Rusty Bird
b964e8c33f
qfile-daemon-dvm: Implement LAUNCH and FINISH actions
...
If the action is LAUNCH instead of qubes.SomeService, then just start
the dispVM, write (only) its name to stdout, and quit.
If the action is FINISH, then kill and remove the named dispVM.
2016-06-29 11:59:12 +00:00
Rusty Bird
142cb9e240
qfile-daemon-dvm: Call static method by class name
2016-06-29 11:59:09 +00:00
Rusty Bird
afb2a65744
qfile-daemon-dvm: Move dispVM killing into cleanup function
2016-06-29 11:58:46 +00:00
Desobediente Civil
59e687c3f3
And some more quoting to satisfy #1672
2016-06-27 19:23:53 -03:00
Desobediente Civil
5081b58ee8
Quoting all cat
s as proposed in #1672
2016-06-27 19:19:00 -03:00
Desobediente Civil
fa83298153
Modifying support cpio as proposed in #1672
2016-06-27 19:15:46 -03:00
Desobediente Civil
12bf920969
Quoting the destination as proposed in #1672
2016-06-27 19:10:00 -03:00
Marek Marczykowski-Górecki
e431e8bc45
qvm-ls: fix handling explicit VMs list
2016-06-26 13:02:34 +02:00
Marek Marczykowski-Górecki
9d781f77ce
tests: VM removal
...
Check if everything is cleaned up.
2016-06-25 01:53:39 +02:00
Marek Marczykowski-Górecki
13f832645a
qvm-remove: undefine libvirt domain even when not removing files
...
Fixes QubesOS/qubes-issues#2112
2016-06-25 00:21:47 +02:00
Marek Marczykowski-Górecki
748a3a90a2
core: fix handling disabling VM autostart on VM removal
...
QubesOS/qubes-issues#1930
2016-06-25 00:20:27 +02:00
Marek Marczykowski-Górecki
376dc43b90
version 3.2.4
2016-06-24 23:06:35 +02:00
Marek Marczykowski-Górecki
84677fa70b
qvm-ls: fix handling VM list on command line
2016-06-24 23:05:15 +02:00
Marek Marczykowski-Górecki
776393e97b
qvm-check: whitespace fixes
2016-06-24 22:43:26 +02:00
Marek Marczykowski-Górecki
44da6d7940
Merge remote-tracking branch 'qubesos/pr/32'
...
Fixes QubesOS/qubes-issues#2103
* qubesos/pr/32:
Add VM state options
2016-06-24 22:40:18 +02:00
Marek Marczykowski-Górecki
9956e4c7b3
tests: handle vim opened in xterm without adjusted window title
...
On debian vim in xterm doesn't have "vim" in title, just standard
user@host.
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
a30f1d3902
tests: firefox sets "Navigator" as window class
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
ba0a01afba
tests: fix closing xterm window
...
sh -s option in dash prevent shell to terminate after command from -c
ends. So remove this option.
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
3cb717dced
tests: add --sync to xdotool windowactivate
...
This may help getting less errors from xdotool...
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
9bc60927c5
tests: replace sfdisk call with verbatim partition table
...
sfdisk options and input format differs between versions (dropped MB
units support), so instead of supporting all the combinations,
simply paste its result verbatim.
2016-06-24 19:57:04 +02:00
Marek Marczykowski-Górecki
38beb9412a
tests: wait for editor window to settle before sending any keystrokes
2016-06-24 19:57:04 +02:00
Marek Marczykowski-Górecki
4123b95866
tests: make sure dnsmasq isn't already running
...
On Debian when dnsmasq is installed, it is automatically started. Which
prevents starting a second instance.
2016-06-24 19:57:03 +02:00
Marek Marczykowski-Górecki
7eb881c6ba
tests: skip some tests not supported on Whonix
2016-06-24 19:57:03 +02:00
GammaSQ
3599249e2d
forgot if-statement in last commit
2016-06-24 19:57:02 +02:00
GammaSQ
3c7915808b
added --raw-data option
2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
504360ba9a
tests: fix clearing 'updates pending' flag test
2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
ae44869499
qvm-start: improve error message about missing qubes-windows-tools.iso
...
Fixes QubesOS/qubes-issues#1977
2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
34fc3f3399
tests: regression test for #1619 - drive path validation
...
QubesOS/qubes-issues#1619
2016-06-24 19:57:01 +02:00
ttasket
9dc488818d
Add VM state options
...
New options: --running, --paused and --template
2016-06-24 06:09:06 -04:00
Marek Marczykowski-Górecki
5921dd2a1c
core: validate dom0 drive path before starting VM
...
This is very easy if the file/device is in dom0, so do it to avoid
cryptic startup error (`libvirtError: internal error: libxenlight failed
to create domain`).
Fixes QubesOS/qubes-issues#1619
2016-06-21 18:39:13 +02:00
Marek Marczykowski-Górecki
86b7849fd4
tests: update PVGrub2 test for fedora-23 template
...
dnf doesn't want to replace packages without --allowerasing (it is
needed to have correct kernel-devel package version). Additionally
really make sure the right version is installed and force u2mfn module
compilation.
2016-06-20 12:35:22 +02:00
Marek Marczykowski-Górecki
7f86782e14
version 3.2.3
2016-06-07 06:46:30 +02:00
Marek Marczykowski-Górecki
d0ba43f253
core: start guid as normal user even when VM started by root
...
Another attempt to avoid permissions-related problems...
QubesOS/qubes-issues#1768
2016-06-06 02:21:08 +02:00
Marek Marczykowski-Górecki
89d002a031
core: use runuser instead of sudo for switching root->user
...
There are problems with using sudo in early system startup
(systemd-logind not running yet, pam_systemd timeouts). Since we don't
need full session here, runuser is good enough (even better: faster).
2016-06-06 02:19:51 +02:00
Marek Marczykowski-Górecki
2265fd3d52
core: start qubesdb as normal user, even when VM is started by root
...
On VM start, old qubesdb-daemon is terminated (if still running). In
practice it happen only at VM startart (shutdown and quickly start
again). But in that case, if the VM was started by root, such operation
would fail.
So when VM is started by root, make sure that qubesdb-daemon will be
running as normal user (the first user in group 'qubes' - there should
be only one).
Fixes QubesOS/qubes-issues#1745
2016-06-06 02:19:28 +02:00
Marek Marczykowski-Górecki
a857ac3afb
Install dom0 qvm-* tools man pages by default
2016-06-04 16:57:13 +02:00
Marek Marczykowski-Górecki
88cb62fcf6
core: add pci_e820_host property
...
Enable e820_host option for VMs with PCI devices (to allow VM kernel to
deal with address space conflicts). But add a property to allow
disabling it.
Fixes QubesOS/qubes-issues#2019
2016-06-04 16:52:02 +02:00
Marek Marczykowski-Górecki
daf55710b8
travis: initial version
...
QubesOS/qubes-issues#1926
2016-06-02 11:29:38 +02:00
Marek Marczykowski-Górecki
a534b1dd2c
qvm-usb: remove scary warning about PV USB stability
...
USBIP (used for PV USB here) is considered stable by Linux maintainers,
so follow their judgement.
Fixes QubesOS/qubes-issues#531
2016-06-02 02:52:59 +02:00
Marek Marczykowski-Górecki
e87da9ec9d
tests: adjust dom0_update tests for dnf in VM
...
There is no support for 'copy_local' repository option, so setup test
repository over http.
Related to QubesOS/qubes-issues#1574
2016-06-02 02:51:18 +02:00
Marek Marczykowski-Górecki
767d1f0074
qvm-usb: implement usb_detach_all
...
QubesOS/qubes-issues#531
2016-06-02 02:49:22 +02:00
Marek Marczykowski-Górecki
d5e06bfb83
qvm-usb: issue detach call to backend domain
...
Make sure that even compromised frontend will be cut of (possibly
sensitive - like a webcam) device. On the other hand, if backend domain
is already compromised, it may already compromise frontend domain too,
so none of them would be better to call detach to.
QubesOS/qubes-issues#531
2016-06-02 02:45:26 +02:00
Marek Marczykowski-Górecki
52fb410deb
qvm-usb: always pass VM as object reference not a name
...
Make the API consistent.
QubesOS/qubes-issues#531
2016-06-02 02:44:38 +02:00
Marek Marczykowski-Górecki
d67636308f
qvm-usb: modify for USBIP-over-qrexec implementation
...
QubesOS/qubes-issues#531
2016-05-26 01:38:08 +02:00
Marek Marczykowski-Górecki
3afc7b7d50
core: start qrexec-daemon as normal user, even when VM is started by root
...
qrexec-daemon will start new processes for called services, which
include starting new DispVM, starting other required VMs (like backend
GPG VM). Having those processes as root leads to many permissions
problems, like the one linked below. So when VM is started by root, make
sure that qrexec-daemon will be running as normal user (the first user
in group 'qubes' - there should be only one).
QubesOS/qubes-issues#1768
2016-05-26 01:34:53 +02:00
Marek Marczykowski-Górecki
7c0f5a4be6
qubes-hcl-report: filename sanitization for old bash
...
Bash in dom0 (Fedora 20 based) doesn't properly handle "+(..)" operator.
So remove it for now.
Fixes QubesOS/qubes-issues#1994
2016-05-18 14:21:26 +02:00
Marek Marczykowski-Górecki
a8fcc58934
version 3.2.2
2016-05-18 03:00:41 +02:00
Marek Marczykowski-Górecki
6311eec6fd
tests: force reloading partition table after setting partitioned loop dev
...
Apparently "losetup -P" doesn't always properly read partition table.
Force reload using blockdev --rereadpt.
2016-05-18 02:03:48 +02:00
Marek Marczykowski-Górecki
405fd40aaa
Add policy for qubes.OpenURL service
...
For now the same as for qubes.OpenInVM.
Fixes QubesOS/qubes-issues#1487
2016-05-18 02:03:48 +02:00
Marek Marczykowski-Górecki
3abf2b24b4
tests: check opening URL
...
While at it, fix policy preparation for qvm-open-in-vm tests.
QubesOS/qubes-issues#1487
2016-05-18 02:03:31 +02:00