Commit Graph

7 Commits

Author SHA1 Message Date
Joanna Rutkowska
81917388ef vm: disable forwarding when iptables rules are being (re)applied 2011-08-18 18:47:08 +02:00
Joanna Rutkowska
61d88dd8df proxyvm: remove unused code 2011-08-18 18:04:38 +02:00
Joanna Rutkowska
536f795d48 proxyvm: allow for user defined hooks after iptables restore 2011-08-18 15:02:30 +02:00
Rafal Wojtczuk
bcb4dfe007 firewall: call iptables-restore once per domain (#311)
qubes.py now places rules for each domain in a separate key under
/local/domain/fw_XID/qubes_iptables_domainrules/
plus the header in /local/domain/fw_XID/qubes_iptables_header.
/local/domain/fw_XID/qubes_iptables is now just a trigger.
So, if iptables-restore fails dues to e.g. error resolving a domain name
in a rules for a domain, then only this domain will not get connectivity,
others will work fine.
2011-07-29 16:50:12 +02:00
Marek Marczykowski
60b86de2ca vm: add -qubes suffix to xenstore-watch to not conflict with xen standard tool 2011-06-07 15:58:55 +02:00
Marek Marczykowski
9cfa24c8b8 proxyvm: directly display error msg beside of writing it to xenstore 2011-06-04 02:54:17 +02:00
Marek Marczykowski
c87b15ba2a NetVM, AppVM, ProxyVM from single template - VM side
Modify VM packages to:
- do not conflicts
- starts services if its VM type need it

Added core-proxyvm (firewall) and core-commonvm (common parts) packages.
2011-03-11 01:38:04 +01:00