mirror of
https://github.com/tasket/Qubes-VM-hardening.git
synced 2024-10-01 06:35:42 -04:00
parent
13d5c5d2de
commit
47b42547d1
@ -119,6 +119,7 @@ Some useful configurations have been supplied in /etc/default/vms:
|
||||
* The service can be removed from the system with `cd Qubes-VM-hardening; sudo bash install --uninstall`
|
||||
|
||||
## Releases
|
||||
- v0.9.2 Fix vm-boot-protect mode
|
||||
- v0.9.1 Optimized, fix rc order, new "wiperw" tag
|
||||
- v0.9.0 Add tags and rc files, protect more home scripts, reinitialize home
|
||||
- v0.8.5 Fix template detection, /etc/default/vms erasure
|
||||
|
@ -30,7 +30,7 @@ rwbak=$rw/vm-boot-protect
|
||||
errlog=/var/run/vm-protect-error
|
||||
servicedir=/var/run/qubes-service
|
||||
defdir=/etc/default/vms
|
||||
version="0.9.1"
|
||||
version=0.9.2
|
||||
|
||||
# Define sh, bash, X and desktop init scripts in /home/user
|
||||
# to be protected
|
||||
@ -277,11 +277,6 @@ if qsvc vm-boot-protect-root && [ $rwonly_pers = 1 ]; then
|
||||
|
||||
fi
|
||||
|
||||
# Keep configs invisible at runtime...
|
||||
if ! is_templatevm; then
|
||||
rm -rf "$defdir" $servicedir/vm-boot-tag* $servicedir/vm-boot-protect* $errlog
|
||||
fi
|
||||
|
||||
# Remove backups if indicated
|
||||
if [ $save_backup = 0 ]; then
|
||||
chattr -R -f -i $rwbak
|
||||
@ -294,4 +289,8 @@ if qsvc vm-boot-protect || qsvc vm-boot-protect-root; then
|
||||
umount $rw
|
||||
fi
|
||||
|
||||
# Keep configs invisible at runtime...
|
||||
if ! is_templatevm; then
|
||||
rm -rf "$defdir" $servicedir/vm-boot-tag* $servicedir/vm-boot-protect* $errlog
|
||||
fi
|
||||
exit 0
|
||||
|
Loading…
Reference in New Issue
Block a user