slitaz-tools rev 744
Moved rootfs/etc to base dir and up tazbox README
author | Christophe Lincoln <pankso@slitaz.org> |
---|---|
date | Sat Apr 28 22:37:13 2012 +0200 (2012-04-28) |
parents | 6f83572ef0b1 |
children | cc27e2f27556 |
files | Makefile etc/firewall.conf etc/init.d/crond etc/init.d/firewall etc/slitaz/applications.conf rootfs/etc/firewall.conf rootfs/etc/init.d/crond rootfs/etc/init.d/firewall rootfs/etc/slitaz/applications.conf tazbox/README tazbox/tazbox |
line diff
1.1 --- a/Makefile Sat Apr 28 20:33:25 2012 +0200 1.2 +++ b/Makefile Sat Apr 28 22:37:13 2012 +0200 1.3 @@ -75,13 +75,12 @@ 1.4 # Installation 1.5 1.6 install: 1.7 - install -m 0777 -d $(DESTDIR)/sbin 1.8 - install -m 0777 -d $(DESTDIR)/etc 1.9 - install -m 0777 -d $(DESTDIR)$(PREFIX)/bin 1.10 - install -m 0777 -d $(DESTDIR)$(PREFIX)/sbin 1.11 - install -m 0777 -d $(DESTDIR)$(PREFIX)/share 1.12 - cp -a rootfs/etc $(DESTDIR)/ 1.13 - chmod +x $(DESTDIR)/etc/init.d/* 1.14 + install -m 0755 -d $(DESTDIR)/sbin 1.15 + install -m 0755 -d $(DESTDIR)/etc 1.16 + install -m 0755 -d $(DESTDIR)$(PREFIX)/bin 1.17 + install -m 0755 -d $(DESTDIR)$(PREFIX)/sbin 1.18 + install -m 0755 -d $(DESTDIR)$(PREFIX)/share 1.19 + cp -a etc $(DESTDIR)/ 1.20 1.21 # Licenses 1.22 cp -a licenses $(DESTDIR)$(PREFIX)/share 1.23 @@ -111,7 +110,7 @@ 1.24 install -m 0755 installer/tazinst $(DESTDIR)$(PREFIX)/sbin 1.25 for l in $(LINGUAS); do \ 1.26 for i in `ls po/mo/$$l/tazinst.mo` ; do \ 1.27 - install -m 0777 -d $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.28 + install -m 0755 -d $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.29 install -m 0644 po/mo/$$l/tazinst.mo \ 1.30 $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.31 done \ 1.32 @@ -120,19 +119,22 @@ 1.33 # slitaz-tools i18n 1.34 for l in $(LINGUAS); \ 1.35 do \ 1.36 - install -m 0777 -d $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.37 + install -m 0755 -d $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.38 install -m 0644 po/mo/$$l/slitaz-tools.mo \ 1.39 $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.40 done; 1.41 1.42 + # Permissions 1.43 + chmod +x $(DESTDIR)/etc/init.d/* 1.44 + 1.45 install-boxes: 1.46 - #install -m 0777 -d $(DESTDIR)/etc/wireless 1.47 - install -m 0777 -d $(DESTDIR)$(PREFIX)/bin 1.48 - install -m 0777 -d $(DESTDIR)$(PREFIX)/lib/slitaz 1.49 - install -m 0777 -d $(DESTDIR)$(PREFIX)/share/locale 1.50 - install -m 0777 -d $(DESTDIR)$(PREFIX)/share/applications 1.51 - install -m 0777 -d $(DESTDIR)$(PREFIX)/share/pixmaps 1.52 - install -m 0777 -d $(DESTDIR)$(PREFIX)/share/doc 1.53 + #install -m 0755 -d $(DESTDIR)/etc/wireless 1.54 + install -m 0755 -d $(DESTDIR)$(PREFIX)/bin 1.55 + install -m 0755 -d $(DESTDIR)$(PREFIX)/lib/slitaz 1.56 + install -m 0755 -d $(DESTDIR)$(PREFIX)/share/locale 1.57 + install -m 0755 -d $(DESTDIR)$(PREFIX)/share/applications 1.58 + install -m 0755 -d $(DESTDIR)$(PREFIX)/share/pixmaps 1.59 + install -m 0755 -d $(DESTDIR)$(PREFIX)/share/doc/slitaz 1.60 install -m 0755 boxes/* $(DESTDIR)$(PREFIX)/bin 1.61 install -m 0755 tazbox/tazbox $(DESTDIR)$(PREFIX)/bin 