Wojtek Porczyk
8afba4c5e9
core3 move: storage/*
2015-06-29 17:39:26 +02:00
Wojtek Porczyk
5f92afc013
rpm: install RelaxNG specfiles
2015-06-29 17:39:26 +02:00
Wojtek Porczyk
7e12d0485d
add core3 to Makefiles and spec
2015-06-29 17:39:26 +02:00
Wojtek Porczyk
2c1cacc0ac
doc: swallow manpages into sphinx
2015-06-29 17:39:23 +02:00
Marek Marczykowski-Górecki
9cbf9a8a59
Add support for 'pci_strictreset' option
...
This allows to assign PCI device to the VM, even if it doesn't support
proper reset. The default behaviour (when the value is True) is to not
allow such attachment (VM will not start if such device is assigned).
Require libvirt patch for this option.
2015-05-28 00:11:17 +02:00
Marek Marczykowski-Górecki
d02aa70e93
dispvm: speedup sparse files handling by using bsdtar
...
Apparently it is much faster. Especially during savefile preparation -
tar reads the whole file, while bsdtar gets file map and reads only used
regions.
2015-03-30 05:29:14 +02:00
Marek Marczykowski-Górecki
c74fda802c
Use tmpfile.d to create /var/run subdirs
...
This way it will be done much earlier, so qubes-db can be started before
qubes-core.service - which will solve startup dependency loop problem.
2015-02-02 04:48:42 +01:00
Marek Marczykowski-Górecki
ce716f9c5a
rpm: add R: PyQt4 for guihelpers module
...
It was pulled by qubes-manager, but since it is optional, we shouldn't
rely on its dependencies.
2014-11-21 20:09:57 +01:00
Marek Marczykowski-Górecki
37696b7d43
rpm: move xenconsoled configuration to xen package
2014-11-19 12:50:32 +01:00
Marek Marczykowski-Górecki
5b0b62ee5b
rpm: fix path
2014-11-19 12:50:28 +01:00
Marek Marczykowski-Górecki
ec17f7d329
core/xen: setup xen-specific defaults in separate settings file
2014-11-19 12:50:26 +01:00
Marek Marczykowski-Górecki
0a1f3d0a44
core: split VM images handling to separate class
...
This will ease handling different types of VMM (which can require
different image types, location etc).
2014-11-19 12:50:25 +01:00
Marek Marczykowski-Górecki
72e415a807
move qubes-notify-* to libexec
2014-11-19 12:50:25 +01:00
Marek Marczykowski-Górecki
ed13972e4e
Remove xenstore-watch-qubes
...
Since we have Qubes DB, it needed anymore.
2014-11-19 12:50:24 +01:00
Marek Marczykowski-Górecki
0009805041
rpm+makefile: move build/install code to Makefile files
...
This makes build "scripts" not tied to Fedora-specific files. Especially
ease porting to other platforms.
2014-11-19 12:50:24 +01:00
Marek Marczykowski
f159f3e168
Use QubesDB instead of Xenstore.
...
Mostly done. Things still using xenstore/not working at all:
- DispVM
- qubesutils.py (especially qvm-block and qvm-usb code)
- external IP change notification for ProxyVM (should be done via RPC
service)
2014-11-19 12:48:28 +01:00
Marek Marczykowski
31424603fa
rpm: move R: xen-runtime inside vmm-xen deps block
...
Do not depend on xen package unconditionally.
2014-11-19 12:48:28 +01:00
Marek Marczykowski
c95dc298a1
rpm: set sgid for data directories
...
Make sure that contents belong to qubes group, even when created by root
user.
2014-11-19 12:48:27 +01:00
Marek Marczykowski
5db1957086
rpm: improve deps on libvirt
...
Use metapackage to install all required libvirt modules.
2014-11-19 12:48:27 +01:00
Marek Marczykowski
9f90106db4
rpm: Add libvirt to dependencies
2014-11-19 12:48:26 +01:00
Marek Marczykowski
0f6b878664
rpm: update build dependencies
2014-11-19 12:48:26 +01:00
Marek Marczykowski
201cd509e1
QubesDom0NetVm: provide get_mem*
...
As libvirt doesn't keep dom0 domain object, so add special cases to get
memory information.
2014-11-19 12:48:26 +01:00
Marek Marczykowski
107ebad9d5
Migration to libvirt - DispVM
...
Move DispVM creation to qfile-daemon-dvm/QubesDisposableVm from
qubes-restore. As actual restore is handled by libvirt, we don't get
much from separate qubes-restore process.
This code still needs some improvements, especially on performance.
2014-11-19 12:48:26 +01:00
Marek Marczykowski
f44dc40858
Migration to libvirt - HVM
2014-11-19 12:47:00 +01:00
Marek Marczykowski
a880483092
Migration to libvirt - core part
...
Still not all code migrated, added appropriate TODO/FIXME comments.
2014-11-19 12:47:00 +01:00
Marek Marczykowski
b242680cc1
spec: fix typi in %post
2014-11-19 12:46:59 +01:00
Marek Marczykowski-Górecki
9e62b77ecd
rpm: require qubes-core-dom0-linux >= 2.0.24 for qrexec '-q' option
2014-10-25 01:46:26 +02:00
Marek Marczykowski-Górecki
603384b4c6
tests: add initial backup test
2014-09-18 08:25:56 +02:00
Marek Marczykowski-Górecki
1ed9c74d83
Rearrange code to not import PyQt on every qvm-* call
...
Move notification functions to separate file (out of guihelpers).
2014-06-05 01:59:42 +02:00
Wojciech Zygmunt Porczyk
30e557960a
qubes-rpc-policy/qubes.GetImageRGBA.policy
...
needed for qubes-app-linux-img-converter
2014-05-20 17:49:20 +02:00
Wojciech Zygmunt Porczyk
2d907a5443
move site-packages/qubes/__init__.py to linux-utils
...
__init__.py should still remain in repo to make it possible to do import
directly from repository
2014-05-20 12:55:35 +02:00
Marek Marczykowski-Górecki
6efec32c3b
rpm: drop dependency on kernel-qubes-dom0
...
Since dom0 support is in mainline kernel we no longer strictly require
our patched kernel. So drop the dependency. Note that installer will
still install the right kernel.
