-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Documentation should not state that user firewall config scripts are executed at every firewall change #6291
Documentation should not state that user firewall config scripts are executed at every firewall change #6291
Comments
It sounds like there is still a question of whether the bug lies in the docs or in the firewall scripts not executing. In other words: which one is the intended behavior: the current behavior, or the behavior described in the docs? CC: @marmarek |
On Fri, Dec 18, 2020 at 05:22:13PM -0800, Andrew David Wong wrote:
It sounds like there is still a question of whether the bug lies in the docs or in the firewall scripts not executing. In other words: which one is the intended behavior: the current behavior, or the behavior described in the docs? CC: @marmarek
The bug is in the docs - the current behaviour is by design.
|
Thanks for the quick answer, @unman. @icequbes1, would you like to help us fix this by submitting a doc PR? |
@andrewdavidwong Yes, I will submit a doc PR. In addition to that I will submit a PR against qubes-core-agent-4.0.58 so the commentary accurately reflects when the script will be invoked.
Based on #3260, and more specifically this1 comment from @marmarek, the current behavior matches the design that was stated, so I do not perceive this as a coding bug. The "bug", if you will, is to address changing existing users' understanding of what should should live in This issue was opened as I had a Perhaps the ability to execute the script after firewall changes is now an enhancement, but the core of this issue is to ensure current operation is properly conveyed. |
@icequbes1 Writing your own nftables rules is fine, since nftables has an unlimited number of tables and you can pick your own names for them. |
@DemiMarie Yes, however my use case involved modifying rules on the I assumed I could rely on my firewall user script to be executed after the rule updates performed by It would be useful in my case for
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The component
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The component
|
Qubes OS version
R4.0
Affected component(s) or functionality
Documentation
Brief summary
It appears prior to R4.0, user-created scripts could be populated with extra commands to run upon every update of firewall rules for AppVMs that had qubes-firewall service enabled.
This does not appear to be the case anymore, as:
/rw/config/qubes-firewall.d/*
scripts are only executed in aqubes-firewall
-enabled AppVM whenqubes-firewall
first runs./rw/config/qubes-firewall-user-script
is only executed in aqubes-firewall
-enabled AppVM whenqubes-firewall
first runs.This leads to confusion for users manually configuring firewall rules and are relying on the 'executed after every update' statements to be true.
Expected behavior
Users assume their firewall scripts are getting executed upon every firewall change.
Actual behavior
Firewall scripts are only executed once. Any updates to these scripts are not applied unless the firewall AppVM reboots (or a
systemctl restart qubes-firewall
command).Additional context
Contents of the default
/rw/config/qubes-firewall-user-script
as created by/usr/lib/qubes/init/setup-rw.sh
:Further documentation stating the use of
/rw/config/qubes-firewall-user-script
:This issue is not a report that user scripts are being ignored - only that trigger for their execution is not properly conveyed to users, which may lead users to have improper assumptions. At worst case, their perceived commands are not executed until the firewall AppVM is restarted if they relied on the commands to execute after performing a firewall rule update.
Solutions you've tried
Remove the idea that these scripts are executed upon every change and documentation matches implementation.
Relevant documentation you've consulted
Related, non-duplicate issues
The text was updated successfully, but these errors were encountered: