#!/bin/bash # # chkconfig: 345 90 90 # description: Executes Qubes core scripts at VM boot # # Source function library. . /etc/rc.d/init.d/functions start() { echo -n $"Executing Qubes Core scripts:" # Set permissions to /proc/xen/xenbus, so normal user can access xenstore chmod 666 /proc/xen/xenbus # Set permissions to files needed by gui-agent chmod 666 /proc/u2mfn mkdir -p /var/run/xen-hotplug mkdir -p /var/run/qubes chgrp qubes /var/run/qubes chmod 0775 /var/run/qubes # Location of files which contains list of protected files PROTECTED_FILE_LIST='/etc/qubes/protected-files.d' # Set the hostname if ! grep -rq "^/etc/hostname$" "${PROTECTED_FILE_LIST}" 2>/dev/null; then name=$(/usr/bin/qubesdb-read /name) if ! [ -f /etc/this-is-dvm ] ; then # we don't want to set hostname for DispVM # because it makes some of the pre-created dotfiles invalid (e.g. .kde/cache-) # (let's be frank: nobody's gonna use xterm on DispVM) hostname $name sed -i "s/^\(127\.0\.0\.1[\t ].*\) \($name \)\?\(.*\)/\1\2 $name/" /etc/hosts fi fi # Set the timezone if ! grep -rq "^/etc/timezone$" "${PROTECTED_FILE_LIST}" 2>/dev/null; then timezone=`/usr/bin/qubesdb-read /qubes-timezone 2> /dev/null` if [ -n "$timezone" ]; then ln -f /usr/share/zoneinfo/$timezone /etc/localtime echo "# Clock configuration autogenerated based on Qubes dom0 settings" > /etc/sysconfig/clock echo "ZONE=\"$timezone\"" >> /etc/sysconfig/clock fi fi yum_proxy_setup=$(/usr/bin/qubesdb-read /qubes-service/yum-proxy-setup 2> /dev/null || /usr/bin/qubesdb-read /qubes-service/updates-proxy-setup 2> /dev/null) type=$(/usr/bin/qubesdb-read /qubes-vm-type) if [ "$yum_proxy_setup" != "0" ] || [ -z "$yum_proxy_setup" -a "$type" == "TemplateVM" ]; then echo proxy=http://10.137.255.254:8082/ > /etc/yum.conf.d/qubes-proxy.conf else echo > /etc/yum.conf.d/qubes-proxy.conf fi # Set IP address again (besides action in udev rules); this is needed by # DispVM (to override DispVM-template IP) and in case when qubes-ip was # called by udev before loading evtchn kernel module - in which case # qubesdb-read fails INTERFACE=eth0 /usr/lib/qubes/setup-ip if [ -e /dev/xvdb ] ; then # check if private.img (xvdb) is empty - all zeros private_size_512=`blockdev --getsz /dev/xvdb` if dd if=/dev/zero bs=512 count=$private_size_512 | diff /dev/xvdb - >/dev/null; then # the device is empty, create filesystem echo "--> Virgin boot of the VM: creating filesystem on private.img" mkfs.ext4 -m 0 -q /dev/xvdb || exit 1 fi mount /rw resize2fs /dev/xvdb 2> /dev/null || echo "'resize2fs /dev/xvdb' failed" if ! [ -d /rw/home ] ; then echo echo "--> Virgin boot of the VM: Linking /home to /rw/home" mkdir -p /rw/config cat > /rw/config/rc.local < /rw/config/qubes-firewall-user-script < /rw/config/suspend-module-blacklist < /dev/null) if [ "$start_ntpd" == "1" ]; then /sbin/service ntpd start fi return 0 } stop() { su -c 'mkdir -p /home_volatile/user/.local/share/applications' user su -c 'cp -a /usr/share/applications/defaults.list /home_volatile/user/.local/share/applications/' user if [ -r '/home/user/.local/share/applications/defaults.list' ]; then su -c 'cat /home/user/.local/share/applications/defaults.list >> /home_volatile/user/.local/share/applications/defaults.list' user fi return 0 } case "$1" in start) start ;; stop) stop ;; *) echo $"Usage: $0 {start|stop}" exit 3 ;; esac exit $RETVAL