mirror of
https://github.com/gaschz/qubes-pass.git
synced 2025-03-01 14:22:31 +01:00
102 lines
3.2 KiB
RPMSpec
102 lines
3.2 KiB
RPMSpec
%define debug_package %{nil}
|
|
|
|
%define mybuildnumber %{?build_number}%{?!build_number:1}
|
|
|
|
Name: qubes-pass
|
|
Version: 0.0.22
|
|
Release: %{mybuildnumber}%{?dist}
|
|
Summary: Inter-VM pass password management for Qubes OS AppVMs and StandaloneVMs
|
|
BuildArch: noarch
|
|
|
|
License: GPLv3+
|
|
URL: https://github.com/Rudd-O/%{name}
|
|
Source0: https://github.com/Rudd-O/%{name}/archive/{%version}.tar.gz#/%{name}-%{version}.tar.gz
|
|
|
|
BuildRequires: make
|
|
Requires: python3
|
|
Requires: qubes-core-agent-qrexec
|
|
|
|
%package service
|
|
Summary: Service package for Qubes OS dom0s that services %{name}
|
|
|
|
Requires: pass
|
|
Requires: /bin/egrep
|
|
Requires: coreutils
|
|
Requires: util-linux
|
|
|
|
%package dom0
|
|
Summary: Policy package for Qubes OS dom0s that arbitrates %{name}
|
|
|
|
Requires: qubes-core-dom0-linux
|
|
|
|
%description
|
|
This package lets you setup a safe password management VM and then
|
|
manage the password store remotely from other VMs. You are meant to
|
|
install this package on the VM or template where you want to access
|
|
and manage your password store.
|
|
|
|
%description service
|
|
This package lets you serve a safe password store to other VMs.
|
|
You are meant to install this package on the VM or template where
|
|
you want to keep your password store safe.
|
|
|
|
%description dom0
|
|
This package contains the Qubes OS execution policy for the %{name} package.
|
|
You are meant to install this package on the dom0 of the machine where you
|
|
have VMs that have the %{name} package installed.
|
|
|
|
%prep
|
|
%setup -q
|
|
|
|
%build
|
|
# variables must be kept in sync with install
|
|
make DESTDIR=$RPM_BUILD_ROOT BINDIR=%{_bindir} SYSCONFDIR=%{_sysconfdir} LIBEXECDIR=%{_libexecdir}
|
|
|
|
%install
|
|
rm -rf $RPM_BUILD_ROOT
|
|
# variables must be kept in sync with build
|
|
for target in install-client install-service install-dom0; do
|
|
make $target DESTDIR=$RPM_BUILD_ROOT BINDIR=%{_bindir} SYSCONFDIR=%{_sysconfdir} LIBEXECDIR=%{_libexecdir}
|
|
done
|
|
|
|
%check
|
|
if grep -r '@.*@' $RPM_BUILD_ROOT ; then
|
|
echo "Check failed: files with AT identifiers appeared" >&2
|
|
exit 1
|
|
fi
|
|
|
|
%files
|
|
%attr(0755, root, root) %{_bindir}/qvm-pass
|
|
%attr(-, -, -) %{_libexecdir}/%{name}/pass
|
|
%doc README.md
|
|
|
|
%files service
|
|
%attr(0755, root, root) %{_sysconfdir}/qubes-rpc/ruddo.PassRead
|
|
%attr(0755, root, root) %{_sysconfdir}/qubes-rpc/ruddo.PassManage
|
|
|
|
%files dom0
|
|
%config(noreplace) %attr(0664, root, qubes) %{_sysconfdir}/qubes-rpc/policy/ruddo.PassRead
|
|
%config(noreplace) %attr(0664, root, qubes) %{_sysconfdir}/qubes-rpc/policy/ruddo.PassManage
|
|
|
|
%changelog
|
|
* Sat Apr 18 2020 Manuel Amador (Rudd-O) <rudd-o@rudd-o.com>
|
|
- Correct issues with argument parsing.
|
|
|
|
* Sun Mar 07 2016 Manuel Amador (Rudd-O) <rudd-o@rudd-o.com>
|
|
- Fixed bug in get-or-generate subcommand.
|
|
|
|
* Sun Mar 07 2016 Manuel Amador (Rudd-O) <rudd-o@rudd-o.com>
|
|
- Fixed long passwords.
|
|
|
|
* Sun Mar 07 2016 Manuel Amador (Rudd-O) <rudd-o@rudd-o.com>
|
|
- Fixed UI string when prompting for password.
|
|
|
|
* Sun Mar 07 2016 Manuel Amador (Rudd-O) <rudd-o@rudd-o.com>
|
|
- Fixed getopt processing of target VM.
|
|
|
|
* Sun Mar 07 2016 Manuel Amador (Rudd-O) <rudd-o@rudd-o.com>
|
|
- Fixed slight permissions issue in policies.
|
|
|
|
* Sun Mar 07 2016 Manuel Amador (Rudd-O) <rudd-o@rudd-o.com>
|
|
- Initial release.
|