templatevm: set default netvm to None for templates
Since we have qrexec-based updates proxy, we can even stronger isolate templates from outside threats. QubesOS/qubes-issues#1854
This commit is contained in:
parent
1ed0b14d93
commit
d5cd58df51
@ -27,6 +27,7 @@ import warnings
|
|||||||
import qubes
|
import qubes
|
||||||
import qubes.config
|
import qubes.config
|
||||||
import qubes.vm.qubesvm
|
import qubes.vm.qubesvm
|
||||||
|
import qubes.vm.mix.net
|
||||||
from qubes.config import defaults
|
from qubes.config import defaults
|
||||||
from qubes.vm.qubesvm import QubesVM
|
from qubes.vm.qubesvm import QubesVM
|
||||||
|
|
||||||
@ -52,6 +53,13 @@ class TemplateVM(QubesVM):
|
|||||||
if hasattr(vm, 'template') and vm.template is self:
|
if hasattr(vm, 'template') and vm.template is self:
|
||||||
yield vm
|
yield vm
|
||||||
|
|
||||||
|
netvm = qubes.VMProperty('netvm', load_stage=4, allow_none=True,
|
||||||
|
default=None,
|
||||||
|
# pylint: disable=protected-access
|
||||||
|
setter=qubes.vm.qubesvm.QubesVM.netvm._setter,
|
||||||
|
doc='VM that provides network connection to this domain. When '
|
||||||
|
'`None`, machine is disconnected.')
|
||||||
|
|
||||||
def __init__(self, *args, **kwargs):
|
def __init__(self, *args, **kwargs):
|
||||||
assert 'template' not in kwargs, "A TemplateVM can not have a template"
|
assert 'template' not in kwargs, "A TemplateVM can not have a template"
|
||||||
self.volume_config = {
|
self.volume_config = {
|
||||||
|
Loading…
Reference in New Issue
Block a user