From b203c69a3c502c36bd14a08a9bc776b1349ef79c Mon Sep 17 00:00:00 2001 From: Christopher Laprise Date: Tue, 13 Aug 2019 16:22:27 -0400 Subject: [PATCH] fix uninstall exit --- README.md | 6 ++++-- install | 24 +----------------------- 2 files changed, 5 insertions(+), 25 deletions(-) diff --git a/README.md b/README.md index ec8a416..fa633b6 100644 --- a/README.md +++ b/README.md @@ -19,7 +19,7 @@ Leverage Qubes template non-persistence to fend off malware at VM startup: Lock- 1. In a template VM, install the service files ``` cd Qubes-VM-hardening - sudo sh ./install + sudo bash install ``` 2. Activate by specifying one of the following Qubes services for your VM(s)... @@ -110,7 +110,9 @@ Some useful configurations have been supplied in /etc/default/vms: * Using the -root service with a [VPN VM](https://github.com/tasket/Qubes-vpn-support) requires manual configuration in the template and can be approached different ways: Whitelist (optionally with SHA) can be made for the appropriate files. Alternately, all VPN configs can be added under /etc/default/vms/vmname/rw so they'll be automatically deployed. * Currently the service cannot seamlessly handle 'first boot' when the private volume must be initialized. If you enabled the service on a VM before its first startup, on first start the shell will display a notice telling you to restart the VM. Subsequent starts will proceed normally. - + + * The service can be removed from the system with `cd Qubes-VM-hardening; sudo bash install --uninstall` + ## Releases - v0.9.0 Add tags and rc files, protect more home scripts, reinitialize home - v0.8.5 Fix template detection, /etc/default/vms erasure diff --git a/install b/install index 423bdb3..662c620 100644 --- a/install +++ b/install @@ -17,6 +17,7 @@ if [ "$1" = "--uninstall" ]; then else echo "Aborted." fi + exit 0 fi @@ -33,29 +34,6 @@ mkdir -p /etc/default/vms cp -riv default/vms/* /etc/default/vms -# echo -# echo "Setup empty Firefox default profile in /etc/skel..." -# echo "A fixed-name profile will be defined in the /home/user folder" -# echo "whenever home is reset/initialized. This is required when" -# echo "using vm-boot-protect features (such as ibrowse) to" -# echo "whitelist parts of the browser configuration." -# echo -# read -p "Add Firefox default profile [y/N]? " ans -# if [[ $ans == @(Y|y) ]]; then -# mkdir -p /etc/skel/.mozilla/firefox/profile.default -# cat <<__END1__ >/etc/skel/.mozilla/firefox/profiles.ini -# [General] -# StartWithLastProfile=1 -# -# [Profile0] -# Name=default -# IsRelative=1 -# Path=profile.default -# Default=1 -# __END1__ -# -# fi - echo -e "\nvm-boot-protect installed!\n" bash ./configure-sudo-prompt