X-Git-Url: http://git.archive.openwrt.org/?p=project%2Ffirewall3.git;a=blobdiff_plain;f=main.c;h=58975882308aee80da2da69d67a0d617c0cc5b3f;hp=79324a4431340ca333b2ba88c38eb51263df8e02;hb=4ecfb8f6fe4920fd1c6904b1ca8730e746111b00;hpb=c4b9c253df7cb1347dc5cf63846fb52d641e8ca6 diff --git a/main.c b/main.c index 79324a4..5897588 100644 --- a/main.c +++ b/main.c @@ -26,18 +26,23 @@ #include "redirects.h" #include "forwards.h" #include "ipsets.h" +#include "includes.h" #include "ubus.h" +#include "iptables.h" -static bool print_rules = false; -static bool skip_family[FW3_FAMILY_V6 + 1] = { false }; +static enum fw3_family print_family = FW3_FAMILY_ANY; +static struct fw3_state *run_state = NULL; +static struct fw3_state *cfg_state = NULL; -static struct fw3_state * -build_state(void) + +static bool +build_state(bool runtime) { struct fw3_state *state = NULL; struct uci_package *p = NULL; + FILE *sf; state = malloc(sizeof(*state)); @@ -50,16 +55,46 @@ build_state(void) if (!state->uci) error("Out of memory"); - if (uci_load(state->uci, "firewall", &p)) + if (runtime) { - uci_perror(state->uci, NULL); - error("Failed to load /etc/config/firewall"); - } + sf = fopen(FW3_STATEFILE, "r"); + + if (sf) + { + uci_import(state->uci, sf, "fw3_state", &p, true); + fclose(sf); + } + + if (!p) + { + uci_free_context(state->uci); + free(state); + + return false; + } + + state->statefile = true; - if (!fw3_find_command("ipset")) + run_state = state; + } + else { - warn("Unable to locate ipset utility, disabling ipset support"); - state->disable_ipsets = true; + if (!fw3_ubus_connect()) + error("Failed to connect to ubus"); + + if (uci_load(state->uci, "firewall", &p)) + { + uci_perror(state->uci, NULL); + error("Failed to load /etc/config/firewall"); + } + + if (!fw3_find_command("ipset")) + { + warn("Unable to locate ipset utility, disabling ipset support"); + state->disable_ipsets = true; + } + + cfg_state = state; } fw3_load_defaults(state, p); @@ -68,14 +103,9 @@ build_state(void) fw3_load_rules(state, p); fw3_load_redirects(state, p); fw3_load_forwards(state, p); + fw3_load_includes(state, p); - if (state->defaults.disable_ipv6 && !skip_family[FW3_FAMILY_V6]) - { - warn("IPv6 rules globally disabled in configuration"); - skip_family[FW3_FAMILY_V6] = true; - } - - return state; + return true; } static void @@ -95,6 +125,12 @@ free_state(struct fw3_state *state) list_for_each_safe(cur, tmp, &state->forwards) fw3_free_forward((struct fw3_forward *)cur); + list_for_each_safe(cur, tmp, &state->ipsets) + fw3_free_ipset((struct fw3_ipset *)cur); + + list_for_each_safe(cur, tmp, &state->includes) + fw3_free_include((struct fw3_include *)cur); + uci_free_context(state->uci); free(state); @@ -104,132 +140,263 @@ free_state(struct fw3_state *state) static bool -restore_pipe(enum fw3_family family, bool silent) +family_running(enum fw3_family family) +{ + return (run_state && has(run_state->defaults.flags, family, family)); +} + +static void +family_set(struct fw3_state *state, enum fw3_family family, bool set) { - const char *cmd[] = { - "(bug)", - "iptables-restore", - "ip6tables-restore", - }; + if (!state) + return; - if (print_rules) - return fw3_stdout_pipe(); + if (set) + set(state->defaults.flags, family, family); + else + del(state->defaults.flags, family, family); +} - if (!fw3_command_pipe(silent, cmd[family], "--lenient", "--noflush")) +static int +stop(bool complete) +{ + FILE *ct; + + int rv = 1; + enum fw3_family family; + enum fw3_table table; + struct fw3_ipt_handle *handle; + + if (!complete && !run_state) { - warn("Unable to execute %s", cmd[family]); - return false; + warn("The firewall appears to be stopped. " + "Use the 'flush' command to forcefully purge all rules."); + + return rv; } - return true; + if (!print_family && run_state) + fw3_hotplug_zones(run_state, false); + + for (family = FW3_FAMILY_V4; family <= FW3_FAMILY_V6; family++) + { + if (!complete && !family_running(family)) + continue; + + for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) + { + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) + continue; + + if (!