Commit Graph

820 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
5a4bfb3ab0
Merge remote-tracking branch 'origin/pr/4'
* origin/pr/4:
  Qubes VM Manager drop down menu strings consistency fixes
2015-10-08 03:43:48 +02:00
Marek Marczykowski-Górecki
d412229a74
Merge remote-tracking branch 'origin/pr/3'
* origin/pr/3:
  don't call verify_files() before start()

It is called by vm.start() internally.
2015-10-08 03:38:25 +02:00
Patrick Schleizer
6fbf1ff3c7 Qubes VM Manager drop down menu strings consistency fixes
Currently:
* Create AppVM
* Remove AppVM
* Clone VM
* Start/Resume VM
* [...] VM

The first two are inconsistent. @bnvk and I agreed, that those should be changed AppVM -> VM for consistency.

And I add, if anything, it would have to be "Create TemplateBased-VM". Because currently, if you click "Create AppVM", you are asked in the next wizard if you wanted to create an AppVM, NetVM or ProxyVM. So the term AppVM is overloaded.

This commit fixes this.
2015-10-04 12:43:48 +00:00
qubesuser
16cb2e301b don't call verify_files() before start() 2015-10-02 13:11:13 +02:00
Marek Marczykowski-Górecki
b001f26ee1
Create custom 'About' dialog, with 'release notes' viewer (#1259)
Fixes QubesOS/qubes-issues#1259
2015-10-01 22:34:49 +02:00
Marek Marczykowski-Górecki
51817dda32
version 3.0.9 2015-09-27 02:13:25 +02:00
Marek Marczykowski-Górecki
dfd355fe71
Give the user chance to read final meesages after installing updates (#982)
xterm closes itself immediatelly when the specified command ends, so
wait for user reaction to give a chance to read the message (potentially
some error info). Also add some more meaningful window title.

QubesOS/qubes-issues#982
2015-09-27 00:21:48 +02:00
Marek Marczykowski-Górecki
3ba1a990df
Call yum/apt in xterm to update template (#982)
Since GUI updaters are broken, workaround this by starting terminal
update in xterm. Not an ideal option, but the proper solution seems to
be much more complicated:
https://phabricator.whonix.org/T373
QubesOS/qubes-issues#1197
QubesOS/qubes-issues#982
2015-09-24 01:27:32 +02:00
Marek Marczykowski-Górecki
15e7992898 version 3.0.8 2015-09-03 03:24:22 +02:00
Marek Marczykowski-Górecki
9f6b82b195 rpm: update required qubes-core-dom0 version
It is needed for qubesos/qubes-issues#892 implementation.
2015-09-03 03:24:09 +02:00
Marek Marczykowski-Górecki
96bec5470e
version 3.0.7 2015-08-05 02:04:48 +02:00
Marek Marczykowski-Górecki
1d02420f86
global settings: VMs 'updates check' status now can be also retrieved
qubesos/qubes-issues#892
2015-08-05 01:24:52 +02:00
Marek Marczykowski-Górecki
d2a4dd810b
Remove unused imports 2015-07-23 07:34:30 +02:00
Marek Marczykowski-Górecki
0724e37e3c
Use DBUS instead of pid file to prevent multiple simultaneous instances
The pid file solution was racy. Since we register DBUS name anyway, we
can use it for this purpose.
2015-07-23 07:32:55 +02:00
Marek Marczykowski-Górecki
0516ec779f version 3.0.6 2015-06-02 11:23:26 +02:00
Marek Marczykowski-Górecki
e2fa049032 Fix block devices menu update (NameError) 2015-05-28 02:00:23 +02:00
Michal Rostecki
43bc59bfa6 Checking whether the "default NetVM" exists
The "default NetVM" is usually the first created ProxyVM which is
set by qubes-core during its creation. [1] If there is no ProxyVM,
there is no "default NetVM". Therefore, creating an AppVM and
launching its settings dialog raised AttributeError, because
get_default_netvm method returned None.

This can be reproduced by installing QubesOS without creating VMs
by installer.

