Remove SysV-init scripts
Now dom0 uses SystemD, so init.d scripts no longer needed.
This commit is contained in:
parent
d9358a91aa
commit
e4264f4917
@ -1,79 +0,0 @@
|
|||||||
#!/bin/sh
|
|
||||||
#
|
|
||||||
# chkconfig: 2345 80 00
|
|
||||||
# description: Executes Qubes core scripts at Dom0 boot
|
|
||||||
#
|
|
||||||
### BEGIN INIT INFO
|
|
||||||
# Provides: qubes-core
|
|
||||||
# Required-Start: xend
|
|
||||||
# Default-Start: 3 4 5
|
|
||||||
# Default-Stop: 0 1 2 6
|
|
||||||
# Default-Enabled: yes
|
|
||||||
# Short-Description: Start/stop qubes-core services
|
|
||||||
# Description: Starts and stops the qubes-core serives
|
|
||||||
### END INIT INFO
|
|
||||||
|
|
||||||
# Source function library.
|
|
||||||
. /etc/rc.d/init.d/functions
|
|
||||||
|
|
||||||
|
|
||||||
start()
|
|
||||||
{
|
|
||||||
echo -n $"Executing Qubes Core scripts:"
|
|
||||||
modprobe evtchn 2> /dev/null || modprobe xen-evtchn
|
|
||||||
/usr/lib/qubes/fix_dir_perms.sh
|
|
||||||
|
|
||||||
xenstore-write /local/domain/0/name dom0
|
|
||||||
DOM0_MAXMEM=`/usr/sbin/xl info | grep total_memory | awk '{ print $3 }'`
|
|
||||||
xenstore-write /local/domain/0/memory/static-max $[ $DOM0_MAXMEM * 1024 ]
|
|
||||||
|
|
||||||
xl sched-credit -d 0 -w 512
|
|
||||||
cp /var/lib/qubes/qubes.xml /var/lib/qubes/backup/qubes-$(date +%F-%T).xml
|
|
||||||
|
|
||||||
/usr/lib/qubes/cleanup_dispvms
|
|
||||||
|
|
||||||
/usr/lib/qubes/qmemman_daemon.py
|
|
||||||
MEM_CHANGE_THRESHOLD_KB=30000
|
|
||||||
MEMINFO_DELAY_USEC=100000
|
|
||||||
/usr/lib/qubes/meminfo-writer $MEM_CHANGE_THRESHOLD_KB $MEMINFO_DELAY_USEC
|
|
||||||
|
|
||||||
/usr/lib/qubes/block_cleaner_daemon.py > /var/log/qubes/block_cleaner.log 2>&1 &
|
|
||||||
|
|
||||||
# Hide mounted devices from qubes-block list (at first udev run, only / is mounted)
|
|
||||||
for dev in `xenstore-list /local/domain/0/qubes-block-devices 2> /dev/null`; do
|
|
||||||
( eval `udevadm info -q property -n $dev|sed -e 's/\([^=]*\)=\(.*\)/export \1="\2"/'`;
|
|
||||||
/usr/lib/qubes/block_add_change > /dev/null
|
|
||||||
)
|
|
||||||
done
|
|
||||||
|
|
||||||
touch /var/lock/subsys/qubes_core
|
|
||||||
success
|
|
||||||
echo
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
stop()
|
|
||||||
{
|
|
||||||
echo -n $"Shutting down all Qubes VMs:"
|
|
||||||
qvm-shutdown -q --all --wait
|
|
||||||
rm -f /var/lock/subsys/qubes_core
|
|
||||||
killall meminfo-writer
|
|
||||||
killall qmemman_daemon.py
|
|
||||||
success
|
|
||||||
echo
|
|
||||||
}
|
|
||||||
|
|
||||||
case "$1" in
|
|
||||||
start)
|
|
||||||
start
|
|
||||||
;;
|
|
||||||
stop)
|
|
||||||
stop
|
|
||||||
;;
|
|
||||||
*)
|
|
||||||
echo $"Usage: $0 {start|stop}"
|
|
||||||
exit 3
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
|
|
||||||
exit $RETVAL
|
|
@ -1,87 +0,0 @@
|
|||||||
#!/bin/sh
|
|
||||||
#
|
|
||||||
# chkconfig: 2345 81 00
|
|
||||||
# description: Starts/stops Qubes default netvm
|
|
||||||
#
|
|
||||||
### BEGIN INIT INFO
|
|
||||||
# Provides: qubes-networking
|
|
||||||
# Required-Start: qubes-core
|
|
||||||
# Default-Start: 3 4 5
|
|
||||||
# Default-Stop: 0 1 2 6
|
|
||||||
# Default-Enabled: yes
|
|
||||||
# Short-Description: Start/stop qubes networking
|
|
||||||
# Description: Starts and stops the qubes networking
|
|
||||||
### END INIT INFO
|
|
||||||
|
|
||||||
|
|
||||||
#
|
|
||||||
# Source function library.
|
|
||||||
. /etc/rc.d/init.d/functions
|
|
||||||
|
|
||||||
NETVM=$(qubes-prefs --get default-netvm)
|
|
||||||
|
|
||||||
get_running_netvms() {
|
|
||||||
# Actually get running VMs with PCI devices attached
|
|
||||||
RUNNING_VMS=`xl list | tail -n +3 | cut -f 1 -d " "`
|
|
||||||
RUNNING_NETVMS=""
|
|
||||||
for VM in $RUNNING_VMS; do
|
|
||||||
if [ -n "`xl pci-list $VM`" ]; then
|
|
||||||
echo "$VM"
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
}
|
|
||||||
|
|
||||||
start()
|
|
||||||
{
|
|
||||||
if [ x$NETVM = x ] ; then
|
|
||||||
|
|
||||||
echo WARNING: Qubes NetVM not configured!
|
|
||||||
echo -n $"Doing nothing:"
|
|
||||||
|
|
||||||
else
|
|
||||||
|
|
||||||
echo -n $"Starting default NetVM:"
|
|
||||||
DISPLAY=:0 sg qubes "qvm-start -q --no-guid $NETVM" || exit 1
|
|
||||||
|
|
||||||
fi
|
|
||||||
touch /var/lock/subsys/qubes_netvm
|
|
||||||
success
|
|
||||||
echo
|
|
||||||
return 0
|
|
||||||
}
|
|
||||||
|
|
||||||
stop()
|
|
||||||
{
|
|
||||||
if [ x$NETVM = x ] ; then
|
|
||||||
|
|
||||||
echo WARNING: Qubes NetVM not configured!
|
|
||||||
echo -n $"Doing nothing:"
|
|
||||||
|
|
||||||
else
|
|
||||||
echo -n $"Stopping NetVMs:"
|
|
||||||
for VM in `get_running_netvms`; do
|
|
||||||
qvm-shutdown -q --force --wait $VM
|
|
||||||
done
|
|
||||||
|
|
||||||
fi
|
|
||||||
rm -f /var/lock/subsys/qubes_netvm
|
|
||||||
success
|
|
||||||
echo
|
|
||||||
|
|
||||||
return 0
|
|
||||||
}
|
|
||||||
|
|
||||||
case "$1" in
|
|
||||||
start)
|
|
||||||
start
|
|
||||||
;;
|
|
||||||
stop)
|
|
||||||
stop
|
|
||||||
;;
|
|
||||||
*)
|
|
||||||
echo $"Usage: $0 {start|stop}"
|
|
||||||
exit 3
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
|
|
||||||
exit $RETVAL
|
|
@ -1,69 +0,0 @@
|
|||||||
#!/bin/sh
|
|
||||||
#
|
|
||||||
# chkconfig: 2345 82 00
|
|
||||||
# description: Sets up DVM savefile at Dom0 boot
|
|
||||||
#
|
|
||||||
### BEGIN INIT INFO
|
|
||||||
# Provides: qubes-dvm
|
|
||||||
# Required-Start: qubes-networking
|
|
||||||
# Default-Start: 3 4 5
|
|
||||||
# Default-Stop: 0 1 2 6
|
|
||||||
# Default-Enabled: yes
|
|
||||||
# Short-Description: Sets up DVM savefile at Dom0 boot
|
|
||||||
# Description: Sets up DVM savefile at Dom0 boot
|
|
||||||
### END INIT INFO
|
|
||||||
|
|
||||||
# Source function library.
|
|
||||||
. /etc/rc.d/init.d/functions
|
|
||||||
|
|
||||||
start()
|
|
||||||
{
|
|
||||||
echo -n "Setting up DVM savefile at Dom0 boot:"
|
|
||||||
|
|
||||||
printf "\x00\x00\x00\x00" > /var/run/qubes/dispVM_seq
|
|
||||||
chown root:qubes /var/run/qubes/dispVM_seq
|
|
||||||
chmod 660 /var/run/qubes/dispVM_seq
|
|
||||||
DEFAULT=/var/lib/qubes/dvmdata/default_savefile
|
|
||||||
DEFAULT_CONFIG=/var/lib/qubes/dvmdata/default_dvm.conf
|
|
||||||
# setup DispVM files only when they exists
|
|
||||||
if [ -r $DEFAULT ]; then
|
|
||||||
ln -s $DEFAULT_CONFIG /var/run/qubes/current_dvm.conf
|
|
||||||
if [ -f /var/lib/qubes/dvmdata/dont_use_shm ] ; then
|
|
||||||
ln -s $DEFAULT /var/run/qubes/current_savefile
|
|
||||||
else
|
|
||||||
mkdir -m 770 /dev/shm/qubes
|
|
||||||
chown root.qubes /dev/shm/qubes
|
|
||||||
cp -a $(readlink $DEFAULT) /dev/shm/qubes/current_savefile
|
|
||||||
chown root.qubes /dev/shm/qubes/current_savefile
|
|
||||||
chmod 660 /dev/shm/qubes/current_savefile
|
|
||||||
ln -s /dev/shm/qubes/current_savefile /var/run/qubes/current_savefile
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
|
|
||||||
touch /var/lock/subsys/qubes_setupdvm
|
|
||||||
success
|
|
||||||
echo
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
stop()
|
|
||||||
{
|
|
||||||
rm -f /var/lock/subsys/qubes_setupdvm
|
|
||||||
success
|
|
||||||
echo
|
|
||||||
}
|
|
||||||
|
|
||||||
case "$1" in
|
|
||||||
start)
|
|
||||||
start
|
|
||||||
;;
|
|
||||||
stop)
|
|
||||||
stop
|
|
||||||
;;
|
|
||||||
*)
|
|
||||||
echo $"Usage: $0 {start|stop}"
|
|
||||||
exit 3
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
|
|
||||||
exit $RETVAL
|
|
@ -27,12 +27,6 @@
|
|||||||
|
|
||||||
%{!?version: %define version %(cat version)}
|
%{!?version: %define version %(cat version)}
|
||||||
|
|
||||||
%if %{fedora} >= 15
|
|
||||||
%{!?use_systemd: %define use_systemd 1}
|
|
||||||
%else
|
|
||||||
%{!?use_systemd: %define use_systemd 0}
|
|
||||||
%endif
|
|
||||||
|
|
||||||
%define _dracutmoddir /usr/lib/dracut/modules.d
|
%define _dracutmoddir /usr/lib/dracut/modules.d
|
||||||
%if %{fedora} < 17
|
%if %{fedora} < 17
|
||||||
%define _dracutmoddir /usr/share/dracut/modules.d
|
%define _dracutmoddir /usr/share/dracut/modules.d
|
||||||
@ -49,12 +43,10 @@ License: GPL
|
|||||||
URL: http://www.qubes-os.org
|
URL: http://www.qubes-os.org
|
||||||
BuildRequires: xen-devel
|
BuildRequires: xen-devel
|
||||||
BuildRequires: ImageMagick
|
BuildRequires: ImageMagick
|
||||||
%if %{use_systemd}
|
|
||||||
BuildRequires: systemd-units
|
BuildRequires: systemd-units
|
||||||
Requires(post): systemd-units
|
Requires(post): systemd-units
|
||||||
Requires(preun): systemd-units
|
Requires(preun): systemd-units
