Merge branch 'master-for-hvm' into hvm
Conflicts: dom0/qvm-core/qubes.py dom0/qvm-tools/qvm-sync-clock
This commit is contained in:
commit
4daa5f56ea
@ -1,6 +1,6 @@
|
|||||||
.*/repodata/[A-Za-z0-9-]*\(primary\|filelists\|comps\(-[a-z0-9]*\)\?\|other\|prestodelta\|updateinfo\)\.\(sqlite\|xml\)\(\.bz2\|\.gz\)\?$
|
/repodata/[A-Za-z0-9-]*\(primary\|filelists\|comps\(-[a-z0-9]*\)\?\|other\|prestodelta\|updateinfo\|pkgtags\)\.\(sqlite\|xml\)\(\.bz2\|\.gz\)\?$
|
||||||
.*/repodata/repomd\.xml$
|
/repodata/repomd\.xml$
|
||||||
.*\.rpm$
|
\.rpm$
|
||||||
.*\.drpm$
|
\.drpm$
|
||||||
mirrors.fedoraproject.org:443
|
^mirrors\.fedoraproject\.org:443$
|
||||||
^http://mirrors\..*/mirrorlist
|
^http://mirrors\..*/mirrorlist\?
|
||||||
|
8
network/ip6tables
Normal file
8
network/ip6tables
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
# Generated by ip6tables-save v1.4.14 on Tue Sep 25 16:00:20 2012
|
||||||
|
*filter
|
||||||
|
:INPUT DROP [1:72]
|
||||||
|
:FORWARD DROP [0:0]
|
||||||
|
:OUTPUT ACCEPT [0:0]
|
||||||
|
-A INPUT -i lo -j ACCEPT
|
||||||
|
COMMIT
|
||||||
|
# Completed on Tue Sep 25 16:00:20 2012
|
@ -20,7 +20,7 @@
|
|||||||
#
|
#
|
||||||
#
|
#
|
||||||
|
|
||||||
VM=$(zenity --entry --title="File Copy" --text="Enter the destination domain name:")
|
VM=$(qvm-mru-entry --title="File Copy" --text="Enter the destination domain name:" --mrufile "qvm-mru-filecopy")
|
||||||
if [ X$VM = X ] ; then exit 0 ; fi
|
if [ X$VM = X ] ; then exit 0 ; fi
|
||||||
|
|
||||||
SIZE=$(du --apparent-size -c "$@" | tail -1 | cut -f 1)
|
SIZE=$(du --apparent-size -c "$@" | tail -1 | cut -f 1)
|
||||||
|
165
qubes_rpc/qvm-mru-entry
Executable file
165
qubes_rpc/qvm-mru-entry
Executable file
@ -0,0 +1,165 @@
|
|||||||
|
#!/usr/bin/python
|
||||||
|
#
|
||||||
|
# The Qubes OS Project, http://www.qubes-os.org
|
||||||
|
#
|
||||||
|
# Copyright (C) 2012 Bruce Downs <bruceadowns@gmail.com>
|
||||||
|
#
|
||||||
|
# This program is free software; you can redistribute it and/or
|
||||||
|
# modify it under the terms of the GNU General Public License
|
||||||
|
# as published by the Free Software Foundation; either version 2
|
||||||
|
# of the License, or (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program; if not, write to the Free Software
|
||||||
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
#
|
||||||
|
import os
|
||||||
|
from optparse import OptionParser
|
||||||
|
import gtk
|
||||||
|
|
||||||
|
class QubesMruDialog(gtk.Dialog):
|
||||||
|
entry = None
|
||||||
|
mrufile = None
|
||||||
|
|
||||||
|
def __init__(self, title, text, mrufile):
|
||||||
|
self.mrufile = mrufile
|
||||||
|
|
||||||
|
gtk.Dialog.__init__(
|
||||||
|
self,
|
||||||
|
title,
|
||||||
|
None,
|
||||||
|
0,
|
||||||
|
(gtk.STOCK_CANCEL, gtk.RESPONSE_CANCEL,
|
||||||
|
gtk.STOCK_OK, gtk.RESPONSE_OK))
|
||||||
|
|
||||||
|
# setting the default response to 'ok'
|
