shaker/multimedia.spec

80 lines
3.0 KiB
RPMSpec
Raw Normal View History

2022-05-21 10:36:56 -04:00
Name: 3isec-qubes-sys-multimedia
2024-02-14 10:25:24 -05:00
Version: 2.3
Release: 7%{?dist}
2022-07-30 08:05:19 -04:00
Summary: creates multimedia template and qubes
2021-02-02 19:42:01 -05:00
License: GPLv3+
2022-07-30 08:05:19 -04:00
SOURCE0: multimedia
2024-03-15 10:50:57 -04:00
Requires: 3isec-qubes-common
2021-02-02 19:42:01 -05:00
%description
2022-07-30 08:05:19 -04:00
This package sets up qubes to work mith multimedia files in Qubes.
By default a qube named "media" is created, and configured so that any
multimedia files are opened in a named disposable called "multimedia".
This provides some measure of protection when working with untrusted files.
The media qube is offline by default.
The multimedia disposable is offline by default.
You can change this if you wish, but be aware that this may result in
data leakage.
Organise and store media files in the media qube. The media qube has thunar
installed and is based on a minimal template. This reduces the risk of opening
a file in the storage qube itself.
Opening a file in the media qube will open the multimedia disposable and play
2022-07-30 08:05:19 -04:00
the file there.
The multimedia disposable will shut down automatically when all active windows
are closed.
2022-07-30 08:05:19 -04:00
You can also use the multimedia disposable from any other qube, or use the
disposable template to create more disposables with different settings -
perhaps online, or restricted to certain IP addresses.
Access to the multimedia qube is controlled from the policy file in
2022-07-30 08:05:19 -04:00
/etc/qubes/policy.d/30-user.policy
2021-02-02 19:42:01 -05:00
%install
rm -rf %{buildroot}
mkdir -p %{buildroot}/srv/salt
cp -rv %{SOURCE0}/ %{buildroot}/srv/salt
%files
%defattr(-,root,root,-)
/srv/salt/multimedia/*
2022-05-16 10:12:31 -04:00
%post
if [ $1 -eq 1 ]; then
2022-05-21 10:36:56 -04:00
qubesctl state.apply multimedia.clone
2022-05-16 10:12:31 -04:00
qubesctl --skip-dom0 --targets=template-multimedia state.apply multimedia.install
2022-05-21 10:36:56 -04:00
qubesctl state.apply multimedia.create
qubesctl --skip-dom0 --targets=template-store state.apply 3isec-common.store.install
2022-05-16 10:12:31 -04:00
qubesctl --skip-dom0 --targets=media state.apply multimedia.configure
fi
if [ $1 -eq 2 ]; then
qubesctl --skip-dom0 --targets=template-multimedia state.apply multimedia.install
qubesctl --skip-dom0 --targets=media state.apply multimedia.configure
fi
2022-05-16 10:12:31 -04:00
2021-02-02 19:42:01 -05:00
%changelog
* Thu Jun 13 2024 unman <unman@thirdeyesecurity.org> - 2.3.7
- Install pipewire-qubes
* Thu May 02 2024 unman <unman@thirdeyesecurity.org> - 2.3.6
- Fix installation bug
* Wed May 01 2024 unman <unman@thirdeyesecurity.org> - 2.3.5
- Fix installation bug
* Wed May 01 2024 unman <unman@thirdeyesecurity.org> - 2.3.4
- Fix installation bug
* Sun Mar 31 2024 unman <unman@thirdeyesecurity.org> - 2.3.3
- Make call to disposable-open view-only
2024-03-15 10:50:57 -04:00
* Fri Mar 15 2024 unman <unman@thirdeyesecurity.org> - 2.3.2
- Use 3isec-common for thunar install
2024-02-14 10:25:24 -05:00
* Tue Feb 13 2024 unman <unman@thirdeyesecurity.org> - 2.3
- Use template-store with thunar for media qube
2023-02-21 08:52:35 -05:00
* Mon Feb 20 2023 unman <unman@thirdeyesecurity.org> - 2.2
- Use pillar for cacher to determine repo changes
2022-05-21 10:36:56 -04:00
* Sat May 21 2022 unman <unman@thirdeyesecurity.org> - 2.1
- Standardise package names to 3isec-
2022-05-16 10:12:31 -04:00
* Sun May 15 2022 unman <unman@thirdeyesecurity.org> - 2.0
- Add post install salting
* Wed Feb 03 2021 unman <unman@thirdeyesecurity.org>
2021-02-02 19:42:01 -05:00
- First Build