Commit Graph

3542 Commits

Author SHA1 Message Date
Loren Rogers
c1f8c7daf1 Rewrite root error message
The language for this was very strange, so I rewrote it in a more standard format. Instead of printing things across three functions, I consolidated into one. I also opted for the more standard "WARNING:" instead of "***", which I've not seen before.
2016-11-30 22:32:16 -05:00
Cyril LEVIS
1b12df379c add --help and -h on qvm-create-default-qvm 2016-11-28 13:53:36 +01:00
Marek Marczykowski-Górecki
534c3a13f7
Merge remote-tracking branch 'qubesos/pr/78'
* qubesos/pr/78:
  Add name-raw field for qvm-ls
2016-11-28 12:59:27 +01:00
Marek Marczykowski-Górecki
71243d949e
Merge remote-tracking branch 'qubesos/pr/80'
* qubesos/pr/80:
  qvm-check: s/stdout/stderr/
2016-11-28 12:58:28 +01:00
Marek Marczykowski-Górecki
076ef884f3
Merge remote-tracking branch 'qubesos/pr/79'
* qubesos/pr/79:
  Implement qvm-ls --list-fields
2016-11-28 12:57:18 +01:00
Jean-Philippe Ouellet
80450dab92
Add name-raw field for qvm-ls
Useful to avoid needing to `... | tr -d '<>{}[]='` just to get clean
VM names in scripts.

Fixes https://github.com/QubesOS/qubes-issues/issues/2444
2016-11-28 02:58:18 -05:00
Jean-Philippe Ouellet
7033f6a796
qvm-check: s/stdout/stderr/ 2016-11-28 02:54:04 -05:00
Marek Marczykowski-Górecki
97d2b428f1
Merge remote-tracking branch 'qubesos/pr/76'
* qubesos/pr/76:
  DRY Qubes[Disp]VmLabels
2016-11-27 19:06:16 +01:00
Jean-Philippe Ouellet
6ddf141376
Implement qvm-ls --list-fields 2016-11-27 01:12:53 -05:00
Jean-Philippe Ouellet
5c08d0e2e3
DRY Qubes[Disp]VmLabels 2016-11-25 00:03:05 -05:00
unman
5ea129c1e0
Fix handling attributes in qvm-prefs 2016-11-25 02:19:09 +00:00
Marek Marczykowski-Górecki
02d8f273f2
Merge remote-tracking branch 'qubesos/pr/73'
* qubesos/pr/73:
  Fixed regexp for MAC address in qvm-prefs

Fixes QubesOS/qubes-issues#1270
2016-11-25 03:02:04 +01:00
Marek Marczykowski-Górecki
fe470dade9
Merge remote-tracking branch 'qubesos/pr/72'
* qubesos/pr/72:
  Don't allow VM name ending in -dm
2016-11-25 03:01:15 +01:00
unman
4f2318fcc3
Fixed regexp for MAC address in qvm-prefs 2016-11-25 01:02:32 +00:00
Marek Marczykowski-Górecki
01b67a0af1
Handle both old and new shm.id path
This ease transition (installing new package will not break system).
2016-11-23 04:13:02 +01:00
Marek Marczykowski-Górecki
ba4dec5383
qvm-block: fix checking attached status of disk image files
Libvirt do not show actual block device (loop*) choosen for the device -
only original (file) path. But file path is available in device
description. Please note that VM can provide any description (withing
allowed limits), effectively breaking this check again (hidding the
attachment status). But even without this bug it could do that - by
hidding the whole device from QubesDB.

Fixes QubesOS/qubes-issues#2453
2016-11-23 03:25:03 +01:00
Jean-Philippe Ouellet
c4f30bc3ad
Don't allow VM name ending in -dm
This is used internally for device-model stubdomains (untrusted qemu)
for HVMs, and causes conflicts when trying to boot foo (HVM) and foo-dm
(any type).

Partially fixes https://github.com/QubesOS/qubes-issues/issues/2422
2016-11-21 22:38:59 -05:00
Marek Marczykowski-Górecki
68a116e8a3
tests: check '$anyvm' parsing in qrexec policy
Regression test for QubesOS/qubes-issues#2031
2016-11-18 03:15:08 +01:00
Marek Marczykowski-Górecki
85f6ff9ded
Merge remote-tracking branch 'qubesos/pr/47'
* qubesos/pr/47:
  Move /var/run/shm.id to /var/run/qubes/shm.id
2016-11-11 16:13:51 +01:00
Jean-Philippe Ouellet
fadaa64985
Keep Makefile DRY 2016-11-10 06:25:30 -05:00
Marek Marczykowski-Górecki
bd35a1061b
version 3.2.12 2016-10-30 02:28:41 +02:00
Marek Marczykowski-Górecki
800fcfd880
Do not start guid if DISPLAY is not set
Fixes QubesOS/qubes-issues#2408
2016-10-30 01:31:53 +02:00
Marek Marczykowski-Górecki
3b680ebc94
Merge remote-tracking branch 'qubesos/pr/63'
* qubesos/pr/63:
  Better order for plymouth disabling stanza, as well as modern initrd plymouth disabling.
2016-10-28 23:52:01 +02:00
Rudd-O
63fd200abf Better order for plymouth disabling stanza, as well as modern initrd plymouth disabling. 2016-10-28 20:53:49 +00:00
Marek Marczykowski-Górecki
8c270d8061
vm-config: drop '3' from kernel command line
We set default systemd target anyway, so it isn't needed. But it breaks
Fedora recommended system upgrade path.

