diff --git a/dom0/aux-tools/block_cleaner_daemon.py b/dom0/aux-tools/block-cleaner-daemon.py similarity index 100% rename from dom0/aux-tools/block_cleaner_daemon.py rename to dom0/aux-tools/block-cleaner-daemon.py diff --git a/dom0/aux-tools/cleanup_dispvms b/dom0/aux-tools/cleanup-dispvms similarity index 100% rename from dom0/aux-tools/cleanup_dispvms rename to dom0/aux-tools/cleanup-dispvms diff --git a/dom0/aux-tools/convert_apptemplate2vm.sh b/dom0/aux-tools/convert-apptemplate2vm.sh similarity index 100% rename from dom0/aux-tools/convert_apptemplate2vm.sh rename to dom0/aux-tools/convert-apptemplate2vm.sh diff --git a/dom0/aux-tools/convert_dirtemplate2vm.sh b/dom0/aux-tools/convert-dirtemplate2vm.sh similarity index 100% rename from dom0/aux-tools/convert_dirtemplate2vm.sh rename to dom0/aux-tools/convert-dirtemplate2vm.sh diff --git a/dom0/aux-tools/create_apps_for_appvm.sh b/dom0/aux-tools/create-apps-for-appvm.sh similarity index 88% rename from dom0/aux-tools/create_apps_for_appvm.sh rename to dom0/aux-tools/create-apps-for-appvm.sh index 0624162f..f12f14f9 100755 --- a/dom0/aux-tools/create_apps_for_appvm.sh +++ b/dom0/aux-tools/create-apps-for-appvm.sh @@ -38,11 +38,11 @@ mkdir -p $APPSDIR if [ "$SRCDIR" != "none" ]; then echo "--> Converting Appmenu Templates..." if [ -r "$VMDIR/whitelisted-appmenus.list" ]; then - cat $VMDIR/whitelisted-appmenus.list | xargs -I{} /usr/lib/qubes/convert_apptemplate2vm.sh $SRCDIR/{} $APPSDIR $VMNAME $VMDIR + cat $VMDIR/whitelisted-appmenus.list | xargs -I{} /usr/lib/qubes/convert-apptemplate2vm.sh $SRCDIR/{} $APPSDIR $VMNAME $VMDIR else - find $SRCDIR -name "*.desktop" $CHECK_WHITELISTED -exec /usr/lib/qubes/convert_apptemplate2vm.sh {} $APPSDIR $VMNAME $VMDIR \; + find $SRCDIR -name "*.desktop" $CHECK_WHITELISTED -exec /usr/lib/qubes/convert-apptemplate2vm.sh {} $APPSDIR $VMNAME $VMDIR \; fi - /usr/lib/qubes/convert_apptemplate2vm.sh /usr/share/qubes/qubes-appmenu-select.desktop $APPSDIR $VMNAME $VMDIR + /usr/lib/qubes/convert-apptemplate2vm.sh /usr/share/qubes/qubes-appmenu-select.desktop $APPSDIR $VMNAME $VMDIR if [ "$VMTYPE" = "vm-templates" ]; then DIR_TEMPLATE=/usr/share/qubes/qubes-templatevm.directory.template @@ -51,7 +51,7 @@ if [ "$SRCDIR" != "none" ]; then else DIR_TEMPLATE=/usr/share/qubes/qubes-vm.directory.template fi - /usr/lib/qubes/convert_dirtemplate2vm.sh $DIR_TEMPLATE $APPSDIR/$VMNAME-vm.directory $VMNAME $VMDIR + /usr/lib/qubes/convert-dirtemplate2vm.sh $DIR_TEMPLATE $APPSDIR/$VMNAME-vm.directory $VMNAME $VMDIR fi echo "--> Adding Apps to the Menu..." diff --git a/dom0/aux-tools/fix_dir_perms.sh b/dom0/aux-tools/fix-dir-perms.sh similarity index 100% rename from dom0/aux-tools/fix_dir_perms.sh rename to dom0/aux-tools/fix-dir-perms.sh diff --git a/dom0/aux-tools/prepare_volatile_img.sh b/dom0/aux-tools/prepare-volatile-img.sh similarity index 100% rename from dom0/aux-tools/prepare_volatile_img.sh rename to dom0/aux-tools/prepare-volatile-img.sh diff --git a/dom0/aux-tools/remove_appvm_appmenus.sh b/dom0/aux-tools/remove-appvm-appmenus.sh similarity index 100% rename from