Commit Graph

341 Commits

Author SHA1 Message Date
Marek Marczykowski
24b4e5efd0 dom0: use any python2, not explicit python2.6
Especially allow python 2.7 (fc18).
2013-01-23 06:28:07 +01:00
Marek Marczykowski
ae56b17a19 dom0/qvm-tools: adjust for new QubesVmCollection API 2013-01-22 00:33:35 +01:00
Olivier Medoc
1f513edd2f dom0/qvm-core: implemented guiagent_installed preference for HVm 2013-01-11 01:12:29 +01:00
Olivier Medoc
4fa76a5f79 core/tools: use gui notification for qvm-start
dom0/qvm-core: propagated notify_function to qrexec
2013-01-11 01:12:29 +01:00
Marek Marczykowski
1d49bf9dc5 dom0/qvm-tools: check property name in qubes-prefs 2012-12-19 04:37:09 +01:00
Marek Marczykowski
84be00eb14 dom0/qvm-ls: display HVM VM type 2012-12-11 01:23:28 +01:00
Marek Marczykowski
96503fde2f dom0/qvm-block: fix and clarify error message 2012-12-05 16:52:10 +01:00
Alexandre Bezroutchko
1beba9fdd5 Merge branch 'master' of git://git.qubes-os.org/marmarek/core into pvusb2 2012-11-17 01:43:34 +01:00
Marek Marczykowski
e8e14f3fad dom0/core: API CHANGE: pass username as keyword param to vm.run() (#577)
Get rid of ugly embedding username into commandline. This will make much easier
avoid hardcoding username in dom0 code.
Currently dom0 is free of hardcoded "user" username ("root" still is used).
2012-11-13 04:42:25 +01:00
Alexandre Bezroutchko
3898b69ac1 Merge branch 'master' of git://git.qubes-os.org/marmarek/core 2012-11-08 10:49:39 +01:00
Marek Marczykowski
14686a0243 dom0/usb: imporove qvm-usb warning message 2012-11-08 03:52:41 +01:00
Alexandre Bezroutchko
5ad7e9622c Merge branch 'master' of git://git.qubes-os.org/marmarek/core into pvusb2 2012-11-08 01:31:07 +01:00
Marek Marczykowski
62732d78b2 dom0/usb: added Big Fat Warning to qvm-usb tool (#664) 2012-11-07 22:02:28 +01:00
Alexandre Bezroutchko
bee83bea0d dom0/qvm-create: fixed couple typos 2012-10-28 03:49:53 +01:00
Alexandre Bezroutchko
14fff45ddd dom0+vm/usb: add USB version to device list displayed by qvm-usb -l' 2012-10-26 23:09:36 +02:00
Alexandre Bezroutchko
9d77b3dd3c dom0/qvm-usb: detach operation appears to work 2012-10-21 14:59:39 +02:00
Alexandre Bezroutchko
89b78d9426 dom0/qvm-usb: changed output format for qvm-usb -l 2012-10-21 14:59:39 +02:00
Alexandre Bezroutchko
b72db5cad8 dvp/qvm-usb: not going to implement explicit specification of USB frontend device/port 2012-10-21 14:59:39 +02:00
Alexandre Bezroutchko
b962debfad dom0/qvm-usb: implemented usb_check_attached method, now "qvm-usb -l" indicate attachments 2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
988d37fcb2 dom0/qvm-usb: qvm-usb is hopefully complete, stubs for all remaining usb_* methods implemented 2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
95b93a5082 dom0/qvm-usb: enabled -f option to qvm-usb (and cosmetic changes) 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
fc74c6a85b dom0/qvm-usb: first implementation of qvm-usb 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
d6432a16c4 dom0/qvm-tools: clean resolv.conf when networking goes down 2012-10-19 02:21:03 +02:00
Marek Marczykowski
3a875edf58 dom0/core: fix qubes-dom0-network-via-netvm (#660)
IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2.
2012-10-19 02:07:35 +02:00
Marek Marczykowski
3e90174910 Merge branch 'hvm-for-master'
Conflicts:
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-sync-clock
	version_dom0
	vm-systemd/qubes-sysinit.sh
2012-10-17 21:41:03 +02:00
Marek Marczykowski
d010906eb1 Merge remote-tracking branch 'abb/qvm_block-bugfix' 2012-10-16 00:59:36 +02:00
Alexandre Bezroutchko
ca4367821e Improve handling of command line parameters, don't silently ignore unexpected arguments.
This is to avoid following behavior:

    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB

    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB

    [abb@dom0 qubes-core]$ qvm-block -a qdvp dom0:sdb

    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB (attached to 'qdvp' as 'xvdi')

    [abb@dom0 qubes-core]$ qvm-block -d qdvp BLAHBLAH
                                          ^^^^^^^^^^^^^
    >>> The last parameter is silently ignored and all devices get detached

    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB
2012-10-15 11:40:08 +02:00
Alexandre Bezroutchko
3c53f049a3 dom0/qvm-block: cosmetic 2012-10-08 01:23:42 +02:00
Alexandre Bezroutchko
caf3ed1ae4 cosmetic 2012-10-08 00:46:30 +02:00
Marek Marczykowski
d03bab3db2 Merge branch 'master-for-hvm' into hvm
Conflicts:
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-sync-clock
2012-10-04 05:45:41 +02:00
Olivier Médoc
69354475bf dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues 2012-10-04 05:44:19 +02:00
Olivier Médoc
9a90f499bc dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues 2012-10-03 14:55:05 +02:00
Marek Marczykowski
c1214bfef9 dom0/core: VM property for qrexec startup timeout (#27 pro) 2012-09-25 03:26:44 +02:00
Marek Marczykowski
b7eaf9a30d dom0/core: do not use hardcoded "user" in qvm-sync-clock 2012-08-31 00:53:50 +02:00
Marek Marczykowski
c0455ac641 Merge branch 'master' into hvm
Conflicts:
	dom0/qvm-tools/qvm-create
	version_dom0
2012-08-23 11:11:59 +02:00
Marek Marczykowski
1cd3ef3456 dom0/qvm-tools: catch exceptions while settting VM name (#656) 2012-08-23 04:02:50 +02:00
Marek Marczykowski
b7f5c6ac0b dom0/qvm-tools: catch exceptions while settting VM name (#656) 2012-08-23 03:48:03 +02:00
Marek Marczykowski
9b3a77bc1d dom0: move RPC services to separate directory (#654)
This makes more clear which code have contact with untrusted data from VM.
2012-08-16 16:56:16 +02:00
Marek Marczykowski
e1404a2d4f dom0/qvm-run: do not break --all when run in one VM failed 2012-08-04 04:15:33 +02:00
Marek Marczykowski
847fe81dcd dom0/qvm-run: do not break --all when run in one VM failed 2012-08-01 01:01:37 +02:00
Marek Marczykowski
e6c8bf81fd Merge branch 'master' into hvm
Conflicts:
	version_dom0
2012-08-01 00:55:05 +02:00
Marek Marczykowski
a680976f1e dom0/updates: show errors from qubes-receive-updates
Especially when signature verification failed, show message about it, not
enigmatic "Could not open/read
file:///var/lib/qubes/updates/repodata/repomd.xml"
2012-07-30 23:16:05 +02:00
Marek Marczykowski
c2d4b0de62 dom0/updates: typo fix in qubes-manager statfile handling 2012-07-30 23:16:05 +02:00
Marek Marczykowski
d5dbbd41cb dom0/qvm-tools: add missing imports 2012-07-20 13:09:07 +02:00
Marek Marczykowski
b321d16336 dom0/qvm-tools: add missing imports 2012-07-18 18:10:08 +02:00
Marek Marczykowski
4b92f6390a dom0/qvm-core: ignore stderr from VM commands when not needed for sure (#626)
pam_systemd.so has a bug, which cause spurious '...killed' output on stderr.
2012-07-16 13:36:08 +02:00
Marek Marczykowski
5637793fae dom0/qvm-core: ignore stderr from VM commands when not needed for sure (#626)
pam_systemd.so has a bug, which cause spurious '...killed' output on stderr.
2012-07-16 13:31:43 +02:00
Marek Marczykowski
6c74db3aac dom0/qvm-sync-appmenus: use qubes.GetAppmenus service 2012-07-15 02:41:23 +02:00
Marek Marczykowski
c0ffdd6fa5 dom0/dom0-updates: remove updates-pending flag after update installation 2012-07-15 02:41:23 +02:00
Marek Marczykowski
1009b1a46d dom0/qvm-sync-appmenus: use qubes.GetAppmenus service 2012-07-15 02:26:17 +02:00