Commit Graph

292 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
c9d1f7c98d
version 3.2.0 2016-04-19 23:27:05 +02:00
Marek Marczykowski-Górecki
4694f5f52f
appmenus: force changing appicons when VM label is changed
Fixes QubesOS/qubes-issues#1606
2016-04-19 23:11:10 +02:00
M. Vefa Bicakci
fdc00ad678
dracut: Omit network and kernel-network-modules 2016-04-10 00:00:00 -04:00
Marek Marczykowski-Górecki
0607d9021a
qrexec: add support for service argument
Fixes QubesOS/qubes-issues#1876
2016-03-27 04:31:11 +02:00
Marek Marczykowski-Górecki
ad28f4df62
qrexec: deny spaces in service domain name
Fixes QubesOS/qubes-issues#1877
2016-03-27 04:23:47 +02:00
Galland
3acfb8e4b3 Add colon (:) to trusted characters (for "Code::Blocks" appmenu)
After installing "codeblocks" app in TemplateVM it doesn't appear in Qubes VM Manager's available app shortcuts.
If I run in a Dom0 Terminal: /usr/libexec/qubes-appmenus/qubes-receive-appmenus fedora-23
I get this: "Warning: ignoring key 'Name' of codeblocks.desktop"
The "Name" key in that file has value "Code::Blocks"

The problem comes from line 168, because of the colons in the app Name.

By adding the colon ":" to the std_re used to match valid characters for "Name", the app is correctly parsed and I can add the shortcut to AppVMs
2016-03-16 22:38:38 +01:00
Marek Marczykowski-Górecki
e0c875a367
pm-utils: call qubes.SuspendPreAll/qubes.SuspendPostAll services
Host suspend notification may be useful not only to driver domains. For
example Whonix needs to resync time after suspend.

Thanks @adrelanos for help.

Fixes QubesOS/qubes-issues#1663
2016-03-15 23:13:48 +01:00
Marek Marczykowski-Górecki
6c7443223b
dom0-update: remove cached metadata when --clean is used
Fixes QubesOS/qubes-issues#1748
2016-03-11 15:10:28 +01:00
Marek Marczykowski-Górecki
c87d6c5cb7
version 3.1.9 2016-03-07 03:55:51 +01:00
Marek Marczykowski-Górecki
b19ba4dc2d
pm-utils: do not leave background tasks - will be killed by systemd
qvm-sync-clock running in background is killed as soon as
qubes-suspend.service is terminated.
Additionally restore --verbose option, which was the case (implicitly)
in previous qvm-run based code.

Fixes QubesOS/qubes-issues#1795
2016-02-29 13:31:25 +01:00
Marek Marczykowski-Górecki
01833c698c
version 3.1.8 2016-02-23 16:22:49 +01:00
Marek Marczykowski-Górecki
199d12636b
Merge remote-tracking branch 'qubesos/pr/5'
* qubesos/pr/5:
  Use #!/bin/bash and && in qvm-move-to-vm
  qvm-copy-to-vm: Fix running with multiple file arguments
  qvm-move-to-vm: Remove duplicated code
2016-02-23 03:53:27 +01:00
Marek Marczykowski-Górecki
ee3950a3aa
pm-utils: use qvm-sync-clock --force instead of manual qvm-run
After suspend VMs clocks are desynchronized in most cases (because VMs
were paused). Since directly after suspent there may be no network
access, normal `qvm-sync-clock` call isn't good (it aborts if NTP call
fails). But with new `qvm-sync-clock --force` switch, it sync VMs even
if NTP is unreachable.

QubesOS/qubes-issues#1728
2016-02-22 22:24:04 +01:00
Marek Marczykowski-Górecki
f8d8368b10
qrexec: add timeout for data vchan connection
When qrexec-agent crashes for any reason (for example
QubesOS/qubes-issues#1389), it will never connect back and qrexec-client
will wait forever. In worst case it may happen while holding qubes.xml
write lock (in case of DispVM startup) effectively locking the whole
system.