1.62 1.63 @@ -143,13 +145,13 @@ 1.64 install -m 0644 applications/* $(DESTDIR)$(PREFIX)/share/applications 1.65 install -m 0644 pixmaps/* $(DESTDIR)$(PREFIX)/share/pixmaps 1.66 1.67 - # Documentation 1.68 - cp -a doc $(DESTDIR)$(PREFIX)/share/doc/slitaz-tools 1.69 + # Documentation (style is already in slitaz-doc) 1.70 + cp -a doc/*.html $(DESTDIR)$(PREFIX)/share/doc/slitaz 1.71 1.72 # i18n. 1.73 for l in $(LINGUAS); \ 1.74 do \ 1.75 - install -m 0777 -d $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.76 + install -m 0755 -d $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.77 install -m 0644 po/mo/$$l/*box* \ 1.78 $(DESTDIR)$(PREFIX)/share/locale/$$l/LC_MESSAGES; \ 1.79 done;
2.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 2.2 +++ b/etc/firewall.conf Sat Apr 28 22:37:13 2012 +0200 2.3 @@ -0,0 +1,65 @@ 2.4 +# /etc/firewall.conf: SliTaz firewall configuration. 2.5 +# Config file used by: /etc/init.d/firewall.sh 2.6 +# 2.7 + 2.8 +# Network interface. 2.9 +INTERFACE="eth0" 2.10 + 2.11 +# Enable/disable kernel security. 2.12 +KERNEL_SECURITY="yes" 2.13 + 2.14 +# Enable/disable iptables rules (iptables package must be installed). 2.15 +IPTABLES_RULES="no" 2.16 + 2.17 +# Netfilter/iptables rules. 2.18 +# This shell function is included in /etc/init.d/firewall.sh 2.19 +# to start iptables rules. 2.20 +# 2.21 +iptables_rules() 2.22 +{ 2.23 + 2.24 +# Drop all input connections. 2.25 +iptables -P INPUT DROP 2.26 + 2.27 +# Drop all output connections. 2.28 +iptables -P OUTPUT DROP 2.29 + 2.30 +# Drop all forward connections. 2.31 +iptables -P FORWARD DROP 2.32 + 2.33 +# Accept input on localhost (127.0.0.1). 2.34 +iptables -A INPUT -i lo -j ACCEPT 2.35 + 2.36 +# Accept input on the local network (192.168.0.0/24). 2.37 +iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT 2.38 + 2.39 +# Accept near all output trafic. 2.40 +iptables -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT 2.41 + 2.42 +# Accept input trafic only for connections initialized by user. 2.43 +iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT 2.44 + 2.45 +# If you manage a HTTP/SSH/FTP/IRC server you can accept input for non-established connections an some ports. 2.46 +# else you can disable the lines below for more secured setup 2.47 + 2.48 +# Accept input on port 80 for the HTTP server. 2.49 +iptables -A INPUT -i $INTERFACE -p tcp --source-port 80 -j ACCEPT 2.50 + 2.51 +# Accept input on port 22 for SSH. 2.52 +iptables -A INPUT -i $INTERFACE -p tcp --destination-port 22 -j ACCEPT 2.53 + 2.54 +# Accept port 21 and, 1024 to 60310 for FTP. 2.55 +iptables -A INPUT -i $INTERFACE -p tcp --destination-port 21 -j ACCEPT 2.56 +iptables -A INPUT -i $INTERFACE -p tcp --destination-port 1024:60310 -j ACCEPT 2.57 + 2.58 +# Accept port 6667 for IRC chat. 2.59 +iptables -A INPUT -i $INTERFACE -p tcp --source-port 6667 -j ACCEPT 2.60 + 2.61 +# Accept unprivileged ports. 2.62 +iptables -A INPUT -i $INTERFACE -p udp --destination-port 1024:65535 -j ACCEPT 2.63 + 2.64 +# Accept ping. 2.65 +iptables -A INPUT -i $INTERFACE -p icmp -j ACCEPT 2.66 + 2.67 +} 2.68 +
