shaker/multimedia.spec
2024-05-01 12:27:14 +00:00

75 lines
2.8 KiB
RPMSpec

Name: 3isec-qubes-sys-multimedia
Version: 2.3
Release: 5%{?dist}
Summary: creates multimedia template and qubes
License: GPLv3+
SOURCE0: multimedia
Requires: 3isec-qubes-common
%description
This package sets up qubes to work mith multimedia files in Qubes.
By default a qube named "media" is created, and configured so that any
multimedia files are opened in a named disposable called "multimedia".
This provides some measure of protection when working with untrusted files.
The media qube is offline by default.
The multimedia disposable is offline by default.
You can change this if you wish, but be aware that this may result in
data leakage.
Organise and store media files in the media qube. The media qube has thunar
installed and is based on a minimal template. This reduces the risk of opening
a file in the storage qube itself.
Opening a file in the media qube will open the multimedia disposable and play
the file there.
The multimedia disposable will shut down automatically when all active windows
are closed.
You can also use the multimedia disposable from any other qube, or use the
disposable template to create more disposables with different settings -
perhaps online, or restricted to certain IP addresses.
Access to the multimedia qube is controlled from the policy file in
/etc/qubes/policy.d/30-user.policy
%install
rm -rf %{buildroot}
mkdir -p %{buildroot}/srv/salt
cp -rv %{SOURCE0}/ %{buildroot}/srv/salt
%files
%defattr(-,root,root,-)
/srv/salt/multimedia/*
%post
if [ $1 -eq 1 ]; then
qubesctl state.apply multimedia.clone
qubesctl --skip-dom0 --targets=template-multimedia state.apply multimedia.install
qubesctl state.apply multimedia.create
qubesctl --skip-dom0 --targets=template-media state.apply 3isec-common.store.install
qubesctl --skip-dom0 --targets=media state.apply multimedia.configure
fi
if [ $1 -eq 2 ]; then
qubesctl --skip-dom0 --targets=media state.apply multimedia.configure
fi
%changelog
* Wed May 01 2024 unman <unman@thirdeyesecurity.org> - 2.3.5
- Fix installation bug
* Wed May 01 2024 unman <unman@thirdeyesecurity.org> - 2.3.4
- Fix installation bug
* Sun Mar 31 2024 unman <unman@thirdeyesecurity.org> - 2.3.3
- Make call to disposable-open view-only
* Fri Mar 15 2024 unman <unman@thirdeyesecurity.org> - 2.3.2
- Use 3isec-common for thunar install
* Tue Feb 13 2024 unman <unman@thirdeyesecurity.org> - 2.3
- Use template-store with thunar for media qube
* Mon Feb 20 2023 unman <unman@thirdeyesecurity.org> - 2.2
- Use pillar for cacher to determine repo changes
* Sat May 21 2022 unman <unman@thirdeyesecurity.org> - 2.1
- Standardise package names to 3isec-
* Sun May 15 2022 unman <unman@thirdeyesecurity.org> - 2.0
- Add post install salting
* Wed Feb 03 2021 unman <unman@thirdeyesecurity.org>
- First Build