core-agent-linux/qubes-rpc/post-install.d/10-qubes-core-agent-features.sh
2020-01-24 18:45:17 +01:00

49 lines
1.8 KiB
Bash
Executable File

#!/bin/sh
# announce features supported by this template
qvm-features-request qrexec=1
qvm-features-request os=Linux
qvm-features-request vmexec=1
if [ -x /usr/bin/qubes-gui ]; then
qvm-features-request gui=1
fi
if systemctl -q is-enabled qubes-firewall.service 2>/dev/null; then
qvm-features-request qubes-firewall=1
else
qvm-features-request qubes-firewall=0
fi
qvm-features-request supported-service.meminfo-writer=1
# native services plugged into qubes-services with systemd drop-ins, list them
# only when actual service is installed
advertise_systemd_service() {
qsrv=$1
shift
for unit in "$@"; do
if systemctl -q is-enabled "$unit" 2>/dev/null; then
qvm-features-request supported-service."$qsrv"=1
fi
done
}
advertise_systemd_service network-manager NetworkManager.service \
network-manager.service
advertise_systemd_service modem-manager ModemManager.service
advertise_systemd_service avahi avahi-daemon.service
advertise_systemd_service crond anacron.service cron.service crond.service
advertise_systemd_service cups cups.service org.cups.cupsd.service
advertise_systemd_service clocksync chronyd.service qubes-sync-time.service \
systemd-timesyncd.service
advertise_systemd_service exim4 exim4.service
advertise_systemd_service getty@tty getty@tty.service
advertise_systemd_service netfilter-persistent netfilter-persistent.service
advertise_systemd_service qubes-update-check qubes-update-check.service
advertise_systemd_service updates-proxy-setup qubes-updates-proxy-forwarder.socket
advertise_systemd_service qubes-updates-proxy qubes-updates-proxy.service
advertise_systemd_service qubes-firewall qubes-firewall.service
advertise_systemd_service qubes-network qubes-network.service