Skip to content

Commit

Permalink
fix: less intrusive kicksecure default install
Browse files Browse the repository at this point in the history
- Do not remove sources.list;
- Move broken packages to separate state;
- Rename to developers state and explain it breaks boot;
- Remove settings that are already the default;
- Remove configuration that is deprecated and
- Remove deprecated packages;

Fixes: #4
Fixes: #5
Fixes: #6
Fixes: #7
Fixes: #9
Fixes: #11
Fixes: #13
  • Loading branch information
ben-grande committed Feb 1, 2024
1 parent e35c9fb commit 4b87d93
Show file tree
Hide file tree
Showing 5 changed files with 20 additions and 38 deletions.
6 changes: 3 additions & 3 deletions salt/kicksecure-minimal/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,10 +33,10 @@ qubesctl state.apply kicksecure-minimal.prefs
<!-- pkg:end:post-install -->

If you want to help improve Kicksecure integration on Qubes, install packages
that are known to be broken on Qubes and report bugs upstream (get a terminal
with `qvm-console-dispvm`):
that are known to be broken on Qubes and can break the boot of the Kicksecure
Qube, to report bugs upstream (get a terminal with `qvm-console-dispvm`):
```sh
qubesctl --skip-dom0 --targets=kicksecure-17-minimal state.apply kicksecure-minimal.install-testing
qubesctl --skip-dom0 --targets=kicksecure-17-minimal state.apply kicksecure-minimal.install-developers
```

## Usage
Expand Down
10 changes: 0 additions & 10 deletions salt/kicksecure-minimal/files/template/grub.d/40_qusal.cfg

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,19 @@ Most likely the GUI agent will break, use qvm-console-dispvm to get a terminal.
include:
- kicksecure-minimal.install

"{{ slsdotpath }}-developers-updated":
pkg.uptodate:
- refresh: True

"{{ slsdotpath }}-developers-installed":
pkg.installed:
- refresh: True
- install_recommends: False
- skip_suggestions: True
- pkgs:
- lkrg
- tirdad

## Breaks systemd service qubes-gui-agent
"{{ slsdotpath }}-proc-hidepid-enabled":
service.enabled:
Expand Down Expand Up @@ -50,17 +63,6 @@ include:
- pkg: "{{ slsdotpath }}-installed"
- name: remount-secure

"{{ slsdotpath }}-remount-secure-grub-cfg":
file.managed:
- require:
- service: "{{ slsdotpath }}-remount-secure-enabled"
- name: /etc/default/grub.d/40_qusal.cfg
- source: salt://{{ slsdotpath }}/files/template/grub.d/40_qusal.cfg
- mode: '0600'
- user: root
- group: root
- makedirs: True

"{{ slsdotpath }}-update-grub":
cmd.run:
- require:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,4 @@ SPDX-License-Identifier: AGPL-3.0-or-later
base:
'I@qubes:type:template and E@^kicksecure-[0-9][0-9]-minimal$':
- match: compound
- kicksecure-minimal.install-testing
- kicksecure-minimal.install-developers
16 changes: 3 additions & 13 deletions salt/kicksecure-minimal/install.sls
Original file line number Diff line number Diff line change
Expand Up @@ -30,31 +30,21 @@ include:
- skip_suggestions: True
- pkgs:
- kicksecure-qubes-cli
- lkrg-dkms
- hardened-kernel
- tirdad
- linux-image-amd64
- linux-headers-amd64
- grub2
- qubes-kernel-vm-support

"{{ slsdotpath }}-remove-debian-default-sources.list":
file.absent:
file.comment:
- require:
- pkg: "{{ slsdotpath }}-installed"
- name: /etc/apt/sources.list

"{{ slsdotpath }}-permission-hardener-enabled":
service.enabled:
- require:
- pkg: "{{ slsdotpath }}-installed"
- name: permission-hardening
#- name: permission-hardener
- regex: "^\s*deb"
- ignore_missing: True

"{{ slsdotpath }}-permission-hardener-conf":
file.managed:
- require:
- service: "{{ slsdotpath }}-permission-hardener-enabled"
- name: /etc/permission-hardener.d/40_qusal.conf
- source: salt://{{ slsdotpath }}/files/template/permission-hardener.d/40_qusal.conf
- mode: '0600'
Expand Down

0 comments on commit 4b87d93

Please sign in to comment.