|
||||||
Requires(postun): systemd-units
|
Requires(postun): systemd-units
|
||||||
%endif
|
|
||||||
Requires: python, xen-runtime, pciutils, python-inotify, python-daemon, kernel-qubes-dom0
|
Requires: python, xen-runtime, pciutils, python-inotify, python-daemon, kernel-qubes-dom0
|
||||||
Requires: qubes-qrexec-dom0
|
Requires: qubes-qrexec-dom0
|
||||||
Requires: python-lxml
|
Requires: python-lxml
|
||||||
@ -93,13 +85,6 @@ done
|
|||||||
|
|
||||||
cd dom0
|
cd dom0
|
||||||
|
|
||||||
%if !%{use_systemd}
|
|
||||||
mkdir -p $RPM_BUILD_ROOT/etc/init.d
|
|
||||||
cp init.d/qubes_core $RPM_BUILD_ROOT/etc/init.d/
|
|
||||||
cp init.d/qubes_netvm $RPM_BUILD_ROOT/etc/init.d/
|
|
||||||
cp init.d/qubes_setupdvm $RPM_BUILD_ROOT/etc/init.d/
|
|
||||||
%else
|
|
||||||
|
|
||||||
mkdir -p $RPM_BUILD_ROOT/usr/lib/systemd/system
|
mkdir -p $RPM_BUILD_ROOT/usr/lib/systemd/system
|
||||||
cp systemd/qubes-block-cleaner.service $RPM_BUILD_ROOT%{_unitdir}
|
cp systemd/qubes-block-cleaner.service $RPM_BUILD_ROOT%{_unitdir}
|
||||||
cp systemd/qubes-core.service $RPM_BUILD_ROOT%{_unitdir}
|
cp systemd/qubes-core.service $RPM_BUILD_ROOT%{_unitdir}
|
||||||
@ -107,7 +92,6 @@ cp systemd/qubes-setupdvm.service $RPM_BUILD_ROOT%{_unitdir}
|
|||||||
cp systemd/qubes-meminfo-writer.service $RPM_BUILD_ROOT%{_unitdir}
|
cp systemd/qubes-meminfo-writer.service $RPM_BUILD_ROOT%{_unitdir}
|
||||||
cp systemd/qubes-netvm.service $RPM_BUILD_ROOT%{_unitdir}
|
cp systemd/qubes-netvm.service $RPM_BUILD_ROOT%{_unitdir}
|
||||||
cp systemd/qubes-qmemman.service $RPM_BUILD_ROOT%{_unitdir}
|
cp systemd/qubes-qmemman.service $RPM_BUILD_ROOT%{_unitdir}
|
||||||
%endif
|
|
||||||
|
|
||||||
mkdir -p $RPM_BUILD_ROOT/usr/bin/
|
mkdir -p $RPM_BUILD_ROOT/usr/bin/
|
||||||
cp qvm-tools/qvm-* $RPM_BUILD_ROOT/usr/bin
|
cp qvm-tools/qvm-* $RPM_BUILD_ROOT/usr/bin
|
||||||
@ -276,7 +260,6 @@ echo XENCONSOLED_LOG_HYPERVISOR=yes >> /etc/sysconfig/xenconsoled
|
|||||||
echo XENCONSOLED_LOG_GUESTS=yes >> /etc/sysconfig/xenconsoled
|
echo XENCONSOLED_LOG_GUESTS=yes >> /etc/sysconfig/xenconsoled
|
||||||
|
|
||||||
|
|
||||||
%if %{use_systemd}
|
|
||||||
systemctl --no-reload enable qubes-core.service >/dev/null 2>&1
|
systemctl --no-reload enable qubes-core.service >/dev/null 2>&1
|
||||||
systemctl --no-reload enable qubes-netvm.service >/dev/null 2>&1
|
systemctl --no-reload enable qubes-netvm.service >/dev/null 2>&1
|
||||||
systemctl --no-reload enable qubes-setupdvm.service >/dev/null 2>&1
|
systemctl --no-reload enable qubes-setupdvm.service >/dev/null 2>&1
|
||||||
@ -286,22 +269,6 @@ systemctl --no-reload disable xend.service >/dev/null 2>&1
|
|||||||
systemctl --no-reload disable xendomains.service >/dev/null 2>&1
|
systemctl --no-reload disable xendomains.service >/dev/null 2>&1
|
||||||
systemctl demon-reload >/dev/null 2>&1 || :
|
systemctl demon-reload >/dev/null 2>&1 || :
|
||||||
|
|
||||||
%else
|
|
||||||
|
|
||||||
chkconfig --add qubes_core || echo "WARNING: Cannot add service qubes_core!"
|
|
||||||
chkconfig --add qubes_netvm || echo "WARNING: Cannot add service qubes_netvm!"
|
|
||||||
chkconfig --add qubes_setupdvm || echo "WARNING: Cannot add service qubes_setupdvm!"
|
|
||||||
|
|
||||||
chkconfig --level 5 qubes_core on || echo "WARNING: Cannot enable service qubes_core!"
|
|
||||||
chkconfig --level 5 qubes_netvm on || echo "WARNING: Cannot enable service qubes_netvm!"
