From 2eea0c93457fd4d02e7a57f6c39e605d771b0c09 Mon Sep 17 00:00:00 2001 From: "Manuel Amador (Rudd-O)" Date: Wed, 10 Jul 2019 00:52:54 +0000 Subject: [PATCH] Remove qubes-pass-client. Bump version. --- Makefile | 1 - bin/qubes-pass-client | 68 ------------------------------------------- qubes-pass.spec | 3 +- 3 files changed, 1 insertion(+), 71 deletions(-) delete mode 100755 bin/qubes-pass-client diff --git a/Makefile b/Makefile index 37c0f2f..642610e 100644 --- a/Makefile +++ b/Makefile @@ -19,7 +19,6 @@ srpm: dist install-client: install -Dm 755 bin/qvm-pass -t $(DESTDIR)/$(BINDIR)/ - install -Dm 755 bin/qubes-pass-client -t $(DESTDIR)/$(BINDIR)/ mkdir -p $(DESTDIR)/$(LIBEXECDIR)/qubes-pass/ # Support the trick of using PATH=/usr/libexec/qubes-pass:$PATH to fool # programs which invoke the pass store command line program. diff --git a/bin/qubes-pass-client b/bin/qubes-pass-client deleted file mode 100755 index 5bf342f..0000000 --- a/bin/qubes-pass-client +++ /dev/null @@ -1,68 +0,0 @@ -#!/bin/bash -set -e - -if [ -s /rw/config/pass-split-domain -a -z "$QUBES_PASS_DOMAIN" ] ; then - export QUBES_PASS_DOMAIN=$( cat /rw/config/pass-split-domain ) -fi - -if [ -z "$QUBES_PASS_DOMAIN" ] ; then - title="Qubes pass error" - msg="The QUBES_PASS_DOMAIN variable is not defined. Either create /rw/config/pass-split-domain with the VM containing your pass setup, set the environment variable yourself, or pass -d on the command line." - echo "$title: $msg" >&2 - zenity --error --text "$msg" --title "$title" & - exit 124 -fi - -if [ "$1" == "list" ] ; then - - cmd=$(echo "$1" | base64 -w 0) - echo "$cmd" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassRead - -elif [ "$1" == "get" ] ; then - - cmd=$(echo "$1" | base64 -w 0) - key=$(echo "$2" | base64 -w 0) - echo "$cmd -$key" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassRead - -elif [ "$1" == "get-or-generate" ] ; then - cmd=$(echo "$1" | base64 -w 0) - key=$(echo "$2" | base64 -w 0) - nosymbols=$(echo "$3" | base64 -w 0) - echo "$cmd -$key -$nosymbols" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage - -elif [ "$1" == "rm" ] ; then - cmd=$(echo "$1" | base64 -w 0) - key=$(echo "$2" | base64 -w 0) - echo "$cmd -$key" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage - -elif [ "$1" == "mv" -o "$1" == "cp" ] ; then - cmd=$(echo "$1" | base64 -w 0) - key=$(echo "$2" | base64 -w 0) - newkey=$(echo "$3" | base64 -w 0) - force=$(echo "$4" | base64 -w 0) - echo "$cmd -$key -$newkey -$force" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage - -elif [ "$1" == "insert" ] ; then - - cmd=$(echo "$1" | base64 -w 0) - key=$(echo "$2" | base64 -w 0) - multiline=$(echo "$3" | base64 -w 0) - contents=$(echo "$4") # Insert already sends its first parameters base64-encoded - echo "$cmd -$key -$multiline -$contents" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage - -elif [ "$1" == "init" ] ; then - - cmd=$(echo "$1" | base64 -w 0) - echo "$cmd" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage - -fi diff --git a/qubes-pass.spec b/qubes-pass.spec index 35b92b6..6e20478 100644 --- a/qubes-pass.spec +++ b/qubes-pass.spec @@ -3,7 +3,7 @@ %define mybuildnumber %{?build_number}%{?!build_number:1} Name: qubes-pass -Version: 0.0.14 +Version: 0.0.15 Release: %{mybuildnumber}%{?dist} Summary: Inter-VM pass password management for Qubes OS AppVMs and StandaloneVMs BuildArch: noarch @@ -68,7 +68,6 @@ fi %files %attr(0755, root, root) %{_bindir}/qvm-pass %attr(-, -, -) %{_libexecdir}/%{name}/pass -%attr(0755, root, root) %{_bindir}/qubes-pass-client %doc README.md %files service