2014-05-11 15:42:04 +02:00
Marek Marczykowski-Górecki
8694e4ffbb
rpm: specify qubes-core-dom0-linux version
...
qrexec-client cmdline options have changed.
2014-04-16 16:44:42 +02:00
Marek Marczykowski-Górecki
cd54af231b
version 2.1.45
2014-04-15 04:14:46 +02:00
Marek Marczykowski-Górecki
7af90433b1
version 2.1.44-2
2014-04-08 22:08:24 +02:00
Marek Marczykowski-Górecki
e1df9f252c
spec: initialize default kernel when creating qubes.xml database
...
This is especially important when kernel-qubes-vm's %post was executed
before qubes-core-dom0's %post - in that case, the default kernel would
be left as "None".
2014-04-08 05:06:12 +02:00
Marek Marczykowski-Górecki
e90e1c62ec
proxyvm: add support for rules with expire time ( #760 )
2014-03-28 02:54:59 +01:00
Marek Marczykowski-Górecki
bba989e0a6
Move meminfo-writer to linux-utils repo
...
It is common for both dom0 and VM, and also quite linux-specific
(other OSes will need other implementation). So move to linux-specific
repo (not dom0-specific).
2014-01-05 05:36:50 +01:00
Marek Marczykowski-Górecki
27f6f0e64e
Merge branch 'new-backups'
...
Conflicts:
core-modules/000QubesVm.py
2013-11-29 04:00:58 +01:00
Marek Marczykowski-Górecki
c781a522d8
backups: move backup code to separate file
...
Also some major cleanups: Reduce some more code duplication
(verify_hmac, simplify backup_restore_prepare). Rename
backup_dir/backup_tmpdir variables to better match its purpose. Rename
backup_do_copy back to backup_do. Require QubesVm object (instead of VM
name) as appvm param.
2013-11-25 05:41:13 +01:00
Marek Marczykowski-Górecki
6fddae3b9b
Support for autostart VMs ( #724 )
2013-11-20 02:57:17 +01:00
Marek Marczykowski-Górecki
e2c43d2292
Allow HVM to notify dom0 about tools installation
...
HVM can set some xenstore entries (in qubes-tools/ subtree) to pass
informations about installed tools to dom0. qubes.NotifyTools service
triggers update of VM properties (like qrexec_installed).
This way, after installation of Qubes Windows Tools, the user doesn't need
to change any VM settings to use the tools.
2013-10-28 05:09:54 +01:00
Marek Marczykowski
0419aee8ab
spec: provides qubes-doc-dom0
2013-03-25 16:28:55 +01:00
Marek Marczykowski
ef82b53b64
spec: typo fix
2013-03-25 16:28:55 +01:00
Marek Marczykowski
0ec6da8050
spec: update Requires
2013-03-20 16:37:34 +01:00
Marek Marczykowski
a84886db07
Move all files one level up
2013-03-16 19:56:51 +01:00
Marek Marczykowski
9db68897c7
Remove other Linux-specific stuff
...
Move remaining files to linux/ subdirectory.
2013-03-16 19:54:22 +01:00
Marek Marczykowski
fa8d659189
Move dom0-update code to separate repository
...
This is highly Linux-specific code. Perhaps other systems will have
equivalent, but for now move it to Linux-only repository.
2013-03-16 19:14:26 +01:00
Marek Marczykowski
a633d331f3
Move icons to separate repository
...
Because of license reasons (icons are based on GPL resources so can't be
dual licensed).
2013-03-16 18:06:33 +01:00
Marek Marczykowski
8edadb40aa
Move appmenus handling code to separate repository
...
This code is highly Linux-specific so move it out of the core
repository.
2013-03-16 18:03:10 +01:00
Marek Marczykowski
ecd8837113
Split core qubes.py into modules
2013-03-16 16:14:01 +01:00
Marek Marczykowski
41675aa30a
spec: remove obsolete network setup
2013-03-15 23:54:49 +01:00
Marek Marczykowski
341f202a26
The Underscores Revolution: filenames
2013-03-15 23:03:28 +01:00
Marek Marczykowski
e1472df9dd
Remove obsolete files
2013-03-14 15:05:07 +01:00
Marek Marczykowski
820ee45f03
Minor 'misc' and 'aux-tools' directory cleanup
2013-03-14 13:48:28 +01:00
Marek Marczykowski
50a8068e6f
Rename qvm-core -> core
2013-03-14 04:49:48 +01:00
Marek Marczykowski
c90f5199dd
The Underscores Revolution: RPC services
2013-03-14 01:22:43 +01:00
Marek Marczykowski
fe7d62f077
Move qmemman.conf to qmemman dir
2013-03-14 01:18:27 +01:00
Marek Marczykowski
1d8222dbdb
Remove Fedora-comps.xml
...
We have now own Qubes-comps.xml, so use it if present.
2013-03-14 00:55:20 +01:00
Marek Marczykowski
e4264f4917
Remove SysV-init scripts
...
Now dom0 uses SystemD, so init.d scripts no longer needed.
2013-03-13 06:14:07 +01:00
Marek Marczykowski
d9358a91aa
Move manpages here from separate repo
2013-03-12 17:02:26 +01:00
Marek Marczykowski
ad2bdf0634
Rename 'version_dom0' -> 'version'
...
This repository contains only dom0 files now.
2013-03-12 16:50:14 +01:00
Marek Marczykowski
fce0db13c9
move qvm-create-default-dvm to qvm-tools dir
2013-03-12 16:12:23 +01:00
Marek Marczykowski
fcf51c6a6f
Remove qclipd - now part of qubes-manager
2013-03-12 16:00:31 +01:00
Marek Marczykowski
844cb21544
Require dmidecode - for qubes-hcl-report tool
2013-03-09 22:20:47 +01:00
Marek Marczykowski
b3c9c74a50
move dispvm files to more meaningful directory
2013-03-08 17:26:55 +01:00
Marek Marczykowski
0e8037deee
remove VM files
2013-03-07 05:07:42 +01:00
Marek Marczykowski
f4c37be03a
remove qubes-core-libs files - moved to separate repository
2013-03-07 02:54:55 +01:00
Marek Marczykowski
3c3252b2a3
Remove qrexec - moved to separate package
2013-03-07 02:30:03 +01:00
Marek Marczykowski
325cf4b894
forgotten subdir
2013-03-06 18:41:10 +01:00
Marek Marczykowski
ca2a54b2b1
do install files used by dom0 netvm
...
