123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285 |
- #
- # This is the SPEC file for creating binary RPMs for the Dom0.
- #
- #
- # The Qubes OS Project, http://www.qubes-os.org
- #
- # Copyright (C) 2010 Joanna Rutkowska <joanna@invisiblethingslab.com>
- # Copyright (C) 2010 Rafal Wojtczuk <rafal@invisiblethingslab.com>
- #
- # This program is free software; you can redistribute it and/or
- # modify it under the terms of the GNU General Public License
- # as published by the Free Software Foundation; either version 2
- # of the License, or (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License
- # along with this program; if not, write to the Free Software
- # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
- #
- #
- %{!?python_sitearch: %define python_sitearch %(%{__python} -c "from distutils.sysconfig import get_python_lib; print get_python_lib(1)")}
- %{!?version: %define version %(cat version_dom0)}
- Name: qubes-core-dom0
- Version: %{version}
- Release: 1
- Summary: The Qubes core files (Dom0-side)
- Group: Qubes
- Vendor: Invisible Things Lab
- License: GPL
- URL: http://www.qubes-os.org
- Requires: python, xen-runtime, pciutils, python-inotify, python-daemon, kernel-qubes-dom0
- Conflicts: qubes-gui-dom0 < 1.1.13
- Requires: NetworkManager >= 0.8.1-1
- %define _builddir %(pwd)/dom0
- %description
- The Qubes core files for installation on Dom0.
- %build
- python -m compileall qvm-core qmemman
- python -O -m compileall qvm-core qmemman
- make -C restore
- make -C ../common
- %install
- mkdir -p $RPM_BUILD_ROOT/etc/init.d
- cp init.d/qubes_core $RPM_BUILD_ROOT/etc/init.d/
- cp init.d/qubes_netvm $RPM_BUILD_ROOT/etc/init.d/
- cp init.d/qubes_setupdvm $RPM_BUILD_ROOT/etc/init.d/
- mkdir -p $RPM_BUILD_ROOT/usr/bin/
- cp qvm-tools/qvm-* $RPM_BUILD_ROOT/usr/bin
- cp clipboard_notifier/qclipd $RPM_BUILD_ROOT/usr/bin
- cp pendrive_swapper/qfilexchgd $RPM_BUILD_ROOT/usr/bin
- mkdir -p $RPM_BUILD_ROOT/etc/xen/scripts
- cp restore/block.qubes $RPM_BUILD_ROOT/etc/xen/scripts
- cp ../common/vif-route-qubes $RPM_BUILD_ROOT/etc/xen/scripts
- cp ../common/block-snapshot $RPM_BUILD_ROOT/etc/xen/scripts
- ln -s block-snapshot $RPM_BUILD_ROOT/etc/xen/scripts/block-origin
- mkdir -p $RPM_BUILD_ROOT%{python_sitearch}/qubes
- cp qvm-core/qubes.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
- cp qvm-core/qubes.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
- cp qvm-core/__init__.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
- cp qvm-core/__init__.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
- cp qmemman/qmemman*py $RPM_BUILD_ROOT%{python_sitearch}/qubes
- cp qmemman/qmemman*py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
- mkdir -p $RPM_BUILD_ROOT/usr/lib/qubes
- cp aux-tools/patch_appvm_initramfs.sh $RPM_BUILD_ROOT/usr/lib/qubes
- cp aux-tools/unbind_pci_device.sh $RPM_BUILD_ROOT/usr/lib/qubes
- cp aux-tools/unbind_all_network_devices $RPM_BUILD_ROOT/usr/lib/qubes
- cp aux-tools/convert_apptemplate2vm.sh $RPM_BUILD_ROOT/usr/lib/qubes
- cp aux-tools/convert_dirtemplate2vm.sh $RPM_BUILD_ROOT/usr/lib/qubes
- cp aux-tools/create_apps_for_appvm.sh $RPM_BUILD_ROOT/usr/lib/qubes
- cp aux-tools/remove_appvm_appmenus.sh $RPM_BUILD_ROOT/usr/lib/qubes
- cp aux-tools/reset_vm_configs.py $RPM_BUILD_ROOT/usr/lib/qubes
