description => "Verbose output.",
type => "boolean",
optional => 1,
- default => 0,
},
},
},
code => sub {
my ($param) = @_;
+ my $rpcenv = PVE::RPCEnvironment::get();
+
+ $param->{verbose} = 1
+ if !defined($param->{verbose}) && ($rpcenv->{type} eq 'cli');
+
my $code = sub {
my $ruleset = PVE::Firewall::compile();
PVE::Firewall::get_ruleset_status($ruleset, 1) if $param->{verbose};
my ($param) = @_;
my $code = sub {
- PVE::Firewall::compile_and_start($param->{verbose});
+ my $ruleset = PVE::Firewall::compile();
+ PVE::Firewall::apply_ruleset($ruleset, $param->{verbose});
};
PVE::Firewall::run_locked($code);
my $code = sub {
my $chash = PVE::Firewall::iptables_get_chains();
my $cmdlist = "*filter\n";
- my $rule = "INPUT -j proxmoxfw-INPUT";
+ my $rule = "INPUT -j PVEFW-INPUT";
if (PVE::Firewall::iptables_rule_exist($rule)) {
$cmdlist .= "-D $rule\n";
}
- $rule = "OUTPUT -j proxmoxfw-OUTPUT";
+ $rule = "OUTPUT -j PVEFW-OUTPUT";
if (PVE::Firewall::iptables_rule_exist($rule)) {
$cmdlist .= "-D $rule\n";
}
- $rule = "FORWARD -j proxmoxfw-FORWARD";
+ $rule = "FORWARD -j PVEFW-FORWARD";
if (PVE::Firewall::iptables_rule_exist($rule)) {
$cmdlist .= "-D $rule\n";
}