Fixes QubesOS/qubes-issues#2404
2016-10-28 13:53:24 +02:00
Rudd-O
765ca6d475 New plymouth disable stanza. 2016-10-23 20:55:31 +00:00
Marek Marczykowski-Górecki
f80e67391e
version 3.2.11 2016-10-03 11:47:13 +02:00
Marek Marczykowski-Górecki
44d3d8ac94
Merge branch 'docs-fixups'
* docs-fixups:
  docs: fix qvm-firewall description
2016-10-03 11:44:34 +02:00
Marek Marczykowski-Górecki
47121b8b43
Merge remote-tracking branch 'qubesos/pr/60'
* qubesos/pr/60:
  qubes-hcl-report: check for incomplete 'xl dmesg'
  qubes-hcl-report: SLAT detection: improve log parsing
2016-10-03 11:43:20 +02:00
Marek Marczykowski-Górecki
e2d4ae2924
Merge remote-tracking branch 'qubesos/pr/59'
* qubesos/pr/59:
  qmemman: actually use the dom0-mem-boost config value
2016-10-03 11:43:06 +02:00
Marek Marczykowski-Górecki
b20ce473d2
tests: force hvc0 console in minimal HVM test system
Regardless of kernel defauls, have kernel messages logged.
2016-10-03 11:33:03 +02:00
HW42
f6dd71d103 qmemman: actually use the dom0-mem-boost config value 2016-09-23 03:38:04 +02:00
HW42
12644f218b qubes-hcl-report: check for incomplete 'xl dmesg' 2016-09-20 05:29:38 +02:00
HW42
3e668a62e2 qubes-hcl-report: SLAT detection: improve log parsing 2016-09-20 05:29:38 +02:00
Marek Marczykowski-Górecki
a4db742077
version 3.2.10 2016-09-19 01:03:12 +02:00
Marek Marczykowski-Górecki
aba371e4fb
Merge remote-tracking branch 'qubesos/pr/55'
* qubesos/pr/55:
  Change way of detection KDE so that it detects KWin in other environments
2016-09-09 12:49:44 +02:00
Marek Marczykowski-Górecki
84528b30c1
qvm-remove: don't fail on removing template which was never started
When a template never was started, it isn't defined in libvirt, so
attempt to undefine it will fail.

Fixes QubesOS/qubes-issues#2290
2016-09-09 12:47:11 +02:00
Vít Šesták
00a96d1d5b Change way of detection KDE so that it detects KWin in other environments 2016-09-08 23:31:27 +02:00
Vít Šesták
8736f738ca Merge pull request #1 from QubesOS/master
Make it up-to-date
2016-09-08 23:11:12 +02:00
Marek Marczykowski-Górecki
7ae55d46b2
Merge remote-tracking branch 'qubesos/pr/50'
Edit in merge commit: remove trailing whitespaces.
2016-09-01 05:16:55 +02:00
HW42
32b4f9d4a4
qubes-hcl-report: add check for HAP/SLAT
bassed on
https://wiki.xenproject.org/wiki/Xen_Common_Problems#How_can_I_check_if_my_CPU_supports_HAP_.28Hardware_Assisted_Paging.29_.3F
2016-09-01 03:45:31 +02:00
Marek Marczykowski-Górecki
0e24d803f5
version 3.2.9 2016-08-31 13:08:59 +02:00
Nicklaus McClendon
b6416dcc4b
Updated manpages to match current tool options 2016-08-19 01:51:41 -05:00
Rusty Bird
3606fe64a4
qubesutils.py: pass readonly mode to libvirt
Fixes QubesOS/qubes-issues#2255
2016-08-18 12:54:26 +00:00
Marek Marczykowski-Górecki
4c1c57bcb7
qvm-backup-restore: add missing backslash
Reported by Ivan <ivan@c3i.bg>
2016-08-17 13:48:12 +02:00
Marek Marczykowski-Górecki
10c44e8722
version 3.2.8 2016-08-07 16:11:49 +02:00
Marek Marczykowski-Górecki
2908992741
prepare-volatile-img.sh: create volatile.img group accessible
Otherwise qvm-create-default-dvm may fail to include it in
saved-cows.tar, which will lead to DispVM being not really disposable.

Fixes QubesOS/qubes-issues#2200
2016-08-07 16:07:30 +02:00
Marek Marczykowski-Górecki
d0ddb3d17c
dispvm: error out on saved-cows.tar creation error
If it fails - for example because of too restrictive volatile.img
permissions, subsequent DispVM will not be really disposable.
The original permissions issue should be fixed by previous commit, this
one makes sure that such errors will not be ignored.

Fixes QubesOS/qubes-issues#2200
2016-08-07 00:41:59 +02:00
HW42
09b49feea6
prepare-volatile-img.sh: don't run as root
This is no longer necessary since volatile.img is formated inside the
VM. This also fixes DispVM creation if the user sets a restrictive umask
for root. Maybe related to #2200.
2016-08-07 00:41:59 +02:00
Marek Marczykowski-Górecki
0968c25486
tests: when creating AppVM based on whonix-ws, connect it to tor
Use sys-whonix if exists. This makes network-related tests more
realistic.
2016-08-07 00:41:59 +02:00