core-dom0.spec 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396
  1. #
  2. # This is the SPEC file for creating binary RPMs for the Dom0.
  3. #
  4. #
  5. # The Qubes OS Project, http://www.qubes-os.org
  6. #
  7. # Copyright (C) 2010 Joanna Rutkowska <joanna@invisiblethingslab.com>
  8. # Copyright (C) 2010 Rafal Wojtczuk <rafal@invisiblethingslab.com>
  9. #
  10. # This program is free software; you can redistribute it and/or
  11. # modify it under the terms of the GNU General Public License
  12. # as published by the Free Software Foundation; either version 2
  13. # of the License, or (at your option) any later version.
  14. #
  15. # This program is distributed in the hope that it will be useful,
  16. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. # GNU General Public License for more details.
  19. #
  20. # You should have received a copy of the GNU General Public License
  21. # along with this program; if not, write to the Free Software
  22. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  23. #
  24. #
  25. %{!?python_sitearch: %define python_sitearch %(%{__python} -c "from distutils.sysconfig import get_python_lib; print get_python_lib(1)")}
  26. %{!?version: %define version %(cat version)}
  27. %define _dracutmoddir /usr/lib/dracut/modules.d
  28. %if %{fedora} < 17
  29. %define _dracutmoddir /usr/share/dracut/modules.d
  30. %endif
  31. Name: qubes-core-dom0
  32. Version: %{version}
  33. Release: 1%{dist}
  34. Summary: The Qubes core files (Dom0-side)
  35. Group: Qubes
  36. Vendor: Invisible Things Lab
  37. License: GPL
  38. URL: http://www.qubes-os.org
  39. BuildRequires: xen-devel
  40. BuildRequires: ImageMagick
  41. BuildRequires: systemd-units
  42. Requires(post): systemd-units
  43. Requires(preun): systemd-units
  44. Requires(postun): systemd-units
  45. Requires: python, xen-runtime, pciutils, python-inotify, python-daemon, kernel-qubes-dom0
  46. Requires: qubes-qrexec-dom0
  47. Requires: python-lxml
  48. # TODO: R: qubes-gui-dom0 >= 2.1.11
  49. Conflicts: qubes-gui-dom0 < 1.1.13
  50. Requires: xen >= 4.1.0-2
  51. Requires: xen-hvm
  52. Requires: createrepo
  53. Requires: gnome-packagekit
  54. Requires: cronie
  55. # for qubes-hcl-report
  56. Requires: dmidecode
  57. # Prevent preupgrade from installation (it pretend to provide distribution upgrade)
  58. Obsoletes: preupgrade < 2.0
  59. Provides: preupgrade = 2.0
  60. %define _builddir %(pwd)
  61. %description
  62. The Qubes core files for installation on Dom0.
  63. %prep
  64. # we operate on the current directory, so no need to unpack anything
  65. # symlink is to generate useful debuginfo packages
  66. rm -f %{name}-%{version}
  67. ln -sf . %{name}-%{version}
  68. %setup -T -D
  69. %build
  70. python -m compileall dom0/core dom0/core-modules dom0/qmemman
  71. python -O -m compileall dom0/core dom/core-modules dom0/qmemman
  72. for dir in dom0/dispvm dom0/qmemman; do
  73. (cd $dir; make)
  74. done
  75. %install
  76. cd dom0
