Go to file
Rafal Wojtczuk bcb4dfe007 firewall: call iptables-restore once per domain (#311)
qubes.py now places rules for each domain in a separate key under
/local/domain/fw_XID/qubes_iptables_domainrules/
plus the header in /local/domain/fw_XID/qubes_iptables_header.
/local/domain/fw_XID/qubes_iptables is now just a trigger.
So, if iptables-restore fails dues to e.g. error resolving a domain name
in a rules for a domain, then only this domain will not get connectivity,
others will work fine.
2011-07-29 16:50:12 +02:00
appvm Add comments to policy files. 2011-07-22 16:11:03 +02:00
common dom0+vm: download updates as normal user (#198) 2011-07-17 01:20:13 +02:00
netvm Revert "Run nm-applet as normal user" 2011-04-29 02:32:55 +02:00
proxyvm firewall: call iptables-restore once per domain (#311) 2011-07-29 16:50:12 +02:00
rpm_spec vm: move dom0-updates dir to core-appvm package (#198) 2011-07-17 01:20:13 +02:00
.gitignore gitignore files - add build products 2011-03-06 14:06:24 +01:00
LICENSE Added LICENSE 2010-04-05 21:21:27 +02:00
Makefile Makefile: don't autoupdate yum repo after copying rpms there 2011-06-30 20:47:48 +02:00
version_vaio_fixes core-dom0-vaio-fixes is now a separate package 2011-05-10 11:14:41 +02:00
version_vm version 1.6.9 2011-07-17 01:54:27 +02:00