- cp pendrive_swapper/qubes_pencmd $RPM_BUILD_ROOT/usr/lib/qubes
- cp qmemman/server.py $RPM_BUILD_ROOT/usr/lib/qubes/qmemman_daemon.py
- cp ../common/meminfo-writer $RPM_BUILD_ROOT/usr/lib/qubes/
- cp restore/xenstore-watch restore/qvm-create-default-dvm $RPM_BUILD_ROOT/usr/bin
- cp restore/qubes_restore restore/xenfreepages $RPM_BUILD_ROOT/usr/lib/qubes
- cp restore/qubes_prepare_saved_domain.sh $RPM_BUILD_ROOT/usr/lib/qubes
- mkdir -p $RPM_BUILD_ROOT/var/lib/qubes
- mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/vm-templates
- mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/appvms
- mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/backup
- mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/dvmdata
- mkdir -p $RPM_BUILD_ROOT/usr/share/qubes/icons
- cp icons/*.png $RPM_BUILD_ROOT/usr/share/qubes/icons
- mkdir -p $RPM_BUILD_ROOT/etc/yum.repos.d
- cp ../dom0/qubes.repo $RPM_BUILD_ROOT/etc/yum.repos.d
- mkdir -p $RPM_BUILD_ROOT/usr/bin
- cp ../common/qubes_setup_dnat_to_ns $RPM_BUILD_ROOT/usr/lib/qubes
- cp ../common/qubes_fix_nm_conf.sh $RPM_BUILD_ROOT/usr/lib/qubes
- mkdir -p $RPM_BUILD_ROOT/etc/dhclient.d
- ln -s /usr/lib/qubes/qubes_setup_dnat_to_ns $RPM_BUILD_ROOT/etc/dhclient.d/qubes_setup_dnat_to_ns.sh
- mkdir -p $RPM_BUILD_ROOT/etc/NetworkManager/dispatcher.d/
- cp ../common/qubes_nmhook $RPM_BUILD_ROOT/etc/NetworkManager/dispatcher.d/
- mkdir -p $RPM_BUILD_ROOT/etc/sysconfig
- cp ../common/iptables $RPM_BUILD_ROOT/etc/sysconfig
- mkdir -p $RPM_BUILD_ROOT/usr/lib64/pm-utils/sleep.d
- cp pm-utils/01qubes-sync-vms-clock $RPM_BUILD_ROOT/usr/lib64/pm-utils/sleep.d/
- cp pm-utils/01qubes-swap-pci-devs $RPM_BUILD_ROOT/usr/lib64/pm-utils/sleep.d/
- cp pm-utils/02qubes-pause-vms $RPM_BUILD_ROOT/usr/lib64/pm-utils/sleep.d/
- mkdir -p $RPM_BUILD_ROOT/var/log/qubes
- mkdir -p $RPM_BUILD_ROOT/var/run/qubes
- %post
- /usr/lib/qubes/qubes_fix_nm_conf.sh
- if [ -e /etc/yum.repos.d/qubes-r1-dom0.repo ]; then
- # we want the user to use the repo that comes with qubes-code-dom0 packages instead
- rm -f /etc/yum.repos.d/qubes-r1-dom0.repo
- fi
- #if [ "$1" != 1 ] ; then
- ## do this whole %post thing only when updating for the first time...
- #exit 0
- #fi
- # TODO: This is only temporary, until we will have our own installer
- for f in /etc/init.d/*
- do
- srv=`basename $f`
- [ $srv = 'functions' ] && continue
- [ $srv = 'killall' ] && continue
- [ $srv = 'halt' ] && continue
- chkconfig $srv off
- done
- chkconfig iptables on
- chkconfig NetworkManager on
- chkconfig rsyslog on
- chkconfig haldaemon on
- chkconfig messagebus on
- chkconfig xenstored on
- chkconfig xend on
- chkconfig xenconsoled on
- sed 's/^net.ipv4.ip_forward.*/net.ipv4.ip_forward = 1/' -i /etc/sysctl.conf
- chkconfig --add qubes_core || echo "WARNING: Cannot add service qubes_core!"
- chkconfig --add qubes_netvm || echo "WARNING: Cannot add service qubes_netvm!"
- chkconfig --add qubes_setupdvm || echo "WARNING: Cannot add service qubes_setupdvm!"
- chkconfig qubes_core on || echo "WARNING: Cannot enable service qubes_core!"
- chkconfig qubes_netvm on || echo "WARNING: Cannot enable service qubes_netvm!"
- chkconfig qubes_setupdvm on || echo "WARNING: Cannot enable service qubes_setupdvm!"
- if ! [ -e /var/lib/qubes/qubes.xml ]; then
- # echo "Initializing Qubes DB..."
