Browse Source

Split dom0-updates handling into subpackage

In Fedora it makes little sense, but in Debian it allows to avoid a lot
of dependencies. So split in both, to keep it simple.

QubesOS/qubes-issues#2771
Marek Marczykowski-Górecki 7 years ago
parent
commit
72b9f389b2

+ 12 - 4
debian/control

@@ -26,7 +26,6 @@ Architecture: any
 Depends:
     dmsetup,
     ethtool,
-    fakeroot,
     gawk,
     imagemagick,
     init-system-helpers,
@@ -73,9 +72,7 @@ Recommends:
     system-config-printer,
     tinyproxy,
     qubes-nautilus,
-    xsettingsd,
-    yum,
-    yum-utils
+    xsettingsd
 Provides: ${diverted-files}
 Conflicts: ${diverted-files}, qubes-core-agent-linux, firewalld, qubes-core-vm-sysvinit
 Description: Qubes core agent
@@ -88,3 +85,14 @@ Description: Qubes integration for Nautilus
  Nautilus addons for inter-VM file copy/move/open.
 Depends:
     python-nautilus,
+
+Package: qubes-core-agent-dom0-updates
+Architecture: any
+Depends:
+    fakeroot,
+    yum,
+    yum-utils
+Description: Scripts required to handle dom0 updates.
+  Scripts required to handle dom0 updates. This will allow to use the VM as
+  "Updates VM".
+

+ 1 - 0
debian/qubes-core-agent-dom0-updates.install

@@ -0,0 +1 @@
+usr/lib/qubes/qubes-download-dom0-updates.sh

+ 0 - 1
debian/qubes-core-agent.install

@@ -138,7 +138,6 @@ usr/lib/qubes/qrexec-agent
 usr/lib/qubes/qrexec-client-vm
 usr/lib/qubes/qrexec_client_vm
 usr/lib/qubes/qrun-in-vm
-usr/lib/qubes/qubes-download-dom0-updates.sh
 usr/lib/qubes/qubes-fix-nm-conf.sh
 usr/lib/qubes/qubes-rpc-multiplexer
 usr/lib/qubes/qubes-setup-dnat-to-ns

+ 15 - 6
rpm_spec/core-agent.spec

@@ -145,7 +145,6 @@ Requires:   python2-qubesdb
 Requires:   nftables
 Requires:   ImageMagick
 Requires:   librsvg2-tools
-Requires:   fakeroot
 Requires:   desktop-notification-daemon
 # to show/hide nm-applet
 Requires:   dconf
@@ -166,6 +165,9 @@ BuildRequires: libX11-devel
 BuildRequires: qubes-utils-devel >= 3.1.3
 BuildRequires: qubes-libvchan-%{backend_vmm}-devel
 
+%description
+The Qubes core files for installation inside a Qubes VM.
+
 %package -n python2-dnf-plugins-qubes-hooks
 Summary:	DNF plugin for Qubes specific post-installation actions
 BuildRequires: python2-devel
@@ -194,13 +196,18 @@ Requires:   nautilus-python
 %description nautilus
 Nautilus addons for inter-VM file copy/move/open.
 
+%package dom0-updates
+Summary:    Scripts required to handle dom0 updates
+Requires:   qubes-core-agent
+Requires:   fakeroot
+
+%description dom0-updates
+Scripts required to handle dom0 updates.
+
 %define _builddir %(pwd)
 
 %define kde_service_dir /usr/share/kde4/services
 
-%description
-The Qubes core files for installation inside a Qubes VM.
-
 %prep
 # we operate on the current directory, so no need to unpack anything
 # symlink is to generate useful debuginfo packages
@@ -411,7 +418,6 @@ rm -f %{name}-%{version}
 %defattr(-,root,root,-)
 %dir /var/lib/qubes
 %dir /var/run/qubes
-%dir %attr(0775,user,user) /var/lib/qubes/dom0-updates
 %{kde_service_dir}/qvm-copy.desktop
 %{kde_service_dir}/qvm-move.desktop
 %{kde_service_dir}/qvm-dvm.desktop
@@ -506,7 +512,6 @@ rm -f %{name}-%{version}
 %attr(4755,root,root) /usr/lib/qubes/qfile-unpacker
 /usr/lib/qubes/qopen-in-vm
 /usr/lib/qubes/qrun-in-vm
-/usr/lib/qubes/qubes-download-dom0-updates.sh
 /usr/lib/qubes/qubes-fix-nm-conf.sh
 /usr/lib/qubes/qubes-setup-dnat-to-ns
 /usr/lib/qubes/qubes-trigger-sync-appmenus.sh
@@ -564,6 +569,10 @@ rm -f %{name}-%{version}
 /usr/share/nautilus-python/extensions/qvm_move_nautilus.py*
 /usr/share/nautilus-python/extensions/qvm_dvm_nautilus.py*
 
+%files dom0-updates
+%dir %attr(0775,user,user) /var/lib/qubes/dom0-updates
+/usr/lib/qubes/qubes-download-dom0-updates.sh
+
 %package sysvinit
 Summary:        Qubes unit files for SysV init style or upstart
 License:        GPL v2 only