Marek Marczykowski-Górecki
1cd6acd875
core/events: allow handlers return some value
2016-04-07 12:58:01 +02:00
Wojtek Porczyk
93686eae06
qubes/vm: change services to features
2016-03-21 11:43:32 +01:00
Wojtek Porczyk
9eafa57539
Merge remote-tracking branch 'marmarek/master' into core3-devel
...
The following list is bollocks. There were many, many more.
Conflicts:
core-modules/003QubesTemplateVm.py
core-modules/005QubesNetVm.py
core/qubes.py
core/storage/__init__.py
core/storage/xen.py
doc/qvm-tools/qvm-pci.rst
doc/qvm-tools/qvm-prefs.rst
qubes/tools/qmemmand.py
qvm-tools/qvm-create
qvm-tools/qvm-prefs
qvm-tools/qvm-start
tests/__init__.py
vm-config/xen-vm-template-hvm.xml
This commit took 2 days (26-27.01.2016) and put our friendship to test.
--Wojtek and Marek
2016-03-03 01:13:51 +01:00
Wojtek Porczyk
01319e391f
qubes: port netvm
...
From now, there are no separate NetVM and ProxyVM class, but property
"provides_network".
2016-03-03 00:46:05 +01:00
Marek Marczykowski-Górecki
a78ec67071
doc: Change qvm-service name from "cron" to "crond"
2015-12-29 14:19:56 +01:00
Wojtek Porczyk
f1a0b1af39
qubes/tools: add qvm-run, qvm-{,un}pause
...
Also change convention of calling main(): now command returns its
numeric value instead of bool.
Also fixed QSB#13
fixes QubesOS/qubes-issues#1226
2015-12-29 03:43:08 +01:00
Wojtek Porczyk
7b30361fa6
qubes/tools: add qubes-prefs
...
fixes QubesOS/qubes-issues#1209
2015-12-24 00:48:17 +01:00
Marek Marczykowski-Górecki
c337494ba6
Add qvm-pci --add-class option for adding all devices of given class
...
This should reduce code duplication in most of initial setup like places
- currently firstboot and live image setup.
2015-11-25 01:34:15 +01:00
Wojtek Porczyk
2e42a408e5
core3: Add documentation to qubes.exc
...
part of QubesOS/qubes-issues#1279
2015-10-17 00:20:44 +02:00
Wojtek Porczyk
fb6acb5f6b
core3: documentation fixes
2015-10-05 23:57:03 +02:00
Wojtek Porczyk
15713cbf46
qubes/tools: rewrite qvm-kill
...
Also new function, `error_runtime` for common parser.
fixes QubesOS/qubes-issues#1222
2015-10-05 18:06:02 +02:00
Wojtek Porczyk
b0be1ad584
qubes/tools: qvm-start rewritten from original
2015-10-05 12:46:14 +02:00
Wojtek Porczyk
b0af95fa2b
qvm-prefs: support resetting values
2015-10-05 12:46:13 +02:00
Wojtek Porczyk
e7cba0214f
qubes/tools: qvm-prefs
2015-10-05 12:46:13 +02:00
Wojtek Porczyk
067f033af6
qubes/tools/qvm-create: Add internal --no-root option
...
And documentation fixes.
2015-09-28 18:20:28 +02:00
Marek Marczykowski-Górecki
da0e5dd4ba
core: inherit kernelopts from the template by default
...
Fixes qubesos/qubes-issues#1091
2015-08-05 01:43:43 +02:00
Marek Marczykowski-Górecki
7e79cd20a8
doc: wrap long lines in qvm-prefs.rst, content unchanged
2015-08-05 01:34:59 +02:00
Wojtek Porczyk
ff7d89700a
qubes/tools: port qvm-create
2015-06-30 17:18:24 +02:00
Wojtek Porczyk
fd0107f11a
new tool: qubes-create
...
At present it just creates default qubes.xml (empty barring labels and AdminVM).
In the future it can be evolved into backend for firstboot.
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
142521317c
qubes: Documentation for qubes.tools
...
And first documentation for qubes.tools.qvm_ls.
