Marek Marczykowski
287da572e9
dom0+vm: introduce 'qubes-service' xenstore dir - enable/disable VM services from dom0
...
This allows control which services are started in VM by dom0. For some
situation vm_type was used, but it isn't enough - i.e. ntpd should be started
in one, selected NetVM.
2011-10-01 02:49:25 +02:00
Marek Marczykowski
d9cd2467b0
vm: get rid of "2" from qvm-* names ( #340 )
2011-09-03 17:12:24 +02:00
Rafal Wojtczuk
8e7dc52a1f
qvm-run (in vm): accept --dispvm argument
2011-08-29 17:34:15 +02:00
Rafal Wojtczuk
9fa0072215
qvm-open-in-*: recognize when the parameter is an url
...
and wrap it in html meta refresh tag, so that it will be opened by
the default browser.
2011-08-29 17:27:48 +02:00
Rafal Wojtczuk
a4708ae9b6
qrexec: implement qvm-run command for AppVMs
...
It is build upon qrexec2, qubes.VMShell command. So, in order to e.g.
start firefox in a fresh dispVM, do
qvm-run '$dispvm' firefox http://www.qubes-os.org
2011-08-29 16:46:44 +02:00
Rafal Wojtczuk
dc4d9b32f1
Add comments to policy files.
2011-07-22 16:11:03 +02:00
Rafal Wojtczuk
c23cc480b8
qrexec: use $anyvm and $dispvm symbols
2011-07-22 16:07:06 +02:00
Marek Marczykowski
4fd6cf98d5
vm: more reliably set IP address of VM
2011-07-14 02:11:43 +02:00
Marek Marczykowski
3e2c427953
gitignore
2011-07-10 12:47:09 +02:00
Marek Marczykowski
d11271df97
vm: Fix IP address of DispVM after restore ( #247 )
...
IP was set by udev script only on VM start, not restore
2011-07-09 17:54:47 +02:00
Rafal Wojtczuk
a50cc81b7b
qrexec: git add missing files
2011-07-07 11:17:00 +02:00
Rafal Wojtczuk
b3ce35b5e2
qrexec: change qrexec_client_vm syntax to be nicer to read
...
Now the local_program is just before arguments, which is nicer.
2011-07-06 14:21:35 +02:00
Rafal Wojtczuk
2fdf9761c7
qrexec: adjust DispVM code to the new qrexec API
...
Note, we have qvm-open-in-vm totally for free.
2011-07-06 12:32:20 +02:00
Rafal Wojtczuk
b7e8c2708c
qrexec: adjust intervm file copy code to the new qrexec API
2011-07-06 10:17:58 +02:00
Marek Marczykowski
d9d7a69c27
dom0+vm: Tools for downloading dom0 update by VM ( #198 )
...
Mainly 4 parts:
- scripts for providing rpmdb and yum repos to VM (choosen by qvm-set-updatevm)
- VM script for downloading updates (qubes_download_dom0_updates.sh)
- qfile-dom0-unpacker which receive updates, check signatures and place its in dom0 local yum repo
- qvm-dom0-upgrade which calls all of above and after all yum gpk-update-viewer
Besides qvm-dom0-upgrade, updates are checked every 6h and user is prompted if
want to download it. At dom0 side gpk-update-icon (disabled yet) should notice
new updates in "local" repo.
2011-06-22 00:44:48 +02:00
Marek Marczykowski
06780a848f
Merge branch 'r1-beta1-fixes'
2011-05-26 11:46:31 +02:00
Marek Marczykowski
a0cc67c00e
vm: Fix open() result checking
2011-05-26 11:45:51 +02:00
Marek Marczykowski
ada974a148
Merge branch 'r1-beta1-fixes'
2011-05-26 00:31:15 +02:00
Marek Marczykowski
449e99d2aa
vm: verify files copied with qvm-copy-to-vm using crc32
...
Additionally this introduces notification for qfile-agent when remote end
finished file writing.
2011-05-26 00:29:52 +02:00
Marek Marczykowski
54d6be0dd4
vm: Use variables in Makefile gcc command
2011-05-26 00:10:04 +02:00
Marek Marczykowski
986f4a888c
Merge branch 'r1-beta1-fixes'
...
Conflicts:
dom0/qvm-core/qubes.py
version_dom0
version_vm
2011-05-24 00:20:39 +02:00
Timo Juhani Lindfors
215e788f62
Add _GNU_SOURCE to get O_NOFOLLOW on debian squeeze.
2011-05-13 14:16:11 +02:00
Joanna Rutkowska
f28f2f2044
Merge branch 'sane-and-pretty' of git.qubes-os.org:/var/lib/qubes/git/rafal/core into r1-beta1
2011-05-10 12:41:00 +02:00
Rafal Wojtczuk
c677f1cc4e
qrexec and qfile-*: compile with -pie
...
For full ASLR.
2011-05-10 12:19:28 +02:00
Marek Marczykowski
f28407bca6
Run qubes_core_appvm also in TemplateVM ( #222 )
2011-05-10 00:53:38 +02:00
Marek Marczykowski
1071e3a53c
Fix typo
2011-05-10 00:53:33 +02:00
Marek Marczykowski
3d92e50792
Merge branch 'sane-and-pretty' of ssh://git.qubes-os.org/var/lib/qubes/git/rafal/core
2011-05-09 12:25:14 +02:00
Rafal Wojtczuk
7294f8f345
qfile-unpacker: prefix all variables with untrusted_
2011-05-09 11:02:40 +02:00
Marek Marczykowski
ec3f427988
Run qubes_core_appvm also in TemplateVM ( #222 )
2011-04-19 13:10:18 +02:00
Marek Marczykowski
fa99d32d6e
Fix typo
2011-04-19 13:07:13 +02:00
Marek Marczykowski
fb4ee67b7b
Show progress of qvm-copy-to-vm by default ( #221 )
2011-04-19 13:06:34 +02:00
Joanna Rutkowska
7097cfa2ac
Add explanations why we don't isolate root from user in VMs and in Dom0
2011-04-07 19:38:02 +02:00
Marek Marczykowski
8047ec780a
Remove passwords prompts for user and root ( #202 )
2011-04-06 23:04:42 +02:00
Joanna Rutkowska
a83e8c2d2d
commonvm: Update repo info, use local RPM keys
2011-04-04 11:27:48 +02:00
Joanna Rutkowska
f713729826
Move nautilus scripts creation to qubes_core
...
qubes_core_appvm executes too early, when /home is still not symlinked to /rw/home.
2011-03-31 15:15:10 +02:00
Joanna Rutkowska
bce4b225cf
Autoclose file copy progress dialog
2011-03-31 15:03:25 +02:00
Joanna Rutkowska
c76d40b3fa
Display name of the destVM in copy progress dialog
2011-03-31 14:44:48 +02:00
Joanna Rutkowska
62acf277fa
Fix syntax error that prevent zenity copy progress dialog to appear
2011-03-31 14:43:47 +02:00
Joanna Rutkowska
df8ac3ff7f
On each startup check if user has symlinks for nautilus qubes-specific actions
...
Create symlinks if not. This is useful when migrating from old templates (#163 )
2011-03-31 13:53:11 +02:00
Joanna Rutkowska
9cf34a5c30
Ident fixes
2011-03-31 13:44:14 +02:00
Joanna Rutkowska
d5537b72a7
Use zenity instead of kdialog in appvm code
2011-03-31 13:26:41 +02:00
Rafal Wojtczuk
7753d26dd8
Actually add appvm/qvm-copy-to-vm
2011-03-30 17:27:04 +02:00
Rafal Wojtczuk
8e2aa6c825
Renamed qvm-copy-to-vm2 to qvm-trigger-copy-to-vm
...
The new name describes the task of the script better.
2011-03-30 16:48:48 +02:00
Rafal Wojtczuk
fab96d2225
qvm-copy-to-vm2.kde: calculate size of sparse files correctly
2011-03-30 10:30:27 +02:00
Rafal Wojtczuk
7ac754eb63
qvm-copy-to-vm2.kde: prepare for a race in PROGRESS_FILE creation
...
Apparently a tight race may happen when PROGRESS_FILE has been created,
but not yet written to by qfile-agent. Check if its content are
sane before use.
2011-03-30 10:28:25 +02:00
Rafal Wojtczuk
93e5b749fd
qfile-copy: try to produce only one error message
2011-03-29 13:05:57 +02:00
Marek Marczykowski
d87265851c
Merge branch 'spring-merge' of ssh://git.qubes-os.org/var/lib/qubes/git/rafal/core
2011-03-24 16:43:13 -04:00
Rafal Wojtczuk
769213e019
Removed obsolete code, in appvm.
2011-03-24 17:13:21 +01:00
Rafal Wojtczuk
68ebe12cb1
dvm_file_editor: correctly nuke children's stdin/out/err
2011-03-24 14:33:43 +01:00
Marek Marczykowski
14e50e983d
gitignores
2011-03-23 19:57:48 -04:00