projects
/
project
/
firewall3.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Treat redirects as port redirections if the specified dest_ip belongs to the router...
[project/firewall3.git]
/
zones.c
diff --git
a/zones.c
b/zones.c
index
3d3812c
..
fc6d11e
100644
(file)
--- a/
zones.c
+++ b/
zones.c
@@
-189,6
+189,14
@@
fw3_load_zones(struct fw3_state *state, struct uci_package *p)
continue;
}
continue;
}
+ if (strlen(zone->name) > FW3_ZONE_MAXNAMELEN)
+ {
+ warn_elem(e, "must not have a name longer than %u characters",
+ FW3_ZONE_MAXNAMELEN);
+ fw3_free_zone(zone);
+ continue;
+ }
+
if (list_empty(&zone->networks) && list_empty(&zone->devices) &&
list_empty(&zone->subnets) && !zone->extra_src)
{
if (list_empty(&zone->networks) && list_empty(&zone->devices) &&
list_empty(&zone->subnets) && !zone->extra_src)
{
@@
-214,12
+222,12
@@
fw3_load_zones(struct fw3_state *state, struct uci_package *p)
}
setbit(zone->flags[0], fw3_to_src_target(zone->policy_input));
}
setbit(zone->flags[0], fw3_to_src_target(zone->policy_input));
+ setbit(zone->flags[0], fw3_to_src_target(zone->policy_forward));
setbit(zone->flags[0], zone->policy_output);
setbit(zone->flags[0], zone->policy_output);
- setbit(zone->flags[0], zone->policy_forward);
setbit(zone->flags[1], fw3_to_src_target(zone->policy_input));
setbit(zone->flags[1], fw3_to_src_target(zone->policy_input));
+ setbit(zone->flags[1], fw3_to_src_target(zone->policy_forward));
setbit(zone->flags[1], zone->policy_output);
setbit(zone->flags[1], zone->policy_output);
- setbit(zone->flags[1], zone->policy_forward);
list_add_tail(&zone->list, &state->zones);
}
list_add_tail(&zone->list, &state->zones);
}
@@
-468,7
+476,7
@@
print_zone_rule(struct fw3_ipt_handle *handle, struct fw3_state *state,
fw3_ipt_rule_append(r, "zone_%s_input", zone->name);
r = fw3_ipt_rule_new(handle);
fw3_ipt_rule_append(r, "zone_%s_input", zone->name);
r = fw3_ipt_rule_new(handle);
- fw3_ipt_rule_target(r, "zone_%s_
dest
_%s", zone->name,
+ fw3_ipt_rule_target(r, "zone_%s_
src
_%s", zone->name,
fw3_flag_names[zone->policy_forward]);
fw3_ipt_rule_append(r, "zone_%s_forward", zone->name);
fw3_flag_names[zone->policy_forward]);
fw3_ipt_rule_append(r, "zone_%s_forward", zone->name);
@@
-587,7
+595,13
@@
fw3_flush_zones(struct fw3_ipt_handle *handle, struct fw3_state *state,
continue;
snprintf(chain, sizeof(chain), c->format, z->name);
continue;
snprintf(chain, sizeof(chain), c->format, z->name);
- fw3_ipt_delete_rules(handle, chain);
+ fw3_ipt_flush_chain(handle, chain);
+
+ /* keep certain basic chains that do not depend on any settings to
+ avoid purging unrelated user rules pointing to them */
+ if (reload && !c->flag)
+ continue;
+
fw3_ipt_delete_chain(handle, chain);
}
fw3_ipt_delete_chain(handle, chain);
}
@@
-635,22
+649,47
@@
fw3_lookup_zone(struct fw3_state *state, const char *name)
return NULL;
}
return NULL;
}
-void
-fw3_
free_zone
(struct fw3_zone *zone)
+struct list_head *
+fw3_
resolve_zone_addresses
(struct fw3_zone *zone)
{
{
- struct fw3_device *dev, *tmp;
+ struct fw3_device *net;
+ struct fw3_address *addr, *tmp;
+ struct list_head *addrs, *all;
+
+ all = malloc(sizeof(*all));
+
+ if (!all)
+ return NULL;
+
+ memset(all, 0, sizeof(*all));
+ INIT_LIST_HEAD(all);
- list_for_each_entry
_safe(dev, tmp, &zone->device
s, list)
+ list_for_each_entry
(net, &zone->network
s, list)
{
{
- list_del(&dev->list);
- free(dev);
+ addrs = fw3_ubus_address(net->name);
+
+ if (!addrs)
+ continue;
+
+ list_for_each_entry_safe(addr, tmp, addrs, list)
+ {
+ list_del(&addr->list);
+ list_add_tail(&addr->list, all);
+ }
+
+ free(addrs);
}
}
- list_for_each_entry
_safe(dev, tmp, &zone->network
s, list)
+ list_for_each_entry
(addr, &zone->subnet
s, list)
{
{
- list_del(&dev->list);
- free(dev);
+ tmp = malloc(sizeof(*tmp));
+
+ if (!tmp)
+ continue;
+
+ memcpy(tmp, addr, sizeof(*tmp));
+ list_add_tail(&tmp->list, all);
}
}
-
fw3_free_object(zone, fw3_zone_opts)
;
+
return all
;
}
}