Displaying 20 results from an estimated 23 matches for "guest_id".
Did you mean:
guest_cid
2018 Nov 19
1
[PATCH] v2v: -o openstack: Option to add --insecure flag to openstack command.
...dex b901ab262..b5bbc9195 100644
--- a/v2v/output_openstack.ml
+++ b/v2v/output_openstack.ml
@@ -53,6 +53,11 @@ type os_options = {
*)
authentication : string list;
+ (* Add the [openstack --insecure] switch (turns off SSL cert
+ * validation).
+ *)
+ insecure : bool;
+
(* Optional guest_id which, if present, is saved as
* Cinder volume property virt_v2v_guest_id on every disk
* associated with this guest.
@@ -97,6 +102,7 @@ The os-* parameters and environment variables are optional.
let parse_output_options options =
let server_id = ref None in
let dev_disk_by_id = ref...
2018 Nov 20
0
[PATCH v2] v2v: -o openstack: -oo verify-server-certificate=(true|false) (RHBZ#1651432).
...0644
--- a/v2v/output_openstack.ml
+++ b/v2v/output_openstack.ml
@@ -56,6 +56,11 @@ type os_options = {
*)
authentication : string list;
+ (* If false, use the [openstack --insecure] switch (turns off SSL
+ * cert validation).
+ *)
+ verify_server_certificate : bool;
+
(* Optional guest_id which, if present, is saved as
* Cinder volume property virt_v2v_guest_id on every disk
* associated with this guest.
@@ -100,6 +105,7 @@ The os-* parameters and environment variables are optional.
let parse_output_options options =
let server_id = ref None in
let dev_disk_by_id = re...
2018 Nov 20
3
[PATCH v4 0/2] v2v: -o openstack: -oo verify-server-certificate=(true|false) (RHBZ#1651432).
The first patch restricts passthrough parameters to ones matching
"os-*". This was how it was documented, but not how it was
implemented.
The second patch is the same as v2 here:
https://www.redhat.com/archives/libguestfs/2018-November/msg00187.html
Rich.
2014 Dec 11
2
Freeze Windows Guests For Consistent Storage Snapshots
...possible to freeze windows guests for a consistent storage level
snapshot.
I am using openstack icehouse on centos 6.6
Hypervisor: KVM
Libvirt: 0.10.2
Qemu: 0.10.2
Guest OS: Windows 7 and Windows Server 2008
I was able to freeze Centos guests by issuing the command:
virsh qemu-agent-command <guest_ID> '{"execute":"guest-fsfreeze-freeze"}'
For CentOS guests, I enabled access between compute nodes and guests
through a socket by setting metadata parameter, hw_qemu_guest_agent=yes for
the guest image.
And then installing qemu-guest-agent inside the guest.
What steps...
2008 Aug 20
7
:include confused by true?
I have two models:
guest
rsvp
guest belongs_to rsvp and rsvp has_one guest
When I try the following I get an error:
@coming = Guest.find(:all, :conditions => ["coming = ?",
true], :include => :rsvp)
It complains of an unknown column ''coming''
I''m sure I''m doing something stupid but I can''t see it. Any help
would be appreciated.
2007 Apr 18
0
[RFC/PATCH LGUEST X86_64 09/13] lguest64 devices
...unbind_dma(linfo, &key, dmas);
+ else {
+ for (i = 0; i < LGUEST_MAX_DMA; i++) {
+ if (linfo->dma[i].interrupt == 0) {
+ linfo->dma[i].dmas = dmas;
+ linfo->dma[i].num_dmas = numdmas;
+ linfo->dma[i].next_dma = 0;
+ linfo->dma[i].key = key;
+ linfo->dma[i].guest_id = linfo->guest_id;
+ linfo->dma[i].interrupt = interrupt;
+ list_add(&linfo->dma[i].list,
+ &dma_hash[hash(&key)]);
+ ret = 1;
+ printk("Will return, holding a reference\n");
+ goto unlock;
+ }
+ }
+ }
+ printk("Will return, _without_ a ref...
