Merge branch 'master' of https://github.com/marmarek/qubes-core-agent-linux
Conflicts: archlinux/PKGBUILD.install
This commit is contained in:
		
						commit
						fcee020cf5
					
				| @ -1,5 +1,4 @@ | ||||
| 
 | ||||
| 
 | ||||
| ########################### | ||||
| ## Pre-Install functions ## | ||||
| ########################### | ||||
| @ -71,7 +70,6 @@ configure_selinux() { | ||||
| 	# sed -e s/^SELINUX=.*$/SELINUX=disabled/ -i /etc/selinux/config | ||||
| 	# setenforce 0 2>/dev/null | ||||
| 
 | ||||
| 
 | ||||
| } | ||||
| 
 | ||||
| ############################ | ||||
| @ -149,7 +147,7 @@ PRESET_FAILED=0 | ||||
| if [ $1 -eq 1 ]; then | ||||
|     systemctl --no-reload preset-all > /dev/null 2>&1 && PRESET_FAILED=0 || PRESET_FAILED=1 | ||||
| else | ||||
|     services="qubes-dvm qubes-misc-post qubes-firewall qubes-mount-home" | ||||
|     services="qubes-dvm qubes-misc-post qubes-firewall qubes-mount-dirs" | ||||
|     services="$services qubes-netwatcher qubes-network qubes-sysinit" | ||||
|     services="$services qubes-iptables qubes-updates-proxy qubes-qrexec-agent" | ||||
|     services="$services qubes-random-seed" | ||||
| @ -252,8 +250,6 @@ post_install() { | ||||
| 	 | ||||
| } | ||||
| 
 | ||||
| 
 | ||||
| 
 | ||||
| ## arg 1:  the new package version | ||||
| ## arg 2:  the old package version | ||||
| post_upgrade() { | ||||
| @ -263,13 +259,10 @@ post_upgrade() { | ||||
| 	configure_notification-daemon | ||||
| 	configure_selinux | ||||
| 
 | ||||
| 	configure_systemd 1 | ||||
| 
 | ||||
| 	update_finalize | ||||
| 
 | ||||
| 	/usr/bin/glib-compile-schemas /usr/share/glib-2.0/schemas &> /dev/null || : | ||||
| 
 | ||||
| 
 | ||||
| } | ||||
| 
 | ||||
| ###################### | ||||
| @ -299,12 +292,8 @@ post_remove() { | ||||
|       rm /lib/firmware/updates | ||||
|     fi | ||||
| 
 | ||||
|     rm -rf /var/lib/qubes/xdg | ||||
|      | ||||
|     for srv in qubes-dvm qubes-sysinit qubes-misc-post qubes-mount-home qubes-netwatcher qubes-network qubes-qrexec-agent; do | ||||
|     for srv in qubes-dvm qubes-sysinit qubes-misc-post qubes-mount-dirs qubes-netwatcher qubes-network qubes-qrexec-agent; do | ||||
|         systemctl disable $srv.service | ||||
|     done | ||||
|      | ||||
|      | ||||
| } | ||||
| 
 | ||||
|  | ||||
| @ -14,4 +14,3 @@ wrap_in_html_if_url() | ||||
| 	esac | ||||
| } | ||||
| 
 | ||||
| 		 | ||||
| @ -486,7 +486,7 @@ The Qubes core startup configuration for SystemD init. | ||||
| /lib/systemd/system/qubes-dvm.service | ||||
| /lib/systemd/system/qubes-misc-post.service | ||||
| /lib/systemd/system/qubes-firewall.service | ||||
| /lib/systemd/system/qubes-mount-home.service | ||||
| /lib/systemd/system/qubes-mount-dirs.service | ||||
| /lib/systemd/system/qubes-netwatcher.service | ||||
| /lib/systemd/system/qubes-network.service | ||||
| /lib/systemd/system/qubes-iptables.service | ||||
| @ -505,7 +505,7 @@ The Qubes core startup configuration for SystemD init. | ||||
| /usr/lib/qubes/init/qubes-iptables | ||||
| /usr/lib/qubes/init/misc-post.sh | ||||
| /usr/lib/qubes/init/misc-post-stop.sh | ||||
| /usr/lib/qubes/init/mount-home.sh | ||||
| /usr/lib/qubes/init/mount-dirs.sh | ||||
| /usr/lib/qubes/init/qubes-random-seed.sh | ||||
| /usr/lib/qubes/init/qubes-sysinit.sh | ||||
| /lib/systemd/system/chronyd.service.d/30_qubes.conf | ||||
| @ -526,7 +526,7 @@ PRESET_FAILED=0 | ||||
| if [ $1 -eq 1 ]; then | ||||
|     /bin/systemctl --no-reload preset-all > /dev/null 2>&1 && PRESET_FAILED=0 || PRESET_FAILED=1 | ||||
| else | ||||
|     services="qubes-dvm qubes-misc-post qubes-firewall qubes-mount-home" | ||||
|     services="qubes-dvm qubes-misc-post qubes-firewall qubes-mount-dirs" | ||||
|     services="$services qubes-netwatcher qubes-network qubes-sysinit" | ||||
|     services="$services qubes-iptables qubes-updates-proxy qubes-qrexec-agent" | ||||
|     services="$services qubes-random-seed" | ||||
| @ -573,6 +573,6 @@ if [ "$1" != 0 ] ; then | ||||
|     exit 0 | ||||
| fi | ||||
| 
 | ||||
| for srv in qubes-dvm qubes-sysinit qubes-misc-post qubes-mount-home qubes-netwatcher qubes-network qubes-qrexec-agent; do | ||||
| for srv in qubes-dvm qubes-sysinit qubes-misc-post qubes-mount-dirs qubes-netwatcher qubes-network qubes-qrexec-agent; do | ||||
|     /bin/systemctl disable $srv.service | ||||
| do | ||||
|  | ||||
| @ -66,7 +66,7 @@ enable qubes-updates-proxy.service | ||||
| enable qubes-dvm.service | ||||
| enable qubes-network.service | ||||
| enable qubes-qrexec-agent.service | ||||
| enable qubes-mount-home.service | ||||
| enable qubes-mount-dirs.service | ||||
| enable qubes-firewall.service | ||||
| enable qubes-netwatcher.service | ||||
| enable qubes-meminfo-writer.service | ||||
|  | ||||
| @ -1,6 +1,6 @@ | ||||
| [Unit] | ||||
| Description=Qubes misc post-boot actions | ||||
| After=qubes-dvm.service qubes-mount-home.service | ||||
| After=qubes-dvm.service qubes-mount-dirs.service | ||||
| 
 | ||||
| [Service] | ||||
| Type=oneshot | ||||
|  | ||||
| @ -5,7 +5,7 @@ Before=qubes-gui-agent.service | ||||
| [Service] | ||||
| Type=oneshot | ||||
| RemainAfterExit=yes | ||||
| ExecStart=/usr/lib/qubes/init/mount-home.sh | ||||
| ExecStart=/usr/lib/qubes/init/mount-dirs.sh | ||||
| # Fedora and Debian have different paths for fuser | ||||
| ExecStop=/bin/sh -c 'fuser -kMm /home' ; /bin/umount /home | ||||
| ExecStopPost=-/bin/umount /rw | ||||
		Loading…
	
		Reference in New Issue
	
	Block a user
	 Olivier MEDOC
						Olivier MEDOC