Merge remote-tracking branch 'woju/master' into core3-devel
* woju/master: misc: add qvm-features-request
This commit is contained in:
		
						commit
						779414d216
					
				
							
								
								
									
										14
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										14
									
								
								Makefile
									
									
									
									
									
								
							| @ -5,6 +5,7 @@ VERSION := $(shell cat version) | |||||||
| DIST ?= fc18 | DIST ?= fc18 | ||||||
| KDESERVICEDIR ?= /usr/share/kde4/services | KDESERVICEDIR ?= /usr/share/kde4/services | ||||||
| SBINDIR ?= /usr/sbin | SBINDIR ?= /usr/sbin | ||||||
|  | BINDIR ?= /usr/bin | ||||||
| LIBDIR ?= /usr/lib | LIBDIR ?= /usr/lib | ||||||
| SYSLIBDIR ?= /lib | SYSLIBDIR ?= /lib | ||||||
| 
 | 
 | ||||||
| @ -151,7 +152,7 @@ install-common: | |||||||
| 
 | 
 | ||||||
| 	install -d $(DESTDIR)/var/lib/qubes | 	install -d $(DESTDIR)/var/lib/qubes | ||||||
| 
 | 
 | ||||||
| 	install -D misc/xenstore-watch $(DESTDIR)/usr/bin/xenstore-watch-qubes | 	install -D misc/xenstore-watch $(DESTDIR)$(BINDIR)/xenstore-watch-qubes | ||||||
| 	install -d $(DESTDIR)/etc/udev/rules.d | 	install -d $(DESTDIR)/etc/udev/rules.d | ||||||
| 	install -m 0644 misc/udev-qubes-misc.rules $(DESTDIR)/etc/udev/rules.d/50-qubes-misc.rules | 	install -m 0644 misc/udev-qubes-misc.rules $(DESTDIR)/etc/udev/rules.d/50-qubes-misc.rules | ||||||
| 	install -d $(DESTDIR)$(LIBDIR)/qubes/ | 	install -d $(DESTDIR)$(LIBDIR)/qubes/ | ||||||
| @ -202,17 +203,18 @@ install-common: | |||||||
| 	install network/qubes-firewall $(DESTDIR)/$(SBINDIR)/ | 	install network/qubes-firewall $(DESTDIR)/$(SBINDIR)/ | ||||||
| 	install network/qubes-netwatcher $(DESTDIR)/$(SBINDIR)/ | 	install network/qubes-netwatcher $(DESTDIR)/$(SBINDIR)/ | ||||||
| 
 | 
 | ||||||
| 	install -d $(DESTDIR)/usr/bin | 	install -d $(DESTDIR)$(BINDIR) | ||||||
| 	install -m 0755 misc/qubes-session-autostart $(DESTDIR)/usr/bin/qubes-session-autostart | 	install -m 0755 misc/qubes-session-autostart $(DESTDIR)$(BINDIR)/qubes-session-autostart | ||||||
|  | 	install -m 0755 misc/qvm-features-request $(DESTDIR)$(BINDIR)/qvm-features-request | ||||||
|  | 	install qubes-rpc/{qvm-open-in-dvm,qvm-open-in-vm,qvm-copy-to-vm,qvm-move-to-vm,qvm-run,qvm-mru-entry} $(DESTDIR)$(BINDIR) | ||||||
| 
 | 
 | ||||||
| 	install qubes-rpc/{qvm-open-in-dvm,qvm-open-in-vm,qvm-copy-to-vm,qvm-move-to-vm,qvm-run,qvm-mru-entry} $(DESTDIR)/usr/bin |  | ||||||
| 	install qubes-rpc/qvm-copy-to-vm.kde $(DESTDIR)$(LIBDIR)/qubes | 	install qubes-rpc/qvm-copy-to-vm.kde $(DESTDIR)$(LIBDIR)/qubes | ||||||
| 	install qubes-rpc/qvm-copy-to-vm.gnome $(DESTDIR)$(LIBDIR)/qubes | 	install qubes-rpc/qvm-copy-to-vm.gnome $(DESTDIR)$(LIBDIR)/qubes | ||||||
| 	install qubes-rpc/qvm-move-to-vm.kde $(DESTDIR)$(LIBDIR)/qubes | 	install qubes-rpc/qvm-move-to-vm.kde $(DESTDIR)$(LIBDIR)/qubes | ||||||
| 	install qubes-rpc/qvm-move-to-vm.gnome $(DESTDIR)$(LIBDIR)/qubes | 	install qubes-rpc/qvm-move-to-vm.gnome $(DESTDIR)$(LIBDIR)/qubes | ||||||
| 	install qubes-rpc/xdg-icon $(DESTDIR)$(LIBDIR)/qubes | 	install qubes-rpc/xdg-icon $(DESTDIR)$(LIBDIR)/qubes | ||||||
| 	install qubes-rpc/{vm-file-editor,qfile-agent,qopen-in-vm} $(DESTDIR)$(LIBDIR)/qubes | 	install qubes-rpc/{vm-file-editor,qfile-agent,qopen-in-vm} $(DESTDIR)$(LIBDIR)/qubes | ||||||
| 	install qubes-rpc/qubes-open $(DESTDIR)/usr/bin | 	install qubes-rpc/qubes-open $(DESTDIR)$(BINDIR) | ||||||
| 	install qubes-rpc/tar2qfile $(DESTDIR)$(LIBDIR)/qubes | 	install qubes-rpc/tar2qfile $(DESTDIR)$(LIBDIR)/qubes | ||||||
| 	# Install qfile-unpacker as SUID - because it will fail to receive files from other vm | 	# Install qfile-unpacker as SUID - because it will fail to receive files from other vm | ||||||
| 	install -m 4755  qubes-rpc/qfile-unpacker $(DESTDIR)$(LIBDIR)/qubes | 	install -m 4755  qubes-rpc/qfile-unpacker $(DESTDIR)$(LIBDIR)/qubes | ||||||
| @ -244,7 +246,7 @@ install-common: | |||||||
| 	install -d $(DESTDIR)/usr/share/nautilus-python/extensions | 	install -d $(DESTDIR)/usr/share/nautilus-python/extensions | ||||||
| 	install -m 0644 qubes-rpc/*_nautilus.py $(DESTDIR)/usr/share/nautilus-python/extensions | 	install -m 0644 qubes-rpc/*_nautilus.py $(DESTDIR)/usr/share/nautilus-python/extensions | ||||||
| 
 | 
 | ||||||
| 	install -D -m 0755 misc/qubes-desktop-run $(DESTDIR)/usr/bin/qubes-desktop-run | 	install -D -m 0755 misc/qubes-desktop-run $(DESTDIR)$(BINDIR)/qubes-desktop-run | ||||||
| 
 | 
 | ||||||
| 	mkdir -p $(DESTDIR)/$(PYTHON_SITEARCH)/qubes/ | 	mkdir -p $(DESTDIR)/$(PYTHON_SITEARCH)/qubes/ | ||||||
| 
 | 
 | ||||||
|  | |||||||
							
