Alexandre Bezroutchko
|
d6432a16c4
|
dom0/qvm-tools: clean resolv.conf when networking goes down
|
2012-10-19 02:21:03 +02:00 |
|
Marek Marczykowski
|
3a875edf58
|
dom0/core: fix qubes-dom0-network-via-netvm (#660)
IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2.
|
2012-10-19 02:07:35 +02:00 |
|
Marek Marczykowski
|
3e90174910
|
Merge branch 'hvm-for-master'
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
version_dom0
vm-systemd/qubes-sysinit.sh
|
2012-10-17 21:41:03 +02:00 |
|
Marek Marczykowski
|
d010906eb1
|
Merge remote-tracking branch 'abb/qvm_block-bugfix'
|
2012-10-16 00:59:36 +02:00 |
|
Alexandre Bezroutchko
|
ca4367821e
|
Improve handling of command line parameters, don't silently ignore unexpected arguments.
This is to avoid following behavior:
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -a qdvp dom0:sdb
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB (attached to 'qdvp' as 'xvdi')
[abb@dom0 qubes-core]$ qvm-block -d qdvp BLAHBLAH
^^^^^^^^^^^^^
>>> The last parameter is silently ignored and all devices get detached
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
|
2012-10-15 11:40:08 +02:00 |
|
Marek Marczykowski
|
73ac8250e0
|
vm/systemd: force exit status 0 in qubes-sysinit
If /rw/config/rc.local-early does not exits, exit status is incorrectly 1.
|
2012-10-15 02:33:36 +02:00 |
|
Marek Marczykowski
|
02601049ca
|
dom0/qmemman: do not fail when domain name not available
This can be the case when domain just dissapeared (destroy), but qmemman didn't
processed xenstore watch trigger.
|
2012-10-15 01:58:07 +02:00 |
|
Marek Marczykowski
|
3183942a9d
|
vm/network: do not fail service on failed xenstore-read
|
2012-10-13 11:47:32 +02:00 |
|
Bruce A Downs
|
6304155990
|
dom0/core: minor spell check fixes
* happend
* avilable
* skiping
|
2012-10-09 01:23:54 +02:00 |
|
Bruce A Downs
|
05f7bfc9c1
|
dom0/core: Code cleanup of qubesutils.py
* Took out unreferenced restore_vm_file function
* removed unused imports
* renamed interpreter from python2 to python
|
2012-10-09 01:23:45 +02:00 |
|
Marek Marczykowski
|
081cfab559
|
dom0/core: do not leak xs transaction and use it in all xs calls
|
2012-10-08 01:26:07 +02:00 |
|
Alexandre Bezroutchko
|
f4ef1adcdd
|
dom0/qvm-core: start XS transaction before getting the list of domains
|
2012-10-08 01:23:52 +02:00 |
|
Alexandre Bezroutchko
|
3c53f049a3
|
dom0/qvm-block: cosmetic
|
2012-10-08 01:23:42 +02:00 |
|
Alexandre Bezroutchko
|
abfe99756f
|
start XS transaction before getting the list of domains
|
2012-10-08 00:48:20 +02:00 |
|
Alexandre Bezroutchko
|
caf3ed1ae4
|
cosmetic
|
2012-10-08 00:46:30 +02:00 |
|
Marek Marczykowski
|
5e08cbc3de
|
vm/appmenus: include subdirs with .desktop files
|
2012-10-06 22:18:00 +02:00 |
|
Marek Marczykowski
|
d03bab3db2
|
Merge branch 'master-for-hvm' into hvm
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
|
2012-10-04 05:45:41 +02:00 |
|
Marek Marczykowski
|
490a5e9e1a
|
vm/spec: fix adding yum-proxy configuration
Do not add entry if already present.
|
2012-10-04 05:44:20 +02:00 |
|
Marek Marczykowski
|
5e696298cf
|
dom0/core: fix icon handling on VM clone
|
2012-10-04 05:44:20 +02:00 |
|
Marek Marczykowski
|
d5c74f69ee
|
dom0/core: recreate appmenus after rename for any VM, not only AppVM (#659)
|
2012-10-04 05:44:20 +02:00 |
|
Marek Marczykowski
|
9a2f1dfebe
|
dom0/core: include net/proxy VM default appmenus list in cloned template
|
2012-10-04 05:44:19 +02:00 |
|
Olivier Médoc
|
69354475bf
|
dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues
|
2012-10-04 05:44:19 +02:00 |
|
Bruce A Downs
|
d19a3cce99
|
vm: Added 'most recently used' feature to 'copy to vm' dialog
* replaced zenity to qvm-mru-entry in qubes_rpc/qvm-copy-to-vm.gnome
* added python script qubes_rpc/qvm-mru-entry
* added /usr/bin/qvm-mru-entry to rpm_spec/core-vm.spec
|
2012-10-04 05:44:19 +02:00 |
|
Bruce A Downs
|
dba7d94fba
|
vm/spec: mod to core-vm.spec to add test for files
core rpm was failing during uninstall attempting to move non-existent files
* /var/lib/qubes/fstab.orig
* /var/lib/qubes/serial.orig
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
7a485ab7f9
|
vm/file-editor: connect /dev/null as stdin (#657)
If stdin is closed (not connected to /dev/null) first opened file will get fd=0
and will be treated as stdin.
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
303d4ab042
|
dom0/iptables: block IPv6 traffic
Dom0 is network isolated anyway, but apply also firewall in case of use
qubes-dom0-network-via-netvm.
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
9c3f8417d4
|
vm/iptables: block IPv6 traffic
This isn't properly handled by Qubes VMs yet, so block it in all the VMs.
Also restrict access to firewall config.
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
56e0359cfb
|
vm/yum-proxy: one more regexp fix
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
551cc8b186
|
vm/yum-proxy: filter regexp: add missing ^$ marks, remove unneded .* at the beginning
Reported-by: Igor Bukanov <igor@mir2.org>
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
0cf7c03ea5
|
vm/systemd: early user-configurable init script
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
04e57db419
|
vm/yum-proxy: allow pkgtags repodata
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
397f2912f0
|
dom0/core: allow '_' in VM name
|
2012-10-04 05:44:18 +02:00 |
|
Marek Marczykowski
|
d172fa72f1
|
vm/qrexec: fix race between child cleanup and select call
reap_children() can close FD, which was already added to FD_SET for select.
This can lead to EBADF and agent termination.
|
2012-10-04 05:44:18 +02:00 |
|
Marek Marczykowski
|
9519d843d8
|
dom0/spec: mark qrexec policy as config files
Prevent override on upgrade, when user makes some own changes (especially
"always allow" feature).
|
2012-10-04 05:44:18 +02:00 |
|
Marek Marczykowski
|
92747285c7
|
dom0/qvm-block: rework device name parsing to better support c0p1 name style
|
2012-10-04 05:44:18 +02:00 |
|
Marek Marczykowski
|
38fc566e52
|
vm/spec: fix adding yum-proxy configuration
Do not add entry if already present.
|
2012-10-04 05:29:58 +02:00 |
|
Marek Marczykowski
|
6419fea4ce
|
vm/spec: fix adding yum-proxy configuration
Do not add entry if already present.
|
2012-10-04 05:29:10 +02:00 |
|
Marek Marczykowski
|
349331251d
|
Merge branch 'hvm' of git://gitpro.qubes-os.org/joanna/core into hvm
|
2012-10-04 05:14:42 +02:00 |
|
Marek Marczykowski
|
19a60eff55
|
dom0/core: fix icon handling on VM clone
|
2012-10-03 22:28:49 +02:00 |
|
Marek Marczykowski
|
1b25d77504
|
dom0/core: recreate appmenus after rename for any VM, not only AppVM (#659)
|
2012-10-03 21:36:52 +02:00 |
|
Marek Marczykowski
|
45639096fa
|
dom0/core: include net/proxy VM default appmenus list in cloned template
|
2012-10-03 21:12:18 +02:00 |
|
Olivier Médoc
|
9a90f499bc
|
dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues
|
2012-10-03 14:55:05 +02:00 |
|
Bruce A Downs
|
cbf05999fb
|
vm: Added 'most recently used' feature to 'copy to vm' dialog
* replaced zenity to qvm-mru-entry in qubes_rpc/qvm-copy-to-vm.gnome
* added python script qubes_rpc/qvm-mru-entry
* added /usr/bin/qvm-mru-entry to rpm_spec/core-vm.spec
|
2012-09-28 00:57:08 +02:00 |
|
Bruce A Downs
|
6f35c13be2
|
vm/spec: mod to core-vm.spec to add test for files
core rpm was failing during uninstall attempting to move non-existent files
* /var/lib/qubes/fstab.orig
* /var/lib/qubes/serial.orig
|
2012-09-28 00:57:08 +02:00 |
|
Joanna Rutkowska
|
cd66ee2ce1
|
version 1.7.46
|
2012-09-27 11:03:26 +02:00 |
|
Marek Marczykowski
|
47e1665096
|
vm/file-editor: connect /dev/null as stdin (#657)
If stdin is closed (not connected to /dev/null) first opened file will get fd=0
and will be treated as stdin.
|
2012-09-27 02:06:26 +02:00 |
|
Marek Marczykowski
|
286339dd82
|
dom0/iptables: block IPv6 traffic
Dom0 is network isolated anyway, but apply also firewall in case of use
qubes-dom0-network-via-netvm.
|
2012-09-25 16:14:31 +02:00 |
|
Marek Marczykowski
|
a90a21b8ff
|
vm/iptables: block IPv6 traffic
This isn't properly handled by Qubes VMs yet, so block it in all the VMs.
Also restrict access to firewall config.
|
2012-09-25 16:14:06 +02:00 |
|
Marek Marczykowski
|
decf7ef648
|
vm/yum-proxy: one more regexp fix
|
2012-09-25 15:08:06 +02:00 |
|
Marek Marczykowski
|
f710531f68
|
vm/yum-proxy: filter regexp: add missing ^$ marks, remove unneded .* at the beginning
Reported-by: Igor Bukanov <igor@mir2.org>
|
2012-09-25 13:37:59 +02:00 |
|