Displaying 3 results from an estimated 3 matches for "a0a42a7".
2017 Mar 13
7
[PATCH 0/4] v2v: -i -ova: Various fixes.
This has to be applied on top of this series:
https://www.redhat.com/archives/libguestfs/2017-March/msg00144.html
This is a fix for:
https://bugzilla.redhat.com/show_bug.cgi?id=1430680
Kun Wei noticed that virt-v2v -i ova has a problem if we are running
as root and the OVA is not located on a path which is fully readable
by non-root. The reason for this is that libvirt runs qemu as a
2017 Mar 13
0
[PATCH 2/2] v2v: -i ova: Factor out the OVF parsing into a separate module.
..._ova.mli \
parse_libvirt_xml.mli \
qemu_command.mli \
target_bus_assignment.mli \
@@ -73,6 +74,7 @@ SOURCES_ML = \
DOM.ml \
changeuid.ml \
OVF.ml \
+ parse_ovf_from_ova.ml \
linux.ml \
windows.ml \
windows_virtio.ml \
diff --git a/v2v/input_ova.ml b/v2v/input_ova.ml
index 9a6a615..a0a42a7 100644
--- a/v2v/input_ova.ml
+++ b/v2v/input_ova.ml
@@ -24,7 +24,7 @@ open Unix_utils
open Types
open Utils
-open Xpath_helpers
+open Parse_ovf_from_ova
open Name_from_disk
(* Return true if [libvirt] supports ["json:"] pseudo-URLs and accepts the
@@ -211,262 +211,97 @@ object...
2017 Mar 13
4
[PATCH 0/2] v2v: -i ova: A couple of cleanup patches.
A couple of patches cleaning up the -i ova code. These are
both just refactoring (or should be at any rate).
The second patch is best viewed with 'git show -w' to exclude
whitespace changes.
Rich.