Commit Graph

2764 Commits

Author SHA1 Message Date
Marek Marczykowski
f4c37be03a remove qubes-core-libs files - moved to separate repository 2013-03-07 02:54:55 +01:00
Marek Marczykowski
e0ca1a5674 move tests to dom0
This files really are about dom0 tools.
2013-03-07 02:30:11 +01:00
Marek Marczykowski
3c3252b2a3 Remove qrexec - moved to separate package 2013-03-07 02:30:03 +01:00
Marek Marczykowski
325cf4b894 forgotten subdir 2013-03-06 18:41:10 +01:00
Marek Marczykowski
ca2a54b2b1 do install files used by dom0 netvm
We don't support dom0 netvm anymore.
2013-03-06 18:38:08 +01:00
Marek Marczykowski
7d07a6cf50 move dom0 files to dom0 subdirectory
Those files are actually common for dom0 and VM, but as we splitted the repos,
move them accordingly.
2013-03-06 18:37:58 +01:00
Marek Marczykowski
cd7544b663 Merge branch 'master' of git://git.qubes-os.org/joanna/core 2013-03-04 00:07:36 +01:00
Marek Marczykowski
71f17cf0d0 vm/fstab: enable "discard" option for /rw
This, in conjunction with support in xen-blkfront/back, shrinks private.img in
dom0 with every removed file in VM. So no longer manual cleaning unused space
with some dd + cp trickery.
2013-03-03 21:20:09 +01:00
Marek Marczykowski
e8468928fe vm/fstab: remove comment about anaconda 2013-03-03 21:19:54 +01:00
Marek Marczykowski
35cdaf5b81 dom0/qubes-dom0-network-via-netvm: use iproute instead of net-tools
Apparently net-tools isn't installed by default in fc18-based dom0.
2013-03-03 20:06:20 +01:00
Marek Marczykowski
d048608c8c dom0/qubes-dom0-network-via-netvm: update xen-netfront module name 2013-03-03 20:05:53 +01:00
Marek Marczykowski
8fc805f34a vm/systemd: disable avahi-daemon
Aparently this service have changed name, so make sure it will be disabled also
under new name.
2013-03-03 17:35:54 +01:00
Marek Marczykowski
35e01c4165 dom0/spec: improve PackageKit settings
1. Do not try to tell "no network detected"
2. Do not try to tell "Distribution upgrade detected - Fedora 16"
2013-03-01 01:36:05 +01:00
Joanna Rutkowska
ef972bcbc7 Makefile: use fc18 as default value for DIST_DOM0 2013-02-28 13:43:32 +00:00
Joanna Rutkowska
81a8a372ab version 2.1.16-dom0 2013-02-28 13:33:39 +00:00
Marek Marczykowski
c9cf1cc554 dom0/hcl-report: minor fix 2013-02-28 14:28:53 +01:00
Marek Marczykowski
67ca5da58f dom0: include qubes-hcl-report for collecting HCL entries
Thanks to Zrubecz Laszlo
2013-02-28 14:27:56 +01:00
Joanna Rutkowska
565e8d7a61 version 2.1.15-dom0 2013-02-27 14:26:00 +00:00
Joanna Rutkowska
2bcc656671 Merge branch 'master' of git://git.qubes-os.org/marmarek/core 2013-02-27 14:25:34 +00:00
Marek Marczykowski
c20245c4f8 dom0/core: fix qrexec startup for HVM
Pass only 'notify_function' parameter - wait_for_session doesn't take any other
(especially not 'verbose').
2013-02-27 11:11:31 +01:00
Marek Marczykowski
f8fa85b341 dom0/core: clone/backup-restore HVM-specific properties 2013-02-27 11:07:33 +01:00
Joanna Rutkowska
d9b76bcd17 version 2.1.14-dom0 2013-02-27 09:05:01 +00:00
Joanna Rutkowska
6ec0a4a2f4 Merge branch 'master' of git://git.qubes-os.org/marmarek/core 2013-02-27 09:04:20 +00:00
Marek Marczykowski
52dbedaac2 dom0/backup-restore: chown dom0 home after restore
It can happen that backup was done as different user (in terms of UID) than on
restore system. Correct this by chown.

Especially this is the case when backup was done on Qubes R1 and restore on
Qubes R2.
2013-02-27 05:34:53 +01:00
Marek Marczykowski
d89bdac58c dom0: create volatile.img if not exists (StandaloneVM case)
StandaloneVM have no template to get clean volatile.img. Normally it is copied
from template during VM creation, but it can happen that image would not extx
(e.g. after backup restore). So create it from scratch.

Stay with original approach (restoring from clean image of template) for other
cases as it is much simpler (and perhaps faster).
2013-02-27 05:29:27 +01:00
Marek Marczykowski
1b05978ec6 dom0: pass nogui option down to QubesVM.start()
From qubes-dom0-update, then from QubesVM.run().
2013-02-26 05:35:50 +01:00
Joanna Rutkowska
1de1a1d83c version 2.1.13 2013-02-25 17:17:42 +01:00
Marek Marczykowski
05e45c2e78 dom0/dispvm: add missing import 2013-02-25 13:42:36 +01:00
Marek Marczykowski
3a4c7cb9c4 Merge branch 'master' of git://git.qubes-os.org/joanna/core 2013-02-25 13:26:44 +01:00
Joanna Rutkowska
a87234244b qrexec_policy: Improve user message readability 2013-02-25 11:13:19 +01:00
Marek Marczykowski
147b97c736 vm/file-editor: send logs to dom0 (qrexec.*.log) 2013-02-25 06:48:56 +01:00
Marek Marczykowski
92f6c6df20 dom0+vm/dispvm: add some timing logs 2013-02-25 06:48:29 +01:00
Marek Marczykowski
305143371d dom0/dispvm: fix typo in qvm-create-default-dvm 2013-02-24 23:52:12 +01:00
Joanna Rutkowska
3c562f3cfd version 2.1.12 2013-02-24 10:10:41 +01:00
Marek Marczykowski
3bc0cdb43a vm/qfile-copy: rename incoming directory to QubesIncoming
Also use plain source VM name as subdir (without "from-" prefix).
2013-02-23 13:11:59 +01:00
Marek Marczykowski
26ecbb0e86 dom0/update: exit with code 1 when stared without required privileges 2013-02-22 21:21:31 +01:00
Marek Marczykowski
d12e532fc2 vm: Use nautilus-actions to provide "Copy to other AppVM" etc nautilus commands
No more ugly symlink creation at VM startup, nautilus-actions have system-wide
dir (in opposite to nautilus-scripts).

Currently old symlinks are not cleaned up. Maybe it should, but leaving them
have one advantage: will not break existing users behavior.
2013-02-21 16:44:16 +01:00
Marek Marczykowski
8d347cb455 vm/spec: mark some config files with %config(noreplace)
Do mark such critical files, which shouldn't be modified by the user.
2013-02-21 07:25:47 +01:00
Marek Marczykowski
9310f398d5 dom0/spec: own qubes python subdir 2013-02-21 04:32:55 +01:00
Marek Marczykowski
d7d822f450 dom0: chage default template label to black 2013-02-20 22:59:50 +01:00
Marek Marczykowski
af8cb473b2 dom0+vm/udev: force QUBES_EXPOSED variable available to block_add_change script 2013-02-19 04:59:27 +01:00
Marek Marczykowski
aa97910d49 dom0/core: do start already started but paused VM 2013-02-19 03:33:53 +01:00
Marek Marczykowski
7051960d6a dom0/core: pass icon path to qubes_guid
GUI daemon now is able to load the icon (when path given) and publish it to X
server. This makes possible to have VM name in WM_CLASS property (instead of
icon name) to fix window grouping in KDE.
2013-02-19 01:07:24 +01:00
Marek Marczykowski
b214fa6f9d dom0: Scale icons to 48x48
We register them as 48px icons, so scale them to that size (originally 600px).
Specifically required by gui-daemon which require prescalled icon.
2013-02-19 01:05:22 +01:00
Marek Marczykowski
39a26cdb08 dom0/qclipd: use Glib mainloop instead of simple while True
It is actually needed by dbus bindings when using
follow_name_owner_changes=True.
2013-02-14 19:11:47 +01:00
Marek Marczykowski
740ffd2ee7 dom0/core: fix QubesDaemonPidfile to match ContextManager signature 2013-02-14 19:05:08 +01:00
Marek Marczykowski
cd4c62fc42 dom0/systemd: disable xendomains.service 2013-02-13 16:55:07 +01:00
Marek Marczykowski
d5cbeaf524 dom0/systemd: fix qubes-meminfo-writer.service
Prevent systemd from killing just started meminfo-writer process.
2013-02-13 16:53:56 +01:00
Marek Marczykowski
0e39e961ea dom0/systemd: Rename qubes-dispvm to qubes-setupdvm
This is more accurate name. Also "qubes-setupdvm" is already used in
some places, so change service name instead of changing that places (at
least qubes-core.service).
2013-02-13 16:52:38 +01:00
Marek Marczykowski
ba779a1920 dom0/core: fix zenity fallback in qrexec_daemon 2013-02-13 15:33:32 +01:00