Fixes QubesOS/qubes-issues#1636
2016-02-22 22:24:04 +01:00
Rusty Bird
6e4d39c7b3
Use #!/bin/bash and && in qvm-move-to-vm
#!/bin/bash because qvm-move-to-vm sources qvm-copy-to-vm, which has
a bashism (-o pipefail).

&& is safer in case qvm-*copy*-to-vm is ever changed to call 'set +e'.
2016-02-16 08:33:54 +00:00
Rusty Bird
c177ae2c7a
qvm-copy-to-vm: Fix running with multiple file arguments 2016-02-13 15:21:39 +00:00
Rusty Bird
bc29af7c0c
qvm-move-to-vm: Remove duplicated code 2016-02-13 15:21:38 +00:00
Marek Marczykowski-Górecki
466acad6fb
version 3.1.7 2016-02-08 05:03:18 +01:00
Marek Marczykowski-Górecki
8c0643092b
Use qubes.SetDateTime instead of direct call in post-suspend time sync
Fixes QubesOS/qubes-issues#1728
2016-02-08 04:49:14 +01:00
Marek Marczykowski-Górecki
2198986d5c
dom0-update: do not output scary messagge about missing repomd.xml
... when no updates are available.

Fixes QubesOS/qubes-issues#1685
2016-02-03 16:46:58 +01:00
Marek Marczykowski-Górecki
fc2e8264d4
Merge remote-tracking branch 'qubesos/pr/4'
* qubesos/pr/4:
  Add qvm-appmenu-replace tool.
2016-01-17 04:34:10 +01:00
Marek Marczykowski-Górecki
74afb8a7cc
version 3.1.6 2015-12-31 02:58:00 +01:00
Marek Marczykowski-Górecki
fa8ebeb42d Fix typo in "d9d48e8 qrexec: use tray notification when..."
Fixes QubesOS/qubes-issues#1446

Thanks HW42 for the report.
2015-12-28 00:59:45 +01:00
Marek Marczykowski-Górecki
ae0cad589e
version 3.1.5 2015-12-26 15:29:27 +01:00
Marek Marczykowski-Górecki
d9d48e8948
qrexec: use tray notification when VM needs to be started
For both successful start and the failed one

Fixes QubesOS/qubes-issues#1446
2015-12-26 02:09:06 +01:00
Marek Marczykowski-Górecki
f66be6c943
dracut: include all USB controllers drivers
dracut in Fedora 20 doesn't know about *-pci modules (which were split
of *-hcd). So add them manually, in all flavors (ehci, ohci, xhci).

Fixes QubesOS/qubes-issues#1517
2015-12-24 03:26:36 +01:00
Marek Marczykowski-Górecki
6921400a7a
dom0-updates: remove "updates pending" flag also when no actual updates were found
This allows to clear the flag when for some reason it wasn't cleared
immediately after installing updates.

Fixes QubesOS/qubes-issues#1511
2015-12-13 02:11:56 +01:00
Marek Marczykowski-Górecki
cb6a52a652
dom0-updates: wait for apper to finish, then remove "updates pending" flag
Unfortunate side effect (to be solved at Qubes Manager side): it will
block Qubes Manager until all updates are installed (not only updater
launched).

Fixes QubesOS/qubes-issues#1511
2015-12-13 02:08:05 +01:00
Marek Marczykowski-Górecki
4a556dcab1
dom0-updates: ensure proper permissions on "updates pending" flag
QubesOS/qubes-issues#1511
2015-12-13 02:07:01 +01:00
Marek Marczykowski-Górecki
d9a2a66073
dom0-updates: remove unused code from cron job 2015-12-13 02:06:36 +01:00
Marek Marczykowski-Górecki
55f67d602e
version 3.1.4 2015-12-06 14:37:56 +01:00
Matt McCutchen
ff02e0da90 Add qvm-appmenu-replace tool.
This can be used to replace the Terminal shortcut
(QubesOS/qubes-issues#1428).
2015-12-05 12:25:29 -05:00
Marek Marczykowski-Górecki
1430861c6b
kernel-install: (EFI) really install kernel image
Not only add it to the configuration.

