[4.3] qubes-{vm-core,usb-proxy,pass,vm-core}: uport changes from r4.2 #77
5 changed files with 47 additions and 4 deletions
|
@ -14,11 +14,21 @@ makedepends="
|
||||||
pkgconf
|
pkgconf
|
||||||
"
|
"
|
||||||
options="!check"
|
options="!check"
|
||||||
source="$pkgname-$_gittag.tar.gz::https://github.com/Rudd-O/qubes-pass/archive/$_gittag.tar.gz"
|
subpackages="$pkgname-service"
|
||||||
|
source="
|
||||||
|
$pkgname-$_gittag.tar.gz::https://github.com/Rudd-O/qubes-pass/archive/$_gittag.tar.gz
|
||||||
|
service-passquery.sh
|
||||||
|
"
|
||||||
|
|
||||||
package() {
|
package() {
|
||||||
make install-client DESTDIR="$pkgdir"
|
make install-client DESTDIR="$pkgdir"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
service() {
|
||||||
|
make -C "$builddir" install-service DESTDIR="$subpkgdir"
|
||||||
|
install -Dm755 "$srcdir"/service-passquery.sh "$subpkgdir"/etc/qubes-rpc/ruddo.PassQuery
|
||||||
|
}
|
||||||
sha512sums="
|
sha512sums="
|
||||||
b304bf8e6b8d04e7df4b52a02984ab03b6f3221c9178f1d91c99cab61e8b5ded45500b51de6d89aa76f4e73c0a3670ce6d07649c0ac159d048c3f0ac736c4d63 qubes-pass-v0.1.0.tar.gz
|
b304bf8e6b8d04e7df4b52a02984ab03b6f3221c9178f1d91c99cab61e8b5ded45500b51de6d89aa76f4e73c0a3670ce6d07649c0ac159d048c3f0ac736c4d63 qubes-pass-v0.1.0.tar.gz
|
||||||
|
77807ba7bd8e1627785358ef2f9e165712ef41ef76f11e7a7b989b1057f462abc433df96265c6c7d669f81e39d89de0f7ea3dcbb207c5a7a22738b843fd7e160 service-passquery.sh
|
||||||
"
|
"
|
||||||
|
|
13
qubes-pass/service-passquery.sh
Normal file
13
qubes-pass/service-passquery.sh
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
read -n 4096 cmd
|
||||||
|
cmd=$(echo "$cmd" | base64 -d)
|
||||||
|
|
||||||
|
if [ "$cmd" == "list-files" ] ; then
|
||||||
|
|
||||||
|
logger -t ruddo.PassQuery "requested password file list"
|
||||||
|
exec pass git ls-files | sed -e '/.gitattributes/d' -e '/.gpg-id/d'
|
||||||
|
|
||||||
|
fi
|
|
@ -3,7 +3,7 @@
|
||||||
pkgname=qubes-usb-proxy
|
pkgname=qubes-usb-proxy
|
||||||
pkgver=1.3.0
|
pkgver=1.3.0
|
||||||
_gittag="v$pkgver"
|
_gittag="v$pkgver"
|
||||||
pkgrel=1
|
pkgrel=2
|
||||||
pkgdesc="The Qubes service for proxying USB devices"
|
pkgdesc="The Qubes service for proxying USB devices"
|
||||||
arch="noarch"
|
arch="noarch"
|
||||||
url="https://github.com/QubesOS/qubes-app-linux-usb-proxy"
|
url="https://github.com/QubesOS/qubes-app-linux-usb-proxy"
|
||||||
|
@ -32,8 +32,11 @@ package() {
|
||||||
for i in $(grep '/bin/sh' -Rl "$pkgdir"); do
|
for i in $(grep '/bin/sh' -Rl "$pkgdir"); do
|
||||||
sed -i 's|/bin/sh|/bin/bash|' "$i"
|
sed -i 's|/bin/sh|/bin/bash|' "$i"
|
||||||
done
|
done
|
||||||
|
|
||||||
|
mkdir -p "$pkgdir"/etc/modules-load.d
|
||||||
|
echo "vhci-hcd" > "$pkgdir"/etc/modules-load.d/qubes-usb-proxy.conf
|
||||||
}
|
}
|
||||||
sha512sums="
