1199806b5a
There were two bugs: 1. Firewall configuration wasn't copied during qvm-clone (it is in separate file, so now it is included in vm.clone_disk_files). 2. Non-default firewall configuration wasn't stored in qubes.xml. This means that initially DispVM got proper configuration (inherited from calling VM), but if anything caused firewall reload (for example starting another VM), the firewall rules was cleared to default state (allow all). Fixes qubesos/qubes-issues#1032 |
||
---|---|---|
.. | ||
__init__.py | ||
01QubesAppVm.py | ||
01QubesDisposableVm.py | ||
01QubesHVm.py | ||
02QubesTemplateHVm.py | ||
000QubesVm.py | ||
003QubesTemplateVm.py | ||
005QubesNetVm.py | ||
006QubesAdminVm.py | ||
006QubesProxyVm.py | ||
Makefile | ||
README.txt |
This directory contains Qubes core modules. It will be loaded in lexicographical order, use numeric prefix to force load ordering. 0* - Qubes base modules 00* - Qubes core VM classes