瀏覽代碼

Progress update

Giulio 2 年之前
父節點
當前提交
dbb1fdca52
共有 1 個文件被更改,包括 11 次插入6 次删除
  1. 11 6
      Readme.md

+ 11 - 6
Readme.md

@@ -22,6 +22,12 @@ First develop and document the part related to manual port forwarding since it i
  * https://www.qubes-os.org/doc/firewall/
  * https://www.qubes-os.org/doc/config-files/
 
+### Dev Repositories
+ * https://git.lsd.cat/Qubes/core-admin
+ * https://git.lsd.cat/Qubes/core-admin-client
+ * https://git.lsd.cat/Qubes/core-agent-linux
+
+
 ### Main components involved
  1. [Firewall GUI in "Settings" (qubes-manager)](https://github.com/QubesOS/qubes-manager/blob/master/qubesmanager/firewall.py)
  2. [CLI interface available via `qvm-firewall` (core-admin-client)](https://github.com/QubesOS/qubes-core-admin-client/blob/master/qubesadmin/tools/qvm_firewall.py)
@@ -150,21 +156,20 @@ It is important to note that in the last case, it is just a standard case of int
 ### Implementation Roadmap
 
 
-
  1. ✔️ In `core-admin-client/qubesadmin/firewall.py` firewall.py > The code
 needs to support the new options for the rule (action=forward
 frowardtype=<internal/external> srcports=443-443 srchosts=0.0.0.0/0
  2. ✔️ In `core-admin/qubes/firewall.py` -> The code needs to support the same
 options as the point above
- 3. 🚧 In `core-admin/qubes/vm/mix/net.py` -> The most important logic goes
+ 3. ✔️ In `core-admin/qubes/vm/mix/net.py` -> The most important logic goes
 here. Here there is the need to resolve the full network chain for
 external port forwarding. From here it is possible to add the respective
 rules to the QubesDB of each NetVM in he chain and trigger a reload event.
- 4.  In `core-agent-linux/qubesagent/firewall.py` -> Here goes the logic for
+ 4. 🚧 In `core-agent-linux/qubesagent/firewall.py` -> Here goes the logic for
 building the correct syntax for iptables or nft and the actual execution
- 5. ❌ GUI\
-\
-\
+ 5. ❌ GUI
+ 6. ❌ Tests
+
 
 ### Required rules
 #### External