3.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 3.2 +++ b/etc/init.d/crond Sat Apr 28 22:37:13 2012 +0200 3.3 @@ -0,0 +1,57 @@ 3.4 +#!/bin/sh 3.5 +# /etc/init.d/crond: Start, stop and restart cron daemon on SliTaz, at boot 3.6 +# time or with the command line. 3.7 +# 3.8 +# To start daemon at boot time, just put the right name in the $RUN_DAEMONS 3.9 +# variable of /etc/rcS.conf and configure options with /etc/daemons.conf. 3.10 +# 3.11 +. /etc/init.d/rc.functions 3.12 +. /etc/daemons.conf 3.13 + 3.14 +NAME=Crond 3.15 +DESC="cron deamon" 3.16 +DAEMON=/usr/sbin/crond 3.17 +OPTIONS=$CROND_OPTIONS 3.18 +PIDFILE=/var/run/crond.pid 3.19 + 3.20 +case "$1" in 3.21 + start) 3.22 + if active_pidfile $PIDFILE crond ; then 3.23 + echo "$NAME already running." 3.24 + exit 1 3.25 + fi 3.26 + echo -n "Starting $DESC: $NAME... " 3.27 + $DAEMON $OPTIONS 3.28 + status 3.29 + ;; 3.30 + stop) 3.31 + if ! active_pidfile $PIDFILE crond ; then 3.32 + echo "$NAME is not running." 3.33 + exit 1 3.34 + fi 3.35 + echo -n "Stopping $DESC: $NAME... " 3.36 + kill `cat $PIDFILE` 3.37 + rm $PIDFILE 3.38 + status 3.39 + ;; 3.40 + restart) 3.41 + if ! active_pidfile $PIDFILE crond ; then 3.42 + echo "$NAME is not running." 3.43 + exit 1 3.44 + fi 3.45 + echo -n "Restarting $DESC: $NAME... " 3.46 + kill `cat $PIDFILE` 3.47 + rm $PIDFILE 3.48 + sleep 2 3.49 + $DAEMON $OPTIONS 3.50 + status 3.51 + ;; 3.52 + *) 3.53 + echo "" 3.54 + echo -e "\033[1mUsage:\033[0m /etc/init.d/`basename $0` [start|stop|restart]" 3.55 + echo "" 3.56 + exit 1 3.57 + ;; 3.58 +esac 3.59 + 3.60 +exit 0
4.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 4.2 +++ b/etc/init.d/firewall Sat Apr 28 22:37:13 2012 +0200 4.3 @@ -0,0 +1,90 @@ 4.4 +#!/bin/sh 4.5 +# /etc/init.d/firewall - SliTaz firewall daemon script using iptables. 4.6 +# Config file is: /etc/firewall.conf 4.7 +# 4.8 +. /etc/init.d/rc.functions 4.9 +. /etc/firewall.conf 4.10 + 4.11 +case $1 in 4.12 + start) 4.13 + # Kernel security. 0 = disable, 1 = enable. 4.14 + # 4.15 + if [ "$KERNEL_SECURITY" = "yes" ] ; then 4.16 + echo -n "Setting up kernel security rules... " 4.17 + # ICMP redirects acceptance. 4.18 + for conf in /proc/sys/net/ipv4/conf/*/accept_redirects ; do 4.19 + echo "0" > $conf 4.20 + done 4.21 + for conf in /proc/sys/net/ipv4/conf/*/secure_redirects ; do 4.22 + echo "0" > $conf 4.23 + done 4.24 + # IP source routing. 4.25 + for conf in /proc/sys/net/ipv4/conf/*/accept_source_route ; do 4.26 + echo "0" > $conf 4.27 + done 4.28 + # Log impossible addresses. 4.29 + for conf in /proc/sys/net/ipv4/conf/*/log_martians ; do 4.30 + echo "1" > $conf 4.31 + done 4.32 + # Ip spoofing protection. 