Commit Graph

2394 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
ed3d602140 dispvm: pass VM name to qrexec-daemon
Now qrexec-daemon requires three arguments: domid, domname,
default_user.
2013-10-19 00:07:25 +02:00
Joanna Rutkowska
fb745c2ff2 version 2.1.22 2013-10-18 11:06:42 +02:00
Marek Marczykowski
5e0d8c1155 Pass domain name to qrexec daemon 2013-10-18 03:39:02 +02:00
Joanna Rutkowska
b2a0b69742 version 2.1.21 2013-10-11 12:06:05 +02:00
Marek Marczykowski-Górecki
41ba079eb8 Force the first character of VM name to be a letter
Especially don't allow numeric-only name (our deserializer of qubes.xml
will convert it to int instead of str...).
2013-10-08 22:47:56 +02:00
Marek Marczykowski-Górecki
8f302bf2bc version 2.1.20 2013-10-08 10:44:52 +02:00
Marek Marczykowski-Górecki
e6012a8fd2 Fix qubes.xml unlock code (#748)
Do not call explicit lockf(lOCK_UN) to not unlock the file
buffers are flushed. This is simpler than adding flush() call.
2013-10-02 04:54:10 +02:00
Marek Marczykowski-Górecki
76144df2e7 qvm-backup: respect "include in backups by default" setting (#746) 2013-10-01 03:31:12 +02:00
Marek Marczykowski-Górecki
f74caf876b qvm-backup: support explicit list of VMs to backup 2013-10-01 03:18:44 +02:00
Marek Marczykowski-Górecki
c6d51fd68f version 2.1.19 2013-09-17 04:45:57 +02:00
Marek Marczykowski-Górecki
1525b64e16 Merge remote-tracking branch 'joanna/master' 2013-09-17 04:45:23 +02:00
Marek Marczykowski-Górecki
c43efac87b version 2.1.18 2013-09-16 22:45:12 +02:00
Marek Marczykowski-Górecki
5da7a520c4 core: move pci_add/pci_remove to QubesVM, add support for live add/remove (#708)
This additionally requires qubes.DetachPciDevice service in VM.
2013-09-01 01:26:43 +02:00
Marek Marczykowski
a0cb8dbf7e dispvm: minor fixes
Conflicts:
	dispvm/qubes-prepare-saved-domain.sh
2013-08-13 00:36:49 +02:00
Marek Marczykowski
19982da9d2 QubesVm: drop evals already covered by generic deserializer 2013-08-13 00:33:54 +02:00
Marek Marczykowski
28b8eb0445 Send monitor layout at VM startup.
Gui daemon isn't aware of multihead parameters, also gui protocol
doesn't support such information - currently by design it is configured
via Qubes RPC service.
At GUI startup send monitor layout to the VM.
2013-08-11 04:11:34 +02:00
Marek Marczykowski
42416504bb qvm-prefs: fix checking kernel path 2013-08-09 13:00:07 +02:00
Zrubi
2fc8e7abb0 qubes-hcl-report update + qvm-check
It's now handle dual VGA scenarios, got some other hardware related
improvements, and some usage help text ;)

And because I needed to check if a VM is exists or not just made a
small check script: qvm-check

