Commit Graph

1636 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
6b7b07acb8 backup: allow backup templates, even when installed by rpm 2015-03-31 05:44:37 +02:00
Marek Marczykowski-Górecki
5e925b23d4 backup+restore: remove an option to attach disk from a VM to dom0
This is (intentionally) not possible in R3. The user can choose to
backup directly to the VM, encrypting the backup in dom0 first.
2015-03-31 05:40:53 +02:00
Marek Marczykowski-Górecki
f65dcdbf10 Watch for domain start/stop events and refresh VM connection info
QubesVm object caches some domain state (domain ID in libvirt object,
Qubes DB connection socket), which can become out of date in
case of start/stop events. Currently it needs manual trigger to refresh
itself.
2015-03-30 04:59:08 +02:00
Marek Marczykowski-Górecki
10ec6014b0 Update to follow core-admin change: rename write_iptables_xenstore_entry 2015-03-28 22:59:13 +01:00
Marek Marczykowski-Górecki
80b3afdab4 Revert "Add 'Requested MEM' column (aka prefmem) (#788)"
This reverts commit 227597cf93.

QubesWatch no longer supports xenstore, so there is no simple way to
get this column updated. This is conscious decision in process of making
R3 Xen-independent.

Conflicts:
        qubesmanager/main.py
2015-03-28 22:57:03 +01:00
Marek Marczykowski-Górecki
4875016c81 version 3.0.0 2015-03-27 01:19:18 +01:00
Wojtek Porczyk
be94c87f61 table: sort dom0 first no matter sort order
It seems that when sort is reversed, dom0 gets sorted last. This is expected
and hard to counter. Will remain for now.
2015-03-10 21:05:48 +01:00
Matt McCutchen
aefe0dde43 Show an icon for VMs whose TemplateVM is running.
https://groups.google.com/d/topic/qubes-users/woHD9RaHvF8/discussion
2015-02-09 21:15:54 +01:00
Marek Marczykowski-Górecki
0d9bb27229 Update CPU measurement call for the new API 2015-02-09 05:05:03 +01:00
Marek Marczykowski-Górecki
6329c6e07e Disable meminfo watch - not implemented in R3 2015-02-06 08:26:53 +01:00
Marek Marczykowski-Górecki
3c555c9b53 block: update the code for new block API 2014-12-12 05:13:57 +01:00
Marek Marczykowski-Górecki
f5b77f5d44 version 2.0.38 2014-11-18 17:31:16 +01:00
Marek Marczykowski-Górecki
97620f76a7 settings: hide "add all" widget from devices tab
It is very dangerous - adding all the devices to some VM will make the
system unusable once such VM is started.
2014-11-01 19:57:17 +01:00
Marek Marczykowski-Górecki
c8a8a56c73 settings: prevent changing VM name and label while the VM is running
Those changes will take effect after VM restart (at least for VM windows
borders), so to not confuse the user with partly updated colors, simply
block the change while the VM is running. The same applies to VM name.
2014-10-28 04:55:14 +01:00
Marek Marczykowski-Górecki
5a4c1f2382 version 2.0.37 2014-10-25 01:53:11 +02:00
Victor Lopez
473b822e0c Linux VM specific: force minimum init mem to allow scaling up memory
Check init_mem and max_mem_size in a single function (merging the
previous two) taking into account the minimum init memory that allows
the requested maximum memory.

Explanation:
Linux kernel needs space for memory-related structures created at boot.
If init_mem is just 400MB, then max_mem can't balloon above 4.3GB (at
which poing it yields "add_memory() failed: -17" messages and apps
crash), regardless of the max_mem_size value.

Base of Marek's findings and my tests on a 16GB PC, using several
processes like:
   stress -m 1 --vm-bytes 1g --vm-hang 100

result in the following points:
init_mem  ==> actual max memory
400             4300
700             7554
800             8635
1024            11051
1200            12954
1300            14038
1500            14045 <== probably capped on my 16GB system

The actual ratio of max_mem_size/init_mem is surprisingly constant at
10.79

If less init memory is set than that ratio allows, then the set
max_mem_size is unreachable and the VM becomes unstable (app crashes)

