Commit Graph

11 Commits

Author SHA1 Message Date
Joanna Rutkowska
81917388ef vm: disable forwarding when iptables rules are being (re)applied 2011-08-18 18:47:08 +02:00
Joanna Rutkowska
61d88dd8df proxyvm: remove unused code 2011-08-18 18:04:38 +02:00
Joanna Rutkowska
536f795d48 proxyvm: allow for user defined hooks after iptables restore 2011-08-18 15:02:30 +02:00
Rafal Wojtczuk
bcb4dfe007 firewall: call iptables-restore once per domain (#311)
qubes.py now places rules for each domain in a separate key under
/local/domain/fw_XID/qubes_iptables_domainrules/
plus the header in /local/domain/fw_XID/qubes_iptables_header.
/local/domain/fw_XID/qubes_iptables is now just a trigger.
So, if iptables-restore fails dues to e.g. error resolving a domain name
in a rules for a domain, then only this domain will not get connectivity,
others will work fine.
2011-07-29 16:50:12 +02:00
Marek Marczykowski
60b86de2ca vm: add -qubes suffix to xenstore-watch to not conflict with xen standard tool 2011-06-07 15:58:55 +02:00
Marek Marczykowski
9cfa24c8b8 proxyvm: directly display error msg beside of writing it to xenstore 2011-06-04 02:54:17 +02:00
Rafal Wojtczuk
748369c8ad qubes_netwatcher: expand a note about NETCFG untrusted origin 2011-05-09 16:26:48 +02:00
Rafal Wojtczuk
5923741c83 qubes_netwatcher: add a note about NETCFG untrusted origin 2011-05-09 16:23:52 +02:00
Tomasz Sterna
c9205a6b4b Propagate qubes_netvm_external_ip up in ProxyVM. #116 2011-03-26 11:33:04 +01:00
Marek Marczykowski
01458104cb Merge commit 'e2d52a27e810522c41720bb17b1f4f52f1fe2e6a'
Conflicts:
	dom0/qvm-core/qubes.py
	fwvm/init.d/qubes_firewall
2011-03-11 23:32:13 +01:00
Marek Marczykowski
c87b15ba2a NetVM, AppVM, ProxyVM from single template - VM side
Modify VM packages to:
- do not conflicts
- starts services if its VM type need it

Added core-proxyvm (firewall) and core-commonvm (common parts) packages.
2011-03-11 01:38:04 +01:00