Marek Marczykowski
da63af599c
vm/spec: fix enabling of qubes-firewall SysV service
2012-06-26 03:43:36 +02:00
Marek Marczykowski
bf9b63e06f
dom0/qmemman: allow balance when xen have low free memory ( #563 )
2012-06-26 03:43:36 +02:00
Marek Marczykowski
2e7d5cc178
dom0: appmenu to start Firefox in new DispVM ( #594 )
2012-06-26 03:43:36 +02:00
Joanna Rutkowska
87b07872ae
version 1.7.30
2012-06-25 23:38:18 +02:00
Marek Marczykowski
3d7c774d0c
Merge branch 'master' of ssh://git.qubes-os.org/var/lib/qubes/git/joanna/core
2012-06-23 20:18:21 +02:00
Marek Marczykowski
ad7d6957b1
dom0/updates: clean yum cache as root ( #540 )
...
Actually looks like this solve problem, don't know why (cleaning as user
didn't returned any error).
2012-06-23 00:37:47 +02:00
Marek Marczykowski
89aaa60753
dom0: use RPC service to sync clock via NTP ( #603 )
2012-06-23 00:37:47 +02:00
Marek Marczykowski
f53ebfc3cd
vm: RPC service for NTP time sync ( #603 )
2012-06-23 00:37:47 +02:00
Marek Marczykowski
2ddd53e1e4
vm: support for magic QUBESRPC command
...
Previously dom0 had to know full path of qubes_rpc_multiplexer in VM, which can
differ between VMs (eg totally different on Windows). This commit enables dom0
to magic keyword instead of full path.
2012-06-23 00:37:47 +02:00
Marek Marczykowski
24352c3dce
dom0: minor init.d script fix
2012-06-23 00:37:47 +02:00
Joanna Rutkowska
c34f10a6f6
version 1.7.29-dom0
2012-06-22 15:20:21 +02:00
Joanna Rutkowska
b3ef32d36e
Merge branch 'master' of git.qubes-os.org:/var/lib/qubes/git/marmarek/core
2012-06-22 15:17:45 +02:00
Marek Marczykowski
ffa3d8732c
dom0: use new qubes-manager appmenu applet ( #548 )
2012-06-22 01:15:54 +02:00
Marek Marczykowski
96f7d4da81
Revert "dom0/appmenus: do not add "Add more shortcuts" menu ( #458 )" ( #548 )
...
This reverts commit 8b613a10b4
.
Restore this option.
2012-06-22 01:15:54 +02:00
Joanna Rutkowska
e31228656d
1.7.28-dom0
2012-06-19 15:22:23 +02:00
Joanna Rutkowska
617656cd2a
Merge branch 'master' of git.qubes-os.org:/var/lib/qubes/git/marmarek/core
2012-06-19 15:20:05 +02:00
Marek Marczykowski
c978ce3a48
dom0/qvm-firewall: eliminate duplicate firewall defaults definition ( #599 )
...
This caused ignore of different firewall defaults for TemplateVM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
0e2aba228f
dom0: minor qvm-sync-clock fix
...
Catch any error in vm.run, to not break clock syncing of all VMs because one
VM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
ab9c2e503a
dom0: qvm-run --nogui switch
...
Can be used to not start guid.
2012-06-19 00:59:27 +02:00
Joanna Rutkowska
f81e36f75a
version 1.7.27
2012-06-14 11:23:59 +02:00
Joanna Rutkowska
c717ac180b
Merge branch 'master' of git.qubes-os.org:/var/lib/qubes/git/marmarek/core
2012-06-14 11:22:53 +02:00
Marek Marczykowski
8bdc5706f7
dom0/core: allow to change default user for qvm-run ( #577 )
...
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 19:01:32 +02:00
Marek Marczykowski
844d43b0ef
dom0/core: introduce is_guid_running() and use it in is_fully_usable()
...
To improve code reuse, especially to remove direct checking for
"/var/run/qubes/guid_running.{0}" in many places.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
c534d5871b
dom0/core: fix order of loading VM attributes
...
Parsing kernelopts depends on uses_default_kernelopts, so set 'order' appropriate.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
3a8427cee5
dom0: do not reply all udev events at system boot ( #595 )
...
This can cause some rules to fail and eg remove dm-* devices. Replace it with
what is really needed to hide mounted (and other ignored) devices from
qubes-block-devices.
2012-06-13 04:57:38 +02:00
Marek Marczykowski
e2a0c22299
vm/qubes-dom0-update: rebuild dom0 rpmdb before touching it with yum
...
Dom0 can have different (older) rpmdb version than VM. Starting from FC17 yum
refuses to work without rebuild.
2012-06-13 04:56:11 +02:00
Joanna Rutkowska
d4f0e618dc
version 1.7.26
2012-06-12 12:25:19 +02:00
Marek Marczykowski
28ad001375
vm: chown /home/user to user if user UID have changed
...
FC16 and FC17 starts normal users at UID 1000, not 500 as in <=FC15.