  77. mkdir -p $RPM_BUILD_ROOT/usr/lib/systemd/system
  78. cp systemd/qubes-block-cleaner.service $RPM_BUILD_ROOT%{_unitdir}
  79. cp systemd/qubes-core.service $RPM_BUILD_ROOT%{_unitdir}
  80. cp systemd/qubes-setupdvm.service $RPM_BUILD_ROOT%{_unitdir}
  81. cp systemd/qubes-meminfo-writer.service $RPM_BUILD_ROOT%{_unitdir}
  82. cp systemd/qubes-netvm.service $RPM_BUILD_ROOT%{_unitdir}
  83. cp systemd/qubes-qmemman.service $RPM_BUILD_ROOT%{_unitdir}
  84. mkdir -p $RPM_BUILD_ROOT/usr/bin/
  85. cp qvm-tools/qvm-* $RPM_BUILD_ROOT/usr/bin
  86. cp qvm-tools/qubes-* $RPM_BUILD_ROOT/usr/bin
  87. mkdir -p $RPM_BUILD_ROOT/etc/xen/scripts
  88. cp dispvm/block.qubes $RPM_BUILD_ROOT/etc/xen/scripts
  89. cp system-config/vif-route-qubes $RPM_BUILD_ROOT/etc/xen/scripts
  90. cp system-config/block-snapshot $RPM_BUILD_ROOT/etc/xen/scripts
  91. ln -s block-snapshot $RPM_BUILD_ROOT/etc/xen/scripts/block-origin
  92. mkdir -p $RPM_BUILD_ROOT/etc/udev/rules.d
  93. cp system-config/udev-qubes-block.rules $RPM_BUILD_ROOT/etc/udev/rules.d/99-qubes-block.rules
  94. cp system-config/udev-qubes-usb.rules $RPM_BUILD_ROOT/etc/udev/rules.d/99-qubes-usb.rules
  95. mkdir -p $RPM_BUILD_ROOT%{python_sitearch}/qubes
  96. cp core/qubes.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  97. cp core/qubes.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  98. cp core/qubesutils.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  99. cp core/qubesutils.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  100. cp core/guihelpers.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  101. cp core/guihelpers.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  102. cp core/__init__.py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  103. cp core/__init__.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  104. cp qmemman/qmemman*py $RPM_BUILD_ROOT%{python_sitearch}/qubes
  105. cp qmemman/qmemman*py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes
  106. mkdir -p $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  107. cp core-modules/0*.py $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  108. cp core-modules/0*.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  109. cp core-modules/__init__.py $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  110. cp core-modules/__init__.py[co] $RPM_BUILD_ROOT%{python_sitearch}/qubes/modules
  111. mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/qubes
  112. cp qmemman/qmemman.conf $RPM_BUILD_ROOT%{_sysconfdir}/qubes/
  113. mkdir -p $RPM_BUILD_ROOT/usr/lib/qubes
  114. cp aux-tools/unbind-pci-device.sh $RPM_BUILD_ROOT/usr/lib/qubes
  115. cp aux-tools/cleanup-dispvms $RPM_BUILD_ROOT/usr/lib/qubes
  116. cp aux-tools/startup-dvm.sh $RPM_BUILD_ROOT/usr/lib/qubes
  117. cp aux-tools/startup-misc.sh $RPM_BUILD_ROOT/usr/lib/qubes
  118. cp aux-tools/prepare-volatile-img.sh $RPM_BUILD_ROOT/usr/lib/qubes
  119. cp qmemman/server.py $RPM_BUILD_ROOT/usr/lib/qubes/qmemman_daemon.py
  120. cp qmemman/meminfo-writer $RPM_BUILD_ROOT/usr/lib/qubes/
