core-dom0.spec 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322
  1. #
  2. # This is the SPEC file for creating binary RPMs for the Dom0.
  3. #
  4. #
  5. # The Qubes OS Project, http://www.qubes-os.org
  6. #
  7. # Copyright (C) 2010 Joanna Rutkowska <joanna@invisiblethingslab.com>
  8. # Copyright (C) 2010 Rafal Wojtczuk <rafal@invisiblethingslab.com>
  9. #
  10. # This program is free software; you can redistribute it and/or
  11. # modify it under the terms of the GNU General Public License
  12. # as published by the Free Software Foundation; either version 2
  13. # of the License, or (at your option) any later version.
  14. #
  15. # This program is distributed in the hope that it will be useful,
  16. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. # GNU General Public License for more details.
  19. #
  20. # You should have received a copy of the GNU General Public License
  21. # along with this program; if not, write to the Free Software
  22. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  23. #
  24. #
  25. %{!?python_sitearch: %define python_sitearch %(%{__python} -c "from distutils.sysconfig import get_python_lib; print get_python_lib(1)")}
  26. %{!?version: %define version %(cat version)}
  27. %define _dracutmoddir /usr/lib/dracut/modules.d
  28. %if %{fedora} < 17
  29. %define _dracutmoddir /usr/share/dracut/modules.d
  30. %endif
  31. Name: qubes-core-dom0
  32. Version: %{version}
  33. Release: 1%{dist}
  34. Summary: The Qubes core files (Dom0-side)
  35. Group: Qubes
  36. Vendor: Invisible Things Lab
  37. License: GPL
  38. URL: http://www.qubes-os.org
  39. BuildRequires: xen-devel
  40. BuildRequires: ImageMagick
  41. BuildRequires: systemd-units
  42. Requires(post): systemd-units
  43. Requires(preun): systemd-units
  44. Requires(postun): systemd-units
  45. Requires: python, xen-runtime, pciutils, python-inotify, python-daemon, kernel-qubes-dom0
  46. Requires: qubes-qrexec-dom0
  47. Requires: python-lxml
  48. # TODO: R: qubes-gui-dom0 >= 2.1.11
  49. Conflicts: qubes-gui-dom0 < 1.1.13
  50. Requires: xen >= 4.1.0-2
  51. Requires: xen-hvm
  52. Requires: createrepo
  53. Requires: gnome-packagekit
  54. Requires: cronie
  55. # for qubes-hcl-report
  56. Requires: dmidecode
  57. # Prevent preupgrade from installation (it pretend to provide distribution upgrade)
  58. Obsoletes: preupgrade < 2.0
  59. Provides: preupgrade = 2.0
  60. %define _builddir %(pwd)
  61. %description
  62. The Qubes core files for installation on Dom0.
  63. %prep
  64. # we operate on the current directory, so no need to unpack anything
  65. # symlink is to generate useful debuginfo packages
  66. rm -f %{name}-%{version}
  67. ln -sf . %{name}-%{version}
  68. %setup -T -D
  69. %build
  70. python -m compileall core core-modules qmemman
  71. python -O -m compileall core dom/core-modules qmemman
  72. for dir in dispvm qmemman; do
  73. (cd $dir; make)
  74. done
  75. %install
  76. mkdir -p $RPM_BUILD_ROOT/usr/lib/systemd/system
  77. cp linux/systemd/qubes-block-cleaner.service $RPM_BUILD_ROOT%{_unitdir}
  78. cp linux/systemd/qubes-core.service $RPM_BUILD_ROOT%{_unitdir}
  79. cp linux/systemd/qubes-setupdvm.service $RPM_BUILD_ROOT%{_unitdir}
  80. cp linux/systemd/qubes-meminfo-writer.service $RPM_BUILD_ROOT%{_unitdir}
  81. cp linux/systemd/qubes-netvm.service $RPM_BUILD_ROOT%{_unitdir}
  82. cp linux/systemd/qubes-qmemman.service $RPM_BUILD_ROOT%{_unitdir}
  83. mkdir -p $RPM_BUILD_ROOT/usr/bin/
