core-admin/core
Marek Marczykowski-Górecki 075f35b873 core: do not assume that libvirt domain is always defined
Define it only when really needed:
 - during VM creation - to generate UUID
 - just before VM startup

As a consequence we must handle possible exception when accessing
vm.libvirt_domain. It would be a good idea to make this field private in
the future. It isn't possible for now because block_* are external for
QubesVm class.

This hopefully fixes race condition when Qubes Manager tries to access
libvirt_domain (using some QubesVm.*) at the same time as other tool is
removing the domain. Additionally if Qubes Manage would loose that race, it could
define the domain again leaving some unused libvirt domain (blocking
that domain name for future use).
2015-03-29 23:38:36 +02:00
..
storage Update libvirt config syntax for new version of driver domain patches 2015-03-21 21:12:48 +01:00
tests qubesutils.py: get_disk_usage 2014-04-24 21:50:12 +02:00
__init__.py Move all files one level up 2013-03-16 19:56:51 +01:00
.gitignore Move all files one level up 2013-03-16 19:56:51 +01:00
backup.py backup: fix deadlock on error while receiving backup from a VM 2015-02-18 21:41:22 +01:00
guihelpers.py Fixed PyQt4 import in guihelpers 2014-11-19 12:50:31 +01:00
Makefile makefile: Improve readability of settings.py install command 2014-11-19 12:50:26 +01:00
modules add convenient symlinks simulating target python files layout 2014-03-10 01:05:01 +01:00
notify.py core: fix imports 2014-11-19 12:50:32 +01:00
qubes.py core: prevent taking database lock twice 2015-02-22 01:25:51 +01:00
qubesutils.py core: do not assume that libvirt domain is always defined 2015-03-29 23:38:36 +02:00
settings-wni-Windows_NT.py settings-wni: get installation directory from windows registry 2014-11-19 12:50:31 +01:00
settings-xen-Linux.py core/xen: setup xen-specific defaults in separate settings file 2014-11-19 12:50:26 +01:00