Alexandre Bezroutchko
caf27cb936
dom0+vm/qvm-usb: use transaction in usb_check_attached()
2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
81ca750403
dom0+vm/qvm-usb: cosmetic: removed debugging code, adjusted fixmes
2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
b962debfad
dom0/qvm-usb: implemented usb_check_attached method, now "qvm-usb -l" indicate attachments
2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
988d37fcb2
dom0/qvm-usb: qvm-usb is hopefully complete, stubs for all remaining usb_* methods implemented
2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
fc74c6a85b
dom0/qvm-usb: first implementation of qvm-usb
2012-10-21 14:59:35 +02:00
Bruce A Downs
a504600c20
dom0/core: Added the pretty print of qubes.xml
...
* Replaced xml.etree.ElementTree with lxml.etree
* Added argument to tree.write(file, encoding="UTF-8", pretty_print=True)
2012-10-19 02:21:41 +02:00
Marek Marczykowski
3a875edf58
dom0/core: fix qubes-dom0-network-via-netvm ( #660 )
...
IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2.
2012-10-19 02:07:35 +02:00
Marek Marczykowski
3e90174910
Merge branch 'hvm-for-master'
...
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
version_dom0
vm-systemd/qubes-sysinit.sh
2012-10-17 21:41:03 +02:00
Bruce A Downs
6304155990
dom0/core: minor spell check fixes
...
* happend
* avilable
* skiping
2012-10-09 01:23:54 +02:00
Bruce A Downs
05f7bfc9c1
dom0/core: Code cleanup of qubesutils.py
...
* Took out unreferenced restore_vm_file function
* removed unused imports
* renamed interpreter from python2 to python
2012-10-09 01:23:45 +02:00
Marek Marczykowski
081cfab559
dom0/core: do not leak xs transaction and use it in all xs calls
2012-10-08 01:26:07 +02:00
Alexandre Bezroutchko
f4ef1adcdd
dom0/qvm-core: start XS transaction before getting the list of domains
2012-10-08 01:23:52 +02:00
Marek Marczykowski
d03bab3db2
Merge branch 'master-for-hvm' into hvm
...
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
2012-10-04 05:45:41 +02:00
Marek Marczykowski
5e696298cf
dom0/core: fix icon handling on VM clone
2012-10-04 05:44:20 +02:00
Marek Marczykowski
d5c74f69ee
dom0/core: recreate appmenus after rename for any VM, not only AppVM ( #659 )
2012-10-04 05:44:20 +02:00
Marek Marczykowski
9a2f1dfebe
dom0/core: include net/proxy VM default appmenus list in cloned template
2012-10-04 05:44:19 +02:00
Marek Marczykowski
397f2912f0
dom0/core: allow '_' in VM name
2012-10-04 05:44:18 +02:00
Marek Marczykowski
92747285c7
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-10-04 05:44:18 +02:00
Marek Marczykowski
19a60eff55
dom0/core: fix icon handling on VM clone
2012-10-03 22:28:49 +02:00
Marek Marczykowski
1b25d77504
dom0/core: recreate appmenus after rename for any VM, not only AppVM ( #659 )
2012-10-03 21:36:52 +02:00
Marek Marczykowski
45639096fa
dom0/core: include net/proxy VM default appmenus list in cloned template
2012-10-03 21:12:18 +02:00
Marek Marczykowski
c1214bfef9
dom0/core: VM property for qrexec startup timeout ( #27 pro)
2012-09-25 03:26:44 +02:00
Marek Marczykowski
96199058d1
dom0/core: wait for user session on HVM start ( #31 pro)
2012-09-25 00:23:35 +02:00
Marek Marczykowski
f271ad8463
dom0/core: fix return value of QubesHVM.run()
2012-09-25 00:23:20 +02:00
Marek Marczykowski
9db9d8b6c2
dom0/core: allow passing stdin to QubesVM.run()
2012-09-25 00:22:31 +02:00
Marek Marczykowski
3ecc031603
dom0/core: allow '_' in VM name
2012-09-14 12:58:00 +02:00
Marek Marczykowski
2444603ef5
dom0/core: allow '_' in VM name
2012-09-14 12:57:25 +02:00
Marek Marczykowski
46fd664ba3
dom0/qrexec: implement default user handling in qrexec_daemon
...