Based on qubes-devel discussion titled "Qubes Dom0 init memory against
Xen best practices?" at:
https://groups.google.com/d/msg/qubes-devel/VRqkFj1IOtA/UgMgnwfxVSIJ
2014-10-06 04:00:20 +02:00
Marek Marczykowski-Górecki
cec7bc3255 settings: properly escape '&' 2014-09-26 15:03:39 +02:00
Marek Marczykowski-Górecki
470e1c0879 backups/restore: always allow an option to manually unmount storage device 2014-09-26 15:01:37 +02:00
Marek Marczykowski-Górecki
c137de721b version 2.0.36 2014-09-18 08:36:43 +02:00
Marek Marczykowski-Górecki
1ff9ce8a46 backups/restore: add support for 'verify-only' option 2014-09-17 23:07:32 +02:00
Marek Marczykowski-Górecki
c2ae785c5d backups/restore: fix handling of unicode messages, improve indentation 2014-09-17 23:06:41 +02:00
Marek Marczykowski-Górecki
821ae2d193 version 2.0.35 2014-09-09 22:20:15 +02:00
Marek Marczykowski-Górecki
1cadc1e943 Merge remote-tracking branch 'woju/master' 2014-09-09 22:01:54 +02:00
Marek Marczykowski-Górecki
c992fc0f48 settings: fix drive path setting (#897) 2014-09-09 21:59:54 +02:00
Wojciech Zygmunt Porczyk
24759d2762 settings.py: do not attempt to remove service when none selected
Thanks to Andrew B (kyboren at gmail dot com) for bug report.
2014-09-04 21:59:05 +02:00
Joanna Rutkowska
9dda1e32cd version 2.0.34 2014-07-12 14:05:53 +02:00
Joanna Rutkowska
1efc97d743 Require qubes-core-dom0-linux >= 2.0.22, qubes-core-dom0 >= 2.1.57 2014-07-12 14:05:39 +02:00
Joanna Rutkowska
3377a45733 Merge branch 'master' of http://git.woju.eu/qubes/qubes-manager 2014-07-12 14:02:56 +02:00
Wojciech Zygmunt Porczyk
fdaaa780a4 use new padlocks from theme 2014-07-10 16:50:29 +02:00
Joanna Rutkowska
271bdd7f97 version 2.0.33 2014-07-09 22:10:38 +02:00
Wojciech Zygmunt Porczyk
060b16900a use new icon from qubes-artwork 2014-07-09 18:21:56 +02:00
Marek Marczykowski-Górecki
159eea7ac8 block: fix attaching r/o devices (cdrom for example) 2014-07-08 02:06:35 +02:00
Joanna Rutkowska
5b10d958a6 version 2.0.32 2014-07-06 13:45:14 +02:00
Marek Marczykowski-Górecki
61ef08eb47 settings: cast all QString to str
QString does not have "startswith" method.
2014-07-05 14:57:47 +02:00
Marek Marczykowski-Górecki
8d2590af00 version 2.0.31 2014-06-18 00:42:22 +02:00
Marek Marczykowski-Górecki
edb40bbfb6 Notify about dom0 updates (#824)
Tray notifications from cron job (outside of session) didn't worked well.
2014-06-10 01:15:26 +02:00
Marek Marczykowski-Górecki
ca6cc8e01f create-vm: Handle the case when no HVM-template exists 2014-06-07 04:40:24 +02:00
Marek Marczykowski-Górecki
aca43a46da Filter out 'dom0' from selectable netvm list
This is workaround until #757 will be done.
2014-06-07 04:07:26 +02:00
Andrew B
ba0cced495 Implemented NetVM selection via drop-down in AppVM creation dialog. 2014-06-07 04:02:45 +02:00
Wojciech Zygmunt Porczyk
e9f1bb3880 *.py: Use full paths when calling subprocess.Popen().
Also removed unneeded imports of subprocess.
2014-05-22 15:07:35 +02:00
Wojciech Zygmunt Porczyk
fe954632c0 regexp fixes and validation (#829) 2014-05-19 15:41:37 +02:00
Wojciech Zygmunt Porczyk
e834b33d42 Merge remote-tracking branch 'marmarek/master' 2014-05-19 13:54:02 +02:00
Marek Marczykowski-Górecki
d263245a0b version 2.0.30 2014-05-17 21:48:41 +02:00
Marek Marczykowski-Górecki
2508365455 whitespace fix 2014-05-17 21:43:51 +02:00
Hansi
44fe1cc845 small update to add "autostart" checkbox to the basic settings dialog 2014-05-17 21:43:29 +02:00
Wojciech Zygmunt Porczyk
f882042994 settings.py: launch lspci by full path (/usr/sbin/lspci) 2014-05-16 19:16:16 +02:00
Wojciech Zygmunt Porczyk
511767c662 qubes-manager.desktop: display QM in toplevel menu in Xfce 2014-05-16 17:54:55 +02:00
Marek Marczykowski-Górecki
2221dcee36 Do not crash when no notification service present 2014-05-15 23:49:02 +02:00
Marek Marczykowski-Górecki
c2038ec20b backups: open file selection dialog at the end for unmounting the disk (#831) 2014-05-15 03:06:51 +02:00
Marek Marczykowski-Górecki
f096f0050a updates: call 'yum clean expire-cache' as root (#843)
In Fedora 20 sudo cannot be called from qrexec call (no tty available),
so run it in separate call as root.
Also add "-P" option to qubes-update-check call: for SysV systems it
should be ignored and service started as normal user (which is just
fine), but on systemd systems, the call would be redirected to
systemctl, which refuse normal user service actions. "-P" flag acquires
root privileges using PolicyKit.
2014-05-12 15:34:24 +02:00