Marek Marczykowski
ad7d6957b1
dom0/updates: clean yum cache as root ( #540 )
...
Actually looks like this solve problem, don't know why (cleaning as user
didn't returned any error).
2012-06-23 00:37:47 +02:00
Marek Marczykowski
89aaa60753
dom0: use RPC service to sync clock via NTP ( #603 )
2012-06-23 00:37:47 +02:00
Marek Marczykowski
24352c3dce
dom0: minor init.d script fix
2012-06-23 00:37:47 +02:00
Marek Marczykowski
ffa3d8732c
dom0: use new qubes-manager appmenu applet ( #548 )
2012-06-22 01:15:54 +02:00
Marek Marczykowski
96f7d4da81
Revert "dom0/appmenus: do not add "Add more shortcuts" menu ( #458 )" ( #548 )
...
This reverts commit 8b613a10b4
.
Restore this option.
2012-06-22 01:15:54 +02:00
Marek Marczykowski
c978ce3a48
dom0/qvm-firewall: eliminate duplicate firewall defaults definition ( #599 )
...
This caused ignore of different firewall defaults for TemplateVM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
0e2aba228f
dom0: minor qvm-sync-clock fix
...
Catch any error in vm.run, to not break clock syncing of all VMs because one
VM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
ab9c2e503a
dom0: qvm-run --nogui switch
...
Can be used to not start guid.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
8bdc5706f7
dom0/core: allow to change default user for qvm-run ( #577 )
...
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 19:01:32 +02:00
Marek Marczykowski
844d43b0ef
dom0/core: introduce is_guid_running() and use it in is_fully_usable()
...
To improve code reuse, especially to remove direct checking for
"/var/run/qubes/guid_running.{0}" in many places.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
c534d5871b
dom0/core: fix order of loading VM attributes
...
Parsing kernelopts depends on uses_default_kernelopts, so set 'order' appropriate.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
3a8427cee5
dom0: do not reply all udev events at system boot ( #595 )
...
This can cause some rules to fail and eg remove dm-* devices. Replace it with
what is really needed to hide mounted (and other ignored) devices from
qubes-block-devices.
2012-06-13 04:57:38 +02:00
Marek Marczykowski
f2abc5e26d
dom0: populate unchanged firewall settings with previous values ( #589 )
...
Missed settings in new firewall configuration caused exception. In old qubes-manager (before #582 done) this exception silently broke saving operation, leaving user with progress bar windows infinitely...
2012-06-05 21:21:53 +02:00
Marek Marczykowski
3b8272c1b6
dom0/qvm-ls: replace 'netmask' column with 'ip back' ( #573 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
aea8d189f0
dom0/core: fix QubesVM.gateway
...
To be consistent with QubesNetVM, where gateway property contain gateway IP for
_other_ VMs, in non-network-provider VM it should be empty.
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a528befbc4
dom0: default TemplateVM firewall: block all traffic and allow use of yum proxy ( #590 )
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a8b992e647
dom0/core: implement per-VM-type firewall defaults
2012-06-05 21:21:53 +02:00
Marek Marczykowski
e4f64fd600
dom0/core: remove trailing spaces
2012-05-31 03:11:44 +02:00
Marek Marczykowski
65fc62a989
dom0/core: setup yum to use proxy when it have access to it ( #568 )
...
To simplify configuration, automatically enable 'yum-proxy-setup'
pseudo-service when allowing access to the proxy. Also disable this service,
when access is revoked. Thanks to this the user can enable this feature by one
click in firewall settings.
2012-05-31 03:11:44 +02:00
Marek Marczykowski
ec52d15dfe
dom0/qvm-firewall: add support for 'allowYumProxy' setting ( #568 )
2012-05-31 03:11:44 +02:00
Marek Marczykowski
2ca4b11183
dom0/core-firewall: firewall setting for qubes-yum-proxy ( #568 )
...
New setting for access to qubes-yum-proxy. The difference from other firewall
setting (and reason for new top-level setting): 'deny' is enforced even if
policy is set to 'allow'. This proxy service is mainly used to filter network
traffic, so do not expose it to VMs which can connect to any host directly (eg
'untrusted' VM).
2012-05-31 03:11:44 +02:00
Marek Marczykowski
a2b222166a
dom0/qvm-tools: introduce qvm-service tool
...
Allow setting vm services same as in qubes-manager
2012-05-31 03:09:22 +02:00
Marek Marczykowski
1f8251eefb
dom0/qvm-block: hide devices mounted in dom0 ( #579 )
2012-05-31 03:09:22 +02:00
Marek Marczykowski
39b15033aa
dom0/qvm-ls: add 'kernel' and 'kernelopts' columns
2012-05-31 03:09:22 +02:00
Marek Marczykowski
812264cfb0
dom0/core: don't limit netvm/proxyvm vcpu count to 1 ( #571 )
2012-05-31 03:09:22 +02:00
Marek Marczykowski
3d783f7fa3
dom0: expose debug mode in xenstore ( #567 )
2012-05-22 15:51:09 +02:00
Marek Marczykowski
987a490179
dom0/core: don't force maxmem=memory for NetVM ( #572 )
2012-05-20 02:10:50 +02:00
Marek Marczykowski
44cec03c33
dom0/update-notify: ensure correct permissions for update stat file
2012-05-16 07:56:40 +02:00
Marek Marczykowski
8d7811827f
dom0/qubes-updates: stat file for qubes-manager
2012-05-14 04:57:57 +02:00
Marek Marczykowski
1e496fbfb7
dom0/qubes-updates: one more qubes-dom0-update typo fix
2012-05-14 04:57:57 +02:00
Marek Marczykowski
783ea78292
dom0: var name fix, and one minor sanity check
2012-05-08 15:55:46 +02:00
Marek Marczykowski
50a58c6331
dom0/dom0-update: clean up metadata caches after downloading updates ( #558 )
2012-05-07 15:49:38 +02:00
Marek Marczykowski
a5c80d4015
dom0/qvm-pci: add info about required restart after PCI device add/remove
2012-05-07 15:49:37 +02:00
Marek Marczykowski
b771cb9f90
dom0/qvm-backup: chown user dir before backup ( #492 )
2012-05-02 00:09:00 +02:00
Marek Marczykowski
9edc845184
dom0: create appmenus for NetVMs, using separate whitelist ( #538 )
2012-05-02 00:09:00 +02:00
Marek Marczykowski
7b81659593
dom0: create appmenus template and icon for all VMs
2012-05-02 00:09:00 +02:00
Marek Marczykowski
370ad33c44
dom0: provide service for VM to notify about updates availability ( #475 )
2012-05-02 00:09:00 +02:00
Marek Marczykowski
9c7ab91491
dom0: remove unused reset_vm_configs.py
2012-05-02 00:09:00 +02:00
Marek Marczykowski
db6eb497a6
dom0/core: do not relay on any max xid ( #445 )
...
What is really required is the maximum number of domains, not its IDs. Use max
QID as maximum number of domains.
2012-04-28 03:26:20 +02:00
Marek Marczykowski
c0f1d3c53b
dom0/qvm-ls: show 'n/a' in disk usage for dom0
2012-04-28 03:26:20 +02:00
Marek Marczykowski
0c43635806
dom0: add missing 2> /dev/null to unbind_pci_device.sh ( #550 )
2012-04-28 03:26:20 +02:00
Marek Marczykowski
daa82bb62c
dom0: fix check-updates cron job
2012-04-25 23:43:50 +02:00
Marek Marczykowski
a96f6a1e81
Revert "dom0/qvm-prefs: remove duplicated set_include_in_backups"
...
This reverts commit aa99c411db
.
This wasn't duplicated...
Conflicts:
dom0/qvm-tools/qvm-prefs
2012-04-24 14:02:00 +02:00
Marek Marczykowski
804dc973ed
dom0/qvm-firewall: clarify message ( #24 pro)
2012-04-24 02:14:17 +02:00
Marek Marczykowski
9927244670
dom0/qvm-tools: add GUI (tray balloon) error reporing to qvm-start and extend it in qvm-run ( #534 )
2012-04-24 02:14:17 +02:00
Marek Marczykowski
c5cc6620d3
dom0/core: include VM name in "insufficient memory" message ( #534 )
2012-04-24 02:14:17 +02:00
Marek Marczykowski
d2ef0be450
dom0/core: setup xen logs permissions ( #539 )
2012-04-24 02:14:17 +02:00
Marek Marczykowski
c35e655d66
dom0/qvm-prefs: relax memory check
...
Allow memory > maxmem, anyway it will be enforced at VM boot. This allows to
set memory and maxmem in any order. Also required to increase memory for HVM.
2012-04-24 02:14:17 +02:00
Marek Marczykowski
865ea14473
dom0/qvm-start: allow temporally enable debug mode ( #537 )
2012-04-23 12:43:24 +02:00
Marek Marczykowski
e73b13c68d
dom0/core: add 'debug' VM property ( #537 )
2012-04-23 12:43:24 +02:00