Wojtek Porczyk
96bff66546
qubes.dochelpers: Helpers for Sphinx documentation
...
Currently it is possible to refer to Qubes' tickets via 🎫 `#no`
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
87ae0112eb
qubes/vm: New XML format loading
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
f3673dd34c
core3 move: class QubesVmLabel
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
778571fe8d
core3 move: class QubesHost
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
c3dd13c0ab
qubes/log: logging routines
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
1fbb91a1aa
doc/apidoc: enable intersphinx to docs.python.org
2015-06-29 17:39:23 +02:00
Wojtek Porczyk
320cb096f6
qubes: drop dry_run
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
57d35fbc4c
qubes: fix qubes.QubesVMMConnection
...
fix logical error in resetting offline_mode
and drop redundant _common_getter()
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
cec3db993d
core3 move: class QubesVMMConnection
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
e1a6fb2859
core3 move: class QubesException
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
65595e3b39
apidoc stub
2015-06-29 17:39:22 +02:00
Wojtek Porczyk
7f27d987cc
import framework for core3
2015-06-29 17:39:22 +02:00
Marek Marczykowski-Górecki
8134360614
tests: fix skipping whonix in timezone test
2015-06-27 05:05:34 +02:00
Marek Marczykowski-Górecki
ad89c8f8a2
core: show clear message when a VM has non-existing PCI device assigned
2015-06-27 04:52:25 +02:00
Marek Marczykowski-Górecki
3867d1fdb3
tests: check timezone dom0->vm propagation
2015-06-27 04:47:27 +02:00
Marek Marczykowski-Górecki
ed9b4bfc54
tests: check firewall rules blocking VM IP spoofing
2015-06-27 04:46:17 +02:00
Marek Marczykowski-Górecki
8b4c9b23b3
tests: hide git check warning
2015-06-27 04:19:07 +02:00
Marek Marczykowski-Górecki
ee48954445
core: fix starting stubdom guid for HVM in debug mode
...
Remove artificial attribute '_start_guid_first' and use
guiagent_installed directly. This way starting guid for stubdom in debug
mode, even if guiagent_installed is set is much clearer.
2015-06-27 04:10:32 +02:00
Marek Marczykowski-Górecki
f7c86f861c
Prevent GUI usage in qvm-sync-clock
2015-06-23 00:15:21 +02:00
Marek Marczykowski-Górecki
df20a67a6c
Convert qubes.NotifyTools service to use qubesdb
2015-06-23 00:14:57 +02:00
Marek Marczykowski-Górecki
236dca29a8
tests/network: add support for Debian's default netcat implementation
...
By default Debian has different nc installed, which requires different
options.
2015-06-21 02:08:02 +02:00
Marek Marczykowski-Górecki
33f0fa17b8
tests: fix clipboard tess
2015-06-21 01:12:47 +02:00
Zrubi
2c1889acbb
YML output fix
...
(cherry picked from commit 53260bd66ba3f0b2cc62b9488d67cdcdb6cec1e8)
2015-06-12 10:25:02 +02:00
Marek Marczykowski-Górecki
4a8cfb3c88
version 3.0.14
2015-06-02 11:19:48 +02:00
Zrubi
d43848d163
YML output fix
...
(cherry picked from commit 60cf12b4fdea0d119c1b8ca0c84f77bd4877f843)
2015-06-02 11:18:18 +02:00
Marek Marczykowski-Górecki
9cbf9a8a59
Add support for 'pci_strictreset' option
...
This allows to assign PCI device to the VM, even if it doesn't support
proper reset. The default behaviour (when the value is True) is to not
allow such attachment (VM will not start if such device is assigned).
Require libvirt patch for this option.
2015-05-28 00:11:17 +02:00
Marek Marczykowski-Górecki
c9a670cbd1
linux/block-snapshot: fix handling root.img being already block device
2015-05-27 23:52:57 +02:00
Marek Marczykowski-Górecki
acbdb3a261
qvm-tools: do not show scary message on --force-root
...
When this option is used, the user probably already got that message.
Also some internal scripts are using this (for example template
pre-uninstall script).
Conflicts:
qvm-tools/qvm-remove
2015-05-23 04:43:51 +02:00
Marek Marczykowski-Górecki
449554f404
version 3.0.13
2015-05-15 03:29:20 +02:00
Marek Marczykowski-Górecki
23ae0ed990
dispvm: clean the VM in case of failed savefile creation
...
Otherwise further tries to regenerate savefile would fail.
2015-05-15 03:22:06 +02:00
Marek Marczykowski-Górecki
8aaef404de
qvm-prefs: add an option to get a single VM property
...
Could be useful for scripts
2015-05-15 03:22:06 +02:00
Marek Marczykowski-Górecki
dadcfc334d
dispvm: set 'memory' to the size reported on savefile generation
...
That parameter will be used later to request memory from qmemman just
before loading savefile to memory, so it should match the real need.
Do not allow values smaller than 400, to prevent storing some erroneous
values.
Fixes qubesos/qubes-issues#973
2015-05-15 03:22:06 +02:00
Marek Marczykowski-Górecki
2856b6a836
Wait for udev to create loopXpY device when preparing volatile.img
2015-05-13 04:12:42 +02:00
Marek Marczykowski-Górecki
d5b67a67a2
Fix "dispvm: sanitize used memory info received from VM"
...
There should be no -q option - we actually want the result.
Fixes qubesos/qubes-issues#994
2015-05-13 04:12:20 +02:00
Marek Marczykowski-Górecki
b159f544d3
version 3.0.12
2015-05-11 02:34:11 +02:00
Marek Marczykowski-Górecki
b1f4e6d15c
backup: fix missing 'unused' variables
...
Actually the 'vm' variable is used - in eval'ed statement.
2015-05-11 02:31:56 +02:00
Zrubi
770cf5cce0
Wiki -> YML output format change + basic TPM detection
...
(cherry picked from commit 28097bfdf1e3220a9de295cb7621d611d4f0620b)
2015-05-10 03:29:20 +02:00
Marek Marczykowski-Górecki
47a6bf4f7a
version 3.0.11
2015-05-04 02:42:27 +02:00
Marek Marczykowski-Górecki
602155374a
dispvm: restore DispVM naming independent of Qubes VM ID ( #983 )
...
Using QID for DispVM ID was a bad idea in terms of anonymity:
1. It gives some clue about VMs count in the system. In case of large
numbers, this can be quite unique.
2. If new DispVM is started just after closing previous one, it will get
the same ID, and in consequence the same IP. In case of using TorVM,
this leads to use the same circuit as just closed DispVM.
Fixes qubesos/qubes-issues#983
2015-05-04 00:41:33 +02:00
Marek Marczykowski-Górecki
ef1494eb54
gitignore
2015-05-04 00:35:57 +02:00
Marek Marczykowski-Górecki
77da23fba2
dispvm: fix netvm presence reporting
...
If desired netvm presence is different than during savefile creation(*),
defer setting the netvm until new DispVM is running - otherwise kernel
there will not notice the change and will either have (not working)
'eth0' when it shouldn't, or will not have it while it should.
Additionally set dispvm.uses_default_netvm = False, so GUI tools will
display actual netvm value.
(*) Actually compare to netvm set for dispvm template (`TEMPLATE-dvm`
VM), which can be different if user just changed that but not
regenerated dispvm savefile yet.
Fixes qubesos/qubes-issues#985
Related to qubesos/qubes-issues#862
2015-05-03 20:40:37 +02:00
Marek Marczykowski-Górecki
b985bf3b65
core: fix removing VMs not registered in libvirt
...
It can happen that VM will not be registered in libvirt (for example
when it was never started). It shouldn't be a problem when we want to
remove it.
2015-05-03 20:26:07 +02:00
Marek Marczykowski-Górecki
ed03fb4313
dispvm: remove unused imports, mark methods as static where appropriate
2015-05-03 20:25:39 +02:00
Marek Marczykowski-Górecki
3ca94941b1
dispvm: update copyright header
2015-05-03 20:25:08 +02:00
Marek Marczykowski-Górecki
4e4a4a60c3
dispvm: code style - whitespace fixes
2015-05-03 20:24:45 +02:00
Marek Marczykowski-Górecki
6ecc263534
core: use libvirtError instance instead of virConnGetLastError
2015-05-03 20:23:26 +02:00
Marek Marczykowski-Górecki
13f0f64d0a
backup: code style, no functional change (part 2)
...
Remove unused variables, rename potentially coliding one.
2015-05-03 14:57:28 +02:00
Marek Marczykowski-Górecki
9ec0580840
backup: code style fixes, no functional change (part 1)
...
Indentation, break long lines, use is/is not None instead of ==/!=.
2015-05-03 14:57:28 +02:00
Marek Marczykowski-Górecki
e2d6ff653a
version 3.0.10
2015-04-28 15:01:20 +02:00
Marek Marczykowski-Górecki
1d69f2c24a
qvm-tools: fix qvm-firewall -r
2015-04-28 15:00:50 +02:00