|
|
@@ -1,6 +1,6 @@
|
|
|
#!/bin/bash
|
|
|
# info: add firewall rule
|
|
|
-# options: ACTION PROTOCOL PORT IP [COMMENT] [RULE]
|
|
|
+# options: ACTION IP PORT [PROTOCOL] [COMMENT] [RULE]
|
|
|
#
|
|
|
# The function adds new rule to system firewall
|
|
|
|
|
|
@@ -9,11 +9,15 @@
|
|
|
# Variable&Function #
|
|
|
#----------------------------------------------------------#
|
|
|
|
|
|
+# Importing system variables
|
|
|
+source /etc/profile
|
|
|
+
|
|
|
# Argument defenition
|
|
|
action=$(echo $1|tr '[:lower:]' '[:upper:]')
|
|
|
-protocol=$(echo $2|tr '[:lower:]' '[:upper:]')
|
|
|
+ip=$2
|
|
|
port_ext=$3
|
|
|
-ip=$4
|
|
|
+protocol=${4-TCP}
|
|
|
+protocol=$(echo $protocol|tr '[:lower:]' '[:upper:]')
|
|
|
comment=$5
|
|
|
rule=$6
|
|
|
|
|
|
@@ -24,17 +28,17 @@ source $VESTA/conf/vesta.conf
|
|
|
# Get next firewall rule id
|
|
|
get_next_fw_rule() {
|
|
|
if [ -z "$rule" ]; then
|
|
|
- curr_str=$(grep "RULE=" $VESTA/data/firewall/rules_ipv4.conf |\
|
|
|
+ curr_str=$(grep "RULE=" $VESTA/data/firewall/rules.conf |\
|
|
|
cut -f 2 -d \' | sort -n | tail -n1)
|
|
|
rule="$((curr_str +1))"
|
|
|
fi
|
|
|
}
|
|
|
|
|
|
sort_fw_rules() {
|
|
|
- cat $VESTA/data/firewall/rules_ipv4.conf |\
|
|
|
- sort -n -k 2 -t \' > $VESTA/data/firewall/rules_ipv4.conf.tmp
|
|
|
- mv -f $VESTA/data/firewall/rules_ipv4.conf.tmp \
|
|
|
- $VESTA/data/firewall/rules_ipv4.conf
|
|
|
+ cat $VESTA/data/firewall/rules.conf |\
|
|
|
+ sort -n -k 2 -t \' > $VESTA/data/firewall/rules.conf.tmp
|
|
|
+ mv -f $VESTA/data/firewall/rules.conf.tmp \
|
|
|
+ $VESTA/data/firewall/rules.conf
|
|
|
}
|
|
|
|
|
|
|
|
|
@@ -42,12 +46,12 @@ sort_fw_rules() {
|
|
|
# Verifications #
|
|
|
#----------------------------------------------------------#
|
|
|
|
|
|
-check_args '4' "$#" 'ACTION PROTOCOL PORT IP [COMMENT] [RULE]'
|
|
|
+check_args '3' "$#" 'ACTION IP PORT [PROTOCOL] [COMMENT] [RULE]'
|
|
|
validate_format 'action' 'protocol' 'port_ext' 'ip'
|
|
|
is_system_enabled "$FIREWALL_SYSTEM" 'FIREWALL_SYSTEM'
|
|
|
get_next_fw_rule
|
|
|
validate_format 'rule'
|
|
|
-is_object_new '../../data/firewall/rules_ipv4' 'RULE' "$rule"
|
|
|
+is_object_new '../../data/firewall/rules' 'RULE' "$rule"
|
|
|
if [ ! -z "$comment"]; then
|
|
|
validate_format 'comment'
|
|
|
fi
|
|
|
@@ -57,22 +61,22 @@ fi
|
|
|
# Action #
|
|
|
#----------------------------------------------------------#
|
|
|
|
|
|
-# Concatenating cron string
|
|
|
+# Concatenating rule
|
|
|
str="RULE='$rule' ACTION='$action' PROTOCOL='$protocol' PORT='$port_ext'"
|
|
|
str="$str IP='$ip' COMMENT='$comment' SUSPENDED='no'"
|
|
|
str="$str TIME='$TIME' DATE='$DATE'"
|
|
|
|
|
|
-# Adding to crontab
|
|
|
-echo "$str" >> $VESTA/data/firewall/rules_ipv4.conf
|
|
|
+# Adding to config
|
|
|
+echo "$str" >> $VESTA/data/firewall/rules.conf
|
|
|
|
|
|
# Changing permissions
|
|
|
-chmod 660 $VESTA/data/firewall/rules_ipv4.conf
|
|
|
+chmod 660 $VESTA/data/firewall/rules.conf
|
|
|
|
|
|
# Sorting firewall rules by id number
|
|
|
sort_fw_rules
|
|
|
|
|
|
# Updating system firewall
|
|
|
-$BIN/v-update-sys-firewall
|
|
|
+$BIN/v-update-firewall
|
|
|
|
|
|
|
|
|
#----------------------------------------------------------#
|