mirror of
				https://github.com/gaschz/qubes-pass.git
				synced 2025-11-04 13:38:55 +01:00 
			
		
		
		
	Remove qubes-pass-client. Bump version.
This commit is contained in:
		
							parent
							
								
									c28a659f0a
								
							
						
					
					
						commit
						2eea0c9345
					
				
							
								
								
									
										1
									
								
								Makefile
									
									
									
									
									
								
							
							
						
						
									
										1
									
								
								Makefile
									
									
									
									
									
								
							@ -19,7 +19,6 @@ srpm: dist
 | 
			
		||||
 | 
			
		||||
install-client:
 | 
			
		||||
	install -Dm 755 bin/qvm-pass -t $(DESTDIR)/$(BINDIR)/
 | 
			
		||||
	install -Dm 755 bin/qubes-pass-client -t $(DESTDIR)/$(BINDIR)/
 | 
			
		||||
	mkdir -p $(DESTDIR)/$(LIBEXECDIR)/qubes-pass/
 | 
			
		||||
	# Support the trick of using PATH=/usr/libexec/qubes-pass:$PATH to fool
 | 
			
		||||
	# programs which invoke the pass store command line program.
 | 
			
		||||
 | 
			
		||||
@ -1,68 +0,0 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
set -e
 | 
			
		||||
 | 
			
		||||
if [ -s /rw/config/pass-split-domain -a -z "$QUBES_PASS_DOMAIN" ] ; then
 | 
			
		||||
    export QUBES_PASS_DOMAIN=$( cat /rw/config/pass-split-domain )
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
if [ -z "$QUBES_PASS_DOMAIN" ] ; then
 | 
			
		||||
    title="Qubes pass error"
 | 
			
		||||
    msg="The QUBES_PASS_DOMAIN variable is not defined.  Either create /rw/config/pass-split-domain with the VM containing your pass setup, set the environment variable yourself, or pass -d on the command line."
 | 
			
		||||
    echo "$title: $msg" >&2
 | 
			
		||||
    zenity --error --text "$msg" --title "$title" &
 | 
			
		||||
    exit 124
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
if [ "$1" == "list" ] ; then
 | 
			
		||||
 | 
			
		||||
    cmd=$(echo "$1" | base64 -w 0)
 | 
			
		||||
    echo "$cmd" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassRead
 | 
			
		||||
 | 
			
		||||
elif [ "$1" == "get" ] ; then
 | 
			
		||||
 | 
			
		||||
    cmd=$(echo "$1" | base64 -w 0)
 | 
			
		||||
    key=$(echo "$2" | base64 -w 0)
 | 
			
		||||
    echo "$cmd
 | 
			
		||||
$key" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassRead
 | 
			
		||||
 | 
			
		||||
elif [ "$1" == "get-or-generate" ] ; then
 | 
			
		||||
    cmd=$(echo "$1" | base64 -w 0)
 | 
			
		||||
    key=$(echo "$2" | base64 -w 0)
 | 
			
		||||
    nosymbols=$(echo "$3" | base64 -w 0)
 | 
			
		||||
    echo "$cmd
 | 
			
		||||
$key
 | 
			
		||||
$nosymbols" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
 | 
			
		||||
 | 
			
		||||
elif [ "$1" == "rm" ] ; then
 | 
			
		||||
    cmd=$(echo "$1" | base64 -w 0)
 | 
			
		||||
    key=$(echo "$2" | base64 -w 0)
 | 
			
		||||
    echo "$cmd
 | 
			
		||||
$key" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
 | 
			
		||||
 | 
			
		||||
elif [ "$1" == "mv" -o "$1" == "cp" ] ; then
 | 
			
		||||
    cmd=$(echo "$1" | base64 -w 0)
 | 
			
		||||
    key=$(echo "$2" | base64 -w 0)
 | 
			
		||||
    newkey=$(echo "$3" | base64 -w 0)
 | 
			
		||||
    force=$(echo "$4" | base64 -w 0)
 | 
			
		||||
    echo "$cmd
 | 
			
		||||
$key
 | 
			
		||||
$newkey
 | 
			
		||||
$force" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
 | 
			
		||||
 | 
			
		||||
elif [ "$1" == "insert" ] ; then
 | 
			
		||||
 | 
			
		||||
    cmd=$(echo "$1" | base64 -w 0)
 | 
			
		||||
    key=$(echo "$2" | base64 -w 0)
 | 
			
		||||
    multiline=$(echo "$3" | base64 -w 0)
 | 
			
		||||
    contents=$(echo "$4") # Insert already sends its first parameters base64-encoded
 | 
			
		||||
    echo "$cmd
 | 
			
		||||
$key
 | 
			
		||||
$multiline
 | 
			
		||||
$contents" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
 | 
			
		||||
 | 
			
		||||
elif [ "$1" == "init" ] ; then
 | 
			
		||||
 | 
			
		||||
    cmd=$(echo "$1" | base64 -w 0)
 | 
			
		||||
    echo "$cmd" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
 | 
			
		||||
 | 
			
		||||
fi
 | 
			
		||||
@ -3,7 +3,7 @@
 | 
			
		||||
%define mybuildnumber %{?build_number}%{?!build_number:1}
 | 
			
		||||
 | 
			
		||||
Name:           qubes-pass
 | 
			
		||||
Version:        0.0.14
 | 
			
		||||
Version:        0.0.15
 | 
			
		||||
Release:        %{mybuildnumber}%{?dist}
 | 
			
		||||
Summary:        Inter-VM pass password management for Qubes OS AppVMs and StandaloneVMs
 | 
			
		||||
BuildArch:      noarch
 | 
			
		||||
@ -68,7 +68,6 @@ fi
 | 
			
		||||
%files
 | 
			
		||||
%attr(0755, root, root) %{_bindir}/qvm-pass
 | 
			
		||||
%attr(-, -, -) %{_libexecdir}/%{name}/pass
 | 
			
		||||
%attr(0755, root, root) %{_bindir}/qubes-pass-client
 | 
			
		||||
%doc README.md
 | 
			
		||||
 | 
			
		||||
%files service
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user