Commit Graph

3526 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
ba4dec5383
qvm-block: fix checking attached status of disk image files
Libvirt do not show actual block device (loop*) choosen for the device -
only original (file) path. But file path is available in device
description. Please note that VM can provide any description (withing
allowed limits), effectively breaking this check again (hidding the
attachment status). But even without this bug it could do that - by
hidding the whole device from QubesDB.

Fixes QubesOS/qubes-issues#2453
2016-11-23 03:25:03 +01:00
Marek Marczykowski-Górecki
68a116e8a3
tests: check '$anyvm' parsing in qrexec policy
Regression test for QubesOS/qubes-issues#2031
2016-11-18 03:15:08 +01:00
Marek Marczykowski-Górecki
85f6ff9ded
Merge remote-tracking branch 'qubesos/pr/47'
* qubesos/pr/47:
  Move /var/run/shm.id to /var/run/qubes/shm.id
2016-11-11 16:13:51 +01:00
Jean-Philippe Ouellet
fadaa64985
Keep Makefile DRY 2016-11-10 06:25:30 -05:00
Marek Marczykowski-Górecki
bd35a1061b
version 3.2.12 2016-10-30 02:28:41 +02:00
Marek Marczykowski-Górecki
800fcfd880
Do not start guid if DISPLAY is not set
Fixes QubesOS/qubes-issues#2408
2016-10-30 01:31:53 +02:00
Marek Marczykowski-Górecki
3b680ebc94
Merge remote-tracking branch 'qubesos/pr/63'
* qubesos/pr/63:
  Better order for plymouth disabling stanza, as well as modern initrd plymouth disabling.
2016-10-28 23:52:01 +02:00
Rudd-O
63fd200abf Better order for plymouth disabling stanza, as well as modern initrd plymouth disabling. 2016-10-28 20:53:49 +00:00
Marek Marczykowski-Górecki
8c270d8061
vm-config: drop '3' from kernel command line
We set default systemd target anyway, so it isn't needed. But it breaks
Fedora recommended system upgrade path.

Fixes QubesOS/qubes-issues#2404
2016-10-28 13:53:24 +02:00
Rudd-O
765ca6d475 New plymouth disable stanza. 2016-10-23 20:55:31 +00:00
Marek Marczykowski-Górecki
f80e67391e
version 3.2.11 2016-10-03 11:47:13 +02:00
Marek Marczykowski-Górecki
44d3d8ac94
Merge branch 'docs-fixups'
* docs-fixups:
  docs: fix qvm-firewall description
2016-10-03 11:44:34 +02:00
Marek Marczykowski-Górecki
47121b8b43
Merge remote-tracking branch 'qubesos/pr/60'
* qubesos/pr/60:
  qubes-hcl-report: check for incomplete 'xl dmesg'
  qubes-hcl-report: SLAT detection: improve log parsing
2016-10-03 11:43:20 +02:00
Marek Marczykowski-Górecki
e2d4ae2924
Merge remote-tracking branch 'qubesos/pr/59'
* qubesos/pr/59:
  qmemman: actually use the dom0-mem-boost config value
2016-10-03 11:43:06 +02:00
Marek Marczykowski-Górecki
b20ce473d2
tests: force hvc0 console in minimal HVM test system
Regardless of kernel defauls, have kernel messages logged.
2016-10-03 11:33:03 +02:00
HW42
f6dd71d103 qmemman: actually use the dom0-mem-boost config value 2016-09-23 03:38:04 +02:00
HW42
12644f218b qubes-hcl-report: check for incomplete 'xl dmesg' 2016-09-20 05:29:38 +02:00
HW42
3e668a62e2 qubes-hcl-report: SLAT detection: improve log parsing 2016-09-20 05:29:38 +02:00
Marek Marczykowski-Górecki
a4db742077
version 3.2.10 2016-09-19 01:03:12 +02:00
Marek Marczykowski-Górecki
aba371e4fb
Merge remote-tracking branch 'qubesos/pr/55'
* qubesos/pr/55:
  Change way of detection KDE so that it detects KWin in other environments
2016-09-09 12:49:44 +02:00
Marek Marczykowski-Górecki
84528b30c1
qvm-remove: don't fail on removing template which was never started
When a template never was started, it isn't defined in libvirt, so
attempt to undefine it will fail.

Fixes QubesOS/qubes-issues#2290
2016-09-09 12:47:11 +02:00
Vít Šesták
00a96d1d5b Change way of detection KDE so that it detects KWin in other environments 2016-09-08 23:31:27 +02:00
Vít Šesták
8736f738ca Merge pull request #1 from QubesOS/master
Make it up-to-date
2016-09-08 23:11:12 +02:00
Marek Marczykowski-Górecki
7ae55d46b2
Merge remote-tracking branch 'qubesos/pr/50'
Edit in merge commit: remove trailing whitespaces.
2016-09-01 05:16:55 +02:00
HW42
32b4f9d4a4
qubes-hcl-report: add check for HAP/SLAT
bassed on
https://wiki.xenproject.org/wiki/Xen_Common_Problems#How_can_I_check_if_my_CPU_supports_HAP_.28Hardware_Assisted_Paging.29_.3F
2016-09-01 03:45:31 +02:00
Marek Marczykowski-Górecki
0e24d803f5
version 3.2.9 2016-08-31 13:08:59 +02:00
Nicklaus McClendon
b6416dcc4b
Updated manpages to match current tool options 2016-08-19 01:51:41 -05:00
Rusty Bird
3606fe64a4
qubesutils.py: pass readonly mode to libvirt
Fixes QubesOS/qubes-issues#2255
2016-08-18 12:54:26 +00:00
Marek Marczykowski-Górecki
4c1c57bcb7
qvm-backup-restore: add missing backslash
Reported by Ivan <ivan@c3i.bg>
2016-08-17 13:48:12 +02:00
Marek Marczykowski-Górecki
10c44e8722
version 3.2.8 2016-08-07 16:11:49 +02:00
Marek Marczykowski-Górecki
2908992741
prepare-volatile-img.sh: create volatile.img group accessible
Otherwise qvm-create-default-dvm may fail to include it in
saved-cows.tar, which will lead to DispVM being not really disposable.