|
sha512sums="
|
||||||
822718decff8d2d15e56208b51603d3104cacb42981576985c2955e2bb73a66119397359314ebb6e6b52e3985b4d797e02b1074faf40aa6ca9cce067c753d830 qubes-usb-proxy-v1.3.0.tar.gz
|
822718decff8d2d15e56208b51603d3104cacb42981576985c2955e2bb73a66119397359314ebb6e6b52e3985b4d797e02b1074faf40aa6ca9cce067c753d830 qubes-usb-proxy-v1.3.0.tar.gz
|
||||||
d0eb969122a41be8fa9647ca824aabf3cb3d39324b156b3e05872099e7c4b600dbc8060ab2a63186d84f60364c28c5db9da4d06e37ad36877a2222bdc2cdbd74 usb-import-alpine-udevadm.patch
|
c6519982f7eef8586ee823dc96efa7b1b90f489114edcc348bc5221837090d19a2a3533eac83e3269ba68c2cf24447c018e0ac850ed1423a1280ebae364223fa usb-import-alpine-udevadm.patch
|
||||||
"
|
"
|
||||||
|
|
|
@ -11,3 +11,17 @@ index 7b17799..e718795 100755
|
||||||
}
|
}
|
||||||
|
|
||||||
wait_for_detached() {
|
wait_for_detached() {
|
||||||
|
diff --git a/src/usb-export.orig b/src/usb-export
|
||||||
|
index ad2ab2b..37cff16 100755
|
||||||
|
--- a/src/usb-export.orig
|
||||||
|
+++ b/src/usb-export
|
||||||
|
@@ -110,8 +110,7 @@ if [ -n "$attach_to_usbip" ]; then
|
||||||
|
echo "$busid" > "$SYS_USBIP_HOST/bind" || exit 1
|
||||||
|
|
||||||
|
# optionally reset the device to clear any state from previous driver
|
||||||
|
- reset_on_attach=$(udevadm info --query=property \
|
||||||
|
- --value --property=QUBES_USB_RESET --path="$devpath")
|
||||||
|
+ reset_on_attach=$(udevadm info --query=property --path="$devpath" | awk -F "=" '{if($1=="QUBES_USB_RESET"){print $2}}' )
|
||||||
|
if [ -f /run/qubes-service/usb-reset-on-attach ]; then
|
||||||
|
reset_on_attach=1
|
||||||
|
fi
|
||||||
|
|
|
@ -9,7 +9,7 @@ subpackages="
|
||||||
$pkgname-pyc
|
$pkgname-pyc
|
||||||
"
|
"
|
||||||
pkgver=4.3.4
|
pkgver=4.3.4
|
||||||
pkgrel=0
|
pkgrel=2
|
||||||
_gittag="v$pkgver"
|
_gittag="v$pkgver"
|
||||||
pkgdesc="The Qubes core files for installation inside a Qubes VM."
|
pkgdesc="The Qubes core files for installation inside a Qubes VM."
|
||||||
arch="x86_64"
|
arch="x86_64"
|
||||||
|
@ -19,6 +19,7 @@ options="!check" # No testsuite
|
||||||
depends="
|
depends="
|
||||||
blkid
|
blkid
|
||||||
coreutils
|
coreutils
|
||||||
|
dbus-x11
|
||||||
dconf
|
dconf
|
||||||
desktop-file-utils
|
desktop-file-utils
|
||||||
device-mapper
|
device-mapper
|
||||||
|
@ -27,6 +28,7 @@ depends="
|
||||||
e2fsprogs-extra
|
e2fsprogs-extra
|
||||||
ethtool
|
ethtool
|
||||||
fakeroot
|
fakeroot
|
||||||
|
findutils
|
||||||
gawk
|
gawk
|
||||||
grep
|
grep
|
||||||
haveged
|
haveged
|
||||||
|
@ -42,6 +44,7 @@ depends="
|
||||||
qubes-db-vm
|
qubes-db-vm
|
||||||
qubes-libvchan-xen
|
qubes-libvchan-xen
|
||||||
qubes-vm-utils
|
qubes-vm-utils
|
||||||
|
rsvg-convert
|
||||||
sed
|
sed
|
||||||
socat
|
socat
|
||||||
xdg-utils
|
xdg-utils
|
||||||
|
|
Loading…
Reference in a new issue