Commit Graph

3507 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
8c7f072461
core: fix handling vm.start_time for just shutdown VM
That xenstore entry may be already removed even when libvirt still
reports the VM as running.

Fix QubesOS/qubes-issues#2127
2016-07-01 00:47:32 +02:00
Marek Marczykowski-Górecki
03210f6cfe
Merge remote-tracking branch 'qubesos/pr/34'
* qubesos/pr/34:
  qfile-daemon-dvm: Implement LAUNCH and FINISH actions
  qfile-daemon-dvm: Call static method by class name
  qfile-daemon-dvm: Move dispVM killing into cleanup function
2016-06-30 01:43:57 +02:00
Marek Marczykowski-Górecki
13a463b565
Merge remote-tracking branch 'qubesos/pr/33'
* qubesos/pr/33:
  And some more quoting to satisfy #1672
  Quoting all `cat`s as proposed in #1672
  Modifying support cpio as proposed in #1672
  Quoting the destination as proposed in #1672
2016-06-30 01:43:52 +02:00
HW42
f6bc97d65b
save pci_e820_host property 2016-06-29 23:51:51 +02:00
Marek Marczykowski-Górecki
ae2194da3b
tests: one more place to add xdotool --sync 2016-06-29 23:50:52 +02:00
Rusty Bird
b964e8c33f
qfile-daemon-dvm: Implement LAUNCH and FINISH actions
If the action is LAUNCH instead of qubes.SomeService, then just start
the dispVM, write (only) its name to stdout, and quit.

If the action is FINISH, then kill and remove the named dispVM.
2016-06-29 11:59:12 +00:00
Rusty Bird
142cb9e240
qfile-daemon-dvm: Call static method by class name 2016-06-29 11:59:09 +00:00
Rusty Bird
afb2a65744
qfile-daemon-dvm: Move dispVM killing into cleanup function 2016-06-29 11:58:46 +00:00
Desobediente Civil
59e687c3f3 And some more quoting to satisfy #1672 2016-06-27 19:23:53 -03:00
Desobediente Civil
5081b58ee8 Quoting all cats as proposed in #1672 2016-06-27 19:19:00 -03:00
Desobediente Civil
fa83298153 Modifying support cpio as proposed in #1672 2016-06-27 19:15:46 -03:00
Desobediente Civil
12bf920969 Quoting the destination as proposed in #1672 2016-06-27 19:10:00 -03:00
Marek Marczykowski-Górecki
e431e8bc45
qvm-ls: fix handling explicit VMs list 2016-06-26 13:02:34 +02:00
Marek Marczykowski-Górecki
9d781f77ce
tests: VM removal
Check if everything is cleaned up.
2016-06-25 01:53:39 +02:00
Marek Marczykowski-Górecki
13f832645a
qvm-remove: undefine libvirt domain even when not removing files
Fixes QubesOS/qubes-issues#2112
2016-06-25 00:21:47 +02:00
Marek Marczykowski-Górecki
748a3a90a2
core: fix handling disabling VM autostart on VM removal
QubesOS/qubes-issues#1930
2016-06-25 00:20:27 +02:00
Marek Marczykowski-Górecki
376dc43b90
version 3.2.4 2016-06-24 23:06:35 +02:00
Marek Marczykowski-Górecki
84677fa70b
qvm-ls: fix handling VM list on command line 2016-06-24 23:05:15 +02:00
Marek Marczykowski-Górecki
776393e97b
qvm-check: whitespace fixes 2016-06-24 22:43:26 +02:00
Marek Marczykowski-Górecki
44da6d7940
Merge remote-tracking branch 'qubesos/pr/32'
Fixes QubesOS/qubes-issues#2103

* qubesos/pr/32:
  Add VM state options
2016-06-24 22:40:18 +02:00
Marek Marczykowski-Górecki
9956e4c7b3
tests: handle vim opened in xterm without adjusted window title
On debian vim in xterm doesn't have "vim" in title, just standard
user@host.
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
a30f1d3902
tests: firefox sets "Navigator" as window class 2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
ba0a01afba
tests: fix closing xterm window
sh -s option in dash prevent shell to terminate after command from -c
ends. So remove this option.
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
3cb717dced
tests: add --sync to xdotool windowactivate
This may help getting less errors from xdotool...
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
9bc60927c5
tests: replace sfdisk call with verbatim partition table
sfdisk options and input format differs between versions (dropped MB
units support), so instead of supporting all the combinations,
simply paste its result verbatim.
2016-06-24 19:57:04 +02:00
Marek Marczykowski-Górecki
38beb9412a
tests: wait for editor window to settle before sending any keystrokes 2016-06-24 19:57:04 +02:00
Marek Marczykowski-Górecki
4123b95866
tests: make sure dnsmasq isn't already running
On Debian when dnsmasq is installed, it is automatically started. Which
prevents starting a second instance.
2016-06-24 19:57:03 +02:00
Marek Marczykowski-Górecki
7eb881c6ba
tests: skip some tests not supported on Whonix 2016-06-24 19:57:03 +02:00
GammaSQ
3599249e2d
forgot if-statement in last commit 2016-06-24 19:57:02 +02:00
GammaSQ
3c7915808b
added --raw-data option 2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
504360ba9a
tests: fix clearing 'updates pending' flag test 2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
ae44869499
qvm-start: improve error message about missing qubes-windows-tools.iso
Fixes QubesOS/qubes-issues#1977
2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
34fc3f3399
tests: regression test for #1619 - drive path validation
QubesOS/qubes-issues#1619
2016-06-24 19:57:01 +02:00
ttasket
9dc488818d Add VM state options
New options: --running, --paused and --template
2016-06-24 06:09:06 -04:00
Marek Marczykowski-Górecki
5921dd2a1c
core: validate dom0 drive path before starting VM
This is very easy if the file/device is in dom0, so do it to avoid
cryptic startup error (`libvirtError: internal error: libxenlight failed
to create domain`).

