Alexandre Bezroutchko
|
023f204826
|
dom0+vm/qvm-usb: adjust unittest to the new XS path naming scheme (unittests are broken now)
|
2012-10-21 14:59:35 +02:00 |
|
Alexandre Bezroutchko
|
876924f233
|
dom0+vm/qvm-usb: adjust usb_remove to the new XS naming scheme
|
2012-10-21 14:59:35 +02:00 |
|
Alexandre Bezroutchko
|
d6426e3564
|
dom0+vm/qvm-usb: changed the structure of XS pathes
|
2012-10-21 14:59:35 +02:00 |
|
Alexandre Bezroutchko
|
25b72ab3d5
|
dvp/qvm-usb: improved debugging output
|
2012-10-21 14:59:35 +02:00 |
|
Alexandre Bezroutchko
|
6a4ab8d4bf
|
dvp/qvm-usb: simple script to install pvusb hacks
|
2012-10-21 14:59:35 +02:00 |
|
Alexandre Bezroutchko
|
0359c5df98
|
dvp/qvm-usb: Changes to unittests.
|
2012-10-21 14:59:34 +02:00 |
|
Alexandre Bezroutchko
|
b0a68d287e
|
dvp/qvm-usb: Added some debugging code.
|
2012-10-21 14:59:34 +02:00 |
|
Alexandre Bezroutchko
|
83626161fe
|
dvp/qvm-usb: changed order of diff arguments in all test scripts, for clearer output
|
2012-10-21 14:59:34 +02:00 |
|
abb
|
c153c98fc1
|
dvp/qvm-usb: some naive unittests for block and pvusb passthrough
|
2012-10-21 14:59:34 +02:00 |
|
Alexandre Bezroutchko
|
fe4c9e7018
|
dom0+vm/qvm-usb: cosmetic
|
2012-10-21 14:59:34 +02:00 |
|
Alexandre Bezroutchko
|
0bbbb39eab
|
dom0+vm/qvm-usb: autoload pvusb backend driver
|
2012-10-21 14:59:34 +02:00 |
|
Alexandre Bezroutchko
|
c1785f79dd
|
dom0+vm/qvm-usb: First implementation of udev rules and supporting scripts.
|
2012-10-21 14:59:34 +02:00 |
|
Marek Marczykowski
|
e35b413c19
|
dom0/spec: add R: python-lxml for pretty print
|
2012-10-19 02:21:41 +02:00 |
|
Bruce A Downs
|
a504600c20
|
dom0/core: Added the pretty print of qubes.xml
* Replaced xml.etree.ElementTree with lxml.etree
* Added argument to tree.write(file, encoding="UTF-8", pretty_print=True)
|
2012-10-19 02:21:41 +02:00 |
|
Bruce A Downs
|
28b4f82b0a
|
dom0/core: Added call to lock.remove_pidfile() on successful exit
* Adding remove_pidfile on exit
* prevents the incorrect 'crash' message on startup
* Added proper call to main
|
2012-10-19 02:21:41 +02:00 |
|
Alexandre Bezroutchko
|
d6432a16c4
|
dom0/qvm-tools: clean resolv.conf when networking goes down
|
2012-10-19 02:21:03 +02:00 |
|
Marek Marczykowski
|
3a875edf58
|
dom0/core: fix qubes-dom0-network-via-netvm (#660)
IP 10.137.0.1 was already used by netvm, so change dom0 IP to 10.137.0.2.
|
2012-10-19 02:07:35 +02:00 |
|
Marek Marczykowski
|
3e90174910
|
Merge branch 'hvm-for-master'
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
version_dom0
vm-systemd/qubes-sysinit.sh
|
2012-10-17 21:41:03 +02:00 |
|
Marek Marczykowski
|
d010906eb1
|
Merge remote-tracking branch 'abb/qvm_block-bugfix'
|
2012-10-16 00:59:36 +02:00 |
|
Alexandre Bezroutchko
|
ca4367821e
|
Improve handling of command line parameters, don't silently ignore unexpected arguments.
This is to avoid following behavior:
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
[abb@dom0 qubes-core]$ qvm-block -a qdvp dom0:sdb
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB (attached to 'qdvp' as 'xvdi')
[abb@dom0 qubes-core]$ qvm-block -d qdvp BLAHBLAH
^^^^^^^^^^^^^
>>> The last parameter is silently ignored and all devices get detached
[abb@dom0 qubes-core]$ qvm-block -l
netvm:sda STORAGE_DEVICE () 0 B
dom0:sdb1 Cruzer () 3 GiB
dom0:sdb Cruzer () 3 GiB
|
2012-10-15 11:40:08 +02:00 |
|
Marek Marczykowski
|
73ac8250e0
|
vm/systemd: force exit status 0 in qubes-sysinit
If /rw/config/rc.local-early does not exits, exit status is incorrectly 1.
|
2012-10-15 02:33:36 +02:00 |
|
Marek Marczykowski
|
02601049ca
|
dom0/qmemman: do not fail when domain name not available
This can be the case when domain just dissapeared (destroy), but qmemman didn't
processed xenstore watch trigger.
