Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Generate qubes-guid options based on features #144

Merged
merged 2 commits into from
Jul 15, 2020

Conversation

pwmarcz
Copy link
Contributor

@pwmarcz pwmarcz commented Jun 25, 2020

Allow configuring options per VM or globally per GuiVM. The
qvm-start-daemon program reads the options from VM features, and
generates a configuration file for qubes-guid.

Requires QubesOS/qubes-gui-daemon#47 (customizing the configuration
file).

@pwmarcz pwmarcz force-pushed the guid-conf branch 3 times, most recently from 228fe85 to 17bd6e3 Compare June 27, 2020 10:43
Copy link
Member

@marmarek marmarek left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The temporary config should be also removed when not needed anymore. Add a domain-stopped event handler for that?

@@ -262,14 +365,32 @@ def common_guid_args(self, vm):
if vm.features.check_with_template('rpc-clipboard', False):
guid_cmd.extend(['-Q'])

guivm = self.app.domains[self.app.local_name]
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should be rather vm.guivm. In practice it is the same value (gui-daemon is started only if vm.guivm is local), but it will be clearer this way.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.

pwmarcz added 2 commits June 29, 2020 12:01
Allow configuring options per VM or globally per GuiVM. The
qvm-start-daemon program reads the options from VM features, and
generates a configuration file for qubes-guid.

Requires QubesOS/qubes-gui-daemon#47 (customizing the configuration
file).
@pwmarcz
Copy link
Contributor Author

pwmarcz commented Jun 29, 2020

The temporary config should be also removed when not needed anymore. Add a domain-stopped event handler for that?

Done.

@qubesos-bot
Copy link

qubesos-bot commented Jul 13, 2020

OpenQA test summary

Complete test suite and dependencies: https://openqa.qubes-os.org/tests/10655#dependencies

Failed tests

New failures

Compared to: https://openqa.qubes-os.org/tests/9500#dependencies

Fixed failures

Compared to: https://openqa.qubes-os.org/tests/9500#dependencies

@marmarek marmarek merged commit 470514d into QubesOS:master Jul 15, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants