mirror of
https://github.com/flatcar/scripts.git
synced 2025-08-16 09:26:58 +02:00
Merge pull request #171 from marineam/base
coreos-base updates, docker socket fixed
This commit is contained in:
commit
a14d446222
@ -1 +0,0 @@
|
|||||||
docker-0.5.0.ebuild
|
|
@ -1,43 +0,0 @@
|
|||||||
#
|
|
||||||
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
|
|
||||||
# Distributed under the terms of the GNU General Public License v2
|
|
||||||
# $Header:$
|
|
||||||
#
|
|
||||||
|
|
||||||
EAPI=2
|
|
||||||
EGIT_REPO_URI="https://github.com/dotcloud/docker"
|
|
||||||
inherit toolchain-funcs systemd git-2
|
|
||||||
|
|
||||||
EGIT_COMMIT="51f6c4a7372450d164c61e0054daf0223ddbd909" # 0.5
|
|
||||||
|
|
||||||
DESCRIPTION="Docker container management"
|
|
||||||
HOMEPAGE="http://docker.io"
|
|
||||||
SRC_URI=""
|
|
||||||
|
|
||||||
LICENSE="MIT"
|
|
||||||
SLOT="0"
|
|
||||||
KEYWORDS="amd64"
|
|
||||||
IUSE=""
|
|
||||||
|
|
||||||
DEPEND=">=dev-lang/go-1.0.2"
|
|
||||||
RDEPEND="
|
|
||||||
app-emulation/lxc
|
|
||||||
net-misc/bridge-utils
|
|
||||||
sys-apps/iproute2
|
|
||||||
app-arch/libarchive
|
|
||||||
net-misc/curl
|
|
||||||
sys-fs/aufs-util
|
|
||||||
"
|
|
||||||
|
|
||||||
src_compile() {
|
|
||||||
emake
|
|
||||||
}
|
|
||||||
|
|
||||||
src_install() {
|
|
||||||
dobin ${S}/bin/${PN}
|
|
||||||
keepdir /var/lib/${PN}/graph
|
|
||||||
keepdir /var/lib/${PN}/containers
|
|
||||||
systemd_dounit "${FILESDIR}"/${PN}.service
|
|
||||||
# not enabling by default because it messes up the EC2 169. meta url routing
|
|
||||||
systemd_enable_service multi-user.target ${PN}.service
|
|
||||||
}
|
|
@ -1,9 +1,6 @@
|
|||||||
[Service]
|
[Service]
|
||||||
Type=simple
|
Type=simple
|
||||||
ExecStartPre=/bin/mount --make-rprivate /
|
ExecStartPre=/bin/mount --make-rprivate /
|
||||||
# Enable forwarding to allow NAT to work
|
|
||||||
# TODO: Move this to sysctl.conf
|
|
||||||
ExecStartPre=/sbin/sysctl -w net.ipv4.ip_forward=1
|
|
||||||
|
|
||||||
# Try to use this alternate way of starting docker if docker crashes for you:
|
# Try to use this alternate way of starting docker if docker crashes for you:
|
||||||
# ExecStart=/bin/bash -c "/usr/bin/nohup /usr/bin/docker -d -D &"
|
# ExecStart=/bin/bash -c "/usr/bin/nohup /usr/bin/docker -d -D &"
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
|
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
|
||||||
# Distributed under the terms of the GNU General Public License v2
|
# Distributed under the terms of the GNU General Public License v2
|
||||||
|
|
||||||
|
EAPI=5
|
||||||
|
|
||||||
inherit useradd
|
inherit useradd
|
||||||
|
|
||||||
DESCRIPTION="ChromeOS specific system setup"
|
DESCRIPTION="ChromeOS specific system setup"
|
||||||
@ -15,7 +17,6 @@ IUSE="cros_host"
