core-agent-linux/network/qubes-netwatcher

32 lines
923 B
Plaintext
Raw Normal View History

2015-02-05 03:14:41 +01:00
#!/bin/sh
2011-03-11 19:39:52 +01:00
set -e
PIDFILE=/var/run/qubes/qubes-netwatcher.pid
2011-03-11 19:39:52 +01:00
CURR_NETCFG=""
# PIDfile handling
2015-02-05 03:14:41 +01:00
[ -e "$PIDFILE" ] && kill -s 0 $(cat "$PIDFILE") 2>/dev/null && exit 0
2011-03-11 19:39:52 +01:00
echo $$ >$PIDFILE
2015-02-05 03:14:41 +01:00
trap 'exit 0' TERM
2011-03-11 19:39:52 +01:00
while true; do
NET_DOMID=$(xenstore-read qubes-netvm-domid || :)
2015-02-05 03:14:41 +01:00
if [ -n "$NET_DOMID" ] && [ $NET_DOMID -gt 0 ]; then
UNTRUSTED_NETCFG=$(xenstore-read /local/domain/$NET_DOMID/qubes-netvm-external-ip || :)
# UNTRUSTED_NETCFG is not parsed in any way
# thus, no sanitization ready
# but be careful when passing it to other shell scripts
2015-02-05 03:14:41 +01:00
if [ "$UNTRUSTED_NETCFG" != "$CURR_NETCFG" ]; then
/sbin/service qubes-firewall stop
/sbin/service qubes-firewall start
CURR_NETCFG="$UNTRUSTED_NETCFG"
xenstore-write qubes-netvm-external-ip "$CURR_NETCFG"
2011-03-11 19:39:52 +01:00
fi
xenstore-watch -n 3 /local/domain/$NET_DOMID/qubes-netvm-external-ip qubes-netvm-domid
2011-03-11 19:39:52 +01:00
else
xenstore-watch -n 2 qubes-netvm-domid
2011-03-11 19:39:52 +01:00
fi
done