Fixes QubesOS/qubes-issues#1492
2015-12-05 15:18:08 +01:00
Marek Marczykowski-Górecki
8a9d3de1ef
kernel-install: fix EFI dir path in xen.cfg generation script
Fixes QubesOS/qubes-issues#1492
2015-12-05 15:05:34 +01:00
Marek Marczykowski-Górecki
8efde55755
version 3.1.3 2015-11-27 23:16:35 +01:00
Bahtiar `kalkin-` Gadimov
7f55410a02 Fix test basic/TC_01_Properties/test_000_rename 2015-11-22 22:31:22 +01:00
Bahtiar `kalkin-` Gadimov
6590931fcd Make appmenu paths properties and not config attrs
This fixes a circular dependencies where get_attrs_config() in QubesVm is
executed, before the self.storage is initialised. See also
https://github.com/QubesOS/qubes-core-admin/pull/6#discussion-diff-45008401
2015-11-22 12:31:16 +01:00
Bahtiar `kalkin-` Gadimov
4d94309087 Remove unused imports from qubes-core-appmenus 2015-11-17 21:28:26 +01:00
Marek Marczykowski-Górecki
4d3a7ad5c6
appmenus: remove entries from AppVMs menus when removed from template
Fixes QubesOS/qubes-issues#1411
2015-11-13 02:48:15 +01:00
Marek Marczykowski-Górecki
f10442cc78
version 3.1.2 2015-11-11 06:31:33 +01:00
Marek Marczykowski-Górecki
8f52c83f0b
Require new enough qubes-utils package for updated libqrexec-utils (again)
It is required for additional file-copy functions, moved from
core-agent-linux (qfile-agent).

QubesOS/qubes-issues#1324
2015-11-11 05:12:42 +01:00
Marek Marczykowski-Górecki
4e498c90e6
Implement qvm-copy-to-vm and qvm-move-to-vm utilities
QubesOS/qubes-issues#1324
2015-11-11 05:09:21 +01:00
Marek Marczykowski-Górecki
520e250966
Require new enough qubes-utils package for updated libqrexec-utils
Required by 0c288aa "qrexec: implement buffered write to child stdin to
prevent deadlock"
2015-10-30 15:10:18 +01:00
Marek Marczykowski-Górecki
0c288aa355
qrexec: implement buffered write to child stdin to prevent deadlock
Otherwise if the child process isn't reading its stdin at that time, it
would deadlock the whole qrexec connection (for example preventing
reading the data from the child, which may be a cause of that deadlock).

QubesOS/qubes-issues#1347
2015-10-30 14:16:53 +01:00
Marek Marczykowski-Górecki
4a7c2e2d42
version 3.1.1 2015-10-11 02:57:47 +02:00
Marek Marczykowski-Górecki
c8ce468c7f
qrexec: fallback to kdialog if zenity is not installed
Fixes QubesOS/qubes-issues#1277
2015-10-11 01:55:46 +02:00
Marek Marczykowski-Górecki
63e74a01d3
qrexec: fix handling autostarting RPC target VM
Do not reimplement manual VM state checking in qrexec-policy.
`qubes.xml` is loaded anyway, so just use QubesVM object to check if
domain is running.

Fixes QubesOS/qubes-issues#1283
2015-10-11 01:52:40 +02:00
Marek Marczykowski-Górecki
63dffb48c5
version 3.1.0 2015-09-29 16:48:32 +02:00
Marek Marczykowski-Górecki
867baa7266
kernel-install: add new kernel to xen.cfg for xen.efi
QubesOS/qubes-issues#794
2015-09-26 03:56:16 +02:00
Marek Marczykowski-Górecki
0e733bd0de
kernel-install: call grub2-mkconfig only when it is installed
On systems booting with EFI, there is no grub2 installed at all - the
system is started directly to xen.efi.
2015-09-26 02:54:32 +02:00