  84. cp qvm-tools/qvm-* $RPM_BUILD_ROOT/usr/bin
  85. cp qvm-tools/qubes-* $RPM_BUILD_ROOT/usr/bin
  86. mkdir -p $RPM_BUILD_ROOT/etc/xen/scripts
  87. cp dispvm/block.qubes $RPM_BUILD_ROOT/etc/xen/scripts
  88. cp linux/system-config/vif-route-qubes $RPM_BUILD_ROOT/etc/xen/scripts
  89. cp linux/system-config/block-snapshot $RPM_BUILD_ROOT/etc/xen/scripts
  90. ln -s block-snapshot $RPM_BUILD_ROOT/etc/xen/scripts/block-origin
  91. mkdir -p $RPM_BUILD_ROOT%{python_sitearch}/qubes
  92. cp core/qubes.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  93. cp core/qubes.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  94. cp core/qubesutils.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  95. cp core/qubesutils.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  96. cp core/guihelpers.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  97. cp core/guihelpers.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  98. cp core/__init__.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  99. cp core/__init__.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  100. cp qmemman/qmemman*py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  101. cp qmemman/qmemman*py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  102. mkdir -p $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  103. cp core-modules/0*.py $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  104. cp core-modules/0*.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  105. cp core-modules/__init__.py $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  106. cp core-modules/__init__.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  107. mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/qubes
  108. cp qmemman/qmemman.conf $RPM_BUILD_ROOT%{_sysconfdir}/qubes/
  109. mkdir -p $RPM_BUILD_ROOT/usr/lib/qubes
  110. cp linux/aux-tools/unbind-pci-device.sh $RPM_BUILD_ROOT/usr/lib/qubes
  111. cp linux/aux-tools/cleanup-dispvms $RPM_BUILD_ROOT/usr/lib/qubes
  112. cp linux/aux-tools/startup-dvm.sh $RPM_BUILD_ROOT/usr/lib/qubes
  113. cp linux/aux-tools/startup-misc.sh $RPM_BUILD_ROOT/usr/lib/qubes
  114. cp linux/aux-tools/prepare-volatile-img.sh $RPM_BUILD_ROOT/usr/lib/qubes
  115. cp qmemman/server.py $RPM_BUILD_ROOT/usr/lib/qubes/qmemman_daemon.py
  116. cp qmemman/meminfo-writer $RPM_BUILD_ROOT/usr/lib/qubes/
  117. cp qubes-rpc/qubes-notify-updates $RPM_BUILD_ROOT/usr/lib/qubes/
  118. cp linux/aux-tools/vusb-ctl.py $RPM_BUILD_ROOT/usr/lib/qubes/
  119. cp linux/aux-tools/xl-qvm-usb-attach.py $RPM_BUILD_ROOT/usr/lib/qubes/
  120. cp linux/aux-tools/xl-qvm-usb-detach.py $RPM_BUILD_ROOT/usr/lib/qubes/
  121. cp linux/aux-tools/block-cleaner-daemon.py $RPM_BUILD_ROOT/usr/lib/qubes/
  122. cp linux/aux-tools/fix-dir-perms.sh $RPM_BUILD_ROOT/usr/lib/qubes/
  123. mkdir -p $RPM_BUILD_ROOT/etc/qubes-rpc/policy
  124. cp qubes-rpc-policy/qubes.Filecopy.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.Filecopy
  125. cp qubes-rpc-policy/qubes.OpenInVM.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.OpenInVM
  126. cp qubes-rpc-policy/qubes.VMShell.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.VMShell
  127. cp qubes-rpc-policy/qubes.NotifyUpdates.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.NotifyUpdates
  128. cp qubes-rpc/qubes.NotifyUpdates $RPM_BUILD_ROOT/etc/qubes-rpc/
  129. cp dispvm/xenstore-watch $RPM_BUILD_ROOT/usr/bin/xenstore-watch-qubes
  130. cp dispvm/qubes-restore $RPM_BUILD_ROOT/usr/lib/qubes
  131. cp dispvm/qubes-prepare-saved-domain.sh $RPM_BUILD_ROOT/usr/lib/qubes
