Merge branch 'master' of git.qubes-os.org:/var/lib/qubes/git/marmarek/core
This commit is contained in:
		
						commit
						fa7e13c602
					
				
							
								
								
									
										1
									
								
								appvm/.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								appvm/.gitignore
									
									
									
									
										vendored
									
									
								
							@ -1,4 +1,3 @@
 | 
			
		||||
qubes_add_pendrive_script
 | 
			
		||||
qubes_penctl
 | 
			
		||||
qvm-open-in-dvm
 | 
			
		||||
xenstore-watch
 | 
			
		||||
 | 
			
		||||
@ -1,14 +1,12 @@
 | 
			
		||||
CC=gcc
 | 
			
		||||
CFLAGS=-Wall
 | 
			
		||||
all:	qubes_penctl qubes_add_pendrive_script qvm-open-in-dvm xenstore-watch
 | 
			
		||||
all:	qubes_penctl qubes_add_pendrive_script qvm-open-in-dvm
 | 
			
		||||
qubes_penctl: qubes_penctl.o
 | 
			
		||||
	$(CC) -o qubes_penctl qubes_penctl.o -lxenstore
 | 
			
		||||
qubes_add_pendrive_script: qubes_add_pendrive_script.o
 | 
			
		||||
	$(CC) -o qubes_add_pendrive_script qubes_add_pendrive_script.o -lxenstore
 | 
			
		||||
qvm-open-in-dvm: qvm-open-in-dvm.o
 | 
			
		||||
	 $(CC) -o qvm-open-in-dvm qvm-open-in-dvm.o -lxenstore
 | 
			
		||||
xenstore-watch: xenstore-watch.o
 | 
			
		||||
	$(CC) -o xenstore-watch xenstore-watch.o -lxenstore
 | 
			
		||||
 | 
			
		||||
clean:
 | 
			
		||||
	rm -f qubes_penctl qubes_add_pendrive_script qvm-open-in-dvm xenstore-watch *.o *~
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										1
									
								
								common/.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								common/.gitignore
									
									
									
									
										vendored
									
									
								
							@ -1 +1,2 @@
 | 
			
		||||
meminfo-writer
 | 
			
		||||
xenstore-watch
 | 
			
		||||
 | 
			
		||||
@ -1,7 +1,9 @@
 | 
			
		||||
CC=gcc
 | 
			
		||||
CFLAGS=-Wall -g -O3
 | 
			
		||||
all:	meminfo-writer
 | 
			
		||||
all:	meminfo-writer xenstore-watch
 | 
			
		||||
meminfo-writer: meminfo-writer.o
 | 
			
		||||
	$(CC) -g -o meminfo-writer meminfo-writer.o -lxenstore
 | 
			
		||||
xenstore-watch: xenstore-watch.o
 | 
			
		||||
	$(CC) -o xenstore-watch xenstore-watch.o -lxenstore
 | 
			
		||||
clean:
 | 
			
		||||
	rm -f meminfo-writer *.o *~
 | 
			
		||||
 | 
			
		||||
@ -1098,6 +1098,7 @@ class QubesNetVm(QubesCowVm):
 | 
			
		||||
            updateable=str(self.updateable),
 | 
			
		||||
            private_img=self.private_img,
 | 
			
		||||
            installed_by_rpm=str(self.installed_by_rpm),
 | 
			
		||||
            label=self.label.name,
 | 
			
		||||
            )
 | 
			
		||||
        return element
 | 
			
		||||
 | 
			
		||||
@ -1242,6 +1243,7 @@ class QubesProxyVm(QubesNetVm):
 | 
			
		||||
            netvm_qid=str(self.netvm_vm.qid) if self.netvm_vm is not None else "none",
 | 
			
