Commit Graph

74 Commits

Author SHA1 Message Date
Marek Marczykowski-Górecki
e3d0ee0643
qrexec: update protocol version negotiation for R4.1
QubesOS/qubes-issues#4909
2019-03-31 14:22:22 +02:00
Andrew David Wong
f66fbabc85
Document qubes.StartApp security advantages
Thanks to @marmarek and @jpouellet for providing these explanations:

https://groups.google.com/d/topic/qubes-devel/BsrjCN3Vg_g/discussion
2019-01-21 21:55:18 -06:00
Andrew David Wong
45e6e0b155
Merge branch 'devel-overhead-cfg' of https://github.com/woju/qubes-doc 2018-12-23 15:52:55 -06:00
Andrew David Wong
1549a41700
Change "DispVM" to "DisposableVM" (QubesOS/qubes-issues#2671)
This patch changes all non-code, non-command instances of "DispVM" to
"DisposableVM". It also fixes a variety of orthographic errors
pertaining to this term, e.g., by correcting "Disposable VM" to
"DisposableVM".
2018-12-08 21:20:41 -06:00
Marek Marczykowski-Górecki
793928e7b1
qrexec: clarify when pipes and when vchan is used, add note about loopback vchan
QubesOS/qubes-issues#4583
2018-12-08 22:37:44 +01:00
Wojtek Porczyk
8c82884d32
admin-api: document calls for feature checks
This is counterpart to QubesOS/qubes-core-admin#240.
2018-11-15 18:09:26 +01:00
Daniel Kahn Gillmor
90daecddd8 the update script is qubes-dom0-update, not qvm-dom0-update 2018-10-25 14:01:55 -04:00
Marek Marczykowski-Górecki
f539213936
admin-api: add revisions_to_keep and is_outdated to Volume properties 2018-03-18 21:46:54 +01:00
Nicolas Iooss
04d898ffad
Update incoming directory to QubesIncoming
Five years ago, commit a9bd7120c4 changed the target directory of qfile-unpacker from /home/user/incoming to /home/user/QubesIncoming. Update the documentation accordingly.
2018-03-14 08:16:04 +01:00
awokd
afadee9d0c
note it is R3.2 content 2018-02-15 12:31:22 +00:00
Marek Marczykowski-Górecki
919f2ed17e
Merge branch 'master' into spelling-grammar-fixes
Resolved conflicts in:
      basics_user/doc-guidelines.md
      basics_user/reporting-bugs.md
      common-tasks/backup-restore.md
      common-tasks/software-update-dom0.md
      common-tasks/software-update-vm.md
      common-tasks/usb.md
      configuration/disk-trim.md
      configuration/external-audio.md
      configuration/network-printer.md
      configuration/resize-disk-image.md
      configuration/resize-root-disk-image.md
      customization/fedora-minimal-template-customization.md
      managing-os/hvm.md
      managing-os/templates/archlinux.md
      privacy/whonix-install.md
      security/yubi-key.md
      troubleshooting/install-nvidia-driver.md
      troubleshooting/macbook-troubleshooting.md
2018-02-10 16:46:43 +01:00
Marek Marczykowski-Górecki
1fb4b57b23
qrexec: document new 'ask' action behaviour and 'default_target=' option 2017-12-13 03:08:37 +01:00
William Pierce
9408f8d2ee Consistently use the term "third-party" 2017-12-07 22:43:04 -06:00
Miguel Jacq
408aef3941
Fix conflicts introduced from new changes in master branch 2017-11-01 14:00:00 +11:00
Michael Carbone
4072678d54 fix typos / clarify language
thanks to the transifex localization community for reporting these!
2017-10-26 11:23:46 -04:00
Marek Marczykowski-Górecki
20648020aa
admin-api: add property.GetDefault
Add API call to get default property value, without resetting it. And
without duplicating the logic behind it on the client side.

As discussed here:
https://github.com/QubesOS/qubes-manager/pull/44
2017-10-20 01:13:06 +02:00
Marek Marczykowski-Górecki
9e48ca78cc
admin-api: add commands to update selected settings
Generally modifying storage volume/pool settings require removing and
creating the object again. This is not only API limitation, but most of
them really need the object to be recreated (for example storage pool
have most settings related to physical location of the data).
But some properties are safe to change. This applies to
`revisions_to_keep` (both storage pool and volume). Introduce
appropriate API methods for this. Put property name in API call name,
because argument is already used. And also because we don't plan to be
too flexible here - we may need to add one or two more mutable properties,
but definitely we don't want to allow any of them (as explained above).