Fixes QubesOS/qubes-issues#1619
2016-06-21 18:39:13 +02:00
Marek Marczykowski-Górecki
86b7849fd4
tests: update PVGrub2 test for fedora-23 template
dnf doesn't want to replace packages without --allowerasing (it is
needed to have correct kernel-devel package version). Additionally
really make sure the right version is installed and force u2mfn module
compilation.
2016-06-20 12:35:22 +02:00
Marek Marczykowski-Górecki
7f86782e14
version 3.2.3 2016-06-07 06:46:30 +02:00
Marek Marczykowski-Górecki
d0ba43f253
core: start guid as normal user even when VM started by root
Another attempt to avoid permissions-related problems...

QubesOS/qubes-issues#1768
2016-06-06 02:21:08 +02:00
Marek Marczykowski-Górecki
89d002a031
core: use runuser instead of sudo for switching root->user
There are problems with using sudo in early system startup
(systemd-logind not running yet, pam_systemd timeouts). Since we don't
need full session here, runuser is good enough (even better: faster).
2016-06-06 02:19:51 +02:00
Marek Marczykowski-Górecki
2265fd3d52
core: start qubesdb as normal user, even when VM is started by root
On VM start, old qubesdb-daemon is terminated (if still running). In
practice it happen only at VM startart (shutdown and quickly start
again). But in that case, if the VM was started by root, such operation
would fail.
So when VM is started by root, make sure that qubesdb-daemon will be
running as normal user (the first user in group 'qubes' - there should
be only one).

Fixes QubesOS/qubes-issues#1745
2016-06-06 02:19:28 +02:00
Marek Marczykowski-Górecki
a857ac3afb
Install dom0 qvm-* tools man pages by default 2016-06-04 16:57:13 +02:00
Marek Marczykowski-Górecki
88cb62fcf6
core: add pci_e820_host property
Enable e820_host option for VMs with PCI devices (to allow VM kernel to
deal with address space conflicts). But add a property to allow
disabling it.

Fixes QubesOS/qubes-issues#2019
2016-06-04 16:52:02 +02:00
Marek Marczykowski-Górecki
daf55710b8
travis: initial version
QubesOS/qubes-issues#1926
2016-06-02 11:29:38 +02:00
Marek Marczykowski-Górecki
a534b1dd2c
qvm-usb: remove scary warning about PV USB stability
USBIP (used for PV USB here) is considered stable by Linux maintainers,
so follow their judgement.

Fixes QubesOS/qubes-issues#531
2016-06-02 02:52:59 +02:00
Marek Marczykowski-Górecki
e87da9ec9d
tests: adjust dom0_update tests for dnf in VM
There is no support for 'copy_local' repository option, so setup test
repository over http.

Related to QubesOS/qubes-issues#1574
2016-06-02 02:51:18 +02:00
Marek Marczykowski-Górecki
767d1f0074
qvm-usb: implement usb_detach_all
QubesOS/qubes-issues#531
2016-06-02 02:49:22 +02:00
Marek Marczykowski-Górecki
d5e06bfb83
qvm-usb: issue detach call to backend domain
Make sure that even compromised frontend will be cut of (possibly
sensitive - like a webcam) device. On the other hand, if backend domain
is already compromised, it may already compromise frontend domain too,
so none of them would be better to call detach to.

QubesOS/qubes-issues#531
2016-06-02 02:45:26 +02:00
Marek Marczykowski-Górecki
52fb410deb
qvm-usb: always pass VM as object reference not a name
Make the API consistent.

QubesOS/qubes-issues#531
2016-06-02 02:44:38 +02:00
Marek Marczykowski-Górecki
d67636308f
qvm-usb: modify for USBIP-over-qrexec implementation
QubesOS/qubes-issues#531
2016-05-26 01:38:08 +02:00
Marek Marczykowski-Górecki
3afc7b7d50
core: start qrexec-daemon as normal user, even when VM is started by root
qrexec-daemon will start new processes for called services, which
include starting new DispVM, starting other required VMs (like backend
GPG VM). Having those processes as root leads to many permissions
problems, like the one linked below. So when VM is started by root, make
sure that qrexec-daemon will be running as normal user (the first user
in group 'qubes' - there should be only one).

QubesOS/qubes-issues#1768
2016-05-26 01:34:53 +02:00