Alexandre Bezroutchko
81ca750403
dom0+vm/qvm-usb: cosmetic: removed debugging code, adjusted fixmes
2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
b962debfad
dom0/qvm-usb: implemented usb_check_attached method, now "qvm-usb -l" indicate attachments
2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
988d37fcb2
dom0/qvm-usb: qvm-usb is hopefully complete, stubs for all remaining usb_* methods implemented
2012-10-21 14:59:36 +02:00
Alexandre Bezroutchko
95b93a5082
dom0/qvm-usb: enabled -f option to qvm-usb (and cosmetic changes)
2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
fc74c6a85b
dom0/qvm-usb: first implementation of qvm-usb
2012-10-21 14:59:35 +02:00
Bruce A Downs
a504600c20
dom0/core: Added the pretty print of qubes.xml
...
* Replaced xml.etree.ElementTree with lxml.etree
* Added argument to tree.write(file, encoding="UTF-8", pretty_print=True)
2012-10-19 02:21:41 +02:00
Bruce A Downs
28b4f82b0a
dom0/core: Added call to lock.remove_pidfile() on successful exit
...
* Adding remove_pidfile on exit
* prevents the incorrect 'crash' message on startup
* Added proper call to main
2012-10-19 02:21:41 +02:00
Alexandre Bezroutchko
d6432a16c4
dom0/qvm-tools: clean resolv.conf when networking goes down
2012-10-19 02:21:03 +02:00
Marek Marczykowski
3a875edf58
dom0/core: fix qubes-dom0-network-via-netvm ( #660 )
...
IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2.
2012-10-19 02:07:35 +02:00
Marek Marczykowski
3e90174910
Merge branch 'hvm-for-master'
...
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
version_dom0
vm-systemd/qubes-sysinit.sh
2012-10-17 21:41:03 +02:00
Marek Marczykowski
d010906eb1
Merge remote-tracking branch 'abb/qvm_block-bugfix'
2012-10-16 00:59:36 +02:00
Alexandre Bezroutchko
ca4367821e
Improve handling of command line parameters, don't silently ignore unexpected arguments.
...
This is to avoid following behavior:
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -a qdvp dom0:sdb
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB (attached to 'qdvp' as 'xvdi')
[abb@dom0 qubes-core]$ qvm-block -d qdvp BLAHBLAH
^^^^^^^^^^^^^
>>> The last parameter is silently ignored and all devices get detached
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
2012-10-15 11:40:08 +02:00
Marek Marczykowski
02601049ca
dom0/qmemman: do not fail when domain name not available
...
This can be the case when domain just dissapeared (destroy), but qmemman didn't
processed xenstore watch trigger.
2012-10-15 01:58:07 +02:00
Bruce A Downs
6304155990
dom0/core: minor spell check fixes
...
* happend
* avilable
* skiping
2012-10-09 01:23:54 +02:00
Bruce A Downs
05f7bfc9c1
dom0/core: Code cleanup of qubesutils.py
...
* Took out unreferenced restore_vm_file function
* removed unused imports
* renamed interpreter from python2 to python
2012-10-09 01:23:45 +02:00
Marek Marczykowski
081cfab559
dom0/core: do not leak xs transaction and use it in all xs calls
2012-10-08 01:26:07 +02:00
Alexandre Bezroutchko
f4ef1adcdd
dom0/qvm-core: start XS transaction before getting the list of domains
2012-10-08 01:23:52 +02:00
Alexandre Bezroutchko
3c53f049a3
dom0/qvm-block: cosmetic
2012-10-08 01:23:42 +02:00
Alexandre Bezroutchko
abfe99756f
start XS transaction before getting the list of domains
2012-10-08 00:48:20 +02:00
Alexandre Bezroutchko
caf3ed1ae4
cosmetic
2012-10-08 00:46:30 +02:00
Marek Marczykowski
d03bab3db2
Merge branch 'master-for-hvm' into hvm
...
