1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 |
- #!/bin/sh
- # List of services enabled by default (in case of absence of xenstore entry)
- DEFAULT_ENABLED_NETVM="network-manager qubes-network"
- DEFAULT_ENABLED_PROXYVM="meminfo-writer qubes-network qubes-firewall qubes-netwatcher"
- DEFAULT_ENABLED_APPVM="meminfo-writer"
- DEFAULT_ENABLED="meminfo-writer"
- XS_READ=/usr/bin/xenstore-read
- XS_LS=/usr/bin/xenstore-ls
- read_service() {
- $XS_READ qubes-service/$1 2> /dev/null
- }
- mkdir -p /var/run/qubes
- mkdir -p /var/run/qubes-service
- mkdir -p /var/run/xen-hotplug
- # Set permissions to /proc/xen/xenbus, so normal user can use xenstore-read
- chmod 666 /proc/xen/xenbus
- # Set default services depending on VM type
- TYPE=`$XS_READ qubes_vm_type 2> /dev/null`
- [ "$TYPE" == "AppVM" ] && DEFAULT_ENABLED=$DEFAULT_ENABLED_APPVM
- [ "$TYPE" == "NetVM" ] && DEFAULT_ENABLED=$DEFAULT_ENABLED_NETVM
- [ "$TYPE" == "ProxyVM" ] && DEFAULT_ENABLED=$DEFAULT_ENABLED_PROXYVM
- # Enable default services
- for srv in $DEFAULT_ENABLED; do
- touch /var/run/qubes-service/$srv
- done
- # Enable services
- for srv in `$XS_LS qubes-service 2>/dev/null |grep ' = "1"'|cut -f 1 -d ' '`; do
- touch /var/run/qubes-service/$srv
- done
- # Disable services
- for srv in `$XS_LS qubes-service 2>/dev/null |grep ' = "0"'|cut -f 1 -d ' '`; do
- rm -f /var/run/qubes-service/$srv
- done
- # Set the hostname
- name=`$XS_READ name`
- if [ -n "$name" ]; then
- hostname $name
- (grep -v "\<$name\>" /etc/hosts; echo "127.0.0.1 $name") > /etc/hosts
- fi
|