||||||
|
# does not work as advertised
|
||||||
|
# using key-press-event instead
|
||||||
|
#self.set_default_response(gtk.RESPONSE_OK)
|
||||||
|
|
||||||
|
self.connect("destroy", lambda *w: gtk.main_quit())
|
||||||
|
self.connect("response", self.response_callback)
|
||||||
|
self.connect("key-press-event", self.key_press_callback)
|
||||||
|
|
||||||
|
self.set_position(gtk.WIN_POS_CENTER)
|
||||||
|
self.set_resizable(True)
|
||||||
|
|
||||||
|
vbox = gtk.VBox(True, 5)
|
||||||
|
self.vbox.pack_start(vbox, True, True, 0)
|
||||||
|
vbox.set_border_width(5)
|
||||||
|
|
||||||
|
label = gtk.Label()
|
||||||
|
label.set_markup(text)
|
||||||
|
vbox.pack_start(label, False, False, 0)
|
||||||
|
|
||||||
|
# Create our entry
|
||||||
|
self.entry = gtk.Entry()
|
||||||
|
vbox.pack_start(self.entry, False, False, 0)
|
||||||
|
|
||||||
|
# Create the completion object
|
||||||
|
completion = gtk.EntryCompletion()
|
||||||
|
|
||||||
|
# Assign the completion to the entry
|
||||||
|
self.entry.set_completion(completion)
|
||||||
|
|
||||||
|
# Create a tree model and use it as the completion model
|
||||||
|
completion_model, firstline = self.create_completion_model()
|
||||||
|
completion.set_model(completion_model)
|
||||||
|
|
||||||
|
# Use model column 0 as the text column
|
||||||
|
completion.set_text_column(0)
|
||||||
|
|
||||||
|
if firstline:
|
||||||
|
self.entry.set_text(firstline)
|
||||||
|
|
||||||
|
self.show_all()
|
||||||
|
|
||||||
|
def create_completion_model(self):
|
||||||
|
store = gtk.ListStore(str)
|
||||||
|
firstline = None
|
||||||
|
|
||||||
|
if self.mrufile and os.access(self.mrufile, os.R_OK):
|
||||||
|
# read lines from mru file
|
||||||
|
lines = [line.strip() for line in open(self.mrufile)]
|
||||||
|
for line in lines:
|
||||||
|
if not firstline:
|
||||||
|
firstline = line
|
||||||
|
|
||||||
|
iter = store.append()
|
||||||
|
store.set(iter, 0, line)
|
||||||
|
|
||||||
|
return store, firstline
|
||||||
|
|
||||||
|
def handle_ok(self):
|
||||||
|
my_entry = self.entry.get_text()
|
||||||
|
|
||||||
|
if len(my_entry) > 0:
|
||||||
|
linesorg = []
|
||||||
|
linesorg.insert(0, my_entry)
|
||||||
|
|
||||||
|
# calc mru lines
|
||||||
|
if os.access(self.mrufile, os.R_OK):
|
||||||
|
# read lines from existing mru file
|
||||||
|
fMru = open(self.mrufile, "r")
|
||||||
|
linesorg += [line.strip() for line in fMru]
|
||||||
|
fMru.close()
|
||||||
|
|
||||||
|
#uniqify
|
||||||
|
linesuniq = []
|
||||||
|
for lineuniq in linesorg:
|
||||||
|
if (len(lineuniq) > 0 and lineuniq not in linesuniq):
|
||||||
|
linesuniq.append(lineuniq)
|
||||||
|
|
||||||
|
# write to mru
|
||||||
|
# up to 50 unique
|
||||||
|
fMru = file(self.mrufile, "w")
|
||||||
|
fMru.writelines( "%s\n" % line for line in linesuniq[:50] )
|
||||||
|
fMru.close()
|
||||||
|
|
||||||
|
# print entry to stdout
|
||||||
|
print my_entry
|
||||||
|
|
||||||
|
def response_callback(self, button, response_id):
|
||||||
|
if response_id == gtk.RESPONSE_OK:
|
||||||
|
self.handle_ok()
|
||||||
|
self.destroy()
|
||||||
|
|
||||||
|
def key_press_callback(self, button, event):
|
||||||
|
if event.keyval == gtk.keysyms.Return:
|
||||||
|
self.handle_ok()
|
||||||
|
self.destroy()
|
||||||
|
|
||||||
|
def main():
|
||||||
|
usage = "usage: %prog [--title 'Qubes Title'] [--text 'Qubes Text'] [--mrufile 'mru file name']"
|
||||||
|
parser = OptionParser (usage)
|
||||||
|
parser.add_option ("-l", "--title",
|
||||||
|
action="store",
|
||||||
|
dest="title",
|
||||||
|
default="Qubes MRU Dialog Entry",
|
||||||
|
help="Set the dialog title [%default]")
|
||||||
|
parser.add_option ("-x", "--text",
|
||||||
|
action="store",
|
||||||
|
dest="text",
|
||||||
|
default="Enter Qubes text:",
|
||||||
|
help="Set the dialog text [%default]")
|
||||||
|
parser.add_option ("-f", "--mrufile",
|
||||||
|
action="store",
|
||||||
|
dest="mrufile",
|
||||||
|
default='qvm-mru',
|
||||||
|
help="MRU file name [%default]")
|
||||||
|
(options, args) = parser.parse_args ()
|
||||||
|
|
||||||
|
mrudir = os.path.expanduser('~') + os.sep + '.config'
|
||||||
|
if not os.path.exists(mrudir):
|
||||||
|
os.makedirs(mrudir)
|
||||||
|
QubesMruDialog(options.title, options.text, mrudir + os.sep + options.mrufile)
|
||||||
|
gtk.main()
|
||||||
|
|
||||||
|
main()
|
||||||
|
|
@ -57,7 +57,7 @@ main()
|
|||||||
{
|
{
|
||||||
struct stat stat_pre, stat_post, session_stat;
|
struct stat stat_pre, stat_post, session_stat;
|
||||||
char *filename = get_filename();
|
char *filename = get_filename();
|
||||||
int child, status, log_fd;
|
int child, status, log_fd, null_fd;
|
||||||
char var[1024], val[4096];
|
char var[1024], val[4096];
|
||||||
FILE *env_file;
|
FILE *env_file;
|
||||||
FILE *waiter_pidfile;
|
FILE *waiter_pidfile;
|
||||||
@ -100,7 +100,9 @@ main()
|
|||||||
perror("fork");
|
perror("fork");
|
||||||
exit(1);
|
exit(1);
|
||||||
case 0:
|
case 0:
|
||||||
close(0);
|
null_fd = open("/dev/null", O_RDONLY);
|
||||||
|
dup2(null_fd, 0);
|
||||||
|
close(null_fd);
|
||||||
|
|
||||||
env_file = fopen("/tmp/qubes-session-env", "r");
|
env_file = fopen("/tmp/qubes-session-env", "r");
|
||||||
while(fscanf(env_file, "%1024[^=]=%4096[^\n]\n", var, val) == 2) {
|
while(fscanf(env_file, "%1024[^=]=%4096[^\n]\n", var, val) == 2) {
|
||||||
|
@ -139,7 +139,8 @@ ln -s /usr/lib/qubes/qubes_setup_dnat_to_ns $RPM_BUILD_ROOT/etc/dhclient.d/qubes
|
|||||||
install -d $RPM_BUILD_ROOT/etc/NetworkManager/dispatcher.d/
|
install -d $RPM_BUILD_ROOT/etc/NetworkManager/dispatcher.d/
|
||||||
install network/{qubes_nmhook,30-qubes_external_ip} $RPM_BUILD_ROOT/etc/NetworkManager/dispatcher.d/
|
install network/{qubes_nmhook,30-qubes_external_ip} $RPM_BUILD_ROOT/etc/NetworkManager/dispatcher.d/
|
||||||