								
								
									
										81
									
								
								misc/qvm-features-request
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										81
									
								
								misc/qvm-features-request
									
									
									
									
									
										Executable file
									
								
							| @ -0,0 +1,81 @@ | |||||||
|  | #!/usr/bin/env python2 | ||||||
|  | # vim: fileencoding=utf-8 | ||||||
|  | 
 | ||||||
|  | # | ||||||
|  | # The Qubes OS Project, https://www.qubes-os.org/ | ||||||
|  | # | ||||||
|  | # Copyright (C) 2010-2016  Joanna Rutkowska <joanna@invisiblethingslab.com> | ||||||
|  | # Copyright (C)      2016  Wojtek Porczyk <woju@invisiblethingslab.com> | ||||||
|  | # | ||||||
|  | # This program is free software; you can redistribute it and/or modify | ||||||
|  | # it under the terms of the GNU General Public License as published by | ||||||
|  | # the Free Software Foundation; either version 2 of the License, or | ||||||
|  | # (at your option) any later version. | ||||||
|  | # | ||||||
|  | # This program is distributed in the hope that it will be useful, | ||||||
|  | # but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||||
|  | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | ||||||
|  | # GNU General Public License for more details. | ||||||
|  | # | ||||||
|  | # You should have received a copy of the GNU General Public License along | ||||||
|  | # with this program; if not, write to the Free Software Foundation, Inc., | ||||||
|  | # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. | ||||||
|  | # | ||||||
|  | 
 | ||||||
|  | import argparse | ||||||
|  | import os | ||||||
|  | import subprocess | ||||||
|  | import sys | ||||||
|  | 
 | ||||||
|  | import qubesdb | ||||||
|  | 
 | ||||||
|  | class FeatureRequestAction(argparse.Action): | ||||||
|  |     '''Action for argument parser that stores a property.''' | ||||||
|  |     # pylint: disable=redefined-builtin,too-few-public-methods | ||||||
|  |     def __init__(self, | ||||||
|  |             option_strings, | ||||||
|  |             dest='features', | ||||||
|  |             metavar='NAME=VALUE', | ||||||
|  |             required=False, | ||||||
|  |             help='request a feature with the value'): | ||||||
|  |         super(FeatureRequestAction, self).__init__(option_strings, dest=dest, | ||||||
|  |             metavar=metavar, nargs='*', required=required, default={}, | ||||||
|  |             help=help) | ||||||
|  | 
 | ||||||
|  |     def __call__(self, parser, namespace, values, option_string=None): | ||||||
|  |         for request in values: | ||||||
|  |             try: | ||||||
|  |                 feature, value = request.split('=', 1) | ||||||
|  |             except ValueError: | ||||||
|  |                 parser.error( | ||||||
|  |                     'invalid feature request token: {!r}'.format(request)) | ||||||
|  | 
 | ||||||
|  |             getattr(namespace, self.dest)[feature] = value | ||||||
|  | 
 | ||||||
|  | 
 | ||||||
|  | parser = argparse.ArgumentParser( | ||||||
|  |     description='submit a feature request to the dom0') | ||||||
|  | 
 | ||||||
|  | parser.add_argument('--commit', | ||||||
|  |     action='store_true', default=False, | ||||||
|  |     help='actually send the request (without it, only make entries in qubesdb)') | ||||||
|  | 
 | ||||||
|  | parser.add_argument('features', | ||||||
|  |     action=FeatureRequestAction) | ||||||
|  | 
 | ||||||
|  | 
 | ||||||
|  | def main(args=None): | ||||||
|  |     args = parser.parse_args(args) | ||||||
|  | 
 | ||||||
|  |     qdb = qubesdb.QubesDB() | ||||||
|  |     for feature, value in args.features.items(): | ||||||
|  |         qdb.write('/features-request/' + feature, value) | ||||||
|  | 
 | ||||||
|  |     if args.commit: | ||||||
|  |         devnull = os.open(os.devnull, os.O_RDWR) | ||||||
|  |         subprocess.check_call( | ||||||
|  |             ['qrexec-client-vm', 'dom0', 'qubes.FeaturesRequest'], | ||||||
|  |             stdin=devnull, stdout=devnull) | ||||||
|  | 
 | ||||||
|  | if __name__ == '__main__': | ||||||
|  |     sys.exit(main()) | ||||||
| @ -384,6 +384,7 @@ rm -f %{name}-%{version} | |||||||
| /usr/bin/qvm-open-in-vm | /usr/bin/qvm-open-in-vm | ||||||
| /usr/bin/qvm-run | /usr/bin/qvm-run | ||||||
| /usr/bin/qvm-mru-entry | /usr/bin/qvm-mru-entry | ||||||
|  | /usr/bin/qvm-features-request | ||||||
| /usr/bin/xenstore-watch-qubes | /usr/bin/xenstore-watch-qubes | ||||||
| /usr/bin/qubes-desktop-run | /usr/bin/qubes-desktop-run | ||||||
| /usr/bin/qubes-open | /usr/bin/qubes-open | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user
	 Marek Marczykowski-Górecki
						Marek Marczykowski-Górecki