|
|
||||||
chkconfig --level 5 qubes_setupdvm on || echo "WARNING: Cannot enable service qubes_setupdvm!"
|
|
||||||
|
|
||||||
# Conflicts with libxl stack, so disable it
|
|
||||||
service xend stop
|
|
||||||
chkconfig --level 5 xend off
|
|
||||||
|
|
||||||
%endif
|
|
||||||
|
|
||||||
HAD_SYSCONFIG_NETWORK=yes
|
HAD_SYSCONFIG_NETWORK=yes
|
||||||
if ! [ -e /etc/sysconfig/network ]; then
|
if ! [ -e /etc/sysconfig/network ]; then
|
||||||
HAD_SYSCONFIG_NETWORK=no
|
HAD_SYSCONFIG_NETWORK=no
|
||||||
@ -345,15 +312,6 @@ if ! grep -q ^qubes: /etc/group ; then
|
|||||||
groupadd qubes
|
groupadd qubes
|
||||||
fi
|
fi
|
||||||
|
|
||||||
#if [ "$1" -gt 1 ] ; then
|
|
||||||
# upgrading already installed package...
|
|
||||||
|
|
||||||
# Do not restart core during upgrade
|
|
||||||
# most upgrades only modifies qvm-* tools
|
|
||||||
# and it makes no sense to force all VMs shutdown
|
|
||||||
# /etc/init.d/qubes_core stop
|
|
||||||
#fi
|
|
||||||
|
|
||||||
%triggerin -- xen
|
%triggerin -- xen
|
||||||
|
|
||||||
%triggerin -- xen-runtime
|
%triggerin -- xen-runtime
|
||||||
@ -391,11 +349,6 @@ fi
|
|||||||
|
|
||||||
%files
|
%files
|
||||||
%defattr(-,root,root,-)
|
%defattr(-,root,root,-)
|
||||||
%if !%{use_systemd}
|
|
||||||
/etc/init.d/qubes_core
|
|
||||||
/etc/init.d/qubes_netvm
|
|
||||||
/etc/init.d/qubes_setupdvm
|
|
||||||
%endif
|
|
||||||
%config(noreplace) %attr(0664,root,qubes) %{_sysconfdir}/qubes/qmemman.conf
|
%config(noreplace) %attr(0664,root,qubes) %{_sysconfdir}/qubes/qmemman.conf
|
||||||
/usr/bin/qvm-*
|
/usr/bin/qvm-*
|
||||||
/usr/bin/qubes-*
|
/usr/bin/qubes-*
|
||||||
@ -440,14 +393,12 @@ fi
|
|||||||
/usr/lib/qubes/startup-misc.sh
|
/usr/lib/qubes/startup-misc.sh
|
||||||
/usr/lib/qubes/prepare_volatile_img.sh
|
/usr/lib/qubes/prepare_volatile_img.sh
|
||||||
%attr(4750,root,qubes) /usr/lib/qubes/qfile-dom0-unpacker
|
%attr(4750,root,qubes) /usr/lib/qubes/qfile-dom0-unpacker
|
||||||
%if %{use_systemd}
|
|
||||||
%{_unitdir}/qubes-block-cleaner.service
|
%{_unitdir}/qubes-block-cleaner.service
|
||||||
%{_unitdir}/qubes-core.service
|
%{_unitdir}/qubes-core.service
|
||||||
%{_unitdir}/qubes-setupdvm.service
|
%{_unitdir}/qubes-setupdvm.service
|
||||||
%{_unitdir}/qubes-meminfo-writer.service
|
%{_unitdir}/qubes-meminfo-writer.service
|
||||||
%{_unitdir}/qubes-netvm.service
|
%{_unitdir}/qubes-netvm.service
|
||||||
%{_unitdir}/qubes-qmemman.service
|
%{_unitdir}/qubes-qmemman.service
|
||||||
%endif
|
|
||||||
%attr(0770,root,qubes) %dir /var/lib/qubes
|
%attr(0770,root,qubes) %dir /var/lib/qubes
|
||||||
%attr(0770,root,qubes) %dir /var/lib/qubes/vm-templates
|
%attr(0770,root,qubes) %dir /var/lib/qubes/vm-templates
|
||||||
%attr(0770,root,qubes) %dir /var/lib/qubes/appvms
|
%attr(0770,root,qubes) %dir /var/lib/qubes/appvms
|
||||||
|
Loading…
Reference in New Issue
Block a user