New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Menu entries to launch xterm and Firefox in Disposable VM are missing #2975

Closed
marmarek opened this Issue Aug 4, 2017 · 2 comments

Comments

Projects
None yet
2 participants
@marmarek
Member

marmarek commented Aug 4, 2017

Qubes OS version (e.g., R3.2): R4.0

There were hidden last minute, because underlying code is broken.
Depends on #2974

Bonus points for having those entries easily configurable - like for other VMs: #2694

@marmarek marmarek added this to the Release 4.0 milestone Aug 4, 2017

@marmarek marmarek self-assigned this Aug 4, 2017

marmarek added a commit to marmarek/qubes-desktop-linux-common that referenced this issue Aug 7, 2017

appmenus: implement creating menu entries for Disposable VM
When VM have 'appmenus-dispvm' feature set, create menu entries for
starting applications in Disposable VM based on this VM, instead of this
VM itself. This allows easily add more entries for starting standalone
applications in DispVM (previously it was hardcoded to Xterm and
Firefox).

Fixes QubesOS/qubes-issues#2694
QubesOS/qubes-issues#2975

marmarek added a commit to marmarek/qubes-mgmt-salt-dom0-qvm that referenced this issue Aug 9, 2017

marmarek added a commit to marmarek/qubes-mgmt-salt-dom0-qvm that referenced this issue Aug 9, 2017

qvm.features: fixe reporting lack of old value
Salt don't know how to serialize 'Null' object to string - which is
required to display result

QubesOS/qubes-issues#2975

marmarek added a commit to marmarek/qubes-installer-qubes-os that referenced this issue Aug 9, 2017

qubes-anaconda-addon: use qvm-default-dispvm state
Migrate settings up fedora-25-dvm to salt state, same as for other VMs

QubesOS/qubes-issues#2975

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status Aug 11, 2017

Closed

mgmt-salt-dom0-qvm v4.0.2 (r4.0) #186

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Aug 11, 2017

Automated announcement from builder-github

The package qubes-mgmt-salt-dom0-virtual-machines-4.0.4-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Automated announcement from builder-github

The package qubes-mgmt-salt-dom0-virtual-machines-4.0.4-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Oct 17, 2017

Automated announcement from builder-github

The package qubes-mgmt-salt-dom0-virtual-machines-4.0.6-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Automated announcement from builder-github

The package qubes-mgmt-salt-dom0-virtual-machines-4.0.6-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment