Commit Graph

354 Commits

Author SHA1 Message Date
Marek Marczykowski
c978ce3a48 dom0/qvm-firewall: eliminate duplicate firewall defaults definition (#599)
This caused ignore of different firewall defaults for TemplateVM.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
ab9c2e503a dom0: qvm-run --nogui switch
Can be used to not start guid.
2012-06-19 00:59:27 +02:00
Marek Marczykowski
8bdc5706f7 dom0/core: allow to change default user for qvm-run (#577)
This doesn't make all dom0 code VM-username independent, still 'user' is
hardcoded in many places. This only change behavior of qvm-run, especially for use in HVM.
2012-06-13 19:01:32 +02:00
Marek Marczykowski
844d43b0ef dom0/core: introduce is_guid_running() and use it in is_fully_usable()
To improve code reuse, especially to remove direct checking for
"/var/run/qubes/guid_running.{0}" in many places.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
c534d5871b dom0/core: fix order of loading VM attributes
Parsing kernelopts depends on uses_default_kernelopts, so set 'order' appropriate.
2012-06-13 18:59:56 +02:00
Marek Marczykowski
f2abc5e26d dom0: populate unchanged firewall settings with previous values (#589)
Missed settings in new firewall configuration caused exception. In old qubes-manager (before #582 done) this exception silently broke saving operation, leaving user with progress bar windows infinitely...
2012-06-05 21:21:53 +02:00
Marek Marczykowski
aea8d189f0 dom0/core: fix QubesVM.gateway
To be consistent with QubesNetVM, where gateway property contain gateway IP for
_other_ VMs, in non-network-provider VM it should be empty.
2012-06-05 21:21:53 +02:00
Marek Marczykowski
a528befbc4 dom0: default TemplateVM firewall: block all traffic and allow use of yum proxy (#590) 2012-06-05 21:21:53 +02:00
Marek Marczykowski
a8b992e647 dom0/core: implement per-VM-type firewall defaults 2012-06-05 21:21:53 +02:00
Marek Marczykowski
e4f64fd600 dom0/core: remove trailing spaces 2012-05-31 03:11:44 +02:00
Marek Marczykowski
65fc62a989 dom0/core: setup yum to use proxy when it have access to it (#568)
To simplify configuration, automatically enable 'yum-proxy-setup'
pseudo-service when allowing access to the proxy. Also disable this service,
when access is revoked. Thanks to this the user can enable this feature by one
click in firewall settings.
2012-05-31 03:11:44 +02:00
Marek Marczykowski
2ca4b11183 dom0/core-firewall: firewall setting for qubes-yum-proxy (#568)
New setting for access to qubes-yum-proxy. The difference from other firewall
setting (and reason for new top-level setting): 'deny' is enforced even if
policy is set to 'allow'. This proxy service is mainly used to filter network
traffic, so do not expose it to VMs which can connect to any host directly (eg
'untrusted' VM).
2012-05-31 03:11:44 +02:00
Marek Marczykowski
812264cfb0 dom0/core: don't limit netvm/proxyvm vcpu count to 1 (#571) 2012-05-31 03:09:22 +02:00
Marek Marczykowski
3d783f7fa3 dom0: expose debug mode in xenstore (#567) 2012-05-22 15:51:09 +02:00
Marek Marczykowski
987a490179 dom0/core: don't force maxmem=memory for NetVM (#572) 2012-05-20 02:10:50 +02:00
Marek Marczykowski
b771cb9f90 dom0/qvm-backup: chown user dir before backup (#492) 2012-05-02 00:09:00 +02:00
Marek Marczykowski
9edc845184 dom0: create appmenus for NetVMs, using separate whitelist (#538) 2012-05-02 00:09:00 +02:00
Marek Marczykowski
7b81659593 dom0: create appmenus template and icon for all VMs 2012-05-02 00:09:00 +02:00
Marek Marczykowski
370ad33c44 dom0: provide service for VM to notify about updates availability (#475) 2012-05-02 00:09:00 +02:00
Marek Marczykowski
db6eb497a6 dom0/core: do not relay on any max xid (#445)
What is really required is the maximum number of domains, not its IDs. Use max
QID as maximum number of domains.
2012-04-28 03:26:20 +02:00
Marek Marczykowski
c5cc6620d3 dom0/core: include VM name in "insufficient memory" message (#534) 2012-04-24 02:14:17 +02:00
Marek Marczykowski
e73b13c68d dom0/core: add 'debug' VM property (#537) 2012-04-23 12:43:24 +02:00
Marek Marczykowski
1076e09dc0 dom0/core: rename "Starting" start to "Transient"
This state can also appear at VM shutdown.
2012-04-23 12:42:18 +02:00
Marek Marczykowski
9d3c008ecb dom0/core: fix memory parse fix 2012-04-20 15:39:39 +02:00
Marek Marczykowski
d7b80fe3d4 dom0/core: parse memory and maxmem as int 2012-04-20 14:48:43 +02:00
Marek Marczykowski
28666c47f5 dom0/core: check if object has attr before using it 2012-04-20 13:33:41 +02:00
Marek Marczykowski
0633e35fa6 dom0/core: include pcidevs and include_in_backups in cloned attrs
Preserve it in qvm-clone and backup-restore
2012-04-20 03:14:09 +02:00
Marek Marczykowski
798e3d8c96 dom0/backup-restore: set network dependencies when all VMs are restored
To avoid complex restore order resolution.
2012-04-20 03:14:09 +02:00
Marek Marczykowski
aaa07f4559 dom0/backup-restore: display netvm of proxyvm 2012-04-20 03:14:09 +02:00
Marek Marczykowski
665363fa33 dom0/backup-restore: restore all attributes 2012-04-20 03:14:09 +02:00
Marek Marczykowski
a6d38480c6 dom0/core: do not write netvm_domid for halted VMs 2012-04-20 03:14:09 +02:00
Marek Marczykowski
3d316ca2f9 dom0/core: introduce "Starting" state (#520)
Represent VM which is running, but gui daemon hasn't connected yet.
2012-04-19 01:16:00 +02:00
Marek Marczykowski
ceeed3bd8b dom0/qvm-start: fix --no-guid switch (#528) 2012-04-18 17:38:38 +02:00
Marek Marczykowski
47b70235e3 dom0/core: force memory <= maxmem at VM startup (#497) 2012-04-18 16:53:50 +02:00
Marek Marczykowski
abaea52da0 dom0/core: detect if PCI device not already attached to some other VM (#522) 2012-04-18 16:53:50 +02:00
Marek Marczykowski
27771444a9 dom0/core: If dynamic memory management disabled, set maxmem=mem (#525) 2012-04-18 16:53:50 +02:00
Marek Marczykowski
997c0ed86b dom0/core: pass all start() parameters to the base class 2012-04-18 16:53:50 +02:00
Marek Marczykowski
ce0c20e021 dom0/qvm-block: qvm-block -d <vmname> detaches all devices (#517)
Exception: if frontend specified, detaches only this one device.
2012-04-13 00:30:13 +02:00
Marek Marczykowski
1a07bc241d dom0/qvm-block: handle block-attach errors (#515) 2012-04-12 18:04:20 +02:00
Marek Marczykowski
5ae9f98c8c dom0/core: do not fail on VM shutdown in QubesWatch 2012-04-12 15:52:07 +02:00
Marek Marczykowski
37c7dcc270 dom0/core: section headers in qubesutils 2012-04-11 01:37:01 +02:00
Marek Marczykowski
9a2feeb214 dom0/core: watch interface 2012-04-11 01:36:57 +02:00
Marek Marczykowski
158076d0a2 dom0/core: minor netvm switching
Do not fail when setting netvm to none of running VM.
2012-04-11 01:36:51 +02:00
Marek Marczykowski
ff52cbe378 dom0/qvm-block: use xenstore transactions (#507) 2012-04-03 02:09:02 +02:00
Marek Marczykowski
d8b979d844 dom0/qvm-block: ignore devices with some field missing 2012-03-31 19:49:46 +02:00
Marek Marczykowski
749b84ec43 dom0/qvm-block: hide system disks by default (#5 pro) 2012-03-31 19:49:41 +02:00
Marek Marczykowski
b10615f7bd dom0/qvm-tools: fix auto-detach 2012-03-31 19:12:03 +02:00
Marek Marczykowski
8105fad646 dom0+vm: qvm-block --attach-file
Allow to attach disk image from different VM as block device. File attached
with qvm-block -A will be visible as loopX device and as such can be detached.
File path will be in device description.
2012-03-31 19:04:50 +02:00
Marek Marczykowski
3650ac837e dom0/core: do not inherit kernel version from template (#488) 2012-03-28 00:49:02 +02:00
Marek Marczykowski
d969d2b863 dom0/utils: minor for for parse_size 2012-03-28 00:47:26 +02:00