aboutsummaryrefslogtreecommitdiffstats
path: root/tools/examples/xend-config.sxp
Commit message (Collapse)AuthorAgeFilesLines
* tools/xend: Fix performance of xend with more than 10000 FC device paths"Dube, Lutz"2010-07-231-0/+8
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | On server startup xend start or a later xend restart needs approx. 30 min to start/restart. Without attached FC devices xend start/restart needs only some seconds. server type: Fujitsu Primergy RX600-S5 The time gets lost in xen/xend/XendNode.py line 329 while calling vscsi_util.get_all_scsi_device(). 329 for pscsi_record in vscsi_util.get_all_scsi_devices(): 330 scsi_id = pscsi_record['scsi_id'] 331 if scsi_id: 332 saved_HBA_uuid = None I think, in most cases we don't need all the PSCSI devices registered in xend, but only a few of it. So a good solution for this perforamce issue is to scan only the SCSI device paths we need, controlled by a new option in xend-config.sxp. I have made a patch to allow specification of scsi devices we need in xend in the config file xend-config.sxp. The new options pscsi-device-mask expects a list of device ids oder partial device ids like the option of lsscsi, e.g. (pscsi-device-mask ('<partial-dev-id1' 'partial-dev-id2' ...)) Without this option set in xend-config.sxp or if lsscsi is not support, all device paths are process like today. Signed-off-by: Lutz Dube Lutz.Dube@ts.fujitsu.com Comment from Masaki Kanno <kanno.masaki@jp.fujitsu.com>: "Well done" Committed-by: Ian Jackson <ian.jackson@eu.citrix.com>
* xend: Do not mess with bridge if admin has set one up alreadyKeir Fraser2010-06-151-2/+17
| | | | | | | | | | | | | | | | | | | | | | | | | Previously, the default "network-script", /etc/xen/scripts/network-bridge, would attempt to do its horrid work even if you had already set everything up in /etc/network/interfaces. Setting up your bridge in /etc/network/interfaces is: * easy * required for libxl since libxl never does it for you * not a fragile piece of lunacy * properly documented * the way everyone would expect it to work In this small patch we make it so that the default config for xend doesn't mess about on startup if you already have a bridge, and doesn't mess about on shutdown unless your first-named bridge (eth0 or xenbr0, normally) doesn't also have a physical interface named p<whatever> (peth0 or pxenbr0) enslaved to it. The latter test is not ideal but will hopefully do from now until the time xend finally dies. We also fix the "documentation" - ie, the comments in the default xend-config.sxp - to correspond to reality. Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com>
* xend: Add interface name definition support for xend-relocation-addressKeir Fraser2010-05-251-0/+2
| | | | | | | | | | | | | | | | | | | Add a new feature for xend-relocation-address option to support definition by interface name which can be useful for people having e.g. a cluster environment with multiple network interfaces on all of the machines with only one reserved to be registered to a private cluster network. This way they won't need to specify the relocation address manually on all the machines but just simple providing the interface name to get the IP address from would do the job (all the machines have to have this interface named the same to make it working, of course). Technically it reads the interface name and gets its IP address using ioctl call of SIOCGIFADDR and if the interface doesn't have the address, i.e. if non-existing interface or hostname was provided the original ifname is returned to preserve the old behaviour. Signed-off-by: Michal Novotny <minovotn@redhat.com>
* xend: Memory pool for pv guest on systems with >128G memoryKeir Fraser2009-12-021-0/+10
| | | | | | | | | | | | | | | | | | | | | | | The main idea of this patch is: 1) The admin sets aside some memory below 128G for 32-bit paravirtual domain creation (via dom0_mem=-<value> in kernel comand line). 2) The admin also explicitly states to the tools (i..e xend) how much memory is supposed to be left untouched by 64-bit domains 3) If a 32-bit pv DomU gets created, no ballooning ought to be necessary (since if it is, no guarantee can be made about the address range of the memory ballooned out), and memory gets allocated from the reserved range. 4) Upon 64-bit (or 32-bit HVM or HVM) DomU creation, the tools determine the amount of memory to be ballooned out of Dom0 by adding the amount needed for the new guest and the amount still in the reserved pool (and then of course subtracting the total amount of memory the hypervisor has available for guest use). Signed-off-by: james song (wei) <jsong@novell.com>
* xend: passthrough: add an option pci-passthrough-strict-checkKeir Fraser2009-09-071-0/+7
| | | | | | | | | | | | | | | | | Currently when assigning device to HVM guest, we use the strict check for HVM guest by default.(For PV guest we use loose check automatically if necessary.) When we assign device to HVM guest, if we meet with the co-assignment issues or the ACS issue (see changeset 20081: 4a517458406f), we could try changing the option to 'no' -- however, we have to realize this may incur security issue and we can't make sure the device assignment could really work properly even after we do this. The option is located in /etc/xen/xend-config.sxp: (pci-passthrough-strict-check yes) Signed-off-by: Dexuan Cui <dexuan.cui@intel.com>
* Fix a couple of comment typos.Keir Fraser2009-07-151-1/+1
| | | | Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
* xend: get rid of hardcoded path in xend config fileKeir Fraser2009-06-301-7/+7
| | | | | | | | * Change default settings to relative pathes. * Make xend to prepend install directory if entries have no absolute * path Signed-off-by: Christoph Egger <Christoph.Egger@amd.com>
* xend: Make hotplug script timeouts configurableKeir Fraser2009-05-191-0/+6
| | | | | | | | | | | | | | In some configurations, when dom0 is busy with I/O, it may take several minutes to complete all hotplug scripts required when a new domain is being created. As device create timeout is set to 100 seconds, users get "hotplug scripts not working" error instead of a new domain. This patch makes both DEVICE_CREATE_TIMEOUT and DEVICE_DESTROY_TIMEOUT configurable in xend-config.sxp to allow users to easily adapt hotplug timeouts to their environment. Signed-off-by: Jiri Denemark <jdenemar@redhat.com>
* xend: Accept udev events and update physical resource informationKeir Fraser2009-03-171-0/+1
| | | | | | | | | When a udev event is received, udevevent.py parses the udev data and tells XendNode.py to update the physical resource information. This patch also add a boolean parameter 'xend-udev-event-server', to let users indicate whether we should enable this function or not. Signed-off-by: Yosuke Iwamatsu <y-iwamatsu@ab.jp.nec.com>
* xsm, python tools: remove autogenerated xsm.pyKeir Fraser2008-09-041-0/+4
| | | | | | | | | | | | | | | | | | | | | | - The patch does away with the autogenerated xsm.py file and introduces a config parameter in xend-config.sxp to determine the security module. The parameter is (xsm_module_name {acm, dummy, flask}). The default setting/option is dummy. .hgignore is also updated to stop ignoring xsm.py on commits. - The patch has created an xsconstant for XS_POLICY_FLASK and updated the toolchain to check the instance of XS_POLICY_USE. XS_POLICY_USE evalauates to XS_POLICY_FLASK or XS_POLICY_ACM or XS_POLICY_DUMMY depending on configuration. - Flask relies on the current value of ssidref returned by dominfo to ensure that the label to sid mapping is consistent. ssidref had been pop'ed from the dominfo object. The patch addresses this issue. - Flask python module style cleanups. Signed-off-by: George Coker <gscoker@alpha.ncsc.mil>
* xend: Expose persistent domain path in xend conf fileKeir Fraser2008-08-061-0/+4
| | | | | | | | This patch exposes the persistent (aka managed) domain path in xend configuration file. This option is already supported in XendOptions but is not annotated in the configuration file. Signed-off-by: Jim Fehlig <jfehlig@novell.com>
* xend: improve the rotation of qemu-dm logfiles.Keir Fraser2008-07-011-0/+3
| | | | Signed-off-by: Yosuke Iwamatsu <y-iwamatsu@ab.jp.nec.com>
* Make ssl relocation server listen on different portKeir Fraser2008-05-231-5/+9