Fixes QubesOS/qubes-issues#2200
2016-08-07 16:07:30 +02:00
Marek Marczykowski-Górecki
d0ddb3d17c
dispvm: error out on saved-cows.tar creation error
If it fails - for example because of too restrictive volatile.img
permissions, subsequent DispVM will not be really disposable.
The original permissions issue should be fixed by previous commit, this
one makes sure that such errors will not be ignored.

Fixes QubesOS/qubes-issues#2200
2016-08-07 00:41:59 +02:00
HW42
09b49feea6
prepare-volatile-img.sh: don't run as root
This is no longer necessary since volatile.img is formated inside the
VM. This also fixes DispVM creation if the user sets a restrictive umask
for root. Maybe related to #2200.
2016-08-07 00:41:59 +02:00
Marek Marczykowski-Górecki
0968c25486
tests: when creating AppVM based on whonix-ws, connect it to tor
Use sys-whonix if exists. This makes network-related tests more
realistic.
2016-08-07 00:41:59 +02:00
Marek Marczykowski-Górecki
5c9157be05
tests: fix newline input in DispVM editor tests
Just '\n' isn't enough for xdotool to enter newline.
2016-08-07 00:41:59 +02:00
Marek Marczykowski-Górecki
72d60788e4
tests: fix Debian repository format
Use SHA256 instead of SHA1 - apt-get in Debian 9 rejects SHA1.
Fix date format (according to apt-get in Debian 9).
2016-08-07 00:41:58 +02:00
Marek Marczykowski-Górecki
07ac6c9ba1
tests: fix handling LibreOffice in DispVM tests
It's first window is a splash screen.
2016-08-07 00:41:58 +02:00
Marek Marczykowski-Górecki
dca30e815b
tests: enable 'use-default-netvm' while restoring old backup
Firewall VM was named 'firewallvm' at that time.
2016-08-07 00:41:58 +02:00
Marek Marczykowski-Górecki
fd1b68166c
tests: add test for GUI memory issues
QubesOS/qubes-issues#1028
2016-08-07 00:41:58 +02:00
Marek Marczykowski-Górecki
fd5b357232
tests: split vm_qrexec_gui 2016-08-07 00:41:57 +02:00
Marek Marczykowski-Górecki
86a14b53fb
qvm-run: color untrusted stderr even when stdout is redirected
When stdout is redirected to some file or command two things will
happen:
 - qvm-run will not automatically color the output as stdout is not a
 TTY
 - even when coloring is forced, it will not work, as the control
 sequence (on stdout) will be redirected anyway

Fix this by handling stdout and stderr independently and output color
switching sequence to each of them.

Fixes QubesOS/qubes-issues#2190
2016-07-29 13:07:37 +02:00
Marek Marczykowski-Górecki
6a516caee2
tests: misc minor fixes 2016-07-29 13:07:37 +02:00
Marek Marczykowski-Górecki
0ee64c74f9
tests: cleanup after backup compatibility tests
Backup compat tests use 'test-' prefix (as it was initially for all the
tests. Since changing this right not may break those backups in
non-trivial way, simply add cleanup for 'test-*' VMs.
2016-07-29 13:07:36 +02:00
Jasper Tron
cfbb786d7f Move /var/run/shm.id to /var/run/qubes/shm.id
This allows the gui daemon to be run without root privileges.
2016-07-25 21:17:10 -05:00
Marek Marczykowski-Górecki
9f7668af77
tests: allow LibreOffice as txt file editor 2016-07-19 02:07:14 +02:00
Marek Marczykowski-Górecki
9d1b7504da
qvm-sync-clock: allow colon in timezone spec
`date` in debian 9 puts colon there. Since the timezone is not used here
in any way (it operates on UTC time anyway), simply allow this format
too.
2016-07-19 00:46:48 +02:00
Marek Marczykowski-Górecki
f0489a3d5c
version 3.2.7 2016-07-18 15:24:25 +02:00
Marek Marczykowski-Górecki
c028df3e1e
QubesWatch: fix handling just removed domains
Really do not throw exception in such a case.
Reported by HW42.
2016-07-18 15:07:02 +02:00
HW42
b467dd6218
QubesWatch: do not create multiple dom0 QubesDB connections
When calling _register_watches() multiple times for dom0 (by passing
None or since 7e9c816b by passing the corresponding libvirt domain) the
check was missing if there is already a QubesDB in _qdb. Therefore a new
QubesDB was created and the old one is destroyed by the GC. As a
consequence the watch_fd is closed but the libvirt event handle for this
fd is still registered. So when libvirt calls poll() it returns
immediately POLLNVAL with the closed fd. This is not caught in libvirt
and the callback is called as if an event happened. _qdb_handler() now
calls read_watch() on the new fd for dom0 and thereby hangs the thread.
This leads (at leads) to qubes-manager to miss VM status updates and
block device events.

Fixes QubesOS/qubes-issues#2178
2016-07-18 15:03:14 +02:00
Marek Marczykowski-Górecki
9751981f69
version 3.2.6 2016-07-17 05:17:57 +02:00