Marek Marczykowski-Górecki
90393c33f2
core: add offline mode to qvm-create, qvm-prefs
...
This is required to create VMs in process of building Live system, where
libvirt isn't running.
Additionally there is no udev in the build environment, so needs to
manually create /dev/loop*p* based on sysfs info.
2015-08-01 21:58:38 +02:00
Patrick Schleizer
472ed54e4c
fix VM autostart race condition
...
https://github.com/QubesOS/qubes-issues/issues/1075
2015-07-30 17:46:24 +02:00
Marek Marczykowski-Górecki
8f862cdf69
core/hvm: check if VM serving cdrom content is running
2015-07-25 04:17:59 +02:00
Marek Marczykowski-Górecki
51826decec
core/hvm: start guid before qrexec, even when gui agent is installed
...
This way even when qrexec agent would timeout on connection, guid will
be already running.
Also use new -K guid option to terminate stubdom guid when the real guid
is connected (unless in debug mode - then both guid will be running).
2015-07-25 03:55:50 +02:00
Marek Marczykowski-Górecki
4a01c53787
qvm-tools: update qvm-trim-template for R3 block attach api
2015-07-22 05:46:12 +02:00
Marek Marczykowski-Górecki
39379364c7
version 3.0.17
2015-07-13 00:58:53 +02:00
Marek Marczykowski-Górecki
6df309351d
block: fix detection if the block device is attached anywhere
2015-07-13 00:58:11 +02:00
Marek Marczykowski-Górecki
4b0ce945b7
version 3.0.16
2015-07-08 05:59:04 +02:00
Marek Marczykowski-Górecki
b47c74c3a4
qvm-tools: fix usage info for qvm-template-commit
2015-07-08 05:58:29 +02:00
Marek Marczykowski-Górecki
1199806b5a
core: fix handling firewall configuration for VM clones and DispVMs ( #1032 )
...
There were two bugs:
1. Firewall configuration wasn't copied during qvm-clone (it is in
separate file, so now it is included in vm.clone_disk_files).
2. Non-default firewall configuration wasn't stored in qubes.xml. This
means that initially DispVM got proper configuration (inherited from
calling VM), but if anything caused firewall reload (for example
starting another VM), the firewall rules was cleared to default state
(allow all).
Fixes qubesos/qubes-issues#1032
2015-07-08 04:46:14 +02:00
Marek Marczykowski-Górecki
a7e08e4584
tests: add qvm-clone test ( #1032 case)
2015-07-08 04:26:11 +02:00
Marek Marczykowski-Górecki
6c167911f1
qvm-sync-clock: hide stdout in non-verbose mode
2015-07-08 01:59:49 +02:00
Marek Marczykowski-Górecki
5f9a30d335
qvm-sync-clock: use qubes.SetDateTime service instead of direct "date" call
...
This way it gives more control over time synchronization to the VM. For
example Whonix VMs can decide to not use this mechanism. Also VM can
choose how that time will be set (chronyc call?). And finally it will be
possible to implement the same for other OS-es (Windows).
Additionally because of calling date as "localcmd" each time, instead of
once at the beginning, time synchronization is more accurrate now. If
some VM stall the time set call, other VMs time will no longer be
affected (but still synchronization will be delayed).
2015-07-08 01:56:38 +02:00
Marek Marczykowski-Górecki
e52f0a0566
core: by default call qrexec services without GUI
...
Most of them do not need GUI (especially those started from dom0), so
speed the things up a little (no need to wait for guid). But if some
service will need GUI access, there is "gui" parameter.
2015-07-08 01:36:28 +02:00
Marek Marczykowski-Górecki
284419b355
core: add "localcmd" support in QubesVm.run_service function
2015-07-08 01:35:59 +02:00
Marek Marczykowski-Górecki
50a9c62d0e
tests: add test for qvm-sync-clock
2015-07-08 01:21:13 +02:00
Marek Marczykowski-Górecki
455535d036
tests: reload qubes.xml after creating VMs
...
Unfortunately it is still needed. For example to load default netvm
setting.
2015-07-08 01:20:25 +02:00
Marek Marczykowski-Górecki
6d1f40219c
tests: code style fixes, no functional change
2015-07-07 21:41:54 +02:00
Marek Marczykowski-Górecki
205a28ecc2
version 3.0.15
2015-07-01 07:05:12 +02:00
Marek Marczykowski-Górecki
6d19a9c2cc
Do not hold the lock while retrieving application icons (qubes.NotifyTools)
...