(handle = fw3_ipt_open(family, table))) + continue; + + info(" * %sing %s %s table", complete ? "Flush" : "Clear", + fw3_flag_names[family], fw3_flag_names[table]); + + if (complete) + { + fw3_flush_all(handle); + } + else if (run_state) + { + fw3_flush_rules(handle, run_state, false); + fw3_flush_zones(handle, run_state, false); + } + + fw3_ipt_commit(handle); + } + + family_set(run_state, family, false); + family_set(cfg_state, family, false); + + rv = 0; + } + + if (run_state) + fw3_destroy_ipsets(run_state); + + if (complete && (ct = fopen("/proc/net/nf_conntrack", "w")) != NULL) + { + info(" * Flushing conntrack table ..."); + + fwrite("f\n", 2, 1, ct); + fclose(ct); + } + + if (!rv && run_state) + fw3_write_statefile(run_state); + + return rv; } static int -stop(struct fw3_state *state, bool complete) +start(void) { + int rv = 1; enum fw3_family family; enum fw3_table table; + struct fw3_ipt_handle *handle; - const char *tables[] = { - "filter", - "nat", - "mangle", - "raw", - }; + if (!print_family) + fw3_create_ipsets(cfg_state); for (family = FW3_FAMILY_V4; family <= FW3_FAMILY_V6; family++) { - if (skip_family[family] || !restore_pipe(family, true)) + if (family == FW3_FAMILY_V6 && cfg_state->defaults.disable_ipv6) continue; - info("Removing IPv%d rules ...", family == FW3_FAMILY_V4 ? 4 : 6); + if (print_family && family != print_family) + continue; + + if (!print_family && family_running(family)) + { + warn("The %s firewall appears to be started already. " + "If it is indeed empty, remove the %s file and retry.", + fw3_flag_names[family], FW3_STATEFILE); + + continue; + } for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) { - if (!fw3_has_table(family == FW3_FAMILY_V6, tables[table])) + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) + continue; + + if (!(handle = fw3_ipt_open(family, table))) continue; - info(" * %sing %s table", - complete ? "Flush" : "Clear", tables[table]); + info(" * Populating %s %s table", + fw3_flag_names[family], fw3_flag_names[table]); + + fw3_print_default_chains(handle, cfg_state, false); + fw3_print_zone_chains(handle, cfg_state, false); + fw3_print_default_head_rules(handle, cfg_state, false); + fw3_print_rules(handle, cfg_state); + fw3_print_redirects(handle, cfg_state); + fw3_print_forwards(handle, cfg_state); + fw3_print_zone_rules(handle, cfg_state, false); + fw3_print_default_tail_rules(handle, cfg_state, false); - fw3_pr("*%s\n", tables[table]); - fw3_print_flush_rules(table, family, state, complete); - fw3_pr("COMMIT\n"); + if (!print_family) + fw3_ipt_commit(handle); } - fw3_command_close(); + if (!print_family) + fw3_print_includes(cfg_state, family, false); + + family_set(run_state, family, true); + family_set(cfg_state, family, true); + + rv = 0; } - return 0; -} + if (!rv) + { + fw3_set_defaults(cfg_state); -static void -destroy_ipsets(struct fw3_state *state) -{ - if (!fw3_command_pipe(false, "ipset", "-exist", "-")) - return; + if (!print_family) + { + fw3_run_includes(cfg_state, false); + fw3_hotplug_zones(cfg_state, true); + fw3_write_statefile(cfg_state); + } + } - fw3_destroy_ipsets(state); - fw3_command_close(); + return