-
-
Notifications
You must be signed in to change notification settings - Fork 25
Add device info to qrexec call argument #40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025091715-4.3&flavor=pull-requests Test run included the following:
Upload failures
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025081011-4.3&flavor=update
Failed tests17 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/149225#dependencies 84 fixed
Unstable testsPerformance TestsPerformance degradation:14 performance degradations
Remaining performance tests:160 tests
|
3a47e12
to
160f863
Compare
This allows setting policy for individual devices, not only device types. It relies on USB qube (or wherever the device is connected) giving accurate device info, but since it's going to be granted at least partial control it needs to be trusted to some degree anyway. Build the device info based on type/vendor/product/revision (the PRODUCT property) and physical location (USB controller + port in case of USB device). The latter can be disabled, to build a policy that allows given device in any port. Fixes QubesOS/qubes-issues#3604
This allows setting policy for individual devices, not only device
types. It relies on USB qube (or wherever the device is connected)
giving accurate device info, but since it's going to be granted at least
partial control it needs to be trusted to some degree anyway.
Build the device info based on type/vendor/product/revision (the PRODUCT
property) and physical location (USB controller + port in case of USB
device). The latter can be disabled, to build a policy that allows
given device in any port.
Fixes QubesOS/qubes-issues#3604