868dbeac3e
Sanitization of input value is tricky here, and also very important at the same time. If property define value type (and it's something more specific than 'str'), use that. Otherwise allow only printable ASCII characters, and let appropriate event and setter handle value. At this point I've reviewed all QubesVM properties in this category and added appropriate setters where needed. QubesOS/qubes-issues#2622 |
||
---|---|---|
ci | ||
contrib | ||
core | ||
core-modules | ||
dispvm | ||
doc | ||
etc | ||
linux | ||
qubes | ||
qubes-rpc | ||
qubes-rpc-policy | ||
qvm-tools | ||
relaxng | ||
rpm_spec | ||
templates | ||
test-packages | ||
tests | ||
.coveragerc | ||
.gitignore | ||
.pylintrc | ||
.travis.yml | ||
installer.wxs | ||
LICENSE | ||
Makefile | ||
Makefile.builder | ||
README.md | ||
run-tests | ||
setup.cfg | ||
setup.py | ||
version |
Qubes core, version 3
This is development branch of the Qubes OS core. This branch is subject to rebase without warning until further notice.
API documentation is available: https://qubes-core-admin.readthedocs.org/en/latest/.