shaker/gpg.spec

54 lines
1.5 KiB
RPMSpec
Raw Normal View History

2022-05-21 10:36:56 -04:00
Name: 3isec-qubes-split-gpg
2022-07-30 08:05:19 -04:00
Version: 2.0
2021-02-05 21:38:03 -05:00
Release: 1%{?dist}
2022-07-30 08:05:19 -04:00
Summary: split-gpg in Qubes
2021-02-05 21:38:03 -05:00
License: GPLv3+
2022-07-30 08:05:19 -04:00
SOURCE0: gpg
2021-02-05 21:38:03 -05:00
%description
2022-07-30 08:05:19 -04:00
This package set up split-gpg in Qubes.
split-gpg allows you to store your pgp keys in one qube, and access them from another.
Full details are at https://www.qubes-os.org/doc/split-gpg/
When you install this package a template will be created, and a qube
named sys-gpg to hold the keys.
You can create more than one qube to hold keys if you want.
The system will be configured to use the sys-gpg qube by default.
This is done with an entry in /etc/qubes/policy.d/30-user.policy
If you want to change the setting for some/all qubes, edit
that file.
2021-02-05 21:38:03 -05:00
%install
rm -rf %{buildroot}
mkdir -p %{buildroot}/srv/salt
cp -rv %{SOURCE0}/ %{buildroot}/srv/salt
%files
%defattr(-,root,root,-)
/srv/salt/gpg/*
2022-05-15 11:23:05 -04:00
%post
if [ $1 -eq 1 ]; then
qubesctl state.apply gpg.create
qubesctl --skip-dom0 --targets=template-gpg state.apply gpg.install
fi
%preun
if [ $1 -eq 0 ]; then
2022-05-20 08:07:25 -04:00
sed -i /qubes.Gpg.*target=sys-gpg/d /etc/qubes/policy.d/30-user.policy
2022-05-15 11:23:05 -04:00
fi
2021-02-05 21:38:03 -05:00
%changelog
2022-05-21 10:36:56 -04:00
* Sat May 21 2022 unman <unman@thirdeyesecurity.org> - 1.4
- Standardise package names to 3isec-
2022-05-15 11:23:05 -04:00
* Sat May 14 2022 unman <unman@thirdeyesecurity.org> - 2.0
2022-05-20 08:07:25 -04:00
- Change preun script
* Sat May 14 2022 unman <unman@thirdeyesecurity.org> - 2.0
2022-05-15 11:23:05 -04:00
- Update to Qubes 4.1
- Change policies on package install and removal
2021-02-05 21:38:03 -05:00
* Wed Fed 03 2021 unman <unman@thirdeyesecurity.org>
- First Build