Commit Graph

321 Commits

Author SHA1 Message Date
Alexandre Bezroutchko
95b93a5082 dom0/qvm-usb: enabled -f option to qvm-usb (and cosmetic changes) 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
fc74c6a85b dom0/qvm-usb: first implementation of qvm-usb 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
d6432a16c4 dom0/qvm-tools: clean resolv.conf when networking goes down 2012-10-19 02:21:03 +02:00
Marek Marczykowski
3a875edf58 dom0/core: fix qubes-dom0-network-via-netvm (#660)
IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2.
2012-10-19 02:07:35 +02:00
Marek Marczykowski
3e90174910 Merge branch 'hvm-for-master'
Conflicts:
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-sync-clock
	version_dom0
	vm-systemd/qubes-sysinit.sh
2012-10-17 21:41:03 +02:00
Marek Marczykowski
d010906eb1 Merge remote-tracking branch 'abb/qvm_block-bugfix' 2012-10-16 00:59:36 +02:00
Alexandre Bezroutchko
ca4367821e Improve handling of command line parameters, don't silently ignore unexpected arguments.
This is to avoid following behavior:

    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB

    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB

    [abb@dom0 qubes-core]$ qvm-block -a qdvp dom0:sdb

    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB (attached to 'qdvp' as 'xvdi')

    [abb@dom0 qubes-core]$ qvm-block -d qdvp BLAHBLAH
                                          ^^^^^^^^^^^^^
    >>> The last parameter is silently ignored and all devices get detached

