Marek Marczykowski-Górecki
da0e5dd4ba
core: inherit kernelopts from the template by default
...
Fixes qubesos/qubes-issues#1091
2015-08-05 01:43:43 +02:00
Marek Marczykowski-Górecki
7e79cd20a8
doc: wrap long lines in qvm-prefs.rst, content unchanged
2015-08-05 01:34:59 +02:00
Marek Marczykowski-Górecki
75bbd1a76b
tests: check firewall.xml path after VM rename
2015-08-05 01:04:44 +02:00
Marek Marczykowski-Górecki
2ed9008a83
core: handle firewall.xml path during VM rename
2015-08-05 01:04:44 +02:00
Marek Marczykowski-Górecki
cc8af79397
dispvm: fallback to tar instead of bsdtar on tmpfs
2015-08-05 01:04:44 +02:00
Marek Marczykowski-Górecki
46b94b6682
Make qubes-set-updates
set also default state for new VMs
...
This makes possible to also check if the "updates check enabled" state
is consistent across VMs.
Fixes qubesos/qubes-issues#892
2015-08-05 01:04:43 +02:00
Marek Marczykowski-Górecki
fbfaa98b80
Implement offline mode in qubes-set-updates tool
2015-08-03 22:29:31 +02:00
Marek Marczykowski-Górecki
d27d22a3cf
Merge remote-tracking branch 'qubesos/pr/5'
...
* qubesos/pr/5:
fix VM autostart race condition
Fixes qubesos/qubes-issues#1075
Conflicts:
linux/aux-tools/prepare-volatile-img.sh
2015-08-01 22:04:18 +02:00
Marek Marczykowski-Górecki
a425873e73
core: add offline mode to qvm-pci
...
Called on LiveUSB system before libvirtd starts.
2015-08-01 22:02:16 +02:00
Marek Marczykowski-Górecki
c4a28a943a
prepare-volatile-img: ensure that /usr/sbin in in the PATH
...
Build environment of LiveUSB does not contain /usr/sbin in path.
2015-08-01 22:02:07 +02:00
Marek Marczykowski-Górecki
52d7de006b
do not print scary message when qvm-create --force-root is used
2015-08-01 21:58:43 +02:00
Marek Marczykowski-Górecki
90393c33f2
core: add offline mode to qvm-create, qvm-prefs
...
This is required to create VMs in process of building Live system, where
libvirt isn't running.
Additionally there is no udev in the build environment, so needs to
manually create /dev/loop*p* based on sysfs info.
2015-08-01 21:58:38 +02:00
Patrick Schleizer
472ed54e4c
fix VM autostart race condition
...
https://github.com/QubesOS/qubes-issues/issues/1075
2015-07-30 17:46:24 +02:00
Marek Marczykowski-Górecki
8f862cdf69
core/hvm: check if VM serving cdrom content is running
2015-07-25 04:17:59 +02:00
Marek Marczykowski-Górecki
51826decec
core/hvm: start guid before qrexec, even when gui agent is installed
...
This way even when qrexec agent would timeout on connection, guid will
be already running.
Also use new -K guid option to terminate stubdom guid when the real guid
is connected (unless in debug mode - then both guid will be running).
2015-07-25 03:55:50 +02:00
Marek Marczykowski-Górecki
4a01c53787
qvm-tools: update qvm-trim-template for R3 block attach api
2015-07-22 05:46:12 +02:00
Marek Marczykowski-Górecki
39379364c7
version 3.0.17
2015-07-13 00:58:53 +02:00
Marek Marczykowski-Górecki
6df309351d
block: fix detection if the block device is attached anywhere
2015-07-13 00:58:11 +02:00
Marek Marczykowski-Górecki
4b0ce945b7
version 3.0.16
2015-07-08 05:59:04 +02:00
Marek Marczykowski-Górecki
b47c74c3a4
qvm-tools: fix usage info for qvm-template-commit
2015-07-08 05:58:29 +02:00
Marek Marczykowski-Górecki
1199806b5a
core: fix handling firewall configuration for VM clones and DispVMs ( #1032 )
...
There were two bugs:
1. Firewall configuration wasn't copied during qvm-clone (it is in
separate file, so now it is included in vm.clone_disk_files).
2. Non-default firewall configuration wasn't stored in qubes.xml. This
means that initially DispVM got proper configuration (inherited from
calling VM), but if anything caused firewall reload (for example
starting another VM), the firewall rules was cleared to default state
(allow all).
Fixes qubesos/qubes-issues#1032
2015-07-08 04:46:14 +02:00
Marek Marczykowski-Górecki
a7e08e4584
tests: add qvm-clone test ( #1032 case)
2015-07-08 04:26:11 +02:00
Marek Marczykowski-Górecki
6c167911f1
qvm-sync-clock: hide stdout in non-verbose mode
2015-07-08 01:59:49 +02:00
Marek Marczykowski-Górecki
5f9a30d335
qvm-sync-clock: use qubes.SetDateTime service instead of direct "date" call
...
This way it gives more control over time synchronization to the VM. For
example Whonix VMs can decide to not use this mechanism. Also VM can
choose how that time will be set (chronyc call?). And finally it will be
possible to implement the same for other OS-es (Windows).
Additionally because of calling date as "localcmd" each time, instead of
once at the beginning, time synchronization is more accurrate now. If
some VM stall the time set call, other VMs time will no longer be
affected (but still synchronization will be delayed).
2015-07-08 01:56:38 +02:00
Marek Marczykowski-Górecki
e52f0a0566
core: by default call qrexec services without GUI
...
Most of them do not need GUI (especially those started from dom0), so
speed the things up a little (no need to wait for guid). But if some
service will need GUI access, there is "gui" parameter.
2015-07-08 01:36:28 +02:00
Marek Marczykowski-Górecki
284419b355
core: add "localcmd" support in QubesVm.run_service function
2015-07-08 01:35:59 +02:00
Marek Marczykowski-Górecki
50a9c62d0e
tests: add test for qvm-sync-clock
2015-07-08 01:21:13 +02:00
Marek Marczykowski-Górecki
455535d036
tests: reload qubes.xml after creating VMs
...
Unfortunately it is still needed. For example to load default netvm
setting.
2015-07-08 01:20:25 +02:00
Marek Marczykowski-Górecki
6d1f40219c
tests: code style fixes, no functional change
2015-07-07 21:41:54 +02:00
Marek Marczykowski-Górecki
205a28ecc2
version 3.0.15
2015-07-01 07:05:12 +02:00
Marek Marczykowski-Górecki
6d19a9c2cc
Do not hold the lock while retrieving application icons (qubes.NotifyTools)
...
This can take quite a long time, so do not block the whole system.
2015-07-01 07:03:52 +02:00
Marek Marczykowski-Górecki
df509cb780
Fix qubes.NotifyTools service (not import xenstore)
2015-07-01 04:47:52 +02:00
Marek Marczykowski-Górecki
4bf73a5d7f
Increase default swiotlb size to 16MB ( #1038 )
...
Fixes qubesos/qubes-issues#1038
2015-07-01 04:46:46 +02:00
Marek Marczykowski-Górecki
677a79b213
hvm: change default graphics to std vga ('xen')
...
The resulting qemu option is -std-vga.
This apparently this is much better handled by many OSes.
2015-07-01 04:44:41 +02:00
Marek Marczykowski-Górecki
310ba9f1df
block: do not treat disks of not running VMs as used
...
There are legitimate use cases when one want to attach disk of one VM to
some other. Do not try to detach the disk from powered down VM in such
case.
2015-07-01 04:42:44 +02:00
Marek Marczykowski-Górecki
d9c2990747
core: fix creation of private.img at VM startup
...
This code is used when VM is migrated from older system, where HVM
didn't have private.img.
2015-07-01 04:41:09 +02:00
Marek Marczykowski-Górecki
402d1b9a3d
indentation fix
2015-07-01 04:40:48 +02:00
Marek Marczykowski-Górecki
522bfc427a
core: fix template-based HVM disk handling
...
We use only one device-mapper layer for HVMs, and this isn't the same as
for PV - it is that one, which PV does in initramfs.
Device-mapper layers summary for template-based VMs:
PV: root.img+root-cow.img (dom0) -> xvda, xvda+volatile.img (VM)
HVM: root.img+volatile.img (dom0)
2015-07-01 04:35:09 +02:00
Marek Marczykowski-Górecki
a96d49a40a
core: properly redirect qrexec output to /dev/null when necessary
...
/dev/null was opened in read-only mode ("rw" is invalid value), so
qrexec couldn't write there.
2015-07-01 04:33:04 +02:00
Marek Marczykowski-Górecki
8134360614
tests: fix skipping whonix in timezone test
2015-06-27 05:05:34 +02:00
Marek Marczykowski-Górecki
ad89c8f8a2
core: show clear message when a VM has non-existing PCI device assigned
2015-06-27 04:52:25 +02:00
Marek Marczykowski-Górecki
3867d1fdb3
tests: check timezone dom0->vm propagation
2015-06-27 04:47:27 +02:00
Marek Marczykowski-Górecki
ed9b4bfc54
tests: check firewall rules blocking VM IP spoofing
2015-06-27 04:46:17 +02:00
Marek Marczykowski-Górecki
8b4c9b23b3
tests: hide git check warning
2015-06-27 04:19:07 +02:00
Marek Marczykowski-Górecki
ee48954445
core: fix starting stubdom guid for HVM in debug mode
...
Remove artificial attribute '_start_guid_first' and use
guiagent_installed directly. This way starting guid for stubdom in debug
mode, even if guiagent_installed is set is much clearer.
2015-06-27 04:10:32 +02:00
Marek Marczykowski-Górecki
f7c86f861c
Prevent GUI usage in qvm-sync-clock
2015-06-23 00:15:21 +02:00
Marek Marczykowski-Górecki
df20a67a6c
Convert qubes.NotifyTools service to use qubesdb
2015-06-23 00:14:57 +02:00
Marek Marczykowski-Górecki
236dca29a8
tests/network: add support for Debian's default netcat implementation
...
By default Debian has different nc installed, which requires different
options.
2015-06-21 02:08:02 +02:00
Marek Marczykowski-Górecki
33f0fa17b8
tests: fix clipboard tess
2015-06-21 01:12:47 +02:00
Zrubi
2c1889acbb
YML output fix
...
(cherry picked from commit 53260bd66ba3f0b2cc62b9488d67cdcdb6cec1e8)
2015-06-12 10:25:02 +02:00