| | | | | | | | | | | | | | | | | | | This patch makes ssl relocation server listen on 8003 if enabled. Whether to start ssl relocation server now controlled by xend-relocation-ssl-server. So ssl and non-ssl relocation server can run simultaneously. You can also only start ssl server or only start non-ssl relocation server. When mix deploy xen 3.2 server (has no ssl support) and 3.3 servers, start ssl and non-ssl relocation server simultaneously can keep backward compatibility. It's also more reasonable to have separate ports for ssl and non-ssl. In this patch, also renames xend-relocation-tls to xend-relocation-ssl. Signed-off-by: Zhigang Wang <zhigang.x.wang@oracle.com>
* Fix xend config typosKeir Fraser2008-05-011-3/+3
| | | | Signed-off-by: Zhigang Wang <zhigang.x.wang@oracle.com>
* Add SSL/TLS support to relocationKeir Fraser2008-05-011-0/+9
| | | | | | | | | | | | * SSL/TLS support is disabled by default, as other server did. * If "xend-relocation-server-ssl-key-file" and "xend-relocation-server-ssl-cert-file" exist, SSL/TLS is enabled automatically. * "xend-relocation-tls" is used by relocation client only. Signed-off-by: Zhigang Wang <zhigang.x.wang@oracle.com>
* Split the meaning of "dom0-min-mem = 0" to a new option.Keir Fraser2008-04-071-4/+7
| | | | | | | | I have written a patch to split the current meaning of "dom0-min-mem = 0" to a new option "enable-dom0-ballooning". Signed-off-by: Masaki Kanno <kanno.masaki@jp.fujitsu.com> Signed-off-by: Keir Fraser <keir.fraser@citrix.com>
* Remove outdated comments concerning Xen API in xend configuration file.Keir Fraser2008-01-251-3/+1
| | | | Signed-off-by: Jim Fehlig <jfehlig@novell.com>
* qemu vnc auth 4/4: XenD config for VNC TLS protocolKeir Fraser2007-10-301-0/+30
| | | | | | | | | | | | | | | This patch adds support to XenD for configuring the previously added TLS encryption and x509 certificate validation. At this time I have only enabled this config to be done system-wide via /etc/xen/xend-config.sxp. Since it requires the admin to add certificates on the local FS, there's not much point in making it per VM. The x509 certificates are located in /etc/xen/vnc. Since this requires a special VNC client program (GTK-VNC, virt-viewer/virt-manager or VeNCrypt viewer) the use of TLS is disabled by default. Admins can enable it if they are using a suitable client. Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
* xend, acm: Trigger a script when a resource's label changesKeir Fraser2007-10-291-1/+2
| | | | | | | | This patch triggers a script when a resource's label changes. The xend config file should provide a variable 'resource-label-change-script' that can then be launched. Signed-off-by; Stefan Berger <stefanb@us.ibm.com>
* hvm: Add global default keymap settingkfraser@localhost.localdomain2007-07-061-0/+6
| | | | | | | Add global default keymap setting to be used when a VM does not have a keymap configuration set. Signed-off-by: Pat Campbell <plc@novell.com>
* [NET] Remove netloop from network bridge init scripts.kfraser@localhost.localdomain2007-06-041-3/+1
| | | | | | The scripts are partly based on work by Daniel P. Berrange. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
* Added HTTPS support to Xend. There are new configuration options for theEwan Mellor2007-03-271-1/+13
| | | | | | | Xen-API and legacy XML-RPC servers to set key and certificate files, and xm simply needs to be configured use an https rather than an http URL. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* [XEND] Allow TCP XMLRPC address:port to be configured, if enabled.Alastair Tse2007-01-251-0/+6
| | | | Signed-off-by: Alastair Tse <atse@xensource.com>
* Added configuration for authentication through Xen-API -- it can now be setEwan Mellor2006-11-281-14/+24
| | | | | | | | | to use PAM, or to be turned off entirely, on a listener by listener basis. Listen on a different unix domain socket for the Xen-API server, so that it can co-exist with the others. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Implement an "allowed hosts" mechanism for the XML-RPC server layer, usingEwan Mellor2006-11-281-0/+26
| | | | | | | code from the relocation protocol handling and some plumbing. Add a new configuration entry for the Xen-API server, including use of this mechanism. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Fix comment.Ewan Mellor2006-11-011-1/+1
| | | | Signed-off-by: Ewan Mellor <ewan@xensource.com>
* [HVM] Implement password authentication of VNC connections.kfraser@localhost.localdomain2006-10-201-0/+4
| | | | | | | | | | | | | The specification is as mentioned at http://lists.xensource.com/archives/html/xen-devel/2006-09/msg00666.html (However, password came to describe plain text) The difference is follows. - protocol_authtype() without the necessity was deleted. - The check on the protocol version was added. - And, some small modification. Signed-off-by: Masami Watanabe <masami.watanabe@jp.fujitsu.com>
* [HVM/vncserver] Implement a 'vnclisten' option to limit the interfaceChristian Limpach2006-10-051-0/+5
| | | | | | | | | | | | | | | | | | that the VNC server from qemu listens on. Defaults to only listen on 127.0.0.1 The old behaviour (listen on all interfaces) can be restored, by - changing the system-wide default in /etc/xen/xend-config.sxp by adding: (vnc-listen '0.0.0.0') - changing individual domain config files by adding: vnclisten="0.0.0.0" Also allows specifying the hostname associated with an interface to limit to that interface. Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
* [XEND] Move all of the various log files created by xen tokaf24@localhost.localdomain2006-08-281-1/+1
| | | | | | | | be under /var/log/xen instead of under /var/log directly. This has the advantage of cleaning things up a little and also can make it easier to restrict the permissions needed by xend. Signed-off-by: Jeremy Katz <katzj@redhat.com>
* Fix 2 issues when creating HVM guests:kfraser@localhost.localdomain2006-08-101-1/+1
| | | | | | | | | 1) xend can't start due to xend-config.sxp 2) qemu dm option vncunused should be effective only when vnc is turned on. Signed-off-by: Xin Li <xin.b.li@intel.com>
* Add RH-ish localhost to xend-relocation-hosts-allow in xend-config.sxpkaf24@firebug.cl.cam.ac.uk2006-08-081-1/+1
| | | | | Signed-off-by: Jim Dykman <dykman@us.ibm.com>
* This patch enables external devices, such as for example a mounted hardemellor@leeni.uk.xensource.com2006-04-141-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | drive image or a TPM, to be migrated to a remote machine. The patch hooks into the checkpointing (XendCheckpoint.py) code and performs migration in 4 different steps: In a 1st step (step = 0 in the code) migration of all devices of a domain is 'tested', that means their driver implementations (blkif.py, netif.py, tpmif.py, usbif.py, pciif.py) are queried whether migration is possible at all. Currently all device representations respond with a 'yes' (=0), although probably a VM mounting a hard drive partition should respond with a 'no' (-1) already. This first step is a quick check to see whether devices can be migrated. The 2nd step is to do whatever can be done before the domain is suspended. At this point migration of the device could be initiated, if at all possible. The 3rd step is to migrate a device after the domain has been suspended, meaning that it is not scheduled anymore and the VM is 'settled'. All devices are called again and a good implementation would initiate the migration in a background process to achieve as much concurrency as possible. The 4th step is to synchronize with the 3rd step. At this point the implementor has to make sure that anything that was initiated in step 3 has completed. Once all steps 4 have been processed, the VM will resume on the remove machine. I have implemented hooks for migration of a virtual TPM in xen/xend/server/tpmif.py. These hooks call a configurable external migration tool using the os.popen() call with a fixed command line parameter set. The implementation refuses to migrate a VM attached to a virtual TPM if no tool has been provided for migration. All other devices do not currently overload the 'migrate' method defined in the DevController.py and therefore will just let migration happen. I have added hooks for error recovery such that whatever part of migration has been initiated can be rolled back when any of the devices fail to migrate in one of the steps. The interface (in tpmif.py) to the external application now uses os.popen() to allow error handling by reading the application's output. Signed-off-by: Stefan Berger <stefanb@us.ibm.com>
