Commit Graph

2002 Commits

Author SHA1 Message Date
Alexandre Bezroutchko
989bef9935 dom0/qvm-usb: first implementation of qvm-usb 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
361a087562 dom0+vm/qvm-usb: changed XS path naming scheme again 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
5103ba8250 dom0+vm/qvm-usb: adjust unittest to the new XS path naming scheme (unittests are broken now) 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
850353dcfc dom0+vm/qvm-usb: adjust usb_remove to the new XS naming scheme 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
4c4889ec1a dom0+vm/qvm-usb: changed the structure of XS pathes 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
f150d5697f dvp/qvm-usb: improved debugging output 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
7f3cb58020 dvp/qvm-usb: simple script to install pvusb hacks 2012-10-21 14:59:35 +02:00
Alexandre Bezroutchko
12dd0f6aa6 dvp/qvm-usb: Changes to unittests. 2012-10-21 14:59:34 +02:00
Alexandre Bezroutchko
c39b653079 dvp/qvm-usb: Added some debugging code. 2012-10-21 14:59:34 +02:00
Alexandre Bezroutchko
827b71acfa dvp/qvm-usb: changed order of diff arguments in all test scripts, for clearer output 2012-10-21 14:59:34 +02:00
abb
5b34058ebe dvp/qvm-usb: some naive unittests for block and pvusb passthrough 2012-10-21 14:59:34 +02:00
Alexandre Bezroutchko
314fda5694 dom0+vm/qvm-usb: cosmetic 2012-10-21 14:59:34 +02:00
Alexandre Bezroutchko
ce9e7aa967 dom0+vm/qvm-usb: autoload pvusb backend driver 2012-10-21 14:59:34 +02:00
Alexandre Bezroutchko
e1fc07613d dom0+vm/qvm-usb: First implementation of udev rules and supporting scripts. 2012-10-21 14:59:34 +02:00
Marek Marczykowski
a9fd8ec5dd Merge branch 'hvm-for-master'
Conflicts:
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-sync-clock
	version_dom0
	vm-systemd/qubes-sysinit.sh
2012-10-17 21:41:03 +02:00
Marek Marczykowski
1e6379ac56 Merge remote-tracking branch 'abb/qvm_block-bugfix' 2012-10-16 00:59:36 +02:00
Marek Marczykowski
e0780538f6 vm/systemd: force exit status 0 in qubes-sysinit
If /rw/config/rc.local-early does not exits, exit status is incorrectly 1.
2012-10-15 02:33:36 +02:00
Marek Marczykowski
7131bb7dcd vm/network: do not fail service on failed xenstore-read 2012-10-13 11:47:32 +02:00
Marek Marczykowski
7f87a29230 vm/appmenus: include subdirs with .desktop files 2012-10-06 22:18:00 +02:00
Marek Marczykowski
4daa5f56ea Merge branch 'master-for-hvm' into hvm
Conflicts:
	dom0/qvm-core/qubes.py
	dom0/qvm-tools/qvm-sync-clock
2012-10-04 05:45:41 +02:00
Marek Marczykowski
949222f692 vm/spec: fix adding yum-proxy configuration
Do not add entry if already present.
2012-10-04 05:44:20 +02:00
Bruce A Downs
e2caaf0764 vm: Added 'most recently used' feature to 'copy to vm' dialog
* replaced zenity to qvm-mru-entry in qubes_rpc/qvm-copy-to-vm.gnome
* added python script qubes_rpc/qvm-mru-entry
* added /usr/bin/qvm-mru-entry to rpm_spec/core-vm.spec
2012-10-04 05:44:19 +02:00
Bruce A Downs
c2a049ef32 vm/spec: mod to core-vm.spec to add test for files
core rpm was failing during uninstall attempting to move non-existent files
* /var/lib/qubes/fstab.orig
* /var/lib/qubes/serial.orig
2012-10-04 05:44:19 +02:00
Marek Marczykowski
004e5d9476 vm/file-editor: connect /dev/null as stdin (#657)
If stdin is closed (not connected to /dev/null) first opened file will get fd=0
and will be treated as stdin.
2012-10-04 05:44:19 +02:00
Marek Marczykowski
6345c4570a vm/iptables: block IPv6 traffic
This isn't properly handled by Qubes VMs yet, so block it in all the VMs.
Also restrict access to firewall config.
