summaryrefslogblamecommitdiffstats
path: root/core/modules/iptables-helper/data/opt/openslx/iptables/iptables-reloader-worker
blob: 0c8277a25f5290b0b3c704f2634e8d8fe8ef9d4a (plain) (tree)
1
2
3
4
5
6
7
8
9
10









                                                                            
                                  
 
                             
                 
               







                                                                  








                                                       
                                                                                                             

                                                    

                      




































































                                                                                                                                                                               

                         


              



                                   


      
#!/bin/ash

# Reloads iptables rules by flushing the tables and applying everything
# in /opt/openslx/iptables/rules.d again. Actions are delayed by 5 seconds
# to coalesce changes, since inotifyd can trigger dozens of events in a row.
#
# This scriptis triggered by inotifyd, see openslx-iptables_reloader.service

ALL_RULES="/run/iptables-reloader.cache"
LOCK="/run/iptables-reloader.lock"
WAIT="/run/iptables-reloader.wait"

# Expects $1 to be the PID/ID
reload_rules () {
	sleep 2
	ctr=0
	while ! mkdir "$WAIT" &> /dev/null && [ "$ctr" -lt 5 ]; do
		echo "$1 WAITLOOP"
		sleep 1
		ctr=$(( ctr + 1 ))
	done
	rm -rf -- "$LOCK"
	echo "$1 RUN"

	rm -f -- "${ALL_RULES}.new"

	for file in /opt/openslx/iptables/rules.d/*; do
		[ -f "$file" ] || continue
		cat "$file" >> "${ALL_RULES}.new"
	done

	# No change? Do nothing...
	if [ -s "${ALL_RULES}" ] && [ -s "${ALL_RULES}.new" ] && diff "${ALL_RULES}" "${ALL_RULES}.new"; then
		echo "$1 NOCHANGE"
		rm -rf -- "${ALL_RULES}.new" "$WAIT"
		exit 0
	fi

	# Reset
	# Filter
	for chain in INPUT FORWARD OUTPUT; do
		iptables -w -t filter -P "$chain" ACCEPT
		iptables -w -t filter -N "ipt-helper-$chain" 2>/dev/null
		iptables -w -t filter -F "ipt-helper-$chain"
		iptables -w -t filter -D "$chain" -j "ipt-helper-$chain" 2>/dev/null # make sure it's number one
		iptables -w -t filter -I "$chain" 1 -j "ipt-helper-$chain"
	done
	# NAT
	for chain in INPUT OUTPUT PREROUTING POSTROUTING; do
		iptables -w -t nat -P "$chain" ACCEPT
		iptables -w -t nat -N "ipt-helper-$chain" 2>/dev/null
		iptables -w -t nat -F "ipt-helper-$chain"
		iptables -w -t nat -D "$chain" -j "ipt-helper-$chain" 2>/dev/null # make sure it's number one
		iptables -w -t nat -I "$chain" 1 -j "ipt-helper-$chain"
	done
	# Mangle
	for chain in INPUT FORWARD OUTPUT PREROUTING POSTROUTING; do
		iptables -w -t mangle -P "$chain" ACCEPT
		iptables -w -t mangle -N "ipt-helper-$chain" 2>/dev/null
		iptables -w -t mangle -F "ipt-helper-$chain"
		iptables -w -t mangle -D "$chain" -j "ipt-helper-$chain" 2>/dev/null # make sure it's number one
		iptables -w -t mangle -I "$chain" 1 -j "ipt-helper-$chain"
	done

	# Apply
	local LOGFILE=$(mktemp)
	local DISABLED="/opt/openslx/iptables/rules.d/disabled/"
	for file in /opt/openslx/iptables/rules.d/*; do
		[ -f "$file" ] || continue
		if [ ! -x "$file" ]; then
			slxlog "firewall-script-exec" "The firewall script '$file' is not executable (+x), moving to disabled/"
			mkdir -p "$DISABLED"
			mv "$file" "$DISABLED"
			continue
		fi
		# patch chain names, add "-w"
		sed -i -r 's/ (-A|--append|-I|--insert|-D|--delete) +(PREROUTING|INPUT|FORWARD|OUTPUT|POSTROUTING) / \1 ipt-helper-\2 /g;s/iptables +-/iptables -w -/g' "$file"
		if ! "$file" > "$LOGFILE" 2>&1; then
			slxlog "firewall-script-apply" "The firewall script '$file' had nonzero exit code. Moving to disabled/" "$LOGFILE"
			mkdir -p "$DISABLED"
			mv "$file" "$DISABLED"
		fi
	done

	# Add default rule
	for chain in INPUT FORWARD OUTPUT; do
		iptables -w -t filter -A "ipt-helper-$chain" -j RETURN
	done
	# NAT
	for chain in INPUT OUTPUT PREROUTING POSTROUTING; do
		iptables -w -t nat -A "ipt-helper-$chain" -j RETURN
	done
	# Mangle
	for chain in INPUT FORWARD OUTPUT PREROUTING POSTROUTING; do
		iptables -w -t mangle -A "ipt-helper-$chain" -j RETURN
	done

	# Do not just move file from above, as we sed'ed above and contents might have changed
	rm -f -- "${ALL_RULES}.new"
	for file in /opt/openslx/iptables/rules.d/*; do
		[ -f "$file" ] || continue
		cat "$file" >> "${ALL_RULES}.new"
	done
	mv -f -- "${ALL_RULES}.new" "${ALL_RULES}"

	echo "iptables rules successfully updated."
	rm -rf -- "$WAIT"
	echo "$1 DONE"
	exit 0
}

echo "$$ INOTIFY"
if mkdir "$LOCK" &> /dev/null; then
	reload_rules "$$" &
fi

exit 0