summaryrefslogtreecommitdiff
path: root/aports/iptables/iptables.initd
blob: 2cc422735b02284baaf23adbc19edc9db88143af (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
#!/sbin/openrc-run
# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/net-firewall/iptables/files/iptables-1.4.11.init,v 1.2 2011/12/04 10:15:59 swegener Exp $

description="IPv4/IPv6 packet filtering and NAT"
description_save="Save firewall state"
description_panic="Drop all packets"
description_reload="Reload configuration"

extra_commands="check save panic"
extra_started_commands="reload"

iptables_name=${SVCNAME}
case "$iptables_name" in
	iptables|ip6tables) ;;
	*) iptables_name="iptables" ;;
esac

iptables_bin="/sbin/${iptables_name}"
case ${iptables_name} in
	iptables)
		#shellcheck disable=SC2153
		iptables_save="${IPTABLES_SAVE}"
		sysctl_ipfwd=net.ipv4.ip_forward
		;;
	ip6tables)
		iptables_save="${IP6TABLES_SAVE}"
		sysctl_ipfwd=net.ipv6.conf.all.forwarding
		;;
esac

depend() {
	before net
	after sysctl
	use logger
	provide firewall
}

set_table_policy() {
	local chains table=$1 policy=$2
	case ${table} in
		nat)    chains="PREROUTING POSTROUTING OUTPUT";;
		mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";;
		filter) chains="INPUT FORWARD OUTPUT";;
		*)      chains="";;
	esac
	local chain
	for chain in ${chains} ; do
		${iptables_bin} --wait 5 --table "${table}" --policy "${chain}" "${policy}"
	done
}

get_tables() {
	# shellcheck disable=SC2086
	${iptables_bin}-save | /bin/sed -n 's/^\*//p'
}

checkconfig() {
	if [ ! -f ${iptables_save} ] ; then
		eerror "Not starting ${iptables_name}.  First create some rules then run:"
		eerror "/etc/init.d/${iptables_name} save"
		return 1
	fi
	return 0
}

start() {
	checkconfig || return 1
	ebegin "Loading ${iptables_name} state and starting firewall"
	# shellcheck disable=SC2086
	${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
	eend $?
	if yesno "${IPFORWARD}"; then
		ebegin "Enabling forwarding"
		/sbin/sysctl -w ${sysctl_ipfwd}=1 > /dev/null
		eend $?
	fi
}

stop() {
	if yesno "${IPFORWARD}"; then
		ebegin "Disabling forwarding"
		/sbin/sysctl -w ${sysctl_ipfwd}=0 > /dev/null
		eend $?
	fi
	if yesno "${SAVE_ON_STOP}"; then
		save || return 1
	fi
	ebegin "Stopping firewall"
	local a
	for a in $(get_tables) ; do
		set_table_policy "$a" ACCEPT

		${iptables_bin} --wait 5 --flush --table "$a"
		${iptables_bin} --wait 5 --delete-chain --table "$a"
	done
	eend $?
}

reload() {
	checkrules || return 1
	ebegin "Flushing firewall"
	local a
	for a in $(get_tables) ; do
		${iptables_bin} --wait 5 --flush --table "$a"
		${iptables_bin} --wait 5 --delete-chain --table "$a"
	done
	eend $?

	start
}

checkrules() {
	ebegin "Checking rules"
	# shellcheck disable=SC2086
	${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
	eend $?
}

check() {
	# Short name for users of init.d script.
	checkrules
}

save() {
	ebegin "Saving ${iptables_name} state"
	checkpath -fm 0600 "${iptables_save}"
	local exitcode tmp

	tmp="$(mktemp)"
	# shellcheck disable=SC2086
	${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${tmp}"
	exitcode=$?
	if [ "$exitcode" -eq 0 ]; then
		# command succeeded, so overwrite
		mv "${tmp}" "${iptables_save}"
	else
		ewarn "${iptables_bin}-save failed!"
		rm -f "${tmp}"
	fi
	eend $exitcode
}

panic() {
	if service_started "${iptables_name}"; then
		rc-service "${iptables_name}" stop
	fi

	local a
	ebegin "Dropping all packets"
	for a in $(get_tables) ; do
		${iptables_bin} --wait 5 --flush --table "$a"
		${iptables_bin} --wait 5 --delete-chain --table "$a"

		set_table_policy "$a" DROP
	done
	eend $?
}