[1] https://github.com/QubesOS/qubes-core-admin/blob/master/core/qubes.py#L355

Fixes qubesos/qubes-issues#1008
2015-05-24 11:23:57 +02:00
Marek Marczykowski-Górecki
5f9b01d09c version 3.0.5 2015-05-15 03:24:35 +02:00
Marek Marczykowski-Górecki
b82a88c4a8 Fix VM clone name prompt dialog (#989)
Fixes qubesos/qubes-issues#989
2015-05-13 04:09:10 +02:00
Marek Marczykowski-Górecki
c5cc11c04c version 3.0.4 2015-05-04 02:15:48 +02:00
Marek Marczykowski-Górecki
14c7a9250c Fix logic about VM "running" state
Qubes manager used different logic what it considers as "running VM",
than qubes core.
Here it was "running or starting/stopping", while qubes core uses the
same as libvirt (isActive()), which effectively means "not halted" -
which includes also "paused" and "suspended". This creates a lot
confusion in which action should be available when.

The actual detected bug was about resuming paused VM. There was assert
"not vm.is_running()", while the paused VM _is_ running in terms of
qubes core.

Fixes qubesos/qubes-issues#981
2015-05-04 01:29:20 +02:00
Marek Marczykowski-Górecki
f6941bd3d3 Use separate QubesVmCollection instance when running a task in background (#986)
QubesVmCollection is not thread safe. If for example update_table() will
be called during some long-running task (like creating or removing VM),
it will try to reload qubes.xml (so get read lock first), but the thread
already holds a lock on this file. This would result in "Lock already
taken" exception.

Fixes qubesos/qubes-issues#986
2015-05-04 01:25:55 +02:00
Marek Marczykowski-Górecki
fdf0fd1870 gitignore 2015-05-04 00:45:11 +02:00
Marek Marczykowski-Górecki
351225a4b3 Fix resuming VMs (#981)
Fixes qubesos/qubes-issues#981
2015-05-03 20:28:45 +02:00
Marek Marczykowski-Górecki
1faa0ac37e mainwindow: code style (part 3), no functional change
Organize imports.
2015-05-03 19:03:26 +02:00
Marek Marczykowski-Górecki
4a136507e9 mainwindow: code style (part 2), no functional change
Rename variables to match PEP8, use is/is not None instead of ==/!=,
initialize instance variables in __init__, fix methods overloads.
2015-05-03 19:03:26 +02:00
Marek Marczykowski-Górecki
a4a022e2c0 mainwindow: code style (part 1), no functional change
Wrap long lines, whitespace fixes
2015-05-03 19:03:25 +02:00
Noah Vesely
7395797182 Added SMTPS and ODMR
Added SMTPS and On-Demand Mail Relay (used by Fetchmail, xODMR). Both of these are in the Fedora 20 /etc/services.
2015-04-25 13:26:42 -04:00
Marek Marczykowski-Górecki
99d2dae9ce version 3.0.3 2015-04-15 20:15:20 +02:00
Marek Marczykowski-Górecki
8a91c90cf8 Fix block attach/detach 2015-04-14 23:11:12 +02:00
Marek Marczykowski-Górecki
9a22de3432 version 3.0.2 2015-04-07 14:59:53 +02:00
Marek Marczykowski-Górecki
dd93b1237f settings: add "dispvm_netvm" property in advanced tab 2015-04-06 00:59:15 +02:00
Marek Marczykowski-Górecki
4e5f63be24 settings: mark template as read-only when the VM is running 2015-04-05 21:53:09 +02:00
Marek Marczykowski-Górecki
8cd3cace49 version 3.0.1 2015-04-02 01:02:07 +02:00
Marek Marczykowski-Górecki
6b7b07acb8 backup: allow backup templates, even when installed by rpm 2015-03-31 05:44:37 +02:00
Marek Marczykowski-Górecki
5e925b23d4 backup+restore: remove an option to attach disk from a VM to dom0
This is (intentionally) not possible in R3. The user can choose to
backup directly to the VM, encrypting the backup in dom0 first.
2015-03-31 05:40:53 +02:00
Marek Marczykowski-Górecki
f65dcdbf10 Watch for domain start/stop events and refresh VM connection info
QubesVm object caches some domain state (domain ID in libvirt object,
Qubes DB connection socket), which can become out of date in
case of start/stop events. Currently it needs manual trigger to refresh
itself.
2015-03-30 04:59:08 +02:00
Marek Marczykowski-Górecki
10ec6014b0 Update to follow core-admin change: rename write_iptables_xenstore_entry 2015-03-28 22:59:13 +01:00
Marek Marczykowski-Górecki
80b3afdab4 Revert "Add 'Requested MEM' column (aka prefmem) (#788)"
This reverts commit 227597cf93.