dom0/aux-tools/remove_appvm_appmenus.sh rename to dom0/aux-tools/remove-appvm-appmenus.sh diff --git a/dom0/aux-tools/startup-misc.sh b/dom0/aux-tools/startup-misc.sh index 0b98ae61..57d06c82 100755 --- a/dom0/aux-tools/startup-misc.sh +++ b/dom0/aux-tools/startup-misc.sh @@ -2,7 +2,7 @@ # Misc dom0 startup setup -/usr/lib/qubes/fix_dir_perms.sh +/usr/lib/qubes/fix-dir-perms.sh xenstore-write /local/domain/0/name dom0 DOM0_MAXMEM=`/usr/sbin/xl info | grep total_memory | awk '{ print $3 }'` xenstore-write /local/domain/0/memory/static-max $[ $DOM0_MAXMEM * 1024 ] @@ -10,12 +10,12 @@ xenstore-write /local/domain/0/memory/static-max $[ $DOM0_MAXMEM * 1024 ] xl sched-credit -d 0 -w 512 cp /var/lib/qubes/qubes.xml /var/lib/qubes/backup/qubes-$(date +%F-%T).xml -/usr/lib/qubes/cleanup_dispvms +/usr/lib/qubes/cleanup-dispvms # Hide mounted devices from qubes-block list (at first udev run, only / is mounted) for dev in `xenstore-list /local/domain/0/qubes-block-devices 2> /dev/null`; do ( eval `udevadm info -q property -n $dev|sed -e 's/\([^=]*\)=\(.*\)/export \1="\2"/'`; - /usr/lib/qubes/block_add_change > /dev/null + /usr/lib/qubes/udev-block-add-change > /dev/null ) done diff --git a/dom0/aux-tools/block_add_change b/dom0/aux-tools/udev-block-add-change similarity index 100% rename from dom0/aux-tools/block_add_change rename to dom0/aux-tools/udev-block-add-change diff --git a/dom0/aux-tools/block_cleanup b/dom0/aux-tools/udev-block-cleanup similarity index 100% rename from dom0/aux-tools/block_cleanup rename to dom0/aux-tools/udev-block-cleanup diff --git a/dom0/aux-tools/block_remove b/dom0/aux-tools/udev-block-remove similarity index 100% rename from dom0/aux-tools/block_remove rename to dom0/aux-tools/udev-block-remove diff --git a/dom0/aux-tools/usb_add_change b/dom0/aux-tools/udev-usb-add-change similarity index 94% rename from dom0/aux-tools/usb_add_change rename to dom0/aux-tools/udev-usb-add-change index 20691f00..fe966e02 100755 --- a/dom0/aux-tools/usb_add_change +++ b/dom0/aux-tools/udev-usb-add-change @@ -8,7 +8,7 @@ ## running in dom0. ## -# FIXME: Ignore USB hubs and other wierd devices (see also in usb_remove). +# FIXME: Ignore USB hubs and other wierd devices (see also in udev-usb-remove). [ "`echo $TYPE | cut -f1 -d/`" = "9" ] && exit 0 [ "$DEVTYPE" != "usb_device" ] && exit 0 diff --git a/dom0/aux-tools/usb_remove b/dom0/aux-tools/udev-usb-remove similarity index 100% rename from dom0/aux-tools/usb_remove rename to dom0/aux-tools/udev-usb-remove diff --git a/dom0/aux-tools/unbind_pci_device.sh b/dom0/aux-tools/unbind-pci-device.sh similarity index 100% rename from dom0/aux-tools/unbind_pci_device.sh rename to dom0/aux-tools/unbind-pci-device.sh diff --git a/dom0/core/qubes.py b/dom0/core/qubes.py index e1e57032..5c597a3b 100755 --- a/dom0/core/qubes.py +++ b/dom0/core/qubes.py @@ -102,10 +102,10 @@ dom0_min_memory = 700*1024*1024 # must be able to ask Dom0 VM about how much memory it currently has... dom0_vm = None -qubes_appmenu_create_cmd = "/usr/lib/qubes/create_apps_for_appvm.sh" -qubes_appmenu_remove_cmd = "/usr/lib/qubes/remove_appvm_appmenus.sh" -qubes_pciback_cmd = '/usr/lib/qubes/unbind_pci_device.sh' -prepare_volatile_img_cmd = '/usr/lib/qubes/prepare_volatile_img.sh' +qubes_appmenu_create_cmd = "/usr/lib/qubes/create-apps-for-appvm.sh" +qubes_appmenu_remove_cmd = "/usr/lib/qubes/remove-appvm-appmenus.sh" +qubes_pciback_cmd = '/usr/lib/qubes/unbind-pci-device.sh' +prepare_volatile_img_cmd = '/usr/lib/qubes/prepare-volatile-img.sh' yum_proxy_ip = '10.137.255.254' yum_proxy_port = '8082' @@ -717,7 +717,7 @@ class QubesVm(object): xid = self.get_xid() if xid < 0: return False - if not os.path.exists('/var/run/qubes/guid_running.%d' % xid): + if not os.path.exists('/var/run/qubes/guid-running.%d' % xid): return False return True @@ -2600,7 +2600,7 @@ class QubesHVm(QubesVm): xid = self.stubdom_xid if xid < 0: return False - if not os.path.exists('/var/run/qubes/guid_running.%d' % xid): + if not os.path.exists('/var/run/qubes/guid-running.%d' % xid): return False return True diff --git a/dom0/dispvm/Makefile b/dom0/dispvm/Makefile index 3be1fccf..0e470c55 100644 --- a/dom0/dispvm/Makefile +++ b/dom0/dispvm/Makefile @@ -1,12 +1,12 @@ CC=gcc CFLAGS=-Wall -all: qubes_restore xenstore-watch -qubes_restore: qubes_restore.o - $(CC) -o qubes_restore qubes_restore.o -lxenstore +all: qubes-restore xenstore-watch +qubes-restore: qubes-restore.o + $(CC) -o qubes-restore qubes-restore.o -lxenstore xenstore-watch: xenstore-watch.o $(CC) -o xenstore-watch xenstore-watch.o -lxenstore clean: - rm -f *.o *~ qubes_restore xenstore-watch xenfreepages + rm -f *.o *~ qubes-restore xenstore-watch xenfreepages diff --git a/dom0/dispvm/qfile-daemon-dvm b/dom0/dispvm/qfile-daemon-dvm index 0a5d5d9f..dadf64cd 100755 --- a/dom0/dispvm/qfile-daemon-dvm +++ b/dom0/dispvm/qfile-daemon-dvm @@ -70,7 +70,7 @@ class QfileDaemonDvm: assert sys.argv[4] in QubesDispVmLabels.keys(), "Invalid label" label = QubesDispVmLabels[sys.argv[4]] print >>sys.stderr, "time=%s, starting qubes_restore" % (str(time.time())) - retcode = subprocess.call(['/usr/lib/qubes/qubes_restore', + retcode = subprocess.call(['/usr/lib/qubes/qubes-restore', current_savefile, current_dvm_conf, '-u', str(vm.default_user), @@ -80,9 +80,9 @@ class QfileDaemonDvm: qmemman_client.close() if retcode != 0: if os.path.exists('/usr/bin/kdialog'): - subprocess.call(['/usr/bin/kdialog', '--sorry', 'DisposableVM creation failed, see qubes_restore.log']) + subprocess.call(['/usr/bin/kdialog', '--sorry', 'DisposableVM creation failed, see qubes-restore.log']) else: - subprocess.call(['/usr/bin/zenity', '--warning', 'DisposableVM creation failed, see qubes_restore.log']) + subprocess.call(['/usr/bin/zenity', '--warning', 'DisposableVM creation failed, see qubes-restore.log']) qvm_collection.unlock_db() return None f = open('/var/run/qubes/dispVM_xid', 'r'); @@ -136,7 +136,7 @@ class QfileDaemonDvm: def get_dvm(self): if not self.dvm_setup_ok(): - if os.system("/usr/lib/qubes/qubes_update_dispvm_savefile_with_progress.sh >/dev/null /dev/null /etc/NetworkManager/NetworkManager.conf echo 'plugins = keyfile' >> /etc/NetworkManager/NetworkManager.conf echo '[keyfile]' >> /etc/NetworkManager/NetworkManager.conf fi -/usr/lib/qubes/qubes_fix_nm_conf.sh +/usr/lib/qubes/qubes-fix-nm-conf.sh sed 's/^net.ipv4.ip_forward.