We don't support dom0 netvm anymore.
2013-03-06 18:38:08 +01:00
Marek Marczykowski
7d07a6cf50
move dom0 files to dom0 subdirectory
...
Those files are actually common for dom0 and VM, but as we splitted the repos,
move them accordingly.
2013-03-06 18:37:58 +01:00
Marek Marczykowski
8fc805f34a
vm/systemd: disable avahi-daemon
...
Aparently this service have changed name, so make sure it will be disabled also
under new name.
2013-03-03 17:35:54 +01:00
Marek Marczykowski
35e01c4165
dom0/spec: improve PackageKit settings
...
1. Do not try to tell "no network detected"
2. Do not try to tell "Distribution upgrade detected - Fedora 16"
2013-03-01 01:36:05 +01:00
Marek Marczykowski
d89bdac58c
dom0: create volatile.img if not exists (StandaloneVM case)
...
StandaloneVM have no template to get clean volatile.img. Normally it is copied
from template during VM creation, but it can happen that image would not extx
(e.g. after backup restore). So create it from scratch.
Stay with original approach (restoring from clean image of template) for other
cases as it is much simpler (and perhaps faster).
2013-02-27 05:29:27 +01:00
Marek Marczykowski
d12e532fc2
vm: Use nautilus-actions to provide "Copy to other AppVM" etc nautilus commands
...
No more ugly symlink creation at VM startup, nautilus-actions have system-wide
dir (in opposite to nautilus-scripts).
Currently old symlinks are not cleaned up. Maybe it should, but leaving them
have one advantage: will not break existing users behavior.
2013-02-21 16:44:16 +01:00
Marek Marczykowski
8d347cb455
vm/spec: mark some config files with %config(noreplace)
...
Do mark such critical files, which shouldn't be modified by the user.
2013-02-21 07:25:47 +01:00
Marek Marczykowski
9310f398d5
dom0/spec: own qubes python subdir
2013-02-21 04:32:55 +01:00
Marek Marczykowski
b214fa6f9d
dom0: Scale icons to 48x48
...
We register them as 48px icons, so scale them to that size (originally 600px).
Specifically required by gui-daemon which require prescalled icon.
2013-02-19 01:05:22 +01:00
Marek Marczykowski
cd4c62fc42
dom0/systemd: disable xendomains.service
2013-02-13 16:55:07 +01:00
Marek Marczykowski
0e39e961ea
dom0/systemd: Rename qubes-dispvm to qubes-setupdvm
...
This is more accurate name. Also "qubes-setupdvm" is already used in
some places, so change service name instead of changing that places (at
least qubes-core.service).
2013-02-13 16:52:38 +01:00
Marek Marczykowski
eb5ba60da7
vm/spec: force legacy iptables services
2013-02-12 01:38:30 +01:00
Marek Marczykowski
22a0d391c2
vm: revert /etc/yum.conf exclude config
...
Upgrade of kernel is suppressed by qubes-vm-kernel-placeholder package.
Excluding xorg packages makes more problems than goods (e.g. unable to
install dummy driver, block fedora bugfixes).
2013-02-12 01:38:30 +01:00
Marek Marczykowski
0936152e12
vm/systemd: disable NetworkManager-wait-online when NM inactive
2013-02-12 01:38:30 +01:00
Marek Marczykowski
268cbfdc84
vm: require net-tools
...
Needed to setup network in VM
2013-02-12 01:38:30 +01:00
Marek Marczykowski
07d7957caa
dom0: install PolicyKit allow-all rules
...
Same purpose as sudo rule - the user already can do almost all
administrative tasks and access all VMs data, so do disable annoying
password prompt (eg at system shutdown), which do not add any real
security layer.
2013-02-12 01:38:29 +01:00
Marek Marczykowski
1579340802
vm: move polkit configs from qubes-gui-vm package
2013-02-12 01:38:29 +01:00
Marek Marczykowski
d2dc386997
vm/kernel-placeholder: update provided version
...
Some fc18 packages requires >3.5 kernel, so update kernel-placeholder
appropriate (according to newest available package in unstable
repository).
2013-02-12 01:38:29 +01:00
Marek Marczykowski
b8ccfd6e2e
dom0/init: implement systemd unit files
...
They cover standard init.d scripts when system have systemd, so can be placed
both in one package.
2013-01-27 00:04:40 +01:00
Marek Marczykowski
d99ebe043c
dom0/updates: add groups definition from fc18
2013-01-26 23:58:44 +01:00
Marek Marczykowski
75fc222545
dom0/dracut: support new dracut module interface
2013-01-25 03:09:18 +01:00
Marek Marczykowski
c5ae049e3b
Revert "dom0/spec: fix HVM settings on upgrade"
...
This reverts commit 4b44f977db
.
This doesn't actually fix the problem, because in %post new qubes.py is already
installed and maxmem=memory is no longer true.
2013-01-11 15:28:55 +01:00
Marek Marczykowski
4b44f977db
dom0/spec: fix HVM settings on upgrade
...
HVM should have meminfo-writer disabled by default (and now have). But existing
VMs have it already enabled so it must be fixed now. Generic HVM isn't capable
of dynamic memory management.
Previously it was forced to always have maxmem=memory but it wasn't fully
correct because someone could install Qubes agents/PV drivers including
meminfo-writer and xen-balloon even in HVM so it should be possible to turn it.
2013-01-11 05:05:44 +01:00
Olivier Medoc
6d6c744f2c
vm/qubes_rpc: implement qubes.WaitForSession
...
RPC call will be used in vm.start function instead of the hardcoded echo > /tmp/qubes-session-waiter
2013-01-11 01:12:23 +01:00
Marek Marczykowski
0b078a5e70
qubes-core-vm-kernel-placeholder 1.0-2
2013-01-04 13:23:48 +01:00
Marek Marczykowski
74054b4dda
vm/kernel-placeholder: provide xorg-x11-drv-nouveau to resolve deps problem
2013-01-04 13:23:20 +01:00
Marek Marczykowski
554d119fae
spec: generate proper debuginfo packages
...
