Re: [libvirt] how to change the boot order of a qemu-kvm guest os

2009-08-27 Thread Gopalakrishnan Subramanian
Thanks . What exactly is the option about storage pools in virt-manager for the local host qemu. is this by any chance a method to create common storage which i may use for a clustered File System . I hope I am not asking the wrong set of questions with respect to the context of this mailing li

[libvirt] perl bindings Sys Virt compilation problems

2009-08-27 Thread Daniel de Araujo
Hi, I'm trying to compile the libvirt perl bindings (Sys-Virt-0.2.1) on x86_64 RHEL 5.3 and I'm running into the following issue: /usr/bin/perl "-Iblib/arch" "-Iblib/lib" perl-Sys-Virt.spec.PLperl-Sys-Virt.spec Can't load 'blib/arch/auto/Sys/Virt/Virt.so' for module

[libvirt] Schedule for next release 0.7.1

2009-08-27 Thread Daniel Veillard
Hello, following a bit too much backlog on libxml2 for the last years and an happy familly event, I have been a bit sidetracked in the last weeks and will be in the near future. I know there is a tons of pending patches, updates for drives and cleanups waiting for a release. I will try to make

Re: [libvirt] [PATCH] virsh vol-key segfault fix

2009-08-27 Thread Daniel P. Berrange
On Mon, Aug 24, 2009 at 01:43:56PM +0200, Pritesh Kothari wrote: > Hi, > > There is a bug in virsh command vol-key, it segfaults cause the fourth option > to vshCommandOptVolBy() is null instead of "pool" on virsh.c:5209. > > The patch to fix this is attached. > Thanks, will apply this shortly

Re: [libvirt] how to change the boot order of a qemu-kvm guest os

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 27, 2009 at 10:24:18PM +0530, Gopalakrishnan Subramanian wrote: >Hi > I am using libvirt and virt-manager to manage and run 2 Fedora 10 >guest operating systems for the sake of installing a Oracle RAC >environment . As part of the process after using the both gues fo

Re: [libvirt] [PATCH 20/20] Add support for qcow encrypted volumes to qemu.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:18PM +0200, Miloslav Trma?? wrote: > Changes since the third submission: > - Add "flags" parameter to virSecretDefineXML(), virSecretGetXMLDesc(), > virSecretGetValue(), virSecretSetValue(), and all derived interfaces. > --- > src/qemu_driver.c | 161 > +++

Re: [libvirt] [PATCH 19/20] Consolidate "cont" into qemudMonitorSendCont()

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:17PM +0200, Miloslav Trma?? wrote: > The interface allows qemudMonitorSendCont() to report errors that are > not overridden by its callers. > > Also fix a potential infinite loop in qemuDomainCoreDump() if sending > cont repeatedly fails. > --- > src/qemu_driver.c |

[libvirt] how to change the boot order of a qemu-kvm guest os

2009-08-27 Thread Gopalakrishnan Subramanian
Hi I am using libvirt and virt-manager to manage and run 2 Fedora 10 guest operating systems for the sake of installing a Oracle RAC environment . As part of the process after using the both gues for some work i felt the nedd to add an additional virtual scsi disk to one of the hosts. Tr

Re: [libvirt] [PATCH 18/20] Make handling of monitor prompts more general.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:16PM +0200, Miloslav Trma?? wrote: > Support arbitrary callbacks for "secondary prompts". Reimplement > qemudMonitorCommandExtra using such a callback. > --- > src/qemu_driver.c | 84 +--- > 1 files changed, 72 insert

Re: [libvirt] [PATCH 17/20] Don't assume buffered output echoes the command.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:15PM +0200, Miloslav Trma?? wrote: > The if ((nlptr...)) implicitly assumes commptr != NULL (and that "buf" > starts with "cmd"). Make the assumption explicit, it will be broken in > a future patch. > --- > src/qemu_driver.c |7 --- > 1 files changed, 4 inser

Re: [libvirt] [PATCH 16/20] Attach encryption information to virDomainDiskDef.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:14PM +0200, Miloslav Trma?? wrote: > The XML allows , this implementation > canonicalizes the internal representation so that "disk->encryption" is > non-NULL iff encryption information is available. > > A domain with partial encryption information can be defined, > c

Re: [libvirt] [PATCH 15/20] Provide missing passphrase when creating a volume.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:13PM +0200, Miloslav Trma?? wrote: > If the element does not specify a secret > during volume creation, generate a suitable secret and add it to the > tag. The caller can view the updated tag > using virStorageVolGetXMLDesc(). > > Similarly, when is specified whi

Re: [libvirt] [PATCH 14/20] Add support for encrypted (qcow) volume creation.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:12PM +0200, Miloslav Trma?? wrote: > Supports only virStorageVolCreateXML, not virStorageVolCreateXMLFrom. > > Curiously, qemu-img does not need the passphrase for anything to create > an encrypted volume. This implementation thus does not need to touch > any secrets

Re: [libvirt] [PATCH 13/20] Recognize encryption format of qcow volumes.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:11PM +0200, Miloslav Trma?? wrote: > (The implementation is not very generic, but that can be very > easily rectified if/when new encryption formats appear.) > --- > src/storage_backend_fs.c | 61 +++-- > 1 files changed, 47 i

Re: [libvirt] [PATCH 12/20] Attach encryption information to virStorageVolDef.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:10PM +0200, Miloslav Trma?? wrote: > The XML allows , this implementation > canonicalizes the internal representation so that "vol->encryption" is > non-NULL iff the volume is encrypted. > > Note that partial encryption information (e.g. specifying an encryption > for

Re: [libvirt] [PATCH 11/20] Add volume encryption information handling.

