[Spice-commits] Changes to 'spice.v36'
Gerd Hoffmann
kraxel at kemper.freedesktop.org
Tue May 17 02:22:40 PDT 2011
New branch 'spice.v36' available with the following commits:
commit d1c3a125e407222e9abb289ce6569dd8794446c2
Author: Gerd Hoffmann <kraxel at redhat.com>
Date: Tue May 17 10:48:14 2011 +0200
spice: require spice 0.6.0 or newer.
This patch raises the minimum required spice version to 0.6.0 and drops
a few ifdefs.
0.6.0 is the first stable release with the current libspice-server API,
there shouldn't be any 0.5.x development versions deployed any more.
Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>
commit e57df931feeb15c0984a5f2d6fb2de631e0f8925
Author: Gerd Hoffmann <kraxel at redhat.com>
Date: Tue May 17 10:40:43 2011 +0200
qemu-config: comment spell fix
Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>
commit 61c30ca6a7e963efc22afa6278895f108fc7daba
Author: Marc-André Lureau <marcandre.lureau at gmail.com>
Date: Tue May 17 10:40:33 2011 +0200
spice: add SASL support
Turn on SASL support by appending "sasl" to the spice arguments, which
requires that the client use SASL to authenticate with the spice. The
exact choice of authentication method used is controlled from the
system / user's SASL configuration file for the 'qemu' service. This
is typically found in /etc/sasl2/qemu.conf. If running QEMU as an
unprivileged user, an environment variable SASL_CONF_PATH can be used
to make it search alternate locations for the service config. While
some SASL auth methods can also provide data encryption (eg GSSAPI),
it is recommended that SASL always be combined with the 'tls' and
'x509' settings to enable use of SSL and server certificates. This
ensures a data encryption preventing compromise of authentication
credentials.
It requires support from spice 0.8.1.
[ kraxel: moved spell fix to separate commit ]
Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>
commit bd8f0d91dd0357f63e00f754b6bd157b0afc455e
Author: Gerd Hoffmann <kraxel at redhat.com>
Date: Mon May 16 09:28:58 2011 +0200
qxl: add to the list of devices which disable the default vga
Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>
commit 041180f7aef28191f12ca86a23185fdd715557f5
Author: Hans de Goede <hdegoede at redhat.com>
Date: Sun Mar 27 16:43:54 2011 +0200
spice: add option for disabling copy paste support
Some people want to be able disable spice's guest <-> client copy paste support
because of security considerations.
[ kraxel: drop old-version error message ]
commit 5ea8d060e86edaacd00cb9ee1e10e0595441af19
Author: Hans de Goede <hdegoede at redhat.com>
Date: Tue Mar 22 16:28:41 2011 +0100
spice-qemu-char: Fix flow control in client -> guest direction
In the old spice-vmc device we used to have:
last_out = virtio_serial_write(&svc->port, p, MIN(len, VMC_MAX_HOST_WRITE));
if (last_out > 0)
...
Now in the chardev backend we have:
last_out = MIN(len, VMC_MAX_HOST_WRITE);
qemu_chr_read(scd->chr, p, last_out);
if (last_out > 0) {
...
Which causes us to no longer detect if the virtio port is not ready
to receive data from us. chardev actually has a mechanism to detect this,
but it requires a separate call to qemu_chr_can_read, before calling
qemu_chr_read (which return void).
This patch uses qemu_chr_can_read to fix the flow control from client to
guest.
Signed-off-by: Hans de Goede <hdegoede at redhat.com>
More information about the Spice-commits
mailing list