%setup macro must be present in %prep to set variables required by
find-debuginfo script. Symlink is to place sources in nice
/usr/src/debug/%{name}-%{version} subdir instead of plain /usr/src/debug/core
(which can be ambiguous).
Additionally all packages need to have _builddir pointing at top src dir (in
core-dom0 it was dom0 subdir). And to cheat make about current dir (to have
%{name}-%{version} included in path) chdir must be done by shell, not make - so
can't use make -C.
2012-12-12 04:12:59 +01:00
Marek Marczykowski
02e7469be3
spec: do not build u2mfn not packaged in core-dom0 and core-vm
...
This is packages in core-libs, so build it only there.
2012-12-12 04:10:41 +01:00
Marek Marczykowski
e75d2fc57a
vm/spec: do not remote 50-qubes_misc.rules during installation
2012-11-22 08:22:52 +01:00
Marek Marczykowski
19983edc3c
vm: setup /dev/xen/evtchn permissions using udev rule
...
This works also when the device is recreated, which is the case in DispVM
(during xl restore).
2012-11-22 00:51:18 +01:00
Marek Marczykowski
3a3e265d1d
vm: load dummy-hcd module to suppress libusb bug
...
libusb crashes when no USB controller is present, load dummy-hcd as workaround.
2012-11-19 17:52:16 +01:00
Marek Marczykowski
0a6e95225a
vm: remove qubes-upgrade-vm after upgrade
2012-11-15 21:38:39 +01:00
Marek Marczykowski
629038e76d
spec: extract core libs from qubes-core-vm
...
This libs are required by both dom0 and VM so it's better to have it
separately. Previously in VM it was separate package, but dom0 have them
embedded in qubes-core-dom0, but qubes-core-vm-libs package was used to build
qubes-gui-dom0. Now we do not build all packages for all distros (especially do
not build core-vm package for dom0 distro, so gui-dom0 build fails), so make it
explicit which package is needed by which system.
2012-11-14 13:12:51 +01:00
Marek Marczykowski
504b37e378
dom0/spec: remove obsoleted patch_appvm_initramfs.sh
...
For a long time dracut module is used instead.
2012-11-13 03:45:12 +01:00
Marek Marczykowski
67e9a785fb
spec: fix compilation order
2012-11-08 00:02:13 +01:00
Marek Marczykowski
f45e6c92c5
spec: add missing 'make' call
2012-11-07 18:05:17 +01:00
Marek Marczykowski
cb31b333ae
vm/spec: fix NotShowIn entries in autostart desktop files
2012-11-03 05:22:03 +01:00
Marek Marczykowski
7fec0fd6f3
dom0/updates: include pkg groups metadata from Fedora 13
...
This will allow calls like "qubes-dom0-update @XFCE"
2012-10-23 05:47:09 +02:00
Marek Marczykowski
e9025d3690
dom0/spec: fix file permissions in package
2012-10-23 05:46:25 +02:00
Marek Marczykowski
a432b729fa
vm/qvm-usb: include vusb-ctl in VM package
2012-10-23 05:45:47 +02:00
Alexandre Bezroutchko
b2a784d35f
adjust rpm spec file to cover compiled python files
2012-10-21 20:59:17 +02:00
Alexandre Bezroutchko
5d4cf00899
dvp/qvm-usb: converted installer scripts into RPM
2012-10-21 15:10:40 +02:00
Marek Marczykowski
e35b413c19
dom0/spec: add R: python-lxml for pretty print
2012-10-19 02:21:41 +02:00
Marek Marczykowski
d03bab3db2
Merge branch 'master-for-hvm' into hvm
...
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
2012-10-04 05:45:41 +02:00
Marek Marczykowski
490a5e9e1a
vm/spec: fix adding yum-proxy configuration
...
Do not add entry if already present.
2012-10-04 05:44:20 +02:00
Bruce A Downs
d19a3cce99
vm: Added 'most recently used' feature to 'copy to vm' dialog
...
* replaced zenity to qvm-mru-entry in qubes_rpc/qvm-copy-to-vm.gnome
* added python script qubes_rpc/qvm-mru-entry
* added /usr/bin/qvm-mru-entry to rpm_spec/core-vm.spec
2012-10-04 05:44:19 +02:00
Bruce A Downs
dba7d94fba
vm/spec: mod to core-vm.spec to add test for files
...
core rpm was failing during uninstall attempting to move non-existent files
* /var/lib/qubes/fstab.orig
* /var/lib/qubes/serial.orig
2012-10-04 05:44:19 +02:00
Marek Marczykowski
303d4ab042
dom0/iptables: block IPv6 traffic
...
Dom0 is network isolated anyway, but apply also firewall in case of use
qubes-dom0-network-via-netvm.
2012-10-04 05:44:19 +02:00
Marek Marczykowski
9c3f8417d4
vm/iptables: block IPv6 traffic
...
This isn't properly handled by Qubes VMs yet, so block it in all the VMs.
Also restrict access to firewall config.
2012-10-04 05:44:19 +02:00
Marek Marczykowski
9519d843d8
dom0/spec: mark qrexec policy as config files
...
Prevent override on upgrade, when user makes some own changes (especially
"always allow" feature).
2012-10-04 05:44:18 +02:00
Marek Marczykowski
6419fea4ce
vm/spec: fix adding yum-proxy configuration
...
Do not add entry if already present.
2012-10-04 05:29:10 +02:00
Marek Marczykowski
4e2f47d95c
dom0/spec: mark qrexec policy as config files
...
Prevent override on upgrade, when user makes some own changes (especially
"always allow" feature).
2012-08-27 00:53:58 +02:00
Marek Marczykowski
c0455ac641
Merge branch 'master' into hvm
...
Conflicts:
dom0/qvm-tools/qvm-create
version_dom0
2012-08-23 11:11:59 +02:00
Marek Marczykowski
a98020eca7
dom0+vm/qfile-copy: use setuid instead of policy setting to allow chroot
...
