Merge branch 'hvm' of 10.141.1.101:/var/lib/qubes/git/marmarek/core into hvm
This commit is contained in:
commit
a353794031
@ -3,5 +3,5 @@
|
|||||||
UPDATEABLE=`/usr/bin/xenstore-read qubes_vm_updateable`
|
UPDATEABLE=`/usr/bin/xenstore-read qubes_vm_updateable`
|
||||||
|
|
||||||
if [ "$UPDATEABLE" = "True" ]; then
|
if [ "$UPDATEABLE" = "True" ]; then
|
||||||
/usr/lib/qubes/qrexec_client_vm dom0 qubes.SyncAppMenus /bin/grep -H = /usr/share/applications/*.desktop
|
/usr/lib/qubes/qrexec_client_vm dom0 qubes.SyncAppMenus /bin/sh /etc/qubes_rpc/qubes.GetAppmenus
|
||||||
fi
|
fi
|
||||||
|
@ -51,13 +51,19 @@ int main(int argc, char ** argv)
|
|||||||
char *incoming_dir;
|
char *incoming_dir;
|
||||||
int pipefds[2];
|
int pipefds[2];
|
||||||
int uid;
|
int uid;
|
||||||
|
char *remote_domain;
|
||||||
|
|
||||||
pipe(pipefds);
|
pipe(pipefds);
|
||||||
|
|
||||||
uid = prepare_creds_return_uid("user");
|
uid = prepare_creds_return_uid("user");
|
||||||
|
|
||||||
|
remote_domain = getenv("QREXEC_REMOTE_DOMAIN");
|
||||||
|
if (!remote_domain) {
|
||||||
|
gui_fatal("Cannot get remote domain name");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
mkdir(INCOMING_DIR_ROOT, 0700);
|
mkdir(INCOMING_DIR_ROOT, 0700);
|
||||||
asprintf(&incoming_dir, "%s/from-%s", INCOMING_DIR_ROOT, argv[1]);
|
asprintf(&incoming_dir, "%s/from-%s", INCOMING_DIR_ROOT, remote_domain);
|
||||||
mkdir(incoming_dir, 0700);
|
mkdir(incoming_dir, 0700);
|
||||||
if (chdir(incoming_dir))
|
if (chdir(incoming_dir))
|
||||||
gui_fatal("Error chdir to %s", incoming_dir);
|
gui_fatal("Error chdir to %s", incoming_dir);
|
||||||
|
2
qubes_rpc/qubes.GetAppmenus
Normal file
2
qubes_rpc/qubes.GetAppmenus
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
shopt -s nullglob
|
||||||
|
/bin/grep -H = /usr/share/applications/*.desktop /usr/local/share/applications/*.desktop 2> /dev/null
|
@ -1 +1 @@
|
|||||||
/usr/lib/qubes/vm-shell
|
/bin/bash
|
||||||
|
@ -1,3 +0,0 @@
|
|||||||
#!/bin/sh
|
|
||||||
# just ignore the cmdline argument (the remote vm name)
|
|
||||||
exec /bin/bash
|
|
@ -156,14 +156,14 @@ install qubes_rpc/wrap_in_html_if_url.sh $RPM_BUILD_ROOT/usr/lib/qubes
|
|||||||
install qubes_rpc/qvm-copy-to-vm.kde $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/qvm-copy-to-vm.kde $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install qubes_rpc/qvm-copy-to-vm.gnome $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/qvm-copy-to-vm.gnome $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install qubes_rpc/{vm-file-editor,qfile-agent,qopen-in-vm,qfile-unpacker} $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/{vm-file-editor,qfile-agent,qopen-in-vm,qfile-unpacker} $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install qubes_rpc/{vm-shell,qrun-in-vm} $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/qrun-in-vm $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install qubes_rpc/sync-ntp-clock $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/sync-ntp-clock $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install qubes_rpc/prepare-suspend $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/prepare-suspend $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install -d $RPM_BUILD_ROOT/%{kde_service_dir}
|
install -d $RPM_BUILD_ROOT/%{kde_service_dir}
|
||||||
install -m 0644 qubes_rpc/{qvm-copy.desktop,qvm-dvm.desktop} $RPM_BUILD_ROOT/%{kde_service_dir}
|