  121. cp qubes-rpc/qubes-notify-updates $RPM_BUILD_ROOT/usr/lib/qubes/
  122. cp aux-tools/udev-block-add-change $RPM_BUILD_ROOT/usr/lib/qubes/
  123. cp aux-tools/udev-block-remove $RPM_BUILD_ROOT/usr/lib/qubes/
  124. cp aux-tools/udev-block-cleanup $RPM_BUILD_ROOT/usr/lib/qubes/
  125. cp aux-tools/udev-usb-add-change $RPM_BUILD_ROOT/usr/lib/qubes/
  126. cp aux-tools/udev-usb-remove $RPM_BUILD_ROOT/usr/lib/qubes/
  127. cp aux-tools/vusb-ctl.py $RPM_BUILD_ROOT/usr/lib/qubes/
  128. cp aux-tools/xl-qvm-usb-attach.py $RPM_BUILD_ROOT/usr/lib/qubes/
  129. cp aux-tools/xl-qvm-usb-detach.py $RPM_BUILD_ROOT/usr/lib/qubes/
  130. cp aux-tools/block-cleaner-daemon.py $RPM_BUILD_ROOT/usr/lib/qubes/
  131. cp aux-tools/fix-dir-perms.sh $RPM_BUILD_ROOT/usr/lib/qubes/
  132. mkdir -p $RPM_BUILD_ROOT/etc/qubes-rpc/policy
  133. cp qubes-rpc-policy/qubes.Filecopy.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.Filecopy
  134. cp qubes-rpc-policy/qubes.OpenInVM.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.OpenInVM
  135. cp qubes-rpc-policy/qubes.VMShell.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.VMShell
  136. cp qubes-rpc-policy/qubes.NotifyUpdates.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.NotifyUpdates
  137. cp qubes-rpc/qubes.NotifyUpdates $RPM_BUILD_ROOT/etc/qubes-rpc/
  138. cp qubes-rpc-policy/qubes.ReceiveUpdates.policy $RPM_BUILD_ROOT/etc/qubes-rpc/policy/qubes.ReceiveUpdates
  139. cp qubes-rpc/qubes.ReceiveUpdates $RPM_BUILD_ROOT/etc/qubes-rpc/
  140. install -D aux-tools/qubes-dom0.modules $RPM_BUILD_ROOT/etc/sysconfig/modules/qubes-dom0.modules
  141. install -D aux-tools/qubes-sync-clock.cron $RPM_BUILD_ROOT/etc/cron.d/qubes-sync-clock.cron
  142. cp dispvm/xenstore-watch $RPM_BUILD_ROOT/usr/bin/xenstore-watch-qubes
  143. cp dispvm/qubes-restore $RPM_BUILD_ROOT/usr/lib/qubes
  144. cp dispvm/qubes-prepare-saved-domain.sh $RPM_BUILD_ROOT/usr/lib/qubes
  145. cp dispvm/qubes-update-dispvm-savefile-with-progress.sh $RPM_BUILD_ROOT/usr/lib/qubes
  146. cp dispvm/qfile-daemon-dvm $RPM_BUILD_ROOT/usr/lib/qubes
  147. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes
  148. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/vm-templates
  149. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/appvms
  150. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/servicevms
  151. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/vm-kernels
  152. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/backup
  153. mkdir -p $RPM_BUILD_ROOT/var/lib/qubes/dvmdata
  154. mkdir -p $RPM_BUILD_ROOT/usr/share/qubes
  155. cp misc/vm-template.conf $RPM_BUILD_ROOT/usr/share/qubes/
  156. cp misc/vm-template-hvm.conf $RPM_BUILD_ROOT/usr/share/qubes/
  157. mkdir -p $RPM_BUILD_ROOT/usr/bin
  158. mkdir -p $RPM_BUILD_ROOT/etc/dhclient.d
  159. mkdir -p $RPM_BUILD_ROOT/etc/NetworkManager/dispatcher.d/
  160. mkdir -p $RPM_BUILD_ROOT/etc/sysconfig
  161. cp system-config/iptables $RPM_BUILD_ROOT/etc/sysconfig
