| 
							
							
								 Marek Marczykowski | 3a875edf58 | dom0/core: fix qubes-dom0-network-via-netvm (#660) IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2. | 2012-10-19 02:07:35 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 3e90174910 | Merge branch 'hvm-for-master' Conflicts:
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-sync-clock
	version_dom0
	vm-systemd/qubes-sysinit.sh | 2012-10-17 21:41:03 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | d010906eb1 | Merge remote-tracking branch 'abb/qvm_block-bugfix' | 2012-10-16 00:59:36 +02:00 |  | 
			
				
					| 
							
							
								 Alexandre Bezroutchko | ca4367821e | Improve handling of command line parameters, don't silently ignore unexpected arguments. This is to avoid following behavior:
    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB
    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB
    [abb@dom0 qubes-core]$ qvm-block -a qdvp dom0:sdb
    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB (attached to 'qdvp' as 'xvdi')
    [abb@dom0 qubes-core]$ qvm-block -d qdvp BLAHBLAH
                                          ^^^^^^^^^^^^^
    >>> The last parameter is silently ignored and all devices get detached
    [abb@dom0 qubes-core]$ qvm-block -l
    netvm:sda       STORAGE_DEVICE () 0 B
    dom0:sdb1       Cruzer () 3 GiB
    dom0:sdb        Cruzer () 3 GiB | 2012-10-15 11:40:08 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 73ac8250e0 | vm/systemd: force exit status 0 in qubes-sysinit If /rw/config/rc.local-early does not exits, exit status is incorrectly 1. | 2012-10-15 02:33:36 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 02601049ca | dom0/qmemman: do not fail when domain name not available This can be the case when domain just dissapeared (destroy), but qmemman didn't
processed xenstore watch trigger. | 2012-10-15 01:58:07 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 3183942a9d | vm/network: do not fail service on failed xenstore-read | 2012-10-13 11:47:32 +02:00 |  | 
			
				
					| 
							
							
								 Bruce A Downs | 6304155990 | dom0/core: minor spell check fixes * happend
* avilable
* skiping | 2012-10-09 01:23:54 +02:00 |  | 
			
				
					| 
							
							
								 Bruce A Downs | 05f7bfc9c1 | dom0/core: Code cleanup of qubesutils.py * Took out unreferenced restore_vm_file function
* removed unused imports
* renamed interpreter from python2 to python | 2012-10-09 01:23:45 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 081cfab559 | dom0/core: do not leak xs transaction and use it in all xs calls | 2012-10-08 01:26:07 +02:00 |  | 
			
				
					| 
							
							
								 Alexandre Bezroutchko | f4ef1adcdd | dom0/qvm-core: start XS transaction before getting the list of domains | 2012-10-08 01:23:52 +02:00 |  | 
			
				
					| 
							
							
								 Alexandre Bezroutchko | 3c53f049a3 | dom0/qvm-block: cosmetic | 2012-10-08 01:23:42 +02:00 |  | 
			
				
					| 
							
							
								 Alexandre Bezroutchko | abfe99756f | start XS transaction before getting the list of domains | 2012-10-08 00:48:20 +02:00 |  | 
			
				
					| 
							
							
								 Alexandre Bezroutchko | caf3ed1ae4 | cosmetic | 2012-10-08 00:46:30 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 5e08cbc3de | vm/appmenus: include subdirs with .desktop files | 2012-10-06 22:18:00 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | d03bab3db2 | Merge branch 'master-for-hvm' into hvm Conflicts:
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-sync-clock | 2012-10-04 05:45:41 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 490a5e9e1a | vm/spec: fix adding yum-proxy configuration Do not add entry if already present. | 2012-10-04 05:44:20 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 5e696298cf | dom0/core: fix icon handling on VM clone | 2012-10-04 05:44:20 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | d5c74f69ee | dom0/core: recreate appmenus after rename for any VM, not only AppVM (#659) | 2012-10-04 05:44:20 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 9a2f1dfebe | dom0/core: include net/proxy VM default appmenus list in cloned template | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Olivier Médoc | 69354475bf | dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Bruce A Downs | d19a3cce99 | vm: Added 'most recently used' feature to 'copy to vm' dialog * replaced zenity to qvm-mru-entry in qubes_rpc/qvm-copy-to-vm.gnome
* added python script qubes_rpc/qvm-mru-entry
* added /usr/bin/qvm-mru-entry to rpm_spec/core-vm.spec | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Bruce A Downs | dba7d94fba | vm/spec: mod to core-vm.spec to add test for files core rpm was failing during uninstall attempting to move non-existent files
* /var/lib/qubes/fstab.orig
* /var/lib/qubes/serial.orig | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 7a485ab7f9 | vm/file-editor: connect /dev/null as stdin (#657) If stdin is closed (not connected to /dev/null) first opened file will get fd=0
and will be treated as stdin. | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 303d4ab042 | dom0/iptables: block IPv6 traffic Dom0 is network isolated anyway, but apply also firewall in case of use
qubes-dom0-network-via-netvm. | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 9c3f8417d4 | vm/iptables: block IPv6 traffic This isn't properly handled by Qubes VMs yet, so block it in all the VMs.
Also restrict access to firewall config. | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 56e0359cfb | vm/yum-proxy: one more regexp fix | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 551cc8b186 | vm/yum-proxy: filter regexp: add missing ^$ marks, remove unneded .* at the beginning Reported-by: Igor Bukanov <igor@mir2.org> | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 0cf7c03ea5 | vm/systemd: early user-configurable init script | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 04e57db419 | vm/yum-proxy: allow pkgtags repodata | 2012-10-04 05:44:19 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 397f2912f0 | dom0/core: allow '_' in VM name | 2012-10-04 05:44:18 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | d172fa72f1 | vm/qrexec: fix race between child cleanup and select call reap_children() can close FD, which was already added to FD_SET for select.
This can lead to EBADF and agent termination. | 2012-10-04 05:44:18 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 9519d843d8 | dom0/spec: mark qrexec policy as config files Prevent override on upgrade, when user makes some own changes (especially
"always allow" feature). | 2012-10-04 05:44:18 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 92747285c7 | dom0/qvm-block: rework device name parsing to better support c0p1 name style | 2012-10-04 05:44:18 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 38fc566e52 | vm/spec: fix adding yum-proxy configuration Do not add entry if already present. | 2012-10-04 05:29:58 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 6419fea4ce | vm/spec: fix adding yum-proxy configuration Do not add entry if already present. | 2012-10-04 05:29:10 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 349331251d | Merge branch 'hvm' of git://gitpro.qubes-os.org/joanna/core into hvm | 2012-10-04 05:14:42 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 19a60eff55 | dom0/core: fix icon handling on VM clone | 2012-10-03 22:28:49 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 1b25d77504 | dom0/core: recreate appmenus after rename for any VM, not only AppVM (#659) | 2012-10-03 21:36:52 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 45639096fa | dom0/core: include net/proxy VM default appmenus list in cloned template | 2012-10-03 21:12:18 +02:00 |  | 
			
				
					| 
							
							
								 Olivier Médoc | 9a90f499bc | dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues | 2012-10-03 14:55:05 +02:00 |  | 
			
				
					| 
							
							
								 Bruce A Downs | cbf05999fb | vm: Added 'most recently used' feature to 'copy to vm' dialog * replaced zenity to qvm-mru-entry in qubes_rpc/qvm-copy-to-vm.gnome
* added python script qubes_rpc/qvm-mru-entry
* added /usr/bin/qvm-mru-entry to rpm_spec/core-vm.spec | 2012-09-28 00:57:08 +02:00 |  | 
			
				
					| 
							
							
								 Bruce A Downs | 6f35c13be2 | vm/spec: mod to core-vm.spec to add test for files core rpm was failing during uninstall attempting to move non-existent files
* /var/lib/qubes/fstab.orig
* /var/lib/qubes/serial.orig | 2012-09-28 00:57:08 +02:00 |  | 
			
				
					| 
							
							
								 Joanna Rutkowska | cd66ee2ce1 | version 1.7.46 | 2012-09-27 11:03:26 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 47e1665096 | vm/file-editor: connect /dev/null as stdin (#657) If stdin is closed (not connected to /dev/null) first opened file will get fd=0
and will be treated as stdin. | 2012-09-27 02:06:26 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | 286339dd82 | dom0/iptables: block IPv6 traffic Dom0 is network isolated anyway, but apply also firewall in case of use
qubes-dom0-network-via-netvm. | 2012-09-25 16:14:31 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | a90a21b8ff | vm/iptables: block IPv6 traffic This isn't properly handled by Qubes VMs yet, so block it in all the VMs.
Also restrict access to firewall config. | 2012-09-25 16:14:06 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | decf7ef648 | vm/yum-proxy: one more regexp fix | 2012-09-25 15:08:06 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | f710531f68 | vm/yum-proxy: filter regexp: add missing ^$ marks, remove unneded .* at the beginning Reported-by: Igor Bukanov <igor@mir2.org> | 2012-09-25 13:37:59 +02:00 |  | 
			
				
					| 
							
							
								 Marek Marczykowski | c1214bfef9 | dom0/core: VM property for qrexec startup timeout (#27 pro) | 2012-09-25 03:26:44 +02:00 |  |