install -m 0644 qubes_rpc/{qvm-copy.desktop,qvm-dvm.desktop} $RPM_BUILD_ROOT/%{kde_service_dir}
|
||||||
install -d $RPM_BUILD_ROOT/etc/qubes_rpc
|
install -d $RPM_BUILD_ROOT/etc/qubes_rpc
|
||||||
install -m 0644 qubes_rpc/{qubes.Filecopy,qubes.OpenInVM,qubes.VMShell,qubes.SyncNtpClock} $RPM_BUILD_ROOT/etc/qubes_rpc
|
install -m 0644 qubes_rpc/{qubes.Filecopy,qubes.OpenInVM,qubes.VMShell,qubes.SyncNtpClock} $RPM_BUILD_ROOT/etc/qubes_rpc
|
||||||
install -m 0644 qubes_rpc/{qubes.SuspendPre,qubes.SuspendPost} $RPM_BUILD_ROOT/etc/qubes_rpc
|
install -m 0644 qubes_rpc/{qubes.SuspendPre,qubes.SuspendPost,qubes.GetAppmenus} $RPM_BUILD_ROOT/etc/qubes_rpc
|
||||||
|
|
||||||
install qrexec/qrexec_agent $RPM_BUILD_ROOT/usr/lib/qubes
|
install qrexec/qrexec_agent $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install qrexec/qrexec_client_vm $RPM_BUILD_ROOT/usr/lib/qubes
|
install qrexec/qrexec_client_vm $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
@ -188,13 +188,6 @@ install -D u2mfn/libu2mfn.so $RPM_BUILD_ROOT/%{_libdir}/libu2mfn.so
|
|||||||
%triggerin -- initscripts
|
%triggerin -- initscripts
|
||||||
cp /usr/lib/qubes/serial.conf /etc/init/serial.conf
|
cp /usr/lib/qubes/serial.conf /etc/init/serial.conf
|
||||||
|
|
||||||
%triggerin -- systemd
|
|
||||||
# Disable pam_systemd - we (hopefully) don't need it, but it cause some minor
|
|
||||||
# problems (http://wiki.qubes-os.org/trac/ticket/607)
|
|
||||||
# /etc/pam.d/common-* are automatically (re)generated by authconfig, so its
|
|
||||||
# modification will not be persistent -> must be done this way
|
|
||||||
mv -f /%{_lib}/security/pam_systemd.so /%{_lib}/security/pam_systemd.so.disabled 2> /dev/null || :
|
|
||||||
|
|
||||||
%post
|
%post
|
||||||
|
|
||||||
# disable some Upstart services
|
# disable some Upstart services
|
||||||
@ -336,7 +329,6 @@ if [ "$1" = 0 ] ; then
|
|||||||
mv /var/lib/qubes/fstab.orig /etc/fstab
|
mv /var/lib/qubes/fstab.orig /etc/fstab
|
||||||
mv /var/lib/qubes/removed-udev-scripts/* /etc/udev/rules.d/
|
mv /var/lib/qubes/removed-udev-scripts/* /etc/udev/rules.d/
|
||||||
mv /var/lib/qubes/serial.orig /etc/init/serial.conf
|
mv /var/lib/qubes/serial.orig /etc/init/serial.conf
|
||||||
mv /%{_lib}/security/pam_systemd.so.disabled /%{_lib}/security/pam_systemd.so
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
%postun
|
%postun
|
||||||
@ -371,6 +363,7 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
%dir /etc/qubes_rpc
|
%dir /etc/qubes_rpc
|
||||||
/etc/qubes_rpc/qubes.Filecopy
|
/etc/qubes_rpc/qubes.Filecopy
|
||||||
/etc/qubes_rpc/qubes.OpenInVM
|
/etc/qubes_rpc/qubes.OpenInVM
|
||||||
|
/etc/qubes_rpc/qubes.GetAppmenus
|
||||||
/etc/qubes_rpc/qubes.VMShell
|
/etc/qubes_rpc/qubes.VMShell
|
||||||
/etc/qubes_rpc/qubes.SyncNtpClock
|
/etc/qubes_rpc/qubes.SyncNtpClock
|
||||||
/etc/qubes_rpc/qubes.SuspendPre
|
/etc/qubes_rpc/qubes.SuspendPre
|
||||||
@ -419,7 +412,6 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
/usr/lib/qubes/serial.conf
|
/usr/lib/qubes/serial.conf
|
||||||
/usr/lib/qubes/setup_ip
|
/usr/lib/qubes/setup_ip
|
||||||
/usr/lib/qubes/vm-file-editor
|
/usr/lib/qubes/vm-file-editor
|
||||||
/usr/lib/qubes/vm-shell
|
|
||||||
/usr/lib/qubes/wrap_in_html_if_url.sh
|
/usr/lib/qubes/wrap_in_html_if_url.sh
|
||||||
/usr/lib/yum-plugins/yum-qubes-hooks.py*
|
/usr/lib/yum-plugins/yum-qubes-hooks.py*
|
||||||
/usr/sbin/qubes_firewall
|
/usr/sbin/qubes_firewall
|
||||||
|
Loading…
Reference in New Issue
Block a user