12345678910111213141516171819202122232425262728293031 |
- #!/bin/bash
- set -e
- PIDFILE=/var/run/qubes/qubes_netwatcher.pid
- CURR_NETCFG=""
- # PIDfile handling
- [[ -e $PIDFILE ]] && kill -s 0 $(<$PIDFILE) 2>/dev/null && exit 0
- echo $$ >$PIDFILE
- trap 'exit 0' SIGTERM
- while true; do
- NET_DOMID=$(/usr/bin/xenstore-read qubes_netvm_domid)
- if [[ -n "$NET_DOMID" ]] && [[ $NET_DOMID -gt 0 ]]; then
- UNTRUSTED_NETCFG=$(/usr/bin/xenstore-read /local/domain/$NET_DOMID/qubes_netvm_external_ip || :)
- # UNTRUSTED_NETCFG is not parsed in any way
- # thus, no sanitization ready
- # but be careful when passing it to other shell scripts
- if [[ "$UNTRUSTED_NETCFG" != "$CURR_NETCFG" ]]; then
- /sbin/service qubes_firewall stop
- /sbin/service qubes_firewall start
- CURR_NETCFG="$UNTRUSTED_NETCFG"
- /usr/bin/xenstore-write qubes_netvm_external_ip "$CURR_NETCFG"
- fi
- /usr/bin/xenstore-watch-qubes /local/domain/$NET_DOMID/qubes_netvm_external_ip
- else
- /usr/bin/xenstore-watch-qubes qubes_netvm_domid
- fi
- done
|