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:09PM +0200, Miloslav Trma?? wrote: > Define an tag specifying volume encryption format and > format-depenedent parameters (e.g. passphrase, cipher name, key > length, key). > > Currently the only defined parameter is a reference to a "secret" > (passphrase/key) manag

Re: [libvirt] [PATCH 01/20] Secret manipulation step 1: Public API

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:17:59PM +0200, Miloslav Trma?? wrote: > This patch adds a "secret" as a separately managed object, using a > special-purpose API to transfer the secret values between nodes and > libvirt users. > > Rather than add explicit accessors for attributes of secrets, and > hard-

Re: [libvirt] [PATCH 07/20] Secret manipulation step 7: Local driver

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:05PM +0200, Miloslav Trma?? wrote: > This implementation stores the secrets in an unencrypted text file, > for simplicity in implementation and debugging. > > (Symmetric encryption, e.g. using gpgme, will not be difficult to add. > Because the TLS private key used by

Re: [libvirt] [PATCH 02/20] Secret manipulation step 2: Internal API

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:00PM +0200, Miloslav Trma?? wrote: > Adds a new driver type. > > Changes since the third submission: > - Add "flags" parameter to virSecretDefineXML(), virSecretGetXMLDesc(), > virSecretGetValue(), virSecretSetValue(), and all derived interfaces. > - Fix a copy&past

Re: [libvirt] [PATCH 03/20] Secret manipulation step 3: Public API implementation

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:01PM +0200, Miloslav Trma?? wrote: > Changes since the third submission: > - Add "flags" parameter to virSecretDefineXML(), virSecretGetXMLDesc(), > virSecretGetValue(), virSecretSetValue(), and all derived interfaces. > --- > include/libvirt/virterror.h |2 + >

Re: [libvirt] [PATCH 08/20] Secret manipulation step 8: Add virsh commands

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:06PM +0200, Miloslav Trma?? wrote: > Changes since the third submission: > - Add "flags" parameter to virSecretDefineXML(), virSecretGetXMLDesc(), > virSecretGetValue(), virSecretSetValue(), and all derived interfaces. > - Add documentation to virsh.1 > --- > docs/v

Re: [libvirt] [PATCH 10/20] Secret manipulation step 10: Add Python API

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:08PM +0200, Miloslav Trma?? wrote: > Sample session: > > >>> import libvirt > >>> c = libvirt.open('qemu:///session') > > >>> c.listSecrets() > ['12247729-47d2-a783-88ce-b329d4781cd3', 'reee', 'abc'] > > >>> s = c.secretDefineXML(" >>> private='no'>\nSomething for

Re: [libvirt] [PATCH 06/20] Secret manipulation step 6: RPC dispatcher

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:04PM +0200, Miloslav Trma?? wrote: > Changes since the third submission: > - Add "flags" parameter to virSecretDefineXML(), virSecretGetXMLDesc(), > virSecretGetValue(), virSecretSetValue(), and all derived interfaces. > --- > qemud/remote.c | 203 > ++

Re: [libvirt] [PATCH 05/20] Secret manipulation step 5: RPC client

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:03PM +0200, Miloslav Trma?? wrote: > Changes since the third submission: > - Add "flags" parameter to virSecretDefineXML(), virSecretGetXMLDesc(), > virSecretGetValue(), virSecretSetValue(), and all derived interfaces. > --- > src/datatypes.h |1 + > src/r

Re: [libvirt] [PATCH 04/20] Secret manipulation step 4: Wire protocol

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:18:02PM +0200, Miloslav Trma?? wrote: > Changes since the third submission: > - Add "flags" parameter to virSecretDefineXML(), virSecretGetXMLDesc(), > virSecretGetValue(), virSecretSetValue(), and all derived interfaces. > --- > qemud/remote_dispatch_args.h |

Re: [libvirt] [PATCH 01/20] Secret manipulation step 1: Public API

2009-08-27 Thread Daniel P. Berrange
On Thu, Aug 20, 2009 at 08:17:59PM +0200, Miloslav Trma?? wrote: > This patch adds a "secret" as a separately managed object, using a > special-purpose API to transfer the secret values between nodes and > libvirt users. > > Rather than add explicit accessors for attributes of secrets, and > hard-