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
e50ca5131f
doc: move manpages to common directory
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
e83d21c671
qubes: more documentation and doc fixes
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
ee06e7d7a2
qubes: documentation and licence fixes
2015-06-29 17:39:27 +02:00
Jason Mehring
be3e888bbe
Fixed typos
2015-06-29 17:39:26 +02:00
Wojciech Zygmunt Porczyk
42d8e67556
doc: Add autogenerated qubes.xml documentation
2015-06-29 17:39:25 +02:00
Wojciech Zygmunt Porczyk
6df316378b
doc: Fix docutils table column width
2015-06-29 17:39:25 +02:00
Wojtek Porczyk
0a94762508
doc: Tutorial for qubes.events and fix
2015-06-29 17:39:25 +02:00
Wojtek Porczyk
b442fb0fab
qubes/doc: Test's documentation improvement
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
de9eb60f61
Developer's documentation for qubes.tests
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
41fef46db2
core3 move: QubesVM
...
This is a big commit and probably incomplete. Tests will follow.
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
1a032ecf2a
core3: basic global events and their documentation
2015-06-29 17:39:24 +02:00
Wojtek Porczyk
2835238a87
doc: manpage formatting
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
a4e1bd98ed
doc: optional sandbox building
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
56092073e9
doc: add hyphens to module page titles
...
Aim is to be more consistent with manpages.
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
2c1cacc0ac
doc: swallow manpages into sphinx
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
96bff66546
qubes.dochelpers: Helpers for Sphinx documentation
...
Currently it is possible to refer to Qubes' tickets via 🎫 `#no`
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
c3dd13c0ab
qubes/log: logging routines
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
1fbb91a1aa
doc/apidoc: enable intersphinx to docs.python.org
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
65595e3b39
apidoc stub
2015-06-29 17:39:22 +02:00
Marek Marczykowski-Górecki
9cbf9a8a59
Add support for 'pci_strictreset' option
...
This allows to assign PCI device to the VM, even if it doesn't support
proper reset. The default behaviour (when the value is True) is to not
allow such attachment (VM will not start if such device is assigned).
Require libvirt patch for this option.
2015-05-28 00:11:17 +02:00
Marek Marczykowski-Górecki
8aaef404de
qvm-prefs: add an option to get a single VM property
...
Could be useful for scripts
2015-05-15 03:22:06 +02:00
Marek Marczykowski-Górecki
d8533bd061
core: do not reset firewal when setting netvm=none
...
It is no longer needed as qubesos/qubes-issues#862 is implemented.
2015-04-04 21:48:03 +02:00
Marek Marczykowski-Górecki
7516737fae
core: Add "dispvm_netvm" property - NetVM for DispVMs started from a VM
...
This allows to specify tight network isolation for a VM, and finally
close one remaining way for leaking traffic around TorVM. Now when VM is
connected to for example TorVM, its DispVMs will be also connected
there.
The new property can be set to:
- default (uses_default_dispvm_netvm=True) - use the same NetVM/ProxyVM as the
calling VM itself - including none it that's the case
- None - DispVMs will be network-isolated
- some NetVM/ProxyVM - will be used, even if calling VM is network-isolated
Closes qubesos/qubes-issues#862
2015-04-04 21:47:31 +02:00
Wojtek Porczyk
20b3fdedb8
rename netvm -> sys-net, firewallvm -> sys-firewall
2015-03-31 20:42:53 +02:00
qjoo
d69b03e5e0
qubes-firewall is not supported in netvms
2015-03-30 22:31:20 +02:00
qjoo
9659c33a09
qvm-service: +disable-dns-server/disable-default-route
...
The logic for set-default-route/set-dns-server has been inverted.
2015-03-30 22:31:20 +02:00
Marek Marczykowski-Górecki
db95153619
doc: typo fix
2015-01-30 01:40:41 +01:00
Marek Marczykowski-Górecki
2f7b3adeec
doc: qvm-create-default-dvm ( #940 )
2015-01-30 01:39:59 +01:00
Marek Marczykowski-Górecki
c2675c00e7
doc: sync qvm-service documentation
2015-01-30 01:39:59 +01:00
Marek Marczykowski-Górecki
59a5ae9415
doc: add qvm-services: set-default-route, set-dns-server
2015-01-30 01:39:59 +01:00