core-admin-client/qubesadmin
Marek Marczykowski-Górecki fdc632c959
tools: reset private volume when importing template over existing one
Reinstalling template is a recommended way to get it back to a clean
state after potential compromise. In that case it is essential to
discard any persistent storage of old template, as it could be used by
the attacker to re-compromise it after reinstall.
Do this similar as root volume is overridden - via volume import
function.

Fixes QubesOS/qubes-issues#5192
2019-07-29 22:20:06 +02:00
..
backup Make pylint happy 2019-03-07 03:17:29 +01:00
events events: simplify handling qubesd reconnect 2019-02-24 05:32:51 +01:00
tests tools: reset private volume when importing template over existing one 2019-07-29 22:20:06 +02:00
tools tools: reset private volume when importing template over existing one 2019-07-29 22:20:06 +02:00
vm Make vm.run_with_args working on python2 2019-03-07 03:05:09 +01:00
__init__.py
app.py Allow app.domains[vm] where vm is a QubesVM object 2019-06-25 06:28:00 +02:00
base.py Make pylint happy 2019-03-07 03:17:29 +01:00
config.py
devices.py doc: fix rst syntax in documentation, including docstrings 2018-12-08 23:53:55 +01:00
exc.py Remove useless 'pass' to make pylint happy 2018-12-03 23:22:50 +01:00
features.py
firewall.py Make pylint happy 2019-03-07 03:17:29 +01:00
label.py
log.py Drop log.DBusHandler 2017-10-16 01:33:03 +02:00
spinner.py
storage.py doc: fix rst syntax in documentation, including docstrings 2018-12-08 23:53:55 +01:00
tags.py
utils.py Make pylint happy 2019-03-07 03:17:29 +01:00