Commit Graph

11 Commits

Author SHA1 Message Date
Joanna Rutkowska
c8f6f2e9fe vm: disable forwarding when iptables rules are being (re)applied 2011-08-18 18:47:08 +02:00
Joanna Rutkowska
9d380bdd0d proxyvm: remove unused code 2011-08-18 18:04:38 +02:00
Joanna Rutkowska
f0de081faf proxyvm: allow for user defined hooks after iptables restore 2011-08-18 15:02:30 +02:00
Rafal Wojtczuk
8ecd6134d9 firewall: call iptables-restore once per domain (#311)
qubes.py now places rules for each domain in a separate key under
/local/domain/fw_XID/qubes_iptables_domainrules/
plus the header in /local/domain/fw_XID/qubes_iptables_header.
/local/domain/fw_XID/qubes_iptables is now just a trigger.
So, if iptables-restore fails dues to e.g. error resolving a domain name
in a rules for a domain, then only this domain will not get connectivity,
others will work fine.
2011-07-29 16:50:12 +02:00
Marek Marczykowski
0ffb186681 vm: add -qubes suffix to xenstore-watch to not conflict with xen standard tool 2011-06-07 15:58:55 +02:00
Marek Marczykowski
48d520f847 proxyvm: directly display error msg beside of writing it to xenstore 2011-06-04 02:54:17 +02:00
Rafal Wojtczuk
7bc7dc6294 qubes_netwatcher: expand a note about NETCFG untrusted origin 2011-05-09 16:26:48 +02:00
Rafal Wojtczuk
adad94cb09 qubes_netwatcher: add a note about NETCFG untrusted origin 2011-05-09 16:23:52 +02:00
Tomasz Sterna
dab24a2090 Propagate qubes_netvm_external_ip up in ProxyVM. #116 2011-03-26 11:33:04 +01:00
Marek Marczykowski
d6181d21cf Merge commit 'e2d52a27e810522c41720bb17b1f4f52f1fe2e6a'
Conflicts:
	dom0/qvm-core/qubes.py
	fwvm/init.d/qubes_firewall
2011-03-11 23:32:13 +01:00
Marek Marczykowski
c7a832a279 NetVM, AppVM, ProxyVM from single template - VM side
Modify VM packages to:
- do not conflicts
- starts services if its VM type need it

Added core-proxyvm (firewall) and core-commonvm (common parts) packages.
2011-03-11 01:38:04 +01:00