used when the user wishes to only save a network credential for their own user (as opposed to system-wide, and having root put it in /etc/NetworkManager/system-connections), but in the case of a net-vm with passwordless sudo, these appear to me to have no meaningful difference at all. Am I missing something? |
added a commit
to marmarek/old-qubes-gui-agent-linux
that referenced
this issue
Nov 8, 2016
marmarek
referenced this issue
in marmarek/old-qubes-gui-agent-linux
Nov 8, 2016
Merged
Do not unconditionally load gnome-keyring environment #21
marmarek
closed this
in
marmarek/old-qubes-gui-agent-linux#21
Nov 18, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 18, 2016
Member
Automated announcement from builder-github
The package qubes-gui-vm-3.2.8-1.fc23 has been pushed to the r3.2 testing repository for the Fedora fc23 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r3.2-current-testing
|
Automated announcement from builder-github The package
|
marmarek
added
the
r3.2-fc23-cur-test
label
Nov 18, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 18, 2016
Member
Automated announcement from builder-github
The package qubes-gui-vm-3.2.8-1.fc24 has been pushed to the r3.2 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r3.2-current-testing
|
Automated announcement from builder-github The package
|
marmarek
added
the
r3.2-fc24-cur-test
label
Nov 18, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 18, 2016
Member
Automated announcement from builder-github
The package qubes-gui-agent_3.2.8+deb8u1 has been pushed to the r3.2 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
|
Automated announcement from builder-github The package
|
marmarek
added
the
r3.2-jessie-cur-test
label
Nov 18, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 18, 2016
Member
Automated announcement from builder-github
The package qubes-gui-agent_3.2.8+deb9u1 has been pushed to the r3.2 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
|
Automated announcement from builder-github The package
|
marmarek
added
the
r3.2-stretch-cur-test
label
Nov 18, 2016
marmarek
referenced this issue
Nov 19, 2016
Open
Enigmail 1.9 is incompatible with Split GPG on Debian 8 #2170
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 4, 2016
Member
Automated announcement from builder-github
The package qubes-gui-agent_3.2.8+deb8u1 has been pushed to the r3.2 stable repository for the Debian jessie template.
To install this update, please use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
|
Automated announcement from builder-github The package
|
marmarek
added
r3.2-jessie-stable
and removed
r3.2-jessie-cur-test
labels
Dec 4, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 4, 2016
Member
Automated announcement from builder-github
The package qubes-gui-vm-3.2.9-1.fc23 has been pushed to the r3.2 stable repository for the Fedora fc23 template.
To install this update, please use the standard update command:
sudo yum update
|
Automated announcement from builder-github The package
|
marmarek
added
r3.2-fc23-stable
and removed
r3.2-fc23-cur-test
labels
Dec 4, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 4, 2016
Member
Automated announcement from builder-github
The package qubes-gui-vm-3.2.9-1.fc24 has been pushed to the r3.2 stable repository for the Fedora fc24 template.
To install this update, please use the standard update command:
sudo yum update
|
Automated announcement from builder-github The package
|
marmarek
added
r3.2-fc24-stable
and removed
r3.2-fc24-cur-test
labels
Dec 4, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 6, 2016
Member
Automated announcement from builder-github
The package qubes-gui-agent_3.2.8+deb9u1 has been pushed to the r3.2 stable repository for the Debian stretch template.
To install this update, please use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
|
Automated announcement from builder-github The package
|
marmarek
added
r3.2-stretch-stable
and removed
r3.2-stretch-cur-test
labels
Dec 6, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 14, 2016
Member
Related discussion: https://groups.google.com/d/msgid/qubes-devel/20161108233339.GS22572%40mail-itl
|
Related discussion: https://groups.google.com/d/msgid/qubes-devel/20161108233339.GS22572%40mail-itl |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
ptitdoc
Mar 15, 2017
Gnome keyring is apparently still installed and/or a dependency of the qubes-agent (at least in archlinux). Can we also clean this dependency up along with the qubes autostart dropin ?
Or should we keep it as a "default ssh agent" program until a qubes specific agent is used (such as a split ssh agent).
If the answer is "keep it for now", we should at least add a profile.d file with the following line so that the users benefits from the ssh agent that is installed and running:
export SSH_AUTH_SOCK=/run/user/1000/keyring/ssh
ptitdoc
commented
Mar 15, 2017
•
|
Gnome keyring is apparently still installed and/or a dependency of the qubes-agent (at least in archlinux). Can we also clean this dependency up along with the qubes autostart dropin ? Or should we keep it as a "default ssh agent" program until a qubes specific agent is used (such as a split ssh agent). If the answer is "keep it for now", we should at least add a profile.d file with the following line so that the users benefits from the ssh agent that is installed and running: |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Mar 15, 2017
Contributor
Idk about arch specifics, but can confirm that things are working fine without gnome-keyring on fedora templates (without no-ed25519 restriction for SSH, and without any collateral regressions observed over the past few months).
I'd say proceed with removing it as a dependency.
|
Idk about arch specifics, but can confirm that things are working fine without gnome-keyring on fedora templates (without no-ed25519 restriction for SSH, and without any collateral regressions observed over the past few months). I'd say proceed with removing it as a dependency. |
ptitdoc
referenced this issue
Mar 16, 2017
Open
[linux-agent] Remove gnome-keyring dependency and drop-in files #2710
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Aug 19, 2017
Contributor
xref env var propagation: https://groups.google.com/d/topic/qubes-devel/gXj5KWSkPIM/discussion
|
xref env var propagation: https://groups.google.com/d/topic/qubes-devel/gXj5KWSkPIM/discussion |
jpouellet commentedOct 1, 2016
Qubes OS version (e.g.,
R3.1):R3.2
Affected TemplateVMs (e.g.,
fedora-23, if applicable):fedora-23
General notes:
I am trying to use the actual OpenSSH ssh-agent instead of gnome-keychain because it does not support ed25519 keys, and I use them.
According to the Qubes autostart readme and the xdg autostart spec, I should be able to set
Hidden=truein /etc/qubes/autostart/whatever.d/xx_asdf.conf to prevent whatever from starting, however trying to do this for gnome-keyring-ssh.desktop does not prevent ghome-keyring from starting.Steps to reproduce the behavior:
Expected behavior:
ssh-agent should either not be started, or possibly be started from xinitrc-common due to:
I expect something possibly like this:
Actual behavior:
Instead, I get the same thing as without any changes:
This path is the unix domain socket set up by gnome-keychain. The auth sock path used by openssh ssh-agent (/usr/bin/ssh-agent) is something like: