Wojtek Porczyk
9fa3d60d0b
qubes/events: fix event handling order
...
Events are divided into "pre" and "post" events. "Pre" events fire handlers in
MRO, "post" fire them in reverse.
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
41fef46db2
core3 move: QubesVM
...
This is a big commit and probably incomplete. Tests will follow.
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
6b7860995b
qubes/events.py: Fire events from parent classes too
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
f9658ae338
qubes/vm: remove old event methods that were overlooked
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
f149c7b59b
qubes/vm: fixed __repr__ for BaseVM
...
Previously it could fail with AttributeError when any of the properties was unset.
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
ef4f00dac0
qubes/vm: DeviceManager class for herding devices
...
collections.defaultdict was not enough, because it cannot pass any arguments to
factory. We need to pass domain object and device class to fire events on attach
and detach.
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
1a032ecf2a
core3: basic global events and their documentation
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
855a434879
core3: event framework adjusted for global Qubes object
...
From now, global events are emitted by qubes.Qubes object and handlers are registered there.
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
b623a71d87
core3 move: QubesVmCollection
...
This got split to qubes.Qubes and qubes.VMCollection.
From now on, VMCollection is a stupid bag. Some parts went elsewhere.
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
2835238a87
doc: manpage formatting
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
6146c8e466
QubesVmLabel: XML parsing
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
6c68bd062e
qubes.dochelpers: Version check for manual pages
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
a4e1bd98ed
doc: optional sandbox building
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
56092073e9
doc: add hyphens to module page titles
...
Aim is to be more consistent with manpages.
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
2c1cacc0ac
doc: swallow manpages into sphinx
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
96bff66546
qubes.dochelpers: Helpers for Sphinx documentation
...
Currently it is possible to refer to Qubes' tickets via 🎫 `#no`
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
87ae0112eb
qubes/vm: New XML format loading
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
f3673dd34c
core3 move: class QubesVmLabel
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
778571fe8d
core3 move: class QubesHost
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
c3dd13c0ab
qubes/log: logging routines
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
1fbb91a1aa
doc/apidoc: enable intersphinx to docs.python.org
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
320cb096f6
qubes: drop dry_run
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
57d35fbc4c
qubes: fix qubes.QubesVMMConnection
...
fix logical error in resetting offline_mode
and drop redundant _common_getter()
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
cec3db993d
core3 move: class QubesVMMConnection
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
e1a6fb2859
core3 move: class QubesException
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
65595e3b39
apidoc stub
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
7f27d987cc
import framework for core3
2015-06-29 17:39:22 +02:00
Marek Marczykowski-Górecki
8134360614
tests: fix skipping whonix in timezone test
2015-06-27 05:05:34 +02:00
Marek Marczykowski-Górecki
ad89c8f8a2
core: show clear message when a VM has non-existing PCI device assigned
2015-06-27 04:52:25 +02:00
Marek Marczykowski-Górecki
3867d1fdb3
tests: check timezone dom0->vm propagation
2015-06-27 04:47:27 +02:00
Marek Marczykowski-Górecki
ed9b4bfc54
tests: check firewall rules blocking VM IP spoofing
2015-06-27 04:46:17 +02:00
Marek Marczykowski-Górecki
8b4c9b23b3
tests: hide git check warning
2015-06-27 04:19:07 +02:00
Marek Marczykowski-Górecki
ee48954445
core: fix starting stubdom guid for HVM in debug mode
...
Remove artificial attribute '_start_guid_first' and use
guiagent_installed directly. This way starting guid for stubdom in debug
mode, even if guiagent_installed is set is much clearer.
2015-06-27 04:10:32 +02:00
Marek Marczykowski-Górecki
f7c86f861c
Prevent GUI usage in qvm-sync-clock
2015-06-23 00:15:21 +02:00
Marek Marczykowski-Górecki
df20a67a6c
Convert qubes.NotifyTools service to use qubesdb
2015-06-23 00:14:57 +02:00
Marek Marczykowski-Górecki
236dca29a8
tests/network: add support for Debian's default netcat implementation
...
By default Debian has different nc installed, which requires different
options.
2015-06-21 02:08:02 +02:00
Marek Marczykowski-Górecki
33f0fa17b8
tests: fix clipboard tess
2015-06-21 01:12:47 +02:00
Zrubi
2c1889acbb
YML output fix
...
(cherry picked from commit 53260bd66ba3f0b2cc62b9488d67cdcdb6cec1e8)
2015-06-12 10:25:02 +02:00
Marek Marczykowski-Górecki
4a8cfb3c88
version 3.0.14
2015-06-02 11:19:48 +02:00
Zrubi
d43848d163
YML output fix
...
(cherry picked from commit 60cf12b4fdea0d119c1b8ca0c84f77bd4877f843)
2015-06-02 11:18:18 +02:00
Marek Marczykowski-Górecki
9cbf9a8a59
Add support for 'pci_strictreset' option
...
This allows to assign PCI device to the VM, even if it doesn't support
proper reset. The default behaviour (when the value is True) is to not
allow such attachment (VM will not start if such device is assigned).
Require libvirt patch for this option.
2015-05-28 00:11:17 +02:00
Marek Marczykowski-Górecki
c9a670cbd1
linux/block-snapshot: fix handling root.img being already block device
2015-05-27 23:52:57 +02:00
Marek Marczykowski-Górecki
acbdb3a261
qvm-tools: do not show scary message on --force-root
...
When this option is used, the user probably already got that message.
Also some internal scripts are using this (for example template
pre-uninstall script).
Conflicts:
qvm-tools/qvm-remove
2015-05-23 04:43:51 +02:00
Marek Marczykowski-Górecki
449554f404
version 3.0.13
2015-05-15 03:29:20 +02:00
Marek Marczykowski-Górecki
23ae0ed990
dispvm: clean the VM in case of failed savefile creation
...
Otherwise further tries to regenerate savefile would fail.
2015-05-15 03:22:06 +02:00
Marek Marczykowski-Górecki
8aaef404de
qvm-prefs: add an option to get a single VM property
...
Could be useful for scripts
2015-05-15 03:22:06 +02:00
Marek Marczykowski-Górecki
dadcfc334d
dispvm: set 'memory' to the size reported on savefile generation
...
That parameter will be used later to request memory from qmemman just
before loading savefile to memory, so it should match the real need.
Do not allow values smaller than 400, to prevent storing some erroneous
values.
Fixes qubesos/qubes-issues#973
2015-05-15 03:22:06 +02:00
Marek Marczykowski-Górecki
2856b6a836
Wait for udev to create loopXpY device when preparing volatile.img
2015-05-13 04:12:42 +02:00
Marek Marczykowski-Górecki
d5b67a67a2
Fix "dispvm: sanitize used memory info received from VM"
...
There should be no -q option - we actually want the result.
Fixes qubesos/qubes-issues#994
2015-05-13 04:12:20 +02:00
Marek Marczykowski-Górecki
b159f544d3
version 3.0.12
2015-05-11 02:34:11 +02:00