2012-06-11 22:35:44 +02:00
Marek Marczykowski
9d10d6c668
vm: fix yum-qubes-hooks
...
Program must be given as full path to qrexec_client_vm - it is passed directly
to execv.
2012-06-11 22:35:44 +02:00
Marek Marczykowski
288dcc562e
vm: enable yum-qubes-hooks plugin ( #592 )
2012-06-11 22:35:44 +02:00
Marek Marczykowski
b1cbd0d8c1
vm: disable gnome update plugin, not only unattended installation
2012-06-11 22:35:44 +02:00
Marek Marczykowski
b1ec6a6248
dom0+vm/qvm-block: speed up udev block handler ( #560 )
...
xenstore is very slow, so don't bother it when unneeded. Namely do not try to
remove entries, which haven't even created.
2012-06-11 22:35:44 +02:00
Marek Marczykowski
ad6bfe3ca1
vm/spec: create firmware symlink only when needed
...
On new systems, like FC16+, firmware is provided by separate package (like
linux-firmware), so no longer need to get it from kernel package.
2012-06-06 03:00:05 +02:00
Marek Marczykowski
4911ca7eb9
vm/spec: depend on ethtool _package_
2012-06-06 02:59:07 +02:00
Marek Marczykowski
f2abc5e26d
dom0: populate unchanged firewall settings with previous values ( #589 )
...
Missed settings in new firewall configuration caused exception. In old qubes-manager (before #582 done) this exception silently broke saving operation, leaving user with progress bar windows infinitely...
2012-06-05 21:21:53 +02:00
Marek Marczykowski
3b8272c1b6
dom0/qvm-ls: replace 'netmask' column with 'ip back' ( #573 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
aea8d189f0
dom0/core: fix QubesVM.gateway
...
To be consistent with QubesNetVM, where gateway property contain gateway IP for
_other_ VMs, in non-network-provider VM it should be empty.
2012-06-05 21:21:53 +02:00
Marek Marczykowski
1a8682ace3
vm: use yum proxy in TemplateVM by default ( #590 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a528befbc4
dom0: default TemplateVM firewall: block all traffic and allow use of yum proxy ( #590 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a8b992e647
dom0/core: implement per-VM-type firewall defaults
2012-06-05 21:21:53 +02:00
Marek Marczykowski
79f13d6c66
vm: yum plugin to notify dom0 about installed updates ( #592 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
c5c916b74c
vm/systemd: fix ProxyVM related services deps ( #578 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
ea08560e43
makefile: rename vchan Makefile to not conflict with windows build
2012-06-05 21:21:53 +02:00
Marek Marczykowski
1732679b18
vm/qrexec: removed obsolete "directly:" command prefix support
...
This was used for launching DispVM editor in pre-qrexec-RPC times.
2012-06-05 21:21:52 +02:00
Marek Marczykowski
e4f64fd600
dom0/core: remove trailing spaces
2012-05-31 03:11:44 +02:00
Marek Marczykowski
65fc62a989
dom0/core: setup yum to use proxy when it have access to it ( #568 )
...
To simplify configuration, automatically enable 'yum-proxy-setup'
pseudo-service when allowing access to the proxy. Also disable this service,
when access is revoked. Thanks to this the user can enable this feature by one
click in firewall settings.
2012-05-31 03:11:44 +02:00
Marek Marczykowski
ec52d15dfe
dom0/qvm-firewall: add support for 'allowYumProxy' setting ( #568 )
2012-05-31 03:11:44 +02:00
Marek Marczykowski
2ca4b11183
dom0/core-firewall: firewall setting for qubes-yum-proxy ( #568 )
...
New setting for access to qubes-yum-proxy. The difference from other firewall
setting (and reason for new top-level setting): 'deny' is enforced even if
policy is set to 'allow'. This proxy service is mainly used to filter network
traffic, so do not expose it to VMs which can connect to any host directly (eg
'untrusted' VM).
2012-05-31 03:11:44 +02:00
Marek Marczykowski
4bac57818e
vm/qubes-yum-proxy: setup yum to use qubes-yum-proxy ( #568 )
...
The simplest way is just add proxy=... entry to /etc/yum.conf, but sometimes it
is reasonable to bypass the proxy. Some examples:
- usage of non-standard repos with some exotic file layout, which will be
blocked by the proxy
- usage of repos not-accessible via proxy (eg only via VPN stared in VpnVM)
This commit introduces 'yum-proxy-setup' pseudo-service, which can be
controlled via standard qvm-service or qubes-manager. When enabled - yum will
be configured at VM startup to use qubes proxy, otherwise - to connect directly
(proxy setting will be cleared).
2012-05-31 03:11:44 +02:00
Marek Marczykowski
1a3a2a05e3
vm/qubes-yum-proxy: create dir for pidfile under FC15 ( #568 )
...
On FC>=15 /var/run is on tmpfs, so /var/run/tinyproxy from rpm don't survive
reboot. This is bug in Fedora package (should include config file for tmpfiles
service). For now create dir just before starting service.
2012-05-31 03:11:43 +02:00