Wojtek Porczyk
c3dd13c0ab
qubes/log: logging routines
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
1fbb91a1aa
doc/apidoc: enable intersphinx to docs.python.org
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
65595e3b39
apidoc stub
2015-06-29 17:39:22 +02:00
Marek Marczykowski-Górecki
9cbf9a8a59
Add support for 'pci_strictreset' option
...
This allows to assign PCI device to the VM, even if it doesn't support
proper reset. The default behaviour (when the value is True) is to not
allow such attachment (VM will not start if such device is assigned).
Require libvirt patch for this option.
2015-05-28 00:11:17 +02:00
Marek Marczykowski-Górecki
8aaef404de
qvm-prefs: add an option to get a single VM property
...
Could be useful for scripts
2015-05-15 03:22:06 +02:00
Marek Marczykowski-Górecki
d8533bd061
core: do not reset firewal when setting netvm=none
...
It is no longer needed as qubesos/qubes-issues#862 is implemented.
2015-04-04 21:48:03 +02:00
Marek Marczykowski-Górecki
7516737fae
core: Add "dispvm_netvm" property - NetVM for DispVMs started from a VM
...
This allows to specify tight network isolation for a VM, and finally
close one remaining way for leaking traffic around TorVM. Now when VM is
connected to for example TorVM, its DispVMs will be also connected
there.
The new property can be set to:
- default (uses_default_dispvm_netvm=True) - use the same NetVM/ProxyVM as the
calling VM itself - including none it that's the case
- None - DispVMs will be network-isolated
- some NetVM/ProxyVM - will be used, even if calling VM is network-isolated
Closes qubesos/qubes-issues#862
2015-04-04 21:47:31 +02:00
Wojtek Porczyk
20b3fdedb8
rename netvm -> sys-net, firewallvm -> sys-firewall
2015-03-31 20:42:53 +02:00
qjoo
d69b03e5e0
qubes-firewall is not supported in netvms
2015-03-30 22:31:20 +02:00
qjoo
9659c33a09
qvm-service: +disable-dns-server/disable-default-route
...
The logic for set-default-route/set-dns-server has been inverted.
2015-03-30 22:31:20 +02:00
Marek Marczykowski-Górecki
db95153619
doc: typo fix
2015-01-30 01:40:41 +01:00
Marek Marczykowski-Górecki
2f7b3adeec
doc: qvm-create-default-dvm ( #940 )
2015-01-30 01:39:59 +01:00
Marek Marczykowski-Górecki
c2675c00e7
doc: sync qvm-service documentation
2015-01-30 01:39:59 +01:00
Marek Marczykowski-Górecki
59a5ae9415
doc: add qvm-services: set-default-route, set-dns-server
2015-01-30 01:39:59 +01:00
Marek Marczykowski-Górecki
d23f79d693
doc: update qvm-create man page
2014-08-12 00:17:45 +02:00
Marek Marczykowski-Górecki
76a82a7d47
doc: update qvm-ls man page
2014-08-02 23:22:34 +02:00
Marek Marczykowski-Górecki
067876afb6
doc: typo fix
2014-05-10 20:37:41 +02:00
Marek Marczykowski-Górecki
bb9d8bbf78
Remove qubes-dom0-network-via-netvm tool ( #820 )
...
If someone really needs it for debuging he/she should be able to either
do it manually (xl network-attach...) or at worst case retrieve this
tool from git history.
2014-04-16 16:44:41 +02:00
Marek Marczykowski-Górecki
cce5210239
doc: update description of network-manager service setting ( #774 )
...
As #774 is resolved, it is no longer true that NetworkManger in
non-NetVM will cause network problems.
2014-04-11 01:31:20 +02:00
Marek Marczykowski-Górecki
a3d02db170
doc: update qvm-prefs doc
2013-11-21 17:22:01 +01:00
Marek Marczykowski
fa8d659189
Move dom0-update code to separate repository
...
This is highly Linux-specific code. Perhaps other systems will have
equivalent, but for now move it to Linux-only repository.
2013-03-16 19:14:26 +01:00
Marek Marczykowski
0c4ea10bda
Move standalone qvm-sync-appmenus to core-dom0-linux
...
It makes no sense to leave standalone tool here while real code is moved
to core-dom0-linux. Also move its manpage.
2013-03-16 18:35:24 +01:00
Marek Marczykowski
d9358a91aa
Move manpages here from separate repo
2013-03-12 17:02:26 +01:00
Marek Marczykowski
db7f375635
Introduce 'doc' dir
2013-03-12 16:13:32 +01:00