install -D network/vif-route-qubes $RPM_BUILD_ROOT/etc/xen/scripts/vif-route-qubes
|
install -D network/vif-route-qubes $RPM_BUILD_ROOT/etc/xen/scripts/vif-route-qubes
|
||||||
install -m 0644 -D network/iptables $RPM_BUILD_ROOT/etc/sysconfig/iptables
|
install -m 0400 -D network/iptables $RPM_BUILD_ROOT/etc/sysconfig/iptables
|
||||||
|
install -m 0400 -D network/ip6tables $RPM_BUILD_ROOT/etc/sysconfig/ip6tables
|
||||||
install -m 0644 -D network/tinyproxy-qubes-yum.conf $RPM_BUILD_ROOT/etc/tinyproxy/tinyproxy-qubes-yum.conf
|
install -m 0644 -D network/tinyproxy-qubes-yum.conf $RPM_BUILD_ROOT/etc/tinyproxy/tinyproxy-qubes-yum.conf
|
||||||
install -m 0644 -D network/filter-qubes-yum $RPM_BUILD_ROOT/etc/tinyproxy/filter-qubes-yum
|
install -m 0644 -D network/filter-qubes-yum $RPM_BUILD_ROOT/etc/tinyproxy/filter-qubes-yum
|
||||||
|
|
||||||
@ -152,7 +153,7 @@ install network/qubes_netwatcher $RPM_BUILD_ROOT/usr/sbin/
|
|||||||
|
|
||||||
install -d $RPM_BUILD_ROOT/usr/bin
|
install -d $RPM_BUILD_ROOT/usr/bin
|
||||||
|
|
||||||
install qubes_rpc/{qvm-open-in-dvm,qvm-open-in-vm,qvm-copy-to-vm,qvm-run} $RPM_BUILD_ROOT/usr/bin
|
install qubes_rpc/{qvm-open-in-dvm,qvm-open-in-vm,qvm-copy-to-vm,qvm-run,qvm-mru-entry} $RPM_BUILD_ROOT/usr/bin
|
||||||
install qubes_rpc/wrap_in_html_if_url.sh $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/wrap_in_html_if_url.sh $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install qubes_rpc/qvm-copy-to-vm.kde $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/qvm-copy-to-vm.kde $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
install qubes_rpc/qvm-copy-to-vm.gnome $RPM_BUILD_ROOT/usr/lib/qubes
|
install qubes_rpc/qvm-copy-to-vm.gnome $RPM_BUILD_ROOT/usr/lib/qubes
|
||||||
@ -327,9 +328,13 @@ mkdir -p /rw
|
|||||||
%preun
|
%preun
|
||||||
if [ "$1" = 0 ] ; then
|
if [ "$1" = 0 ] ; then
|
||||||
# no more packages left
|
# no more packages left
|
||||||
|
if [ -e /var/lib/qubes/fstab.orig ] ; then
|
||||||
mv /var/lib/qubes/fstab.orig /etc/fstab
|
mv /var/lib/qubes/fstab.orig /etc/fstab
|
||||||
|
fi
|
||||||
mv /var/lib/qubes/removed-udev-scripts/* /etc/udev/rules.d/
|
mv /var/lib/qubes/removed-udev-scripts/* /etc/udev/rules.d/
|
||||||
|
if [ -e /var/lib/qubes/serial.orig ] ; then
|
||||||
mv /var/lib/qubes/serial.orig /etc/init/serial.conf
|
mv /var/lib/qubes/serial.orig /etc/init/serial.conf
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
%postun
|
%postun
|
||||||
@ -371,6 +376,7 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
/etc/qubes_rpc/qubes.SuspendPost
|
/etc/qubes_rpc/qubes.SuspendPost
|
||||||
/etc/sudoers.d/qubes
|
/etc/sudoers.d/qubes
|
||||||
/etc/sysconfig/iptables
|
/etc/sysconfig/iptables
|
||||||
|
/etc/sysconfig/ip6tables
|
||||||
/etc/sysconfig/modules/qubes_core.modules
|
/etc/sysconfig/modules/qubes_core.modules
|
||||||
/etc/tinyproxy/filter-qubes-yum
