Commit Graph

3446 Commits

Author SHA1 Message Date
Desobediente Civil
fa83298153 Modifying support cpio as proposed in #1672 2016-06-27 19:15:46 -03:00
Desobediente Civil
12bf920969 Quoting the destination as proposed in #1672 2016-06-27 19:10:00 -03:00
Marek Marczykowski-Górecki
9d781f77ce
tests: VM removal
Check if everything is cleaned up.
2016-06-25 01:53:39 +02:00
Marek Marczykowski-Górecki
13f832645a
qvm-remove: undefine libvirt domain even when not removing files
Fixes QubesOS/qubes-issues#2112
2016-06-25 00:21:47 +02:00
Marek Marczykowski-Górecki
748a3a90a2
core: fix handling disabling VM autostart on VM removal
QubesOS/qubes-issues#1930
2016-06-25 00:20:27 +02:00
Marek Marczykowski-Górecki
376dc43b90
version 3.2.4 2016-06-24 23:06:35 +02:00
Marek Marczykowski-Górecki
84677fa70b
qvm-ls: fix handling VM list on command line 2016-06-24 23:05:15 +02:00
Marek Marczykowski-Górecki
776393e97b
qvm-check: whitespace fixes 2016-06-24 22:43:26 +02:00
Marek Marczykowski-Górecki
44da6d7940
Merge remote-tracking branch 'qubesos/pr/32'
Fixes QubesOS/qubes-issues#2103

* qubesos/pr/32:
  Add VM state options
2016-06-24 22:40:18 +02:00
Marek Marczykowski-Górecki
9956e4c7b3
tests: handle vim opened in xterm without adjusted window title
On debian vim in xterm doesn't have "vim" in title, just standard
user@host.
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
a30f1d3902
tests: firefox sets "Navigator" as window class 2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
ba0a01afba
tests: fix closing xterm window
sh -s option in dash prevent shell to terminate after command from -c
ends. So remove this option.
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
3cb717dced
tests: add --sync to xdotool windowactivate
This may help getting less errors from xdotool...
2016-06-24 19:57:05 +02:00
Marek Marczykowski-Górecki
9bc60927c5
tests: replace sfdisk call with verbatim partition table
sfdisk options and input format differs between versions (dropped MB
units support), so instead of supporting all the combinations,
simply paste its result verbatim.
2016-06-24 19:57:04 +02:00
Marek Marczykowski-Górecki
38beb9412a
tests: wait for editor window to settle before sending any keystrokes 2016-06-24 19:57:04 +02:00
Marek Marczykowski-Górecki
4123b95866
tests: make sure dnsmasq isn't already running
On Debian when dnsmasq is installed, it is automatically started. Which
prevents starting a second instance.
2016-06-24 19:57:03 +02:00
Marek Marczykowski-Górecki
7eb881c6ba
tests: skip some tests not supported on Whonix 2016-06-24 19:57:03 +02:00
GammaSQ
3599249e2d
forgot if-statement in last commit 2016-06-24 19:57:02 +02:00
GammaSQ
3c7915808b
added --raw-data option 2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
504360ba9a
tests: fix clearing 'updates pending' flag test 2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
ae44869499
qvm-start: improve error message about missing qubes-windows-tools.iso
Fixes QubesOS/qubes-issues#1977
2016-06-24 19:57:02 +02:00
Marek Marczykowski-Górecki
34fc3f3399
tests: regression test for #1619 - drive path validation
QubesOS/qubes-issues#1619
2016-06-24 19:57:01 +02:00
ttasket
9dc488818d Add VM state options
New options: --running, --paused and --template
2016-06-24 06:09:06 -04:00
Marek Marczykowski-Górecki
5921dd2a1c
core: validate dom0 drive path before starting VM
This is very easy if the file/device is in dom0, so do it to avoid
cryptic startup error (`libvirtError: internal error: libxenlight failed
to create domain`).

Fixes QubesOS/qubes-issues#1619
2016-06-21 18:39:13 +02:00
Marek Marczykowski-Górecki
86b7849fd4
tests: update PVGrub2 test for fedora-23 template
dnf doesn't want to replace packages without --allowerasing (it is
needed to have correct kernel-devel package version). Additionally
really make sure the right version is installed and force u2mfn module
compilation.
2016-06-20 12:35:22 +02:00
Marek Marczykowski-Górecki
7f86782e14
version 3.2.3 2016-06-07 06:46:30 +02:00
Marek Marczykowski-Górecki
d0ba43f253
core: start guid as normal user even when VM started by root
Another attempt to avoid permissions-related problems...

QubesOS/qubes-issues#1768
2016-06-06 02:21:08 +02:00
Marek Marczykowski-Górecki
89d002a031
core: use runuser instead of sudo for switching root->user
There are problems with using sudo in early system startup
(systemd-logind not running yet, pam_systemd timeouts). Since we don't
need full session here, runuser is good enough (even better: faster).
2016-06-06 02:19:51 +02:00
Marek Marczykowski-Górecki
2265fd3d52
core: start qubesdb as normal user, even when VM is started by root
On VM start, old qubesdb-daemon is terminated (if still running). In
practice it happen only at VM startart (shutdown and quickly start
again). But in that case, if the VM was started by root, such operation
would fail.
So when VM is started by root, make sure that qubesdb-daemon will be
running as normal user (the first user in group 'qubes' - there should
be only one).

Fixes QubesOS/qubes-issues#1745
2016-06-06 02:19:28 +02:00
Marek Marczykowski-Górecki
a857ac3afb
Install dom0 qvm-* tools man pages by default 2016-06-04 16:57:13 +02:00
Marek Marczykowski-Górecki
88cb62fcf6
core: add pci_e820_host property
Enable e820_host option for VMs with PCI devices (to allow VM kernel to
deal with address space conflicts). But add a property to allow
disabling it.

Fixes QubesOS/qubes-issues#2019
2016-06-04 16:52:02 +02:00
Marek Marczykowski-Górecki
daf55710b8
travis: initial version
QubesOS/qubes-issues#1926
2016-06-02 11:29:38 +02:00
Marek Marczykowski-Górecki
a534b1dd2c
qvm-usb: remove scary warning about PV USB stability
USBIP (used for PV USB here) is considered stable by Linux maintainers,
so follow their judgement.

Fixes QubesOS/qubes-issues#531
2016-06-02 02:52:59 +02:00
Marek Marczykowski-Górecki
e87da9ec9d
tests: adjust dom0_update tests for dnf in VM
There is no support for 'copy_local' repository option, so setup test
repository over http.

Related to QubesOS/qubes-issues#1574
2016-06-02 02:51:18 +02:00
Marek Marczykowski-Górecki
767d1f0074
qvm-usb: implement usb_detach_all
QubesOS/qubes-issues#531
2016-06-02 02:49:22 +02:00
Marek Marczykowski-Górecki
d5e06bfb83
qvm-usb: issue detach call to backend domain
Make sure that even compromised frontend will be cut of (possibly
sensitive - like a webcam) device. On the other hand, if backend domain
is already compromised, it may already compromise frontend domain too,
so none of them would be better to call detach to.

QubesOS/qubes-issues#531
2016-06-02 02:45:26 +02:00
Marek Marczykowski-Górecki
52fb410deb
qvm-usb: always pass VM as object reference not a name
Make the API consistent.

QubesOS/qubes-issues#531
2016-06-02 02:44:38 +02:00
Marek Marczykowski-Górecki
d67636308f
qvm-usb: modify for USBIP-over-qrexec implementation
QubesOS/qubes-issues#531
2016-05-26 01:38:08 +02:00
Marek Marczykowski-Górecki
3afc7b7d50
core: start qrexec-daemon as normal user, even when VM is started by root
qrexec-daemon will start new processes for called services, which
include starting new DispVM, starting other required VMs (like backend
GPG VM). Having those processes as root leads to many permissions
problems, like the one linked below. So when VM is started by root, make
sure that qrexec-daemon will be running as normal user (the first user
in group 'qubes' - there should be only one).

QubesOS/qubes-issues#1768
2016-05-26 01:34:53 +02:00
Marek Marczykowski-Górecki
7c0f5a4be6
qubes-hcl-report: filename sanitization for old bash
Bash in dom0 (Fedora 20 based) doesn't properly handle "+(..)" operator.
So remove it for now.

Fixes QubesOS/qubes-issues#1994
2016-05-18 14:21:26 +02:00
Marek Marczykowski-Górecki
a8fcc58934
version 3.2.2 2016-05-18 03:00:41 +02:00
Marek Marczykowski-Górecki
6311eec6fd
tests: force reloading partition table after setting partitioned loop dev
Apparently "losetup -P" doesn't always properly read partition table.
Force reload using blockdev --rereadpt.
2016-05-18 02:03:48 +02:00
Marek Marczykowski-Górecki
405fd40aaa
Add policy for qubes.OpenURL service
For now the same as for qubes.OpenInVM.

Fixes QubesOS/qubes-issues#1487
2016-05-18 02:03:48 +02:00
Marek Marczykowski-Górecki
3abf2b24b4
tests: check opening URL
While at it, fix policy preparation for qvm-open-in-vm tests.

QubesOS/qubes-issues#1487
2016-05-18 02:03:31 +02:00
Marek Marczykowski-Górecki
692254fcbf
qubes-bug-report: remove trailing spaces
QubesOS/qubes-issues#901
2016-05-17 20:33:05 +02:00
Marek Marczykowski-Górecki
b1e368da43
Merge remote-tracking branch 'qubesos/pr/30'
* qubesos/pr/30:
  qubes-bug-report coding style 4 spaces instead of tabs and using += operator
  qubes-bug-report subprocess removed, refactored and fixed pacman command for archlinux packages
  Tool to create bug reports.

Fixes QubesOS/qubes-issues#901
2016-05-17 20:32:46 +02:00
Marek Marczykowski-Górecki
94d52a13e7
core: adjust guid parameters when running on KDE5
On KDE5 native decoration plugin is used and requires special properties
set (instead of `_QUBES_VMNAME` etc).
Special care needs to be taken when detecting environment, because
environment variables aren't good enough - this script may be running
with cleared environment (through sudo, or from systemd). So check
properties of X11 root window.

QubesOS/qubes-issues#1784
2016-05-17 20:22:13 +02:00
Jeepler
14efbb4a22 qubes-bug-report coding style 4 spaces instead of tabs and using += operator 2016-05-17 13:15:26 -05:00
Jeepler
ea7631208c qubes-bug-report subprocess removed, refactored and fixed pacman command for archlinux packages 2016-05-16 23:36:27 -05:00
Marek Marczykowski-Górecki
55af04293b
tests: block devices listing
QubesOS/qubes-issues#1600
2016-05-16 04:48:29 +02:00