search for: guest_id

Displaying 20 results from an estimated 23 matches for "guest_id".

Did you mean: guest_cid
2018 Nov 19
1
[PATCH] v2v: -o openstack: Option to add --insecure flag to openstack command.
...dex b901ab262..b5bbc9195 100644 --- a/v2v/output_openstack.ml +++ b/v2v/output_openstack.ml @@ -53,6 +53,11 @@ type os_options = { *) authentication : string list; + (* Add the [openstack --insecure] switch (turns off SSL cert + * validation). + *) + insecure : bool; + (* Optional guest_id which, if present, is saved as * Cinder volume property virt_v2v_guest_id on every disk * associated with this guest. @@ -97,6 +102,7 @@ The os-* parameters and environment variables are optional. let parse_output_options options = let server_id = ref None in let dev_disk_by_id = ref...
2018 Nov 20
0
[PATCH v2] v2v: -o openstack: -oo verify-server-certificate=(true|false) (RHBZ#1651432).
...0644 --- a/v2v/output_openstack.ml +++ b/v2v/output_openstack.ml @@ -56,6 +56,11 @@ type os_options = { *) authentication : string list; + (* If false, use the [openstack --insecure] switch (turns off SSL + * cert validation). + *) + verify_server_certificate : bool; + (* Optional guest_id which, if present, is saved as * Cinder volume property virt_v2v_guest_id on every disk * associated with this guest. @@ -100,6 +105,7 @@ The os-* parameters and environment variables are optional. let parse_output_options options = let server_id = ref None in let dev_disk_by_id = re...
2018 Nov 20
3
[PATCH v4 0/2] v2v: -o openstack: -oo verify-server-certificate=(true|false) (RHBZ#1651432).
The first patch restricts passthrough parameters to ones matching "os-*". This was how it was documented, but not how it was implemented. The second patch is the same as v2 here: https://www.redhat.com/archives/libguestfs/2018-November/msg00187.html Rich.
2014 Dec 11
2
Freeze Windows Guests For Consistent Storage Snapshots
...possible to freeze windows guests for a consistent storage level snapshot. I am using openstack icehouse on centos 6.6 Hypervisor: KVM Libvirt: 0.10.2 Qemu: 0.10.2 Guest OS: Windows 7 and Windows Server 2008 I was able to freeze Centos guests by issuing the command: virsh qemu-agent-command <guest_ID> '{"execute":"guest-fsfreeze-freeze"}' For CentOS guests, I enabled access between compute nodes and guests through a socket by setting metadata parameter, hw_qemu_guest_agent=yes for the guest image. And then installing qemu-guest-agent inside the guest. What steps...
2008 Aug 20
7
:include confused by true?
I have two models: guest rsvp guest belongs_to rsvp and rsvp has_one guest When I try the following I get an error: @coming = Guest.find(:all, :conditions => ["coming = ?", true], :include => :rsvp) It complains of an unknown column ''coming'' I''m sure I''m doing something stupid but I can''t see it. Any help would be appreciated.
2007 Apr 18
0
[RFC/PATCH LGUEST X86_64 09/13] lguest64 devices
...unbind_dma(linfo, &key, dmas); + else { + for (i = 0; i < LGUEST_MAX_DMA; i++) { + if (linfo->dma[i].interrupt == 0) { + linfo->dma[i].dmas = dmas; + linfo->dma[i].num_dmas = numdmas; + linfo->dma[i].next_dma = 0; + linfo->dma[i].key = key; + linfo->dma[i].guest_id = linfo->guest_id; + linfo->dma[i].interrupt = interrupt; + list_add(&linfo->dma[i].list, + &dma_hash[hash(&key)]); + ret = 1; + printk("Will return, holding a reference\n"); + goto unlock; + } + } + } + printk("Will return, _without_ a ref...
2007 Apr 18
0
[RFC/PATCH LGUEST X86_64 09/13] lguest64 devices
...unbind_dma(linfo, &key, dmas); + else { + for (i = 0; i < LGUEST_MAX_DMA; i++) { + if (linfo->dma[i].interrupt == 0) { + linfo->dma[i].dmas = dmas; + linfo->dma[i].num_dmas = numdmas; + linfo->dma[i].next_dma = 0; + linfo->dma[i].key = key; + linfo->dma[i].guest_id = linfo->guest_id; + linfo->dma[i].interrupt = interrupt; + list_add(&linfo->dma[i].list, + &dma_hash[hash(&key)]); + ret = 1; + printk("Will return, holding a reference\n"); + goto unlock; + } + } + } + printk("Will return, _without_ a ref...
2006 Feb 18
1
Questions about ActiveRecord
...a few questions about data base design and integrating the design into Rails. I''m creating a CMS for a local sports club and want to store the clubs, their teams and the matches in a data base. Here is the schema I made up: http://pastebin.com/561474 As you can see, I added home_id and guest_id to each match that link to the competing teams. My problem is telling Rails about this kind of relation. I want to be able to do something like this: # This should return all matches where team.id is home_id or guest_id: <% for match in @team.matches %> <%= match.home_points %> <%...
2019 Apr 03
1
[PATCH] UNTESTED v2v: openstack: Read server-id from metadata service.
Random old patch that I had in my queue. Posting it as a backup, it is still untested. Rich.
2009 Apr 23
11
Puppet on busybox, Bob Hope or No Hope?
When I say busybox it''s actually VMware ESX server which seems to use busybox (which I guess is the case a number of other software appliances) . Reason for wanting to install puppet is to run the cli tools to create nightly vmware snapshots. I''m happy to give it a go (and add the docs to the wiki) but I''m not too sure at this stage how big a task this might be and what,
2014 Dec 11
0
Re: Freeze Windows Guests For Consistent Storage Snapshots
...you install qemu-guest-agent in the guest, and wire up your libvirt XML to have the guest-agent channel available. Once you have done that, use the --quiesce flag as part of creating your snapshots. > I was able to freeze Centos guests by issuing the command: > virsh qemu-agent-command <guest_ID> '{"execute":"guest-fsfreeze-freeze"}' That is an unsupported backdoor, because it relies on libvirt-qemu.so. You should really prefer the libvirt commands from libvirt.so instead (the --quiesce flag to 'virsh snapshot-create[-as]'), because it is less likely...
2009 May 23
0
Conditional Validation: only if a record can be found
...ch ticket by using an auto complete form. If each ticket has a guest attached, then the guestlist is ''full'' I have this rule in my controller and I want to turn it into a validation in the model. Any ideas? (sudo code) if Ticket.find(first, condition => guestlist_id = ? and guest_id IS NILL) attach guest else display ''guestlist is full'' end Thanks for your help Scott -- Posted via http://www.ruby-forum.com/.
2018 Nov 20
0
[PATCH v3] v2v: -o openstack: Allow -oo insecure (RHBZ#1651432).
...ons(-) diff --git a/v2v/output_openstack.ml b/v2v/output_openstack.ml index 22fac69bd..76e269c85 100644 --- a/v2v/output_openstack.ml +++ b/v2v/output_openstack.ml @@ -110,11 +110,14 @@ let parse_output_options options = dev_disk_by_id := Some v | "guest-id", v -> guest_id := Some v + (* Accumulate any remaining/unknown -oo parameters + * into the authentication list, where they will be + * passed unmodified through to the openstack command. + *) + | k, "" -> + let opt = sprintf "--%s" k in + authentication := opt...
2017 Nov 10
1
[PATCH v2 2/5] x86: add enum for hypervisors to replace x86_hyper
...changed, 40 insertions(+), 31 deletions(-) > > diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c > index a5db63f728a2..a0b86cf486e0 100644 > --- a/arch/x86/hyperv/hv_init.c > +++ b/arch/x86/hyperv/hv_init.c > @@ -113,7 +113,7 @@ void hyperv_init(void) > u64 guest_id; > union hv_x64_msr_hypercall_contents hypercall_msr; > > - if (x86_hyper != &x86_hyper_ms_hyperv) > + if (x86_hyper_type != X86_HYPER_MS_HYPERV) > return; > > /* Allocate percpu VP index */ > diff --git a/arch/x86/include/asm/hypervisor.h b/arch/x86/include/a...