This will allow to not hardcode "root" username in policy, which can be useful
for non-Linux systems.
2012-08-18 21:17:07 +02:00
Marek Marczykowski
9b3a77bc1d
dom0: move RPC services to separate directory ( #654 )
...
This makes more clear which code have contact with untrusted data from VM.
2012-08-16 16:56:16 +02:00
Marek Marczykowski
a67bf1f1c0
Merge branch 'master' into hvm
2012-08-06 15:00:02 +02:00
Marek Marczykowski
fa17c541af
dom0: cleanup dead DispVMs at system startup ( #648 )
2012-08-04 00:57:34 +02:00
Marek Marczykowski
e6c8bf81fd
Merge branch 'master' into hvm
...
Conflicts:
version_dom0
2012-08-01 00:55:05 +02:00
Marek Marczykowski
b7d2667b1d
vm/kernel-placeholder: simplify upgrade
2012-07-30 23:16:05 +02:00
Marek Marczykowski
d1b827e1bd
Merge branch 'master' into hvm
...
Conflicts:
dom0/init.d/qubes_core
rpm_spec/core-dom0.spec
version_dom0
2012-07-25 02:52:00 +02:00
Marek Marczykowski
b691f57bbf
vm: kernel-placeholder package to inhibit real kernel pkg in VM ( #645 )
...
Some packages depends on kernel (ex fuse, pulseaudio), but kernel in VM is
managed by dom0. Any hack like exlude or so on will break some things, so
install empty placeholder package to fulfill dependencies.
2012-07-23 23:17:50 +02:00
Marek Marczykowski
f98bf1d570
dom0: fix dirs permissions after xen upgrade
2012-07-20 13:08:18 +02:00
Marek Marczykowski
38e8b85b06
dom0: fix dirs permissions after xen upgrade
2012-07-18 12:46:36 +02:00
Marek Marczykowski
0f6f445ece
Revert "vm/spec: disable pam_systemd globally ( #607 )" ( #626 )
...
This reverts commit 8ec4b6963b71b95bc0cda6dd80d99bf60aa9caec.
This caused regression (#626 ).
Conflicts:
rpm_spec/core-vm.spec
2012-07-16 13:36:08 +02:00
Marek Marczykowski
eeabd3b371
Revert "vm/spec: disable pam_systemd globally ( #607 )" ( #626 )
...
This reverts commit 8ec4b6963b71b95bc0cda6dd80d99bf60aa9caec.
This caused regression (#626 ).
Conflicts:
rpm_spec/core-vm.spec
2012-07-16 12:49:41 +02:00
Marek Marczykowski
d9291ab2b4
dom0/appmenus: Rename dir entry for ServiceVMs ( #627 )
2012-07-15 02:41:23 +02:00
Marek Marczykowski
06ba3f6e49
vm: implement qubes.GetAppmenus to reduce code duplication
...
As one-liner services are now real one-line, just do it.
2012-07-15 02:41:23 +02:00
Marek Marczykowski
20f6c6c6dc
vm: simplify qubes.VMShell service
...
Now additional wrapper not required to skip cmdline argument
2012-07-15 02:41:23 +02:00
Marek Marczykowski
b6b50b6fea
dom0/appmenus: Rename dir entry for ServiceVMs ( #627 )
2012-07-15 02:26:17 +02:00
Marek Marczykowski
1c096ec65c
vm: implement qubes.GetAppmenus to reduce code duplication
...
As one-liner services are now real one-line, just do it.
2012-07-15 02:26:09 +02:00
Marek Marczykowski
15d5a1205d
vm: simplify qubes.VMShell service
...
Now additional wrapper not required to skip cmdline argument
2012-07-15 02:04:17 +02:00
Marek Marczykowski
906332ea40
vm: export SuspendPre and SuspendPost qrexec services ( #617 )
...
1. Try to use NetworkManager sleep command instead of shutting it down
2. Move sleep action details (which is VM-specific) to VM
3. Export it as qrexec service(s)
2012-07-13 14:44:11 +02:00
Marek Marczykowski
6d6f43fb4e
vm: export SuspendPre and SuspendPost qrexec services ( #617 )
...
1. Try to use NetworkManager sleep command instead of shutting it down
2. Move sleep action details (which is VM-specific) to VM
3. Export it as qrexec service(s)
2012-07-13 14:40:52 +02:00
Marek Marczykowski
718f5c2bdb
vm: provide dispvm-dotfiles and dispvm-prerun.sh in rpm package ( #620 )
2012-07-12 14:22:44 +02:00
Marek Marczykowski
b92bb698be
vm: provide dispvm-dotfiles and dispvm-prerun.sh in rpm package ( #620 )
2012-07-12 14:21:44 +02:00
Marek Marczykowski
954b4e6947
vm/systemd: disable additional useless services ( #620 )
...
Most of them relay on direct network acces, which isn't true on Qubes.
2012-07-12 03:56:09 +02:00
Marek Marczykowski
ca7ec2aa57
vm/spec: remove dupplicated commnds, suppress error message
2012-07-12 03:56:09 +02:00
Marek Marczykowski
00778cacea
dom0/spec: suppress unnecessary messages during package upgrade
2012-07-12 03:56:09 +02:00
Marek Marczykowski
6aeaa7b036
vm/systemd: disable additional useless services ( #620 )
...
Most of them relay on direct network acces, which isn't true on Qubes.
2012-07-12 03:54:41 +02:00
Marek Marczykowski
212d4227c8
vm/spec: remove dupplicated commnds, suppress error message
2012-07-12 03:54:41 +02:00
Marek Marczykowski
f0d55138d3
dom0/spec: suppress unnecessary messages during package upgrade
2012-07-12 03:54:34 +02:00
Marek Marczykowski
302191edec
vm/spec: disable pam_systemd only in trigger
...
The %post part is unnecessary.
2012-07-09 15:54:33 +02:00
Marek Marczykowski
c1f5377b1d
vm/spec: disable pam_systemd only in trigger
...
The %post part is unnecessary.