4.33 + for conf in /proc/sys/net/ipv4/conf/*/rp_filter ; do 4.34 + echo "1" > $conf 4.35 + done 4.36 + echo "1" > /proc/sys/net/ipv4/tcp_syncookies 4.37 + status 4.38 + else 4.39 + echo "Kernel security rules are disabled in: /etc/firewall.conf... " 4.40 + fi 4.41 + # Netfilter/iptables rules. We get the rules from /etc/firewall.conf. 4.42 + # 4.43 + if [ "$IPTABLES_RULES" = "yes" ] ; then 4.44 + echo -n "Setting up iptables rules defined in: /etc/firewall.conf... " 4.45 + iptables_rules 4.46 + status 4.47 + else 4.48 + echo "Iptables rules are disabled in: /etc/firewall.conf... " 4.49 + exit 0 4.50 + fi 4.51 + ;; 4.52 + stop) 4.53 + if [ "$IPTABLES_RULES" = "yes" ] ; then 4.54 + echo -n "Stopping iptables firewall rules... " 4.55 + iptables -P INPUT ACCEPT 4.56 + iptables -P OUTPUT ACCEPT 4.57 + iptables -P FORWARD ACCEPT 4.58 + iptables -F 4.59 + iptables -X 4.60 + status 4.61 + else 4.62 + echo "Iptables rules are disabled in: /etc/firewall.conf... " 4.63 + exit 0 4.64 + fi 4.65 + ;; 4.66 + restart) 4.67 + $0 stop 4.68 + sleep 2 4.69 + $0 start 4.70 + ;; 4.71 + status) 4.72 + echo "" 4.73 + echo -e "\033[1m===================== SliTaz firewall statistics =====================\033[0m" 4.74 + echo "" 4.75 + if [ "$KERNEL_SECURITY" = "yes" ] ; then 4.76 + echo "Kernel security: enabled" 4.77 + else 4.78 + echo "Kernel security: disabled" 4.79 + fi 4.80 + echo "" 4.81 + echo "Netfilter/iptables rules: " 4.82 + echo "" 4.83 + iptables -nL 4.84 + echo "" 4.85 + ;; 4.86 + *) 4.87 + echo "" 4.88 + echo -e "\033[1mUsage:\033[0m /etc/init.d/`basename $0` [start|stop|restart|status]" 4.89 + echo "" 4.90 + exit 1 4.91 + ;; 4.92 +esac 4.93 +
5.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 5.2 +++ b/etc/slitaz/applications.conf Sat Apr 28 22:37:13 2012 +0200 5.3 @@ -0,0 +1,18 @@ 5.4 +# SliTaz default applications configuration file. These apps can be 5.5 +# started through wrappers: browser, editor and terminal. 5.6 +# 5.7 + 5.8 +# File manager. 5.9 +FILE_MANAGER="pcmanfm" 5.10 + 5.11 +# Web browser. 5.12 +BROWSER="tazweb" 5.13 + 5.14 +# Text editor. 5.15 +EDITOR="leafpad" 5.16 + 5.17 +# X terminal. 5.18 +TERMINAL="xterm" 5.19 + 5.20 +# Window manager. 5.21 +WINDOW_MANAGER="openbox-session"
6.1 --- a/rootfs/etc/firewall.conf Sat Apr 28 20:33:25 2012 +0200 6.2 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 6.3 @@ -1,65 +0,0 @@ 6.4 -# /etc/firewall.conf: SliTaz firewall configuration. 6.5 -# Config file used by: /etc/init.d/firewall.sh 6.6 -# 6.7 - 6.8 -# Network interface. 6.9 -INTERFACE="eth0" 6.10 - 6.11 -# Enable/disable kernel security. 6.12 -KERNEL_SECURITY="yes" 6.13 - 6.14 -# Enable/disable iptables rules (iptables package must be installed). 6.15 -IPTABLES_RULES="no" 6.16 - 6.17 -# Netfilter/iptables rules. 6.18 -# This shell function is included in /etc/init.d/firewall.sh 6.19 -# to start iptables rules. 6.20 -# 6.21 -iptables_rules() 6.22 -{ 6.23 - 6.24 -# Drop all input connections. 6.25 -iptables -P INPUT DROP 6.26 - 6.27 -# Drop all output connections. 6.28 -iptables -P OUTPUT DROP 6.29 - 6.30 -# Drop all forward connections. 6.31 -iptables -P FORWARD DROP 6.32 - 6.33 -# Accept input on localhost (127.0.0.1). 6.34 -iptables -A INPUT -i lo -j ACCEPT 6.35 - 6.36 -# Accept input on the local network (192.168.0.0/24). 6.37 -iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT 6.38 - 6.39 -# Accept near all output trafic. 