From bf68c18c5b460d7fe4ddb21dd595a66b9f2a4ab4 Mon Sep 17 00:00:00 2001 From: lamuse Date: Mon, 30 Jan 2017 11:06:38 +0100 Subject: [PATCH] some minor changes and typo corrections --- readme.lamuse | 6 ++---- .../site-packages/qubes/modules/007FortressQubesProxyVm.py | 2 +- 2 files changed, 3 insertions(+), 5 deletions(-) diff --git a/readme.lamuse b/readme.lamuse index 27aea0e..a85bda6 100644 --- a/readme.lamuse +++ b/readme.lamuse @@ -1,9 +1,7 @@ -Great work, Rudd-O! - changes to src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py: If the server VM gets firewall rules besides of "allow all", those rules were only honored for outgoing traffic in the original code. -My code also creates rules for incoming traffic in the proxy VM and the server VM. +The changed code also creates rules for incoming traffic in the proxy VM and in the server VM. It may not be perfect, but it works for me. -My code is GPL, of course. +btw, code is GPL diff --git a/src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py b/src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py index 46335da..c403ee2 100644 --- a/src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py +++ b/src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py @@ -102,7 +102,7 @@ class QubesProxyVm(OriginalQubesProxyVm): ruletext += "/{0}".format(rule["netmask"]) if rule["proto"] is not None and rule["proto"] != "any": - ruletext += " -p {0}".format(rule["proto"]), fuer + ruletext += " -p {0}".format(rule["proto"]) if rule["portBegin"] is not None and rule["portBegin"] > 0: ruletext += " --dport {0}".format(rule["portBegin"]) if rule["portEnd"] is not None and rule["portEnd"] > rule["portBegin"]: