Marek Marczykowski-Górecki
0d1523e28f
Merge remote-tracking branch 'qubesos/pr/25'
...
* qubesos/pr/25:
Add missing options to qvm-backup-restore doc.
Fix --rename-conflicting option.
Fixes QubesOS/qubes-issues#1883
2016-03-29 11:17:51 +02:00
Marek Marczykowski-Górecki
c60844a8d4
Merge remote-tracking branch 'qubesos/pr/21'
...
* qubesos/pr/21:
Disable debug packages for core-dom0
2016-03-29 11:17:09 +02:00
Danny Fullerton
e863b0ea50
Add missing options to qvm-backup-restore doc.
2016-03-28 20:33:34 -04:00
Danny Fullerton
efb5c1fd25
Fix --rename-conflicting option.
...
The code was fully implemented - and tested - but didn't worked from the cli.
2016-03-28 13:45:23 -04:00
Marek Marczykowski-Górecki
5566f31a42
tests: qrexec service argument
...
QubesOS/qubes-issues#1876
2016-03-28 01:19:23 +02:00
Marek Marczykowski-Górecki
b396629d44
tests: qvm-move-to-vm
2016-03-28 01:19:01 +02:00
Marek Marczykowski-Górecki
54eee12b51
tests: setup qrexec policy instead of clicking in confirmation dialog
...
xdotool is unreliable so the less of it, the better.
2016-03-27 19:28:52 +02:00
Jon Griffiths
5f3ffbbe36
Disable debug packages for core-dom0
...
Leave the 'proper' fix of making this package noarch commented
out for now, to allow this to be merged.
Comments as per the parallel submit to qubes-artwork.
2016-03-22 10:04:27 +13:00
Marek Marczykowski-Górecki
c036a85579
Merge remote-tracking branch 'qubesos/pr/24'
...
* qubesos/pr/24:
Nicely print list of excluded VMs
2016-03-14 23:01:15 +01:00
Marek Marczykowski-Górecki
9cce9ee883
Merge remote-tracking branch 'qubesos/pr/23'
...
* qubesos/pr/23:
added to rpm_spec/core-dom0.spec
fixed wrong target filename
use shuf rather than od because it is more readable
implemented dom0 qubes.GetRandomizedTime
2016-03-14 23:00:43 +01:00
Patrick Schleizer
cf5730934a
added to rpm_spec/core-dom0.spec
2016-03-14 22:50:46 +01:00
Patrick Schleizer
2a46ebb205
fixed wrong target filename
2016-03-14 22:47:46 +01:00
Axon
01b667427f
Nicely print list of excluded VMs
...
Prints a sorted list of VMs not selected for backup, one name per line.
(Fixes QubesOS/qubes-issues#1023 )
2016-03-14 12:13:04 +00:00
Marek Marczykowski-Górecki
830444fefb
Merge remote-tracking branch 'qubesos/pr/20'
...
* qubesos/pr/20:
qvm-backup/qvm-backup-restore: Allow reading pass phrase from file or stdin
2016-03-13 03:39:14 +01:00
Marek Marczykowski-Górecki
bc1c3c2cc0
Merge remote-tracking branch 'qubesos/pr/19'
...
* qubesos/pr/19:
qvm-create: Don't allow the user to manually create dispNN names
2016-03-13 03:38:48 +01:00
Marek Marczykowski-Górecki
57f259700c
Merge remote-tracking branch 'qubesos/pr/18'
...
* qubesos/pr/18:
filename sanitization
2016-03-13 03:38:16 +01:00
Marek Marczykowski-Górecki
63f0966cdd
tests: fix MimeHandlers after "29c602c tests: prefix internal functions with underscore"
2016-03-13 03:37:04 +01:00
Marek Marczykowski-Górecki
b24ba307c3
tests: move warning to the module level
2016-03-13 03:36:20 +01:00
Patrick Schleizer
524888d2fd
use shuf rather than od because it is more readable
...
Thanks to @marmarek for the suggestion!
https://github.com/QubesOS/qubes-core-admin/pull/23/files#r55930643
2016-03-13 01:52:03 +00:00
Patrick Schleizer
e33b958bdd
implemented dom0 qubes.GetRandomizedTime
...
Required for fixing 'sys-whonix doesn't connect to Tor after system suspend'.
https://github.com/QubesOS/qubes-issues/issues/1764
2016-03-13 01:15:46 +00:00
Jon Griffiths
63407b689e
qvm-backup/qvm-backup-restore: Allow reading pass phrase from file or stdin
...
Passing -p/--passphrase-file uses the first line of the file passed,
or stdin if '-' is given. This works with piped input too.
2016-03-09 01:41:20 +13:00
Marek Marczykowski-Górecki
9ac0cf8577
version 3.1.14
2016-03-07 03:55:23 +01:00
Marek Marczykowski-Górecki
65255626e2
core: add separate QubesDB entry for primary DNS address
...
Fixes QubesOS/qubes-issues#1817
2016-03-07 03:54:21 +01:00
Marek Marczykowski-Górecki
bc240bd742
tests: move external test loader to qubes.tests.extra module
...
This way, tests will appear as from 'extra' module.
Besides the move, some minor changes:
- add missing self.qc.unlock_db() in create_vms()
- suffix per-template tests with template name
QubesOS/qubes-issues#1800
2016-03-03 23:47:52 +01:00
Marek Marczykowski-Górecki
02c601b830
tests: expose API for external tests
...
Fixes QubesOS/qubes-issues#1800
2016-03-03 23:47:52 +01:00
Marek Marczykowski-Górecki
3f66da0412
tests: add a function for adding qrexec rules
...