6.40 -iptables -A OUTPUT -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT 6.41 - 6.42 -# Accept input trafic only for connections initialized by user. 6.43 -iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT 6.44 - 6.45 -# If you manage a HTTP/SSH/FTP/IRC server you can accept input for non-established connections an some ports. 6.46 -# else you can disable the lines below for more secured setup 6.47 - 6.48 -# Accept input on port 80 for the HTTP server. 6.49 -iptables -A INPUT -i $INTERFACE -p tcp --source-port 80 -j ACCEPT 6.50 - 6.51 -# Accept input on port 22 for SSH. 6.52 -iptables -A INPUT -i $INTERFACE -p tcp --destination-port 22 -j ACCEPT 6.53 - 6.54 -# Accept port 21 and, 1024 to 60310 for FTP. 6.55 -iptables -A INPUT -i $INTERFACE -p tcp --destination-port 21 -j ACCEPT 6.56 -iptables -A INPUT -i $INTERFACE -p tcp --destination-port 1024:60310 -j ACCEPT 6.57 - 6.58 -# Accept port 6667 for IRC chat. 6.59 -iptables -A INPUT -i $INTERFACE -p tcp --source-port 6667 -j ACCEPT 6.60 - 6.61 -# Accept unprivileged ports. 6.62 -iptables -A INPUT -i $INTERFACE -p udp --destination-port 1024:65535 -j ACCEPT 6.63 - 6.64 -# Accept ping. 6.65 -iptables -A INPUT -i $INTERFACE -p icmp -j ACCEPT 6.66 - 6.67 -} 6.68 -
7.1 --- a/rootfs/etc/init.d/crond Sat Apr 28 20:33:25 2012 +0200 7.2 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 7.3 @@ -1,57 +0,0 @@ 7.4 -#!/bin/sh 7.5 -# /etc/init.d/crond: Start, stop and restart cron daemon on SliTaz, at boot 7.6 -# time or with the command line. 7.7 -# 7.8 -# To start daemon at boot time, just put the right name in the $RUN_DAEMONS 7.9 -# variable of /etc/rcS.conf and configure options with /etc/daemons.conf. 7.10 -# 7.11 -. /etc/init.d/rc.functions 7.12 -. /etc/daemons.conf 7.13 - 7.14 -NAME=Crond 7.15 -DESC="cron deamon" 7.16 -DAEMON=/usr/sbin/crond 7.17 -OPTIONS=$CROND_OPTIONS 7.18 -PIDFILE=/var/run/crond.pid 7.19 - 7.20 -case "$1" in 7.21 - start) 7.22 - if active_pidfile $PIDFILE crond ; then 7.23 - echo "$NAME already running." 7.24 - exit 1 7.25 - fi 7.26 - echo -n "Starting $DESC: $NAME... " 7.27 - $DAEMON $OPTIONS 7.28 - status 7.29 - ;; 7.30 - stop) 7.31 - if ! active_pidfile $PIDFILE crond ; then 7.32 - echo "$NAME is not running." 7.33 - exit 1 7.34 - fi 7.35 - echo -n "Stopping $DESC: $NAME... " 7.36 - kill `cat $PIDFILE` 7.37 - rm $PIDFILE 7.38 - status 7.39 - ;; 7.40 - restart) 7.41 - if ! active_pidfile $PIDFILE crond ; then 7.42 - echo "$NAME is not running." 7.43 - exit 1 7.44 - fi 7.45 - echo -n "Restarting $DESC: $NAME... " 7.46 - kill `cat $PIDFILE` 7.47 - rm $PIDFILE 7.48 - sleep 2 7.49 - $DAEMON $OPTIONS 7.50 - status 7.51 - ;; 7.52 - *) 7.53 - echo "" 7.54 - echo -e "\033[1mUsage:\033[0m /etc/init.d/`basename $0` [start|stop|restart]" 7.55 - echo "" 7.56 - exit 1 7.57 - ;; 7.58 -esac 7.59 - 7.60 -exit 0
8.1 --- a/rootfs/etc/init.d/firewall Sat Apr 28 20:33:25 2012 +0200 8.2 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 8.3 @@ -1,90 +0,0 @@ 8.4 -#!/bin/sh 8.5 -# /etc/init.d/firewall - SliTaz firewall daemon script using iptables. 8.6 -# Config file is: /etc/firewall.conf 8.7 -# 8.8 -. /etc/init.d/rc.functions 8.9 -. /etc/firewall.conf 8.10 - 8.11 -case $1 in 8.12 - start) 8.13 - # Kernel security. 0 = disable, 1 = enable. 8.14 - # 8.15 - if [ "$KERNEL_SECURITY" = "yes" ] ; then 8.16 - echo -n "Setting up kernel security rules... " 8.17 - # ICMP redirects acceptance. 8.18 - for conf in /proc/sys/net/ipv4/conf/*/accept_redirects ; do 8.19 - echo "0" > $conf 8.20 - done 8.21 - for conf in /proc/sys/net/ipv4/conf/*/secure_redirects ; do 8.22 - echo "0" > $conf 8.23 - done 8.24 - # IP source routing. 8.25 - for conf in /proc/sys/net/ipv4/conf/*/accept_source_route ; do 8.26 - echo "0" > $conf 8.27 - done 8.28 - # Log impossible addresses. 8.29 - for conf in /proc/sys/net/ipv4/conf/*/log_martians ; do 8.30 - echo "1" > $conf 8.31 - done 8.32 - # Ip spoofing protection. 8.33 - for conf in /proc/sys/net/ipv4/conf/*/rp_filter ; do 8.34 - echo "1" > $conf 8.35 - done 8.36 - echo "1" > /proc/sys/net/ipv4/tcp_syncookies 8.37 - status 8.38 - else 8.39 - echo "Kernel security rules are disabled in: /etc/firewall.conf... " 8.40 - fi 8.41 - # Netfilter/iptables rules. We get the rules from /etc/firewall.conf. 8.42 - # 8.43 - if [ "$IPTABLES_RULES" = "yes" ] ; then 8.44 - echo -n "Setting up iptables rules defined in: /etc/firewall.conf... " 8.45 - iptables_rules 8.46 - status 8.47 - else 8.48 - echo "Iptables rules are disabled in: /etc/firewall.conf... " 8.49 - exit 0 8.50 - fi 8.51 - ;; 8.52 - stop) 8.53 - if [ "$IPTABLES_RULES" = "yes" ] ; then 8.54 - echo -n "Stopping iptables firewall rules... " 8.55 - iptables -P INPUT ACCEPT 8.56 - iptables -P OUTPUT ACCEPT 8.57 - iptables -P FORWARD ACCEPT 8.58 - iptables -F 8.59 - iptables -X 8.60 - status 8.61 - else 8.62 - echo "Iptables rules are disabled in: /etc/firewall.conf... " 8.63 - exit 0 8.64 - fi 8.65 - ;; 8.66 - restart) 8.67 - $0 stop 8.68 - sleep 2 8.69 - $0 start 8.70 - ;; 8.71 - status) 8.72 - echo "" 8.73 - echo -e "\033[1m===================== SliTaz firewall statistics =====================\033[0m" 8.74 - echo "" 8.75 - if [ "$KERNEL_SECURITY" = "yes" ] ; then 8.76 - echo "Kernel security: enabled" 8.77 - else 8.78 - echo "Kernel security: disabled" 8.79 - fi 8.80 - echo "" 8.81 - echo "Netfilter/iptables rules: " 8.82 - echo "" 8.83 - iptables -nL 8.84 - echo "" 8.85 - ;; 8.86 - *) 8.87 - echo "" 8.88 - echo -e "\033[1mUsage:\033[0m /etc/init.d/`basename $0` [start|stop|restart|status]" 8.89 - echo "" 8.90 - exit 1 8.91 - ;; 8.92 -esac 8.93 -
9.1 --- a/rootfs/etc/slitaz/applications.conf Sat Apr 28 20:33:25 2012 +0200 9.2 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 9.3 @@ -1,18 +0,0 @@ 9.4 -# SliTaz default applications configuration file. These apps can be 9.5 -# started through wrappers: browser, editor and terminal. 9.6 -# 9.7 - 9.8 -# File manager. 9.9 -FILE_MANAGER="pcmanfm" 9.10 - 9.11 -# Web browser. 9.12 -BROWSER="tazweb" 9.13 - 9.14 -# Text editor. 9.15 -EDITOR="leafpad" 9.16 - 9.17 -# X terminal. 9.18 -TERMINAL="xterm" 9.19 - 9.20 -# Window manager. 9.21 -WINDOW_MANAGER="openbox-session"