2012-07-09 15:52:42 +02:00
Marek Marczykowski
8b2be6b693
dom0/spec: remove some udev rules from system ( #605 )
2012-07-05 01:43:32 +02:00
Marek Marczykowski
c4888add66
vm: disable D-Bus activation of NetworkManager ( #610 )
2012-07-05 01:43:32 +02:00
Marek Marczykowski
b834e2c5a7
vm/spec: disable pam_systemd globally ( #607 )
...
Actually all /etc/pam.d/ files containing pam_systemd.so are autogenerated by
authconfig, so "removing" pam_systemd.so file as not elegant solution, seems to
be much more realiable.
2012-07-05 01:43:32 +02:00
Marek Marczykowski
3ccc43ede2
dom0/spec: remove some udev rules from system ( #605 )
2012-07-05 01:40:38 +02:00
Marek Marczykowski
725e724044
vm: disable D-Bus activation of NetworkManager ( #610 )
2012-07-05 01:33:22 +02:00
Marek Marczykowski
f20099f05b
vm/spec: disable pam_systemd globally ( #607 )
...
Actually all /etc/pam.d/ files containing pam_systemd.so are autogenerated by
authconfig, so "removing" pam_systemd.so file as not elegant solution, seems to
be much more realiable.
2012-07-05 01:31:32 +02:00
Marek Marczykowski
0006ebdaff
vm/spec: fix enabling NetworkManager SystemD service
2012-06-26 03:43:36 +02:00
Marek Marczykowski
a6c7d0efbe
vm/spec: fix error messages
2012-06-26 03:43:36 +02:00
Marek Marczykowski
da63af599c
vm/spec: fix enabling of qubes-firewall SysV service
2012-06-26 03:43:36 +02:00
Marek Marczykowski
2e7d5cc178
dom0: appmenu to start Firefox in new DispVM ( #594 )
2012-06-26 03:43:36 +02:00
Marek Marczykowski
4f7656e36f
vm/spec: fix enabling NetworkManager SystemD service
2012-06-26 03:36:22 +02:00
Marek Marczykowski
4cc7d9300f
vm/spec: fix error messages
2012-06-26 03:31:28 +02:00
Marek Marczykowski
71c4ca8804
vm/spec: fix enabling of qubes-firewall SysV service
2012-06-26 03:30:06 +02:00
Marek Marczykowski
0008e71784
dom0: appmenu to start Firefox in new DispVM ( #594 )
2012-06-24 14:09:43 +02:00
Marek Marczykowski
f53ebfc3cd
vm: RPC service for NTP time sync ( #603 )
2012-06-23 00:37:47 +02:00
Marek Marczykowski
8e61660687
vm: RPC service for NTP time sync ( #603 )
2012-06-22 22:22:57 +02:00
Marek Marczykowski
288dcc562e
vm: enable yum-qubes-hooks plugin ( #592 )
2012-06-11 22:35:44 +02:00
Marek Marczykowski
5354249102
vm: enable yum-qubes-hooks plugin ( #592 )
2012-06-08 00:34:11 +02:00
Marek Marczykowski
01ca42b5c4
vm/spec: create firmware symlink only when needed
...
On new systems, like FC16+, firmware is provided by separate package (like
linux-firmware), so no longer need to get it from kernel package.
2012-06-06 03:02:58 +02:00
Marek Marczykowski
4463701bf3
vm/spec: depend on ethtool _package_
2012-06-06 03:02:58 +02:00
Marek Marczykowski
ad6bfe3ca1
vm/spec: create firmware symlink only when needed
...
On new systems, like FC16+, firmware is provided by separate package (like
linux-firmware), so no longer need to get it from kernel package.
2012-06-06 03:00:05 +02:00
Marek Marczykowski
4911ca7eb9
vm/spec: depend on ethtool _package_
2012-06-06 02:59:07 +02:00
Marek Marczykowski
79f13d6c66
vm: yum plugin to notify dom0 about installed updates ( #592 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
ea08560e43
makefile: rename vchan Makefile to not conflict with windows build
2012-06-05 21:21:53 +02:00
Marek Marczykowski
8023c66020
vm: yum plugin to notify dom0 about installed updates ( #592 )
2012-06-05 19:28:59 +02:00
Marek Marczykowski
dd60d3da95
makefile: rename vchan Makefile to not conflict with windows build
2012-06-02 12:32:49 +02:00
Marek Marczykowski
1f194cbe08
dom0: block_cleaner: removes ejected devices from xenstore
...
When device is ejected by some VM (state=6, effectively inactive), it should be
removed from xenstore to free slot for some another device. This should be done
by libxl toolstack, but not implemented in xen 4.1 - AFAIR done in xen 4.2.
2012-06-01 20:59:45 +02:00
Marek Marczykowski
4bac57818e
vm/qubes-yum-proxy: setup yum to use qubes-yum-proxy ( #568 )
...
The simplest way is just add proxy=... entry to /etc/yum.conf, but sometimes it
is reasonable to bypass the proxy. Some examples:
- usage of non-standard repos with some exotic file layout, which will be
blocked by the proxy
- usage of repos not-accessible via proxy (eg only via VPN stared in VpnVM)
This commit introduces 'yum-proxy-setup' pseudo-service, which can be
controlled via standard qvm-service or qubes-manager. When enabled - yum will
be configured at VM startup to use qubes proxy, otherwise - to connect directly
(proxy setting will be cleared).
2012-05-31 03:11:44 +02:00
Marek Marczykowski
96508abf2c
vm: qubes-yum-proxy service ( #568 )
...
Introduce proxy service, which allow only http(s) traffic to yum repos. The
filter rules are based on URL regexp, so it isn't full-featured content
inspection and can be easy bypassed, but should be enough to prevent some
erroneus user actions (like clicking on invalid link).
It is set up to intercept connections to 10.137.255.254:8082, so VM can connect
to this IP regardless of VM in which proxy is running. By default it is
started in every NetVM, but this can be changed using qvm-service or
qubes-manager (as always).
2012-05-31 03:11:43 +02:00
Marek Marczykowski
341fbe012c
vm/spec: remove executable perm where not needed
2012-05-31 03:11:43 +02:00
Marek Marczykowski
edc3518ec9
vm/qubes-yum-proxy: setup yum to use qubes-yum-proxy ( #568 )
...
