core-admin/misc/yum-qubes-hooks.py
Marek Marczykowski 9d10d6c668 vm: fix yum-qubes-hooks
Program must be given as full path to qrexec_client_vm - it is passed directly
to execv.
2012-06-11 22:35:44 +02:00

43 lines
1.5 KiB
Python

#!/usr/bin/python
#
# The Qubes OS Project, http://www.qubes-os.org
#
# Copyright (C) 2012 Marek Marczykowski <marmarek@invisiblethingslab.com>
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
#
from yum.plugins import TYPE_CORE
from yum.constants import *
import subprocess
requires_api_version = '2.4'
plugin_type = (TYPE_CORE,)
def posttrans_hook(conduit):
# Get all updates available _before_ this transaction
pkg_list = conduit._base.doPackageLists(pkgnarrow='updates')
# Get packages installed in this transaction...
ts = conduit.getTsInfo()
all = ts.getMembers()
# ...and filter them out of available updates
filtered_updates = filter(lambda x: x not in all, pkg_list.updates)
# Notify dom0 about left updates count
subprocess.call(['/usr/lib/qubes/qrexec_client_vm', 'dom0', 'qubes.NotifyUpdates', '/bin/echo', str(len(filtered_updates))])