core-agent-linux/network
Frédéric Pierret (fepitre) 73ed5e85fc
Handle network hooks located in /rw/config/network-hooks.d
Example:
/rw/config/network-hooks.d/test.sh
\#!/bin/bash

command="$1"
vif="$2"
ip="$3"

if [ "$ip" == '10.137.0.100' ]; then
    case "$command" in
        online)
            ip route add 192.168.0.100 via 10.137.0.100
            ;;
        offline)
            ip route del 192.168.0.100
            ;;
    esac
fi
2019-05-30 11:40:40 +02:00
..
00notify-hook
30-qubes-external-ip
80-qubes.conf Stop Debian templates from forwarding by default. 2018-02-06 23:10:28 +00:00
ip6tables network: have safe fallback in case of qubes-firewall crash/error 2017-11-20 01:56:14 +01:00
ip6tables-enabled network: IPv6-enabled firewall 2017-12-07 01:41:55 +01:00
iptables network: have safe fallback in case of qubes-firewall crash/error 2017-11-20 01:56:14 +01:00
iptables-updates-proxy
network-manager-prepare-conf-dir Make ShellCheck happy 2019-05-21 17:21:51 +02:00
nm-30-qubes.conf
qubes-fix-nm-conf.sh
qubes-iptables Fixes issue #3939 2018-05-31 14:02:15 -04:00
qubes-nmhook network: reload DNS only on "up" event from NetworkManager 2018-02-10 22:12:44 +01:00
qubes-setup-dnat-to-ns
setup-ip setup-ip: handle default conf if /qubes-mac returns empty value 2019-05-21 17:32:09 +02:00
show-hide-nm-applet.desktop
show-hide-nm-applet.sh
tinyproxy-updates.conf
udev-qubes-network.rules
update-proxy-configs make apt-get apt-transport-tor broken in Qubes non-networked TemplateVMs 2017-12-16 19:17:38 +01:00
updates-blacklist
vif-qubes-nat.sh
vif-route-qubes Handle network hooks located in /rw/config/network-hooks.d 2019-05-30 11:40:40 +02:00