|
|||||||
# We need to make sure timezone-data is merged before us.
|
# We need to make sure timezone-data is merged before us.
|
||||||
# See pkg_setup below as well as http://crosbug.com/27413
|
# See pkg_setup below as well as http://crosbug.com/27413
|
||||||
# and friends.
|
# and friends.
|
||||||
# TODO: !app-misc/editor-wrapper
|
|
||||||
DEPEND="sys-apps/baselayout
|
DEPEND="sys-apps/baselayout
|
||||||
!<sys-libs/timezone-data-2011d
|
!<sys-libs/timezone-data-2011d
|
||||||
!<=app-admin/sudo-1.8.2
|
!<=app-admin/sudo-1.8.2
|
||||||
@ -31,6 +32,9 @@ RDEPEND="${DEPEND}
|
|||||||
sys-apps/systemd
|
sys-apps/systemd
|
||||||
"
|
"
|
||||||
|
|
||||||
|
# no source directory
|
||||||
|
S="${WORKDIR}"
|
||||||
|
|
||||||
# Remove entry from /etc/group
|
# Remove entry from /etc/group
|
||||||
#
|
#
|
||||||
# $1 - Group name
|
# $1 - Group name
|
||||||
@ -95,23 +99,16 @@ pkg_setup() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
src_install() {
|
src_install() {
|
||||||
insinto /etc
|
dodir /usr/lib/sysctl.d
|
||||||
#doins "${FILESDIR}"/sysctl.conf || die
|
insinto /usr/lib/sysctl.d
|
||||||
|
newins "${FILESDIR}"/sysctl.conf ${PN}.conf
|
||||||
|
|
||||||
insinto /etc/profile.d
|
|
||||||
doins "${FILESDIR}"/xauthority.sh || die
|
|
||||||
|
|
||||||
insinto /lib/udev/rules.d
|
|
||||||
doins "${FILESDIR}"/udev-rules/*.rules || die
|
|
||||||
|
|
||||||
# target-specific fun
|
|
||||||
if ! use cros_host ; then
|
|
||||||
# Add a /srv directory for mounting into later
|
# Add a /srv directory for mounting into later
|
||||||
dodir /srv
|
dodir /srv
|
||||||
keepdir /srv
|
keepdir /srv
|
||||||
|
|
||||||
dodir /bin /usr/bin
|
# target-specific fun
|
||||||
|
if ! use cros_host ; then
|
||||||
# Make mount work in the way systemd prescribes
|
# Make mount work in the way systemd prescribes
|
||||||
dosym /proc/mounts /etc/mtab
|
dosym /proc/mounts /etc/mtab
|
||||||
|
|
||||||
@ -132,24 +129,12 @@ src_install() {
|
|||||||
insinto /etc/vim
|
insinto /etc/vim
|
||||||
doins "${FILESDIR}"/vimrc
|
doins "${FILESDIR}"/vimrc
|
||||||
|
|
||||||
# Symlink /etc/localtime to something on the stateful partition, which we
|
# Symlink /etc/localtime to something on the stateful partition,
|
||||||
# can then change around at runtime.
|
# which we can then change around at runtime.
|
||||||
dosym /var/lib/timezone/localtime /etc/localtime || die
|
dosym /var/lib/timezone/localtime /etc/localtime || die
|
||||||
|
|
||||||
# We use mawk in the target boards, not gawk.
|
# We use mawk in the target boards, not gawk.
|
||||||
dosym mawk /usr/bin/awk || die
|
dosym mawk /usr/bin/awk || die
|
||||||
|
|
||||||
# We want dash as our main shell.
|
|
||||||
#dosym dash /bin/sh
|
|
||||||
|
|
||||||
# Avoid the wrapper and just link to the only editor we have.
|
|
||||||
#dodir /usr/libexec
|
|
||||||
#dosym /usr/bin/vim /usr/libexec/editor || die
|
|
||||||
#dosym /bin/more /usr/libexec/pager || die
|
|
||||||
|
|
||||||
# Custom login shell snippets.
|
|
||||||
insinto /etc/profile.d
|
|
||||||
doins "${FILESDIR}"/cursor.sh
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Add a sudo file for the core use
