New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tests: make sure separate processes also uses correct qubes.xml #1730

Closed
marmarek opened this Issue Feb 9, 2016 · 0 comments

Comments

Projects
None yet
1 participant
@marmarek
Member

marmarek commented Feb 9, 2016

For example qrexec service calls (qrexec-policy tool) needs to know which qubes.xml should be loaded. If it will load the default one, it would fail because there is no test VMs.
I guess the easiest way would be setting some environment variable (QUBES_XML_PATH?), at least in qrexec-daemon environment.

/cc @woju

@marmarek marmarek added this to the Release 4.0 milestone Feb 9, 2016

marmarek added a commit to marmarek/old-qubes-core-admin that referenced this issue Feb 10, 2016

marmarek added a commit to marmarek/old-qubes-core-admin that referenced this issue Feb 10, 2016

tests: set QUBES_XML_PATH env variable to force usage of qubes-test.xml
This way even separate processes (even those started not directly - like
qrexec service calls) will use correct qubes.xml file.

Fixes QubesOS/qubes-issues#1730

woju added a commit to woju/qubes-core-admin that referenced this issue Feb 29, 2016

qubes: support QUBES_XML_PATH environment variable
This is reworked
    core: load default qubes.xml location from QUBES_XML_PATH env variable

QubesOS/qubes-issues#1730

woju added a commit to woju/qubes-core-admin that referenced this issue Feb 29, 2016

tests: set QUBES_XML_PATH env variable to force usage of qubes-test.xml
This way even separate processes (even those started not directly - like
qrexec service calls) will use correct qubes.xml file.

Fixes QubesOS/qubes-issues#1730

woju added a commit to woju/qubes-core-admin that referenced this issue Mar 3, 2016

qubes: support QUBES_XML_PATH environment variable
This is reworked
    core: load default qubes.xml location from QUBES_XML_PATH env variable

QubesOS/qubes-issues#1730

woju added a commit to woju/qubes-core-admin that referenced this issue Mar 3, 2016

tests: set QUBES_XML_PATH env variable to force usage of qubes-test.xml
This way even separate processes (even those started not directly - like
qrexec service calls) will use correct qubes.xml file.

Fixes QubesOS/qubes-issues#1730

woju added a commit to woju/qubes-core-admin that referenced this issue Mar 3, 2016

qubes: support QUBES_XML_PATH environment variable
This is reworked
    core: load default qubes.xml location from QUBES_XML_PATH env variable

QubesOS/qubes-issues#1730

woju added a commit to woju/qubes-core-admin that referenced this issue Mar 3, 2016

tests: set QUBES_XML_PATH env variable to force usage of qubes-test.xml
This way even separate processes (even those started not directly - like
qrexec service calls) will use correct qubes.xml file.

Fixes QubesOS/qubes-issues#1730

@marmarek marmarek closed this Oct 13, 2016

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment