[Spice-commits] Changes to 'spice.v37'

Gerd Hoffmann kraxel at kemper.freedesktop.org
Mon Jun 6 05:44:55 PDT 2011


New branch 'spice.v37' available with the following commits:
commit 212496c98219df17913f3157a7bf85575b32384f
Author: Alon Levy <alevy at redhat.com>
Date:   Wed May 18 17:34:36 2011 +0300

    qxl: fix cmdlog for vga
    
    Signed-off-by: Alon Levy <alevy at redhat.com>
    Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>

commit 012b80d3f904c9a4d4ea85036ba8d4d1acf12e7d
Author: Gerd Hoffmann <kraxel at redhat.com>
Date:   Tue May 17 10:48:14 2011 +0200

    spice: require spice 0.6.0 or newer.
    
    This patch raises the minimum required spice version to 0.6.0 and drops
    a few ifdefs.
    
    0.6.0 is the first stable release with the current libspice-server API,
    there shouldn't be any 0.5.x development versions deployed any more.
    
    Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>

commit 44bd6907de2018f8abb28fcee3dda8a7cfbf9c96
Author: Gerd Hoffmann <kraxel at redhat.com>
Date:   Tue May 17 10:40:43 2011 +0200

    qemu-config: comment spell fix
    
    Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>

commit 48b3ed0a68b8c1b288b4e15743ea39b7b5b318c3
Author: Marc-André Lureau <marcandre.lureau at gmail.com>
Date:   Tue May 17 10:40:33 2011 +0200

    spice: add SASL support
    
    Turn on SASL support by appending "sasl" to the spice arguments, which
    requires that the client use SASL to authenticate with the spice.  The
    exact choice of authentication method used is controlled from the
    system / user's SASL configuration file for the 'qemu' service. This
    is typically found in /etc/sasl2/qemu.conf. If running QEMU as an
    unprivileged user, an environment variable SASL_CONF_PATH can be used
    to make it search alternate locations for the service config.  While
    some SASL auth methods can also provide data encryption (eg GSSAPI),
    it is recommended that SASL always be combined with the 'tls' and
    'x509' settings to enable use of SSL and server certificates. This
    ensures a data encryption preventing compromise of authentication
    credentials.
    
    It requires support from spice 0.8.1.
    
    [ kraxel: moved spell fix to separate commit ]
    
    Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>

commit 42138043f29b350219a45895017cf677237b6a97
Author: Gerd Hoffmann <kraxel at redhat.com>
Date:   Mon May 16 09:28:58 2011 +0200

    qxl: add to the list of devices which disable the default vga
    
    Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>

commit d4970b071f698a4f3984487bbb97d1ecc36f5950
Author: Hans de Goede <hdegoede at redhat.com>
Date:   Sun Mar 27 16:43:54 2011 +0200

    spice: add option for disabling copy paste support
    
    Some people want to be able disable spice's guest <-> client copy paste support
    because of security considerations.
    
    [ kraxel: drop old-version error message ]

commit 35106c2df2eda83e5f7fea356d80c11fed93df1f
Author: Hans de Goede <hdegoede at redhat.com>
Date:   Tue Mar 22 16:28:41 2011 +0100

    spice-qemu-char: Fix flow control in client -> guest direction
    
    In the old spice-vmc device we used to have:
    last_out = virtio_serial_write(&svc->port, p, MIN(len, VMC_MAX_HOST_WRITE));
    if (last_out > 0)
       ...
    
    Now in the chardev backend we have:
    last_out = MIN(len, VMC_MAX_HOST_WRITE);
    qemu_chr_read(scd->chr, p, last_out);
    if (last_out > 0) {
       ...
    
    Which causes us to no longer detect if the virtio port is not ready
    to receive data from us. chardev actually has a mechanism to detect this,
    but it requires a separate call to qemu_chr_can_read, before calling
    qemu_chr_read (which return void).
    
    This patch uses qemu_chr_can_read to fix the flow control from client to
    guest.
    
    Signed-off-by: Hans de Goede <hdegoede at redhat.com>



More information about the Spice-commits mailing list