[package] firewall: do not check for module availability, let iptables fail if a...
[openwrt.git] / package / firewall / files / lib / fw.sh
1 # Copyright (C) 2009-2010 OpenWrt.org
2 # Copyright (C) 2009 Malte S. Stretz
3
4 export FW_4_ERROR=0
5 export FW_6_ERROR=0
6 export FW_i_ERROR=0
7 export FW_e_ERROR=0
8 export FW_a_ERROR=0
9
10 #TODO: remove this
11 [ "${-#*x}" == "$-" ] && {
12 fw() {
13 fw__exec "$@"
14 }
15 } || {
16 fw() {
17 local os=$-
18 set +x
19 fw__exec "$@"
20 local rc=$?
21 set -$os
22 return $rc
23 }
24 }
25
26 fw__exec() { # <action> <family> <table> <chain> <target> <position> { <rules> }
27 local cmd fam tab chn tgt pos
28 local i
29 for i in cmd fam tab chn tgt pos; do
30 if [ "$1" -a "$1" != '{' ]; then
31 eval "$i='$1'"
32 shift
33 else
34 eval "$i=-"
35 fi
36 done
37
38 fw__rc() {
39 export FW_${fam#G}_ERROR=$1
40 return $1
41 }
42
43 fw__dualip() {
44 fw $cmd 4 $tab $chn $tgt $pos "$@"
45 fw $cmd 6 $tab $chn $tgt $pos "$@"
46 fw__rc $((FW_4_ERROR | FW_6_ERROR))
47 }
48
49 fw__autoip() {
50 local ip4 ip6
51 shift
52 while [ "$1" != '}' ]; do
53 case "$1" in
54 *:*) ip6=1 ;;
55 *.*.*.*) ip4=1 ;;
56 esac
57 shift
58 done
59 shift
60 if [ "${ip4:-4}" == "${ip6:-6}" ]; then
61 echo "fw: can't mix ip4 and ip6" >&2
62 return 1
63 fi
64 local ver=${ip4:+4}${ip6:+6}
65 fam=i
66 fw $cmd ${ver:-i} $tab $chn $tgt $pos "$@"
67 fw__rc $?
68 }
69
70 fw__has() {
71 local tab=${1:-$tab}
72 if [ $tab == '-' ]; then
73 type $app > /dev/null 2> /dev/null
74 fw__rc $(($? & 1))
75 return
76 fi
77 fw__rc 0
78 }
79
80 fw__err() {
81 local err
82 eval "err=\$FW_${fam}_ERROR"
83 fw__rc $err
84 }
85
86 local app=
87 local pol=
88 case "$fam" in
89 *4) [ $FW_DISABLE_IPV4 == 0 ] && app=iptables || return ;;
90 *6) [ $FW_DISABLE_IPV6 == 0 ] && app=ip6tables || return ;;
91 i) fw__dualip "$@"; return ;;
92 I) fw__autoip "$@"; return ;;
93 e) app=ebtables ;;
94 a) app=arptables ;;
95 -) fw $cmd i $tab $chn $tgt $pos "$@"; return ;;
96 *) return 254 ;;
97 esac
98 case "$tab" in
99 f) tab=filter ;;
100 m) tab=mangle ;;
101 n) tab=nat ;;
102 r) tab=raw ;;
103 -) tab=filter ;;
104 esac
105 case "$cmd:$chn:$tgt:$pos" in
106 add:*:-:*) cmd=new-chain ;;
107 add:*:*:-) cmd=append ;;
108 add:*:*:$) cmd=append ;;
109 add:*:*:*) cmd=insert ;;
110 del:-:*:*) cmd=delete-chain; fw flush $fam $tab ;;
111 del:*:-:*) cmd=delete-chain; fw flush $fam $tab $chn ;;
112 del:*:*:*) cmd=delete ;;
113 flush:*) ;;
114 policy:*) pol=$tgt; tgt=- ;;
115 has:*) fw__has; return ;;
116 err:*) fw__err; return ;;
117 list:*) cmd="numeric --verbose --$cmd" ;;
118 *) return 254 ;;
119 esac
120 case "$chn" in
121 -) chn= ;;
122 esac
123 case "$tgt" in
124 -) tgt= ;;
125 esac
126
127 local rule_offset
128 case "$pos" in
129 ^) pos=1 ;;
130 $) pos= ;;
131 -) pos= ;;
132 +) eval "rule_offset=\${FW__RULE_OFS_${app}_${tab}_${chn}:-1}" ;;
133 esac
134
135 if ! fw__has - family || ! fw__has $tab ; then
136 export FW_${fam}_ERROR=0
137 return 0
138 fi
139
140 case "$fam" in
141 G*) shift; while [ $# -gt 0 ] && [ "$1" != "{" ]; do shift; done ;;
142 esac
143
144 if [ $# -gt 0 ]; then
145 shift
146 if [ $cmd == delete ]; then
147 pos=
148 fi
149 fi
150
151 local cmdline="$app --table ${tab} --${cmd} ${chn} ${pol} ${rule_offset:-${pos}} ${tgt:+--jump "$tgt"}"
152 while [ $# -gt 1 ]; do
153 # special parameter handling
154 case "$1:$2" in
155 -p:icmp*|-p:1|-p:58|--protocol:icmp*|--protocol:1|--protocol:58)
156 [ "$app" = ip6tables ] && \
157 cmdline="$cmdline -p icmpv6" || \
158 cmdline="$cmdline -p icmp"
159 shift
160 ;;
161 --icmp-type:*|--icmpv6-type:*)
162 local icmp_type
163 if [ "$app" = ip6tables ] && fw_check_icmptype6 icmp_type "$2"; then
164 cmdline="$cmdline $icmp_type"
165 elif [ "$app" = iptables ] && fw_check_icmptype4 icmp_type "$2"; then
166 cmdline="$cmdline $icmp_type"
167 else
168 local fam=IPv4; [ "$app" = ip6tables ] && fam=IPv6
169 fw_log info "ICMP type '$2' is not valid for $fam address family, skipping rule"
170 return 1
171 fi
172 shift
173 ;;
174 *) cmdline="$cmdline $1" ;;
175 esac
176 shift
177 done
178
179 [ -n "$FW_TRACE" ] && echo $cmdline >&2
180
181 $cmdline
182
183 local rv=$?
184 [ $rv -eq 0 ] && [ -n "$rule_offset" ] && \
185 export -- "FW__RULE_OFS_${app}_${tab}_${chn}=$(($rule_offset + 1))"
186 fw__rc $rv
187 }
188
189 fw_get_port_range() {
190 local _var=$1
191 local _ports=$2
192 local _delim=${3:-:}
193 if [ "$4" ]; then
194 fw_get_port_range $_var "${_ports}-${4}" $_delim
195 return
196 fi
197
198 local _first=${_ports%-*}
199 local _last=${_ports#*-}
200 if [ "${_first#!}" != "${_last#!}" ]; then
201 export -- "$_var=$_first$_delim${_last#!}"
202 else
203 export -- "$_var=$_first"
204 fi
205 }
206
207 fw_get_family_mode() {
208 local _var="$1"
209 local _hint="$2"
210 local _zone="$3"
211 local _mode="$4"
212
213 local _ipv4 _ipv6
214 [ -n "$FW_ZONES4$FW_ZONES6" ] && {
215 list_contains FW_ZONES4 $_zone && _ipv4=1 || _ipv4=0
216 list_contains FW_ZONES6 $_zone && _ipv6=1 || _ipv6=0
217 } || {
218 _ipv4=$(uci_get_state firewall core ${_zone}_ipv4 0)
219 _ipv6=$(uci_get_state firewall core ${_zone}_ipv6 0)
220 }
221
222 case "$_hint:$_ipv4:$_ipv6" in
