X-Git-Url: http://git.archive.openwrt.org/?p=project%2Ffirewall3.git;a=blobdiff_plain;f=utils.c;h=0094ae7b3a49e926e2764ff3fe116080a95904d5;hp=9b383a35a414e764cad51a2b8d833deb3bb66b0d;hb=2fbd2c5618e1d4edc103d5472a95aad6e6aa659f;hpb=61cc1d220c95168faf24bececc752a5af7ce6431 diff --git a/utils.c b/utils.c index 9b383a3..0094ae7 100644 --- a/utils.c +++ b/utils.c @@ -244,6 +244,7 @@ __fw3_command_pipe(bool silent, const char *command, ...) signal(SIGPIPE, SIG_IGN); pipe_pid = pid; close(pfds[0]); + fcntl(pfds[1], F_SETFD, fcntl(pfds[1], F_GETFD) | FD_CLOEXEC); } pipe_fd = fdopen(pfds[1], "w"); @@ -347,89 +348,142 @@ fw3_unlock(void) } -bool -fw3_read_statefile(void *state) +static void +write_defaults_uci(struct uci_context *ctx, struct fw3_defaults *d, + struct uci_package *dest) { - FILE *sf; + char buf[sizeof("0xffffffff\0")]; + struct uci_ptr ptr = { .p = dest }; + + uci_add_section(ctx, dest, "defaults", &ptr.s); + + sprintf(buf, "0x%x", d->flags[0]); + ptr.o = NULL; + ptr.option = "__flags_v4"; + ptr.value = buf; + uci_set(ctx, &ptr); + + sprintf(buf, "0x%x", d->flags[1]); + ptr.o = NULL; + ptr.option = "__flags_v6"; + ptr.value = buf; + uci_set(ctx, &ptr); +} - int type; - char line[128]; - const char *p, *name; +static void +write_zone_uci(struct uci_context *ctx, struct fw3_zone *z, + struct uci_package *dest) +{ + struct fw3_device *dev; + struct fw3_address *sub; + enum fw3_family fam = FW3_FAMILY_ANY; - uint32_t flags; + char *p, buf[34]; - struct fw3_state *s = state; - struct fw3_zone *zone; - struct fw3_ipset *ipset; + struct uci_ptr ptr = { .p = dest }; - sf = fopen(FW3_STATEFILE, "r"); + if (!z->enabled) + return; - if (!sf) - return false; + if (fw3_no_table(z->flags[0]) && !fw3_no_table(z->flags[1])) + fam = FW3_FAMILY_V6; + else if (!fw3_no_table(z->flags[0]) && fw3_no_table(z->flags[1])) + fam = FW3_FAMILY_V4; + else if (fw3_no_table(z->flags[0]) && fw3_no_table(z->flags[1])) + return; - while (fgets(line, sizeof(line), sf)) + uci_add_section(ctx, dest, "zone", &ptr.s); + + ptr.o = NULL; + ptr.option = "name"; + ptr.value = z->name; + uci_set(ctx, &ptr); + + ptr.o = NULL; + ptr.option = "input"; + ptr.value = fw3_flag_names[z->policy_input]; + uci_set(ctx, &ptr); + + ptr.o = NULL; + ptr.option = "output"; + ptr.value = fw3_flag_names[z->policy_output]; + uci_set(ctx, &ptr); + + ptr.o = NULL; + ptr.option = "forward"; + ptr.value = fw3_flag_names[z->policy_forward]; + uci_set(ctx, &ptr); + + ptr.o = NULL; + ptr.option = "masq"; + ptr.value = z->masq ? "1" : "0"; + uci_set(ctx, &ptr); + + ptr.o = NULL; + ptr.option = "conntrack"; + ptr.value = z->conntrack ? "1" : "0"; + uci_set(ctx, &ptr); + + ptr.o = NULL; + ptr.option = "mtu_fix"; + ptr.value = z->mtu_fix ? "1" : "0"; + uci_set(ctx, &ptr); + + ptr.o = NULL; + ptr.option = "custom_chains"; + ptr.value = z->custom_chains ? "1" : "0"; + uci_set(ctx, &ptr); + + if (fam != FW3_FAMILY_ANY) { - p = strtok(line, " \t\n"); - - if (!p) - continue; - - type = strtoul(p, NULL, 16); - name = strtok(NULL, " \t\n"); - - if (!name) - continue; + ptr.o = NULL; + ptr.option = "family"; + ptr.value = fw3_flag_names[fam]; + uci_set(ctx, &ptr); + } - p = strtok(NULL, " \t\n"); + ptr.o = NULL; + ptr.option = "device"; - if (!p) + fw3_foreach(dev, &z->devices) + { + if (!dev) continue; - flags = strtoul(p, NULL, 16); - - switch (type) - { - case FW3_TYPE_DEFAULTS: - s->defaults.running_flags = flags; - break; - - case FW3_TYPE_ZONE: - if (!(zone = fw3_lookup_zone(state, name, false))) - { - zone = fw3_alloc_zone(); - - if (!zone) - continue; + p = buf; - zone->name = strdup(name); - list_add_tail(&zone->list, &s->zones); - } + if (dev->invert) + p += sprintf(p, "!"); - zone->running_dst_flags = flags; - list_add_tail(&zone->running_list, &s->running_zones); - break; + p += sprintf(p, "%s", dev->name); - case FW3_TYPE_IPSET: - if (!