    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB
2012-10-15 11:40:08 +02:00
Alexandre Bezroutchko
3c53f049a3 dom0/qvm-block: cosmetic 2012-10-08 01:23:42 +02:00
Alexandre Bezroutchko
caf3ed1ae4 cosmetic 2012-10-08 00:46:30 +02:00
Marek Marczykowski
d03bab3db2 Merge branch 'master-for-hvm' into hvm
Conflicts:
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-sync-clock
2012-10-04 05:45:41 +02:00
Olivier Médoc
69354475bf dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues 2012-10-04 05:44:19 +02:00
Olivier Médoc
9a90f499bc dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues 2012-10-03 14:55:05 +02:00
Marek Marczykowski
c1214bfef9 dom0/core: VM property for qrexec startup timeout (#27 pro) 2012-09-25 03:26:44 +02:00
Marek Marczykowski
b7eaf9a30d dom0/core: do not use hardcoded "user" in qvm-sync-clock 2012-08-31 00:53:50 +02:00
Marek Marczykowski
c0455ac641 Merge branch 'master' into hvm
Conflicts:
	dom0/qvm-tools/qvm-create
	version_dom0
2012-08-23 11:11:59 +02:00
Marek Marczykowski
1cd3ef3456 dom0/qvm-tools: catch exceptions while settting VM name (#656) 2012-08-23 04:02:50 +02:00
Marek Marczykowski
b7f5c6ac0b dom0/qvm-tools: catch exceptions while settting VM name (#656) 2012-08-23 03:48:03 +02:00
Marek Marczykowski
9b3a77bc1d dom0: move RPC services to separate directory (#654)
This makes more clear which code have contact with untrusted data from VM.
2012-08-16 16:56:16 +02:00
Marek Marczykowski
e1404a2d4f dom0/qvm-run: do not break --all when run in one VM failed 2012-08-04 04:15:33 +02:00
Marek Marczykowski
847fe81dcd dom0/qvm-run: do not break --all when run in one VM failed 2012-08-01 01:01:37 +02:00
Marek Marczykowski
e6c8bf81fd Merge branch 'master' into hvm
Conflicts:
	version_dom0
2012-08-01 00:55:05 +02:00
Marek Marczykowski
a680976f1e dom0/updates: show errors from qubes-receive-updates
Especially when signature verification failed, show message about it, not
enigmatic "Could not open/read
file:///var/lib/qubes/updates/repodata/repomd.xml"
2012-07-30 23:16:05 +02:00
Marek Marczykowski
c2d4b0de62 dom0/updates: typo fix in qubes-manager statfile handling 2012-07-30 23:16:05 +02:00
Marek Marczykowski
d5dbbd41cb dom0/qvm-tools: add missing imports 2012-07-20 13:09:07 +02:00
Marek Marczykowski
b321d16336 dom0/qvm-tools: add missing imports 2012-07-18 18:10:08 +02:00
Marek Marczykowski
4b92f6390a dom0/qvm-core: ignore stderr from VM commands when not needed for sure (#626)
pam_systemd.so has a bug, which cause spurious '...killed' output on stderr.
2012-07-16 13:36:08 +02:00
Marek Marczykowski
5637793fae dom0/qvm-core: ignore stderr from VM commands when not needed for sure (#626)
pam_systemd.so has a bug, which cause spurious '...killed' output on stderr.
2012-07-16 13:31:43 +02:00
Marek Marczykowski
6c74db3aac dom0/qvm-sync-appmenus: use qubes.GetAppmenus service 2012-07-15 02:41:23 +02:00
Marek Marczykowski
c0ffdd6fa5 dom0/dom0-updates: remove updates-pending flag after update installation 2012-07-15 02:41:23 +02:00
Marek Marczykowski
1009b1a46d dom0/qvm-sync-appmenus: use qubes.GetAppmenus service 2012-07-15 02:26:17 +02:00
Marek Marczykowski
d156a815d2 dom0/dom0-updates: remove updates-pending flag after update installation 2012-07-14 15:55:46 +02:00
Marek Marczykowski
b42e09e4ba dom0/qvm-tools: Warn the user when running qvm-tool as root is not recommended (#612) 2012-07-12 03:57:22 +02:00
Marek Marczykowski
2c0d0dff8b dom0/qvm-sync-clock: string '\n' from date output 2012-07-12 03:56:09 +02:00
Marek Marczykowski
ac76b7203f dom0/qvm-sync-clock: string '\n' from date output 2012-07-12 03:43:57 +02:00
Marek Marczykowski
ba81866b2f dom0/qvm-tools: Warn the user when running qvm-tool as root is not recommended (#612) 2012-07-11 23:53:23 +02:00
Marek Marczykowski
64369bf02a dom0/qvm-run: Notify qubes-manager about failed VM start (#615) 2012-07-05 01:43:32 +02:00
Marek Marczykowski
897f981c8c dom0/qvm-run: Notify qubes-manager about failed VM start (#615) 2012-07-05 01:30:00 +02:00
Marek Marczykowski
2854f08bca dom0/core: fix the last merge...
Remove duplicated lines by faulty conflict resolution.
2012-06-28 12:28:14 +02:00
Marek Marczykowski
44767bea7f Merge branch 'master' into hvm
Conflicts:
	dom0/init.d/qubes_core
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-prefs
	version_dom0
	version_vm
2012-06-26 03:49:10 +02:00
Marek Marczykowski
89aaa60753 dom0: use RPC service to sync clock via NTP (#603) 2012-06-23 00:37:47 +02:00
Marek Marczykowski
1dad96b0e9 dom0: use RPC service to sync clock via NTP (#603) 2012-06-22 22:23:17 +02:00
Marek Marczykowski
0e2aba228f dom0: minor qvm-sync-clock fix
Catch any error in vm.run, to not break clock syncing of all VMs because one
VM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
ab9c2e503a dom0: qvm-run --nogui switch
Can be used to not start guid.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
06d99b77df dom0: minor qvm-sync-clock fix
Catch any error in vm.run, to not break clock syncing of all VMs because one
VM.
2012-06-15 17:42:14 +02:00
Marek Marczykowski
4dfad5f1ae dom0: qvm-run --nogui switch
Can be used to not start guid.
2012-06-15 17:37:19 +02:00
Marek Marczykowski
8bdc5706f7 dom0/core: allow to change default user for qvm-run (#577)
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 19:01:32 +02:00
Marek Marczykowski
6bd988bf81 dom0/core: allow to change default user for qvm-run (#577)
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 17:16:12 +02:00
Marek Marczykowski
e6a75c732e dom0/core: support for qrexec for Windows HVM
Because not every HVM will have qrexec agent installed, introduce VM property
'qrexec_installed'. If it is set, spawn qrexec_daemon at VM startup and allow
use of qvm-run.
2012-06-13 17:14:25 +02:00
Marek Marczykowski
3b8272c1b6 dom0/qvm-ls: replace 'netmask' column with 'ip back' (#573) 2012-06-05 21:21:53 +02:00
Marek Marczykowski
2c7227066c dom0/qvm-ls: replace 'netmask' column with 'ip back' (#573) 2012-06-05 19:58:58 +02:00