Marek Marczykowski
44767bea7f
Merge branch 'master' into hvm
...
Conflicts:
dom0/init.d/qubes_core
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-prefs
version_dom0
version_vm
2012-06-26 03:49:10 +02:00
Marek Marczykowski
bf9b63e06f
dom0/qmemman: allow balance when xen have low free memory ( #563 )
2012-06-26 03:43:36 +02:00
Marek Marczykowski
2e7d5cc178
dom0: appmenu to start Firefox in new DispVM ( #594 )
2012-06-26 03:43:36 +02:00
Marek Marczykowski
29e3593a02
dom0/qmemman: allow balance when xen have low free memory ( #563 )
2012-06-26 00:26:53 +02:00
Marek Marczykowski
0008e71784
dom0: appmenu to start Firefox in new DispVM ( #594 )
2012-06-24 14:09:43 +02:00
Marek Marczykowski
ad7d6957b1
dom0/updates: clean yum cache as root ( #540 )
...
Actually looks like this solve problem, don't know why (cleaning as user
didn't returned any error).
2012-06-23 00:37:47 +02:00
Marek Marczykowski
89aaa60753
dom0: use RPC service to sync clock via NTP ( #603 )
2012-06-23 00:37:47 +02:00
Marek Marczykowski
24352c3dce
dom0: minor init.d script fix
2012-06-23 00:37:47 +02:00
Marek Marczykowski
be7c079705
dom0/updates: clean yum cache as root ( #540 )
...
Actually looks like this solve problem, don't know why (cleaning as user
didn't returned any error).
2012-06-22 23:44:05 +02:00
Marek Marczykowski
1dad96b0e9
dom0: use RPC service to sync clock via NTP ( #603 )
2012-06-22 22:23:17 +02:00
Marek Marczykowski
36f6a2c42c
dom0: minor init.d script fix
2012-06-22 01:22:06 +02:00
Marek Marczykowski
ffa3d8732c
dom0: use new qubes-manager appmenu applet ( #548 )
2012-06-22 01:15:54 +02:00
Marek Marczykowski
96f7d4da81
Revert "dom0/appmenus: do not add "Add more shortcuts" menu ( #458 )" ( #548 )
...
This reverts commit 8b613a10b4
.
Restore this option.
2012-06-22 01:15:54 +02:00
Marek Marczykowski
51f4a60a44
dom0: use new qubes-manager appmenu applet ( #548 )
2012-06-21 11:57:36 +02:00
Marek Marczykowski
3109deebd5
Revert "dom0/appmenus: do not add "Add more shortcuts" menu ( #458 )" ( #548 )
...
This reverts commit 8b613a10b4
.
Restore this option.
2012-06-21 11:50:52 +02:00
Marek Marczykowski
c978ce3a48
dom0/qvm-firewall: eliminate duplicate firewall defaults definition ( #599 )
...
This caused ignore of different firewall defaults for TemplateVM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
0e2aba228f
dom0: minor qvm-sync-clock fix
...
Catch any error in vm.run, to not break clock syncing of all VMs because one
VM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
ab9c2e503a
dom0: qvm-run --nogui switch
...
Can be used to not start guid.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
a4e10f00c1
dom0/qvm-firewall: eliminate duplicate firewall defaults definition ( #599 )
...
This caused ignore of different firewall defaults for TemplateVM.
2012-06-18 23:51:44 +02:00
Marek Marczykowski
06d99b77df
dom0: minor qvm-sync-clock fix
...
Catch any error in vm.run, to not break clock syncing of all VMs because one
VM.
2012-06-15 17:42:14 +02:00
Marek Marczykowski
92844a161a
dom0: qvm-run --nogui support for HVM
...
Translate it to "nogui:" command prefix.
2012-06-15 17:40:03 +02:00
Marek Marczykowski
4dfad5f1ae
dom0: qvm-run --nogui switch
...
Can be used to not start guid.
2012-06-15 17:37:19 +02:00
Marek Marczykowski
8bdc5706f7
dom0/core: allow to change default user for qvm-run ( #577 )
...
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 19:01:32 +02:00
Marek Marczykowski
844d43b0ef
dom0/core: introduce is_guid_running() and use it in is_fully_usable()
...
To improve code reuse, especially to remove direct checking for
"/var/run/qubes/guid_running.{0}" in many places.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
c534d5871b
dom0/core: fix order of loading VM attributes
...
Parsing kernelopts depends on uses_default_kernelopts, so set 'order' appropriate.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
6bd988bf81
dom0/core: allow to change default user for qvm-run ( #577 )
...
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 17:16:12 +02:00
Marek Marczykowski
e6a75c732e
dom0/core: support for qrexec for Windows HVM
...
Because not every HVM will have qrexec agent installed, introduce VM property
'qrexec_installed'. If it is set, spawn qrexec_daemon at VM startup and allow
use of qvm-run.
2012-06-13 17:14:25 +02:00
Marek Marczykowski
5504142187
dom0/core: fix race in QubesHVm.stubdom_xid
...
device-model-domid is written to xenstore after domaid id itself, so do not
assume the former is present when we know VM XID.
2012-06-13 17:11:21 +02:00
Marek Marczykowski
784f0f5607
dom0/core/hvm: rename is_fully_usable() to is_guid_running()
...
This is what this function does.
2012-06-13 17:09:06 +02:00
Marek Marczykowski
46db1e83f0
dom0/core: introduce is_guid_running() and use it in is_fully_usable()
...
To improve code reuse, especially to remove direct checking for
"/var/run/qubes/guid_running.{0}" in many places.
2012-06-13 17:08:30 +02:00
Marek Marczykowski
6a929190d2
dom0/core: fix order of loading VM attributes
...
Parsing kernelopts depends on uses_default_kernelopts, so set 'order' appropriate.
2012-06-13 17:01:57 +02:00
Marek Marczykowski
3a8427cee5
dom0: do not reply all udev events at system boot ( #595 )
...
This can cause some rules to fail and eg remove dm-* devices. Replace it with
what is really needed to hide mounted (and other ignored) devices from
qubes-block-devices.
2012-06-13 04:57:38 +02:00
Marek Marczykowski
dfbf078155
dom0: do not reply all udev events at system boot ( #595 )
...
This can cause some rules to fail and eg remove dm-* devices. Replace it with
what is really needed to hide mounted (and other ignored) devices from
qubes-block-devices.
2012-06-13 04:08:09 +02:00
Marek Marczykowski
2eb7c5733d
dom0/core: set network parameters only when VM have network access
2012-06-12 18:25:04 +02:00
Marek Marczykowski
653c056c99
dom0/core: fix HVM network settings in xen config
2012-06-12 18:24:34 +02:00
Marek Marczykowski
f2abc5e26d
dom0: populate unchanged firewall settings with previous values ( #589 )
...
Missed settings in new firewall configuration caused exception. In old qubes-manager (before #582 done) this exception silently broke saving operation, leaving user with progress bar windows infinitely...
2012-06-05 21:21:53 +02:00
Marek Marczykowski
3b8272c1b6
dom0/qvm-ls: replace 'netmask' column with 'ip back' ( #573 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
aea8d189f0
dom0/core: fix QubesVM.gateway
...
To be consistent with QubesNetVM, where gateway property contain gateway IP for
_other_ VMs, in non-network-provider VM it should be empty.
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a528befbc4
dom0: default TemplateVM firewall: block all traffic and allow use of yum proxy ( #590 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a8b992e647
dom0/core: implement per-VM-type firewall defaults
2012-06-05 21:21:53 +02:00
Marek Marczykowski
3f3dc4708c
dom0: populate unchanged firewall settings with previous values ( #589 )
...
Missed settings in new firewall configuration caused exception. In old qubes-manager (before #582 done) this exception silently broke saving operation, leaving user with progress bar windows infinitely...
2012-06-05 20:57:40 +02:00
Marek Marczykowski
2c7227066c
dom0/qvm-ls: replace 'netmask' column with 'ip back' ( #573 )
2012-06-05 19:58:58 +02:00
Marek Marczykowski
3255f81a1c
dom0/core: fix QubesVM.gateway
...
To be consistent with QubesNetVM, where gateway property contain gateway IP for
_other_ VMs, in non-network-provider VM it should be empty.
2012-06-05 19:57:19 +02:00
Marek Marczykowski
8b366f1148
dom0: default TemplateVM firewall: block all traffic and allow use of yum proxy ( #590 )
2012-06-05 19:37:39 +02:00
Marek Marczykowski
01e8a2dff9
dom0/core: implement per-VM-type firewall defaults
2012-06-05 19:37:12 +02:00
Marek Marczykowski
1f194cbe08
dom0: block_cleaner: removes ejected devices from xenstore
...
When device is ejected by some VM (state=6, effectively inactive), it should be
removed from xenstore to free slot for some another device. This should be done
by libxl toolstack, but not implemented in xen 4.1 - AFAIR done in xen 4.2.
2012-06-01 20:59:45 +02:00
Marek Marczykowski
e4f64fd600
dom0/core: remove trailing spaces
2012-05-31 03:11:44 +02:00
Marek Marczykowski
65fc62a989
dom0/core: setup yum to use proxy when it have access to it ( #568 )
...
To simplify configuration, automatically enable 'yum-proxy-setup'
pseudo-service when allowing access to the proxy. Also disable this service,
when access is revoked. Thanks to this the user can enable this feature by one
click in firewall settings.
2012-05-31 03:11:44 +02:00
Marek Marczykowski
ec52d15dfe
dom0/qvm-firewall: add support for 'allowYumProxy' setting ( #568 )
2012-05-31 03:11:44 +02:00
Marek Marczykowski
2ca4b11183
dom0/core-firewall: firewall setting for qubes-yum-proxy ( #568 )
...
New setting for access to qubes-yum-proxy. The difference from other firewall
setting (and reason for new top-level setting): 'deny' is enforced even if
policy is set to 'allow'. This proxy service is mainly used to filter network
traffic, so do not expose it to VMs which can connect to any host directly (eg
'untrusted' VM).
2012-05-31 03:11:44 +02:00