(ipset = fw3_lookup_ipset(state, name, false))) - { - ipset = fw3_alloc_ipset(); + ptr.value = buf; + uci_add_list(ctx, &ptr); + } - if (!ipset) - continue; + ptr.o = NULL; + ptr.option = "subnet"; - ipset->name = strdup(name); - list_add_tail(&ipset->list, &s->ipsets); - } + fw3_foreach(sub, &z->subnets) + { + if (!sub) + continue; - ipset->running_flags = flags; - list_add_tail(&ipset->running_list, &s->running_ipsets); - break; - } + ptr.value = fw3_address_to_string(sub, true); + uci_add_list(ctx, &ptr); } - fclose(sf); - - return true; + sprintf(buf, "0x%x", z->flags[0]); + ptr.o = NULL; + ptr.option = "__flags_v4"; + ptr.value = buf; + uci_set(ctx, &ptr); + + sprintf(buf, "0x%x", z->flags[1]); + ptr.o = NULL; + ptr.option = "__flags_v6"; + ptr.value = buf; + uci_set(ctx, &ptr); } void @@ -437,62 +491,46 @@ fw3_write_statefile(void *state) { FILE *sf; struct fw3_state *s = state; - struct fw3_defaults *d = &s->defaults; struct fw3_zone *z; - struct fw3_ipset *i; - int mask = (1 << FW3_FAMILY_V4) | (1 << FW3_FAMILY_V6); + struct uci_package *p; - if (!(d->flags & mask)) + if (fw3_no_family(s->defaults.flags[0]) && + fw3_no_family(s->defaults.flags[1])) { - if (unlink(FW3_STATEFILE)) - warn("Unable to remove state %s: %s", - FW3_STATEFILE, strerror(errno)); - - return; + unlink(FW3_STATEFILE); } - - sf = fopen(FW3_STATEFILE, "w"); - - if (!sf) + else { - warn("Cannot create state %s: %s", FW3_STATEFILE, strerror(errno)); - return; - } + sf = fopen(FW3_STATEFILE, "w+"); - fprintf(sf, "%x - %x\n", FW3_TYPE_DEFAULTS, d->flags); + if (!sf) + { + warn("Cannot create state %s: %s", FW3_STATEFILE, strerror(errno)); + return; + } - list_for_each_entry(z, &s->running_zones, running_list) - { - fprintf(sf, "%x %s %x\n", FW3_TYPE_ZONE, z->name, z->dst_flags); - } + if ((p = uci_lookup_package(s->uci, "fw3_state")) != NULL) + uci_unload(s->uci, p); - list_for_each_entry(i, &s->running_ipsets, running_list) - { - fprintf(sf, "%x %s %x\n", FW3_TYPE_IPSET, i->name, i->flags); - } - - fclose(sf); -} + uci_import(s->uci, sf, "fw3_state", NULL, true); + if ((p = uci_lookup_package(s->uci, "fw3_state")) != NULL) + { + write_defaults_uci(s->uci, &s->defaults, p); -struct object_list_heads -{ - struct list_head list; - struct list_head running_list; -}; + list_for_each_entry(z, &s->zones, list) + write_zone_uci(s->uci, z, p); -void -fw3_set_running(void *object, struct list_head *dest) -{ - struct object_list_heads *o = object; + uci_export(s->uci, sf, p, true); + uci_unload(s->uci, p); + } - if (dest && !o->running_list.next) - list_add_tail(&o->running_list, dest); - else if (!dest && o->running_list.next) - list_del(&o->running_list); + fclose(sf); + } } + void fw3_free_object(void *obj, const void *opts) { @@ -514,3 +552,80 @@ fw3_free_object(void *obj, const void *opts) free(obj); } + + +bool +fw3_pr_rulespec(int table, int family, uint32_t *flags, uint32_t mask, + const struct fw3_rule_spec *r, const char *fmt, ...) +{ + char buf[256]; + bool rv = false; + + va_list ap; + uint32_t f = flags ? flags[family == FW3_FAMILY_V6] : 0; + + if (mask) + f &= mask; + + for (; r->format; r++) + { + if (!fw3_is_family(r, family)) + continue; + + if (r->table != table) + continue; + + if ((r->flag != 0) && !hasbit(f, r->flag)) + continue; + + va_start(ap, fmt); + vsnprintf(buf, sizeof(buf), r->format, ap); + va_end(ap); + + fw3_pr(fmt, buf); + + rv = true; + } + + return rv; +} + + +bool +fw3_hotplug(bool add, void *zone, void *device) +{ + struct fw3_zone *z = zone; + struct fw3_device *d = device; + + if (!d->network) + return false; + + switch (fork()) + { + case -1: + warn("Unable to fork(): %s\n", strerror(errno)); + return false; + + case 0: + break; + + default: + return true; + } + + close(0); + close(1); + close(2); + chdir("/"); + + clearenv(); + setenv("ACTION", add ? "add" : "remove", 1); + setenv("ZONE", z->name, 1); + setenv("INTERFACE", d->network->name, 1); + setenv("DEVICE", d->name, 1); + + execl(FW3_HOTPLUG, FW3_HOTPLUG, "firewall", NULL); + + /* unreached */ + return false; +}