2012-10-04 05:44:19 +02:00
Marek Marczykowski
3839c15655 vm/yum-proxy: one more regexp fix 2012-10-04 05:44:19 +02:00
Marek Marczykowski
615a6c0098 vm/yum-proxy: filter regexp: add missing ^$ marks, remove unneded .* at the beginning
Reported-by: Igor Bukanov <igor@mir2.org>
2012-10-04 05:44:19 +02:00
Marek Marczykowski
8d69c40a37 vm/systemd: early user-configurable init script 2012-10-04 05:44:19 +02:00
Marek Marczykowski
45590a8190 vm/yum-proxy: allow pkgtags repodata 2012-10-04 05:44:19 +02:00
Marek Marczykowski
c898eae21c vm/spec: fix adding yum-proxy configuration
Do not add entry if already present.
2012-10-04 05:29:58 +02:00
Marek Marczykowski
da79d38e6f vm/spec: fix adding yum-proxy configuration
Do not add entry if already present.
2012-10-04 05:29:10 +02:00
Marek Marczykowski
90bce469ae Merge branch 'hvm' of git://gitpro.qubes-os.org/joanna/core into hvm 2012-10-04 05:14:42 +02:00
Bruce A Downs
4e84c642f9 vm: Added 'most recently used' feature to 'copy to vm' dialog
* replaced zenity to qvm-mru-entry in qubes_rpc/qvm-copy-to-vm.gnome
* added python script qubes_rpc/qvm-mru-entry
* added /usr/bin/qvm-mru-entry to rpm_spec/core-vm.spec
2012-09-28 00:57:08 +02:00
Bruce A Downs
55acc04c81 vm/spec: mod to core-vm.spec to add test for files
core rpm was failing during uninstall attempting to move non-existent files
* /var/lib/qubes/fstab.orig
* /var/lib/qubes/serial.orig
2012-09-28 00:57:08 +02:00
Joanna Rutkowska
a1b485f3be version 1.7.46 2012-09-27 11:03:26 +02:00
Marek Marczykowski
4837fb8f00 vm/file-editor: connect /dev/null as stdin (#657)
If stdin is closed (not connected to /dev/null) first opened file will get fd=0
and will be treated as stdin.
2012-09-27 02:06:26 +02:00
Marek Marczykowski
f33d2e4f42 vm/iptables: block IPv6 traffic
This isn't properly handled by Qubes VMs yet, so block it in all the VMs.
Also restrict access to firewall config.
2012-09-25 16:14:06 +02:00
Marek Marczykowski
6b50f834e5 vm/yum-proxy: one more regexp fix 2012-09-25 15:08:06 +02:00
Marek Marczykowski
299a233078 vm/yum-proxy: filter regexp: add missing ^$ marks, remove unneded .* at the beginning
Reported-by: Igor Bukanov <igor@mir2.org>
2012-09-25 13:37:59 +02:00
Marek Marczykowski
fccb6d31c6 vm/systemd: early user-configurable init script 2012-09-23 23:28:58 +02:00
Marek Marczykowski
2d67d70d44 vm/yum-proxy: allow pkgtags repodata 2012-09-19 12:55:45 +02:00
Joanna Rutkowska
d5750dc12d version 1.7.45 2012-08-29 10:48:23 +02:00
Marek Marczykowski
4fa5afb886 vm/filecopy: close stdin when no more data will be read
This will allow qrexec_agent drop the data instead of buffering it.
2012-08-27 00:48:35 +02:00
Marek Marczykowski
1ae20c65af vm/filecopy: add one missing write() error checking 2012-08-27 00:48:35 +02:00
Marek Marczykowski
13e973a591 vm+dom0/filecopy-unpacker: send errors to qfile-agent istead of local message (#239)
Because unpacker no longer require GUI access, there is no need for separate
process for error reporting. Which greatly simplify the code.
2012-08-25 02:09:45 +02:00
Marek Marczykowski
2903de54ae vm/filecopy-agent: check for unpacker errors during transfer (#239)
If unpacker encounter error it sends result header immediately - detect it as
soon as possible and do not send rest of file(s).
2012-08-25 01:26:19 +02:00
Marek Marczykowski
591a89c9d2 vm/filecopy: support nonblocking fd in read_all
This will be needed to (non blocking) check if data is available on pipe -
especially to receive possible error from the other end (which will be
introduced sometime later).
2012-08-25 01:22:00 +02:00
Marek Marczykowski
4ca3961684 vm/filecopy: close unused fds in parent process 2012-08-25 01:19:47 +02:00
Marek Marczykowski
bff7ee6f25 vm/qubes-rpc: move set_(non)?block to ioall.c as can be used not only in qrexec 2012-08-25 01:11:22 +02:00
Marek Marczykowski
373e778646 vm/filecopy: remove duplicated error reporting
Each write_all is check for errors (when it makes sense) with own perror call,
so don't dupplicate messages.
2012-08-25 01:06:25 +02:00