*/net.ipv4.ip_forward = 1/' -i /etc/sysctl.conf @@ -312,7 +312,7 @@ fi %triggerin -- xen-runtime sed -i 's/\/block /\/block.qubes /' /etc/udev/rules.d/xen-backend.rules -/usr/lib/qubes/fix_dir_perms.sh +/usr/lib/qubes/fix-dir-perms.sh %triggerin -- xorg-x11-drv-vmmouse mv -f /lib/udev/rules.d/69-xorg-vmmouse.rules /var/lib/qubes/removed-udev-scripts/ 2> /dev/null || : @@ -362,31 +362,31 @@ fi %{python_sitearch}/qubes/__init__.pyc %{python_sitearch}/qubes/__init__.pyo %{python_sitearch}/qubes/qmemman*.py* -/usr/lib/qubes/unbind_pci_device.sh -/usr/lib/qubes/cleanup_dispvms -/usr/lib/qubes/convert_apptemplate2vm.sh -/usr/lib/qubes/convert_dirtemplate2vm.sh -/usr/lib/qubes/create_apps_for_appvm.sh -/usr/lib/qubes/remove_appvm_appmenus.sh +/usr/lib/qubes/unbind-pci-device.sh +/usr/lib/qubes/cleanup-dispvms +/usr/lib/qubes/convert-apptemplate2vm.sh +/usr/lib/qubes/convert-dirtemplate2vm.sh +/usr/lib/qubes/create-apps-for-appvm.sh +/usr/lib/qubes/remove-appvm-appmenus.sh /usr/lib/qubes/qmemman_daemon.py* /usr/lib/qubes/meminfo-writer /usr/lib/qubes/qfile-daemon-dvm* /usr/lib/qubes/qubes-notify-updates /usr/lib/qubes/qubes-receive-appmenus /usr/lib/qubes/qubes-receive-updates -/usr/lib/qubes/block_add_change -/usr/lib/qubes/block_remove -/usr/lib/qubes/block_cleanup -/usr/lib/qubes/block_cleaner_daemon.py* -/usr/lib/qubes/usb_add_change -/usr/lib/qubes/usb_remove +/usr/lib/qubes/udev-block-add-change +/usr/lib/qubes/udev-block-remove +/usr/lib/qubes/udev-block-cleanup +/usr/lib/qubes/block-cleaner-daemon.py* +/usr/lib/qubes/udev-usb-add-change +/usr/lib/qubes/udev-usb-remove /usr/lib/qubes/vusb-ctl.py* /usr/lib/qubes/xl-qvm-usb-attach.py* /usr/lib/qubes/xl-qvm-usb-detach.py* -/usr/lib/qubes/fix_dir_perms.sh +/usr/lib/qubes/fix-dir-perms.sh /usr/lib/qubes/startup-dvm.sh /usr/lib/qubes/startup-misc.sh -/usr/lib/qubes/prepare_volatile_img.sh +/usr/lib/qubes/prepare-volatile-img.sh %attr(4750,root,qubes) /usr/lib/qubes/qfile-dom0-unpacker %{_unitdir}/qubes-block-cleaner.service %{_unitdir}/qubes-core.service @@ -420,9 +420,9 @@ fi /usr/lib64/pm-utils/sleep.d/51qubes-suspend-netvm /usr/lib64/pm-utils/sleep.d/52qubes-pause-vms /usr/bin/xenstore-watch-qubes -/usr/lib/qubes/qubes_restore -/usr/lib/qubes/qubes_prepare_saved_domain.sh -/usr/lib/qubes/qubes_update_dispvm_savefile_with_progress.sh +/usr/lib/qubes/qubes-restore +/usr/lib/qubes/qubes-prepare-saved-domain.sh +/usr/lib/qubes/qubes-update-dispvm-savefile-with-progress.sh /etc/xen/scripts/block.qubes /etc/xen/scripts/block-snapshot /etc/xen/scripts/block-origin @@ -443,8 +443,8 @@ fi /etc/polkit-1/rules.d/00-qubes-allow-all.rules /etc/xdg/autostart/qubes-guid.desktop /etc/security/limits.d/99-qubes.conf -/etc/udev/rules.d/99-qubes_block.rules -/etc/udev/rules.d/99-qubes_usb.rules +/etc/udev/rules.d/99-qubes-block.rules +/etc/udev/rules.d/99-qubes-usb.rules %attr(0644,root,root) /etc/cron.daily/qubes-dom0-updates.cron %attr(0644,root,root) /etc/cron.d/qubes-sync-clock.cron /etc/dracut.conf.d/*