QubesWatch no longer supports xenstore, so there is no simple way to
get this column updated. This is conscious decision in process of making
R3 Xen-independent.

Conflicts:
        qubesmanager/main.py
2015-03-28 22:57:03 +01:00
Marek Marczykowski-Górecki
4875016c81 version 3.0.0 2015-03-27 01:19:18 +01:00
Wojtek Porczyk
be94c87f61 table: sort dom0 first no matter sort order
It seems that when sort is reversed, dom0 gets sorted last. This is expected
and hard to counter. Will remain for now.
2015-03-10 21:05:48 +01:00
Matt McCutchen
aefe0dde43 Show an icon for VMs whose TemplateVM is running.
https://groups.google.com/d/topic/qubes-users/woHD9RaHvF8/discussion
2015-02-09 21:15:54 +01:00
Marek Marczykowski-Górecki
0d9bb27229 Update CPU measurement call for the new API 2015-02-09 05:05:03 +01:00
Marek Marczykowski-Górecki
6329c6e07e Disable meminfo watch - not implemented in R3 2015-02-06 08:26:53 +01:00
Marek Marczykowski-Górecki
3c555c9b53 block: update the code for new block API 2014-12-12 05:13:57 +01:00
Marek Marczykowski-Górecki
f5b77f5d44 version 2.0.38 2014-11-18 17:31:16 +01:00
Marek Marczykowski-Górecki
97620f76a7 settings: hide "add all" widget from devices tab
It is very dangerous - adding all the devices to some VM will make the
system unusable once such VM is started.
2014-11-01 19:57:17 +01:00
Marek Marczykowski-Górecki
c8a8a56c73 settings: prevent changing VM name and label while the VM is running
Those changes will take effect after VM restart (at least for VM windows
borders), so to not confuse the user with partly updated colors, simply
block the change while the VM is running. The same applies to VM name.
2014-10-28 04:55:14 +01:00
Marek Marczykowski-Górecki
5a4c1f2382 version 2.0.37 2014-10-25 01:53:11 +02:00
Victor Lopez
473b822e0c Linux VM specific: force minimum init mem to allow scaling up memory
Check init_mem and max_mem_size in a single function (merging the
previous two) taking into account the minimum init memory that allows
the requested maximum memory.

Explanation:
Linux kernel needs space for memory-related structures created at boot.
If init_mem is just 400MB, then max_mem can't balloon above 4.3GB (at
which poing it yields "add_memory() failed: -17" messages and apps
crash), regardless of the max_mem_size value.

Base of Marek's findings and my tests on a 16GB PC, using several
processes like:
   stress -m 1 --vm-bytes 1g --vm-hang 100

result in the following points:
init_mem  ==> actual max memory
400             4300
700             7554
800             8635
1024            11051
1200            12954
1300            14038
1500            14045 <== probably capped on my 16GB system

The actual ratio of max_mem_size/init_mem is surprisingly constant at
10.79

If less init memory is set than that ratio allows, then the set
max_mem_size is unreachable and the VM becomes unstable (app crashes)

Based on qubes-devel discussion titled "Qubes Dom0 init memory against
Xen best practices?" at:
https://groups.google.com/d/msg/qubes-devel/VRqkFj1IOtA/UgMgnwfxVSIJ
2014-10-06 04:00:20 +02:00