QubesOS/qubes-issues#1800
2016-03-03 23:47:51 +01:00
Marek Marczykowski-Górecki
29c602c9ff
tests: prefix internal functions with underscore
...
Preparation for API for external tests.
QubesOS/qubes-issues#1800
2016-03-03 23:47:51 +01:00
Marek Marczykowski-Górecki
7ca89688bd
Improve expectedFailureIfTemplate decorator
2016-03-03 23:47:51 +01:00
Marek Marczykowski-Górecki
8497471a72
tests: fix preparation of "small" backup storage in Debian 7
...
losetup Debian 7 doesn't deal with /dev/loop-control, so needs
existing /dev/loop* devices. Just /dev/loop0 is enough.
2016-03-03 23:47:51 +01:00
Marek Marczykowski-Górecki
fae73e6373
qvm-sync-clock: clarify message on NTP call failed and --force used
2016-03-03 23:47:50 +01:00
Marek Marczykowski-Górecki
5c877e9850
tests: mark NetworkManager in ProxyVM fail for debian-7
...
NM there expect some different options in configuration, and since it's
old stable, we won't implement it.
2016-03-03 23:47:50 +01:00
Marek Marczykowski-Górecki
4420b320e7
tests: add expectedFailureIfTemplate decorator
...
Some tests are expected to fail only on some templates (some feature not
available in older distribution, some feature not yet ported to
another).
2016-03-03 23:47:50 +01:00
Marek Marczykowski-Górecki
280a0743c2
core: typo fix in error handling cont
...
s/VIR_INTERNAL_ERROR/VIR_ERR_INTERNAL_ERROR/
Related to QubesOS/qubes-issues#1537
Fixes QubesOS/qubes-issues#1804
2016-03-03 23:47:38 +01:00
Jon Griffiths
4dd87f2683
qvm-create: Don't allow the user to manually create dispNN names
2016-03-03 13:46:20 +13:00
Marek Marczykowski-Górecki
3bef37f881
tests: PCI passthrough to HVM
...
A simple test which checks if the device is visible there at all.
Device set with QUBES_TEST_PCIDEV env variable is used - it should be
some unimportant device which can be freely detached from dom0.
QubesOS/qubes-issues#1659
2016-02-26 11:04:52 +01:00
Marek Marczykowski-Górecki
26443e1dd2
tests: add function to create minimal OS in HVM
...
SystemTestsMixin.prepare_hvm_system_linux creates minimal Linux
installation necessary to launch simple shell script. It installs:
- grub2
- kernel from dom0 (the same as the running one)
- dracut based initramfs, with provided script set as pre-pivot hook
Done in preparation for QubesOS/qubes-issues#1659 test
2016-02-26 10:59:20 +01:00
Zrubi
4ae52b037b
filename sanitization
2016-02-25 15:05:06 +01:00
Marek Marczykowski-Górecki
fa66fec684
version 3.1.13
2016-02-23 16:28:14 +01:00
Marek Marczykowski-Górecki
d3f83876eb
rpm: require new enough qubes-core-dom0-linux package
...
For qvm-sync-clock --force option.
2016-02-23 16:22:02 +01:00
Marek Marczykowski-Górecki
0fb69d39ca
tests: qvm-sync-clock is asynchronouse, take it into account
2016-02-23 16:20:18 +01:00
Marek Marczykowski-Górecki
3ece17a8cf
qvm-sync-clock: sync dom0 clock only when NTP sync succeeded, even with --force
...
Otherwise dom0 clock (initially almost ok) may be adjusted to totally
invalid timestamp of ClockVM (for example just after resume from S3
sleep).
2016-02-22 20:56:38 +01:00
Marek Marczykowski-Górecki
3f19157d2f
Merge remote-tracking branch 'qubesos/pr/16'
...
* qubesos/pr/16:
new --force option for qvm-sync-clock to be able to bypass time sync errors
2016-02-22 20:44:30 +01:00
Marek Marczykowski-Górecki
4658967d09
Merge remote-tracking branch 'qubesos/pr/17'
...
* qubesos/pr/17:
qvm-prefs: --get option was misspelled --gry
2016-02-22 20:44:00 +01:00
Marek Marczykowski-Górecki
0121cb2fd4
qmemman: make memory request handling more defensive
...
If getting memory for new VM fails for any reason, make sure that global
lock will be released. Otherwise qmemman will stop functioning at all.
QubesOS/qubes-issues#1636
2016-02-22 17:57:30 +01:00
Marek Marczykowski-Górecki
5546d679c0
dispvm: use try/finally to make sure that qubes.xml is unlocked
...
Even in case of some exception (in which case theoretically it should be
unlocked at qfile-daemon-dvm exit, but the script may wait for
something).
QubesOS/qubes-issues#1636
2016-02-21 12:41:13 +01:00
Jon Griffiths
9bd651faaa
qvm-prefs: --get option was misspelled --gry
2016-02-18 16:01:08 +13:00
Zrubi
2fcd3c6832
new --force option for qvm-sync-clock to be able to bypass time sync errors
2016-02-10 14:55:11 +01:00
Marek Marczykowski-Górecki
ae848d5369
version 3.1.12
2016-02-08 05:02:30 +01:00
Marek Marczykowski-Górecki
0e273276d3
qvm-run: warn if --localcmd used without --pass-io
2016-02-08 05:01:50 +01:00
Marek Marczykowski-Górecki
6378e2bd20
qvm-run: allow --localcmd with --pass-io, even when --all is given
...
With --localcmd, stdin/out are connected to that local process (instead
of a terminal), so it doesn't conflict with --all.
QubesOS/qubes-issues#1728
2016-02-08 04:50:05 +01:00