- umask 007; sg qubes -c qvm-init-storage
- fi
- for i in /usr/share/qubes/icons/*.png ; do
- xdg-icon-resource install --novendor --size 48 $i
- done
- /etc/init.d/qubes_core start
- NETVM=$(qvm-get-default-netvm)
- if [ "X"$NETVM = "X""dom0" ] ; then
- /etc/init.d/qubes_netvm start
- fi
- %clean
- rm -rf $RPM_BUILD_ROOT
- %pre
- if ! grep -q ^qubes: /etc/group ; then
- groupadd qubes
- fi
- if [ "$1" -gt 1 ] ; then
- # upgrading already installed package...
- NETVM=$(qvm-get-default-netvm)
- if [ "X"$NETVM = "X""dom0" ] ; then
- /etc/init.d/qubes_netvm stop
- fi
- /etc/init.d/qubes_core stop
- fi
- %triggerin -- xen
- /etc/init.d/qubes_core stop
- /etc/init.d/qubes_core start
- %triggerin -- xen-runtime
- sed -i 's/\/block /\/block.qubes /' /etc/udev/rules.d/xen-backend.rules
- /etc/init.d/qubes_core stop
- /etc/init.d/qubes_core start
- %preun
- if [ "$1" = 0 ] ; then
- # no more packages left
- /etc/init.d/qubes_netvm stop
- /etc/init.d/qubes_core stop
- for i in /usr/share/qubes/icons/*.png ; do
- xdg-icon-resource uninstall --novendor --size 48 $i
- done
- fi
- %postun
- if [ "$1" = 0 ] ; then
- # no more packages left
- chgrp root /etc/xen
- chmod 700 /etc/xen
- groupdel qubes
- sed -i 's/\/block.qubes /\/block /' /etc/udev/rules.d/xen-backend.rules
- fi
- %files
- %defattr(-,root,root,-)
- /etc/init.d/qubes_core
- /etc/init.d/qubes_netvm
- /etc/init.d/qubes_setupdvm
- /usr/bin/qvm-*
- /usr/bin/qclipd
- /usr/bin/qfilexchgd
- %{python_sitearch}/qubes/qubes.py
- %{python_sitearch}/qubes/qubes.pyc
- %{python_sitearch}/qubes/qubes.pyo
- %{python_sitearch}/qubes/__init__.py
- %{python_sitearch}/qubes/__init__.pyc
- %{python_sitearch}/qubes/__init__.pyo
- %{python_sitearch}/qubes/qmemman*.py*
- /usr/lib/qubes/patch_appvm_initramfs.sh
- /usr/lib/qubes/unbind_pci_device.sh
- /usr/lib/qubes/unbind_all_network_devices
- /usr/lib/qubes/convert_apptemplate2vm.sh
- /usr/lib/qubes/convert_dirtemplate2vm.sh
- /usr/lib/qubes/create_apps_for_appvm.sh
- /usr/lib/qubes/remove_appvm_appmenus.sh
- /usr/lib/qubes/reset_vm_configs.py*
- /usr/lib/qubes/qubes_pencmd
- /usr/lib/qubes/qmemman_daemon.py*
- /usr/lib/qubes/meminfo-writer
- %attr(770,root,qubes) %dir /var/lib/qubes
- %attr(770,root,qubes) %dir /var/lib/qubes/vm-templates
- %attr(770,root,qubes) %dir /var/lib/qubes/appvms
- %attr(770,root,qubes) %dir /var/lib/qubes/backup
- %attr(770,root,qubes) %dir /var/lib/qubes/dvmdata
- %dir /usr/share/qubes/icons/*.png
- /etc/yum.repos.d/qubes.repo
- /usr/lib/qubes/qubes_setup_dnat_to_ns
- /usr/lib/qubes/qubes_fix_nm_conf.sh
- /etc/dhclient.d/qubes_setup_dnat_to_ns.sh
- /etc/NetworkManager/dispatcher.d/qubes_nmhook
- /etc/sysconfig/iptables
- /usr/lib64/pm-utils/sleep.d/01qubes-sync-vms-clock
- /usr/lib64/pm-utils/sleep.d/01qubes-swap-pci-devs
- /usr/lib64/pm-utils/sleep.d/02qubes-pause-vms
- /usr/bin/xenstore-watch
- /usr/bin/qvm-create-default-dvm
- /usr/lib/qubes/qubes_restore
- /usr/lib/qubes/qubes_prepare_saved_domain.sh
- /etc/xen/scripts/block.qubes
- /etc/xen/scripts/block-snapshot
- /etc/xen/scripts/block-origin
- /etc/xen/scripts/vif-route-qubes
- %attr(4750,root,qubes) /usr/lib/qubes/xenfreepages
- %attr(2770,root,qubes) %dir /var/log/qubes
- %attr(770,root,qubes) %dir /var/run/qubes
|