|
# Add a sudo file for the core use
|
||||||
@ -180,41 +165,41 @@ pkg_postinst() {
|
|||||||
# Add a chronos-access group to provide non-chronos users,
|
# Add a chronos-access group to provide non-chronos users,
|
||||||
# mostly system daemons running as a non-chronos user, group permissions
|
# mostly system daemons running as a non-chronos user, group permissions
|
||||||
# to access files/directories owned by chronos.
|
# to access files/directories owned by chronos.
|
||||||
local system_access_user="core-access"
|
# local system_access_user="core-access"
|
||||||
local system_access_id="1001"
|
# local system_access_id="1001"
|
||||||
|
|
||||||
local crypted_password='*'
|
local crypted_password='*'
|
||||||
[ -r "${SHARED_USER_PASSWD_FILE}" ] &&
|
[ -r "${SHARED_USER_PASSWD_FILE}" ] &&
|
||||||
crypted_password=$(cat "${SHARED_USER_PASSWD_FILE}")
|
crypted_password=$(cat "${SHARED_USER_PASSWD_FILE}")
|
||||||
remove_user "${system_user}"
|
remove_user "${system_user}"
|
||||||
add_user "${system_user}" "x" "${system_id}" \
|
add_user "${system_user}" "x" "${system_id}" \
|
||||||
"${system_id}" "system_user" "${system_home}" /bin/sh
|
"${system_id}" "system_user" "${system_home}" /bin/bash
|
||||||
remove_shadow "${system_user}"
|
remove_shadow "${system_user}"
|
||||||
add_shadow "${system_user}" "${crypted_password}"
|
add_shadow "${system_user}" "${crypted_password}"
|
||||||
|
|
||||||
copy_or_add_group "${system_user}" "${system_id}"
|
copy_or_add_group "${system_user}" "${system_id}"
|
||||||
copy_or_add_daemon_user "${system_access_user}" "${system_access_id}"
|
# copy_or_add_daemon_user "${system_access_user}" "${system_access_id}"
|
||||||
copy_or_add_daemon_user "messagebus" 201 # For dbus
|
copy_or_add_daemon_user "messagebus" 201 # For dbus
|
||||||
copy_or_add_daemon_user "syslog" 202 # For rsyslog
|
copy_or_add_daemon_user "syslog" 202 # For rsyslog
|
||||||
copy_or_add_daemon_user "ntp" 203
|
copy_or_add_daemon_user "ntp" 203
|
||||||
copy_or_add_daemon_user "sshd" 204
|
copy_or_add_daemon_user "sshd" 204
|
||||||
copy_or_add_daemon_user "polkituser" 206 # For policykit
|
# copy_or_add_daemon_user "polkituser" 206 # For policykit
|
||||||
# copy_or_add_daemon_user "tss" 207 # For trousers (TSS/TPM)
|
# copy_or_add_daemon_user "tss" 207 # For trousers (TSS/TPM)
|
||||||
copy_or_add_daemon_user "pkcs11" 208 # For pkcs11 clients
|
# copy_or_add_daemon_user "pkcs11" 208 # For pkcs11 clients
|
||||||
# copy_or_add_daemon_user "qdlservice" 209 # for QDLService
|
# copy_or_add_daemon_user "qdlservice" 209 # for QDLService
|
||||||
# copy_or_add_daemon_user "cromo" 210 # For cromo (modem manager)
|
# copy_or_add_daemon_user "cromo" 210 # For cromo (modem manager)
|
||||||
# copy_or_add_daemon_user "cashew" 211 # Deprecated, do not reuse
|
# copy_or_add_daemon_user "cashew" 211 # Deprecated, do not reuse
|
||||||
copy_or_add_daemon_user "ipsec" 212 # For strongswan/ipsec VPN
|
# copy_or_add_daemon_user "ipsec" 212 # For strongswan/ipsec VPN
|
||||||
# copy_or_add_daemon_user "cros-disks" 213 # For cros-disks
|
# copy_or_add_daemon_user "cros-disks" 213 # For cros-disks
|
||||||
copy_or_add_daemon_user "tor" 214 # For tor (anonymity service)
|
# copy_or_add_daemon_user "tor" 214 # For tor (anonymity service)
|
||||||
copy_or_add_daemon_user "tcpdump" 215 # For tcpdump --with-user
|
