On 04/14/2017 12:18 PM, Chris Laprise wrote:
I am trying to setup templates so the startup sequence in template-based
VMs can take action on /rw contents before they can affect the execution
environment (bind-dirs, rc.local, etc).

Unless there is a setting for this (disabling startup execution of
private.img contents) that I'm not aware of, I think some modification
of Qubes would be necessary to properly enable such action. This is
because currently bind-dirs.sh activation is lumped-in with mount-dirs.sh.

My suggestion would be to put the activation of qubes/init/bind-dirs.sh
under a separate systemd service. Alternately, mount-dirs.sh could have
a hook that points to a specific user script in /etc.

A possible workaround I'm trying is to have my systemd unit run before qubes-mount-dirs.service and do an independent mount-dismount of /rw.

This allows my script to perform simple sanitizing operations in /rw before anything in there has a chance to run. So far, it works...

--

Chris Laprise, [email protected]
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/309e27cd-bc80-3a4f-06c3-e3de0999e2a1%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to