|
2012-10-15 01:58:07 +02:00 |
|
Marek Marczykowski
|
3183942a9d
|
vm/network: do not fail service on failed xenstore-read
|
2012-10-13 11:47:32 +02:00 |
|
Bruce A Downs
|
6304155990
|
dom0/core: minor spell check fixes
* happend
* avilable
* skiping
|
2012-10-09 01:23:54 +02:00 |
|
Bruce A Downs
|
05f7bfc9c1
|
dom0/core: Code cleanup of qubesutils.py
* Took out unreferenced restore_vm_file function
* removed unused imports
* renamed interpreter from python2 to python
|
2012-10-09 01:23:45 +02:00 |
|
Marek Marczykowski
|
081cfab559
|
dom0/core: do not leak xs transaction and use it in all xs calls
|
2012-10-08 01:26:07 +02:00 |
|
Alexandre Bezroutchko
|
f4ef1adcdd
|
dom0/qvm-core: start XS transaction before getting the list of domains
|
2012-10-08 01:23:52 +02:00 |
|
Alexandre Bezroutchko
|
3c53f049a3
|
dom0/qvm-block: cosmetic
|
2012-10-08 01:23:42 +02:00 |
|
Alexandre Bezroutchko
|
abfe99756f
|
start XS transaction before getting the list of domains
|
2012-10-08 00:48:20 +02:00 |
|
Alexandre Bezroutchko
|
caf3ed1ae4
|
cosmetic
|
2012-10-08 00:46:30 +02:00 |
|
Marek Marczykowski
|
5e08cbc3de
|
vm/appmenus: include subdirs with .desktop files
|
2012-10-06 22:18:00 +02:00 |
|
Marek Marczykowski
|
d03bab3db2
|
Merge branch 'master-for-hvm' into hvm
Conflicts:
dom0/qvm-core/qubes.py
dom0/qvm-tools/qvm-sync-clock
|
2012-10-04 05:45:41 +02:00 |
|
Marek Marczykowski
|
490a5e9e1a
|
vm/spec: fix adding yum-proxy configuration
Do not add entry if already present.
|
2012-10-04 05:44:20 +02:00 |
|
Marek Marczykowski
|
5e696298cf
|
dom0/core: fix icon handling on VM clone
|
2012-10-04 05:44:20 +02:00 |
|
Marek Marczykowski
|
d5c74f69ee
|
dom0/core: recreate appmenus after rename for any VM, not only AppVM (#659)
|
2012-10-04 05:44:20 +02:00 |
|
Marek Marczykowski
|
9a2f1dfebe
|
dom0/core: include net/proxy VM default appmenus list in cloned template
|
2012-10-04 05:44:19 +02:00 |
|
Olivier Médoc
|
69354475bf
|
dom0/qvm-sync-clock: use timestamp in RFC2822 format to avoid locale issues
|
2012-10-04 05:44:19 +02:00 |
|
Bruce A Downs
|
d19a3cce99
|
vm: Added 'most recently used' feature to 'copy to vm' dialog
* replaced zenity to qvm-mru-entry in qubes_rpc/qvm-copy-to-vm.gnome
* added python script qubes_rpc/qvm-mru-entry
* added /usr/bin/qvm-mru-entry to rpm_spec/core-vm.spec
|
2012-10-04 05:44:19 +02:00 |
|
Bruce A Downs
|
dba7d94fba
|
vm/spec: mod to core-vm.spec to add test for files
core rpm was failing during uninstall attempting to move non-existent files
* /var/lib/qubes/fstab.orig
* /var/lib/qubes/serial.orig
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
7a485ab7f9
|
vm/file-editor: connect /dev/null as stdin (#657)
If stdin is closed (not connected to /dev/null) first opened file will get fd=0
and will be treated as stdin.
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
303d4ab042
|
dom0/iptables: block IPv6 traffic
Dom0 is network isolated anyway, but apply also firewall in case of use
qubes-dom0-network-via-netvm.
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
9c3f8417d4
|
vm/iptables: block IPv6 traffic
This isn't properly handled by Qubes VMs yet, so block it in all the VMs.
Also restrict access to firewall config.
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
56e0359cfb
|
vm/yum-proxy: one more regexp fix
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
551cc8b186
|
vm/yum-proxy: filter regexp: add missing ^$ marks, remove unneded .* at the beginning
Reported-by: Igor Bukanov <igor@mir2.org>
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
0cf7c03ea5
|
vm/systemd: early user-configurable init script
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
04e57db419
|
vm/yum-proxy: allow pkgtags repodata
|
2012-10-04 05:44:19 +02:00 |
|
Marek Marczykowski
|
397f2912f0
|
dom0/core: allow '_' in VM name
|
2012-10-04 05:44:18 +02:00 |
|
Marek Marczykowski
|
d172fa72f1
|
vm/qrexec: fix race between child cleanup and select call
reap_children() can close FD, which was already added to FD_SET for select.
This can lead to EBADF and agent termination.
|
2012-10-04 05:44:18 +02:00 |
|
Marek Marczykowski
|
9519d843d8
|
dom0/spec: mark qrexec policy as config files
Prevent override on upgrade, when user makes some own changes (especially
"always allow" feature).
|
2012-10-04 05:44:18 +02:00 |
|
Marek Marczykowski
|
92747285c7
|
dom0/qvm-block: rework device name parsing to better support c0p1 name style
|
2012-10-04 05:44:18 +02:00 |
|