Marek Marczykowski
d89733b517
dom0/core: setup yum to use proxy when it have access to it ( #568 )
...
To simplify configuration, automatically enable 'yum-proxy-setup'
pseudo-service when allowing access to the proxy. Also disable this service,
when access is revoked. Thanks to this the user can enable this feature by one
click in firewall settings.
2012-05-31 03:05:13 +02:00
Marek Marczykowski
c81cc32da2
dom0/qvm-firewall: add support for 'allowYumProxy' setting ( #568 )
2012-05-31 03:05:13 +02:00
Marek Marczykowski
030584f026
dom0/core-firewall: firewall setting for qubes-yum-proxy ( #568 )
...
New setting for access to qubes-yum-proxy. The difference from other firewall
setting (and reason for new top-level setting): 'deny' is enforced even if
policy is set to 'allow'. This proxy service is mainly used to filter network
traffic, so do not expose it to VMs which can connect to any host directly (eg
'untrusted' VM).
2012-05-31 03:05:13 +02:00
Marek Marczykowski
edc3518ec9
vm/qubes-yum-proxy: setup yum to use qubes-yum-proxy ( #568 )
...
The simplest way is just add proxy=... entry to /etc/yum.conf, but sometimes it
is reasonable to bypass the proxy. Some examples:
- usage of non-standard repos with some exotic file layout, which will be
blocked by the proxy
- usage of repos not-accessible via proxy (eg only via VPN stared in VpnVM)
This commit introduces 'yum-proxy-setup' pseudo-service, which can be
controlled via standard qvm-service or qubes-manager. When enabled - yum will
be configured at VM startup to use qubes proxy, otherwise - to connect directly
(proxy setting will be cleared).
2012-05-31 03:05:13 +02:00
Marek Marczykowski
332e9008f0
vm/qubes-yum-proxy: create dir for pidfile under FC15 ( #568 )
...
On FC>=15 /var/run is on tmpfs, so /var/run/tinyproxy from rpm don't survive
reboot. This is bug in Fedora package (should include config file for tmpfiles
service). For now create dir just before starting service.
2012-05-31 03:05:05 +02:00
Marek Marczykowski
b2cfd73691
vm: qubes-yum-proxy service ( #568 )
...
Introduce proxy service, which allow only http(s) traffic to yum repos. The
filter rules are based on URL regexp, so it isn't full-featured content
inspection and can be easy bypassed, but should be enough to prevent some
erroneus user actions (like clicking on invalid link).
It is set up to intercept connections to 10.137.255.254:8082, so VM can connect
to this IP regardless of VM in which proxy is running. By default it is
started in every NetVM, but this can be changed using qvm-service or
qubes-manager (as always).
2012-05-31 03:04:11 +02:00
Marek Marczykowski
a953e56042
vm/spec: remove executable perm where not needed
2012-05-31 02:21:15 +02:00
Marek Marczykowski
f11882f1ac
dom0+vm/iptables: add PR-QBS-SERVICES chain in PREROUTING nat table
...
Additional chain for some qubes-related redirections. BTW PR-QBS should be
renamed now to PR-QBS-DNS...
2012-05-31 02:21:15 +02:00
Marek Marczykowski
10ed263c12
dom0+vm/vif-script: setup IP address of net backend interface
...
This is needed to connect to ProxyVM/NetVM, not only pass traffic ahead. Still
firewall rules applies.
2012-05-31 02:21:05 +02:00
Marek Marczykowski
6a9b4cadd0
vm+dom0/vif-script: indent fix
2012-05-31 02:03:12 +02:00
Marek Marczykowski
d1ec75d4c8
Merge branch 'hvm' of ssh://gitpro.qubes-os.org/var/lib/qubes/git/joanna/core into hvm
2012-05-31 01:02:52 +02:00
Marek Marczykowski
6bc609fbc3
dom0/qvm-tools: introduce qvm-service tool
...
