2 # Add "freifunk" firewall zone
3 # If wan/lan is used for olsr then remove these networks from wan/lan zones
4 # Also setup rules defined in /etc/config/freifunk and /etc/config/profile_<community>
9 wan_is_olsr=$(uci -q get meshwizard.netconfig.wan_config)
10 lan_is_olsr=$(uci -q get meshwizard.netconfig.lan_config)
14 # Rename firewall zone for freifunk if unnamed
15 # If wan is used for olsr then set network for the firewall zone wan to ' ' to remove the wan interface from it, else add local restrict to it
16 # If lan is used for olsr then set network for the firewall zone lan to ' ' to remove the lan interface from it
19 config_get name "$1" name
20 config_get network "$1" network
22 if [ "$name" == "freifunk" ]; then
23 # rename section if unnamed
24 if [ -z "${1/cfg[0-9a-fA-F]*/}" ]; then
25 section_rename firewall $1 zone_freifunk
29 if [ "$name" == "wan" ]; then
30 if [ "$wan_is_olsr" == 1 ]; then
31 uci set firewall.$1.network=' ' && uci_commitverbose "WAN is used for olsr, removed the wan interface from zone wan" firewall
33 uci set firewall.$1.local_restrict=1 && uci_commitverbose "Enable local_restrict for zone wan" firewall
37 if [ "$name" == "lan" ] && [ "$lan_is_olsr" == 1 ]; then
38 uci set firewall.$1.network=' ' && uci_commitverbose "LAN is used for olsr, removed the lan interface from zone lan" firewall
42 config_foreach handle_fwzone zone
45 set firewall.zone_freifunk="zone"
46 set firewall.zone_freifunk.name="freifunk"
47 set firewall.zone_freifunk.input="$zone_freifunk_input"
48 set firewall.zone_freifunk.forward="$zone_freifunk_forward"
49 set firewall.zone_freifunk.output="$zone_freifunk_output"
52 uci_commitverbose "Setup firewall zones" firewall
54 # Usually we need to setup masquerading for lan, except lan is an olsr interface or has an olsr hna-entry
57 config_get interface "$1" interface
58 if [ "$interface" == "lan" ]; then
63 config_foreach handle_interface Interface
65 LANIP="$(uci -q get network.lan.ipaddr)"
66 if [ -n "$LANIP" ]; then
68 config_get netaddr "$1" netaddr
69 if [ "$LANIP" == "$netaddr" ]; then
73 config_foreach handle_hna Hna4
76 currms=$(uci -q get firewall.zone_freifunk.masq_src)
77 if [ ! "$no_masq_lan" == "1" ] && [ ! "$(uci -q get meshwizard.netconfig.lan_config)" == 1 ]; then
78 uci set firewall.zone_freifunk.masq="1"
79 [ -z "$(echo $currms |grep lan)" ] && uci add_list firewall.zone_freifunk.masq_src="lan"
83 # Rules, Forwardings, advanced config and includes from freifunk and
84 # profile_$community config files.
90 local allowed_section_types="advanced include fw_rule fw_forwarding"
91 if is_in_list "$allowed_section_types" $type ; then
92 uci set firewall.${name}="${type/fw_/}"
96 uci set firewall.${CONFIG_SECTION}.${option}="$value"
99 option_cb() { return; }
103 config_load profile_${community}
108 # If we use auto-ipv6-dhcp then allow 547/udp on the freifunk zone
109 if [ "$ipv6_config" = "auto-ipv6-dhcpv6" ]; then
111 set firewall.dhcpv6=rule
112 set firewall.dhcpv6.src=freifunk
113 set firewall.dhcpv6.target=ACCEPT
114 set firewall.dhcpv6.dest_port=547
115 set firewall.dhcpv6.proto=udp
119 # Firewall rules to allow incoming ssh and web if enabled
121 if [ "$wan_allowssh" == 1 ]; then
123 set firewall.wanssh=rule
124 set firewall.wanssh.src=wan
125 set firewall.wanssh.target=ACCEPT
126 set firewall.wanssh.proto=tcp
127 set firewall.wanssh.dest_port=22
131 if [ "$wan_allowweb" == 1 ]; then
133 set firewall.wanweb=rule
134 set firewall.wanweb.src=wan
135 set firewall.wanweb.target=ACCEPT
136 set firewall.wanweb.proto=tcp
137 set firewall.wanweb.dest_port=80
138 set firewall.wanwebhttps=rule
139 set firewall.wanwebhttps.src=wan
140 set firewall.wanwebhttps.target=ACCEPT
141 set firewall.wanwebhttps.proto=tcp
142 set firewall.wanwebhttps.dest_port=443
146 uci_commitverbose "Setup rules, forwardings, advanced config and includes." firewall