-
-
Notifications
You must be signed in to change notification settings - Fork 82
use qubes.VMRootExec/qubes.VMRootShell services when root needed #403
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
238061f to
8034cd2
Compare
When running a command as root is requested, use qubes.VMRootExec/qubes.VMRootShell services, instead of specifying target user directly. The explicit target user can be specified only from dom0, but alternative qrexec service can be used also from GUI domain - if policy allows of course. QubesOS/qubes-issues#4186
8034cd2 to
f38c1d4
Compare
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #403 +/- ##
==========================================
- Coverage 76.10% 76.07% -0.03%
==========================================
Files 53 53
Lines 9287 9305 +18
==========================================
+ Hits 7068 7079 +11
- Misses 2219 2226 +7 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2026011018-4.3-debian&flavor=pull-requests Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025111104-4.3&flavor=update Failed testsNo failures! Fixed failuresCompared to: https://openqa.qubes-os.org/tests/158999#dependencies 10 fixed
Unstable testsDetailsPerformance TestsPerformance degradation:No issues Remaining performance tests:13 tests
|
When running a command as root is requested, use
qubes.VMRootExec/qubes.VMRootShell services, instead of specifying
target user directly. The explicit target user can be specified only
from dom0, but alternative qrexec service can be used also from GUI
domain - if policy allows of course.
QubesOS/qubes-issues#4186