b6c4f8456f
Ask qubesd for admin.vm.Console call. This allows to intercept it with admin-permission event. While at it, extract tty path extraction to python, where libvirt domain object is already available. Fixes QubesOS/qubes-issues#5030 |
||
---|---|---|
.. | ||
integ | ||
tools | ||
vm | ||
__init__.py | ||
api_admin.py | ||
api_internal.py | ||
api_misc.py | ||
api.py | ||
app.py | ||
devices_block.py | ||
devices.py | ||
events.py | ||
ext.py | ||
extra.py | ||
firewall.py | ||
init.py | ||
run.py | ||
storage_file.py | ||
storage_kernels.py | ||
storage_lvm.py | ||
storage_reflink.py | ||
storage.py | ||
tarwriter.py |