# copy_or_add_daemon_user "tcpdump" 215 # For tcpdump --with-user
|
||||||
copy_or_add_daemon_user "debugd" 216 # For debugd
|
# copy_or_add_daemon_user "debugd" 216 # For debugd
|
||||||
copy_or_add_daemon_user "openvpn" 217 # For openvpn
|
# copy_or_add_daemon_user "openvpn" 217 # For openvpn
|
||||||
# copy_or_add_daemon_user "bluetooth" 218 # For bluez
|
# copy_or_add_daemon_user "bluetooth" 218 # For bluez
|
||||||
# copy_or_add_daemon_user "wpa" 219 # For wpa_supplicant
|
# copy_or_add_daemon_user "wpa" 219 # For wpa_supplicant
|
||||||
# copy_or_add_daemon_user "cras" 220 # For cras (audio)
|
# copy_or_add_daemon_user "cras" 220 # For cras (audio)
|
||||||
# copy_or_add_daemon_user "gavd" 221 # For gavd (audio) (deprecated)
|
# copy_or_add_daemon_user "gavd" 221 # For gavd (audio) (deprecated)
|
||||||
copy_or_add_daemon_user "input" 222 # For /dev/input/event access
|
# copy_or_add_daemon_user "input" 222 # For /dev/input/event access
|
||||||
# copy_or_add_daemon_user "chaps" 223 # For chaps (pkcs11)
|
# copy_or_add_daemon_user "chaps" 223 # For chaps (pkcs11)
|
||||||
copy_or_add_daemon_user "dhcp" 224 # For dhcpcd (DHCP client)
|
copy_or_add_daemon_user "dhcp" 224 # For dhcpcd (DHCP client)
|
||||||
# copy_or_add_daemon_user "tpmd" 225 # For tpmd
|
# copy_or_add_daemon_user "tpmd" 225 # For tpmd
|
||||||
@ -225,33 +210,15 @@ pkg_postinst() {
|
|||||||
# copy_or_add_daemon_user "devbroker" 230 # For permission_broker
|
# copy_or_add_daemon_user "devbroker" 230 # For permission_broker
|
||||||
# copy_or_add_daemon_user "xorg" 231 # For Xorg
|
# copy_or_add_daemon_user "xorg" 231 # For Xorg
|
||||||
copy_or_add_daemon_user "etcd" 232 # For etcd
|
copy_or_add_daemon_user "etcd" 232 # For etcd
|
||||||
# Reserve some UIDs/GIDs between 300 and 349 for sandboxing FUSE-based
|
copy_or_add_daemon_user "docker" 233 # For docker
|
||||||
# filesystem daemons.
|
copy_or_add_group "systemd-journal" 248 # For journalctl access
|
||||||
|
copy_or_add_group "dialout" 249 # For udev rules
|
||||||
# copy_or_add_daemon_user "ntfs-3g" 300 # For ntfs-3g prcoess
|
# copy_or_add_daemon_user "ntfs-3g" 300 # For ntfs-3g prcoess
|
||||||
# copy_or_add_daemon_user "avfs" 301 # For avfs process
|
# copy_or_add_daemon_user "avfs" 301 # For avfs process
|
||||||
# copy_or_add_daemon_user "fuse-exfat" 302 # For exfat-fuse prcoess
|
# copy_or_add_daemon_user "fuse-exfat" 302 # For exfat-fuse prcoess
|
||||||
|
# copy_or_add_group "serial" 402
|
||||||
|
|
||||||
# Users which require access to PKCS #11 cryptographic services must be
|
# Give the core user access to some system tools
|
||||||
# in the pkcs11 group.
|
add_users_to_group "docker" "${system_user}"
|
||||||
remove_all_users_from_group pkcs11
|
add_users_to_group "systemd-journal" "${system_user}"
|
||||||
add_users_to_group pkcs11 root ipsec "${system_user}"
|
|
||||||
|
|
||||||
# All users accessing opencryptoki database files and all users for
|
|
||||||
# sandboxing FUSE-based filesystem daemons need to be in the
|
|
||||||
# ${system_access_user} group.
|
|
||||||
remove_all_users_from_group "${system_access_user}"
|
|
||||||
add_users_to_group "${system_access_user}" root ipsec "${system_user}" \
|
|
||||||
|
|
||||||
# Dedicated group for owning access to serial devices.
|
|
||||||
copy_or_add_group "serial" 402
|
|
||||||
add_users_to_group "serial" "${system_user}"
|
|
||||||
add_users_to_group "serial" "uucp"
