core-admin/qubes/vm
Marek Marczykowski-Górecki 1759bca00f
Rename vm.qdb to vm.untrusted_qdb
QubesDB can be freely modified by a VM, so one should take care when
reading any data retrieved from it.

Fixes QubesOS/qubes-issues#2934
2017-07-24 13:01:55 +02:00
..
mix Rename vm.qdb to vm.untrusted_qdb 2017-07-24 13:01:55 +02:00
__init__.py devices: make attach/detach related events async 2017-07-04 13:04:23 +02:00
adminvm.py Rename vm.qdb to vm.untrusted_qdb 2017-07-24 13:01:55 +02:00
appvm.py storage: do not use deepcopy on volume configs 2017-07-12 21:33:14 +02:00
dispvm.py Merge branch 'dispvm-fix' 2017-07-14 01:13:20 +02:00
qubesvm.py Rename vm.qdb to vm.untrusted_qdb 2017-07-24 13:01:55 +02:00
standalonevm.py storage: drop 'internal' and 'removable' volume properties 2017-07-04 14:25:08 +02:00
templatevm.py vm: drop old is_outdated/commit_changes 2017-07-04 14:25:10 +02:00