mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-13 16:29:59 -05:00
config-files: fix qvm-features -> service
This commit is contained in:
parent
4735cec592
commit
9e6bc2d2bc
@ -31,7 +31,7 @@ The scripts here all run as root.
|
||||
|
||||
- `/rw/config/qubes-ip-change-hook` - script runs in NetVM after every external IP change and on "hardware" link status change.
|
||||
|
||||
- (R4.0 only) in ProxyVMs/AppVMs with `qvm-features <vmname> qubes-firewall true`, scripts placed in the following directories will be executed in the listed order followed by `qubes-firewall-user-script` after each firewall update.
|
||||
- (R4.0 only) in ProxyVMs (or AppVMs with `qubes-firewall` service enabled), scripts placed in the following directories will be executed in the listed order followed by `qubes-firewall-user-script` after each firewall update.
|
||||
Good place to write own custom firewall rules.
|
||||
|
||||
~~~
|
||||
@ -40,7 +40,7 @@ The scripts here all run as root.
|
||||
/rw/config/qubes-firewall-user-script
|
||||
~~~
|
||||
|
||||
- (R3.2 only) `/rw/config/qubes-firewall-user-script` - script runs in ProxyVM/AppVM with `qvm-features <vmname> qubes-firewall true` after each firewall update.
|
||||
- (R3.2 only) `/rw/config/qubes-firewall-user-script` - script runs in ProxyVM (or AppVM with `qubes-firewall` service enabled) after each firewall update.
|
||||
Good place to write own custom firewall rules.
|
||||
|
||||
- `/rw/config/suspend-module-blacklist` - list of modules (one per line) to be unloaded before system goes to sleep.
|
||||
|
Loading…
Reference in New Issue
Block a user