]> git.proxmox.com Git - lxcfs.git/commitdiff
enable lxcfs-dbg package
authorWolfgang Bumiller <w.bumiller@proxmox.com>
Mon, 11 Jan 2016 14:13:55 +0000 (15:13 +0100)
committerDietmar Maurer <dietmar@proxmox.com>
Tue, 12 Jan 2016 11:17:27 +0000 (12:17 +0100)
Makefile
debian/control
debian/dirs [deleted file]
debian/lxcfs.dirs [new file with mode: 0644]
debian/rules

index 6f1d7b64ffb4f73ab76f93ea8eb64d4cd6d62e54..ed8587de24daf87ea511e2d21b841a1f47d7b348 100644 (file)
--- a/Makefile
+++ b/Makefile
@@ -10,7 +10,8 @@ SRCTAR=${SRCDIR}.tgz
 ARCH:=$(shell dpkg-architecture -qDEB_BUILD_ARCH)
 GITVERSION:=$(shell cat .git/refs/heads/master)
 
 ARCH:=$(shell dpkg-architecture -qDEB_BUILD_ARCH)
 GITVERSION:=$(shell cat .git/refs/heads/master)
 
-DEB=${PACKAGE}_${PKGVER}-${DEBREL}_amd64.deb
+DEB=${PACKAGE}_${PKGVER}-${DEBREL}_amd64.deb \
+    ${PACKAGE}-dbg_${PKGVER}-${DEBREL}_amd64.deb
 
 all: ${DEB}
 
 
 all: ${DEB}
 
@@ -36,6 +37,7 @@ upload: ${DEB}
        umount /pve/${RELEASE}; mount /pve/${RELEASE} -o rw 
        mkdir -p /pve/${RELEASE}/extra
        rm -f /pve/${RELEASE}/extra/${PACKAGE}_*.deb
        umount /pve/${RELEASE}; mount /pve/${RELEASE} -o rw 
        mkdir -p /pve/${RELEASE}/extra
        rm -f /pve/${RELEASE}/extra/${PACKAGE}_*.deb
+       rm -f /pve/${RELEASE}/extra/${PACKAGE}-dbg_*.deb
        rm -f /pve/${RELEASE}/extra/Packages*
        cp ${DEB} /pve/${RELEASE}/extra
        cd /pve/${RELEASE}/extra; dpkg-scanpackages . /dev/null > Packages; gzip -9c Packages > Packages.gz
        rm -f /pve/${RELEASE}/extra/Packages*
        cp ${DEB} /pve/${RELEASE}/extra
        cd /pve/${RELEASE}/extra; dpkg-scanpackages . /dev/null > Packages; gzip -9c Packages > Packages.gz
index 3e7d27a1a014f54762c3d071800773fe633fa240..1bccd4536ac9d7da562fe0c352dca8fd230afe63 100644 (file)
@@ -15,3 +15,11 @@ Description: LXC userspace filesystem
  limitations of the Linux kernel. The main driver for this work was the
  need to run systemd based containers as a regular unprivileged user
  while still allowing systemd inside the container to interact with cgroups. 
  limitations of the Linux kernel. The main driver for this work was the
  need to run systemd based containers as a regular unprivileged user
  while still allowing systemd inside the container to interact with cgroups. 
+
+Package: lxcfs-dbg
+Architecture: any
+Section: debug
+Depends: lxcfs (= ${binary:Version}), ${misc:Depends}
+Description: lxcfs debugging symbols
+ This package contains the debugging symbols for lxcfs.
+
diff --git a/debian/dirs b/debian/dirs
deleted file mode 100644 (file)
index 298dbbc..0000000
+++ /dev/null
@@ -1 +0,0 @@
-/var/lib/lxcfs
diff --git a/debian/lxcfs.dirs b/debian/lxcfs.dirs
new file mode 100644 (file)
index 0000000..298dbbc
--- /dev/null
@@ -0,0 +1 @@
+/var/lib/lxcfs
index 775ebf20875356ba043a00166d9e8161604b43d8..de2fd6e29b624dc9fe3b611a78d3d391ac5b1626 100755 (executable)
@@ -5,3 +5,9 @@
 
 %:
        dh $@  --with autotools_dev,autoreconf,systemd,quilt
 
 %:
        dh $@  --with autotools_dev,autoreconf,systemd,quilt
+
+override_dh_strip:
+       dh_strip --dbg-package=lxcfs-dbg
+
+override_dh_auto_install:
+       dh_auto_install --destdir=debian/lxcfs