2017 Nov 10
1
[PATCH v2 2/5] x86: add enum for hypervisors to replace x86_hyper
...changed, 40 insertions(+), 31 deletions(-) > > diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c > index a5db63f728a2..a0b86cf486e0 100644 > --- a/arch/x86/hyperv/hv_init.c > +++ b/arch/x86/hyperv/hv_init.c > @@ -113,7 +113,7 @@ void hyperv_init(void) > u64 guest_id; > union hv_x64_msr_hypercall_contents hypercall_msr; > > - if (x86_hyper != &x86_hyper_ms_hyperv) > + if (x86_hyper_type != X86_HYPER_MS_HYPERV) > return; > > /* Allocate percpu VP index */ > diff --git a/arch/x86/include/asm/hypervisor.h b/arch/x86/include/a...
2018 Nov 20
3
[PATCH v3] v2v: -o openstack: Allow -oo insecure (RHBZ#1651432).
A smaller change than v2, we simply generalize the ability to pass through flags to the underlying openstack command, allowing the --insecure flag to be specified directly. Rich.
2017 Dec 22
0
[PATCH 4.14 065/159] x86/virt: Add enum for hypervisors to replace x86_hyper
...v/vmbus_drv.c | 2 +- drivers/input/mouse/vmmouse.c | 10 ++++------ drivers/misc/vmw_balloon.c | 2 +- 11 files changed, 40 insertions(+), 31 deletions(-) --- a/arch/x86/hyperv/hv_init.c +++ b/arch/x86/hyperv/hv_init.c @@ -113,7 +113,7 @@ void hyperv_init(void) u64 guest_id; union hv_x64_msr_hypercall_contents hypercall_msr; - if (x86_hyper != &x86_hyper_ms_hyperv) + if (x86_hyper_type != X86_HYPER_MS_HYPERV) return; /* Allocate percpu VP index */ --- a/arch/x86/include/asm/hypervisor.h +++ b/arch/x86/include/asm/hypervisor.h @@ -29,6 +29,16 @@ /* *...
2012 Sep 17
9
[PATCH] Upgrade vtpmd to berlios version 0.7.4
...581,180 @@ static int init_socket(const char *name) - - static void main_loop(void) - { -- int sock, fh, res; -- int32_t in_len; -+ int32_t in_len, written; - uint32_t out_len; -- uint8_t in[TPM_CMD_BUF_SIZE], *out; -+ uint8_t in[TPM_CMD_BUF_SIZE], *out, *addressed_out; -+ int guest_id=-1; -+ int i; -+ char *vtpm_rx_file=NULL; -+ int res; -+ -+#ifndef VTPM_MULTI_VM -+ int sockfd = -1; - struct sockaddr_un addr; -- socklen_t addr_len; -- fd_set rfds; -- struct timeval tv; -+ struct sockaddr_un client_addr; -+ unsigned int client_length; -+#endif -+ -...
2017 Nov 09
0
[PATCH v2 2/5] x86: add enum for hypervisors to replace x86_hyper
..._balloon.c | 2 +- 11 files changed, 40 insertions(+), 31 deletions(-) diff --git a/arch/x86/hyperv/hv_init.c b/arch/x86/hyperv/hv_init.c index a5db63f728a2..a0b86cf486e0 100644 --- a/arch/x86/hyperv/hv_init.c +++ b/arch/x86/hyperv/hv_init.c @@ -113,7 +113,7 @@ void hyperv_init(void) u64 guest_id; union hv_x64_msr_hypercall_contents hypercall_msr; - if (x86_hyper != &x86_hyper_ms_hyperv) + if (x86_hyper_type != X86_HYPER_MS_HYPERV) return; /* Allocate percpu VP index */ diff --git a/arch/x86/include/asm/hypervisor.h b/arch/x86/include/asm/hypervisor.h index 0eca7239a7aa..1b0a...
2017 Nov 09
4
[PATCH v2 0/5] x86/xen: support booting PVH guest via standard boot path
Booting a Xen PVH guest requires a special boot entry as it is mandatory to setup some Xen-specific interfaces rather early. When grub or OVMF are used as boot loaders, however, those will fill the boot parameters in zeropage and there is no longer a need to do something PVH specific in the early boot path. This patch series adds support for that scenario by identifying PVH environment and doing