This can take quite a long time, so do not block the whole system.
2015-07-01 07:03:52 +02:00
Marek Marczykowski-Górecki
df509cb780
Fix qubes.NotifyTools service (not import xenstore)
2015-07-01 04:47:52 +02:00
Marek Marczykowski-Górecki
4bf73a5d7f
Increase default swiotlb size to 16MB ( #1038 )
...
Fixes qubesos/qubes-issues#1038
2015-07-01 04:46:46 +02:00
Marek Marczykowski-Górecki
677a79b213
hvm: change default graphics to std vga ('xen')
...
The resulting qemu option is -std-vga.
This apparently this is much better handled by many OSes.
2015-07-01 04:44:41 +02:00
Marek Marczykowski-Górecki
310ba9f1df
block: do not treat disks of not running VMs as used
...
There are legitimate use cases when one want to attach disk of one VM to
some other. Do not try to detach the disk from powered down VM in such
case.
2015-07-01 04:42:44 +02:00
Marek Marczykowski-Górecki
d9c2990747
core: fix creation of private.img at VM startup
...
This code is used when VM is migrated from older system, where HVM
didn't have private.img.
2015-07-01 04:41:09 +02:00
Marek Marczykowski-Górecki
402d1b9a3d
indentation fix
2015-07-01 04:40:48 +02:00
Marek Marczykowski-Górecki
522bfc427a
core: fix template-based HVM disk handling
...
We use only one device-mapper layer for HVMs, and this isn't the same as
for PV - it is that one, which PV does in initramfs.
Device-mapper layers summary for template-based VMs:
PV: root.img+root-cow.img (dom0) -> xvda, xvda+volatile.img (VM)
HVM: root.img+volatile.img (dom0)
2015-07-01 04:35:09 +02:00
Marek Marczykowski-Górecki
a96d49a40a
core: properly redirect qrexec output to /dev/null when necessary
...
/dev/null was opened in read-only mode ("rw" is invalid value), so
qrexec couldn't write there.
2015-07-01 04:33:04 +02:00
Wojtek Porczyk
ff7d89700a
qubes/tools: port qvm-create
2015-06-30 17:18:24 +02:00
Wojtek Porczyk
669a976d4e
qubes/tools: add common action for setting properties
2015-06-29 17:40:43 +02:00
Wojtek Porczyk
b11b8cdbde
qubes/tools: add common --force-root option
2015-06-29 17:39:29 +02:00
Wojtek Porczyk
6dc5f328f3
qubes/tools: ArgumentParser prepopulated with common options
2015-06-29 17:39:29 +02:00
Wojtek Porczyk
7832f23d5d
qubes: minor fix
2015-06-29 17:39:29 +02:00
Wojtek Porczyk
7886695c63
qubes/vm/qubesvm: fix qid setter to accept str
...
Mainly for loading from XML.
2015-06-29 17:39:29 +02:00
Wojtek Porczyk
d4147c52bd
qubes: Fix property-set events signature
2015-06-29 17:39:29 +02:00
Wojtek Porczyk
7f16e0a73b
qubes: disable events by default not to interfere with loading from XML
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
f2d9d628c4
qubes/vm/qubesvm: Fix loading/instantiating
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
fd0107f11a
new tool: qubes-create
...
At present it just creates default qubes.xml (empty barring labels and AdminVM).
In the future it can be evolved into backend for firstboot.
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
8e690c6858
qubes: fix saving Label
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
d5f2e6ab74
qubes: rework qubes.xml handling
...
Now it more closely aligns with old core2 semantics. New semantics will
have to wait for qubesd.
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
7c8cc14bec
core3: fix import
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
18d36c17e1
rpm_spec/core-dom0-doc.spec: fix build dependencies
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
9a5703d5ea
pylint fix
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
142521317c
qubes: Documentation for qubes.tools
...
And first documentation for qubes.tools.qvm_ls.
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
e50ca5131f
doc: move manpages to common directory
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
6a4820c381
qubes/tools: qvm-ls
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
e83d21c671
qubes: more documentation and doc fixes
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
5d9b92a039
qubes: pylint fixes (minor programming errors)
2015-06-29 17:39:28 +02:00
Wojtek Porczyk
186b277418
qubes/vm: fix logging
2015-06-29 17:39:27 +02:00
Wojtek Porczyk
45977fc873
qubes: fix VM instantiation and loading
2015-06-29 17:39:27 +02:00