The same applies to `persistent` option of device. There, in theory
detach+attach should be enough at all times, but in practice domain may
use the device (for example system being started from it -
QubesOS/qubes-issues#3055).
2017-09-02 00:59:26 +02:00
Marek Marczykowski-Górecki
9adb507979
admin-api: add admin.vm.CreateDisposable
A call to create new Disposable VM, with _generated_ name
(admin.vm.Create.DispVM require the caller to specify the name).
2017-08-06 20:51:41 +02:00
Marek Marczykowski-Górecki
f8474af28d
admin-api: add admin.vm.Stats method
QubesOS/qubes-issues#853
2017-07-27 22:31:23 +02:00
Marek Marczykowski-Górecki
58426f1476
admin-api: add admin.backup.Cancel call 2017-07-27 20:00:04 +02:00
Marek Marczykowski-Górecki
e80b929854
admin-api: minor update
- drop 'internal' volume property
- use persistent=True instead of persistent=yes, as in other bool
  properties
2017-07-27 19:59:19 +02:00
Marek Marczykowski-Górecki
c4f41c2021
admin-api: clarify that CloneFrom/CloneTo tokens are one time use 2017-07-04 02:51:41 +02:00
Marek Marczykowski-Górecki
3923a4c3f6
admin-api: document backup profile 2017-06-27 16:01:57 +02:00
Andrew David Wong
f23bca5bff
Remove old link 2017-06-26 22:12:55 -05:00
Andrew David Wong
c591cabd82
Merge mgmt-design into admin-api 2017-06-26 22:02:29 -05:00
Marek Marczykowski-Górecki
9cd7cee04f
admin-api: remove separate methods for firewall policy
QubesOS/qubes-issues#2869
2017-06-26 06:05:31 +02:00
Marek Marczykowski-Górecki
7756a5353a
Add Qubes 4.0 policy keywords 2017-06-25 13:02:48 +02:00
Marek Marczykowski-Górecki
caf8dfb91a
admin-api: fix default= definition in property.Get
The actual value used there is `True` or `False`
2017-06-25 01:31:38 +02:00
Marek Marczykowski-Górecki
b3b91c8baf
admin-api: clone operation with a token
This way complete operation require policy approval for both source and
destination volumes
2017-06-25 01:31:38 +02:00
Marek Marczykowski-Górecki
b160399f9b
admin-api: add volume.Clone
It is needed for VM clone operation: we have volume.Import, but not
volume.Export - at least not yet. And doing export+import would be very
inefficient, especially on smart storage pools (like LVM).
2017-06-19 00:16:24 +02:00
Marek Marczykowski-Górecki
3d6870656b
admin-api: remove clone operation
Can be achieved using other operations.
2017-06-19 00:08:07 +02:00
Wojtek Porczyk
a43d14339e admin-api: fix html ents 2017-06-14 11:26:07 +02:00
Wojtek Porczyk
feeeb6da8d admin-api: description of the tags 2017-06-14 11:22:52 +02:00
Miguel Jacq
15388d2d61
reinstate coding style variable line. Fix outlier command formatting in DisposableVM doc 2017-05-25 17:50:45 +10:00
Miguel Jacq
013aa5083c
underscores do not need to be backslash-escaped inside backticks 2017-05-25 17:16:38 +10:00
Miguel Jacq
d3855827f1
More typo/grammar/re-wording from @jpouellet's review 2017-05-25 16:43:11 +10:00
Marek Marczykowski-Górecki
ecbfeb2e73
admin-api update
1. Drop separate admin.vm.microphone.* calls - lets use
admin.vm.device.mic.* for this. Yes, this means microphone cannot
be attached to multiple VMs at the same time (which is regression vs
Qubes 3.2). But this is a good thing from security point of view.

2. Drop admin.backup.Restore - use standard Admin API methods
(admin.vm.Create, admin.vm.volume.Import etc)

Cc: @kalkin
2017-05-23 00:10:10 +02:00
Marek Marczykowski-Górecki
fa79d40d66
admin-api: fix misplaced comment about device assignment options 2017-05-15 14:25:05 +02:00
Miguel Jacq
c5f4957ee2
more minor typo/grammar fixes 2017-05-12 15:58:22 +10:00
Miguel Jacq
2f369c1309
more minor typo/grammar fixes 2017-05-12 10:12:02 +10:00
Marek Marczykowski-Górecki
eb484c383b
Rename Mgmt API to Admin API
QubesOS/qubes-issues#853
2017-05-11 22:39:53 +02:00
Miguel Jacq
db13ef5a33
Various minor spelling and grammar fixes 2017-05-11 18:48:59 +10:00
Marek Marczykowski-Górecki
c1cc28b3c4
mgmt: add two notes
As discussed here:
https://github.com/QubesOS/qubes-core-admin/pull/100#discussion_r115726151
https://github.com/QubesOS/qubes-core-admin/pull/100#discussion_r115725705
2017-05-10 15:16:21 +02:00
Marek Marczykowski-Górecki
fe3bcf2d89
Merge remote-tracking branch 'origin/pr/414' into https
* origin/pr/414:
  blogspot -> https://blog.invisiblethings.org/
2017-05-06 23:38:04 +02:00
Marek Marczykowski-Górecki
301fc9f312
Merge remote-tracking branch 'origin/pr/413' into https
* origin/pr/413:
  blogspot -> https://blog.invisiblethings.org/
2017-05-06 23:38:04 +02:00
InstantGratimification
49e4af2262 blogspot -> https://blog.invisiblethings.org/ 2017-05-03 15:26:39 +00:00
InstantGratimification
e0837e6180 blogspot -> https://blog.invisiblethings.org/ 2017-05-03 15:25:31 +00:00
InstantGratimification
03cbaa5b84 Update qmemman.md 2017-05-03 15:00:56 +00:00
Marek Marczykowski-Górecki
ea7c0b280c
mgmt1: clarify devices handling, add options support
- devices can be attached with some options (like 'ro=True' for block
  devices)
- clarify that backend domain and device ident is separated with '+'
  (':' is not allowed in qrexec call argument)
- clarify how to attach devices "persistently"
2017-05-01 02:55:44 +02:00
Marek Marczykowski-Górecki
141ed82589
mgmt1: rethink firewall Admin API
Handling each rule separately makes sense on from qvm-firewall tool
point of view, but not from overall configuration integrity. If multiple
tools try to configure firewall simultaneously, doing it at individual
rules level can end very badly.
So, get/set the whole firewall at once. If some race condition happen
here, it will end up with one firewall rules set being overwritten by
the other one. But it will still be a consistent rules set.
2017-05-01 02:55:44 +02:00