This will simplify using qrexec from utilities which doen't load qubes.xml
normally (like qrexec_policy, gui daemon).
2012-08-30 17:44:52 +02:00
Marek Marczykowski
3b320878ac
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-08-26 14:42:32 +02:00
Marek Marczykowski
6305e6cbe1
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-08-26 14:41:35 +02:00
Marek Marczykowski
536eb00b9c
dom0/core: verify VM name for not-allowed characters ( #656 )
2012-08-23 04:01:55 +02:00
Marek Marczykowski
85565af560
dom0/core: verify VM name for not-allowed characters ( #656 )
2012-08-23 03:45:06 +02:00
Marek Marczykowski
a67bf1f1c0
Merge branch 'master' into hvm
2012-08-06 15:00:02 +02:00
Marek Marczykowski
7677854fd2
dom0/core: make verbose parameter of create_appmenus optional
2012-08-04 00:37:14 +02:00
Marek Marczykowski
e6c8bf81fd
Merge branch 'master' into hvm
...
Conflicts:
version_dom0
2012-08-01 00:55:05 +02:00
Marek Marczykowski
4ffe3e0391
dom0/qvm-block: fix error handler
2012-07-30 23:16:05 +02:00
Marek Marczykowski
be389bddb9
dom0/core: allow custom kernel for non-updateable VMs
2012-07-28 01:40:24 +02:00
Marek Marczykowski
500baf3a60
dom0/core: allow custom kernel for non-updateable VMs
2012-07-28 01:39:59 +02:00
Marek Marczykowski
18c9af90c7
dom0/core: fix qubes-session wait code
2012-07-28 00:55:12 +02:00
Marek Marczykowski
4b9cc1e405
dom0/core: fix qubes-session wait code
2012-07-28 00:51:19 +02:00
Marek Marczykowski
d1b827e1bd
Merge branch 'master' into hvm
...
Conflicts:
dom0/init.d/qubes_core
rpm_spec/core-dom0.spec
version_dom0
2012-07-25 02:52:00 +02:00
Marek Marczykowski
ad7da49e74
dom0/core: remove ugly hack in network-reconnect code ( #637 )
2012-07-22 01:33:08 +02:00
Marek Marczykowski
6da61af323
dom0/backup-restore: fix netvm field in summary
2012-07-21 00:12:18 +02:00
Marek Marczykowski
a97458ad08
dom0/core: do not reset firewall on clone_attrs
2012-07-20 22:55:28 +02:00
Marek Marczykowski
dc95349145
dom0/backup-restore: fix verification of VMs in backup
2012-07-20 22:55:28 +02:00
Marek Marczykowski
e7477cfaf2
dom0/core: minor comments improvements
2012-07-20 22:55:28 +02:00
Marek Marczykowski
dbbb168b66
dom0/core: improve diagnostics of qmemman errors
2012-07-20 22:55:17 +02:00
Marek Marczykowski
130873071f
dom0/core: do not reset firewall on clone_attrs
2012-07-20 22:54:53 +02:00
Marek Marczykowski
7f9d77b27e
dom0/backup-restore: fix verification of VMs in backup
2012-07-20 22:54:12 +02:00
Marek Marczykowski
ea02bee444
dom0/core: minor comments improvements
2012-07-20 22:53:14 +02:00
Marek Marczykowski
abefe78197
dom0/core: improve diagnostics of qmemman errors
2012-07-20 16:49:19 +02:00
Marek Marczykowski
ba568ed3e9
dom0/core: use generic run() to wait for qubes-session
...
Especially use 'ignore_stderr' feature.
2012-07-20 13:17:37 +02:00
Marek Marczykowski
7071bf62bc
dom0/core: use generic run() to wait for qubes-session
...
Especially use 'ignore_stderr' feature.
2012-07-20 13:06:26 +02:00
Marek Marczykowski
2ddd48f8e4
dom0/core: disable dynamic memory when VM have PCI devices assigned
2012-07-19 14:44:09 +02:00
Marek Marczykowski
406d233b6b
dom0/core: disable dynamic memory when VM have PCI devices assigned
2012-07-19 14:43:24 +02:00
Marek Marczykowski
4b92f6390a
dom0/qvm-core: ignore stderr from VM commands when not needed for sure ( #626 )
...
pam_systemd.so has a bug, which cause spurious '...killed' output on stderr.
2012-07-16 13:36:08 +02:00
Marek Marczykowski
5637793fae
dom0/qvm-core: ignore stderr from VM commands when not needed for sure ( #626 )
...
pam_systemd.so has a bug, which cause spurious '...killed' output on stderr.
2012-07-16 13:31:43 +02:00
Marek Marczykowski
1083fad626
dom0/core: remove duplicated remove_from_disk definition
2012-07-15 02:41:23 +02:00
Marek Marczykowski
0218ab0b2a
dom0/core: remove appmenus when removing NetVM ( #627 )
2012-07-15 02:41:23 +02:00
Marek Marczykowski
08888fcf7a
dom0/core: remove duplicated remove_from_disk definition
2012-07-14 16:07:35 +02:00
Marek Marczykowski
7fbeacc81b
dom0/core: remove appmenus when removing NetVM ( #627 )
2012-07-14 15:12:41 +02:00
Marek Marczykowski
8d8ce2de31
dom0/dispvm: by default use prerun script from inside of VM ( #620 )
2012-07-12 14:22:44 +02:00
Marek Marczykowski
4aab477f38
dom0/dispvm: by default use prerun script from inside of VM ( #620 )
2012-07-12 14:21:59 +02:00
Marek Marczykowski
ee3cf6b583
dom0/qvm-block: fix error handling ( #614 )
2012-07-05 01:49:41 +02:00
Marek Marczykowski
892a6bbc13
dom0/guihelpers: interface to notifying qubes-manager ( #615 )
2012-07-05 01:43:32 +02:00
Marek Marczykowski
eb3da24aa4
dom0/guihelpers: interface to notifying qubes-manager ( #615 )
2012-07-05 01:29:45 +02:00
Marek Marczykowski
11ab37b9ff
dom0/qvm-block: fix error handling ( #614 )
2012-06-30 00:58:06 +02:00
Marek Marczykowski
2854f08bca
dom0/core: fix the last merge...
...
Remove duplicated lines by faulty conflict resolution.
2012-06-28 12:28:14 +02:00
Marek Marczykowski
41efe076b2
dom0/core: typo fix in clone_disk_files ( #608 )
2012-06-28 11:37:18 +02:00
Marek Marczykowski
50dc086682
dom0/core: typo fix in clone_disk_files ( #608 )
2012-06-26 11:05:03 +02:00
Marek Marczykowski
44767bea7f
Merge branch 'master' into hvm
...
Conflicts:
dom0/init.d/qubes_core
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-prefs
version_dom0
version_vm
2012-06-26 03:49:10 +02:00
Marek Marczykowski
c978ce3a48
dom0/qvm-firewall: eliminate duplicate firewall defaults definition ( #599 )
...
This caused ignore of different firewall defaults for TemplateVM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
ab9c2e503a
dom0: qvm-run --nogui switch
...
Can be used to not start guid.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
a4e10f00c1
dom0/qvm-firewall: eliminate duplicate firewall defaults definition ( #599 )
...
This caused ignore of different firewall defaults for TemplateVM.
2012-06-18 23:51:44 +02:00
Marek Marczykowski
92844a161a
dom0: qvm-run --nogui support for HVM
...
Translate it to "nogui:" command prefix.
2012-06-15 17:40:03 +02:00
Marek Marczykowski
4dfad5f1ae
dom0: qvm-run --nogui switch
...
Can be used to not start guid.
2012-06-15 17:37:19 +02:00
Marek Marczykowski
8bdc5706f7
dom0/core: allow to change default user for qvm-run ( #577 )
...
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 19:01:32 +02:00
Marek Marczykowski
844d43b0ef
dom0/core: introduce is_guid_running() and use it in is_fully_usable()
...
To improve code reuse, especially to remove direct checking for
"/var/run/qubes/guid_running.{0}" in many places.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
c534d5871b
dom0/core: fix order of loading VM attributes
...
Parsing kernelopts depends on uses_default_kernelopts, so set 'order' appropriate.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
6bd988bf81
dom0/core: allow to change default user for qvm-run ( #577 )
...
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 17:16:12 +02:00
Marek Marczykowski
e6a75c732e
dom0/core: support for qrexec for Windows HVM
...
Because not every HVM will have qrexec agent installed, introduce VM property
'qrexec_installed'. If it is set, spawn qrexec_daemon at VM startup and allow
use of qvm-run.
