shaker/multimedia.spec

68 lines
2.4 KiB
RPMSpec
Raw Normal View History

2022-05-21 10:36:56 -04:00
Name: 3isec-qubes-sys-multimedia
2024-02-14 10:25:24 -05:00
Version: 2.3
Release: 3%{?dist}
2022-07-30 08:05:19 -04:00
Summary: creates multimedia template and qubes
2021-02-02 19:42:01 -05:00
License: GPLv3+
2022-07-30 08:05:19 -04:00
SOURCE0: multimedia
2024-03-15 10:50:57 -04:00
Requires: 3isec-qubes-common
2021-02-02 19:42:01 -05:00
%description
2022-07-30 08:05:19 -04:00
This package sets up qubes to work mith multimedia files in Qubes.
By default a qube named "media" is created, and configured so that any
multimedia files are opened in a named disposable called "multimedia".
This provides some measure of protection when working with untrusted files.
The media qube is offline by default.
The multimedia disposable is offline by default.
You can change this if you wish, but be aware that this may result in
data leakage.
The idea is that you organise and store media files in the media qube.
Opening a file in that qube will open the multimedia disposable and play
the file there.
You can also use the multimedia disposable from any other qube, or use the
disposable template to create more disposables with different settings -
perhaps online, or restricted to certain IP addresses.
Access to the multimedia file is controlled from the policy file in
/etc/qubes/policy.d/30-user.policy
2021-02-02 19:42:01 -05:00
%install
rm -rf %{buildroot}
mkdir -p %{buildroot}/srv/salt
cp -rv %{SOURCE0}/ %{buildroot}/srv/salt
%files
%defattr(-,root,root,-)
/srv/salt/multimedia/*
2022-05-16 10:12:31 -04:00
%post
if [ $1 -eq 1 ]; then
2022-05-21 10:36:56 -04:00
qubesctl state.apply multimedia.clone
2022-05-16 10:12:31 -04:00
qubesctl --skip-dom0 --targets=template-multimedia state.apply multimedia.install
2022-05-21 10:36:56 -04:00
qubesctl state.apply multimedia.create
2024-03-15 10:50:57 -04:00
qubesctl --skip-dom0 --targets=media state.apply 3isec-common.store.install
2022-05-16 10:12:31 -04:00
qubesctl --skip-dom0 --targets=media state.apply multimedia.configure
fi
if [ $1 -eq 2 ]; then
qubesctl --skip-dom0 --targets=media state.apply multimedia.configure
fi
2022-05-16 10:12:31 -04:00
2021-02-02 19:42:01 -05:00
%changelog
* Sun Mar 31 2024 unman <unman@thirdeyesecurity.org> - 2.3.3
- Make call to disposable-open view-only
2024-03-15 10:50:57 -04:00
* Fri Mar 15 2024 unman <unman@thirdeyesecurity.org> - 2.3.2
- Use 3isec-common for thunar install
2024-02-14 10:25:24 -05:00
* Tue Feb 13 2024 unman <unman@thirdeyesecurity.org> - 2.3
- Use template-store with thunar for media qube
2023-02-21 08:52:35 -05:00
* Mon Feb 20 2023 unman <unman@thirdeyesecurity.org> - 2.2
- Use pillar for cacher to determine repo changes
2022-05-21 10:36:56 -04:00
* Sat May 21 2022 unman <unman@thirdeyesecurity.org> - 2.1
- Standardise package names to 3isec-
2022-05-16 10:12:31 -04:00
* Sun May 15 2022 unman <unman@thirdeyesecurity.org> - 2.0
- Add post install salting
* Wed Feb 03 2021 unman <unman@thirdeyesecurity.org>
2021-02-02 19:42:01 -05:00
- First Build