qusal/salt/debian-xfce
Ben Grande fc22726ee8
feat: build and sign RPM packages
Passing files to Dom0 is always dangerous:

- Passing a git repository is dangerous as it can have ignored modified
  files and signature verification will pass.
- Passing an archive is troublesome for updates.
- Passing an RPM package depends on the RPM verification to be correct,
  some times it is not.
- Passing a RPM repository definition is less troublesome for the user,
  as it is a small file to verify the contents and update mechanism is
  via the package manager. Trust in RPM verification is still required.

Many improvements were made to the build scripts:

- requires-program: Single function to check if program is installed;
- spec-get: Sort project names for the usage message;
- spec-get: Only running commands that are necessary;
- spec-get: Fix empty summary when readme has copyright header;
- spec-gen: Fix grep warning of escaped symbol;
- spec-build: Sign RPM and verify signature;
- spec-build: Only lint the first SPEC for faster runtime;
- yumrepo-gen: Generate a local yum repository with signed metadata;
- qubesbuilder-gen: Generate a .qubesbuilder based on tracked projects;
- release: Build, sign and push all RPMs to repository.

Goal is to be able to build with qubes-builderv2 Qubes Executor.

For: https://github.com/ben-grande/qusal/issues/37
2024-06-12 14:44:04 +02:00
..
clone.sls chore: copyright update 2024-01-29 16:49:54 +01:00
clone.top chore: copyright update 2024-01-29 16:49:54 +01:00
create.sls chore: copyright update 2024-01-29 16:49:54 +01:00
create.top chore: copyright update 2024-01-29 16:49:54 +01:00
init.top chore: copyright update 2024-01-29 16:49:54 +01:00
install.sls fix: remove extraneous package repository updates 2024-03-18 17:51:36 +01:00
install.top chore: copyright update 2024-01-29 16:49:54 +01:00
README.md feat: build and sign RPM packages 2024-06-12 14:44:04 +02:00
template.jinja chore: copyright update 2024-01-29 16:49:54 +01:00

debian-xfce

Debian Xfce Template in Qubes OS.

Table of Contents

Description

Creates the Debian Xfce Template as well as a Disposable Template based on it.

Installation

  • Top:
sudo qubesctl top.enable debian-xfce
sudo qubesctl --targets=debian-12-xfce state.apply
sudo qubesctl top.disable debian-xfce
  • State:
sudo qubesctl state.apply debian-xfce.create
sudo qubesctl --skip-dom0 --targets=debian-12-xfce state.apply debian-xfce.install

Usage

AppVMs and StandaloneVMs can be based on this template.