|
|
||||||
|
|
||||||
# Some default directories. These are created here rather than at
|
|
||||||
# install because some of them may already exist and have mounts.
|
|
||||||
for x in /dev /home /media \
|
|
||||||
/proc /root /sys /var/lock; do
|
|
||||||
[ -d "${ROOT}/$x" ] && continue
|
|
||||||
install -d --mode=0755 --owner=root --group=root "${ROOT}/$x"
|
|
||||||
done
|
|
||||||
}
|
}
|
||||||
|
@ -1,7 +0,0 @@
|
|||||||
# We disable vt cursors by default on the kernel command line
|
|
||||||
# (so that it doesn't flash when doing boot splash and such).
|
|
||||||
#
|
|
||||||
# Re-enable it when launching a login shell. This should only
|
|
||||||
# happen when logging in via vt or crosh or ssh and those are
|
|
||||||
# all fine. Login shells shouldn't get launched normally.
|
|
||||||
setterm -cursor on
|
|
@ -1 +0,0 @@
|
|||||||
auth include coreos-auth
|
|
@ -1,69 +1,13 @@
|
|||||||
# /etc/sysctl.conf
|
# sysctl defaults for CoreOS
|
||||||
#
|
|
||||||
# For more information on how this file works, please see
|
|
||||||
# the manpages sysctl(8) and sysctl.conf(5).
|
|
||||||
#
|
|
||||||
# In order for this file to work properly, you must first
|
|
||||||
# enable 'Sysctl support' in the kernel.
|
|
||||||
#
|
|
||||||
# Look in /proc/sys/ for all the things you can setup.
|
|
||||||
#
|
|
||||||
|
|
||||||
#
|
# Enable IPv4 forwarding to support NAT in containers
|
||||||
# Original Gentoo settings:
|
net.ipv4.ip_forward = 1
|
||||||
#
|
|
||||||
|
|
||||||
# Disables packet forwarding
|
|
||||||
net.ipv4.ip_forward = 0
|
|
||||||
# Disables IP dynaddr
|
|
||||||
#net.ipv4.ip_dynaddr = 0
|
|
||||||
# Disable ECN
|
|
||||||
#net.ipv4.tcp_ecn = 0
|
|
||||||
# Enables source route verification
|
# Enables source route verification
|
||||||
net.ipv4.conf.default.rp_filter = 1
|
net.ipv4.conf.default.rp_filter = 1
|
||||||
# Enable reverse path
|
# Enable reverse path
|
||||||
net.ipv4.conf.all.rp_filter = 1
|
net.ipv4.conf.all.rp_filter = 1
|
||||||
|
|
||||||
# Enable SYN cookies (yum!)
|
|
||||||
# http://cr.yp.to/syncookies.html
|
|
||||||
#net.ipv4.tcp_syncookies = 1
|
|
||||||
|
|
||||||
# Disable source route
|
|
||||||
#net.ipv4.conf.all.accept_source_route = 0
|
|
||||||
#net.ipv4.conf.default.accept_source_route = 0
|
|
||||||
|
|
||||||
# Disable redirects
|
|
||||||
#net.ipv4.conf.all.accept_redirects = 0
|
|
||||||
#net.ipv4.conf.default.accept_redirects = 0
|
|
||||||
|
|
||||||
# Disable secure redirects
|
|
||||||
#net.ipv4.conf.all.secure_redirects = 0
|
|
||||||
#net.ipv4.conf.default.secure_redirects = 0
|
|
||||||
|
|
||||||
# Ignore ICMP broadcasts
|
|
||||||
#net.ipv4.icmp_echo_ignore_broadcasts = 1
|
|
||||||
|
|
||||||
# Perform PLPMTUD only after detecting a "blackhole" in old-style PMTUD
|
|
||||||
net.ipv4.tcp_mtu_probing = 1
|
|
||||||
|
|
||||||
# Disables the magic-sysrq key
|
|
||||||
#kernel.sysrq = 0
|
|
||||||
# When the kernel panics, automatically reboot in 3 seconds
|
|
||||||
#kernel.panic = 3
|
|
||||||
# Allow for more PIDs (cool factor!); may break some programs
|
|
||||||
#kernel.pid_max = 999999
|
|
||||||
|
|
||||||
# You should compile nfsd into the kernel or add it
|
|
||||||
# to modules.autoload for this to work properly
|
|
||||||
# TCP Port for lock manager
|
|
||||||
#fs.nfs.nlm_tcpport = 0
|
|
||||||
# UDP Port for lock manager
|
|
||||||
#fs.nfs.nlm_udpport = 0
|
|
||||||
|
|
||||||
#
|
|
||||||
# ChromeOS specific settings:
|
|
||||||
#
|
|
||||||
|
|
||||||
# Set watchdog_thresh
|
# Set watchdog_thresh
|
||||||
kernel.watchdog_thresh = 5
|
kernel.watchdog_thresh = 5
|
||||||
# When the kernel panics, automatically reboot to preserve dump in ram
|
# When the kernel panics, automatically reboot to preserve dump in ram
|
||||||
@ -71,26 +15,5 @@ kernel.panic = -1
|
|||||||
# Reboot on oops as well
|
# Reboot on oops as well
|
||||||
kernel.panic_on_oops = 1
|
kernel.panic_on_oops = 1
|
||||||
|
|
||||||
# Disable shrinking the cwnd when connection is idle
|
|
||||||
net.ipv4.tcp_slow_start_after_idle = 0
|
|
||||||
|
|
||||||
# Protect working set in order to avoid thrashing.
|
|
||||||
# See http://crosbug.com/7561 for details.
|
|
||||||
vm.min_filelist_kbytes = 50000
|
|
||||||
|
|
||||||
# Allow full memory overcommit as we rather close or kill tabs than
|
|
||||||
# refuse memory to arbitrary core processes.
|
|
||||||
vm.overcommit_memory = 1
|
|
||||||
|
|
||||||
# Use laptop mode settings always
|
|
||||||
vm.dirty_background_ratio = 1
|
|
||||||
vm.dirty_expire_centisecs = 60000
|
|
||||||
vm.dirty_ratio = 60
|
|
||||||
vm.dirty_writeback_centisecs = 60000
|
|
||||||
vm.laptop_mode = 0
|
|
||||||
|
|
||||||
# Disable kernel address visibility to non-root users.
|
# Disable kernel address visibility to non-root users.
|
||||||
kernel.kptr_restrict = 1
|
kernel.kptr_restrict = 1
|
||||||
|
|
||||||
# Increase shared memory segment limit for plugins rendering large areas
|
|
||||||
kernel.shmmax = 134217728
|
|
||||||
|
@ -1,9 +0,0 @@
|
|||||||
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
|
|
||||||
# Use of this source code is governed by a BSD-style license that can be
|
|
||||||
# found in the LICENSE file.
|
|
||||||
|
|
||||||
KERNEL=="tty[A-Z]*[0-9]", GROUP="serial"
|
|
||||||
# Don't allow access to serial interfaces on Gobi modems.
|
|
||||||
KERNEL=="tty[A-Z]*[0-9]", ID_USB_DRIVER=="qcserial", GROUP="root"
|
|
||||||
# Don't allow access to serial interfaces on Novatel modems.
|
|
||||||
KERNEL=="tty[A-Z]*[0-9]", ID_USB_DRIVER=="option", GROUP="root"
|
|
@ -1,5 +0,0 @@
|
|||||||
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
|
|
||||||
# Use of this source code is governed by a BSD-style license that can be
|
|
||||||
# found in the LICENSE file.
|
|
||||||
|
|
||||||
KERNEL=="i2c-[0-9]", GROUP="i2c"
|
|
@ -1,8 +0,0 @@
|
|||||||
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
|
|
||||||
# Use of this source code is governed by a BSD-style license that can be
|
|
||||||
# found in the LICENSE file.
|
|
||||||
|
|
||||||
ACTION=="add", SUBSYSTEM=="usb", ATTR{bInterfaceClass}=="07", ATTRS{idProduct}=="*", \
|
|
||||||
PROGRAM="/usr/bin/dbus-send --system --type=method_call --dest=org.chromium.LibCrosService \
|
|
||||||
/org/chromium/LibCrosService org.chromium.LibCrosServiceInterface.PrinterAdded \
|
|
||||||
string:$attr{idVendor} string:$attr{idProduct}"
|
|
@ -1 +0,0 @@
|
|||||||
export XAUTHORITY="/home/chronos/.Xauthority"
|
|
Loading…
Reference in New Issue
Block a user