Commit Graph

2531 Commits

Author SHA1 Message Date
Olivier MEDOC
b96ec61e17 backup: implemented header restoration using tar2qfile 2013-10-21 15:50:54 +02:00
Olivier MEDOC
6c7322d324 backup: fixed reinitialisation of all backup flags in qubes.xml 2013-10-21 15:39:16 +02:00
Joanna Rutkowska
17e2e7d436 version 2.1.24 2013-10-19 17:29:15 +02:00
Marek Marczykowski-Górecki
aadd47ce45 dispvm: fix commit "pass VM name to qrexec-daemon" 2013-10-19 15:55:31 +02:00
Marek Marczykowski-Górecki
3443f94aa9 dispvm: fix out of memory message - Xfce version 2013-10-19 15:54:55 +02:00
Joanna Rutkowska
ef6f3d74e6 version 2.1.23 2013-10-19 11:37:09 +02:00
Marek Marczykowski-Górecki
ed3d602140 dispvm: pass VM name to qrexec-daemon
Now qrexec-daemon requires three arguments: domid, domname,
default_user.
2013-10-19 00:07:25 +02:00
Joanna Rutkowska
fb745c2ff2 version 2.1.22 2013-10-18 11:06:42 +02:00
Marek Marczykowski
5e0d8c1155 Pass domain name to qrexec daemon 2013-10-18 03:39:02 +02:00
Joanna Rutkowska
b2a0b69742 version 2.1.21 2013-10-11 12:06:05 +02:00
Marek Marczykowski-Górecki
41ba079eb8 Force the first character of VM name to be a letter
Especially don't allow numeric-only name (our deserializer of qubes.xml
will convert it to int instead of str...).
2013-10-08 22:47:56 +02:00
Marek Marczykowski-Górecki
8f302bf2bc version 2.1.20 2013-10-08 10:44:52 +02:00
Marek Marczykowski-Górecki
e6012a8fd2 Fix qubes.xml unlock code (#748)
Do not call explicit lockf(lOCK_UN) to not unlock the file
buffers are flushed. This is simpler than adding flush() call.
2013-10-02 04:54:10 +02:00
Olivier MEDOC
3e4637415a backup: improved error handling during restore process 2013-10-01 12:09:13 +02:00
Marek Marczykowski-Górecki
76144df2e7 qvm-backup: respect "include in backups by default" setting (#746) 2013-10-01 03:31:12 +02:00
Marek Marczykowski-Górecki
f74caf876b qvm-backup: support explicit list of VMs to backup 2013-10-01 03:18:44 +02:00
Olivier MEDOC
04d38055a6 backup: fixed vm extraction path and untracked errors 2013-09-30 14:54:14 +02:00
Olivier MEDOC
1a80893ef0 backup: fixed decryption during backup restoration process 2013-09-30 10:26:04 +02:00
Olivier MEDOC
c2645bcb92 backup: fix a misplaced passphrase request breaking the backup GUI 2013-09-28 12:24:33 +02:00
Olivier MEDOC
a594af02de backup: fix of a bug introduced in the qvm-backup-restore command by adding a progress_callback 2013-09-27 09:47:33 +02:00
Olivier MEDOC
26fb5b3d25 backup: fixes to use the backup GUI 2013-09-27 09:41:40 +02:00
Olivier MEDOC
af230b33a9 backup: implemented validated file extraction for non encrypted backups 2013-09-26 10:30:57 +02:00
Olivier MEDOC
c805ff6aeb backup: implement header restoration for the new backup format 2013-09-25 09:51:17 +02:00
Marek Marczykowski-Górecki
c6d51fd68f version 2.1.19 2013-09-17 04:45:57 +02:00
Marek Marczykowski-Górecki
1525b64e16 Merge remote-tracking branch 'joanna/master' 2013-09-17 04:45:23 +02:00
Marek Marczykowski-Górecki
c43efac87b version 2.1.18 2013-09-16 22:45:12 +02:00
Olivier MEDOC
361741b8aa backup: multiple fixes for the backup process, including non-encrypted backups
- Ensure backup without encryption is working
- Implemented progress feedback through a global variable
- Ask user for a passphrase used for encryption or for verification
2013-09-10 09:27:51 +02:00
Olivier MEDOC
23065f6fa0 backup: use a thread to send data to AppVM in parallel to tar main operations.
Additionnally, temporary files are removed once data has been sent
2013-09-10 09:25:44 +02:00
Olivier MEDOC
a85f3a7d8e backup: introduced a second tar pass to send encrypted data to an AppVM
The backup process is now tar_sparse | encrypt | hmac | tar | appvm
2013-09-10 09:24:25 +02:00
Olivier MEDOC
4ae4bdc452 backup: implemented backup mecanism using tar_sparse+encryption+hmac generation 2013-09-10 09:22:35 +02:00
Olivier MEDOC
5edca4ac90 backup: code cleanup 2013-09-10 09:20:49 +02:00
Marek Marczykowski-Górecki
5da7a520c4 core: move pci_add/pci_remove to QubesVM, add support for live add/remove (#708)
This additionally requires qubes.DetachPciDevice service in VM.
2013-09-01 01:26:43 +02:00
Olivier MEDOC
89fde55cd9 backup: Added rpc restoration file 2013-08-19 16:50:46 +02:00
Olivier MEDOC
836c604473 backup: reimplemented restore function through an AppVM
The VM size is now stored inside the backup specification file in order to compute progress.
2013-08-19 16:48:29 +02:00
Olivier MEDOC
9784ca87f6 backup: implemented mecanism to read only the backup headers 2013-08-16 09:12:06 +02:00
Olivier MEDOC
5fa8d732ae backup: major revamp of the backup code to include backup to dom0, backup to vm, better cleanup code 2013-08-14 10:26:58 +02:00
Olivier MEDOC
fbb26d89b4 backup: implemented progress feedback using tar checkpoint and a temporary file for tar output 2013-08-14 10:23:04 +02:00
Olivier MEDOC
aea789d0a1 backup: implemented use of a single tar file instead of creation of multiple file during backup 2013-08-14 10:21:41 +02:00
Olivier MEDOC
6c09189b77 backup: improved performance by optimizing tar and gpg options 2013-08-14 10:19:15 +02:00
Olivier MEDOC
fb8748f3e9 backup: implemented use of tar+gpg2 instead of only encrypting files 2013-08-14 10:18:05 +02:00
Marek Marczykowski
a0cb8dbf7e dispvm: minor fixes
Conflicts:
	dispvm/qubes-prepare-saved-domain.sh
2013-08-13 00:36:49 +02:00
Marek Marczykowski
19982da9d2 QubesVm: drop evals already covered by generic deserializer 2013-08-13 00:33:54 +02:00
Marek Marczykowski
28b8eb0445 Send monitor layout at VM startup.
Gui daemon isn't aware of multihead parameters, also gui protocol
doesn't support such information - currently by design it is configured
via Qubes RPC service.
At GUI startup send monitor layout to the VM.
2013-08-11 04:11:34 +02:00
Marek Marczykowski
42416504bb qvm-prefs: fix checking kernel path 2013-08-09 13:00:07 +02:00
Andrew Sorensen
ead479804e dom0: wait for folder to be created before adding file 2013-07-07 00:00:07 -07:00
Zrubi
2fc8e7abb0 qubes-hcl-report update + qvm-check
It's now handle dual VGA scenarios, got some other hardware related
improvements, and some usage help text ;)

And because I needed to check if a VM is exists or not just made a
small check script: qvm-check

This is really just  a stripped down version of the existing qvm-* scripts..
2013-07-03 09:47:29 +00:00
Andrew Sorensen
1d2990e938 dom0: add option for encryption to qvm-backup 2013-06-22 21:27:58 -07:00
Andrew Sorensen
4ed00f123d dom0: allow user to decide if encryption should be used, close qvm database 2013-06-22 21:19:59 -07:00
Andrew Sorensen
3d7af2f7f5 dom0: allow the user to set the AppVM 2013-06-22 20:59:07 -07:00
Andrew Sorensen
c2f157c2d2 dom0: close Popen when the transfer is complete 2013-06-22 20:30:32 -07:00