Allow setting vm services same as in qubes-manager
2012-05-30 13:47:25 +02:00
Marek Marczykowski
36f4086254
vm/notify-update: do not treat network problems as updates pending symptom
2012-05-30 13:40:27 +02:00
Marek Marczykowski
b55da785f7
dom0/qvm-block: hide devices mounted in dom0 ( #579 )
2012-05-30 00:54:24 +02:00
Marek Marczykowski
2e8765e1e1
dom0/qvm-ls: add 'kernel' and 'kernelopts' columns
2012-05-26 12:21:42 +02:00
Marek Marczykowski
44c14d409c
dom0/core: don't limit netvm/proxyvm vcpu count to 1 ( #571 )
2012-05-25 15:06:00 +02:00
Marek Marczykowski
05123c09f2
qrexec: describe msg types in header file
2012-05-24 12:11:03 +02:00
Marek Marczykowski
1e0117ca50
vm/systemd: generate opts for GUI based on debug-mode ( #567 )
2012-05-22 16:49:03 +02:00
Marek Marczykowski
b87806db17
dom0: expose debug mode in xenstore ( #567 )
2012-05-22 15:51:40 +02:00
Marek Marczykowski
659dec044f
dom0/core: don't force maxmem=memory for NetVM ( #572 )
2012-05-20 02:08:56 +02:00
Marek Marczykowski
2b439aedfe
dom0/update-notify: ensure correct permissions for update stat file
2012-05-16 07:55:48 +02:00
Marek Marczykowski
be1e72cad7
dom0/qubes-updates: stat file for qubes-manager
2012-05-14 04:56:30 +02:00
Marek Marczykowski
ba3d07d300
dom0/qubes-updates: one more qubes-dom0-update typo fix
2012-05-14 04:56:03 +02:00
Joanna Rutkowska
db82cf6851
version 2.0.23-dom0
2012-05-12 11:59:52 +02:00
Marek Marczykowski
b4aa6c6ddc
vm/spec: fix /etc/hosts if it was broken by previous version
2012-05-08 23:45:00 +02:00
Marek Marczykowski
0268819655
vm: do not override /etc/hosts, just add VMNAME to 127.0.0.1
2012-05-08 23:44:59 +02:00
Joanna Rutkowska
02e312ab04
vm: Add localhost alias to /etc/hosts
...
... or otherwise, some programs will hang for many secconds trying to resolve localhost.
2012-05-08 23:44:59 +02:00
Marek Marczykowski
81138182f6
dom0: var name fix, and one minor sanity check
2012-05-08 15:54:29 +02:00
Marek Marczykowski
c78d38fb0d
dom0/core: disable private.img for HVM ( #26 pro)
2012-05-04 13:20:10 +02:00
Marek Marczykowski
fdaee4bf92
dom0/dom0-update: clean up metadata caches after downloading updates ( #558 )
2012-05-04 02:42:21 +02:00
Marek Marczykowski
7f6a3c665b
dom0/qvm-pci: add info about required restart after PCI device add/remove
2012-05-03 03:54:05 +02:00
Marek Marczykowski
057de1a7ef
Merge branch 'hvm' of ssh://gitpro.qubes-os.org/var/lib/qubes/git/joanna/core into hvm
2012-05-02 00:42:47 +02:00
Marek Marczykowski
079b8a421c
vm/systemd: do not depend on proc-xen.mount ( #466 )
...
local-fs.target already covers /proc/xen
2012-05-01 23:48:45 +02:00
Marek Marczykowski
7eac1426d0
vm: include /proc/xen in fstab ( #466 )
2012-05-01 23:48:25 +02:00
Marek Marczykowski
99e784bfc0
dom0/qvm-backup: chown user dir before backup ( #492 )
2012-05-01 02:22:36 +02:00
Marek Marczykowski
929d6b52c9
dom0: create appmenus for NetVMs, using separate whitelist ( #538 )
2012-05-01 02:05:07 +02:00
Marek Marczykowski
478b57f3a9
dom0: create appmenus template and icon for all VMs
2012-05-01 02:04:16 +02:00
Marek Marczykowski
af1f88755d
vm: notify dom0 when updates available in VM ( #475 )
2012-05-01 01:14:04 +02:00
Marek Marczykowski
fa41bf840c
dom0: provide service for VM to notify about updates availability ( #475 )
2012-05-01 01:12:19 +02:00
Joanna Rutkowska
aa4f8aab2c
version 2.0.22-dom0
2012-04-30 13:31:58 +02:00
Marek Marczykowski
366e405df0
dom0: remove unused reset_vm_configs.py
2012-04-30 13:29:01 +02:00
Joanna Rutkowska
11b952ffc5
Merge branch 'hvm' of 10.141.1.101:/var/lib/qubes/git/marmarek/core into hvm
2012-04-30 13:27:53 +02:00
Marek Marczykowski
2ec08734dd
dom0/core: guid for HVM is connected to stubdom - respect it when checking its state ( #25 pro)
2012-04-28 02:51:43 +02:00
Marek Marczykowski
1b9e780861
dom0/core: do not relay on any max xid ( #445 )
...
What is really required is the maximum number of domains, not its IDs. Use max
QID as maximum number of domains.
2012-04-28 02:17:04 +02:00
Marek Marczykowski
f41f0e965b
dom0/qvm-ls: show 'n/a' in disk usage for dom0
2012-04-28 02:03:43 +02:00
Marek Marczykowski
187bc242e5
dom0: add missing 2> /dev/null to unbind_pci_device.sh ( #550 )
2012-04-26 14:29:19 +02:00
Marek Marczykowski
bf325fe573
dom0+vm/hotplug-script: improve error checking, log only important messages ( #477 )
2012-04-25 23:41:48 +02:00
Marek Marczykowski
6a489c0faf
dom0: fix check-updates cron job
2012-04-25 23:37:03 +02:00
Marek Marczykowski
67722e72bb
vm/qubes-dom0-update: display info when no updates available
2012-04-25 00:25:54 +02:00
Joanna Rutkowska
db6e655ce7
version 2.0.21-dom0
2012-04-24 16:07:42 +02:00