2012-06-13 17:14:25 +02:00
Marek Marczykowski
5504142187
dom0/core: fix race in QubesHVm.stubdom_xid
...
device-model-domid is written to xenstore after domaid id itself, so do not
assume the former is present when we know VM XID.
2012-06-13 17:11:21 +02:00
Marek Marczykowski
784f0f5607
dom0/core/hvm: rename is_fully_usable() to is_guid_running()
...
This is what this function does.
2012-06-13 17:09:06 +02:00
Marek Marczykowski
46db1e83f0
dom0/core: introduce is_guid_running() and use it in is_fully_usable()
...
To improve code reuse, especially to remove direct checking for
"/var/run/qubes/guid_running.{0}" in many places.
2012-06-13 17:08:30 +02:00
Marek Marczykowski
6a929190d2
dom0/core: fix order of loading VM attributes
...
Parsing kernelopts depends on uses_default_kernelopts, so set 'order' appropriate.
2012-06-13 17:01:57 +02:00
Marek Marczykowski
2eb7c5733d
dom0/core: set network parameters only when VM have network access
2012-06-12 18:25:04 +02:00
Marek Marczykowski
653c056c99
dom0/core: fix HVM network settings in xen config
2012-06-12 18:24:34 +02:00
Marek Marczykowski
f2abc5e26d
dom0: populate unchanged firewall settings with previous values ( #589 )
...
Missed settings in new firewall configuration caused exception. In old qubes-manager (before #582 done) this exception silently broke saving operation, leaving user with progress bar windows infinitely...
2012-06-05 21:21:53 +02:00
Marek Marczykowski
aea8d189f0
dom0/core: fix QubesVM.gateway
...
To be consistent with QubesNetVM, where gateway property contain gateway IP for
_other_ VMs, in non-network-provider VM it should be empty.
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a528befbc4
dom0: default TemplateVM firewall: block all traffic and allow use of yum proxy ( #590 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a8b992e647
dom0/core: implement per-VM-type firewall defaults
2012-06-05 21:21:53 +02:00
Marek Marczykowski
3f3dc4708c
dom0: populate unchanged firewall settings with previous values ( #589 )
...
Missed settings in new firewall configuration caused exception. In old qubes-manager (before #582 done) this exception silently broke saving operation, leaving user with progress bar windows infinitely...
2012-06-05 20:57:40 +02:00
Marek Marczykowski
3255f81a1c
dom0/core: fix QubesVM.gateway
...
To be consistent with QubesNetVM, where gateway property contain gateway IP for
_other_ VMs, in non-network-provider VM it should be empty.
2012-06-05 19:57:19 +02:00
Marek Marczykowski
8b366f1148
dom0: default TemplateVM firewall: block all traffic and allow use of yum proxy ( #590 )
2012-06-05 19:37:39 +02:00
Marek Marczykowski
01e8a2dff9
dom0/core: implement per-VM-type firewall defaults
2012-06-05 19:37:12 +02:00
Marek Marczykowski
e4f64fd600
dom0/core: remove trailing spaces
2012-05-31 03:11:44 +02:00
Marek Marczykowski
65fc62a989
dom0/core: setup yum to use proxy when it have access to it ( #568 )
...
To simplify configuration, automatically enable 'yum-proxy-setup'
pseudo-service when allowing access to the proxy. Also disable this service,
when access is revoked. Thanks to this the user can enable this feature by one
click in firewall settings.
2012-05-31 03:11:44 +02:00
Marek Marczykowski
2ca4b11183
dom0/core-firewall: firewall setting for qubes-yum-proxy ( #568 )
...
New setting for access to qubes-yum-proxy. The difference from other firewall
setting (and reason for new top-level setting): 'deny' is enforced even if
policy is set to 'allow'. This proxy service is mainly used to filter network
traffic, so do not expose it to VMs which can connect to any host directly (eg
'untrusted' VM).
2012-05-31 03:11:44 +02:00
Marek Marczykowski
812264cfb0
dom0/core: don't limit netvm/proxyvm vcpu count to 1 ( #571 )
2012-05-31 03:09:22 +02:00
Marek Marczykowski
c49ad3438b
dom0/core: remove trailing spaces
2012-05-31 03:05:14 +02:00