소스 검색

Renamed qubes-mount-home to qubes-mount-dirs.

Renamed qubes-mount-home service and mount-home.sh script to qubes-mount-dirs service and mount-dirs.sh.
Because mount-home.sh also processed /rw/usrlocal.
preparation to fix the following issues:
- upstream bind-directories functionality to Qubes - https://phabricator.whonix.org/T414
- Bind mount /rw/usrlocal -> /usr/local instead of symlink - https://github.com/QubesOS/qubes-issues/issues/1150
- /bin/sync hangs forever in whonix-ws-dvm - https://github.com/QubesOS/qubes-issues/issues/1328
Patrick Schleizer 8 년 전
부모
커밋
f063b4a90f
6개의 변경된 파일9개의 추가작업 그리고 9개의 파일을 삭제
  1. 2 2
      archlinux/PKGBUILD.install
  2. 4 4
      rpm_spec/core-vm.spec
  3. 1 1
      vm-systemd/75-qubes-vm.preset
  4. 0 0
      vm-systemd/mount-dirs.sh
  5. 1 1
      vm-systemd/qubes-misc-post.service
  6. 1 1
      vm-systemd/qubes-mount-dirs.service

+ 2 - 2
archlinux/PKGBUILD.install

@@ -333,7 +333,7 @@ post_upgrade() {
 	configure_selinux
 	configure_networkmanager
 
-	services="qubes-dvm qubes-misc-post qubes-firewall qubes-mount-home"
+	services="qubes-dvm qubes-misc-post qubes-firewall qubes-mount-dirs"
 	services="$services qubes-netwatcher qubes-network qubes-sysinit"
 	services="$services qubes-updates-proxy qubes-qrexec-agent"
 	for srv in $services; do
@@ -374,7 +374,7 @@ post_remove() {
       rm /lib/firmware/updates
     fi
 
-    for srv in qubes-dvm qubes-sysinit qubes-misc-post qubes-mount-home qubes-netwatcher qubes-network qubes-qrexec-agent; do
+    for srv in qubes-dvm qubes-sysinit qubes-misc-post qubes-mount-dirs qubes-netwatcher qubes-network qubes-qrexec-agent; do
         systemctl disable $srv.service
     done
 

+ 4 - 4
rpm_spec/core-vm.spec

@@ -486,7 +486,7 @@ The Qubes core startup configuration for SystemD init.
 /lib/systemd/system/qubes-dvm.service
 /lib/systemd/system/qubes-misc-post.service
 /lib/systemd/system/qubes-firewall.service
-/lib/systemd/system/qubes-mount-home.service
+/lib/systemd/system/qubes-mount-dirs.service
 /lib/systemd/system/qubes-netwatcher.service
 /lib/systemd/system/qubes-network.service
 /lib/systemd/system/qubes-iptables.service
@@ -505,7 +505,7 @@ The Qubes core startup configuration for SystemD init.
 /usr/lib/qubes/init/qubes-iptables
 /usr/lib/qubes/init/misc-post.sh
 /usr/lib/qubes/init/misc-post-stop.sh
-/usr/lib/qubes/init/mount-home.sh
+/usr/lib/qubes/init/mount-dirs.sh
 /usr/lib/qubes/init/qubes-random-seed.sh
 /usr/lib/qubes/init/qubes-sysinit.sh
 /lib/systemd/system/chronyd.service.d/30_qubes.conf
@@ -526,7 +526,7 @@ PRESET_FAILED=0
 if [ $1 -eq 1 ]; then
     /bin/systemctl --no-reload preset-all > /dev/null 2>&1 && PRESET_FAILED=0 || PRESET_FAILED=1
 else
-    services="qubes-dvm qubes-misc-post qubes-firewall qubes-mount-home"
+    services="qubes-dvm qubes-misc-post qubes-firewall qubes-mount-dirs"
     services="$services qubes-netwatcher qubes-network qubes-sysinit"
     services="$services qubes-iptables qubes-updates-proxy qubes-qrexec-agent"
     services="$services qubes-random-seed"
@@ -573,6 +573,6 @@ if [ "$1" != 0 ] ; then
     exit 0
 fi
 
-for srv in qubes-dvm qubes-sysinit qubes-misc-post qubes-mount-home qubes-netwatcher qubes-network qubes-qrexec-agent; do
+for srv in qubes-dvm qubes-sysinit qubes-misc-post qubes-mount-dirs qubes-netwatcher qubes-network qubes-qrexec-agent; do
     /bin/systemctl disable $srv.service
 do

+ 1 - 1
vm-systemd/75-qubes-vm.preset

@@ -66,7 +66,7 @@ enable qubes-updates-proxy.service
 enable qubes-dvm.service
 enable qubes-network.service
 enable qubes-qrexec-agent.service
-enable qubes-mount-home.service
+enable qubes-mount-dirs.service
 enable qubes-firewall.service
 enable qubes-netwatcher.service
 enable qubes-meminfo-writer.service

+ 0 - 0
vm-systemd/mount-home.sh → vm-systemd/mount-dirs.sh


+ 1 - 1
vm-systemd/qubes-misc-post.service

@@ -1,6 +1,6 @@
 [Unit]
 Description=Qubes misc post-boot actions
-After=qubes-dvm.service qubes-mount-home.service
+After=qubes-dvm.service qubes-mount-dirs.service
 
 [Service]
 Type=oneshot

+ 1 - 1
vm-systemd/qubes-mount-home.service → vm-systemd/qubes-mount-dirs.service

@@ -5,7 +5,7 @@ Before=qubes-gui-agent.service
 [Service]
 Type=oneshot
 RemainAfterExit=yes
-ExecStart=/usr/lib/qubes/init/mount-home.sh
+ExecStart=/usr/lib/qubes/init/mount-dirs.sh
 # Fedora and Debian have different paths for fuser
 ExecStop=/bin/sh -c 'fuser -kMm /home' ; /bin/umount /home
 ExecStopPost=-/bin/umount /rw