|
/etc/tinyproxy/filter-qubes-yum
|
||||||
/etc/tinyproxy/tinyproxy-qubes-yum.conf
|
/etc/tinyproxy/tinyproxy-qubes-yum.conf
|
||||||
@ -387,6 +393,7 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
/usr/bin/qvm-open-in-dvm
|
/usr/bin/qvm-open-in-dvm
|
||||||
/usr/bin/qvm-open-in-vm
|
/usr/bin/qvm-open-in-vm
|
||||||
/usr/bin/qvm-run
|
/usr/bin/qvm-run
|
||||||
|
/usr/bin/qvm-mru-entry
|
||||||
/usr/bin/xenstore-watch-qubes
|
/usr/bin/xenstore-watch-qubes
|
||||||
%dir /usr/lib/qubes
|
%dir /usr/lib/qubes
|
||||||
/usr/lib/qubes/block_add_change
|
/usr/lib/qubes/block_add_change
|
||||||
@ -489,6 +496,7 @@ chkconfig rsyslog on
|
|||||||
chkconfig haldaemon on
|
chkconfig haldaemon on
|
||||||
chkconfig messagebus on
|
chkconfig messagebus on
|
||||||
chkconfig iptables on
|
chkconfig iptables on
|
||||||
|
chkconfig ip6tables on
|
||||||
chkconfig --add qubes_core || echo "WARNING: Cannot add service qubes_core!"
|
chkconfig --add qubes_core || echo "WARNING: Cannot add service qubes_core!"
|
||||||
chkconfig qubes_core on || echo "WARNING: Cannot enable service qubes_core!"
|
chkconfig qubes_core on || echo "WARNING: Cannot enable service qubes_core!"
|
||||||
chkconfig --add qubes_core_netvm || echo "WARNING: Cannot add service qubes_core_netvm!"
|
chkconfig --add qubes_core_netvm || echo "WARNING: Cannot add service qubes_core_netvm!"
|
||||||
@ -610,6 +618,7 @@ rm -f /etc/systemd/system/getty.target.wants/getty@tty*.service
|
|||||||
|
|
||||||
# Enable some services
|
# Enable some services
|
||||||
/bin/systemctl enable iptables.service 2> /dev/null
|
/bin/systemctl enable iptables.service 2> /dev/null
|
||||||
|
/bin/systemctl enable ip6tables.service 2> /dev/null
|
||||||
/bin/systemctl enable rsyslog.service 2> /dev/null
|
/bin/systemctl enable rsyslog.service 2> /dev/null
|
||||||
/bin/systemctl enable ntpd.service 2> /dev/null
|
/bin/systemctl enable ntpd.service 2> /dev/null
|
||||||
# Disable original service to enable overriden one
|
# Disable original service to enable overriden one
|
||||||
|
@ -21,6 +21,7 @@ if [ -e /dev/xvdb ] ; then
|
|||||||
|
|
||||||
mkdir -p /rw/config
|
mkdir -p /rw/config
|
||||||
touch /rw/config/rc.local
|
touch /rw/config/rc.local
|
||||||
|
touch /rw/config/rc.local-early
|
||||||
|
|
||||||
mkdir -p /rw/home
|
mkdir -p /rw/home
|
||||||
cp -a /home.orig/user /home
|
cp -a /home.orig/user /home
|
||||||
|
@ -69,3 +69,6 @@ debug_mode=`$XS_READ qubes-debug-mode 2> /dev/null`
|
|||||||
if [ -n "$debug_mode" -a "$debug_mode" -gt 0 ]; then
|
if [ -n "$debug_mode" -a "$debug_mode" -gt 0 ]; then
|
||||||
echo "GUI_OPTS=-vv" >> /var/run/qubes-service-environment
|
echo "GUI_OPTS=-vv" >> /var/run/qubes-service-environment
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
[ -x /rw/config/rc.local-early ] && /rw/config/rc.local-early
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user