Do not generate R3 compat firewall rules if R4 format is supported
R3 format had limitation of ~40 rules per VM. Do not generate compat rules (possibly hitting that limitation) if new format, free of that limitation is supported. Fixes QubesOS/qubes-issues#1570 Fixes QubesOS/qubes-issues#4228
This commit is contained in:
parent
e8dc6cb916
commit
133219f6d3
@ -80,6 +80,9 @@ class R3Compatibility(qubes.ext.Extension):
|
|||||||
|
|
||||||
def write_iptables_qubesdb_entry(self, firewallvm):
|
def write_iptables_qubesdb_entry(self, firewallvm):
|
||||||
# pylint: disable=no-self-use
|
# pylint: disable=no-self-use
|
||||||
|
# skip compatibility rules if new format support is advertised
|
||||||
|
if firewallvm.features.check_with_template('qubes-firewall', False):
|
||||||
|
return
|
||||||
firewallvm.untrusted_qdb.rm("/qubes-iptables-domainrules/")
|
firewallvm.untrusted_qdb.rm("/qubes-iptables-domainrules/")
|
||||||
iptables = "# Generated by Qubes Core on {0}\n".format(
|
iptables = "# Generated by Qubes Core on {0}\n".format(
|
||||||
datetime.datetime.now().ctime())
|
datetime.datetime.now().ctime())
|
||||||
|
Loading…
Reference in New Issue
Block a user