  162. cp system-config/ip6tables $RPM_BUILD_ROOT/etc/sysconfig
  163. install -m 0644 -D system-config/limits-qubes.conf $RPM_BUILD_ROOT/etc/security/limits.d/99-qubes.conf
  164. install -D system-config/cpufreq-xen.modules $RPM_BUILD_ROOT/etc/sysconfig/modules/cpufreq-xen.modules
  165. mkdir -p $RPM_BUILD_ROOT/usr/lib64/pm-utils/sleep.d
  166. cp pm-utils/01qubes-sync-vms-clock $RPM_BUILD_ROOT/usr/lib64/pm-utils/sleep.d/
  167. cp pm-utils/51qubes-suspend-netvm $RPM_BUILD_ROOT/usr/lib64/pm-utils/sleep.d/
  168. cp pm-utils/52qubes-pause-vms $RPM_BUILD_ROOT/usr/lib64/pm-utils/sleep.d/
  169. mkdir -p $RPM_BUILD_ROOT/var/log/qubes
  170. mkdir -p $RPM_BUILD_ROOT/var/run/qubes
  171. install -m 0440 -D system-config/qubes.sudoers $RPM_BUILD_ROOT/etc/sudoers.d/qubes
  172. install -D system-config/polkit-1-qubes-allow-all.rules $RPM_BUILD_ROOT/etc/polkit-1/rules.d/00-qubes-allow-all.rules
  173. install -d $RPM_BUILD_ROOT/etc/xdg/autostart
  174. install -m 0644 qubes-guid.desktop $RPM_BUILD_ROOT/etc/xdg/autostart/
  175. mkdir -p $RPM_BUILD_ROOT/etc/dracut.conf.d
  176. cp dracut/dracut.conf.d/* $RPM_BUILD_ROOT/etc/dracut.conf.d/
  177. mkdir -p $RPM_BUILD_ROOT%{_dracutmoddir}
  178. cp -r dracut/modules.d/* $RPM_BUILD_ROOT%{_dracutmoddir}/
  179. %post
  180. # Create NetworkManager configuration if we do not have it
  181. if ! [ -e /etc/NetworkManager/NetworkManager.conf ]; then
  182. echo '[main]' > /etc/NetworkManager/NetworkManager.conf
  183. echo 'plugins = keyfile' >> /etc/NetworkManager/NetworkManager.conf
  184. echo '[keyfile]' >> /etc/NetworkManager/NetworkManager.conf
  185. fi
  186. sed '/^autoballoon=/d;/^lockfile=/d' -i /etc/xen/xl.conf
  187. echo 'autoballoon=0' >> /etc/xen/xl.conf
  188. echo 'lockfile="/var/run/qubes/xl-lock"' >> /etc/xen/xl.conf
  189. sed 's/^PRELINKING\s*=.*/PRELINKING=no/' -i /etc/sysconfig/prelink
  190. sed '/^\s*XENCONSOLED_LOG_\(HYPERVISOR\|GUESTS\)\s*=.*/d' -i /etc/sysconfig/xenconsoled
  191. echo XENCONSOLED_LOG_HYPERVISOR=yes >> /etc/sysconfig/xenconsoled
  192. echo XENCONSOLED_LOG_GUESTS=yes >> /etc/sysconfig/xenconsoled
  193. systemctl --no-reload enable qubes-core.service >/dev/null 2>&1
  194. systemctl --no-reload enable qubes-netvm.service >/dev/null 2>&1
  195. systemctl --no-reload enable qubes-setupdvm.service >/dev/null 2>&1
  196. # Conflicts with libxl stack, so disable it
  197. systemctl --no-reload disable xend.service >/dev/null 2>&1
  198. systemctl --no-reload disable xendomains.service >/dev/null 2>&1
  199. systemctl demon-reload >/dev/null 2>&1 || :
  200. HAD_SYSCONFIG_NETWORK=yes
  201. if ! [ -e /etc/sysconfig/network ]; then
  202. HAD_SYSCONFIG_NETWORK=no
  203. # supplant empty one so NetworkManager init script does not complain
  204. touch /etc/sysconfig/network
  205. fi
  206. # Load evtchn module - xenstored needs it
  207. modprobe evtchn 2> /dev/null || modprobe xen-evtchn
  208. service xenstored start
  209. if ! [ -e /var/lib/qubes/qubes.xml ]; then
  210. # echo "Initializing Qubes DB..."
  211. umask 007; sg qubes -c qvm-init-storage
  212. fi
  213. # Because we now have an installer
  214. # this script is always executed during upgrade
  215. # and we decided not to restart core during upgrade
  216. #service qubes_core start
  217. if [ "x"$HAD_SYSCONFIG_NETWORK = "xno" ]; then
  218. rm -f /etc/sysconfig/network
  219. fi
  220. # Remove unnecessary udev rules that causes problems in dom0 (#605)
  221. mkdir -p /var/lib/qubes/removed-udev-scripts
  222. mv -f /lib/udev/rules.d/69-xorg-vmmouse.rules /var/lib/qubes/removed-udev-scripts/ 2> /dev/null || :
  223. %clean
  224. rm -rf $RPM_BUILD_ROOT
  225. rm -f %{name}-%{version}
  226. %pre
  227. if ! grep -q ^qubes: /etc/group ; then
  228. groupadd qubes
  229. fi
  230. %triggerin -- xen
  231. %triggerin -- xen-runtime
  232. sed -i 's/\/block /\/block.qubes /' /etc/udev/rules.d/xen-backend.rules
  233. /usr/lib/qubes/fix-dir-perms.sh
  234. %triggerin -- xorg-x11-drv-vmmouse
  235. mv -f /lib/udev/rules.d/69-xorg-vmmouse.rules /var/lib/qubes/removed-udev-scripts/ 2> /dev/null || :
  236. %preun
  237. if [ "$1" = 0 ] ; then
  238. # no more packages left
  239. service qubes_netvm stop
  240. service qubes_core stop
  241. for i in /usr/share/qubes/icons/*.png ; do
  242. xdg-icon-resource uninstall --novendor --size 48 $i
  243. done
  244. xdg-desktop-menu uninstall /usr/share/qubes/qubes-dispvm.directory /usr/share/qubes/qubes-dispvm-firefox.desktop
  245. fi
  246. %postun
  247. if [ "$1" = 0 ] ; then
  248. # no more packages left
  249. chgrp root /etc/xen
  250. chmod 700 /etc/xen
  251. groupdel qubes
  252. sed -i 's/\/block.qubes /\/block /' /etc/udev/rules.d/xen-backend.rules
  253. fi
  254. %files
  255. %defattr(-,root,root,-)
  256. %config(noreplace) %attr(0664,root,qubes) %{_sysconfdir}/qubes/qmemman.conf
  257. /usr/bin/qvm-*
  258. /usr/bin/qubes-*
  259. %dir %{python_sitearch}/qubes
  260. %{python_sitearch}/qubes/qubes.py
  261. %{python_sitearch}/qubes/qubes.pyc
  262. %{python_sitearch}/qubes/qubes.pyo
  263. %{python_sitearch}/qubes/qubesutils.py
  264. %{python_sitearch}/qubes/qubesutils.pyc
  265. %{python_sitearch}/qubes/qubesutils.pyo
  266. %{python_sitearch}/qubes/guihelpers.py
  267. %{python_sitearch}/qubes/guihelpers.pyc
  268. %{python_sitearch}/qubes/guihelpers.pyo
  269. %{python_sitearch}/qubes/__init__.py
  270. %{python_sitearch}/qubes/__init__.pyc
  271. %{python_sitearch}/qubes/__init__.pyo
  272. %{python_sitearch}/qubes/qmemman*.py*
  273. %{python_sitearch}/qubes/modules/0*.py*
  274. %{python_sitearch}/qubes/modules/__init__.py*
  275. /usr/lib/qubes/unbind-pci-device.sh
  276. /usr/lib/qubes/cleanup-dispvms
  277. /usr/lib/qubes/qmemman_daemon.py*
  278. /usr/lib/qubes/meminfo-writer
  279. /usr/lib/qubes/qfile-daemon-dvm*
  280. /usr/lib/qubes/qubes-notify-updates
  281. /usr/lib/qubes/udev-block-add-change
  282. /usr/lib/qubes/udev-block-remove
  283. /usr/lib/qubes/udev-block-cleanup
  284. /usr/lib/qubes/block-cleaner-daemon.py*
  285. /usr/lib/qubes/udev-usb-add-change
  286. /usr/lib/qubes/udev-usb-remove
  287. /usr/lib/qubes/vusb-ctl.py*
  288. /usr/lib/qubes/xl-qvm-usb-attach.py*
  289. /usr/lib/qubes/xl-qvm-usb-detach.py*
  290. /usr/lib/qubes/fix-dir-perms.sh
  291. /usr/lib/qubes/startup-dvm.sh
  292. /usr/lib/qubes/startup-misc.sh
  293. /usr/lib/qubes/prepare-volatile-img.sh
  294. %attr(4750,root,qubes) /usr/lib/qubes/qfile-dom0-unpacker
  295. %{_unitdir}/qubes-block-cleaner.service
  296. %{_unitdir}/qubes-core.service
  297. %{_unitdir}/qubes-setupdvm.service
  298. %{_unitdir}/qubes-meminfo-writer.service
  299. %{_unitdir}/qubes-netvm.service
  300. %{_unitdir}/qubes-qmemman.service
  301. %attr(0770,root,qubes) %dir /var/lib/qubes
  302. %attr(0770,root,qubes) %dir /var/lib/qubes/vm-templates
  303. %attr(0770,root,qubes) %dir /var/lib/qubes/appvms
  304. %attr(0770,root,qubes) %dir /var/lib/qubes/servicevms
  305. %attr(0770,root,qubes) %dir /var/lib/qubes/backup
  306. %attr(0770,root,qubes) %dir /var/lib/qubes/dvmdata
  307. %attr(0770,root,qubes) %dir /var/lib/qubes/vm-kernels
  308. /usr/share/qubes/vm-template.conf
  309. /usr/share/qubes/vm-template-hvm.conf
  310. /etc/sysconfig/iptables
  311. /etc/sysconfig/ip6tables
  312. /etc/sysconfig/modules/qubes-dom0.modules
  313. /etc/sysconfig/modules/cpufreq-xen.modules
  314. /usr/lib64/pm-utils/sleep.d/01qubes-sync-vms-clock
  315. /usr/lib64/pm-utils/sleep.d/51qubes-suspend-netvm
  316. /usr/lib64/pm-utils/sleep.d/52qubes-pause-vms
  317. /usr/bin/xenstore-watch-qubes
  318. /usr/lib/qubes/qubes-restore
  319. /usr/lib/qubes/qubes-prepare-saved-domain.sh
  320. /usr/lib/qubes/qubes-update-dispvm-savefile-with-progress.sh
  321. /etc/xen/scripts/block.qubes
  322. /etc/xen/scripts/block-snapshot
  323. /etc/xen/scripts/block-origin
  324. /etc/xen/scripts/vif-route-qubes
  325. %attr(0664,root,qubes) %config(noreplace) /etc/qubes-rpc/policy/qubes.Filecopy
  326. %attr(0664,root,qubes) %config(noreplace) /etc/qubes-rpc/policy/qubes.OpenInVM
  327. %attr(0664,root,qubes) %config(noreplace) /etc/qubes-rpc/policy/qubes.NotifyUpdates
  328. %attr(0664,root,qubes) %config(noreplace) /etc/qubes-rpc/policy/qubes.VMShell
  329. /etc/qubes-rpc/qubes.NotifyUpdates
  330. %attr(2770,root,qubes) %dir /var/log/qubes
  331. %attr(0770,root,qubes) %dir /var/run/qubes
  332. /etc/sudoers.d/qubes
  333. /etc/polkit-1/rules.d/00-qubes-allow-all.rules
  334. /etc/xdg/autostart/qubes-guid.desktop
  335. /etc/security/limits.d/99-qubes.conf
  336. /etc/udev/rules.d/99-qubes-block.rules
  337. /etc/udev/rules.d/99-qubes-usb.rules
  338. %attr(0644,root,root) /etc/cron.d/qubes-sync-clock.cron
  339. /etc/dracut.conf.d/*
  340. %dir %{_dracutmoddir}/90qubes-pciback
  341. %{_dracutmoddir}/90qubes-pciback/*