The simplest way is just add proxy=... entry to /etc/yum.conf, but sometimes it
is reasonable to bypass the proxy. Some examples:
- usage of non-standard repos with some exotic file layout, which will be
blocked by the proxy
- usage of repos not-accessible via proxy (eg only via VPN stared in VpnVM)
This commit introduces 'yum-proxy-setup' pseudo-service, which can be
controlled via standard qvm-service or qubes-manager. When enabled - yum will
be configured at VM startup to use qubes proxy, otherwise - to connect directly
(proxy setting will be cleared).
2012-05-31 03:05:13 +02:00
Marek Marczykowski
b2cfd73691
vm: qubes-yum-proxy service ( #568 )
...
Introduce proxy service, which allow only http(s) traffic to yum repos. The
filter rules are based on URL regexp, so it isn't full-featured content
inspection and can be easy bypassed, but should be enough to prevent some
erroneus user actions (like clicking on invalid link).
It is set up to intercept connections to 10.137.255.254:8082, so VM can connect
to this IP regardless of VM in which proxy is running. By default it is
started in every NetVM, but this can be changed using qvm-service or
qubes-manager (as always).
2012-05-31 03:04:11 +02:00
Marek Marczykowski
a953e56042
vm/spec: remove executable perm where not needed
2012-05-31 02:21:15 +02:00
Marek Marczykowski
b4aa6c6ddc
vm/spec: fix /etc/hosts if it was broken by previous version
2012-05-08 23:45:00 +02:00
Marek Marczykowski
0ebd1d0de6
vm/spec: fix /etc/hosts if it was broken by previous version
2012-05-08 23:44:07 +02:00
Marek Marczykowski
950d848ede
vm: notify dom0 when updates available in VM ( #475 )
2012-05-02 00:09:00 +02:00
Marek Marczykowski
370ad33c44
dom0: provide service for VM to notify about updates availability ( #475 )
2012-05-02 00:09:00 +02:00
Marek Marczykowski
9c7ab91491
dom0: remove unused reset_vm_configs.py
2012-05-02 00:09:00 +02:00
Marek Marczykowski
af1f88755d
vm: notify dom0 when updates available in VM ( #475 )
2012-05-01 01:14:04 +02:00
Marek Marczykowski
fa41bf840c
dom0: provide service for VM to notify about updates availability ( #475 )
2012-05-01 01:12:19 +02:00
Marek Marczykowski
366e405df0
dom0: remove unused reset_vm_configs.py
2012-04-30 13:29:01 +02:00
Marek Marczykowski
f05605eccc
dom0/spec: fix spec for qmemman.conf
2012-03-29 16:18:00 +02:00
Marek Marczykowski
7bee34dfb0
dom0/spec: fix spec for qmemman.conf
2012-03-29 16:17:10 +02:00
Marek Marczykowski
71b98f9d95
dom0/qmemman: add support for config file
2012-03-28 00:47:26 +02:00
Marek Marczykowski
2e6e9bfab9
dom0/qmemman: add support for config file
2012-03-28 00:21:01 +02:00
Marek Marczykowski
ba6c682254
dom0/rpm-spec: fix xenconsoled setup
...
XENCONSOLED_LOG_GUESTS was erroneously replaced by XENCONSOLED_LOG_HYPERVISOR.
So to config fresh systems and broken by prevoius version, remove any
XENCONSOLED_LOG_ entries and add correct one at the config end.
2012-03-11 21:14:52 +01:00
Marek Marczykowski
e77bdf63db
dom0/rpm-spec: fix xenconsoled setup
...
XENCONSOLED_LOG_GUESTS was erroneously replaced by XENCONSOLED_LOG_HYPERVISOR.
So to config fresh systems and broken by prevoius version, remove any
XENCONSOLED_LOG_ entries and add correct one at the config end.
2012-03-11 21:12:49 +01:00
Marek Marczykowski
a58259a171
Merge branch 'master' into hvm
...
Conflicts:
version_dom0
version_vm
2012-03-09 10:19:34 +01:00
Marek Marczykowski
0b142fb040
vm/init.d: make firewall and netwatcher service consistent with systemd
2012-03-09 01:50:18 +01:00
Marek Marczykowski
a717b3755e
Merge branch 'master' into hvm
...
Conflicts:
dom0/qvm-core/qubes.py
2012-03-06 02:21:52 +01:00
Marek Marczykowski
db043c84bc
dom0/sysconfig: load and setup cpufreq-xen if present
...
Required for suspend on Core i5 with pvops kernel.
2012-03-05 12:44:08 +01:00
Marek Marczykowski
91ec015486
dom0/sysconfig: enable xenconsoled logging
2012-03-05 12:31:15 +01:00
Marek Marczykowski
25b57bab88
dom0/appmenus: Create "Start" appmenu for HVM domains
2012-03-02 01:56:50 +01:00
Marek Marczykowski
63f3537f98
dom0/spec: require xen-hvm package for stubdom
2012-03-01 10:57:34 +01:00
Joanna Rutkowska
0e0fe6a3d9
Merge branch 'master' of git://git.qubes-os.org/marmarek/core into hvm
2012-02-27 13:30:14 +01:00
Marek Marczykowski
067fb100a1
dom0/modules: support for pvops modules in dom0
2012-02-25 14:04:06 +01:00
Marek Marczykowski
3ad50b58e7
dom0/spec: include HVM config template in rpm
2012-02-24 04:53:15 +01:00
Marek Marczykowski
b422bf8b2f
dom0/pm-utils: fix scripts order according to pm-utils docs ( #443 )
2012-02-09 11:31:41 +01:00
Marek Marczykowski
73e63d9998
dom0/spec: include qubes-* tools in rpm ( #421 )
2012-02-07 12:31:44 +01:00
Marek Marczykowski
70db6b0fc9
vm/mimeopen: save mimetype defaults for DispVM ( #423 )
2012-02-06 19:08:08 +01:00
Marek Marczykowski
a4a9632a5a
vm/spec: fix file permissions
2012-02-06 12:58:02 +01:00
Marek Marczykowski
b87fff44c4
dom0/clock: sync clock using new qubes-sync-clock from cron ( #435 , #429 )
2012-02-01 17:39:20 +01:00
Marek Marczykowski
4c78a9cb7f
dom0/spec: require cron daemon ( #429 )
2012-01-30 16:27:12 +01:00
Marek Marczykowski
31fd953377
vm/spec: do not complain about missing serial.conf
2012-01-30 14:22:35 +01:00
Marek Marczykowski
ad75f3c99e
vm/network: symlink NetworkManager system-connection to /rw ( #425 )
...