  132. cp dispvm/qubes-update-dispvm-savefile-with-progress.sh $RPM_BUILD_ROOT/usr/lib/qubes
  133. cp dispvm/qfile-daemon-dvm $RPM_BUILD_ROOT/usr/lib/qubes
  134. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes
  135. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/vm-templates
  136. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/appvms
  137. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/servicevms
  138. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/vm-kernels
  139. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/backup
  140. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/dvmdata
  141. mkdir -p $RPM_BUILD_ROOT/usr/share/qubes
  142. cp xen-vm-config/vm-template.conf $RPM_BUILD_ROOT/usr/share/qubes/
  143. cp xen-vm-config/vm-template-hvm.conf $RPM_BUILD_ROOT/usr/share/qubes/
  144. mkdir -p $RPM_BUILD_ROOT/usr/bin
  145. mkdir -p $RPM_BUILD_ROOT/var/log/qubes
  146. mkdir -p $RPM_BUILD_ROOT/var/run/qubes
  147. install -d $RPM_BUILD_ROOT/etc/xdg/autostart
  148. install -m 0644 linux/system-config/qubes-guid.desktop $RPM_BUILD_ROOT/etc/xdg/autostart/
  149. %post
  150. # Create NetworkManager configuration if we do not have it
  151. if ! [ -e /etc/NetworkManager/NetworkManager.conf ]; then
  152. echo '[main]' > /etc/NetworkManager/NetworkManager.conf
  153. echo 'plugins = keyfile' >> /etc/NetworkManager/NetworkManager.conf
  154. echo '[keyfile]' >> /etc/NetworkManager/NetworkManager.conf
  155. fi
  156. sed '/^autoballoon=/d;/^lockfile=/d' -i /etc/xen/xl.conf
  157. echo 'autoballoon=0' >> /etc/xen/xl.conf
  158. echo 'lockfile="/var/run/qubes/xl-lock"' >> /etc/xen/xl.conf
  159. sed 's/^PRELINKING\s*=.*/PRELINKING=no/' -i /etc/sysconfig/prelink
  160. sed '/^\s*XENCONSOLED_LOG_\(HYPERVISOR\|GUESTS\)\s*=.*/d' -i /etc/sysconfig/xenconsoled
  161. echo XENCONSOLED_LOG_HYPERVISOR=yes >> /etc/sysconfig/xenconsoled
  162. echo XENCONSOLED_LOG_GUESTS=yes >> /etc/sysconfig/xenconsoled
  163. systemctl --no-reload enable qubes-core.service >/dev/null 2>&1
  164. systemctl --no-reload enable qubes-netvm.service >/dev/null 2>&1
  165. systemctl --no-reload enable qubes-setupdvm.service >/dev/null 2>&1
  166. # Conflicts with libxl stack, so disable it
  167. systemctl --no-reload disable xend.service >/dev/null 2>&1
  168. systemctl --no-reload disable xendomains.service >/dev/null 2>&1
  169. systemctl demon-reload >/dev/null 2>&1 || :
  170. HAD_SYSCONFIG_NETWORK=yes
  171. if ! [ -e /etc/sysconfig/network ]; then
  172. HAD_SYSCONFIG_NETWORK=no
  173. # supplant empty one so NetworkManager init script does not complain
  174. touch /etc/sysconfig/network
  175. fi
  176. # Load evtchn module - xenstored needs it
  177. modprobe evtchn 2> /dev/null || modprobe xen-evtchn
  178. service xenstored start
  179. if ! [ -e /var/lib/qubes/qubes.xml ]; then
  180. # echo "Initializing Qubes DB..."
  181. umask 007; sg qubes -c qvm-init-storage
  182. fi
  183. # Because we now have an installer
  184. # this script is always executed during upgrade
  185. # and we decided not to restart core during upgrade
  186. #service qubes_core start
  187. if [ "x"$HAD_SYSCONFIG_NETWORK = "xno" ]; then
  188. rm -f /etc/sysconfig/network
  189. fi
  190. %clean
  191. rm -rf $RPM_BUILD_ROOT
  192. rm -f %{name}-%{version}
  193. %pre
  194. if ! grep -q ^qubes: /etc/group ; then
  195. groupadd qubes
  196. fi
  197. %triggerin -- xen-runtime
  198. sed -i 's/\/block /\/block.qubes /' /etc/udev/rules.d/xen-backend.rules