10.1 --- a/tazbox/README Sat Apr 28 20:33:25 2012 +0200 10.2 +++ b/tazbox/README Sat Apr 28 22:37:13 2012 +0200 10.3 @@ -1,6 +1,10 @@ 10.4 -SliTaz TazBox 2011 10.5 +TazBox 10.6 =============================================================================== 10.7 10.8 -TazBox is the new desktop tools boxes using Yad and replacing subox 10.9 -and desktopbox. It may also replace scpbox. 10.10 10.11 +TazBox is multi box utility providing small GUI such as a logout, su, locale 10.12 +or keymap configuration and more. See 'tazbox usage' for more information. The 10.13 +strings are gettextized and boxes are powerd by Yad/GTK. 10.14 + 10.15 + 10.16 +===============================================================================
11.1 --- a/tazbox/tazbox Sat Apr 28 20:33:25 2012 +0200 11.2 +++ b/tazbox/tazbox Sat Apr 28 22:37:13 2012 +0200 11.3 @@ -80,7 +80,7 @@ 11.4 } 11.5 11.6 # Output a command in a GTK window 11.7 -output_command() { 11.8 +output_command() { 11.9 yad --text-info --title="TazBox Output" --window-icon=$icon \ 11.10 --geometry="560x210+0-24" --fore="#ffffff" --back="#000000" 11.11 } 11.12 @@ -123,7 +123,7 @@ 11.13 --field "Locale:CB" \ 11.14 --field "Keymap:CB" \ 11.15 --field "Timezone:CB" \ 11.16 - $locale \ $keymap \ $timezone 11.17 + $locale \ $keymap \ $timezone 11.18 } 11.19 11.20 setup() { 11.21 @@ -267,11 +267,11 @@ 11.22 test $(id -u) = 0 && exec $2 $3 $4 $5 11.23 export SU_CMD="$2 $3 $4 $5" 11.24 # Check if a password has been saved before launching main dialog 11.25 - if [ -s $HOME/.config/slitaz/subox.conf ]; then 11.26 + if [ -s $HOME/.config/slitaz/subox.conf ]; then 11.27 PASSWD=$(cat $HOME/.config/slitaz/subox.conf) 11.28 CHECKED="TRUE" 11.29 fi 11.30 - # Display the main dialog (ask for password) 11.31 + # Display the main dialog (ask for password) 11.32 main=$(su_main) 11.33 # Deal with --button values and exit if cancelled to avoid erasing 11.34 # saved password. 11.35 @@ -280,13 +280,13 @@ 11.36 *) continue ;; 11.37 esac 11.38 # Save or erase Autosaved password 11.39 - if [ $(echo $main | cut -f2 -d"|") == "TRUE" ]; then 11.40 + if [ $(echo $main | cut -f2 -d"|") == "TRUE" ]; then 11.41 echo $main | cut -f 1 -d "|" > $HOME/.config/slitaz/subox.conf 11.42 - chmod 0600 $HOME/.config/slitaz/subox.conf 11.43 + chmod 0600 $HOME/.config/slitaz/subox.conf 11.44 else 11.45 cat /dev/null > $HOME/.config/slitaz/subox.conf 11.46 fi 11.47 - # Try to login & execute. If password is wrong execute error dialog 11.48 + # Try to login & execute. If password is wrong execute error dialog 11.49 echo $main | cut -f 1 -d "|" | su -c "$SU_CMD &" || su_error ;; 11.50 logout) 11.51 # Logout window with actions 11.52 @@ -299,7 +299,7 @@ 11.53 # DE and WM started with a cistom -session script should export 11.54 # XDG_CURRENT_DESKTOP 11.55 case "$main" in 11.56 - *exit) 11.57 + *exit) 11.58 case $XDG_CURRENT_DESKTOP in 11.59 LXDE) 11.60 [ "$_LXSESSION_PID" ] && kill $_LXSESSION_PID 11.61 @@ -332,13 +332,6 @@ 11.62 tz ;; 11.63 setup) 11.64 setup ;; 11.65 - boot) 11.66 - # This command is used at first boot to configure system. 11.67 - Xorg -br -quiet -nolock -nolisten tcp :1 & 11.68 - DISPLAY=:1 openbox & 11.69 - locale 11.70 - keymap 11.71 - killall Xorg 2>/dev/null ;; 11.72 new-file) 11.73 newfile ;; 11.74 all-apps)