In FC15, NetworkManager by default uses global connections ("Available to all users"). Save them in /rw instead of /etc, to preserve them across reboots.
2012-01-30 14:20:02 +01:00
Marek Marczykowski
f8562f8e1c
vm/spec: hide diagnostics from systemctl
2012-01-18 17:24:04 +01:00
Marek Marczykowski
83cde6e841
vm: enable qubes-firewall ( #424 )
2012-01-18 13:37:31 +01:00
Marek Marczykowski
351b413f74
spec: fix build order
2012-01-15 17:36:22 +01:00
Marek Marczykowski
1e2ca857cc
vm/systemd: enable ntpd and NetworkManager services
2012-01-14 01:40:54 +01:00
Marek Marczykowski
b5f691da1c
vm/systemd: add some package requirements according to Fedora documentation
2012-01-14 01:40:10 +01:00
Marek Marczykowski
7dbb3fe5b0
vm: disable some autostart applications
2012-01-14 01:39:43 +01:00
Marek Marczykowski
f581fad6fd
vm: disable silent automatic update *installation* in FC15 ( #415 )
...
Do not silently download and install updates, especially in NonUpdateableVM.
2012-01-14 01:37:22 +01:00
Marek Marczykowski
cf591a4cd5
vm/init: introduce SystemD startup scripts
2012-01-10 12:10:16 +01:00
Marek Marczykowski
11055f7162
vm/spec: split SysV init scripts into separate subpackage
2012-01-10 12:09:09 +01:00
Marek Marczykowski
95edff2ac2
vm/spec: add Obsoletes header for smooth upgrade
2012-01-10 11:23:27 +01:00
Marek Marczykowski
adc0b6eff5
vm(+dom0): major rearrage VM files in repo; merge core-*vm packages
2012-01-06 21:31:12 +01:00
Marek Marczykowski
9c40e23af2
vm: disable cron also using systemctl
...
This is needed for FC15
2011-12-30 23:53:46 +01:00
Marek Marczykowski
0cab96ad6d
vm/qvm-block: do not disable qubes block udev rules ( #393 )
2011-12-26 21:01:31 +01:00
Marek Marczykowski
0d32a533e7
vm/yum-repo: Use $releasever in repo definition
...
Instead of multiple files with only release version different.
2011-12-12 03:35:22 +01:00
Marek Marczykowski
a3f2496a27
vm/spec: more precise blacklisting updates of xorg ( #381 )
2011-12-05 13:50:07 +01:00
Marek Marczykowski
8a09f45bd8
dom0: and do not include xenfreepages in rpm...
2011-11-02 20:13:26 +01:00
Marek Marczykowski
ede96353af
dom0/qrexec: Add always allow option in qrexec confirmation dialog ( #278 )
2011-10-12 00:08:28 +02:00
Marek Marczykowski
9152bf6652
dom0/spec: disable prelink service
2011-10-07 21:28:26 +02:00
Marek Marczykowski
3876cf4070
dom0/dom0-updates: check for dom0 updates from cron ( #354 )
2011-10-07 21:28:16 +02:00
Marek Marczykowski
8d855aa958
dom0+vm/qvm-block: automatically detach device when physical dev removed ( #226 )
...
This will work when device is unmounted. On mounted device backend will be
removed (after 3s timeout), but frontend will left in "closing" state - manual
'xl block-detach' will be needed.
2011-09-30 10:42:56 +02:00
Marek Marczykowski
111d807ae0
dom0: include qubesutils in rpm package ( #226 )
2011-09-30 10:42:56 +02:00
Marek Marczykowski
6b885bd361
dom0+vm: expose block devices info in xenstore ( #226 )
2011-09-29 13:56:06 +02:00
Marek Marczykowski
801e113c06
vm: minor fixes for Fedora 15
...
1. create /var/run/qubes as /var/run is now on tmpfs
2. if system-d is present - use it to disable NetworkManager
2011-09-27 01:37:09 +02:00
Marek Marczykowski
72bc213980
vm/spec: do not use chown in %install - it will not work as unprivileged user
2011-09-25 15:18:48 +02:00
Marek Marczykowski
27ca0f878c
rpm spec: do not mark files with %dir
2011-09-22 01:16:32 +02:00
Marek Marczykowski
9f14be6eed
dom0: sync dom0 clock more frequent; start it from init.d script
2011-09-15 14:43:02 +02:00
Marek Marczykowski
633b21bb26
dom0: do not sync rpmdb with UpdateVM after each pkg installation
...
This doesn't make sense sice at every qvm-dom0-update we begin with sync rpmdb.
Also this allow embedding sync_rpmdb_updatevm.sh into qvm-dom0-update.
2011-09-15 13:37:34 +02:00
Marek Marczykowski
e4e661ac51
dom0: reduce watching tool to dom0 clock sync only
...
Do not watch for updates for now, it will be implemented later.
2011-09-15 13:32:06 +02:00
Marek Marczykowski
855664e6e5
dom0+vm: use qubes_download_dom0_updates.sh instead of qubes_check_for_updates.sh
...
Remove code duplication. Implemented required --check-only option to
qubes_download_dom0_updates.sh.
2011-09-15 00:18:56 +02:00
Joanna Rutkowska
2de02b7a6c
vm: update symlinks in Nautilus Scripts menu
...
This is important for older templates that got upgraded to new core packages,
which renamed some of the tools by removing the '2' suffix.
2011-09-14 19:32:47 +02:00
Marek Marczykowski
cf7bc53cc7
dom0 spec: cleanup old entries from /etc/yum.conf before adding new one
...
Fix whitespaces in sed.
2011-09-14 00:47:24 +02:00
Joanna Rutkowska
aa1f6f63cf
version 1.6.21-dom0
2011-09-09 14:49:53 +02:00