		||||
            private_img=self.private_img,
 | 
			
		||||
            installed_by_rpm=str(self.installed_by_rpm),
 | 
			
		||||
            label=self.label.name,
 | 
			
		||||
            )
 | 
			
		||||
        return element
 | 
			
		||||
 | 
			
		||||
@ -1593,12 +1595,13 @@ class QubesVmCollection(dict):
 | 
			
		||||
 | 
			
		||||
    def add_new_netvm(self, name, template_vm,
 | 
			
		||||
                      dir_path = None, conf_file = None,
 | 
			
		||||
                      private_img = None):
 | 
			
		||||
                      private_img = None,
 | 
			
		||||
                      label = None):
 | 
			
		||||
 | 
			
		||||
        qid = self.get_new_unused_qid()
 | 
			
		||||
        netid = self.get_new_unused_netid()
 | 
			
		||||
        vm = QubesNetVm (qid=qid, name=name, template_vm=template_vm,
 | 
			
		||||
                         netid=netid,
 | 
			
		||||
                         netid=netid, label=label,
 | 
			
		||||
                         private_img=private_img,
 | 
			
		||||
                         dir_path=dir_path, conf_file=conf_file)
 | 
			
		||||
 | 
			
		||||
@ -1613,12 +1616,13 @@ class QubesVmCollection(dict):
 | 
			
		||||
 | 
			
		||||
    def add_new_proxyvm(self, name, template_vm,
 | 
			
		||||
                     dir_path = None, conf_file = None,
 | 
			
		||||
                     private_img = None):
 | 
			
		||||
                     private_img = None,
 | 
			
		||||
                     label = None):
 | 
			
		||||
 | 
			
		||||
        qid = self.get_new_unused_qid()
 | 
			
		||||
        netid = self.get_new_unused_netid()
 | 
			
		||||
        vm = QubesProxyVm (qid=qid, name=name, template_vm=template_vm,
 | 
			
		||||
                              netid=netid,
 | 
			
		||||
                              netid=netid, label=label,
 | 
			
		||||
                              private_img=private_img,
 | 
			
		||||
                              dir_path=dir_path, conf_file=conf_file,
 | 
			
		||||
                              netvm_vm = self.get_default_fw_netvm_vm())
 | 
			
		||||
@ -1836,7 +1840,7 @@ class QubesVmCollection(dict):
 | 
			
		||||
            try:
 | 
			
		||||
                kwargs = {}
 | 
			
		||||
                attr_list = ("qid", "netid", "name", "dir_path", "conf_file",
 | 
			
		||||
                              "private_img", "template_qid", "updateable",
 | 
			
		||||
                              "private_img", "template_qid", "updateable", "label",
 | 
			
		||||
                              )
 | 
			
		||||
 | 
			
		||||
                for attribute in attr_list:
 | 
			
		||||
@ -1855,6 +1859,13 @@ class QubesVmCollection(dict):
 | 
			
		||||
                kwargs["template_vm"] = template_vm
 | 
			
		||||
                kwargs["netid"] = int(kwargs["netid"])
 | 
			
		||||
 | 
			
		||||
                if kwargs["label"] is not None:
 | 
			
		||||
                    if kwargs["label"] not in QubesVmLabels:
 | 
			
		||||
                        print "ERROR: incorrect label for VM '{0}'".format(kwargs["name"])
 | 
			
		||||
                        kwargs.pop ("label")
 | 
			
		||||
                    else:
 | 
			
		||||
                        kwargs["label"] = QubesVmLabels[kwargs["label"]]
 | 
			
		||||
 | 
			
		||||
                vm = QubesNetVm(**kwargs)
 | 
			
		||||
                self[vm.qid] = vm
 | 
			
		||||
 | 
			
		||||
@ -1869,7 +1880,7 @@ class QubesVmCollection(dict):
 | 
			
		||||
            try:
 | 
			
		||||
                kwargs = {}
 | 
			
		||||
                attr_list = ("qid", "netid", "name", "dir_path", "conf_file", "updateable",
 | 
			
		||||
                              "private_img", "template_qid")
 | 
			
		||||
                              "private_img", "template_qid", "label")
 | 
			
		||||
 | 
			
		||||
                for attribute in attr_list:
 | 
			
		||||
                    kwargs[attribute] = element.get(attribute)
 | 
			
		||||
@ -1887,6 +1898,13 @@ class QubesVmCollection(dict):
 | 
			
		||||
                kwargs["template_vm"] = template_vm
 | 
			
		||||
                kwargs["netid"] = int(kwargs["netid"])
 | 
			
		||||
 | 
			
		||||
                if kwargs["label"] is not None:
 | 
			
		||||
                    if kwargs["label"] not in QubesVmLabels:
 | 
			
		||||
                        print "ERROR: incorrect label for VM '{0}'".format(kwargs["name"])
 | 
			
		||||
                        kwargs.pop ("label")
 | 
			
		||||
                    else:
 | 
			
		||||
                        kwargs["label"] = QubesVmLabels[kwargs["label"]]
 | 
			
		||||
 | 
			
		||||
                vm = QubesProxyVm(**kwargs)
 | 
			
		||||
                self[vm.qid] = vm
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -67,21 +67,19 @@ def main():
 | 
			
		||||
    if options.netvm and options.proxyvm:
 | 
			
		||||
        parser.error ("You must specify at most one of --proxy and --net")
 | 
			
		||||
        
 | 
			
		||||
    label = None
 | 
			
		||||
    if not options.proxyvm and not options.netvm:
 | 
			
		||||
        if options.label is None:
 | 
			
		||||
            print "You must choose a label for the new VM by passing the --label option."
 | 
			
		||||
            print "Possible values are:"
 | 
			
		||||
            for l in QubesVmLabels.values():
 | 
			
		||||
                print "* {0}".format(l.name)
 | 
			
		||||
            exit (1)
 | 
			
		||||
    if options.label is None:
 | 
			
		||||
        print "You must choose a label for the new VM by passing the --label option."
 | 
			