2007 Apr 18
0
[RFC/PATCH LGUEST X86_64 09/13] lguest64 devices
...unbind_dma(linfo, &key, dmas);
+ else {
+ for (i = 0; i < LGUEST_MAX_DMA; i++) {
+ if (linfo->dma[i].interrupt == 0) {
+ linfo->dma[i].dmas = dmas;
+ linfo->dma[i].num_dmas = numdmas;
+ linfo->dma[i].next_dma = 0;
+ linfo->dma[i].key = key;
+ linfo->dma[i].guest_id = linfo->guest_id;
+ linfo->dma[i].interrupt = interrupt;
+ list_add(&linfo->dma[i].list,
+ &dma_hash[hash(&key)]);
+ ret = 1;
+ printk("Will return, holding a reference\n");
+ goto unlock;
+ }
+ }
+ }
+ printk("Will return, _without_ a ref...
2006 Feb 18
1
Questions about ActiveRecord
...a few questions about data base design and integrating the design
into Rails.
I''m creating a CMS for a local sports club and want to store the clubs,
their teams and the matches in a data base.
Here is the schema I made up:
http://pastebin.com/561474
As you can see, I added home_id and guest_id to each match that link to
the competing teams. My problem is telling Rails about this kind of
relation. I want to be able to do something like this:
# This should return all matches where team.id is home_id or guest_id:
<% for match in @team.matches %>
<%= match.home_points %>
<%...
2019 Apr 03
1
[PATCH] UNTESTED v2v: openstack: Read server-id from metadata service.
Random old patch that I had in my queue. Posting it as a backup,
it is still untested.
Rich.
2009 Apr 23
11
Puppet on busybox, Bob Hope or No Hope?
When I say busybox it''s actually VMware ESX server which seems to use
busybox (which I guess is the case a number of other software appliances) .
Reason for wanting to install puppet is to run the cli tools to create
nightly vmware snapshots.
I''m happy to give it a go (and add the docs to the wiki) but I''m not too
sure at this stage how big a task this might be and what,
2014 Dec 11
0
Re: Freeze Windows Guests For Consistent Storage Snapshots
...you install qemu-guest-agent in the guest, and wire up your
libvirt XML to have the guest-agent channel available. Once you have
done that, use the --quiesce flag as part of creating your snapshots.
> I was able to freeze Centos guests by issuing the command:
> virsh qemu-agent-command <guest_ID> '{"execute":"guest-fsfreeze-freeze"}'
That is an unsupported backdoor, because it relies on libvirt-qemu.so.
You should really prefer the libvirt commands from libvirt.so instead
(the --quiesce flag to 'virsh snapshot-create[-as]'), because it is less
likely...
2009 May 23
0
Conditional Validation: only if a record can be found
...ch ticket by using an auto complete form.
If each ticket has a guest attached, then the guestlist is ''full''
I have this rule in my controller and I want to turn it into a
validation in the model. Any ideas?
(sudo code)
if Ticket.find(first, condition => guestlist_id = ? and guest_id IS
NILL)
attach guest
else
display ''guestlist is full''
end
Thanks for your help
Scott
--
Posted via http://www.ruby-forum.com/.
2018 Nov 20
0
[PATCH v3] v2v: -o openstack: Allow -oo insecure (RHBZ#1651432).
...ons(-)
diff --git a/v2v/output_openstack.ml b/v2v/output_openstack.ml
index 22fac69bd..76e269c85 100644
--- a/v2v/output_openstack.ml
+++ b/v2v/output_openstack.ml
@@ -110,11 +110,14 @@ let parse_output_options options =
dev_disk_by_id := Some v
| "guest-id", v ->
guest_id := Some v
+ (* Accumulate any remaining/unknown -oo parameters
+ * into the authentication list, where they will be
+ * passed unmodified through to the openstack command.
+ *)
+ | k, "" ->
+ let opt = sprintf "--%s" k in
+ authentication := opt...
2017 Nov 10
1
[PATCH v2 2/5] x86: add enum for hypervisors to replace x86_hyper
...changed, 40 insertions(+), 31 deletions(-)
>
> diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c
> index a5db63f728a2..a0b86cf486e0 100644
> --- a/arch/x86/hyperv/hv_init.c
> +++ b/arch/x86/hyperv/hv_init.c
> @@ -113,7 +113,7 @@ void hyperv_init(void)
> u64 guest_id;
> union hv_x64_msr_hypercall_contents hypercall_msr;
>
> - if (x86_hyper != &x86_hyper_ms_hyperv)
> + if (x86_hyper_type != X86_HYPER_MS_HYPERV)
> return;
>
> /* Allocate percpu VP index */
> diff --git a/arch/x86/include/asm/hypervisor.h b/arch/x86/include/a...
2017 Nov 10
1
[PATCH v2 2/5] x86: add enum for hypervisors to replace x86_hyper
...changed, 40 insertions(+), 31 deletions(-)
>
> diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c
> index a5db63f728a2..a0b86cf486e0 100644
> --- a/arch/x86/hyperv/hv_init.c
> +++ b/arch/x86/hyperv/hv_init.c
> @@ -113,7 +113,7 @@ void hyperv_init(void)
> u64 guest_id;
> union hv_x64_msr_hypercall_contents hypercall_msr;
>
> - if (x86_hyper != &x86_hyper_ms_hyperv)
> + if (x86_hyper_type != X86_HYPER_MS_HYPERV)
> return;
>
> /* Allocate percpu VP index */
> diff --git a/arch/x86/include/asm/hypervisor.h b/arch/x86/include/a...
2018 Nov 20
3
[PATCH v3] v2v: -o openstack: Allow -oo insecure (RHBZ#1651432).
A smaller change than v2, we simply generalize the ability to pass
through flags to the underlying openstack command, allowing the
--insecure flag to be specified directly.
Rich.
2017 Dec 22
0
[PATCH 4.14 065/159] x86/virt: Add enum for hypervisors to replace x86_hyper
...v/vmbus_drv.c | 2 +-
drivers/input/mouse/vmmouse.c | 10 ++++------
drivers/misc/vmw_balloon.c | 2 +-
11 files changed, 40 insertions(+), 31 deletions(-)
--- a/arch/x86/hyperv/hv_init.c
+++ b/arch/x86/hyperv/hv_init.c
@@ -113,7 +113,7 @@ void hyperv_init(void)
u64 guest_id;
union hv_x64_msr_hypercall_contents hypercall_msr;
- if (x86_hyper != &x86_hyper_ms_hyperv)
+ if (x86_hyper_type != X86_HYPER_MS_HYPERV)
return;
/* Allocate percpu VP index */
--- a/arch/x86/include/asm/hypervisor.h
+++ b/arch/x86/include/asm/hypervisor.h
@@ -29,6 +29,16 @@
/*
*...
2012 Sep 17
9
[PATCH] Upgrade vtpmd to berlios version 0.7.4
...581,180 @@ static int init_socket(const char *name)
-
- static void main_loop(void)
- {
-- int sock, fh, res;
-- int32_t in_len;
-+ int32_t in_len, written;
- uint32_t out_len;
-- uint8_t in[TPM_CMD_BUF_SIZE], *out;
-+ uint8_t in[TPM_CMD_BUF_SIZE], *out, *addressed_out;
-+ int guest_id=-1;
-+ int i;
-+ char *vtpm_rx_file=NULL;
-+ int res;
-+
-+#ifndef VTPM_MULTI_VM
-+ int sockfd = -1;
- struct sockaddr_un addr;
-- socklen_t addr_len;
-- fd_set rfds;
-- struct timeval tv;
-+ struct sockaddr_un client_addr;
-+ unsigned int client_length;
-+#endif
-+
-...
2017 Nov 09
0
[PATCH v2 2/5] x86: add enum for hypervisors to replace x86_hyper
..._balloon.c | 2 +-
11 files changed, 40 insertions(+), 31 deletions(-)
diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c
index a5db63f728a2..a0b86cf486e0 100644
--- a/arch/x86/hyperv/hv_init.c
+++ b/arch/x86/hyperv/hv_init.c
@@ -113,7 +113,7 @@ void hyperv_init(void)
u64 guest_id;
union hv_x64_msr_hypercall_contents hypercall_msr;
- if (x86_hyper != &x86_hyper_ms_hyperv)
+ if (x86_hyper_type != X86_HYPER_MS_HYPERV)
return;
/* Allocate percpu VP index */
diff --git a/arch/x86/include/asm/hypervisor.h b/arch/x86/include/asm/hypervisor.h
index 0eca7239a7aa..1b0a...
2017 Nov 09
4
[PATCH v2 0/5] x86/xen: support booting PVH guest via standard boot path
Booting a Xen PVH guest requires a special boot entry as it is
mandatory to setup some Xen-specific interfaces rather early. When grub
or OVMF are used as boot loaders, however, those will fill the boot
parameters in zeropage and there is no longer a need to do something
PVH specific in the early boot path.
This patch series adds support for that scenario by identifying PVH
environment and doing