Marek Marczykowski-Górecki
17c5d22083
qvm-tools: fix qvm-create --hvm* --root args parsing
2013-11-25 17:15:15 +01:00
Marek Marczykowski-Górecki
919b9455f8
qvm-tools: fix args parsing for qvm-create --hvm-template
2013-11-25 14:27:43 +01:00
Marek Marczykowski-Górecki
dc55720738
core: QubesTemplateHVm.is_appvm = False
2013-11-25 07:22:21 +01:00
Marek Marczykowski-Górecki
09393734a3
core: refuse to set template for standalone VM
2013-11-25 07:18:01 +01:00
Marek Marczykowski-Górecki
5033b53543
core: split HVM template into separate class
2013-11-25 07:18:01 +01:00
Joanna Rutkowska
2891a15302
version 2.1.28
2013-11-22 14:42:45 +01:00
Marek Marczykowski-Górecki
a3d02db170
doc: update qvm-prefs doc
2013-11-21 17:22:01 +01:00
Marek Marczykowski-Górecki
167b412e54
qvm-tools: unify the qvm-prefs labels ( #756 )
2013-11-21 14:54:50 +01:00
Marek Marczykowski-Górecki
fe834bcb9c
qvm-tools: fix set_* return code
...
Use return True/False to report success/failure instead of exit(1). This
fixes regression introduced by "92b479b qvm-tools: exit with code 1 on
error", which results in some setting not saved.
2013-11-21 14:51:14 +01:00
Marek Marczykowski-Górecki
1b83e5c687
hvm: default to template's MAC in MAC auto mode ( #755 )
2013-11-21 14:49:42 +01:00
Marek Marczykowski-Górecki
aeb83d1a45
hvm: do not reset root.img to template state when debug mode enabled
2013-11-21 04:36:53 +01:00
Marek Marczykowski-Górecki
a457b62728
core: more flexible mechanism for template compatibility check
...
Using class method allow the users (Qubes Manager at least) to check
for compatibility without having any particular VM instance - useful
while creating the VM.
2013-11-21 03:42:31 +01:00
Marek Marczykowski-Górecki
efeb284ab1
core: do not call resize2fs on private.img in dom0
...
Do not parse VM data (filesystem metadata in this case) in dom0, as this
expose dom0 for potential attack.
2013-11-21 03:38:12 +01:00
Joanna Rutkowska
b91aa4133d
version 2.1.27
2013-11-20 15:55:36 +01:00
Marek Marczykowski-Górecki
f85c2ffa5a
Merge remote-tracking branch 'joanna/master'
2013-11-20 02:58:00 +01:00
Marek Marczykowski-Górecki
6fddae3b9b
Support for autostart VMs ( #724 )
2013-11-20 02:57:17 +01:00
Marek Marczykowski-Górecki
2005207462
Template support for HVM ( #719 )
...
Any HVM (which isn't already template-based) can be a template for
another HVM. For now do not allow simultaneous run of template and its
VM (this assumption simplify the implementation, as no root-cow.img is
needed).
2013-11-19 18:42:59 +01:00
Marek Marczykowski-Górecki
92b479bf49
qvm-tools: exit with code 1 on error
...
Not only print error message.
2013-11-19 18:40:16 +01:00
Marek Marczykowski-Górecki
25fd41aa2f
qvm-tools: do not assume that every template VM must have root-cow.img
...
Especially HVM templates do not have (at least for now).
2013-11-19 18:39:22 +01:00
Marek Marczykowski-Górecki
1756ab33e9
qvm-tools: make qvm-ls code more defensive
...
Do not assume only predefined VMs types, do not assume only one type of
template etc.
2013-11-19 18:36:12 +01:00
Marek Marczykowski-Górecki
4090fdf758
QubesHVm: restore private.img support
2013-11-19 18:35:10 +01:00
Marek Marczykowski-Górecki
1315bdec87
QubesHVm: fix copy&paste error
2013-11-19 18:33:35 +01:00
Marek Marczykowski-Górecki
f0e24c358e
qvm-tools: clarify help message/options error checking ( #741 )
2013-11-18 01:15:17 +01:00
Joanna Rutkowska
07f011ebec
version 2.1.26
2013-11-16 15:26:53 +01:00
Marek Marczykowski-Górecki
dfa9e7c0df
Add device-mapper devices to name->(major,minor) mapping
...
qvm-block will still not list device-mapper devices, but it would be
much easier to modify it.
