mirror of
https://github.com/gaschz/qubes-pass.git
synced 2025-06-07 01:38:31 +02:00
Remove qubes-pass-client. Bump version.
This commit is contained in:
parent
c28a659f0a
commit
2eea0c9345
1
Makefile
1
Makefile
@ -19,7 +19,6 @@ srpm: dist
|
|||||||
|
|
||||||
install-client:
|
install-client:
|
||||||
install -Dm 755 bin/qvm-pass -t $(DESTDIR)/$(BINDIR)/
|
install -Dm 755 bin/qvm-pass -t $(DESTDIR)/$(BINDIR)/
|
||||||
install -Dm 755 bin/qubes-pass-client -t $(DESTDIR)/$(BINDIR)/
|
|
||||||
mkdir -p $(DESTDIR)/$(LIBEXECDIR)/qubes-pass/
|
mkdir -p $(DESTDIR)/$(LIBEXECDIR)/qubes-pass/
|
||||||
# Support the trick of using PATH=/usr/libexec/qubes-pass:$PATH to fool
|
# Support the trick of using PATH=/usr/libexec/qubes-pass:$PATH to fool
|
||||||
# programs which invoke the pass store command line program.
|
# programs which invoke the pass store command line program.
|
||||||
|
@ -1,68 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
set -e
|
|
||||||
|
|
||||||
if [ -s /rw/config/pass-split-domain -a -z "$QUBES_PASS_DOMAIN" ] ; then
|
|
||||||
export QUBES_PASS_DOMAIN=$( cat /rw/config/pass-split-domain )
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ -z "$QUBES_PASS_DOMAIN" ] ; then
|
|
||||||
title="Qubes pass error"
|
|
||||||
msg="The QUBES_PASS_DOMAIN variable is not defined. Either create /rw/config/pass-split-domain with the VM containing your pass setup, set the environment variable yourself, or pass -d on the command line."
|
|
||||||
echo "$title: $msg" >&2
|
|
||||||
zenity --error --text "$msg" --title "$title" &
|
|
||||||
exit 124
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ "$1" == "list" ] ; then
|
|
||||||
|
|
||||||
cmd=$(echo "$1" | base64 -w 0)
|
|
||||||
echo "$cmd" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassRead
|
|
||||||
|
|
||||||
elif [ "$1" == "get" ] ; then
|
|
||||||
|
|
||||||
cmd=$(echo "$1" | base64 -w 0)
|
|
||||||
key=$(echo "$2" | base64 -w 0)
|
|
||||||
echo "$cmd
|
|
||||||
$key" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassRead
|
|
||||||
|
|
||||||
elif [ "$1" == "get-or-generate" ] ; then
|
|
||||||
cmd=$(echo "$1" | base64 -w 0)
|
|
||||||
key=$(echo "$2" | base64 -w 0)
|
|
||||||
nosymbols=$(echo "$3" | base64 -w 0)
|
|
||||||
echo "$cmd
|
|
||||||
$key
|
|
||||||
$nosymbols" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
|
|
||||||
|
|
||||||
elif [ "$1" == "rm" ] ; then
|
|
||||||
cmd=$(echo "$1" | base64 -w 0)
|
|
||||||
key=$(echo "$2" | base64 -w 0)
|
|
||||||
echo "$cmd
|
|
||||||
$key" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
|
|
||||||
|
|
||||||
elif [ "$1" == "mv" -o "$1" == "cp" ] ; then
|
|
||||||
cmd=$(echo "$1" | base64 -w 0)
|
|
||||||
key=$(echo "$2" | base64 -w 0)
|
|
||||||
newkey=$(echo "$3" | base64 -w 0)
|
|
||||||
force=$(echo "$4" | base64 -w 0)
|
|
||||||
echo "$cmd
|
|
||||||
$key
|
|
||||||
$newkey
|
|
||||||
$force" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
|
|
||||||
|
|
||||||
elif [ "$1" == "insert" ] ; then
|
|
||||||
|
|
||||||
cmd=$(echo "$1" | base64 -w 0)
|
|
||||||
key=$(echo "$2" | base64 -w 0)
|
|
||||||
multiline=$(echo "$3" | base64 -w 0)
|
|
||||||
contents=$(echo "$4") # Insert already sends its first parameters base64-encoded
|
|
||||||
echo "$cmd
|
|
||||||
$key
|
|
||||||
$multiline
|
|
||||||
$contents" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
|
|
||||||
|
|
||||||
elif [ "$1" == "init" ] ; then
|
|
||||||
|
|
||||||
cmd=$(echo "$1" | base64 -w 0)
|
|
||||||
echo "$cmd" | /usr/lib/qubes/qrexec-client-vm "$QUBES_PASS_DOMAIN" ruddo.PassManage
|
|
||||||
|
|
||||||
fi
|
|
@ -3,7 +3,7 @@
|
|||||||
%define mybuildnumber %{?build_number}%{?!build_number:1}
|
%define mybuildnumber %{?build_number}%{?!build_number:1}
|
||||||
|
|
||||||
Name: qubes-pass
|
Name: qubes-pass
|
||||||
Version: 0.0.14
|
Version: 0.0.15
|
||||||
Release: %{mybuildnumber}%{?dist}
|
Release: %{mybuildnumber}%{?dist}
|
||||||
Summary: Inter-VM pass password management for Qubes OS AppVMs and StandaloneVMs
|
Summary: Inter-VM pass password management for Qubes OS AppVMs and StandaloneVMs
|
||||||
BuildArch: noarch
|
BuildArch: noarch
|
||||||
@ -68,7 +68,6 @@ fi
|
|||||||
%files
|
%files
|
||||||
%attr(0755, root, root) %{_bindir}/qvm-pass
|
%attr(0755, root, root) %{_bindir}/qvm-pass
|
||||||
%attr(-, -, -) %{_libexecdir}/%{name}/pass
|
%attr(-, -, -) %{_libexecdir}/%{name}/pass
|
||||||
%attr(0755, root, root) %{_bindir}/qubes-pass-client
|
|
||||||
%doc README.md
|
%doc README.md
|
||||||
|
|
||||||
%files service
|
%files service
|
||||||
|
Loading…
x
Reference in New Issue
Block a user