rv; } + static int -start(struct fw3_state *state) +reload(void) { + int rv = 1; enum fw3_family family; enum fw3_table table; + struct fw3_ipt_handle *handle; - const char *tables[] = { - "filter", - "nat", - "mangle", - "raw", - }; + if (!run_state) + return start(); - if (!print_rules && fw3_command_pipe(false, "ipset", "-exist", "-")) - { - fw3_create_ipsets(state); - fw3_command_close(); - } + fw3_hotplug_zones(run_state, false); for (family = FW3_FAMILY_V4; family <= FW3_FAMILY_V6; family++) { - if (skip_family[family] || !restore_pipe(family, false)) - continue; + if (!family_running(family)) + goto start; - info("Constructing IPv%d rules ...", family == FW3_FAMILY_V4 ? 4 : 6); + for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) + { + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) + continue; + + if (!(handle = fw3_ipt_open(family, table))) + continue; + + info(" * Clearing %s %s table", + fw3_flag_names[family], fw3_flag_names[table]); + + fw3_flush_rules(handle, run_state, true); + fw3_flush_zones(handle, run_state, true); + fw3_ipt_commit(handle); + } + + family_set(run_state, family, false); + family_set(cfg_state, family, false); + +start: + if (family == FW3_FAMILY_V6 && cfg_state->defaults.disable_ipv6) + continue; for (table = FW3_TABLE_FILTER; table <= FW3_TABLE_RAW; table++) { - if (!fw3_has_table(family == FW3_FAMILY_V6, tables[table])) + if (!fw3_has_table(family == FW3_FAMILY_V6, fw3_flag_names[table])) continue; - info(" * Populating %s table", tables[table]); - - fw3_pr("*%s\n", tables[table]); - fw3_print_default_chains(table, family, state); - fw3_print_zone_chains(table, family, state); - fw3_print_default_rules(table, family, state); - fw3_print_rules(table, family, state); - fw3_print_redirects(table, family, state); - fw3_print_forwards(table, family, state); - fw3_print_zone_rules(table, family, state); - fw3_pr("COMMIT\n"); + if (!(handle = fw3_ipt_open(family, table))) + continue; + + info(" * Populating %s %s table", + fw3_flag_names[family], fw3_flag_names[table]); + + fw3_print_default_chains(handle, cfg_state, true); + fw3_print_zone_chains(handle, cfg_state, true); + fw3_print_default_head_rules(handle, cfg_state, true); + fw3_print_rules(handle, cfg_state); + fw3_print_redirects(handle, cfg_state); + fw3_print_forwards(handle, cfg_state); + fw3_print_zone_rules(handle, cfg_state, true); + fw3_print_default_tail_rules(handle, cfg_state, true); + + fw3_ipt_commit(handle); } - fw3_command_close(); + fw3_print_includes(cfg_state, family, true); + + family_set(run_state, family, true); + family_set(cfg_state, family, true); + + rv = 0; + } + + if (!rv) + { + fw3_set_defaults(cfg_state); + fw3_run_includes(cfg_state, true); + fw3_hotplug_zones(cfg_state, true); + fw3_write_statefile(cfg_state); } - return 0; + return rv; } static int -lookup_network(struct fw3_state *state, const char *net) +lookup_network(const char *net) { struct fw3_zone *z; struct fw3_device *d; - list_for_each_entry(z, &state->zones, list) + list_for_each_entry(z, &cfg_state->zones, list) { list_for_each_entry(d, &z->networks, list) { @@ -245,12 +412,12 @@ lookup_network(struct fw3_state *state, const char *net) } static int -lookup_device(struct fw3_state *state, const char *dev) +lookup_device(const char *dev) { struct fw3_zone *z; struct fw3_device *d; - list_for_each_entry(z, &state->zones, list) + list_for_each_entry(z, &cfg_state->zones, list) { list_for_each_entry(d, &z->devices, list) { @@ -268,7 +435,8 @@ lookup_device(struct fw3_state *state, const char *dev) static int usage(void) { - fprintf(stderr, "fw3 [-4] [-6] [-q] {start|stop|flush|restart|print}\n"); + fprintf(stderr, "fw3 [-4] [-6] [-q] print\n"); + fprintf(stderr, "fw3 [-q] {start|stop|flush|reload|restart}\n"); fprintf(stderr, "fw3 [-q] network {net}\n"); fprintf(stderr, "fw3 [-q] device {dev}\n"); @@ -279,20 +447,23 @@ usage(void) int main(int argc, char **argv) { int ch, rv = 1; - struct fw3_state *state = NULL; + enum fw3_family family = FW3_FAMILY_ANY; + struct fw3_defaults *defs = NULL; - while ((ch = getopt(argc, argv, "46qh")) != -1) + while ((ch = getopt(argc, argv, "46dqh")) != -1) { switch (ch) { case '4': - skip_family[FW3_FAMILY_V4] = false; - skip_family[FW3_FAMILY_V6] = true; + family = FW3_FAMILY_V4; break; case '6': - skip_family[FW3_FAMILY_V4] = true; - skip_family[FW3_FAMILY_V6] = false; + family = FW3_FAMILY_V6; + break; + + case 'd': + fw3_pr_debug = true; break; case 'q': @@ -305,13 +476,9 @@ int main(int argc, char **argv) } } - if (!fw3_ubus_connect()) - error("Failed to connect to ubus"); - - state = build_state(); - - if (!fw3_lock()) - goto out; + build_state(false); + build_state(true); + defs = &cfg_state->defaults; if (optind >= argc) { @@ -321,73 +488,67 @@ int main(int argc, char **argv) if (!strcmp(argv[optind], "print")) { - freopen("/dev/null", "w", stderr); + if (family == FW3_FAMILY_ANY) + family = FW3_FAMILY_V4; + else if (family == FW3_FAMILY_V6 && defs->disable_ipv6) + warn("IPv6 rules globally disabled in configuration"); - state->disable_ipsets = true; - print_rules = true; + freopen("/dev/null", "w", stderr); - if (!skip_family[FW3_FAMILY_V4] && !skip_family[FW3_FAMILY_V6]) - skip_family[FW3_FAMILY_V6] = true; + cfg_state->disable_ipsets = true; + print_family = family; + fw3_pr_debug = true; - rv = start(state); + rv = start(); } else if (!strcmp(argv[optind], "start")) { - if (fw3_has_state()) + if (fw3_lock()) { - warn("The firewall appears to be started already. " - "If it is indeed empty, remove the %s file and retry.", - FW3_STATEFILE); - - goto out; + rv = start(); + fw3_unlock(); } - - rv = start(state); - fw3_write_state(state); } else if (!strcmp(argv[optind], "stop")) { - if (!fw3_has_state()) + if (fw3_lock()) { - warn("The firewall appears to be stopped. " - "Use the 'flush' command to forcefully purge all rules."); - - goto out; + rv = stop(false); + fw3_unlock(); } - - rv = stop(state, false); - - destroy_ipsets(state); - - fw3_remove_state(); } else if (!strcmp(argv[optind], "flush")) { - rv = stop(state, true); - - destroy_ipsets(state); - - if (fw3_has_state()) - fw3_remove_state(); + if (fw3_lock()) + { + rv = stop(true); + fw3_unlock(); + } } else if (!strcmp(argv[optind], "restart")) { - if (fw3_has_state()) + if (fw3_lock()) { - stop(state, false); - fw3_remove_state(); + stop(true); + rv = start(); + fw3_unlock(); + } + } + else if (!strcmp(argv[optind], "reload")) + { + if (fw3_lock()) + { + rv = reload(); + fw3_unlock(); } - - rv = start(state); - fw3_write_state(state); } else if (!strcmp(argv[optind], "network") && (optind + 1) < argc) { - rv = lookup_network(state, argv[optind + 1]); + rv = lookup_network(argv[optind + 1]); } else if (!strcmp(argv[optind], "device") && (optind + 1) < argc) { - rv = lookup_device(state, argv[optind + 1]); + rv = lookup_device(argv[optind + 1]); } else { @@ -395,10 +556,11 @@ int main(int argc, char **argv) } out: - if (state) - free_state(state); + if (cfg_state) + free_state(cfg_state); - fw3_unlock(); + if (run_state) + free_state(run_state); return rv; }