-
Updated
May 17, 2022 - Python
qemu
Here are 802 public repositories matching this topic...
-
Updated
Apr 29, 2022 - Shell
What are you trying to do?
Currently all commands use instance name to perform operations. This makes operations on multiple instances difficult and requires individual commands/action on each instance. For example: if I have 3 VMs for apps, 2 vms for db, and I want to run a command on just db nodes, I would have to run two commands. Or If I have to reboot app servers, thats 3 commands.
Expected behaviour
I expected the VM to come up normally, just exchanging NAT IP by bridge IP
Actual behaviour
When adding the bridge="br0" line to the conf file, when trying to start VM immediately a "Connect to SPICE" window pops up asking for Hostname, Port, TLS Port and showing recent connections that obviously now don't work anymore.
As don't know much about spice, maybe
When the computer is suspended during a fuzzing session, the time spent in suspended state is counted as a "run time" on a statistics screen. In case fuzzing was running for several hours and then the computer was suspended for several more hours, on one hand I would prefer not restarting the session, on the other hand, now it may be harder to tell how well a harness performs (corpus count vs. run
-
Updated
May 7, 2021 - Go
-
Updated
May 20, 2022 - C
-
Updated
May 23, 2022 - Go
Description
Running on open-source software and supported by SSE, deSEC is free for everyone to use.
Example
DNSSEC
DNS information hosted with deSEC is signed using DNSSEC, always. We use state-of-the-art elliptic-curve cryptography and follow operational best practice.
Cloud Integration
Thanks to cloud integrations and language bindings, deSEC works out
-
Updated
Apr 24, 2022 - Shell
-
Updated
Oct 15, 2021 - Dockerfile
-
Updated
May 23, 2022 - Go
-
Updated
May 17, 2022 - C
-
Updated
Jan 20, 2020 - C
-
Updated
Dec 10, 2020 - C
-
Updated
Apr 14, 2021 - C
-
Updated
May 8, 2022 - Makefile
-
Updated
May 21, 2022 - C
Selinux compliance
Bug description
Scaphandre doesn't provide selinux module to be granted, so scaphandre is not supposed able to reach /proc files
To Reproduce
Run podman scaphandre on a CentOS node with Selinux permissive or enforced.
Expected behavior
```type=PROCTITLE` msg=audit(1620219205.083:466054): proctitle=2F7573722F6C6F63616C2F62696E2F7363617068616E6472650070726F6D657468657573
typ
-
Updated
Feb 7, 2020 - C
Improve this page
Add a description, image, and links to the qemu topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the qemu topic, visit your repo's landing page and select "manage topics."
I would like to be able to write rich notes about my VMs using the Markdown syntax.
This could be implemented by using the
AttributedStringAPI introduced by Apple in 2021.