* Added example config entries for xend-tcp-xmlrpc-server andemellor@leeni.uk.xensource.com2006-03-231-1/+3
| | | | | | | | xend-unix-xmlrpc-server. Deprecate the SXP-based servers, and disable them by default. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Rather than require config changes if you aren't using eth0, use theemellor@leeni.uk.xensource.com2006-02-101-2/+2
| | | | | | | | | | default network device available no matter the name. It can still be configured if you want a specific network device. Patch by Bill Nottingham <notting@redhat.com>. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Xend http access turned off by default.nivedita@hex2005-12-161-5/+4
| | | | | | Signed-off-by: Nivedita Singhvi (niv@us.ibm.com)
* Added xend-relocation-hosts-allow option.emellor@leeni.uk.xensource.com2005-12-121-1/+14
| | | | | Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Update xend-config.sxp so that dom0-min-mem is 196MB by default, as this is ↵iap10@freefall.cl.cam.ac.uk2005-12-031-1/+1
| | | | | | | | | rather more user friendly. Also do some minor fixes to the README Signed-off-by: ian@xensource.com
* Removed the event server, and all it entails. This is unused, and a big pileemellor@leeni.uk.xensource.com2005-10-311-3/+0
| | | | | | | of crusty rubbish. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Added xen-script-common.sh, for functions common to all scripts, not just theemellor@leeni.uk.xensource.com2005-10-301-13/+56
| | | | | | | | | | | | | | | | | | | | | | | | | | hotplug ones. Added evalVariables and findCommand functions to that, which we use to clarify the handling of variables being passed in as command line variables. Make vif-bridge able to find the bridge for itself if only one bridge is in use. This means that it is not necessary to specify a bridge in many configurations. Allow the bridge to be specified on the command line, meaning that a default may be provided in the xend-config.sxp if desired. Added xenstore_read_default to xen-hotplug-common.sh, which reads from the store but uses a given default if the path in the store is not present. This is used by vif-bridge to allow the store details (i.e. those given to xm create) to override the default value given in the xend-config.sxp. Remove vif-bridge setting -- the value can be specified on the vif-script command line if necessary. Added examples for network-nat/vif-nat. Added lots of big comments. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Tidy xend-config.sxp, removing entries that haven't been used since theemellor@leeni.uk.xensource.com2005-10-211-25/+43
| | | | | | | | | | | | | | hotplugging stuff was introduced (block-*, console-port-base, console-address) and introducing entries for options that have been present for ages (xend-{http,unix,relocation}-server, xend-unix-path, xend-relocation-address, enable-dump). Remove vif-antispoof, as Vifctl no longer passes this option down. Made the xend-relocation-server default to no, as this is a potential security hole and so must be turned on explicitly. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* New network-bridge script and associated gubbins.emellor@leeni.uk.xensource.com2005-10-191-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is Kurt Garloff's reworked network-bridge script: * we got rid of ifconfig * it works for netdev != eth0 * arp on and off are symmetric as are ifdown and ifup * ifup will be passed the ifcfg config file name if needed (the ifup may otherwise figure that the veth0 hardware is NOT the same as the original ${netdev} and not use the same config -- this happens on SUSE. Charles Coffing tracked this one down.) Plus Kurt's avoid-dash patch: the network setup scripts on SUSE have trouble with the bridge name xen-br0; they don't expect the '-'. Arguably this should be fixed. But I assume there's more scripts out there which may not like it, so I suggest the following patch to rename xen-br0 to xenbr0. Plus Charles Duffy's patch to support multiple bridges: The attached patch allows the network-bridge script to be used to generate multiple bridges corresponding to different physical interfaces. It adds a new parameter, "vifnum", used to refer both to the loopback interface to be used and to set defaults regarding the physical interface and bridge name. Thus, if one wishes to start xenbr0 on eth0 and xenbr1 on eth1, one need only call: network-bridge start ## vifnum is 0 by default network-bridge start vifnum=1 ...well, that and set loopback.nloopbacks=2 in the Dom0 kernel parameters. Plus renaming of virtnum to vifnum in Charles' patch, as requested by Ian Pratt. Plus a fix to DevController to allocate vif IDs starting from 0 (i.e. vif2.0 is now domain 2's first vif, as opposed to vif2.1 in the recent past). Plus tidying up inside network-bridge using some helper variables. Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Set the console limit for DomUs based on a value set in xend-config.sxp.emellor@leeni.uk.xensource.com2005-10-191-0/+3
| | | | | | Signed-off-by: Dan Smith <danms@us.ibm.com> Signed-off-by: Ewan Mellor <ewan@xensource.com>
* Make dom0_enforce_cpus() use vcpu_hotplug rather than directly modifying the ↵cl349@firebug.cl.cam.ac.uk2005-09-161-1/+1
| | | | | | | | | | | | | | sysfs entries. Directly modifying the sysfs entries causes the xenstore state of a cpu's availability to be incorrect. Also slightly modify the dom0-cpus description in the xend-config. Rather than specifying which dom0 vcpus are to be used, it is now a target of how many vcpus to use as pinvcpu ops are the preferred method for setting which physical cpu a vcpu uses. Signed-off-by: Ryan Harper <ryanh@us.ibm.com> Signed-off-by: Christian Limpach <Christian.Limpach@cl.cam.ac.uk>
* New 'network-bridge' script that uses ifdown/ifup to configure the interface ↵iap10@freefall.cl.cam.ac.uk2005-08-131-1/+1
| | | | | | | | | | | | | | | rather than trying to transfer addresses and routes. (Suggested by Gerd Knorr) Although Li Ge has had problems with this script he had trouble with the previous too. I think this new one should work for more people, particularly those using DHCP on their primary dom0 interface. Debugging is currently enabled ("sh -x") so a log of the script's execution is output to /var/log/xend.log Signed-off-by: ian@xensource.com --HG-- rename : tools/examples/network => tools/examples/network-bridge
* This patch does 2 jobs:kaf24@firebug.cl.cam.ac.uk2005-07-291-0/+8
| | | | | | | | | | | | | | | | | | | | | | | - Enforce the number of CPUs dom0 will take. See the new variable "dom0-cpus" in xend-config.sxp (you will want to set this variable to 1 on SMP systems) - Balloon out dom0 memory when creating domU, if there is not enough free memory. The lowest level we will balloon out is configured via the new variable "dom0-min-mem" in xend-config.sxp I still have a doubt: where to put the code to enforce dom0-cpus. At the moment I put it into python/xen/xend/server/SrvDaemon.py, and hopefully that is resonable enough. Any comment? Signed-off-by: Nguyen Anh Quynh <aquynh@gmail.com>
* bitkeeper revision 1.1159.258.50 (4231b14a0Nqrojj7aAwM5Ge5I8cg9w)iap10@freefall.cl.cam.ac.uk2005-03-111-2/+2
| | | | | | | | | Change defaults in /etc/xen/xend-config.sxp : * xend will now only listen on localhost for conenctions from 'xm'. * consoles are only available from localhost too Signed-off-by: ian.pratt@cl.cam.ac.uk
* bitkeeper revision 1.1159.265.2 (42319500DXIXjiTkjszNpliySomMvA)mjw@wray-m-3.hpl.hp.com2005-03-111-1/+13
| | | | | | | | Add support for setting the listen address for consoles and the event port. Signed-off-by: Mike Wray <mike.wray@hp.com>
* bitkeeper revision 1.1159.170.93 (41e661e138UbGRYHtgaE3FTrqTgzzw)kaf24@scramble.cl.cam.ac.uk2005-01-131-2/+7
| | | | | Add VIF-routing capability to xend. The default is still to bridge.
* bitkeeper revision 1.1159.1.191 (41597997cc5ZJzvh6XLLSIhJ9hLEnA)mwilli2@equilibrium.research2004-09-281-0/+6
| | | | | Initial support for automatic management of non-phy block devices.
* bitkeeper revision 1.1053.1.1 (40ee75a9YghVZFFolzFjyJngpxAbKg)mjw@wray-m-3.hpl.hp.com2004-07-091-0/+23
Move to new model of network and vif control using shell scripts.