Commit Graph

4232 Commits

Author SHA1 Message Date
Bahtiar `kalkin-` Gadimov
53ff88cd15
qvm-block add revert command 2016-07-13 22:34:36 +02:00
Bahtiar `kalkin-` Gadimov
9acd46bddb
qvm-block show if old revisions are available 2016-07-13 22:34:35 +02:00
Bahtiar `kalkin-` Gadimov
e07c4cc8e8
qvm-block use new storage API 2016-07-13 22:34:35 +02:00
Bahtiar `kalkin-` Gadimov
95fed1eb71
qubes.linux.kernel use new storage api 2016-07-13 22:34:34 +02:00
Bahtiar `kalkin-` Gadimov
f60ccb235d
qubes.storage.domain use new storage API 2016-07-13 22:34:34 +02:00
Bahtiar `kalkin-` Gadimov
d1c606b952
qubes.storage.file use new storage API 2016-07-13 22:34:33 +02:00
Bahtiar `kalkin-` Gadimov
1f735669bc
Migrate qubes.vm modules to new API 2016-07-13 22:34:33 +02:00
Bahtiar `kalkin-` Gadimov
ca9797bb6b
qubes.tests.int.basic use new storage API 2016-07-13 22:34:32 +02:00
Bahtiar `kalkin-` Gadimov
1cbabc79ff
qubes.vm.QubesVM use new storage api 2016-07-13 22:34:32 +02:00
Bahtiar `kalkin-` Gadimov
7e1563c88d
Add handling for old volume config 2016-07-13 22:34:31 +02:00
Bahtiar `kalkin-` Gadimov
1bccb146d8
Add qubes.storage.isodate() helper function 2016-07-13 22:34:31 +02:00
Bahtiar `kalkin-` Gadimov
7841e3f6c0
qubes.storage rework api 2016-07-13 22:34:30 +02:00
Bahtiar `kalkin-` Gadimov
3952cef556
QubesVM serialize bool values from XML 2016-07-13 22:21:32 +02:00
Bahtiar `kalkin-` Gadimov
4cc7b8d2a8
Fix qubes.tests.storage 2016-07-13 22:21:31 +02:00
Bahtiar `kalkin-` Gadimov
bba9b38e8e
Avoid libvirt access in qubes.vm.qubesvm.QubesVM 2016-07-13 22:21:30 +02:00
Bahtiar `kalkin-` Gadimov
774cbd499e
Add TestVM.is_halted() to fix failing tests 2016-07-13 21:57:12 +02:00
Bahtiar `kalkin-` Gadimov
6fad722554
Make pylint really happy ♥♥♥ 2016-07-13 21:13:29 +02:00
Bahtiar `kalkin-` Gadimov
3b93fd612e
Make pylint really happy ♥♥♥ 2016-07-13 20:58:45 +02:00
Bahtiar `kalkin-` Gadimov
de5487bf14
Dumb down qvm-remove
- Move `vm.is_halted()` check in to VMCollection.__delitem__()
- `vm.remove_from_disk()` will raise exception if is called on a running vm
2016-07-13 18:24:29 +02:00
Bahtiar `kalkin-` Gadimov
5115eef413
qvm-shutdown make pylint happy ♥ 2016-07-13 18:09:32 +02:00
Marek Marczykowski-Górecki
4072914b40
version 3.2.5 2016-07-12 06:28:36 +02:00
Marek Marczykowski-Górecki
bed5f5d88c
tests: regression test for #1990
QubesOS/qubes-issues#1990
2016-07-12 06:28:01 +02:00
Marek Marczykowski-Górecki
69e792d82c
usb_attach: improve error reporting
- specifically report when qubes-usb-proxy package is not installed
- include sanitized stderr output in error message
2016-07-12 06:27:53 +02:00
Marek Marczykowski-Górecki
da74d75e6b
core: collect stderr too when vm.run_service is called with passio_popen
Give access to all file descriptors when requested.
2016-07-12 06:24:07 +02:00
Bahtiar `kalkin-` Gadimov
63a1edc274
Fix qvm-remove undefines domain in libvirt
- Return error if domain is not halted
- Undefine the domain in libvirt, to avoid: "Domain already exists with uuid…"
2016-07-05 13:39:47 +02:00
Bahtiar `kalkin-` Gadimov
a66df9c82e
Fix bugs in qvm-shutdown --all
- Exit the program if all domains are halted
- Changed log.notice to log.info
- Replace map with dictionary comprehensions (pylint)
2016-07-05 13:32:59 +02:00
Wojtek Porczyk
c899d1f960 qubes/tests: Show errors while loading external tests
Now failure to load external tests shows in which entry point the error
happened and a useful traceback. The traceback extends from the "try"
statement down to the actual error line, but it does not include the
frames above, ie. from the invocation to the load_tests routine. This is
a limitation of Python itself and usually not a problem.
2016-07-04 16:51:35 +02:00
Wojtek Porczyk
1ff1ca37a1 Merge remote-tracking branch 'woju/pull/21/head' into core3-devel
Conflicts:
	qubes/storage/__init__.py
2016-07-02 11:54:56 +02:00
Marek Marczykowski-Górecki
7e9c816b7b
qubeswatch: use always "dom0" name for dom0
Libvirt reports dom0 as "Domain-0". Which is incompatible with how Qubes
and libxl toolstack names it ("dom0"). So handle this as a special case.
Otherwise reconnection retries leaks event object every iteration.

Fixes QubesOS/qubes-issues#860
Thanks @alex-mazzariol for help with debugging!
2016-07-01 19:16:07 +02:00
Marek Marczykowski-Górecki
78437f7012
qvm-ls: remove unused code 2016-07-01 03:08:42 +02:00
Marek Marczykowski-Górecki
8c7f072461
core: fix handling vm.start_time for just shutdown VM
That xenstore entry may be already removed even when libvirt still
reports the VM as running.

Fix QubesOS/qubes-issues#2127
2016-07-01 00:47:32 +02:00
Marek Marczykowski-Górecki
03210f6cfe
Merge remote-tracking branch 'qubesos/pr/34'
* qubesos/pr/34:
  qfile-daemon-dvm: Implement LAUNCH and FINISH actions
  qfile-daemon-dvm: Call static method by class name
  qfile-daemon-dvm: Move dispVM killing into cleanup function
2016-06-30 01:43:57 +02:00
Marek Marczykowski-Górecki
13a463b565
Merge remote-tracking branch 'qubesos/pr/33'
* qubesos/pr/33:
  And some more quoting to satisfy #1672
  Quoting all `cat`s as proposed in #1672
  Modifying support cpio as proposed in #1672
  Quoting the destination as proposed in #1672
2016-06-30 01:43:52 +02:00
HW42
f6bc97d65b
save pci_e820_host property 2016-06-29 23:51:51 +02:00
Marek Marczykowski-Górecki
ae2194da3b
tests: one more place to add xdotool --sync 2016-06-29 23:50:52 +02:00
Wojtek Porczyk
d28ab908cc Network and storage fixes 2016-06-29 16:42:35 +02:00
Rusty Bird
b964e8c33f
qfile-daemon-dvm: Implement LAUNCH and FINISH actions
If the action is LAUNCH instead of qubes.SomeService, then just start
the dispVM, write (only) its name to stdout, and quit.

If the action is FINISH, then kill and remove the named dispVM.
2016-06-29 11:59:12 +00:00
Rusty Bird
142cb9e240
qfile-daemon-dvm: Call static method by class name 2016-06-29 11:59:09 +00:00
Rusty Bird
afb2a65744
qfile-daemon-dvm: Move dispVM killing into cleanup function 2016-06-29 11:58:46 +00:00
Wojtek Porczyk
b5681c2278 Merge remote-tracking branch 'woju/pull/22/head' into core3-devel 2016-06-28 15:21:34 +02:00
Wojtek Porczyk
b53c572f1d Merge remote-tracking branch 'woju/pull/23/head' into core3-devel 2016-06-28 15:19:57 +02:00
Wojtek Porczyk
c9accc258c Merge remote-tracking branch 'woju/pull/15/head' into core3-devel
Conflicts:
	qubes/storage/__init__.py
	qubes/storage/file.py
	qubes/vm/qubesvm.py
2016-06-28 15:15:00 +02:00
Desobediente Civil
59e687c3f3 And some more quoting to satisfy #1672 2016-06-27 19:23:53 -03:00
Desobediente Civil
5081b58ee8 Quoting all cats as proposed in #1672 2016-06-27 19:19:00 -03:00
Desobediente Civil
fa83298153 Modifying support cpio as proposed in #1672 2016-06-27 19:15:46 -03:00
Desobediente Civil
12bf920969 Quoting the destination as proposed in #1672 2016-06-27 19:10:00 -03:00
Marek Marczykowski-Górecki
e431e8bc45
qvm-ls: fix handling explicit VMs list 2016-06-26 13:02:34 +02:00
Marek Marczykowski-Górecki
9d781f77ce
tests: VM removal
Check if everything is cleaned up.
2016-06-25 01:53:39 +02:00
Marek Marczykowski-Górecki
13f832645a
qvm-remove: undefine libvirt domain even when not removing files
Fixes QubesOS/qubes-issues#2112
2016-06-25 00:21:47 +02:00
Marek Marczykowski-Górecki
748a3a90a2
core: fix handling disabling VM autostart on VM removal
QubesOS/qubes-issues#1930
2016-06-25 00:20:27 +02:00