Skip to content

Commit

Permalink
Relax permissions of usbguard configs
Browse files Browse the repository at this point in the history
They don't have any secrets, and having them root-only breaks building
initramfs as non-root.

QubesOS/qubes-issues#8206
  • Loading branch information
marmarek committed Nov 16, 2023
1 parent 8d09d41 commit ca22967
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions rpm_spec/core-dom0-linux.spec.in
Original file line number Diff line number Diff line change
Expand Up @@ -164,11 +164,11 @@ install -m 0644 system-config/dnf-protected-qubes-core-dom0.conf \
$RPM_BUILD_ROOT/etc/dnf/protected.d/qubes-core-dom0.conf

# USBguard and PCIe device handling
install -m 0700 -d -- "$RPM_BUILD_ROOT/etc/usbguard" \
install -m 0755 -d -- "$RPM_BUILD_ROOT/etc/usbguard" \
"$RPM_BUILD_ROOT/etc/usbguard/rules.d"
install -m 0600 -- system-config/qubes-usbguard.conf \
install -m 0644 -- system-config/qubes-usbguard.conf \
"$RPM_BUILD_ROOT/etc/usbguard"
install -m 0600 -- system-config/qubes-usb-rules.conf \
install -m 0644 -- system-config/qubes-usb-rules.conf \
"$RPM_BUILD_ROOT/etc/usbguard/rules.d/02-qubes.conf"
install -D -m 0644 -- system-config/usbguard.service "$RPM_BUILD_ROOT%_unitdir/usbguard.service.d/30_qubes.conf"

Expand Down Expand Up @@ -283,8 +283,8 @@ chmod -x /etc/grub.d/10_linux
%{_dracutmoddir}/90extra-modules/*
%dir %{_dracutmoddir}/90qubes-udev
%{_dracutmoddir}/90qubes-udev/*
%attr(0600,root,root) /etc/usbguard/rules.d/02-qubes.conf
%attr(0600,root,root) /etc/usbguard/qubes-usbguard.conf
%config /etc/usbguard/rules.d/02-qubes.conf
%config /etc/usbguard/qubes-usbguard.conf
%_unitdir/usbguard.service.d/30_qubes.conf
# file copy
%_bindir/qvm-copy-to-vm
Expand Down

0 comments on commit ca22967

Please sign in to comment.