2013-11-16 01:29:50 +01:00
Marek Marczykowski-Górecki
b3c127091d
hvm: check for HVM capability on host when failed to start the VM
2013-11-09 23:48:49 +01:00
Joanna Rutkowska
f9b37a2a38
version 2.1.25
2013-11-02 12:55:09 -04:00
Joanna Rutkowska
b33020e385
Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin
2013-11-02 11:42:41 -04:00
Joanna Rutkowska
124a8f6892
Merge branch 'master' of git://git.qubes-os.org/marmarek/core-admin
2013-11-02 11:35:41 -04:00
Marek Marczykowski-Górecki
8200b15c61
NotifyTools: handle default user setting
...
If the VM provides 'default-user' setting - save it to the VM settings.
2013-11-01 02:32:32 +01:00
Marek Marczykowski-Górecki
5291227de3
qvm-tools: qvm-start --install-windows-tools ( #41 pro)
2013-11-01 02:31:13 +01:00
Marek Marczykowski-Górecki
c52059a23e
core: unify handling dom0 case in --cdrom option
2013-11-01 02:25:22 +01:00
Marek Marczykowski-Górecki
55b4c6b6d1
missing import once again
2013-11-01 02:25:04 +01:00
Marek Marczykowski-Górecki
e2c43d2292
Allow HVM to notify dom0 about tools installation
...
HVM can set some xenstore entries (in qubes-tools/ subtree) to pass
informations about installed tools to dom0. qubes.NotifyTools service
triggers update of VM properties (like qrexec_installed).
This way, after installation of Qubes Windows Tools, the user doesn't need
to change any VM settings to use the tools.
2013-10-28 05:09:54 +01:00
Marek Marczykowski-Górecki
495a24a2e7
core/HVM: always start qrexec daemon
...
If not marked as installed, start it in background - waiting for
possible Qubes Tools installation. If that happens, make it possible to
tell the dom0 about that fact.
2013-10-28 05:08:28 +01:00
Marek Marczykowski-Górecki
3df9719972
core: add missing import
2013-10-27 16:09:16 +01:00
Marek Marczykowski-Górecki
68d8eb308c
Merge branch 'master' of git://git.qubes-os.org/joanna/core-admin
2013-10-27 12:30:47 +01:00
Marek Marczykowski-Górecki
dfe0b18382
core: call ACPI S3 emulation only for VMs with PCI devices
...
Actually it looks to be needed only there.
But also another problem: this suspend doesn't work for firewallvm, for
unknown reason.
2013-10-24 04:10:07 +02:00
Marek Marczykowski-Górecki
149971ae2e
core: add methods to trigger ACPI S3 of VM
...
Those methods should be called during dom0 suspend/resume.
2013-10-23 21:56:50 +02:00
Marek Marczykowski-Górecki
084b5575a9
qvm-tools: add option to list only selected VMs
2013-10-23 20:52:32 +02:00
Marek Marczykowski-Górecki
71960d83cc
qmemman: fix maxmem handling ( #736 )
...
'static-max' as read from xenstore is string, so needs to be converted
to int. Additionally units needs to be adjusted (MB vs kB).
2013-10-22 02:04:39 +02:00
Joanna Rutkowska
17e2e7d436
version 2.1.24
2013-10-19 17:29:15 +02:00
Marek Marczykowski-Górecki
aadd47ce45
dispvm: fix commit "pass VM name to qrexec-daemon"
2013-10-19 15:55:31 +02:00
Marek Marczykowski-Górecki
3443f94aa9
dispvm: fix out of memory message - Xfce version
2013-10-19 15:54:55 +02:00
Joanna Rutkowska
ef6f3d74e6
version 2.1.23
2013-10-19 11:37:09 +02:00
Marek Marczykowski-Górecki
ed3d602140
dispvm: pass VM name to qrexec-daemon
...
Now qrexec-daemon requires three arguments: domid, domname,
default_user.
2013-10-19 00:07:25 +02:00
Joanna Rutkowska
fb745c2ff2
version 2.1.22
2013-10-18 11:06:42 +02:00
Marek Marczykowski
5e0d8c1155
Pass domain name to qrexec daemon
2013-10-18 03:39:02 +02:00
Joanna Rutkowska
b2a0b69742
version 2.1.21
2013-10-11 12:06:05 +02:00
Marek Marczykowski-Górecki
41ba079eb8
Force the first character of VM name to be a letter
...
Especially don't allow numeric-only name (our deserializer of qubes.xml
will convert it to int instead of str...).
2013-10-08 22:47:56 +02:00