223 *4:1:*|*:1:0) export -n -- "$_var=G4" ;;
224 *6:*:1|*:0:1) export -n -- "$_var=G6" ;;
225 *) export -n -- "$_var=$_mode" ;;
226 esac
227 }
228
229 fw_get_negation() {
230 local _var="$1"
231 local _flag="$2"
232 local _value="$3"
233
234 [ "${_value#!}" != "$_value" ] && \
235 export -n -- "$_var=! $_flag ${_value#!}" || \
236 export -n -- "$_var=${_value:+$_flag $_value}"
237 }
238
239 fw_get_subnet4() {
240 local _var="$1"
241 local _flag="$2"
242 local _name="$3"
243
244 local _ipaddr="$(uci_get_state network "${_name#!}" ipaddr)"
245 local _netmask="$(uci_get_state network "${_name#!}" netmask)"
246
247 case "$_ipaddr" in
248 *.*.*.*)
249 [ "${_name#!}" != "$_name" ] && \
250 export -n -- "$_var=! $_flag $_ipaddr/${_netmask:-255.255.255.255}" || \
251 export -n -- "$_var=$_flag $_ipaddr/${_netmask:-255.255.255.255}"
252 ;;
253 *) export -n -- "$_var=" ;;
254 esac
255 }
256
257 fw_check_icmptype4() {
258 local _var="$1"
259 local _type="$2"
260 case "$_type" in
261 ![0-9]*) export -n -- "$_var=! --icmp-type ${_type#!}"; return 0 ;;
262 [0-9]*) export -n -- "$_var=--icmp-type $_type"; return 0 ;;
263 esac
264
265 [ -z "$FW_ICMP4_TYPES" ] && \
266 export FW_ICMP4_TYPES=$(
267 iptables -p icmp -h 2>/dev/null | \
268 sed -n -e '/^Valid ICMP Types:/ {
269 n; :r;
270 /router-advertisement/d;
271 /router-solicitation/d;
272 s/[()]/ /g; s/[[:space:]]\+/\n/g; p; n; b r
273 }' | sort -u
274 )
275
276 local _check
277 for _check in $FW_ICMP4_TYPES; do
278 if [ "$_check" = "${_type#!}" ]; then
279 [ "${_type#!}" != "$_type" ] && \
280 export -n -- "$_var=! --icmp-type ${_type#!}" || \
281 export -n -- "$_var=--icmp-type $_type"
282 return 0
283 fi
284 done
285
286 export -n -- "$_var="
287 return 1
288 }
289
290 fw_check_icmptype6() {
291 local _var="$1"
292 local _type="$2"
293 case "$_type" in
294 ![0-9]*) export -n -- "$_var=! --icmpv6-type ${_type#!}"; return 0 ;;
295 [0-9]*) export -n -- "$_var=--icmpv6-type $_type"; return 0 ;;
296 esac
297
298 [ -z "$FW_ICMP6_TYPES" ] && \
299 export FW_ICMP6_TYPES=$(
300 ip6tables -p icmpv6 -h 2>/dev/null | \
301 sed -n -e '/^Valid ICMPv6 Types:/ {
302 n; :r; s/[()]/ /g; s/[[:space:]]\+/\n/g; p; n; b r
303 }' | sort -u
304 )
305
306 local _check
307 for _check in $FW_ICMP6_TYPES; do
308 if [ "$_check" = "${_type#!}" ]; then
309 [ "${_type#!}" != "$_type" ] && \
310 export -n -- "$_var=! --icmpv6-type ${_type#!}" || \
311 export -n -- "$_var=--icmpv6-type $_type"
312 return 0
313 fi
314 done
315
316 export -n -- "$_var="
317 return 1
318 }
This page took 0.068193 seconds and 5 git commands to generate.