mirror of
https://github.com/unman/shaker.git
synced 2024-10-01 01:25:41 -04:00
80 lines
3.0 KiB
RPMSpec
80 lines
3.0 KiB
RPMSpec
Name: 3isec-qubes-sys-multimedia
|
|
Version: 2.3
|
|
Release: 7%{?dist}
|
|
Summary: creates multimedia template and qubes
|
|
|
|
License: GPLv3+
|
|
SOURCE0: multimedia
|
|
Requires: 3isec-qubes-common
|
|
|
|
%description
|
|
This package sets up qubes to work mith multimedia files in Qubes.
|
|
By default a qube named "media" is created, and configured so that any
|
|
multimedia files are opened in a named disposable called "multimedia".
|
|
This provides some measure of protection when working with untrusted files.
|
|
|
|
The media qube is offline by default.
|
|
The multimedia disposable is offline by default.
|
|
You can change this if you wish, but be aware that this may result in
|
|
data leakage.
|
|
|
|
Organise and store media files in the media qube. The media qube has thunar
|
|
installed and is based on a minimal template. This reduces the risk of opening
|
|
a file in the storage qube itself.
|
|
Opening a file in the media qube will open the multimedia disposable and play
|
|
the file there.
|
|
The multimedia disposable will shut down automatically when all active windows
|
|
are closed.
|
|
You can also use the multimedia disposable from any other qube, or use the
|
|
disposable template to create more disposables with different settings -
|
|
perhaps online, or restricted to certain IP addresses.
|
|
Access to the multimedia qube is controlled from the policy file in
|
|
/etc/qubes/policy.d/30-user.policy
|
|
|
|
|
|
%install
|
|
rm -rf %{buildroot}
|
|
mkdir -p %{buildroot}/srv/salt
|
|
cp -rv %{SOURCE0}/ %{buildroot}/srv/salt
|
|
|
|
%files
|
|
%defattr(-,root,root,-)
|
|
/srv/salt/multimedia/*
|
|
|
|
%post
|
|
if [ $1 -eq 1 ]; then
|
|
qubesctl state.apply multimedia.clone
|
|
qubesctl --skip-dom0 --targets=template-multimedia state.apply multimedia.install
|
|
qubesctl state.apply multimedia.create
|
|
qubesctl --skip-dom0 --targets=template-store state.apply 3isec-common.store.install
|
|
qubesctl --skip-dom0 --targets=media state.apply multimedia.configure
|
|
fi
|
|
if [ $1 -eq 2 ]; then
|
|
qubesctl --skip-dom0 --targets=template-multimedia state.apply multimedia.install
|
|
qubesctl --skip-dom0 --targets=media state.apply multimedia.configure
|
|
fi
|
|
|
|
%changelog
|
|
* Thu Jun 13 2024 unman <unman@thirdeyesecurity.org> - 2.3.7
|
|
- Install pipewire-qubes
|
|
* Thu May 02 2024 unman <unman@thirdeyesecurity.org> - 2.3.6
|
|
- Fix installation bug
|
|
* Wed May 01 2024 unman <unman@thirdeyesecurity.org> - 2.3.5
|
|
- Fix installation bug
|
|
* Wed May 01 2024 unman <unman@thirdeyesecurity.org> - 2.3.4
|
|
- Fix installation bug
|
|
* Sun Mar 31 2024 unman <unman@thirdeyesecurity.org> - 2.3.3
|
|
- Make call to disposable-open view-only
|
|
* Fri Mar 15 2024 unman <unman@thirdeyesecurity.org> - 2.3.2
|
|
- Use 3isec-common for thunar install
|
|
* Tue Feb 13 2024 unman <unman@thirdeyesecurity.org> - 2.3
|
|
- Use template-store with thunar for media qube
|
|
* Mon Feb 20 2023 unman <unman@thirdeyesecurity.org> - 2.2
|
|
- Use pillar for cacher to determine repo changes
|
|
* Sat May 21 2022 unman <unman@thirdeyesecurity.org> - 2.1
|
|
- Standardise package names to 3isec-
|
|
* Sun May 15 2022 unman <unman@thirdeyesecurity.org> - 2.0
|
|
- Add post install salting
|
|
* Wed Feb 03 2021 unman <unman@thirdeyesecurity.org>
|
|
- First Build
|