		||||
        print "Possible values are:"
 | 
			
		||||
        for l in QubesVmLabels.values():
 | 
			
		||||
            print "* {0}".format(l.name)
 | 
			
		||||
        exit (1)
 | 
			
		||||
 | 
			
		||||
        if options.label not in QubesVmLabels:
 | 
			
		||||
            print "Wrong label name, supported values are the following:"
 | 
			
		||||
            for l in QubesVmLabels.values():
 | 
			
		||||
                print "* {0}".format(l.name)
 | 
			
		||||
            exit (1)
 | 
			
		||||
        label = QubesVmLabels[options.label]
 | 
			
		||||
    if options.label not in QubesVmLabels:
 | 
			
		||||
        print "Wrong label name, supported values are the following:"
 | 
			
		||||
        for l in QubesVmLabels.values():
 | 
			
		||||
            print "* {0}".format(l.name)
 | 
			
		||||
        exit (1)
 | 
			
		||||
    label = QubesVmLabels[options.label]
 | 
			
		||||
 | 
			
		||||
    qvm_collection = QubesVmCollection()
 | 
			
		||||
    qvm_collection.lock_db_for_writing()
 | 
			
		||||
@ -113,7 +111,7 @@ def main():
 | 
			
		||||
 | 
			
		||||
    vm = None
 | 
			
		||||
    if options.netvm:
 | 
			
		||||
        vm = qvm_collection.add_new_netvm(vmname, template_vm)
 | 
			
		||||
        vm = qvm_collection.add_new_netvm(vmname, template_vm, label = label)
 | 
			
		||||
        
 | 
			
		||||
        net_devices = find_net_devices()
 | 
			
		||||
        print "Found the following net devices in your system:"
 | 
			
		||||
@ -126,12 +124,11 @@ def main():
 | 
			
		||||
        vm.pcidevs = dev_str
 | 
			
		||||
 | 
			
		||||
    elif options.proxyvm:
 | 
			
		||||
        vm = qvm_collection.add_new_proxyvm(vmname, template_vm)
 | 
			
		||||
        vm = qvm_collection.add_new_proxyvm(vmname, template_vm, label = label)
 | 
			
		||||
    else:
 | 
			
		||||
        vm = qvm_collection.add_new_appvm(vmname, template_vm, label = label)
 | 
			
		||||
    try:
 | 
			
		||||
        vm.create_on_disk(verbose=options.verbose)
 | 
			
		||||
        vm.add_to_xen_storage()
 | 
			
		||||
 | 
			
		||||
    except (IOError, OSError) as err:
 | 
			
		||||
        print "ERROR: {0}".format(err)
 | 
			
		||||
 | 
			
		||||
@ -39,6 +39,9 @@ Requires:   fedora-release = 13
 | 
			
		||||
%description
 | 
			
		||||
The Qubes core files for installation inside a Qubes VM.
 | 
			
		||||
 | 
			
		||||
%build
 | 
			
		||||
make
 | 
			
		||||
 | 
			
		||||
%pre
 | 
			
		||||
 | 
			
		||||
if [ "$1" !=  1 ] ; then
 | 
			
		||||
@ -62,10 +65,12 @@ mkdir -p $RPM_BUILD_ROOT/etc/sysconfig
 | 
			
		||||
cp iptables $RPM_BUILD_ROOT/etc/sysconfig/
 | 
			
		||||
mkdir -p $RPM_BUILD_ROOT/etc/yum.repos.d
 | 
			
		||||
cp ../appvm/qubes.repo $RPM_BUILD_ROOT/etc/yum.repos.d
 | 
			
		||||
mkdir -p $RPM_BUILD_ROOT/sbin   
 | 
			
		||||
cp ../common/qubes_serial_login $RPM_BUILD_ROOT/sbin
 | 
			
		||||
mkdir -p $RPM_BUILD_ROOT/sbin
 | 
			
		||||
cp qubes_serial_login $RPM_BUILD_ROOT/sbin
 | 
			
		||||
mkdir -p $RPM_BUILD_ROOT/usr/bin
 | 
			
		||||
cp xenstore-watch $RPM_BUILD_ROOT/usr/bin
 | 
			
		||||
mkdir -p $RPM_BUILD_ROOT/etc
 | 
			
		||||
cp ../common/serial.conf $RPM_BUILD_ROOT/var/lib/qubes/
 | 
			
		||||
cp serial.conf $RPM_BUILD_ROOT/var/lib/qubes/
 | 
			
		||||
 | 
			
		||||
%triggerin -- initscripts
 | 
			
		||||
cp /var/lib/qubes/serial.conf /etc/init/serial.conf
 | 
			
		||||
@ -164,3 +169,4 @@ rm -rf $RPM_BUILD_ROOT
 | 
			
		||||
/var/lib/qubes
 | 
			
		||||
/etc/yum.repos.d/qubes.repo
 | 
			
		||||
/sbin/qubes_serial_login
 | 
			
		||||
/usr/bin/xenstore-watch
 | 
			
		||||
 | 
			
		||||
		Loading…
	
		Reference in New Issue
	
	Block a user