This is really just  a stripped down version of the existing qvm-* scripts..
2013-07-03 09:47:29 +00:00
Marek Marczykowski
c8b3009b4f One more missing import 2013-06-07 05:40:13 +02:00
Marek Marczykowski
a1e9e3bf1a Fix domain clone/rename 2013-05-25 22:18:37 +02:00
Marek Marczykowski
8b71129445 qvm-template-commit: --offline-mode
Just a placeholder for now, to have common template-builder with Qubes
R3.
2013-05-18 06:01:25 +02:00
Marek Marczykowski
8efba3092c dispvm: fix zenity arguments for error message 2013-05-16 15:53:29 +02:00
Marek Marczykowski
6009ac5021 Remove default runlevel from VM kernel parameters
Runlevels are not used anymore with systemd (it uses target concept).
Remove the parameter as it causes problems with archlinux template.
2013-05-04 05:27:33 +02:00
Marek Marczykowski
3e119a6589 version 2.1.17 2013-03-26 03:05:29 +01:00
Marek Marczykowski
48098accc5 core: fix datetime handling with new imports
Now it is 'import datetime', not 'from datetime import datetime', so use
explicit datetime class from datetime module.
2013-03-26 02:15:34 +01:00
Marek Marczykowski
59d36cfb69 Missing imports... 2013-03-26 01:28:39 +01:00
Marek Marczykowski
0419aee8ab spec: provides qubes-doc-dom0 2013-03-25 16:28:55 +01:00
Marek Marczykowski
17709dcce9 qvm-tools: qvm-run: eturn exitcode!=0 if any command failed 2013-03-25 16:28:55 +01:00
Marek Marczykowski
b0ec7c7b01 Missing import 2013-03-25 16:28:55 +01:00
Marek Marczykowski
ef82b53b64 spec: typo fix 2013-03-25 16:28:55 +01:00
Marek Marczykowski
398f54f99a qvm-tools: remove net-tools dependency part two 2013-03-21 05:20:10 +01:00
Marek Marczykowski
340b62d4d4 Update make clean target 2013-03-20 16:40:01 +01:00
Marek Marczykowski
0ec6da8050 spec: update Requires 2013-03-20 16:37:34 +01:00
Marek Marczykowski
b72fdb35ee Remove support for old builder API 2013-03-19 19:02:15 +01:00
Marek Marczykowski
f7d868bff8 Missing imports once again... 2013-03-19 13:36:35 +01:00
Marek Marczykowski
f33a9857cf Add Makefile.builder 2013-03-18 02:24:49 +01:00
Marek Marczykowski
11243a51d3 QubesHVm: add missing imports again 2013-03-18 02:24:32 +01:00
Marek Marczykowski
4dea00349a QubesHVm: add missing imports 2013-03-16 20:07:11 +01:00
Marek Marczykowski
a84886db07 Move all files one level up 2013-03-16 19:56:51 +01:00
Marek Marczykowski
9db68897c7 Remove other Linux-specific stuff
Move remaining files to linux/ subdirectory.
2013-03-16 19:54:22 +01:00
Marek Marczykowski
fa8d659189 Move dom0-update code to separate repository
This is highly Linux-specific code. Perhaps other systems will have
equivalent, but for now move it to Linux-only repository.
2013-03-16 19:14:26 +01:00
Marek Marczykowski
0c4ea10bda Move standalone qvm-sync-appmenus to core-dom0-linux
It makes no sense to leave standalone tool here while real code is moved
to core-dom0-linux. Also move its manpage.
2013-03-16 18:35:24 +01:00
Marek Marczykowski
a633d331f3 Move icons to separate repository
Because of license reasons (icons are based on GPL resources so can't be
dual licensed).
2013-03-16 18:06:33 +01:00
Marek Marczykowski
bd84ebfd8a Simplify QubesTemplateVm class 2013-03-16 18:05:20 +01:00
Marek Marczykowski
38f3e98f36 Typos 2013-03-16 18:04:53 +01:00
Marek Marczykowski
8edadb40aa Move appmenus handling code to separate repository
This code is highly Linux-specific so move it out of the core
repository.
2013-03-16 18:03:10 +01:00
Marek Marczykowski
8806aeab5c QubesNetVm: use xs module, not xenstore-* command 2013-03-16 17:00:59 +01:00
Marek Marczykowski
471896f38f QubesVm: introduce hooks for plugins
Besides introducing new VM classes, plugins may influence existing VM
behavior. Introduce convenient hooks for it. Without those hooks it still was
possible, but in much less correct way - overriding class methods from
plugin module.
2013-03-16 17:00:51 +01:00
Marek Marczykowski
3ec6d3d237 Do not mark get_attrs_config as internal private method
It is intended to at least be extended by subclasses, so isn't really
internal, rather part of API.
2013-03-16 16:14:07 +01:00
Marek Marczykowski
0f7308ceeb Minor style cleanup (qubes.py only)
Break long lines, remove unused imports, remove dead code
2013-03-16 16:14:07 +01:00