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
2012-10-04 05:45:41 +02:00
Marek Marczykowski
5e696298cf
dom0/core: fix icon handling on VM clone
2012-10-04 05:44:20 +02:00
Marek Marczykowski
d5c74f69ee
dom0/core: recreate appmenus after rename for any VM, not only AppVM ( #659 )
2012-10-04 05:44:20 +02:00
Marek Marczykowski
9a2f1dfebe
dom0/core: include net/proxy VM default appmenus list in cloned template
2012-10-04 05:44:19 +02:00
Olivier Médoc
69354475bf
dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues
2012-10-04 05:44:19 +02:00
Marek Marczykowski
397f2912f0
dom0/core: allow '_' in VM name
2012-10-04 05:44:18 +02:00
Marek Marczykowski
92747285c7
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-10-04 05:44:18 +02:00
Marek Marczykowski
19a60eff55
dom0/core: fix icon handling on VM clone
2012-10-03 22:28:49 +02:00
Marek Marczykowski
1b25d77504
dom0/core: recreate appmenus after rename for any VM, not only AppVM ( #659 )
2012-10-03 21:36:52 +02:00
Marek Marczykowski
45639096fa
dom0/core: include net/proxy VM default appmenus list in cloned template
2012-10-03 21:12:18 +02:00
Olivier Médoc
9a90f499bc
dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues
2012-10-03 14:55:05 +02:00
Marek Marczykowski
c1214bfef9
dom0/core: VM property for qrexec startup timeout ( #27 pro)
2012-09-25 03:26:44 +02:00
Marek Marczykowski
96199058d1
dom0/core: wait for user session on HVM start ( #31 pro)
2012-09-25 00:23:35 +02:00
Marek Marczykowski
f271ad8463
dom0/core: fix return value of QubesHVM.run()
2012-09-25 00:23:20 +02:00
Marek Marczykowski
9db9d8b6c2
dom0/core: allow passing stdin to QubesVM.run()
2012-09-25 00:22:31 +02:00
Marek Marczykowski
3ecc031603
dom0/core: allow '_' in VM name
2012-09-14 12:58:00 +02:00
Marek Marczykowski
2444603ef5
dom0/core: allow '_' in VM name
2012-09-14 12:57:25 +02:00
Marek Marczykowski
900a21db72
dom0/init.d: hide some missleading error
2012-09-04 19:24:01 +02:00
Marek Marczykowski
b7eaf9a30d
dom0/core: do not use hardcoded "user" in qvm-sync-clock
2012-08-31 00:53:50 +02:00
Marek Marczykowski
46fd664ba3
dom0/qrexec: implement default user handling in qrexec_daemon
...
This will simplify using qrexec from utilities which doen't load qubes.xml
normally (like qrexec_policy, gui daemon).
2012-08-30 17:44:52 +02:00
Marek Marczykowski
3b320878ac
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-08-26 14:42:32 +02:00
Marek Marczykowski
6305e6cbe1
dom0/qvm-block: rework device name parsing to better support c0p1 name style
2012-08-26 14:41:35 +02:00
Marek Marczykowski
fefb6d9cff
vm+dom0/filecopy-unpacker: send errors to qfile-agent istead of local message ( #239 )
...
Because unpacker no longer require GUI access, there is no need for separate
process for error reporting. Which greatly simplify the code.
2012-08-25 02:09:45 +02:00
Marek Marczykowski
c0455ac641
Merge branch 'master' into hvm
...
Conflicts:
dom0/qvm-tools/qvm-create
version_dom0
2012-08-23 11:11:59 +02:00
Marek Marczykowski
1cd3ef3456
dom0/qvm-tools: catch exceptions while settting VM name ( #656 )
2012-08-23 04:02:50 +02:00
Marek Marczykowski
536eb00b9c
dom0/core: verify VM name for not-allowed characters ( #656 )
2012-08-23 04:01:55 +02:00
Marek Marczykowski
b7f5c6ac0b
dom0/qvm-tools: catch exceptions while settting VM name ( #656 )
2012-08-23 03:48:03 +02:00
Marek Marczykowski
85565af560
dom0/core: verify VM name for not-allowed characters ( #656 )
2012-08-23 03:45:06 +02:00
Marek Marczykowski
cc23d3cb3d
dom0/qubes_rpc: mark untrusted variables ( #654 )
2012-08-16 16:56:55 +02:00
Marek Marczykowski
26fca20d45
dom0/qmemman: fix reporting to qubes-manager
...
When VM is shutting down, xenstore entries (especially 'name') can be deleted
before qmemman remove VM from its list. So check if name is defined before
reporting to qubes-manager.
2012-08-16 16:56:55 +02:00