Commit Graph

115 Commits

Author SHA1 Message Date
Marek Marczykowski
287da572e9 dom0+vm: introduce 'qubes-service' xenstore dir - enable/disable VM services from dom0
This allows control which services are started in VM by dom0. For some
situation vm_type was used, but it isn't enough - i.e. ntpd should be started
in one, selected NetVM.
2011-10-01 02:49:25 +02:00
Marek Marczykowski
d9cd2467b0 vm: get rid of "2" from qvm-* names (#340) 2011-09-03 17:12:24 +02:00
Rafal Wojtczuk
8e7dc52a1f qvm-run (in vm): accept --dispvm argument 2011-08-29 17:34:15 +02:00
Rafal Wojtczuk
9fa0072215 qvm-open-in-*: recognize when the parameter is an url
and wrap it in html meta refresh tag, so that it will be opened by
the default browser.
2011-08-29 17:27:48 +02:00
Rafal Wojtczuk
a4708ae9b6 qrexec: implement qvm-run command for AppVMs
It is build upon qrexec2, qubes.VMShell command. So, in order to e.g.
start firefox in a fresh dispVM, do
qvm-run '$dispvm' firefox http://www.qubes-os.org
2011-08-29 16:46:44 +02:00
Rafal Wojtczuk
dc4d9b32f1 Add comments to policy files. 2011-07-22 16:11:03 +02:00
Rafal Wojtczuk
c23cc480b8 qrexec: use $anyvm and $dispvm symbols 2011-07-22 16:07:06 +02:00
Marek Marczykowski
4fd6cf98d5 vm: more reliably set IP address of VM 2011-07-14 02:11:43 +02:00
Marek Marczykowski
3e2c427953 gitignore 2011-07-10 12:47:09 +02:00
Marek Marczykowski
d11271df97 vm: Fix IP address of DispVM after restore (#247)
IP was set by udev script only on VM start, not restore
2011-07-09 17:54:47 +02:00
Rafal Wojtczuk
a50cc81b7b qrexec: git add missing files 2011-07-07 11:17:00 +02:00
Rafal Wojtczuk
b3ce35b5e2 qrexec: change qrexec_client_vm syntax to be nicer to read
Now the local_program is just before arguments, which is nicer.
2011-07-06 14:21:35 +02:00
Rafal Wojtczuk
2fdf9761c7 qrexec: adjust DispVM code to the new qrexec API
Note, we have qvm-open-in-vm totally for free.
2011-07-06 12:32:20 +02:00
Rafal Wojtczuk
b7e8c2708c qrexec: adjust intervm file copy code to the new qrexec API 2011-07-06 10:17:58 +02:00
Marek Marczykowski
d9d7a69c27 dom0+vm: Tools for downloading dom0 update by VM (#198)
Mainly 4 parts:
 - scripts for providing rpmdb and yum repos to VM (choosen by qvm-set-updatevm)
 - VM script for downloading updates (qubes_download_dom0_updates.sh)
 - qfile-dom0-unpacker which receive updates, check signatures and place its in dom0 local yum repo
 - qvm-dom0-upgrade which calls all of above and after all yum gpk-update-viewer

Besides qvm-dom0-upgrade, updates are checked every 6h and user is prompted if
want to download it. At dom0 side gpk-update-icon (disabled yet) should notice
new updates in "local" repo.
2011-06-22 00:44:48 +02:00
Marek Marczykowski
06780a848f Merge branch 'r1-beta1-fixes' 2011-05-26 11:46:31 +02:00
Marek Marczykowski
a0cc67c00e vm: Fix open() result checking 2011-05-26 11:45:51 +02:00
Marek Marczykowski
ada974a148 Merge branch 'r1-beta1-fixes' 2011-05-26 00:31:15 +02:00
Marek Marczykowski
449e99d2aa vm: verify files copied with qvm-copy-to-vm using crc32
Additionally this introduces notification for qfile-agent when remote end
finished file writing.
2011-05-26 00:29:52 +02:00
Marek Marczykowski
54d6be0dd4 vm: Use variables in Makefile gcc command 2011-05-26 00:10:04 +02:00
Marek Marczykowski
986f4a888c Merge branch 'r1-beta1-fixes'
Conflicts:
	dom0/qvm-core/qubes.py
	version_dom0
	version_vm
2011-05-24 00:20:39 +02:00
Timo Juhani Lindfors
215e788f62 Add _GNU_SOURCE to get O_NOFOLLOW on debian squeeze. 2011-05-13 14:16:11 +02:00
Joanna Rutkowska
f28f2f2044 Merge branch 'sane-and-pretty' of git.qubes-os.org:/var/lib/qubes/git/rafal/core into r1-beta1 2011-05-10 12:41:00 +02:00
Rafal Wojtczuk
c677f1cc4e qrexec and qfile-*: compile with -pie
For full ASLR.
2011-05-10 12:19:28 +02:00
Marek Marczykowski
f28407bca6 Run qubes_core_appvm also in TemplateVM (#222) 2011-05-10 00:53:38 +02:00
Marek Marczykowski
1071e3a53c Fix typo 2011-05-10 00:53:33 +02:00
Marek Marczykowski
3d92e50792 Merge branch 'sane-and-pretty' of ssh://git.qubes-os.org/var/lib/qubes/git/rafal/core 2011-05-09 12:25:14 +02:00
Rafal Wojtczuk
7294f8f345 qfile-unpacker: prefix all variables with untrusted_ 2011-05-09 11:02:40 +02:00
Marek Marczykowski
ec3f427988 Run qubes_core_appvm also in TemplateVM (#222) 2011-04-19 13:10:18 +02:00
Marek Marczykowski
fa99d32d6e Fix typo 2011-04-19 13:07:13 +02:00
Marek Marczykowski
fb4ee67b7b Show progress of qvm-copy-to-vm by default (#221) 2011-04-19 13:06:34 +02:00
Joanna Rutkowska
7097cfa2ac Add explanations why we don't isolate root from user in VMs and in Dom0 2011-04-07 19:38:02 +02:00
Marek Marczykowski
8047ec780a Remove passwords prompts for user and root (#202) 2011-04-06 23:04:42 +02:00
Joanna Rutkowska
a83e8c2d2d commonvm: Update repo info, use local RPM keys 2011-04-04 11:27:48 +02:00
Joanna Rutkowska
f713729826 Move nautilus scripts creation to qubes_core
qubes_core_appvm executes too early, when /home is still not symlinked to /rw/home.
2011-03-31 15:15:10 +02:00
Joanna Rutkowska
bce4b225cf Autoclose file copy progress dialog 2011-03-31 15:03:25 +02:00
Joanna Rutkowska
c76d40b3fa Display name of the destVM in copy progress dialog 2011-03-31 14:44:48 +02:00
Joanna Rutkowska
62acf277fa Fix syntax error that prevent zenity copy progress dialog to appear 2011-03-31 14:43:47 +02:00
Joanna Rutkowska
df8ac3ff7f On each startup check if user has symlinks for nautilus qubes-specific actions
Create symlinks if not. This is useful when migrating from old templates (#163)
2011-03-31 13:53:11 +02:00
Joanna Rutkowska
9cf34a5c30 Ident fixes 2011-03-31 13:44:14 +02:00
Joanna Rutkowska
d5537b72a7 Use zenity instead of kdialog in appvm code 2011-03-31 13:26:41 +02:00
Rafal Wojtczuk
7753d26dd8 Actually add appvm/qvm-copy-to-vm 2011-03-30 17:27:04 +02:00
Rafal Wojtczuk
8e2aa6c825 Renamed qvm-copy-to-vm2 to qvm-trigger-copy-to-vm
The new name describes the task of the script better.
2011-03-30 16:48:48 +02:00
Rafal Wojtczuk
fab96d2225 qvm-copy-to-vm2.kde: calculate size of sparse files correctly 2011-03-30 10:30:27 +02:00
Rafal Wojtczuk
7ac754eb63 qvm-copy-to-vm2.kde: prepare for a race in PROGRESS_FILE creation
Apparently a tight race may happen when PROGRESS_FILE has been created,
but not yet written to by qfile-agent. Check if its content are
sane before use.
2011-03-30 10:28:25 +02:00
Rafal Wojtczuk
93e5b749fd qfile-copy: try to produce only one error message 2011-03-29 13:05:57 +02:00
Marek Marczykowski
d87265851c Merge branch 'spring-merge' of ssh://git.qubes-os.org/var/lib/qubes/git/rafal/core 2011-03-24 16:43:13 -04:00
Rafal Wojtczuk
769213e019 Removed obsolete code, in appvm. 2011-03-24 17:13:21 +01:00
Rafal Wojtczuk
68ebe12cb1 dvm_file_editor: correctly nuke children's stdin/out/err 2011-03-24 14:33:43 +01:00
Marek Marczykowski
14e50e983d gitignores 2011-03-23 19:57:48 -04:00