Remove qubes-pass-client. Bump version.

This commit is contained in:
Manuel Amador (Rudd-O) 2019-07-10 00:52:54 +00:00
parent c28a659f0a
commit 2eea0c9345
3 changed files with 1 additions and 71 deletions

View File

@ -19,7 +19,6 @@ srpm: dist
install-client:
install -Dm 755 bin/qvm-pass -t $(DESTDIR)/$(BINDIR)/
install -Dm 755 bin/qubes-pass-client -t $(DESTDIR)/$(BINDIR)/
mkdir -p $(DESTDIR)/$(LIBEXECDIR)/qubes-pass/
# Support the trick of using PATH=/usr/libexec/qubes-pass:$PATH to fool
# programs which invoke the pass store command line program.

View File

@ -1,68 +0,0 @@
#!/bin/bash
set -e
if [ -s /rw/config/pass-split-domain -a -z "$QUBES_PASS_DOMAIN" ] ; then
export QUBES_PASS_DOMAIN=$( cat /rw/config/pass-split-domain )
fi
if [ -z "$QUBES_PASS_DOMAIN" ] ; then
title="Qubes pass error"
msg="The QUBES_PASS_DOMAIN variable is not defined. Either create /rw/config/pass-split-domain with the VM containing your pass setup, set the environment variable yourself, or pass -d on the command line."
echo "$title: $msg" >&2
zenity --error --text "$msg" --title "$title" &
exit 124
fi
if [ "$1" == "list" ] ; then
cmd=$(echo "$1" | base64 -w 0)
echo "$cmd" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassRead
elif [ "$1" == "get" ] ; then
cmd=$(echo "$1" | base64 -w 0)
key=$(echo "$2" | base64 -w 0)
echo "$cmd
$key" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassRead
elif [ "$1" == "get-or-generate" ] ; then
cmd=$(echo "$1" | base64 -w 0)
key=$(echo "$2" | base64 -w 0)
nosymbols=$(echo "$3" | base64 -w 0)
echo "$cmd
$key
$nosymbols" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
elif [ "$1" == "rm" ] ; then
cmd=$(echo "$1" | base64 -w 0)
key=$(echo "$2" | base64 -w 0)
echo "$cmd
$key" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
elif [ "$1" == "mv" -o "$1" == "cp" ] ; then
cmd=$(echo "$1" | base64 -w 0)
key=$(echo "$2" | base64 -w 0)
newkey=$(echo "$3" | base64 -w 0)
force=$(echo "$4" | base64 -w 0)
echo "$cmd
$key
$newkey
$force" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
elif [ "$1" == "insert" ] ; then
cmd=$(echo "$1" | base64 -w 0)
key=$(echo "$2" | base64 -w 0)
multiline=$(echo "$3" | base64 -w 0)
contents=$(echo "$4") # Insert already sends its first parameters base64-encoded
echo "$cmd
$key
$multiline
$contents" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
elif [ "$1" == "init" ] ; then
cmd=$(echo "$1" | base64 -w 0)
echo "$cmd" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
fi

View File

@ -3,7 +3,7 @@
%define mybuildnumber %{?build_number}%{?!build_number:1}
Name: qubes-pass
Version: 0.0.14
Version: 0.0.15
Release: %{mybuildnumber}%{?dist}
Summary: Inter-VM pass password management for Qubes OS AppVMs and StandaloneVMs
BuildArch: noarch
@ -68,7 +68,6 @@ fi
%files
%attr(0755, root, root) %{_bindir}/qvm-pass
%attr(-, -, -) %{_libexecdir}/%{name}/pass
%attr(0755, root, root) %{_bindir}/qubes-pass-client
%doc README.md
%files service