  199. /usr/lib/qubes/fix-dir-perms.sh
  200. %preun
  201. if [ "$1" = 0 ] ; then
  202. # no more packages left
  203. service qubes_netvm stop
  204. service qubes_core stop
  205. fi
  206. %postun
  207. if [ "$1" = 0 ] ; then
  208. # no more packages left
  209. chgrp root /etc/xen
  210. chmod 700 /etc/xen
  211. groupdel qubes
  212. sed -i 's/\/block.qubes /\/block /' /etc/udev/rules.d/xen-backend.rules
  213. fi
  214. %files
  215. %defattr(-,root,root,-)
  216. %config(noreplace) %attr(0664,root,qubes) %{_sysconfdir}/qubes/qmemman.conf
  217. /usr/bin/qvm-*
  218. /usr/bin/qubes-*
  219. %dir %{python_sitearch}/qubes
  220. %{python_sitearch}/qubes/qubes.py
  221. %{python_sitearch}/qubes/qubes.pyc
  222. %{python_sitearch}/qubes/qubes.pyo
  223. %{python_sitearch}/qubes/qubesutils.py
  224. %{python_sitearch}/qubes/qubesutils.pyc
  225. %{python_sitearch}/qubes/qubesutils.pyo
  226. %{python_sitearch}/qubes/guihelpers.py
  227. %{python_sitearch}/qubes/guihelpers.pyc
  228. %{python_sitearch}/qubes/guihelpers.pyo
  229. %{python_sitearch}/qubes/__init__.py
  230. %{python_sitearch}/qubes/__init__.pyc
  231. %{python_sitearch}/qubes/__init__.pyo
  232. %{python_sitearch}/qubes/qmemman*.py*
  233. %{python_sitearch}/qubes/modules/0*.py*
  234. %{python_sitearch}/qubes/modules/__init__.py*
  235. /usr/lib/qubes/unbind-pci-device.sh
  236. /usr/lib/qubes/cleanup-dispvms
  237. /usr/lib/qubes/qmemman_daemon.py*
  238. /usr/lib/qubes/meminfo-writer
  239. /usr/lib/qubes/qfile-daemon-dvm*
  240. /usr/lib/qubes/qubes-notify-updates
  241. /usr/lib/qubes/block-cleaner-daemon.py*
  242. /usr/lib/qubes/vusb-ctl.py*
  243. /usr/lib/qubes/xl-qvm-usb-attach.py*
  244. /usr/lib/qubes/xl-qvm-usb-detach.py*
  245. /usr/lib/qubes/fix-dir-perms.sh
  246. /usr/lib/qubes/startup-dvm.sh
  247. /usr/lib/qubes/startup-misc.sh
  248. /usr/lib/qubes/prepare-volatile-img.sh
  249. %{_unitdir}/qubes-block-cleaner.service
  250. %{_unitdir}/qubes-core.service
  251. %{_unitdir}/qubes-setupdvm.service
  252. %{_unitdir}/qubes-meminfo-writer.service
  253. %{_unitdir}/qubes-netvm.service
  254. %{_unitdir}/qubes-qmemman.service
  255. %attr(0770,root,qubes) %dir /var/lib/qubes
  256. %attr(0770,root,qubes) %dir /var/lib/qubes/vm-templates
  257. %attr(0770,root,qubes) %dir /var/lib/qubes/appvms
  258. %attr(0770,root,qubes) %dir /var/lib/qubes/servicevms
  259. %attr(0770,root,qubes) %dir /var/lib/qubes/backup
  260. %attr(0770,root,qubes) %dir /var/lib/qubes/dvmdata
  261. %attr(0770,root,qubes) %dir /var/lib/qubes/vm-kernels
  262. /usr/share/qubes/vm-template.conf
  263. /usr/share/qubes/vm-template-hvm.conf
  264. /usr/bin/xenstore-watch-qubes
  265. /usr/lib/qubes/qubes-restore
  266. /usr/lib/qubes/qubes-prepare-saved-domain.sh
  267. /usr/lib/qubes/qubes-update-dispvm-savefile-with-progress.sh
  268. /etc/xen/scripts/block.qubes
  269. /etc/xen/scripts/block-snapshot
  270. /etc/xen/scripts/block-origin
  271. /etc/xen/scripts/vif-route-qubes
  272. %attr(0664,root,qubes) %config(noreplace) /etc/qubes-rpc/policy/qubes.Filecopy
  273. %attr(0664,root,qubes) %config(noreplace) /etc/qubes-rpc/policy/qubes.OpenInVM
  274. %attr(0664,root,qubes) %config(noreplace) /etc/qubes-rpc/policy/qubes.NotifyUpdates
  275. %attr(0664,root,qubes) %config(noreplace) /etc/qubes-rpc/policy/qubes.VMShell
  276. /etc/qubes-rpc/qubes.NotifyUpdates
  277. %attr(2770,root,qubes) %dir /var/log/qubes
  278. %attr(0770,root,qubes) %dir /var/run/qubes
  279. /etc/xdg/autostart/qubes-guid.desktop